[go: up one dir, main page]

CN109886006A - A kind of information source checking method and device based on two dimensional code - Google Patents

A kind of information source checking method and device based on two dimensional code Download PDF

Info

Publication number
CN109886006A
CN109886006A CN201910151335.6A CN201910151335A CN109886006A CN 109886006 A CN109886006 A CN 109886006A CN 201910151335 A CN201910151335 A CN 201910151335A CN 109886006 A CN109886006 A CN 109886006A
Authority
CN
China
Prior art keywords
dimensional code
signing messages
checking method
equipment
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910151335.6A
Other languages
Chinese (zh)
Inventor
沈怡
刘少磊
罗年庆
祝哲海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unitec (jiaxing) Information Technology Co Ltd
Original Assignee
Unitec (jiaxing) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unitec (jiaxing) Information Technology Co Ltd filed Critical Unitec (jiaxing) Information Technology Co Ltd
Priority to CN201910151335.6A priority Critical patent/CN109886006A/en
Publication of CN109886006A publication Critical patent/CN109886006A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

A kind of the information source checking method and device of two dimensional code, method include being encrypted based on the preset data content in signing messages and/or two dimensional code, and be put into two dimensional code and specify in region;Parsing two dimensional code is scanned using equipment for customizing, obtains signing messages, signing messages will be veritified and compared with obtained signing messages is decrypted, obtains veritifying result;It wherein veritifies signing messages to determine based on signing messages, and is stored in equipment for customizing, this method can guarantee the reliability of information source, reinforce veritifying stability.

Description

A kind of information source checking method and device based on two dimensional code
Technical field
The present invention relates to computer application fields, are related to planar bar code technology, and in particular to a kind of information based on two dimensional code Source checking method and device.
Background technique
With the development of society, two dimensional code identification, payment technology fast development, become side important in people's life Formula.Two dimensional code is the chequered with black and white square of the plane distribution with specific set figure according to certain rule in the two-dimensional direction Shape square matrix records the barcode technology of new generation of data symbol information, usually saying by two dimensional code battle array and two dimensional code number and lower section The features such as plaintext word composition, has and contain much information, and error correcting capability is strong, and recognition speed is fast, comprehensive recognition, application field is wide It is general.Meanwhile the safety of two dimensional code is identified as important research direction.
It is currently an information age, the self-protection of data, the safety of data, the veritification stability of data is all It is very important.And we can achieve the purpose that protect data by way of veritifying information source.In the prior art, two-dimentional Code is typically all to reach application effect by way of network request, and mainly in terminal, i.e. URL network is asked for the veritification of information source Seek server end.
Application No. is 201810076205.6 patents of invention to disclose a kind of " two dimensional code generation, storage, knowledge based on SE The method of other and related encryption and decryption ", specific its pass through application program for the initial data comprising more much informations, are sent to SE Safety chip is encrypted and is signed to it by SE safety chip, produces the ciphertext and informative abstract of initial data, then by ciphertext The characteristics of generating two-dimension code image with informative abstract, SE safety chip Information Security be utilized, so that two dimensional code generated Safety with higher, and pass through the storage to two-dimensional code data, it is ensured that the safety of two-dimensional code data.In two dimensional code figure In piece identification process, after application program obtains two-dimensional code data, sends data to SE safety chip and be decrypted and number label Name, is decrypted and is signed to two-dimensional code data by SE safety chip, obtain the original text and informative abstract of two-dimensional code data, is applied Whether the informative abstract for the two-dimensional code data that program is directly acquired by comparison and the informative abstract that SE safety chip returns are consistent, Judge whether two-dimensional code data is tampered, although which ensure that the safety of two dimensional code identification transaction, it passes through SE peace Full chip carries out data transmission and handles as " medium ", low efficiency, and needs to be arranged SE safety chip to realize a variety of function Can, it needs online and at high cost.
Application No. is 201110035336.8 patents of invention to disclose a kind of asymmetric encryption two-dimension code anti-counterfeiting method, Using two dimensional code as carrier, to constitute complete anti-fake, identification system in such a way that private key encryption is combined with public key decryptions.It is anti- Pseudo- step includes that private key encryption and public key identify certification two parts.The private key encryption refers to is recognized by the identification with authentication credential Card center carries out the cleartext information or unique serial number that need in anti-fake product by the way of electronic signature with exclusive private key Encryption, encrypted cipher-text information are converted into two-dimension code pattern and disclose, and appear in needs simultaneously with cleartext information or unique serial number In anti-fake product, then the corresponding decryption public key of the cipher-text information is published and dynamically updates counterfeit serial number blacklist. After the public key identification certification refers to that the public obtains decryption public key, using terminal authentication equipment, directly with public key to two dimensional code figure Shape decryption, and verifying is compared with the open unique information of product, but it is needed with network or other data transfer modes It is sent to other certification terminal devices to be authenticated, be returned again to after authenticated, low efficiency, and for network, server Dependence is very strong, can not achieve offline quickly veritification.
To sum up, for the prior art for network, the dependence of server is very strong, and veritification mode efficiency is lower, and network, clothes Be engaged in device cost it is also relatively high, therefore when working as unstable networks or server and being attacked, the veritification of information source will fail, The safety of data cannot just ensure.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of information source checking method based on two dimensional code And device, it is ensured that the reliability of information source is reinforced veritifying stability.
The present invention provides a kind of information source checking methods of two dimensional code, include the following steps:
It is encrypted based on signing messages, and is put into two dimensional code and specifies in region;
Parsing two dimensional code is scanned using equipment for customizing, obtains signing messages, signing messages will be veritified and decryption is obtained Signing messages compares, and obtains veritifying result;
Wherein veritifying signing messages is to be determined based on signing messages, and be stored in equipment for customizing.
In preferred mode, signing messages forms integration letter after can integrating with other information (such as preset data content) Breath is put into two dimensional code and specifies in region.
In preferred mode, the signing messages has characteristic symbol.
In preferred mode, the characteristic symbol is the title, the industrial and commercial information of object and/or identification image of object.
In preferred mode, the entitled company of object, unit or/or personal name.
In preferred mode, the identification image is the logo of company, unit and/or individual.
In preferred mode, the preset data content includes the addition data being put into two dimensional code.
It is described to be encrypted as asymmetric encryption in preferred mode.
In preferred mode, the process of the asymmetric encryption specially carries out asymmetric encryption just for signing messages, Or asymmetric encryption is being carried out after signing messages is first combined with the preset data content in two dimensional code.
In preferred mode, the decryption is, based on unsymmetrical key, ciphertext data obtains signing messages.
It further include result rendering step in preferred mode, presentation mode is both sides' difference patterns or the tripartite of multiplicity Difference patterns.
The present invention also provides a kind of, and the information source based on two dimensional code veritifies device comprising equipment for customizing, wherein customizing Equipment includes:
Input unit, for receiving two dimensional code;
Analysis unit obtains the data of encryption for parsing two dimensional code containing two dimensional code analysis program;
Decryption part, using the key in equipment for customizing, ciphertext data obtains signing messages;
Comparing section, for comparing signing messages and veritifying signing messages;
Presentation portion, for rendering result.
In preferred mode, the key is unsymmetrical key.
In preferred mode, contain two dimensional code analysis program in the equipment for customizing, key, and it is corresponding with signing messages Veritification signing messages.
Information source checking method and device based on two dimensional code of the invention, may be implemented:
1) it in order to solve the reliability of information source, can be compared by signed data, it was demonstrated that data are strictly by two dimensional code It generates unit or agent authorized generates.
2) to solve the stability that information source is veritified, two dimensional code can be identified, and compare in two dimensional code under off-line state Signature whether it is consistent with the signature in equipment come judging result.Since the process can not need network, it is also not necessary to The cost of network and data is greatly saved in the support of server and database.And the program can guarantee, in two dimensional code In not impaired situation, reach the stability that veritification rate is not less than 99.99%;
3) information source veritifies scheme, and the information source that can be used for locally or remotely is veritified, and the safety of data is reinforced, and improves The stability of veritification.
Detailed description of the invention
Fig. 1 is the flow chart of the information source checking method based on two dimensional code.
Specific embodiment
The following detailed description of specific implementation of the invention, it is necessary to it is indicated herein to be, implement to be only intended to this hair below Bright further explanation, should not be understood as limiting the scope of the invention, and field person skilled in the art is according to above-mentioned Some nonessential modifications and adaptations that summary of the invention makes the present invention, still fall within protection scope of the present invention.
The present invention provides the information source checking method and device of a kind of two dimensional code, the detailed process of method such as Fig. 1 institutes Show.Specifically, the information source checking method of two dimensional code includes the following steps:
Firstly, it is necessary to obtain signing messages, wherein the form of signing messages can be the name of company, entity or individual etc. Word and industrial and commercial information.It is also possible to other characteristic symbols such as company Logo.
Then, it is pre-processed according to the form of signing messages, and is symmetrically or non-symmetrically encrypted, and can be with two dimensional code Interior preset data content, which is integrally formed, integrates information.
For rivest, shamir, adelman, it usually needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair, if encrypted with public-key cryptography to data, only with correspondence Private cipher key could decrypt;If encrypted with private cipher key pair data, only with corresponding public-key cryptography ability Decryption.The characteristics of asymmetric cryptosystem is algorithm intensity complexity, safety dependent on algorithm and key.So guaranteeing its safety Property be ensuring that the safety of key, and Asymmetric encryption is there are two types of key, one of them be it is disclosed, thus may not be used Need to transmit the key of other side as symmetric cryptography, therefore safety is with regard to big very much.RSA Algorithm is most influential at present One of rivest, shamir, adelman.
In carrying out asymmetric encryption procedure, signing messages can directly be carried out asymmetric just for signing messages Encryption, so that the signing messages after asymmetric encryption is obtained, it will be pre- in the signing messages and two dimensional code after this asymmetric encryption Data content is set directly be integrally formed integrating information;It can also the preset data content in signing messages and two dimensional code is first In conjunction with, not encrypted combining information is formd in conjunction with after, and not encrypted combining information is then subjected to asymmetric encryption again, To be equivalent to while the preset data content in signing messages and two dimensional code has been carried out asymmetric encryption, ultimately form in this way It is encrypted to integrate information.It is emphasized that the present invention is based on the asymmetric encryption to signing messages, i.e., essence is pair The asymmetric encryption of identity information itself is verified, to ensure that unique veritification standard of verifying identity information, is verified in this way Accuracy is high, and security level is higher, will not be imitated plagiarism, simultaneously because the information content of the signing messages of verifying is little, tests It is fast to demonstrate,prove speed.
It is specified in region secondly, information will be integrated and be put into two dimensional code, herein it should be mentioned that being put into two for information is integrated It is specifically that will integrate information to be put into the specified region of the two dimensional code generated that dimension code, which is specified in region, is also possible to integrate After information and two dimensional code are combined, embodied in the specified region of two dimensional code.
Again, parsing two dimensional code is scanned by equipment for customizing to be identified, wherein parse in equipment for customizing containing two dimensional code The signing messages of program, key and corresponding company.Herein, it should be noted that equipment for customizing is the shape according to signing messages Formula carries out custom-made, i.e., its identification division having is special, have corresponding with the form of signing messages structure and Corresponding veritification information, i.e. other equipment do not have structure specific in this way and corresponding veritification information, just can not be with this Shen yet The two dimensional code that please be claimed has corresponding relationship, cannot achieve the function of identification, also can not just pass through veritification.
Specifically, equipment for customizing includes:
Input unit, for receiving two dimensional code, reception herein can be scanned, and the modes such as transmission are realized;
Analysis unit obtains the data of encryption, two dimensional code herein for parsing two dimensional code containing two dimensional code analysis program Analysis program is with the program with the form corresponding relationship of signing messages;
Decryption part using the symmetrically or non-symmetrically key in equipment for customizing, ciphertext data, and obtains signature section information, In the case where integrating information, according to integration rules obtain signature section information, herein it is emphasized that unsymmetrical key and What the form that integration rules are all based on signing messages was formed.
Comparing section, for comparing signing messages, the signing messages that the signing messages and equipment for customizing decrypted includes is tool There is uniqueness, i.e., the signing messages that equipment for customizing includes is the signing messages determination based on original acquisition, therefore it is stored In the memory space of equipment for customizing itself, not needing additional network can be realized offline comparison, and it is without network, The safety of data is higher, and should be noted that since the signing messages that equipment for customizing includes is based on original acquisition What signing messages determined, there is unique accurate information, imitated and replicated by other means very much, security level is high.
Presentation portion is specifically in for rendering as a result, presentation mode can be the both sides' difference or tripartite's difference of multiplicity Existing portion can be screen.
In actual application, equipment for customizing can be camera, scanning device, mobile terminal, PC terminal, notebook, Tablet computer etc..
The process of the asymmetric decryption of two dimensional code can obtain signing messages by Data Integration rule;
Signing messages in equipment for customizing is compared with the signing messages decrypted in obtained two dimensional code, passes through customization The uniqueness that the signing messages in signing messages and the obtained two dimensional code of decryption in equipment has, can fast and accurately sentence It is both disconnected whether consistent, i.e., whether meet veritification condition.
Finally, the structure based on judgement, result is presented, if signature comparison is consistent, content is shown;If signature It compares inconsistent, does not show content.
Specifically, during result is presented, can be other various can show two kinds or three kinds state differences Presentation mode, such as two kinds can be " consistent " or " inconsistent ", three kinds can be " consistent ", " inconsistent ", engineering noise.
Whether the present invention unanimously determines according to the signature in the signature and two dimensional code in last equipment for customizing, it is assumed that is directed to The equipment for customizing of A unit exploitation, is modified signature, then the parsing result of the two dimensional code of all A production of units is just with equipment On signature it is inconsistent, then information can not be shown.Assuming that B unit is want to produce two dimensional code with the signature of A unit, but B does not have A Unsymmetrical key, then B unit generate two dimensional code cannot be parsed by equipment institute's barcode scanning of A.If the key that B oneself is generated The two dimensional code for falsely using A signature is generated, then B must possess a full set of two dimensional code rendering technique of A.So if this two dimensional code Rendering technique is underground, then process of the invention will be possible to ensure that the authentic and valid of information source.
The present invention is since all data are all being stored in two dimensional code, and for analysis program also in equipment, the present invention can be Verification procedure is completed under off-line state.
Although for illustrative purposes, it has been described that exemplary embodiments of the present invention, those skilled in the art Member it will be understood that, can be in form and details in the case where the scope and spirit for not departing from invention disclosed in appended claims On the change that carry out various modifications, add and replace etc., and all these changes all should belong to appended claims of the present invention Protection scope, and each step in the claimed each department of product and method, can in any combination Form is combined.Therefore, to disclosed in this invention the description of embodiment be not intended to limit the scope of the invention, But for describing the present invention.Correspondingly, the scope of the present invention is not limited by embodiment of above, but by claim or Its equivalent is defined.

Claims (15)

1. a kind of information source checking method of two dimensional code, which comprises the steps of:
It is encrypted based on signing messages, and is put into two dimensional code and specifies in region;
Parsing two dimensional code is scanned using equipment for customizing, obtains signing messages, signing messages will be veritified and decrypts obtained signature Information compares, and obtains veritifying result;
It wherein veritifies signing messages to determine based on signing messages, and is stored in equipment for customizing.
2. checking method as described in claim 1, it is characterised in that: after the signing messages can be integrated with other information, put Enter two dimensional code to specify in region;Preferably, other information includes the preset data content in two dimensional code.
3. checking method as described in claim 1, it is characterised in that: the signing messages has characteristic symbol.
4. checking method as claimed in claim 3, it is characterised in that: the characteristic symbol includes the title of object, object Industrial and commercial information and/or identification image.
5. checking method as claimed in claim 4, it is characterised in that: the name of the entitled company of object, unit and/or individual Word.
6. checking method as claimed in claim 4, it is characterised in that: the identification image is company, unit and/or individual logo。
7. checking method as claimed in claim 2, it is characterised in that: the other information includes the addition being put into two dimensional code Data.
8. such as the described in any item checking methods of claim 1-7, it is characterised in that: described to be encrypted as asymmetric encryption.
9. checking method as claimed in claim 8, it is characterised in that: the process of the asymmetric encryption, specially just for Signing messages carries out asymmetric encryption, or carries out again after signing messages is first integrated with the preset data content in two dimensional code non- Symmetric cryptography.
10. the checking method as described in claim 1 or 9, it is characterised in that: the decryption is, based on key, ciphertext data obtains Obtain signing messages.
11. checking method as claimed in claim 10, it is characterised in that: the key is unsymmetrical key.
12. the checking method as described in claim 1 or 9, it is characterised in that: further include result rendering step, presentation mode is The both sides' difference patterns or tripartite's difference patterns of multiplicity.
13. a kind of veritification device realized using the described in any item checking methods of the claims 1-12 comprising customization Equipment, which is characterized in that equipment for customizing includes:
Input unit, for receiving two dimensional code;
Analysis unit obtains the data of encryption for parsing two dimensional code containing two dimensional code analysis program;
Decryption part, using the key in equipment for customizing, ciphertext data obtains signing messages;
Comparing section, for comparing signing messages and veritifying signing messages;
Presentation portion, for rendering result.
14. veritifying device as claimed in claim 13, it is characterised in that: the key is unsymmetrical key.
15. veritifying device as claimed in claim 14, it is characterised in that: parse journey containing two dimensional code in the equipment for customizing Sequence, key, and veritification signing messages corresponding with signing messages.
CN201910151335.6A 2019-02-28 2019-02-28 A kind of information source checking method and device based on two dimensional code Pending CN109886006A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910151335.6A CN109886006A (en) 2019-02-28 2019-02-28 A kind of information source checking method and device based on two dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910151335.6A CN109886006A (en) 2019-02-28 2019-02-28 A kind of information source checking method and device based on two dimensional code

Publications (1)

Publication Number Publication Date
CN109886006A true CN109886006A (en) 2019-06-14

Family

ID=66930002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910151335.6A Pending CN109886006A (en) 2019-02-28 2019-02-28 A kind of information source checking method and device based on two dimensional code

Country Status (1)

Country Link
CN (1) CN109886006A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254970A (en) * 2021-06-08 2021-08-13 中教云智数字科技有限公司 Digital teaching material auditing and verifying method
CN115484224A (en) * 2022-09-16 2022-12-16 北京奇艺世纪科技有限公司 Information association method, two-dimensional code generation method, device, electronic equipment and medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281581A (en) * 2007-09-27 2008-10-08 北京数字证书认证中心有限公司 Method for checking whether contents of paper file is distorted or not
CN102622631A (en) * 2012-02-28 2012-08-01 深圳润鸿鑫数码技术有限公司 Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment
CN103559526A (en) * 2013-10-31 2014-02-05 北京天威诚信电子商务服务有限公司 Method and system for generation and verification of two-dimensional code
CN103810457A (en) * 2014-03-12 2014-05-21 河南融信数据有限公司 Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN104008322A (en) * 2014-06-14 2014-08-27 河南融信数据有限公司 Two-dimension code publisher identity authentication method based on reliable digital signature
CN104408502A (en) * 2014-10-22 2015-03-11 全联斯泰克科技有限公司 Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
US20160308680A1 (en) * 2012-10-15 2016-10-20 Ty Lindteigen Certificate Authority Server Protection
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106897761A (en) * 2017-03-06 2017-06-27 山东渔翁信息技术股份有限公司 A kind of two-dimensional code generation method and device
CN109190347A (en) * 2018-08-17 2019-01-11 江苏诺安科技有限公司 A kind of electric endorsement method
CN109302292A (en) * 2018-11-01 2019-02-01 北京冠群信息技术股份有限公司 Inspection of document method, apparatus, electronic equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281581A (en) * 2007-09-27 2008-10-08 北京数字证书认证中心有限公司 Method for checking whether contents of paper file is distorted or not
CN102622631A (en) * 2012-02-28 2012-08-01 深圳润鸿鑫数码技术有限公司 Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment
US20160308680A1 (en) * 2012-10-15 2016-10-20 Ty Lindteigen Certificate Authority Server Protection
CN103559526A (en) * 2013-10-31 2014-02-05 北京天威诚信电子商务服务有限公司 Method and system for generation and verification of two-dimensional code
CN103810457A (en) * 2014-03-12 2014-05-21 河南融信数据有限公司 Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN104008322A (en) * 2014-06-14 2014-08-27 河南融信数据有限公司 Two-dimension code publisher identity authentication method based on reliable digital signature
CN104408502A (en) * 2014-10-22 2015-03-11 全联斯泰克科技有限公司 Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline
CN106897761A (en) * 2017-03-06 2017-06-27 山东渔翁信息技术股份有限公司 A kind of two-dimensional code generation method and device
CN109190347A (en) * 2018-08-17 2019-01-11 江苏诺安科技有限公司 A kind of electric endorsement method
CN109302292A (en) * 2018-11-01 2019-02-01 北京冠群信息技术股份有限公司 Inspection of document method, apparatus, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254970A (en) * 2021-06-08 2021-08-13 中教云智数字科技有限公司 Digital teaching material auditing and verifying method
CN113254970B (en) * 2021-06-08 2024-02-02 中教云智数字科技有限公司 Digital teaching material auditing and verifying method
CN115484224A (en) * 2022-09-16 2022-12-16 北京奇艺世纪科技有限公司 Information association method, two-dimensional code generation method, device, electronic equipment and medium
CN115484224B (en) * 2022-09-16 2023-09-29 北京奇艺世纪科技有限公司 Information association method, two-dimensional code generation method, device, electronic equipment and medium

Similar Documents

Publication Publication Date Title
Wazid et al. Secure authentication scheme for medicine anti-counterfeiting system in IoT environment
CN101300808B (en) Methods and Settings of Security Authentication
CN102932148B (en) Based on the safe two-dimension code anti-counterfeit System and method for of CPK certification
US7961915B2 (en) System and method for authenticated and privacy preserving biometric identification systems
JP4866863B2 (en) Security code generation method and user device
CN108229188B (en) Method for signing file and verifying file by using identification key
CN101547095B (en) Application service management system and management method based on digital certificate
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
JP2018516030A (en) ID management service using blockchain
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
MX2015002929A (en) Method and system for verifying an access request.
JP2003521154A (en) How to issue electronic identification information
CN106341493A (en) Entity rights oriented digitalized electronic contract signing method
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN101060400B (en) Data generating device, data analysis device, control method and data processing system
CN106779705A (en) A kind of dynamic payment method and system
CN101547097B (en) Digital media management system and management method based on digital certificate
CN107229879A (en) Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN113961956B (en) Method, device, equipment and medium for generating and applying labeled network information service
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
CN110380859A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system
CN109886006A (en) A kind of information source checking method and device based on two dimensional code
CN201717885U (en) Code providing equipment and code identification system
CN205015906U (en) Anti -fake verification system of electron certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination