[go: up one dir, main page]

CN105976005A - Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device - Google Patents

Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device Download PDF

Info

Publication number
CN105976005A
CN105976005A CN201610268496.XA CN201610268496A CN105976005A CN 105976005 A CN105976005 A CN 105976005A CN 201610268496 A CN201610268496 A CN 201610268496A CN 105976005 A CN105976005 A CN 105976005A
Authority
CN
China
Prior art keywords
character
equipment
quick response
code
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610268496.XA
Other languages
Chinese (zh)
Inventor
刘飞
林国彬
何爱平
杨平爱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HONGBO CO Ltd
Original Assignee
HONGBO CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HONGBO CO Ltd filed Critical HONGBO CO Ltd
Priority to CN201610268496.XA priority Critical patent/CN105976005A/en
Publication of CN105976005A publication Critical patent/CN105976005A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a two-dimensional code encrypting method, a two-dimensional code generating device and a two-dimensional code scanning device. The invention relates to a two-dimensional code technology, and especially relates to a two-dimensional code identification and encryption technology. The two-dimensional code encrypting method comprises a two-dimensional code generating method which comprises the following steps: getting a first character corresponding to a first device, getting a second character corresponding to a second device, and encrypting the second character through a first encryption method to get a second encrypted character; and connecting the first character and the second encrypted character through at least one first separator to get a connecting character, and generating a two-dimensional code pattern through a two-dimensional code generation algorithm based on the connecting character, wherein the first encryption method includes a first key and a first symmetric encryption algorithm, the first device is a general device, and the second device is a special device. The invention relates to a two-dimensional code technology, and especially relates to a two-dimensional code identification and encryption technology.

Description

Quick Response Code encryption method, Quick Response Code generate equipment and two-dimensional code scanning device
Technical field
The present invention relates to planar bar code technology, know encryption technology particularly to Quick Response Code.
Background technology
Two-dimensional bar code, also referred to as Quick Response Code are to divide in plane by certain rule with certain specific geometric figure The chequered with black and white figure of cloth is in order to record initial data;Can be set by image input device or optoelectronic scanning Standby automatically identification realizes automatically processing of data message.Owing to Quick Response Code can be in both direction horizontal, longitudinal Expressing information simultaneously, therefore can express substantial amounts of information in the least area.
Quick Response Code application in the terminal day by day increases, as a example by the initial data of Quick Response Code is as station address, Initial data i.e. station address is encoded to two-dimension code pattern, and user is by arranging Quick Response Code in the terminal Identification module identifies the web site address information in this two-dimension code pattern, i.e. may have access to this website.Above-mentioned side In case, there is problem below:
First, when the conversion of initial data to two-dimension code pattern uses clear-text way, because of to initial data Do not use any encryption measures, easily cause the leakage of initial data, reduce the safety of data message;
Second, when the conversion of initial data to two-dimension code pattern uses encrypted test mode, only specific people Or equipment has authority and obtains the data of this Quick Response Code, the most often this Quick Response Code is not used to publicity.And A promotional pamphlet or bill are printed on multiple Quick Response Code and the most easily cause confusion.
Summary of the invention
Given below one or more aspect is simplified summarize basic with try hard to provide in terms of this type of Understand.This summarizes the extensive overview of the not all aspect contemplated, and is both not intended to identify all Key or the decisive key element of aspect is the most non-attempts to define the scope in terms of any or all.It is unique Purpose be intended to be given in simplified form some concepts in terms of one or more using as given later more Add the sequence of specific description.
The present invention provides a kind of Quick Response Code encryption method, Quick Response Code to generate equipment and two-dimensional code scanning device solution The certainly information security issue in Quick Response Code.
For achieving the above object, inventor provide a kind of Quick Response Code encryption method, generate including Quick Response Code Method, two-dimensional code generation method includes step:
The first character that first equipment that obtains is corresponding, and the second character that second equipment that obtains is corresponding, pass through First encryption method is encrypted the second character and is obtained the second encrypted characters;
First character and the second encrypted characters are connected by least one first separator, it is thus achieved that connective word Symbol, then generates pattern in 2 D code by concatenation character Quick Response Code generating algorithm;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment is special equipment.
Further, including two-dimensional code identification method, two-dimensional code identification method includes step:
If the first device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character and the second encrypted characters connected by the first separator, and it is corresponding to obtain the first character Content;
If the second device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character and the second encrypted characters connected by the first separator, by first decryption method solution Close second encrypted characters obtains the second character, and obtains the content that the second character is corresponding;
First decryption method includes the first key and the first symmetrical decipherment algorithm, the first symmetrical decipherment algorithm with First AES is corresponding.
First equipment is common apparatus, and the second equipment is special equipment.
Further, the encryption algorithm database that the first key and corresponding AES are stored on server; Second equipment obtains the first key and correspondence according to the device identification of the second equipment from encryption algorithm database Symmetrical decipherment algorithm.
Further, two-dimensional code generation method includes step:
The second character that second equipment that obtains is corresponding, encrypts the second character by the first encryption method and obtains the Two encrypted characters;
Obtain the 3rd character that the 3rd equipment is corresponding, obtain the by the second encryption method encryption the 3rd character Three encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment;
If the 3rd device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character, the second encrypted characters and the 3rd encrypted characters connected by the first separator, pass through Second decryption method deciphering the 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Second encryption method is corresponding with the second decryption method.
Further, after step " acquisition concatenation character ", in step " by concatenation character Quick Response Code Generating algorithm generates pattern in 2 D code " before, further comprise the steps of:
By concatenation character by the 4th encryption method encryption, the word after being processed by the 4th encryption method Symbol is used for generating pattern in 2 D code as concatenation character.
Inventor also provides for a kind of Quick Response Code and generates equipment, and it includes printer, processor;
Described processor is for obtaining the first character that the first equipment is corresponding, and it is corresponding to obtain the second equipment Second character, encrypts the second character by the first encryption method and obtains the second encrypted characters, by the first character It is connected by least one first separator with the second encrypted characters, it is thus achieved that concatenation character, then will connect Character Quick Response Code generating algorithm generates pattern in 2 D code, and the second encryption method is for including the second key and the Two symmetric encipherment algorithms, the first equipment is common apparatus, and the second equipment is special equipment;
Described printer is for printing the Quick Response Code of generation;
Further, server is also included;Described server be used for storing encryption algorithm database, key, Device identification;After processor obtains the second character that the second equipment is corresponding, randomly choose the first encryption Algorithm and random first key of generation, and by the device identification of the second equipment, the first AES and first Key associates and is stored in server.
Further, described microprocessor is additionally operable to obtain the 3rd character that the 3rd equipment is corresponding, by second Encryption method encryption the 3rd character obtains the 3rd encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment.
Further, described microprocessor is used for, after " acquisition concatenation character ", " by connective word Symbol Quick Response Code generating algorithm generates pattern in 2 D code " before, by concatenation character by the 4th encryption method Encryption, the character after being processed by the 4th encryption method is used for generating Quick Response Code figure as concatenation character Case.
Inventor also provides for a kind of two-dimensional code scanning device, and it has photographic head and microprocessor, photographic head Connect microprocessor;
Photographic head is used for shooting two-dimension code image;
Microprocessor is for deciphering pattern in 2 D code by Quick Response Code decryption method, it is thus achieved that separate by first First character of symbol connection and the second encrypted characters, decipher the second encrypted characters by first decryption method and obtain Obtain the second character, and obtain the content that the second character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that by first point Every the first character, the second encrypted characters and the 3rd encrypted characters that symbol connects, by the second decryption method solution Close 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that through encryption Concatenation character, by the concatenation character after the 4th decryption method deciphering encryption, it is thus achieved that the first character, second The concatenation character that encrypted characters, the 3rd encryption character group become, by the second decryption method deciphering the 3rd encryption Character obtains the 3rd character, and obtains the content that the 3rd character is corresponding, or is deciphered by first decryption method Second encrypted characters obtains the second character, and obtains the content that the second character is corresponding.
It is different from prior art, common apparatus such as mobile phone in technique scheme Quick Response Code encryption method, Computer can only identify its first character, and the only second equipment (special equipment) could identify the second word Symbol, thus prevents the general public from knowing the information of the second character, improves the information carried in the second character Safety;Therefore the first character carries the data that user's sensitivity is the highest, and the second character can carry use The data that family sensitivity is high, such as, can be note validating information the most towards the public;The most different sets Standby this Quick Response Code that scans identifies different information, can avoid showing on a bill or printing multiple Quick Response Code, improves the convenience that Quick Response Code uses.
Simultaneously when having multiple special equipment, the 3rd equipment and the second equipment are different types of equipment, Such as the 3rd equipment is for factory's detection or for verifying the equipment of product legitimacy, and the second equipment is to use The equipment of detection registration when retail.In a specific embodiment it may be that the first character is public number Link, the second character is " SPID+note number ", and the 3rd character is " SPID+note number + bill anti-counterfeit code ";And generate pattern in 2 D code by above-mentioned two-dimensional code generation method.When the second equipment is swept When retouching this pattern in 2 D code, by above-mentioned recognition methods, identify the second character;When the 3rd device scan During this pattern in 2 D code, by above-mentioned recognition methods, identify the 3rd character.Therefore realize different Special equipment, is different according to its content identified of identical Quick Response Code.For phase can be addressed before reaching Closing purpose, this one or more aspect is included in and is hereinafter fully described and special in the following claims The feature do not pointed out.The following description and drawings illustrate this one or more in terms of some explanation Property feature.But, these features only indicate in the various modes of the principle that can use various aspect Several, and this description be intended to this type of aspects all and equivalence aspect.
Accompanying drawing explanation
Below with reference to accompanying drawing, disclosed aspect is described, it is provided that accompanying drawing illustrates that and non-limiting institute Disclosed aspect, label sign similar elements similar in accompanying drawing, and wherein:
Fig. 1 is a kind of two-dimensional code generation method 1 described in specific embodiment;
Fig. 2 is a kind of two-dimensional code generation method 2 described in specific embodiment;
Fig. 3 is a kind of two-dimensional code generation method 3 described in specific embodiment;
Fig. 4 is a kind of two-dimensional code generation method 4 described in specific embodiment;
Fig. 5 is a kind of two-dimensional code generation method 5 described in specific embodiment;
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below In conjunction with specific embodiments and coordinate accompanying drawing to be explained in detail.In the following description, elaborate for explanatory purposes Numerous details is to provide the thorough understanding in terms of one or more.It will be evident that Do not have these details can put into practice this type of aspect yet.
See Fig. 1-Fig. 5, the transmission of the arrow representative of data flow in figure, the frame in figure represents processing procedure, Lead-in wire on frame represent this processing procedure numbering (i.e. in figure S101~S310 represent processing module perform step Suddenly);In figure, the first character, the second character, the 3rd character are as input, and Quick Response Code is as output;Permissible Although being understood by S101 with S201 is two different numberings, but its processing procedure is the same. Seeing Fig. 1, inventor provides a kind of Quick Response Code encryption method, and including two-dimensional code generation method, Quick Response Code is raw One-tenth method includes step:
The first character that first equipment that obtains is corresponding, and the second character that second equipment that obtains is corresponding, pass through First encryption method is encrypted the second character and is obtained the second encrypted characters (corresponding diagram 1 step S101);
First character is connected (corresponding step with the second encrypted characters by least one first separator S102);, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code (corresponding step S103);
First encryption method is for including the first key and the first symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment is special equipment.
First character and the second character can be network address, numbering, word, photo etc.;Common apparatus refers to can To scan the equipment of any Quick Response Code, such as mobile phone, there is the computer etc. of photographic head;Special equipment is Above-mentioned Quick Response Code can be scanned and obtain the second encrypted characters, and the equipment to the second encrypted characters deciphering, The second character is obtained, the character identified as this second equipment barcode scanning after second encrypted characters deciphering.Example As being developed for scanning the scanner of above-mentioned Quick Response Code specially.
Separator is used for separating character string and the character of character string or character string.Separator can be to pass through “||”、“." “ && ", " # ", " ", in certain embodiments, to correctly identify separator, also include Correct identification translates character.Such as first character for " 7827423 " and the second encrypted characters is " klsdfjga etwe ", separator be " ", translation character be " ", then the first character and second adds Concatenation character after close Connection operator be " 7827423 klsdfjga etwe ", wherein first " " For separator, second " " for translation character, represent after this character " " make not as separator With.
Quick Response Code generating algorithm of being passed through by connection string in technique scheme generates Quick Response Code, wherein Quick Response Code generating algorithm is that existing plaintext Quick Response Code generates, after i.e. being generated by this Quick Response Code generating algorithm The general two-dimensional code scanning device of Quick Response Code all may recognize that the connection string in two-dimension code image.
Symmetric encipherment algorithm (initial data) just in plain text together with encryption key through special AES After process so that it is become complicated encrypted cipher text;It is characterized in that algorithm is open, amount of calculation is little, encryption is fast Degree is fast, encryption efficiency is high.Such as in computer private network system widely used symmetric encipherment algorithm have DES, IDEA and AES etc..
In a specific embodiment it may be that the first equipment is common apparatus, e.g. arbitrary band is taken the photograph As the mobile phone of the recognizable Quick Response Code of head, the second equipment is special equipment, e.g. issue of lottery side's research and development Scanner, or the mobile phone etc. of scanning software of issue of lottery side's research and development is installed.By the publisher of lottery ticket The link of public number corresponding with the first equipment (general) as the link of the first character, i.e. public number; " SPID+note number " of lottery ticket is as the second character string;Obtain by des encryption the second character string Second encrypted characters string, uses the first key Key1 in ciphering process.Key1 can be acquiescence key, Programming is in the memorizer of the second equipment;Key1 is stored in the server that the second equipment may have access to In.By the first character string and the second encrypted characters by separator " " connect, obtain concatenation character: " the One character string the second encrypted characters string ", and by this concatenation character generate image in 2 D code.
When this image in 2 D code of the first device scan, by Quick Response Code decoding obtain " the first character string the Two encrypted characters strings ", thus obtain the first character string.I.e. obtain the chain of public number corresponding to the first character string Connect.
When this Quick Response Code of the second device scan, the second equipment obtains " the first character by Quick Response Code decoding String the second encrypted characters string ", thus obtain the second encrypted characters string, the second equipment is according to being stored in second Key1 in equipment or decipher the second encrypted characters string according to the Key1 on server, thus obtain second " SPID+note number " that encrypted characters string is corresponding, thus the correct note number identifying lottery ticket. It is understandable that and obtains content corresponding to the second character herein, obtain content corresponding to the 3rd character Statement is interpreted as obtaining word corresponding to character, image etc., and completes directly by word, the desirable of image Connect use word or image, or according to word, the instruction of image, it is thus achieved that other data.Such as second word Symbol is network address, then access this network address, it is thus achieved that corresponding content, the most such as second character is image, then The content obtaining the second character can be to show this image, or identifies the graphical content in this image.
Generally two-dimensional code identification method includes step:
If the first device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character and the second encrypted characters connected by the first separator, and it is corresponding to obtain the first character Content;
If the second device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character and the second encrypted characters connected by the first separator, by first decryption method solution Close second encrypted characters obtains the second character, and obtains the content that the second character is corresponding;
First decryption method includes the first key and the first symmetrical decipherment algorithm, the first symmetrical decipherment algorithm with First AES is corresponding.
First equipment is common apparatus, and the second equipment is special equipment.
Above-mentioned Quick Response Code encryption method is common apparatus such as mobile phone, and computer can only identify its first character, And the only second equipment (special equipment) could identify the second character, thus prevent the general public from knowing The information of two characters, improves the safety of the information carried in the second character;Therefore the first character carries use The data that family sensitivity is the highest, and the second character can carry the data that user's sensitivity is high, the most permissible It is note validating information the most towards the public;This Quick Response Code of the most different device scans identifies different Information, can avoid showing or printing on a bill multiple Quick Response Code, improves Quick Response Code and uses just Profit.
In a preferred embodiment, the first key is the key of stochastic generation, and the first AES is for from having AES in the range of limit is selected.Such as can be according to the device identification of the second equipment from limited In the range of AES in select an AES;First key and corresponding AES (i.e. select The corresponding code name of the AES gone out or numbering), the device identification of the second equipment, this incidence relation is stored in Encryption algorithm database on server;Second equipment according to the device identification of the second equipment from AES Data base obtains the first key and corresponding symmetrical decipherment algorithm.I.e. second equipment is according to the second equipment Device identification obtains the first key and the numbering of the first AES storing correspondence in server, thus obtains Know the first key and the first AES.
By random secret key and random AES, be conducive to protecting the safety of the second character, especially It is to obtain the first key and the numbering of the first AES when setting only special equipment could access server Time, the safety of the second character is greatly improved.
See Fig. 2, in a specific embodiment, have the task equipment of more than 2, then Quick Response Code is raw One-tenth method includes step:
The second character that second equipment that obtains is corresponding, encrypts the second character by the first encryption method and obtains the Two encrypted characters (corresponding step S201);
Obtain the 3rd character that the 3rd equipment is corresponding, obtain the by the second encryption method encryption the 3rd character Three encrypted characters (corresponding step S210);
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even Connect (corresponding step S202), it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated Pattern in 2 D code (corresponding step S203);
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment;
If the 3rd device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character, the second encrypted characters and the 3rd encrypted characters connected by the first separator, pass through Second decryption method deciphering the 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Second encryption method is corresponding with the second decryption method.
3rd equipment and the second equipment are different types of equipment, and the such as the 3rd equipment is to detect for factory Or for verifying the equipment of product legitimacy, the second equipment is the equipment of detection registration when retail.? In one specific embodiment it may be that the first character be public number link, the second character be " SPID+ Note number ", the 3rd character is " SPID+note number+bill anti-counterfeit code ";And by above-mentioned two Dimension code generating method generates pattern in 2 D code.When this pattern in 2 D code of the second device scan, by above-mentioned Recognition methods, identifies the second character;When the 3rd this pattern in 2 D code of device scan, by above-mentioned knowledge Other method, identifies the 3rd character.Therefore realize different special equipments, according to identical Quick Response Code Its content identified is different.
See Fig. 3, in above-mentioned two-dimensional code generation method, after step " acquisition concatenation character ", Before concatenation character Quick Response Code generating algorithm " is generated pattern in 2 D code " by step, further comprise the steps of:
By concatenation character by the 3rd encryption method encryption (corresponding step S303), by the 3rd encryption Character after method processes is used for generating pattern in 2 D code as concatenation character.
By the process of the 3rd encryption method, after making can only be encryption by the acquisition of Quick Response Code decryption method Concatenation character, thereby ensure that the first character safety.
See Fig. 5 and Fig. 4, it is to be appreciated that encryption method can be made up of multiple AES submodules, Such as step S310 can be encryption method second encryption method 1 concrete by two and the second encryption method 2 are constituted.
Inventor also provides for a kind of Quick Response Code and generates equipment, for generating and printing in technique scheme Pattern in 2 D code it include printer, processor;
Described processor is for obtaining the first character that the first equipment is corresponding, and obtains the second equipment pair The second character answered, encrypts the second character by the first encryption method and obtains the second encrypted characters, by first Character and the second encrypted characters are connected by least one first separator, it is thus achieved that concatenation character, then will Concatenation character Quick Response Code generating algorithm generates pattern in 2 D code, and the second encryption method is for including the second key With the second symmetric encipherment algorithm, the first equipment is common apparatus, and the second equipment is special equipment;
Described printer is for printing the Quick Response Code of generation;
In further embodiments, server is also included;Described server is used for storing AES data Storehouse, key, device identification;After processor obtains the second character that the second equipment is corresponding, select at random Select the first AES and generate random first key, and by the device identification of the second equipment, the first encryption Algorithm and the first key associate and are stored in server.
In further embodiments, described microprocessor is additionally operable to obtain the 3rd character that the 3rd equipment is corresponding, The 3rd encrypted characters is obtained by the second encryption method encryption the 3rd character;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment.
In further embodiments, described microprocessor is used for, after " acquisition concatenation character ", Before " concatenation character Quick Response Code generating algorithm being generated pattern in 2 D code ", by concatenation character by the Four encryption method encryptions, the character after being processed by the 4th encryption method is used for giving birth to as concatenation character Become pattern in 2 D code.
Inventor also provides for two-dimensional code scanning device, and it is the second equipment described herein or the 3rd equipment, It has photographic head and microprocessor, and photographic head connects microprocessor;
Photographic head is used for shooting two-dimension code image;
Microprocessor is for deciphering pattern in 2 D code by Quick Response Code decryption method, it is thus achieved that separate by first First character of symbol connection and the second encrypted characters, decipher the second encrypted characters by first decryption method and obtain Obtain the second character, and obtain the content that the second character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that by first point Every the first character, the second encrypted characters and the 3rd encrypted characters that symbol connects, by the second decryption method solution Close 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that through encryption Concatenation character, by the concatenation character after the 4th decryption method deciphering encryption, it is thus achieved that the first character, second The concatenation character that encrypted characters, the 3rd encryption character group become, by the second decryption method deciphering the 3rd encryption Character obtains the 3rd character, and obtains the content that the 3rd character is corresponding, or is deciphered by first decryption method Second encrypted characters obtains the second character, and obtains the content that the second character is corresponding.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to One entity or operation are separated with another entity or operating space, and not necessarily requires or imply Relation or the order of any this reality is there is between these entities or operation.And, term " includes ", " comprise " or its any other variant is intended to comprising of nonexcludability, so that include that one is The process of row key element, method, article or terminal unit not only include those key elements, but also include not There are other key elements being expressly recited, or also include setting for this process, method, article or terminal Standby intrinsic key element.In the case of there is no more restriction, by statement " including ... " or " comprising ... " The key element limited, it is not excluded that in including the process of described key element, method, article or terminal unit There is also other key element.Additionally, in this article, " being more than ", " being less than ", " exceeding " etc. are interpreted as not Including this number;More than " ", " below ", " within " etc. be interpreted as including this number.
Those skilled in the art are it should be appreciated that the various embodiments described above can be provided as method, device or meter Calculation machine program product.These embodiments can use complete hardware embodiment, complete software implementation or knot The form of the embodiment in terms of conjunction software and hardware.Whole or portion in the method that the various embodiments described above relate to Can instruct relevant hardware by program step by step to complete, described program can be stored in calculating In the storage medium that machine equipment can read, all or part of for perform described in the various embodiments described above method Step.Described computer equipment, includes but not limited to: personal computer, server, general purpose computer, Special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligence man Occupy equipment, wearable intelligent equipment, vehicle intelligent equipment etc.;Described storage medium, including but do not limit In: RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, memory stick, Webserver storage, network cloud storage etc..
The various embodiments described above are with reference to according to the method described in embodiment, equipment (system) and computer journey The flow chart of sequence product and/or block diagram describe.It should be understood that stream can be realized by computer program instructions In each flow process in journey figure and/or block diagram and/or square frame and flow chart and/or block diagram Flow process and/or the combination of square frame.These computer program instructions can be provided to the processor of computer equipment To produce a machine so that the instruction performed by the processor of computer equipment is produced for realizing The function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame Device.
These computer program instructions may be alternatively stored in the meter that computer equipment can be guided to work in a specific way Calculate in machine equipment readable memory so that the instruction being stored in this computer equipment readable memory produces Including the manufacture of command device, this command device realize one flow process of flow chart or multiple flow process and/ Or the function specified in one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded on computer equipment so that holds on a computing device Row sequence of operations step is to produce computer implemented process, thus the finger performed on a computing device Order provides for realizing at one flow process of flow chart or multiple flow process and/or one square frame or multiple of block diagram The step of the function specified in square frame.
Although being described the various embodiments described above, but those skilled in the art once learn Basic creative concept, then can make other change and amendment to these embodiments, so above institute Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.

Claims (10)

1. Quick Response Code encryption method, it is characterised in that include two-dimensional code generation method, Quick Response Code generation side Method includes step:
The first character that first equipment that obtains is corresponding, and the second character that second equipment that obtains is corresponding, pass through First encryption method is encrypted the second character and is obtained the second encrypted characters;
First character and the second encrypted characters are connected by least one first separator, it is thus achieved that connective word Symbol, then generates pattern in 2 D code by concatenation character Quick Response Code generating algorithm;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment is special equipment.
Quick Response Code encryption method the most according to claim 1, it is characterised in that include that Quick Response Code is known Other method, two-dimensional code identification method includes step:
If the first device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character and the second encrypted characters connected by the first separator, and it is corresponding to obtain the first character Content;
If the second device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character and the second encrypted characters connected by the first separator, by first decryption method solution Close second encrypted characters obtains the second character, and obtains the content that the second character is corresponding;
First decryption method includes the first key and the first symmetrical decipherment algorithm, the first symmetrical decipherment algorithm with First AES is corresponding;
First equipment is common apparatus, and the second equipment is special equipment.
Quick Response Code encryption method the most according to claim 2, it is characterised in that the first key and right The AES answered is stored in the encryption algorithm database on server;Second equipment is according to the second equipment Device identification obtains the first key and corresponding symmetrical decipherment algorithm from encryption algorithm database.
Quick Response Code encryption method the most according to claim 1, it is characterised in that Quick Response Code generation side Method includes step:
The second character that second equipment that obtains is corresponding, encrypts the second character by the first encryption method and obtains the Two encrypted characters;
Obtain the 3rd character that the 3rd equipment is corresponding, obtain the by the second encryption method encryption the 3rd character Three encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is generated pattern in 2 D code;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment;
If the 3rd device scan pattern in 2 D code, then decipher pattern in 2 D code by Quick Response Code decryption method, Obtain the first character, the second encrypted characters and the 3rd encrypted characters connected by the first separator, pass through Second decryption method deciphering the 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Second encryption method is corresponding with the second decryption method.
5. according to the arbitrary Quick Response Code encryption method described in claim 1-4, it is characterised in that in step Suddenly, after " acquisition concatenation character ", " concatenation character Quick Response Code generating algorithm is generated two dimension in step Code pattern " before, further comprise the steps of:
By concatenation character by the 3rd encryption method encryption, the word after being processed by the 3rd encryption method Symbol is used for generating pattern in 2 D code as concatenation character.
6. Quick Response Code generates equipment, it is characterised in that it includes printer, processor;
Described processor is for obtaining the first character that the first equipment is corresponding, and it is corresponding to obtain the second equipment Second character, encrypts the second character by the first encryption method and obtains the second encrypted characters, by the first character It is connected by least one first separator with the second encrypted characters, it is thus achieved that concatenation character, then will connect Character Quick Response Code generating algorithm generates pattern in 2 D code, and the second encryption method is for including the second key and the Two symmetric encipherment algorithms, the first equipment is common apparatus, and the second equipment is special equipment;
Described printer is for printing the Quick Response Code of generation.
Quick Response Code the most according to claim 6 generates equipment, it is characterised in that also include server; Described server is used for storing encryption algorithm database, key, device identification;Second is obtained at processor After the second character that equipment is corresponding, randomly choose the first AES and generate random first key, and The device identification of the second equipment, the first AES and the first key are associated and be stored in server.
Quick Response Code the most according to claim 6 generates equipment, it is characterised in that described microprocessor It is additionally operable to obtain the 3rd character that the 3rd equipment is corresponding, is obtained by the second encryption method encryption the 3rd character 3rd encrypted characters;
By the first character, the second encrypted characters, the 3rd encrypted characters by least one first separator even Connect, it is thus achieved that concatenation character, then concatenation character Quick Response Code generating algorithm is processed, generate Quick Response Code figure Case;
First encryption method is for including the first key and the first symmetric encipherment algorithm;
Second encryption method is for including the second key and the second symmetric encipherment algorithm;
First equipment is common apparatus, and the second equipment and the 3rd equipment are special equipment.
Quick Response Code the most according to claim 6 generates equipment, it is characterised in that described microprocessor For, after " acquisition concatenation character ", " concatenation character Quick Response Code generating algorithm is being generated two Dimension code pattern " before, by concatenation character by the 4th encryption method encryption, by the 4th encryption side Character after method processes is used for generating pattern in 2 D code as concatenation character.
10. two-dimensional code scanning device, it is characterised in that it has photographic head and microprocessor, photographic head Connect microprocessor;
Photographic head is used for shooting two-dimension code image;
Microprocessor is for deciphering pattern in 2 D code by Quick Response Code decryption method, it is thus achieved that separate by first First character of symbol connection and the second encrypted characters, decipher the second encrypted characters by first decryption method and obtain Obtain the second character, and obtain the content that the second character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that by first point Every the first character, the second encrypted characters and the 3rd encrypted characters that symbol connects, by the second decryption method solution Close 3rd encrypted characters obtains the 3rd character, and obtains the content that the 3rd character is corresponding;
Microprocessor or for by Quick Response Code decryption method decipher pattern in 2 D code, it is thus achieved that through encryption Concatenation character, by the concatenation character after the 4th decryption method deciphering encryption, it is thus achieved that the first character, second The concatenation character that encrypted characters, the 3rd encryption character group become, by the second decryption method deciphering the 3rd encryption Character obtains the 3rd character, and obtains the content that the 3rd character is corresponding, or is deciphered by first decryption method Second encrypted characters obtains the second character, and obtains the content that the second character is corresponding.
CN201610268496.XA 2016-04-26 2016-04-26 Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device Pending CN105976005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610268496.XA CN105976005A (en) 2016-04-26 2016-04-26 Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610268496.XA CN105976005A (en) 2016-04-26 2016-04-26 Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device

Publications (1)

Publication Number Publication Date
CN105976005A true CN105976005A (en) 2016-09-28

Family

ID=56993184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610268496.XA Pending CN105976005A (en) 2016-04-26 2016-04-26 Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device

Country Status (1)

Country Link
CN (1) CN105976005A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145809A (en) * 2017-04-21 2017-09-08 苏州市公安局 A kind of material evidence uniqueness initial marking method
CN107644245A (en) * 2017-09-21 2018-01-30 北京卓越盛名科技有限公司 Three value two-dimensional code generation methods, coding/decoding method and device
CN108062668A (en) * 2017-12-15 2018-05-22 中国银联股份有限公司 Quick Response Code method of payment and system based on background picture encryption identification
CN108599931A (en) * 2018-04-12 2018-09-28 深圳市易迈数据技术有限公司 Safe code generating method based on big data and its method of calibration
CN108960385A (en) * 2018-06-29 2018-12-07 苏州酷豆物联科技有限公司 Two dimensional code generation and verification method and system based on the encryption of multiple code key
CN109460807A (en) * 2019-01-11 2019-03-12 中煤航测遥感集团有限公司 Generation method, recognition methods, generating means and the identification device of two dimensional code
CN109949048A (en) * 2019-02-18 2019-06-28 绍兴市上虞华扬印制有限公司 A kind of two-dimension code anti-counterfeit mode and system
CN111062456A (en) * 2019-12-25 2020-04-24 李蕴光 Two-dimensional code encryption algorithm
CN111178476A (en) * 2019-11-22 2020-05-19 万翼科技有限公司 Two-dimensional code generation and recognition method and device, computer equipment and storage medium
CN112100206A (en) * 2020-11-13 2020-12-18 支付宝(杭州)信息技术有限公司 Digital label generation method, device, equipment and readable medium
WO2022228100A1 (en) * 2021-04-30 2022-11-03 华为技术有限公司 Data processing method and related apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320433A (en) * 2008-06-20 2008-12-10 王立国 Anti-counterfeit method by graded encryption
CN101320436A (en) * 2007-05-29 2008-12-10 电装波动株式会社 Method for producing two-dimensional code and reader for reading the two-dimensional code
CN103049777A (en) * 2012-11-15 2013-04-17 江苏缨思贝睿物联网科技有限公司 Security application method for two-dimension code and encoding/decoding system
CN104616046A (en) * 2015-02-28 2015-05-13 立德高科(北京)数码科技有限责任公司 Two-dimension code and generation method and identification method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320436A (en) * 2007-05-29 2008-12-10 电装波动株式会社 Method for producing two-dimensional code and reader for reading the two-dimensional code
CN101320433A (en) * 2008-06-20 2008-12-10 王立国 Anti-counterfeit method by graded encryption
CN103049777A (en) * 2012-11-15 2013-04-17 江苏缨思贝睿物联网科技有限公司 Security application method for two-dimension code and encoding/decoding system
CN104616046A (en) * 2015-02-28 2015-05-13 立德高科(北京)数码科技有限责任公司 Two-dimension code and generation method and identification method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王印明等: "《一种基于DES、RSA 的随机加密算法》", 《计算机技术与发展》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145809A (en) * 2017-04-21 2017-09-08 苏州市公安局 A kind of material evidence uniqueness initial marking method
CN107644245A (en) * 2017-09-21 2018-01-30 北京卓越盛名科技有限公司 Three value two-dimensional code generation methods, coding/decoding method and device
CN108062668A (en) * 2017-12-15 2018-05-22 中国银联股份有限公司 Quick Response Code method of payment and system based on background picture encryption identification
CN108062668B (en) * 2017-12-15 2021-10-26 中国银联股份有限公司 Two-dimensional code payment method and system based on background picture encryption identification
CN108599931A (en) * 2018-04-12 2018-09-28 深圳市易迈数据技术有限公司 Safe code generating method based on big data and its method of calibration
CN108960385A (en) * 2018-06-29 2018-12-07 苏州酷豆物联科技有限公司 Two dimensional code generation and verification method and system based on the encryption of multiple code key
CN109460807A (en) * 2019-01-11 2019-03-12 中煤航测遥感集团有限公司 Generation method, recognition methods, generating means and the identification device of two dimensional code
CN109949048A (en) * 2019-02-18 2019-06-28 绍兴市上虞华扬印制有限公司 A kind of two-dimension code anti-counterfeit mode and system
CN111178476A (en) * 2019-11-22 2020-05-19 万翼科技有限公司 Two-dimensional code generation and recognition method and device, computer equipment and storage medium
CN111062456A (en) * 2019-12-25 2020-04-24 李蕴光 Two-dimensional code encryption algorithm
CN112100206A (en) * 2020-11-13 2020-12-18 支付宝(杭州)信息技术有限公司 Digital label generation method, device, equipment and readable medium
WO2022228100A1 (en) * 2021-04-30 2022-11-03 华为技术有限公司 Data processing method and related apparatus

Similar Documents

Publication Publication Date Title
CN105976005A (en) Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
US11361397B2 (en) Method and apparatus for watermark embedding and extracting
CN102916804B (en) Two-dimension code coding and decoding method and device based on local color verification
CN102902997B (en) A kind of Quick Response Code hybrid coding, decoding device and method
CN111919215B (en) Authentication of packaged products
CN105719120B (en) A method of encryption express delivery list privacy information
Jiao et al. QR code based noise-free optical encryption and decryption of a gray scale image
US10749682B2 (en) Anti-counterfeit method
CN111242259B (en) Intelligent anti-counterfeiting code encoding and decoding method and system
CN104766113B (en) A kind of light and shade code anti-fake label and its method for anti-counterfeit
CN106599964A (en) Two-dimensional code generation and verification method and device
CN108537315A (en) A kind of generation of safe Quick Response Code and authentication method
CN107992923A (en) A kind of QR Quick Response Codes generation and the method read
Wang et al. 2D barcodes for visual cryptography
EP2910042B1 (en) Secure information transfer via bar codes
Maske et al. Image Security Barrier (ISB): Hide valuable information in image using machine learning
CN108197685A (en) The method for anti-counterfeit and terminal of a kind of visual code
CN112561015B (en) Bar code encoding and decoding method, device, system, equipment and medium
CN102867260A (en) Bluetooth-based commodity information identification method and system
TWI726326B (en) Method, device and system for generating and verifying self-protection multidimensional barcode
CN108830364B (en) Dynamic two-dimensional code generation method and system
CN112039876A (en) Data ferrying method, device, equipment and medium
CN111783917A (en) Encrypted two-dimensional code with tracing and anti-counterfeiting functions
CN114553549A (en) Data encryption method and system
CN109766703B (en) Information processing system, method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160928

WD01 Invention patent application deemed withdrawn after publication