CN105976005A - Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device - Google Patents
Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device Download PDFInfo
- Publication number
- CN105976005A CN105976005A CN201610268496.XA CN201610268496A CN105976005A CN 105976005 A CN105976005 A CN 105976005A CN 201610268496 A CN201610268496 A CN 201610268496A CN 105976005 A CN105976005 A CN 105976005A
- Authority
- CN
- China
- Prior art keywords
- character
- equipment
- quick response
- code
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a two-dimensional code encrypting method, a two-dimensional code generating device and a two-dimensional code scanning device. The invention relates to a two-dimensional code technology, and especially relates to a two-dimensional code identification and encryption technology. The two-dimensional code encrypting method comprises a two-dimensional code generating method which comprises the following steps: getting a first character corresponding to a first device, getting a second character corresponding to a second device, and encrypting the second character through a first encryption method to get a second encrypted character; and connecting the first character and the second encrypted character through at least one first separator to get a connecting character, and generating a two-dimensional code pattern through a two-dimensional code generation algorithm based on the connecting character, wherein the first encryption method includes a first key and a first symmetric encryption algorithm, the first device is a general device, and the second device is a special device. The invention relates to a two-dimensional code technology, and especially relates to a two-dimensional code identification and encryption technology.
Description
Technical field
The present invention relates to planar bar code technology, know encryption technology particularly to Quick Response Code.
Background technology
Two-dimensional bar code, also referred to as Quick Response Code are to divide in plane by certain rule with certain specific geometric figure
The chequered with black and white figure of cloth is in order to record initial data;Can be set by image input device or optoelectronic scanning
Standby automatically identification realizes automatically processing of data message.Owing to Quick Response Code can be in both direction horizontal, longitudinal
Expressing information simultaneously, therefore can express substantial amounts of information in the least area.
Quick Response Code application in the terminal day by day increases, as a example by the initial data of Quick Response Code is as station address,
Initial data i.e. station address is encoded to two-dimension code pattern, and user is by arranging Quick Response Code in the terminal
Identification module identifies the web site address information in this two-dimension code pattern, i.e. may have access to this website.Above-mentioned side
In case, there is problem below:
First, when the conversion of initial data to two-dimension code pattern uses clear-text way, because of to initial data
Do not use any encryption measures, easily cause the leakage of initial data, reduce the safety of data message;
Second, when the conversion of initial data to two-dimension code pattern uses encrypted test mode, only specific people
Or equipment has authority and obtains the data of this Quick Response Code, the most often this Quick Response Code is not used to publicity.And
A promotional pamphlet or bill are printed on multiple Quick Response Code and the most easily cause confusion.
Summary of the invention
Given below one or more aspect is simplified summarize basic with try hard to provide in terms of this type of
Understand.This summarizes the extensive overview of the not all aspect contemplated, and is both not intended to identify all
Key or the decisive key element of aspect is the most non-attempts to define the scope in terms of any or all.It is unique
Purpose be intended to be given in simplified form some concepts in terms of one or more using as given later more
Add the sequence of specific description.
The present invention provides a kind of Quick Response Code encryption method, Quick Response Code to generate equipment and two-dimensional code scanning device solution
The certainly information security issue in Quick Response Code.
For achieving the above object, inventor provide a kind of Quick Response Code encryption method, generate including Quick Response Code
Method, two-dimensional code generation method includes step:
The first character that first equipment that obtains is corresponding, and the second character that second equipment that obtains is corresponding, pass through
First encryption method is encrypted the second character and is obtained the second encrypted characters;
First character and the second encrypted characters are connected by least one first separator, it is thus achieved that connective word
Symbol, then generates pattern in 2 D code by concatenation character Quick Response Code generating algorithm;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment is special equipment.
Further, including two-dimensional code identification method, two-dimensional code identification method includes step:
If the first device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character and the second encrypted characters connected by the first separator, and it is corresponding to obtain the first character
Content;
If the second device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character and the second encrypted characters connected by the first separator, by first decryption method solution
Close second encrypted characters obtains the second character, and obtains the content that the second character is corresponding;
First decryption method includes the first key and the first symmetrical decipherment algorithm, the first symmetrical decipherment algorithm with
First AES is corresponding.
First equipment is common apparatus, and the second equipment is special equipment.
Further, the encryption algorithm database that the first key and corresponding AES are stored on server;
Second equipment obtains the first key and correspondence according to the device identification of the second equipment from encryption algorithm database
Symmetrical decipherment algorithm.
Further, two-dimensional code generation method includes step:
The second character that second equipment that obtains is corresponding, encrypts the second character by the first encryption method and obtains the
Two encrypted characters;
Obtain the 3rd character that the 3rd equipment is corresponding, obtain the by the second encryption method encryption the 3rd character
Three encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even
Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment;
If the 3rd device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character, the second encrypted characters and the 3rd encrypted characters connected by the first separator, pass through
Second decryption method deciphering the 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Second encryption method is corresponding with the second decryption method.
Further, after step " acquisition concatenation character ", in step " by concatenation character Quick Response Code
Generating algorithm generates pattern in 2 D code " before, further comprise the steps of:
By concatenation character by the 4th encryption method encryption, the word after being processed by the 4th encryption method
Symbol is used for generating pattern in 2 D code as concatenation character.
Inventor also provides for a kind of Quick Response Code and generates equipment, and it includes printer, processor;
Described processor is for obtaining the first character that the first equipment is corresponding, and it is corresponding to obtain the second equipment
Second character, encrypts the second character by the first encryption method and obtains the second encrypted characters, by the first character
It is connected by least one first separator with the second encrypted characters, it is thus achieved that concatenation character, then will connect
Character Quick Response Code generating algorithm generates pattern in 2 D code, and the second encryption method is for including the second key and the
Two symmetric encipherment algorithms, the first equipment is common apparatus, and the second equipment is special equipment;
Described printer is for printing the Quick Response Code of generation;
Further, server is also included;Described server be used for storing encryption algorithm database, key,
Device identification;After processor obtains the second character that the second equipment is corresponding, randomly choose the first encryption
Algorithm and random first key of generation, and by the device identification of the second equipment, the first AES and first
Key associates and is stored in server.
Further, described microprocessor is additionally operable to obtain the 3rd character that the 3rd equipment is corresponding, by second
Encryption method encryption the 3rd character obtains the 3rd encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even
Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment.
Further, described microprocessor is used for, after " acquisition concatenation character ", " by connective word
Symbol Quick Response Code generating algorithm generates pattern in 2 D code " before, by concatenation character by the 4th encryption method
Encryption, the character after being processed by the 4th encryption method is used for generating Quick Response Code figure as concatenation character
Case.
Inventor also provides for a kind of two-dimensional code scanning device, and it has photographic head and microprocessor, photographic head
Connect microprocessor;
Photographic head is used for shooting two-dimension code image;
Microprocessor is for deciphering pattern in 2 D code by Quick Response Code decryption method, it is thus achieved that separate by first
First character of symbol connection and the second encrypted characters, decipher the second encrypted characters by first decryption method and obtain
Obtain the second character, and obtain the content that the second character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that by first point
Every the first character, the second encrypted characters and the 3rd encrypted characters that symbol connects, by the second decryption method solution
Close 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that through encryption
Concatenation character, by the concatenation character after the 4th decryption method deciphering encryption, it is thus achieved that the first character, second
The concatenation character that encrypted characters, the 3rd encryption character group become, by the second decryption method deciphering the 3rd encryption
Character obtains the 3rd character, and obtains the content that the 3rd character is corresponding, or is deciphered by first decryption method
Second encrypted characters obtains the second character, and obtains the content that the second character is corresponding.
It is different from prior art, common apparatus such as mobile phone in technique scheme Quick Response Code encryption method,
Computer can only identify its first character, and the only second equipment (special equipment) could identify the second word
Symbol, thus prevents the general public from knowing the information of the second character, improves the information carried in the second character
Safety;Therefore the first character carries the data that user's sensitivity is the highest, and the second character can carry use
The data that family sensitivity is high, such as, can be note validating information the most towards the public;The most different sets
Standby this Quick Response Code that scans identifies different information, can avoid showing on a bill or printing multiple
Quick Response Code, improves the convenience that Quick Response Code uses.
Simultaneously when having multiple special equipment, the 3rd equipment and the second equipment are different types of equipment,
Such as the 3rd equipment is for factory's detection or for verifying the equipment of product legitimacy, and the second equipment is to use
The equipment of detection registration when retail.In a specific embodiment it may be that the first character is public number
Link, the second character is " SPID+note number ", and the 3rd character is " SPID+note number
+ bill anti-counterfeit code ";And generate pattern in 2 D code by above-mentioned two-dimensional code generation method.When the second equipment is swept
When retouching this pattern in 2 D code, by above-mentioned recognition methods, identify the second character;When the 3rd device scan
During this pattern in 2 D code, by above-mentioned recognition methods, identify the 3rd character.Therefore realize different
Special equipment, is different according to its content identified of identical Quick Response Code.For phase can be addressed before reaching
Closing purpose, this one or more aspect is included in and is hereinafter fully described and special in the following claims
The feature do not pointed out.The following description and drawings illustrate this one or more in terms of some explanation
Property feature.But, these features only indicate in the various modes of the principle that can use various aspect
Several, and this description be intended to this type of aspects all and equivalence aspect.
Accompanying drawing explanation
Below with reference to accompanying drawing, disclosed aspect is described, it is provided that accompanying drawing illustrates that and non-limiting institute
Disclosed aspect, label sign similar elements similar in accompanying drawing, and wherein:
Fig. 1 is a kind of two-dimensional code generation method 1 described in specific embodiment;
Fig. 2 is a kind of two-dimensional code generation method 2 described in specific embodiment;
Fig. 3 is a kind of two-dimensional code generation method 3 described in specific embodiment;
Fig. 4 is a kind of two-dimensional code generation method 4 described in specific embodiment;
Fig. 5 is a kind of two-dimensional code generation method 5 described in specific embodiment;
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below
In conjunction with specific embodiments and coordinate accompanying drawing to be explained in detail.In the following description, elaborate for explanatory purposes
Numerous details is to provide the thorough understanding in terms of one or more.It will be evident that
Do not have these details can put into practice this type of aspect yet.
See Fig. 1-Fig. 5, the transmission of the arrow representative of data flow in figure, the frame in figure represents processing procedure,
Lead-in wire on frame represent this processing procedure numbering (i.e. in figure S101~S310 represent processing module perform step
Suddenly);In figure, the first character, the second character, the 3rd character are as input, and Quick Response Code is as output;Permissible
Although being understood by S101 with S201 is two different numberings, but its processing procedure is the same.
Seeing Fig. 1, inventor provides a kind of Quick Response Code encryption method, and including two-dimensional code generation method, Quick Response Code is raw
One-tenth method includes step:
The first character that first equipment that obtains is corresponding, and the second character that second equipment that obtains is corresponding, pass through
First encryption method is encrypted the second character and is obtained the second encrypted characters (corresponding diagram 1 step S101);
First character is connected (corresponding step with the second encrypted characters by least one first separator
S102);, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code
(corresponding step S103);
First encryption method is for including the first key and the first symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment is special equipment.
First character and the second character can be network address, numbering, word, photo etc.;Common apparatus refers to can
To scan the equipment of any Quick Response Code, such as mobile phone, there is the computer etc. of photographic head;Special equipment is
Above-mentioned Quick Response Code can be scanned and obtain the second encrypted characters, and the equipment to the second encrypted characters deciphering,
The second character is obtained, the character identified as this second equipment barcode scanning after second encrypted characters deciphering.Example
As being developed for scanning the scanner of above-mentioned Quick Response Code specially.
Separator is used for separating character string and the character of character string or character string.Separator can be to pass through
“||”、“." “ && ", " # ", " ", in certain embodiments, to correctly identify separator, also include
Correct identification translates character.Such as first character for " 7827423 " and the second encrypted characters is
" klsdfjga etwe ", separator be " ", translation character be " ", then the first character and second adds
Concatenation character after close Connection operator be " 7827423 klsdfjga etwe ", wherein first " "
For separator, second " " for translation character, represent after this character " " make not as separator
With.
Quick Response Code generating algorithm of being passed through by connection string in technique scheme generates Quick Response Code, wherein
Quick Response Code generating algorithm is that existing plaintext Quick Response Code generates, after i.e. being generated by this Quick Response Code generating algorithm
The general two-dimensional code scanning device of Quick Response Code all may recognize that the connection string in two-dimension code image.
Symmetric encipherment algorithm (initial data) just in plain text together with encryption key through special AES
After process so that it is become complicated encrypted cipher text;It is characterized in that algorithm is open, amount of calculation is little, encryption is fast
Degree is fast, encryption efficiency is high.Such as in computer private network system widely used symmetric encipherment algorithm have DES,
IDEA and AES etc..
In a specific embodiment it may be that the first equipment is common apparatus, e.g. arbitrary band is taken the photograph
As the mobile phone of the recognizable Quick Response Code of head, the second equipment is special equipment, e.g. issue of lottery side's research and development
Scanner, or the mobile phone etc. of scanning software of issue of lottery side's research and development is installed.By the publisher of lottery ticket
The link of public number corresponding with the first equipment (general) as the link of the first character, i.e. public number;
" SPID+note number " of lottery ticket is as the second character string;Obtain by des encryption the second character string
Second encrypted characters string, uses the first key Key1 in ciphering process.Key1 can be acquiescence key,
Programming is in the memorizer of the second equipment;Key1 is stored in the server that the second equipment may have access to
In.By the first character string and the second encrypted characters by separator " " connect, obtain concatenation character: " the
One character string the second encrypted characters string ", and by this concatenation character generate image in 2 D code.
When this image in 2 D code of the first device scan, by Quick Response Code decoding obtain " the first character string the
Two encrypted characters strings ", thus obtain the first character string.I.e. obtain the chain of public number corresponding to the first character string
Connect.
When this Quick Response Code of the second device scan, the second equipment obtains " the first character by Quick Response Code decoding
String the second encrypted characters string ", thus obtain the second encrypted characters string, the second equipment is according to being stored in second
Key1 in equipment or decipher the second encrypted characters string according to the Key1 on server, thus obtain second
" SPID+note number " that encrypted characters string is corresponding, thus the correct note number identifying lottery ticket.
It is understandable that and obtains content corresponding to the second character herein, obtain content corresponding to the 3rd character
Statement is interpreted as obtaining word corresponding to character, image etc., and completes directly by word, the desirable of image
Connect use word or image, or according to word, the instruction of image, it is thus achieved that other data.Such as second word
Symbol is network address, then access this network address, it is thus achieved that corresponding content, the most such as second character is image, then
The content obtaining the second character can be to show this image, or identifies the graphical content in this image.
Generally two-dimensional code identification method includes step:
If the first device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character and the second encrypted characters connected by the first separator, and it is corresponding to obtain the first character
Content;
If the second device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character and the second encrypted characters connected by the first separator, by first decryption method solution
Close second encrypted characters obtains the second character, and obtains the content that the second character is corresponding;
First decryption method includes the first key and the first symmetrical decipherment algorithm, the first symmetrical decipherment algorithm with
First AES is corresponding.
First equipment is common apparatus, and the second equipment is special equipment.
Above-mentioned Quick Response Code encryption method is common apparatus such as mobile phone, and computer can only identify its first character,
And the only second equipment (special equipment) could identify the second character, thus prevent the general public from knowing
The information of two characters, improves the safety of the information carried in the second character;Therefore the first character carries use
The data that family sensitivity is the highest, and the second character can carry the data that user's sensitivity is high, the most permissible
It is note validating information the most towards the public;This Quick Response Code of the most different device scans identifies different
Information, can avoid showing or printing on a bill multiple Quick Response Code, improves Quick Response Code and uses just
Profit.
In a preferred embodiment, the first key is the key of stochastic generation, and the first AES is for from having
AES in the range of limit is selected.Such as can be according to the device identification of the second equipment from limited
In the range of AES in select an AES;First key and corresponding AES (i.e. select
The corresponding code name of the AES gone out or numbering), the device identification of the second equipment, this incidence relation is stored in
Encryption algorithm database on server;Second equipment according to the device identification of the second equipment from AES
Data base obtains the first key and corresponding symmetrical decipherment algorithm.I.e. second equipment is according to the second equipment
Device identification obtains the first key and the numbering of the first AES storing correspondence in server, thus obtains
Know the first key and the first AES.
By random secret key and random AES, be conducive to protecting the safety of the second character, especially
It is to obtain the first key and the numbering of the first AES when setting only special equipment could access server
Time, the safety of the second character is greatly improved.
See Fig. 2, in a specific embodiment, have the task equipment of more than 2, then Quick Response Code is raw
One-tenth method includes step:
The second character that second equipment that obtains is corresponding, encrypts the second character by the first encryption method and obtains the
Two encrypted characters (corresponding step S201);
Obtain the 3rd character that the 3rd equipment is corresponding, obtain the by the second encryption method encryption the 3rd character
Three encrypted characters (corresponding step S210);
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even
Connect (corresponding step S202), it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated
Pattern in 2 D code (corresponding step S203);
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment;
If the 3rd device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character, the second encrypted characters and the 3rd encrypted characters connected by the first separator, pass through
Second decryption method deciphering the 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Second encryption method is corresponding with the second decryption method.
3rd equipment and the second equipment are different types of equipment, and the such as the 3rd equipment is to detect for factory
Or for verifying the equipment of product legitimacy, the second equipment is the equipment of detection registration when retail.?
In one specific embodiment it may be that the first character be public number link, the second character be " SPID+
Note number ", the 3rd character is " SPID+note number+bill anti-counterfeit code ";And by above-mentioned two
Dimension code generating method generates pattern in 2 D code.When this pattern in 2 D code of the second device scan, by above-mentioned
Recognition methods, identifies the second character;When the 3rd this pattern in 2 D code of device scan, by above-mentioned knowledge
Other method, identifies the 3rd character.Therefore realize different special equipments, according to identical Quick Response Code
Its content identified is different.
See Fig. 3, in above-mentioned two-dimensional code generation method, after step " acquisition concatenation character ",
Before concatenation character Quick Response Code generating algorithm " is generated pattern in 2 D code " by step, further comprise the steps of:
By concatenation character by the 3rd encryption method encryption (corresponding step S303), by the 3rd encryption
Character after method processes is used for generating pattern in 2 D code as concatenation character.
By the process of the 3rd encryption method, after making can only be encryption by the acquisition of Quick Response Code decryption method
Concatenation character, thereby ensure that the first character safety.
See Fig. 5 and Fig. 4, it is to be appreciated that encryption method can be made up of multiple AES submodules,
Such as step S310 can be encryption method second encryption method 1 concrete by two and the second encryption method
2 are constituted.
Inventor also provides for a kind of Quick Response Code and generates equipment, for generating and printing in technique scheme
Pattern in 2 D code it include printer, processor;
Described processor is for obtaining the first character that the first equipment is corresponding, and obtains the second equipment pair
The second character answered, encrypts the second character by the first encryption method and obtains the second encrypted characters, by first
Character and the second encrypted characters are connected by least one first separator, it is thus achieved that concatenation character, then will
Concatenation character Quick Response Code generating algorithm generates pattern in 2 D code, and the second encryption method is for including the second key
With the second symmetric encipherment algorithm, the first equipment is common apparatus, and the second equipment is special equipment;
Described printer is for printing the Quick Response Code of generation;
In further embodiments, server is also included;Described server is used for storing AES data
Storehouse, key, device identification;After processor obtains the second character that the second equipment is corresponding, select at random
Select the first AES and generate random first key, and by the device identification of the second equipment, the first encryption
Algorithm and the first key associate and are stored in server.
In further embodiments, described microprocessor is additionally operable to obtain the 3rd character that the 3rd equipment is corresponding,
The 3rd encrypted characters is obtained by the second encryption method encryption the 3rd character;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even
Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment.
In further embodiments, described microprocessor is used for, after " acquisition concatenation character ",
Before " concatenation character Quick Response Code generating algorithm being generated pattern in 2 D code ", by concatenation character by the
Four encryption method encryptions, the character after being processed by the 4th encryption method is used for giving birth to as concatenation character
Become pattern in 2 D code.
Inventor also provides for two-dimensional code scanning device, and it is the second equipment described herein or the 3rd equipment,
It has photographic head and microprocessor, and photographic head connects microprocessor;
Photographic head is used for shooting two-dimension code image;
Microprocessor is for deciphering pattern in 2 D code by Quick Response Code decryption method, it is thus achieved that separate by first
First character of symbol connection and the second encrypted characters, decipher the second encrypted characters by first decryption method and obtain
Obtain the second character, and obtain the content that the second character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that by first point
Every the first character, the second encrypted characters and the 3rd encrypted characters that symbol connects, by the second decryption method solution
Close 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that through encryption
Concatenation character, by the concatenation character after the 4th decryption method deciphering encryption, it is thus achieved that the first character, second
The concatenation character that encrypted characters, the 3rd encryption character group become, by the second decryption method deciphering the 3rd encryption
Character obtains the 3rd character, and obtains the content that the 3rd character is corresponding, or is deciphered by first decryption method
Second encrypted characters obtains the second character, and obtains the content that the second character is corresponding.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to
One entity or operation are separated with another entity or operating space, and not necessarily requires or imply
Relation or the order of any this reality is there is between these entities or operation.And, term " includes ",
" comprise " or its any other variant is intended to comprising of nonexcludability, so that include that one is
The process of row key element, method, article or terminal unit not only include those key elements, but also include not
There are other key elements being expressly recited, or also include setting for this process, method, article or terminal
Standby intrinsic key element.In the case of there is no more restriction, by statement " including ... " or " comprising ... "
The key element limited, it is not excluded that in including the process of described key element, method, article or terminal unit
There is also other key element.Additionally, in this article, " being more than ", " being less than ", " exceeding " etc. are interpreted as not
Including this number;More than " ", " below ", " within " etc. be interpreted as including this number.
Those skilled in the art are it should be appreciated that the various embodiments described above can be provided as method, device or meter
Calculation machine program product.These embodiments can use complete hardware embodiment, complete software implementation or knot
The form of the embodiment in terms of conjunction software and hardware.Whole or portion in the method that the various embodiments described above relate to
Can instruct relevant hardware by program step by step to complete, described program can be stored in calculating
In the storage medium that machine equipment can read, all or part of for perform described in the various embodiments described above method
Step.Described computer equipment, includes but not limited to: personal computer, server, general purpose computer,
Special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligence man
Occupy equipment, wearable intelligent equipment, vehicle intelligent equipment etc.;Described storage medium, including but do not limit
In: RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, memory stick,
Webserver storage, network cloud storage etc..
The various embodiments described above are with reference to according to the method described in embodiment, equipment (system) and computer journey
The flow chart of sequence product and/or block diagram describe.It should be understood that stream can be realized by computer program instructions
In each flow process in journey figure and/or block diagram and/or square frame and flow chart and/or block diagram
Flow process and/or the combination of square frame.These computer program instructions can be provided to the processor of computer equipment
To produce a machine so that the instruction performed by the processor of computer equipment is produced for realizing
The function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame
Device.
These computer program instructions may be alternatively stored in the meter that computer equipment can be guided to work in a specific way
Calculate in machine equipment readable memory so that the instruction being stored in this computer equipment readable memory produces
Including the manufacture of command device, this command device realize one flow process of flow chart or multiple flow process and/
Or the function specified in one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded on computer equipment so that holds on a computing device
Row sequence of operations step is to produce computer implemented process, thus the finger performed on a computing device
Order provides for realizing at one flow process of flow chart or multiple flow process and/or one square frame or multiple of block diagram
The step of the function specified in square frame.
Although being described the various embodiments described above, but those skilled in the art once learn
Basic creative concept, then can make other change and amendment to these embodiments, so above institute
Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally
Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use
In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.
Claims (10)
1. Quick Response Code encryption method, it is characterised in that include two-dimensional code generation method, Quick Response Code generation side
Method includes step:
The first character that first equipment that obtains is corresponding, and the second character that second equipment that obtains is corresponding, pass through
First encryption method is encrypted the second character and is obtained the second encrypted characters;
First character and the second encrypted characters are connected by least one first separator, it is thus achieved that connective word
Symbol, then generates pattern in 2 D code by concatenation character Quick Response Code generating algorithm;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment is special equipment.
Quick Response Code encryption method the most according to claim 1, it is characterised in that include that Quick Response Code is known
Other method, two-dimensional code identification method includes step:
If the first device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character and the second encrypted characters connected by the first separator, and it is corresponding to obtain the first character
Content;
If the second device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character and the second encrypted characters connected by the first separator, by first decryption method solution
Close second encrypted characters obtains the second character, and obtains the content that the second character is corresponding;
First decryption method includes the first key and the first symmetrical decipherment algorithm, the first symmetrical decipherment algorithm with
First AES is corresponding;
First equipment is common apparatus, and the second equipment is special equipment.
Quick Response Code encryption method the most according to claim 2, it is characterised in that the first key and right
The AES answered is stored in the encryption algorithm database on server;Second equipment is according to the second equipment
Device identification obtains the first key and corresponding symmetrical decipherment algorithm from encryption algorithm database.
Quick Response Code encryption method the most according to claim 1, it is characterised in that Quick Response Code generation side
Method includes step:
The second character that second equipment that obtains is corresponding, encrypts the second character by the first encryption method and obtains the
Two encrypted characters;
Obtain the 3rd character that the 3rd equipment is corresponding, obtain the by the second encryption method encryption the 3rd character
Three encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even
Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment;
If the 3rd device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method,
Obtain the first character, the second encrypted characters and the 3rd encrypted characters connected by the first separator, pass through
Second decryption method deciphering the 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Second encryption method is corresponding with the second decryption method.
5. according to the arbitrary Quick Response Code encryption method described in claim 1-4, it is characterised in that in step
Suddenly, after " acquisition concatenation character ", " concatenation character Quick Response Code generating algorithm is generated two dimension in step
Code pattern " before, further comprise the steps of:
By concatenation character by the 3rd encryption method encryption, the word after being processed by the 3rd encryption method
Symbol is used for generating pattern in 2 D code as concatenation character.
6. Quick Response Code generates equipment, it is characterised in that it includes printer, processor;
Described processor is for obtaining the first character that the first equipment is corresponding, and it is corresponding to obtain the second equipment
Second character, encrypts the second character by the first encryption method and obtains the second encrypted characters, by the first character
It is connected by least one first separator with the second encrypted characters, it is thus achieved that concatenation character, then will connect
Character Quick Response Code generating algorithm generates pattern in 2 D code, and the second encryption method is for including the second key and the
Two symmetric encipherment algorithms, the first equipment is common apparatus, and the second equipment is special equipment;
Described printer is for printing the Quick Response Code of generation.
Quick Response Code the most according to claim 6 generates equipment, it is characterised in that also include server;
Described server is used for storing encryption algorithm database, key, device identification;Second is obtained at processor
After the second character that equipment is corresponding, randomly choose the first AES and generate random first key, and
The device identification of the second equipment, the first AES and the first key are associated and be stored in server.
Quick Response Code the most according to claim 6 generates equipment, it is characterised in that described microprocessor
It is additionally operable to obtain the 3rd character that the 3rd equipment is corresponding, is obtained by the second encryption method encryption the 3rd character
3rd encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even
Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is processed, generate Quick Response Code figure
Case;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment.
Quick Response Code the most according to claim 6 generates equipment, it is characterised in that described microprocessor
For, after " acquisition concatenation character ", " concatenation character Quick Response Code generating algorithm is being generated two
Dimension code pattern " before, by concatenation character by the 4th encryption method encryption, by the 4th encryption side
Character after method processes is used for generating pattern in 2 D code as concatenation character.
10. two-dimensional code scanning device, it is characterised in that it has photographic head and microprocessor, photographic head
Connect microprocessor;
Photographic head is used for shooting two-dimension code image;
Microprocessor is for deciphering pattern in 2 D code by Quick Response Code decryption method, it is thus achieved that separate by first
First character of symbol connection and the second encrypted characters, decipher the second encrypted characters by first decryption method and obtain
Obtain the second character, and obtain the content that the second character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that by first point
Every the first character, the second encrypted characters and the 3rd encrypted characters that symbol connects, by the second decryption method solution
Close 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that through encryption
Concatenation character, by the concatenation character after the 4th decryption method deciphering encryption, it is thus achieved that the first character, second
The concatenation character that encrypted characters, the 3rd encryption character group become, by the second decryption method deciphering the 3rd encryption
Character obtains the 3rd character, and obtains the content that the 3rd character is corresponding, or is deciphered by first decryption method
Second encrypted characters obtains the second character, and obtains the content that the second character is corresponding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610268496.XA CN105976005A (en) | 2016-04-26 | 2016-04-26 | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610268496.XA CN105976005A (en) | 2016-04-26 | 2016-04-26 | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105976005A true CN105976005A (en) | 2016-09-28 |
Family
ID=56993184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610268496.XA Pending CN105976005A (en) | 2016-04-26 | 2016-04-26 | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105976005A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145809A (en) * | 2017-04-21 | 2017-09-08 | 苏州市公安局 | A kind of material evidence uniqueness initial marking method |
CN107644245A (en) * | 2017-09-21 | 2018-01-30 | 北京卓越盛名科技有限公司 | Three value two-dimensional code generation methods, coding/decoding method and device |
CN108062668A (en) * | 2017-12-15 | 2018-05-22 | 中国银联股份有限公司 | Quick Response Code method of payment and system based on background picture encryption identification |
CN108599931A (en) * | 2018-04-12 | 2018-09-28 | 深圳市易迈数据技术有限公司 | Safe code generating method based on big data and its method of calibration |
CN108960385A (en) * | 2018-06-29 | 2018-12-07 | 苏州酷豆物联科技有限公司 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
CN109460807A (en) * | 2019-01-11 | 2019-03-12 | 中煤航测遥感集团有限公司 | Generation method, recognition methods, generating means and the identification device of two dimensional code |
CN109949048A (en) * | 2019-02-18 | 2019-06-28 | 绍兴市上虞华扬印制有限公司 | A kind of two-dimension code anti-counterfeit mode and system |
CN111062456A (en) * | 2019-12-25 | 2020-04-24 | 李蕴光 | Two-dimensional code encryption algorithm |
CN111178476A (en) * | 2019-11-22 | 2020-05-19 | 万翼科技有限公司 | Two-dimensional code generation and recognition method and device, computer equipment and storage medium |
CN112100206A (en) * | 2020-11-13 | 2020-12-18 | 支付宝(杭州)信息技术有限公司 | Digital label generation method, device, equipment and readable medium |
WO2022228100A1 (en) * | 2021-04-30 | 2022-11-03 | 华为技术有限公司 | Data processing method and related apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101320433A (en) * | 2008-06-20 | 2008-12-10 | 王立国 | Anti-counterfeit method by graded encryption |
CN101320436A (en) * | 2007-05-29 | 2008-12-10 | 电装波动株式会社 | Method for producing two-dimensional code and reader for reading the two-dimensional code |
CN103049777A (en) * | 2012-11-15 | 2013-04-17 | 江苏缨思贝睿物联网科技有限公司 | Security application method for two-dimension code and encoding/decoding system |
CN104616046A (en) * | 2015-02-28 | 2015-05-13 | 立德高科(北京)数码科技有限责任公司 | Two-dimension code and generation method and identification method thereof |
-
2016
- 2016-04-26 CN CN201610268496.XA patent/CN105976005A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101320436A (en) * | 2007-05-29 | 2008-12-10 | 电装波动株式会社 | Method for producing two-dimensional code and reader for reading the two-dimensional code |
CN101320433A (en) * | 2008-06-20 | 2008-12-10 | 王立国 | Anti-counterfeit method by graded encryption |
CN103049777A (en) * | 2012-11-15 | 2013-04-17 | 江苏缨思贝睿物联网科技有限公司 | Security application method for two-dimension code and encoding/decoding system |
CN104616046A (en) * | 2015-02-28 | 2015-05-13 | 立德高科(北京)数码科技有限责任公司 | Two-dimension code and generation method and identification method thereof |
Non-Patent Citations (1)
Title |
---|
王印明等: "《一种基于DES、RSA 的随机加密算法》", 《计算机技术与发展》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107145809A (en) * | 2017-04-21 | 2017-09-08 | 苏州市公安局 | A kind of material evidence uniqueness initial marking method |
CN107644245A (en) * | 2017-09-21 | 2018-01-30 | 北京卓越盛名科技有限公司 | Three value two-dimensional code generation methods, coding/decoding method and device |
CN108062668A (en) * | 2017-12-15 | 2018-05-22 | 中国银联股份有限公司 | Quick Response Code method of payment and system based on background picture encryption identification |
CN108062668B (en) * | 2017-12-15 | 2021-10-26 | 中国银联股份有限公司 | Two-dimensional code payment method and system based on background picture encryption identification |
CN108599931A (en) * | 2018-04-12 | 2018-09-28 | 深圳市易迈数据技术有限公司 | Safe code generating method based on big data and its method of calibration |
CN108960385A (en) * | 2018-06-29 | 2018-12-07 | 苏州酷豆物联科技有限公司 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
CN109460807A (en) * | 2019-01-11 | 2019-03-12 | 中煤航测遥感集团有限公司 | Generation method, recognition methods, generating means and the identification device of two dimensional code |
CN109949048A (en) * | 2019-02-18 | 2019-06-28 | 绍兴市上虞华扬印制有限公司 | A kind of two-dimension code anti-counterfeit mode and system |
CN111178476A (en) * | 2019-11-22 | 2020-05-19 | 万翼科技有限公司 | Two-dimensional code generation and recognition method and device, computer equipment and storage medium |
CN111062456A (en) * | 2019-12-25 | 2020-04-24 | 李蕴光 | Two-dimensional code encryption algorithm |
CN112100206A (en) * | 2020-11-13 | 2020-12-18 | 支付宝(杭州)信息技术有限公司 | Digital label generation method, device, equipment and readable medium |
WO2022228100A1 (en) * | 2021-04-30 | 2022-11-03 | 华为技术有限公司 | Data processing method and related apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105976005A (en) | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device | |
US11361397B2 (en) | Method and apparatus for watermark embedding and extracting | |
CN102916804B (en) | Two-dimension code coding and decoding method and device based on local color verification | |
CN102902997B (en) | A kind of Quick Response Code hybrid coding, decoding device and method | |
CN111919215B (en) | Authentication of packaged products | |
CN105719120B (en) | A method of encryption express delivery list privacy information | |
Jiao et al. | QR code based noise-free optical encryption and decryption of a gray scale image | |
US10749682B2 (en) | Anti-counterfeit method | |
CN111242259B (en) | Intelligent anti-counterfeiting code encoding and decoding method and system | |
CN104766113B (en) | A kind of light and shade code anti-fake label and its method for anti-counterfeit | |
CN106599964A (en) | Two-dimensional code generation and verification method and device | |
CN108537315A (en) | A kind of generation of safe Quick Response Code and authentication method | |
CN107992923A (en) | A kind of QR Quick Response Codes generation and the method read | |
Wang et al. | 2D barcodes for visual cryptography | |
EP2910042B1 (en) | Secure information transfer via bar codes | |
Maske et al. | Image Security Barrier (ISB): Hide valuable information in image using machine learning | |
CN108197685A (en) | The method for anti-counterfeit and terminal of a kind of visual code | |
CN112561015B (en) | Bar code encoding and decoding method, device, system, equipment and medium | |
CN102867260A (en) | Bluetooth-based commodity information identification method and system | |
TWI726326B (en) | Method, device and system for generating and verifying self-protection multidimensional barcode | |
CN108830364B (en) | Dynamic two-dimensional code generation method and system | |
CN112039876A (en) | Data ferrying method, device, equipment and medium | |
CN111783917A (en) | Encrypted two-dimensional code with tracing and anti-counterfeiting functions | |
CN114553549A (en) | Data encryption method and system | |
CN109766703B (en) | Information processing system, method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160928 |
|
WD01 | Invention patent application deemed withdrawn after publication |