CN109886006A - A kind of information source checking method and device based on two dimensional code - Google Patents
A kind of information source checking method and device based on two dimensional code Download PDFInfo
- Publication number
- CN109886006A CN109886006A CN201910151335.6A CN201910151335A CN109886006A CN 109886006 A CN109886006 A CN 109886006A CN 201910151335 A CN201910151335 A CN 201910151335A CN 109886006 A CN109886006 A CN 109886006A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- signing messages
- checking method
- equipment
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000009877 rendering Methods 0.000 claims description 7
- 238000004458 analytical method Methods 0.000 claims description 3
- 230000010354 integration Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
A kind of the information source checking method and device of two dimensional code, method include being encrypted based on the preset data content in signing messages and/or two dimensional code, and be put into two dimensional code and specify in region;Parsing two dimensional code is scanned using equipment for customizing, obtains signing messages, signing messages will be veritified and compared with obtained signing messages is decrypted, obtains veritifying result;It wherein veritifies signing messages to determine based on signing messages, and is stored in equipment for customizing, this method can guarantee the reliability of information source, reinforce veritifying stability.
Description
Technical field
The present invention relates to computer application fields, are related to planar bar code technology, and in particular to a kind of information based on two dimensional code
Source checking method and device.
Background technique
With the development of society, two dimensional code identification, payment technology fast development, become side important in people's life
Formula.Two dimensional code is the chequered with black and white square of the plane distribution with specific set figure according to certain rule in the two-dimensional direction
Shape square matrix records the barcode technology of new generation of data symbol information, usually saying by two dimensional code battle array and two dimensional code number and lower section
The features such as plaintext word composition, has and contain much information, and error correcting capability is strong, and recognition speed is fast, comprehensive recognition, application field is wide
It is general.Meanwhile the safety of two dimensional code is identified as important research direction.
It is currently an information age, the self-protection of data, the safety of data, the veritification stability of data is all
It is very important.And we can achieve the purpose that protect data by way of veritifying information source.In the prior art, two-dimentional
Code is typically all to reach application effect by way of network request, and mainly in terminal, i.e. URL network is asked for the veritification of information source
Seek server end.
Application No. is 201810076205.6 patents of invention to disclose a kind of " two dimensional code generation, storage, knowledge based on SE
The method of other and related encryption and decryption ", specific its pass through application program for the initial data comprising more much informations, are sent to SE
Safety chip is encrypted and is signed to it by SE safety chip, produces the ciphertext and informative abstract of initial data, then by ciphertext
The characteristics of generating two-dimension code image with informative abstract, SE safety chip Information Security be utilized, so that two dimensional code generated
Safety with higher, and pass through the storage to two-dimensional code data, it is ensured that the safety of two-dimensional code data.In two dimensional code figure
In piece identification process, after application program obtains two-dimensional code data, sends data to SE safety chip and be decrypted and number label
Name, is decrypted and is signed to two-dimensional code data by SE safety chip, obtain the original text and informative abstract of two-dimensional code data, is applied
Whether the informative abstract for the two-dimensional code data that program is directly acquired by comparison and the informative abstract that SE safety chip returns are consistent,
Judge whether two-dimensional code data is tampered, although which ensure that the safety of two dimensional code identification transaction, it passes through SE peace
Full chip carries out data transmission and handles as " medium ", low efficiency, and needs to be arranged SE safety chip to realize a variety of function
Can, it needs online and at high cost.
Application No. is 201110035336.8 patents of invention to disclose a kind of asymmetric encryption two-dimension code anti-counterfeiting method,
Using two dimensional code as carrier, to constitute complete anti-fake, identification system in such a way that private key encryption is combined with public key decryptions.It is anti-
Pseudo- step includes that private key encryption and public key identify certification two parts.The private key encryption refers to is recognized by the identification with authentication credential
Card center carries out the cleartext information or unique serial number that need in anti-fake product by the way of electronic signature with exclusive private key
Encryption, encrypted cipher-text information are converted into two-dimension code pattern and disclose, and appear in needs simultaneously with cleartext information or unique serial number
In anti-fake product, then the corresponding decryption public key of the cipher-text information is published and dynamically updates counterfeit serial number blacklist.
After the public key identification certification refers to that the public obtains decryption public key, using terminal authentication equipment, directly with public key to two dimensional code figure
Shape decryption, and verifying is compared with the open unique information of product, but it is needed with network or other data transfer modes
It is sent to other certification terminal devices to be authenticated, be returned again to after authenticated, low efficiency, and for network, server
Dependence is very strong, can not achieve offline quickly veritification.
To sum up, for the prior art for network, the dependence of server is very strong, and veritification mode efficiency is lower, and network, clothes
Be engaged in device cost it is also relatively high, therefore when working as unstable networks or server and being attacked, the veritification of information source will fail,
The safety of data cannot just ensure.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of information source checking method based on two dimensional code
And device, it is ensured that the reliability of information source is reinforced veritifying stability.
The present invention provides a kind of information source checking methods of two dimensional code, include the following steps:
It is encrypted based on signing messages, and is put into two dimensional code and specifies in region;
Parsing two dimensional code is scanned using equipment for customizing, obtains signing messages, signing messages will be veritified and decryption is obtained
Signing messages compares, and obtains veritifying result;
Wherein veritifying signing messages is to be determined based on signing messages, and be stored in equipment for customizing.
In preferred mode, signing messages forms integration letter after can integrating with other information (such as preset data content)
Breath is put into two dimensional code and specifies in region.
In preferred mode, the signing messages has characteristic symbol.
In preferred mode, the characteristic symbol is the title, the industrial and commercial information of object and/or identification image of object.
In preferred mode, the entitled company of object, unit or/or personal name.
In preferred mode, the identification image is the logo of company, unit and/or individual.
In preferred mode, the preset data content includes the addition data being put into two dimensional code.
It is described to be encrypted as asymmetric encryption in preferred mode.
In preferred mode, the process of the asymmetric encryption specially carries out asymmetric encryption just for signing messages,
Or asymmetric encryption is being carried out after signing messages is first combined with the preset data content in two dimensional code.
In preferred mode, the decryption is, based on unsymmetrical key, ciphertext data obtains signing messages.
It further include result rendering step in preferred mode, presentation mode is both sides' difference patterns or the tripartite of multiplicity
Difference patterns.
The present invention also provides a kind of, and the information source based on two dimensional code veritifies device comprising equipment for customizing, wherein customizing
Equipment includes:
Input unit, for receiving two dimensional code;
Analysis unit obtains the data of encryption for parsing two dimensional code containing two dimensional code analysis program;
Decryption part, using the key in equipment for customizing, ciphertext data obtains signing messages;
Comparing section, for comparing signing messages and veritifying signing messages;
Presentation portion, for rendering result.
In preferred mode, the key is unsymmetrical key.
In preferred mode, contain two dimensional code analysis program in the equipment for customizing, key, and it is corresponding with signing messages
Veritification signing messages.
Information source checking method and device based on two dimensional code of the invention, may be implemented:
1) it in order to solve the reliability of information source, can be compared by signed data, it was demonstrated that data are strictly by two dimensional code
It generates unit or agent authorized generates.
2) to solve the stability that information source is veritified, two dimensional code can be identified, and compare in two dimensional code under off-line state
Signature whether it is consistent with the signature in equipment come judging result.Since the process can not need network, it is also not necessary to
The cost of network and data is greatly saved in the support of server and database.And the program can guarantee, in two dimensional code
In not impaired situation, reach the stability that veritification rate is not less than 99.99%;
3) information source veritifies scheme, and the information source that can be used for locally or remotely is veritified, and the safety of data is reinforced, and improves
The stability of veritification.
Detailed description of the invention
Fig. 1 is the flow chart of the information source checking method based on two dimensional code.
Specific embodiment
The following detailed description of specific implementation of the invention, it is necessary to it is indicated herein to be, implement to be only intended to this hair below
Bright further explanation, should not be understood as limiting the scope of the invention, and field person skilled in the art is according to above-mentioned
Some nonessential modifications and adaptations that summary of the invention makes the present invention, still fall within protection scope of the present invention.
The present invention provides the information source checking method and device of a kind of two dimensional code, the detailed process of method such as Fig. 1 institutes
Show.Specifically, the information source checking method of two dimensional code includes the following steps:
Firstly, it is necessary to obtain signing messages, wherein the form of signing messages can be the name of company, entity or individual etc.
Word and industrial and commercial information.It is also possible to other characteristic symbols such as company Logo.
Then, it is pre-processed according to the form of signing messages, and is symmetrically or non-symmetrically encrypted, and can be with two dimensional code
Interior preset data content, which is integrally formed, integrates information.
For rivest, shamir, adelman, it usually needs two keys: public-key cryptography (publickey) and private cipher key
(privatekey).Public-key cryptography and private cipher key are a pair, if encrypted with public-key cryptography to data, only with correspondence
Private cipher key could decrypt;If encrypted with private cipher key pair data, only with corresponding public-key cryptography ability
Decryption.The characteristics of asymmetric cryptosystem is algorithm intensity complexity, safety dependent on algorithm and key.So guaranteeing its safety
Property be ensuring that the safety of key, and Asymmetric encryption is there are two types of key, one of them be it is disclosed, thus may not be used
Need to transmit the key of other side as symmetric cryptography, therefore safety is with regard to big very much.RSA Algorithm is most influential at present
One of rivest, shamir, adelman.
In carrying out asymmetric encryption procedure, signing messages can directly be carried out asymmetric just for signing messages
Encryption, so that the signing messages after asymmetric encryption is obtained, it will be pre- in the signing messages and two dimensional code after this asymmetric encryption
Data content is set directly be integrally formed integrating information;It can also the preset data content in signing messages and two dimensional code is first
In conjunction with, not encrypted combining information is formd in conjunction with after, and not encrypted combining information is then subjected to asymmetric encryption again,
To be equivalent to while the preset data content in signing messages and two dimensional code has been carried out asymmetric encryption, ultimately form in this way
It is encrypted to integrate information.It is emphasized that the present invention is based on the asymmetric encryption to signing messages, i.e., essence is pair
The asymmetric encryption of identity information itself is verified, to ensure that unique veritification standard of verifying identity information, is verified in this way
Accuracy is high, and security level is higher, will not be imitated plagiarism, simultaneously because the information content of the signing messages of verifying is little, tests
It is fast to demonstrate,prove speed.
It is specified in region secondly, information will be integrated and be put into two dimensional code, herein it should be mentioned that being put into two for information is integrated
It is specifically that will integrate information to be put into the specified region of the two dimensional code generated that dimension code, which is specified in region, is also possible to integrate
After information and two dimensional code are combined, embodied in the specified region of two dimensional code.
Again, parsing two dimensional code is scanned by equipment for customizing to be identified, wherein parse in equipment for customizing containing two dimensional code
The signing messages of program, key and corresponding company.Herein, it should be noted that equipment for customizing is the shape according to signing messages
Formula carries out custom-made, i.e., its identification division having is special, have corresponding with the form of signing messages structure and
Corresponding veritification information, i.e. other equipment do not have structure specific in this way and corresponding veritification information, just can not be with this Shen yet
The two dimensional code that please be claimed has corresponding relationship, cannot achieve the function of identification, also can not just pass through veritification.
Specifically, equipment for customizing includes:
Input unit, for receiving two dimensional code, reception herein can be scanned, and the modes such as transmission are realized;
Analysis unit obtains the data of encryption, two dimensional code herein for parsing two dimensional code containing two dimensional code analysis program
Analysis program is with the program with the form corresponding relationship of signing messages;
Decryption part using the symmetrically or non-symmetrically key in equipment for customizing, ciphertext data, and obtains signature section information,
In the case where integrating information, according to integration rules obtain signature section information, herein it is emphasized that unsymmetrical key and
What the form that integration rules are all based on signing messages was formed.
Comparing section, for comparing signing messages, the signing messages that the signing messages and equipment for customizing decrypted includes is tool
There is uniqueness, i.e., the signing messages that equipment for customizing includes is the signing messages determination based on original acquisition, therefore it is stored
In the memory space of equipment for customizing itself, not needing additional network can be realized offline comparison, and it is without network,
The safety of data is higher, and should be noted that since the signing messages that equipment for customizing includes is based on original acquisition
What signing messages determined, there is unique accurate information, imitated and replicated by other means very much, security level is high.
Presentation portion is specifically in for rendering as a result, presentation mode can be the both sides' difference or tripartite's difference of multiplicity
Existing portion can be screen.
In actual application, equipment for customizing can be camera, scanning device, mobile terminal, PC terminal, notebook,
Tablet computer etc..
The process of the asymmetric decryption of two dimensional code can obtain signing messages by Data Integration rule;
Signing messages in equipment for customizing is compared with the signing messages decrypted in obtained two dimensional code, passes through customization
The uniqueness that the signing messages in signing messages and the obtained two dimensional code of decryption in equipment has, can fast and accurately sentence
It is both disconnected whether consistent, i.e., whether meet veritification condition.
Finally, the structure based on judgement, result is presented, if signature comparison is consistent, content is shown;If signature
It compares inconsistent, does not show content.
Specifically, during result is presented, can be other various can show two kinds or three kinds state differences
Presentation mode, such as two kinds can be " consistent " or " inconsistent ", three kinds can be " consistent ", " inconsistent ", engineering noise.
Whether the present invention unanimously determines according to the signature in the signature and two dimensional code in last equipment for customizing, it is assumed that is directed to
The equipment for customizing of A unit exploitation, is modified signature, then the parsing result of the two dimensional code of all A production of units is just with equipment
On signature it is inconsistent, then information can not be shown.Assuming that B unit is want to produce two dimensional code with the signature of A unit, but B does not have A
Unsymmetrical key, then B unit generate two dimensional code cannot be parsed by equipment institute's barcode scanning of A.If the key that B oneself is generated
The two dimensional code for falsely using A signature is generated, then B must possess a full set of two dimensional code rendering technique of A.So if this two dimensional code
Rendering technique is underground, then process of the invention will be possible to ensure that the authentic and valid of information source.
The present invention is since all data are all being stored in two dimensional code, and for analysis program also in equipment, the present invention can be
Verification procedure is completed under off-line state.
Although for illustrative purposes, it has been described that exemplary embodiments of the present invention, those skilled in the art
Member it will be understood that, can be in form and details in the case where the scope and spirit for not departing from invention disclosed in appended claims
On the change that carry out various modifications, add and replace etc., and all these changes all should belong to appended claims of the present invention
Protection scope, and each step in the claimed each department of product and method, can in any combination
Form is combined.Therefore, to disclosed in this invention the description of embodiment be not intended to limit the scope of the invention,
But for describing the present invention.Correspondingly, the scope of the present invention is not limited by embodiment of above, but by claim or
Its equivalent is defined.
Claims (15)
1. a kind of information source checking method of two dimensional code, which comprises the steps of:
It is encrypted based on signing messages, and is put into two dimensional code and specifies in region;
Parsing two dimensional code is scanned using equipment for customizing, obtains signing messages, signing messages will be veritified and decrypts obtained signature
Information compares, and obtains veritifying result;
It wherein veritifies signing messages to determine based on signing messages, and is stored in equipment for customizing.
2. checking method as described in claim 1, it is characterised in that: after the signing messages can be integrated with other information, put
Enter two dimensional code to specify in region;Preferably, other information includes the preset data content in two dimensional code.
3. checking method as described in claim 1, it is characterised in that: the signing messages has characteristic symbol.
4. checking method as claimed in claim 3, it is characterised in that: the characteristic symbol includes the title of object, object
Industrial and commercial information and/or identification image.
5. checking method as claimed in claim 4, it is characterised in that: the name of the entitled company of object, unit and/or individual
Word.
6. checking method as claimed in claim 4, it is characterised in that: the identification image is company, unit and/or individual
logo。
7. checking method as claimed in claim 2, it is characterised in that: the other information includes the addition being put into two dimensional code
Data.
8. such as the described in any item checking methods of claim 1-7, it is characterised in that: described to be encrypted as asymmetric encryption.
9. checking method as claimed in claim 8, it is characterised in that: the process of the asymmetric encryption, specially just for
Signing messages carries out asymmetric encryption, or carries out again after signing messages is first integrated with the preset data content in two dimensional code non-
Symmetric cryptography.
10. the checking method as described in claim 1 or 9, it is characterised in that: the decryption is, based on key, ciphertext data obtains
Obtain signing messages.
11. checking method as claimed in claim 10, it is characterised in that: the key is unsymmetrical key.
12. the checking method as described in claim 1 or 9, it is characterised in that: further include result rendering step, presentation mode is
The both sides' difference patterns or tripartite's difference patterns of multiplicity.
13. a kind of veritification device realized using the described in any item checking methods of the claims 1-12 comprising customization
Equipment, which is characterized in that equipment for customizing includes:
Input unit, for receiving two dimensional code;
Analysis unit obtains the data of encryption for parsing two dimensional code containing two dimensional code analysis program;
Decryption part, using the key in equipment for customizing, ciphertext data obtains signing messages;
Comparing section, for comparing signing messages and veritifying signing messages;
Presentation portion, for rendering result.
14. veritifying device as claimed in claim 13, it is characterised in that: the key is unsymmetrical key.
15. veritifying device as claimed in claim 14, it is characterised in that: parse journey containing two dimensional code in the equipment for customizing
Sequence, key, and veritification signing messages corresponding with signing messages.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910151335.6A CN109886006A (en) | 2019-02-28 | 2019-02-28 | A kind of information source checking method and device based on two dimensional code |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910151335.6A CN109886006A (en) | 2019-02-28 | 2019-02-28 | A kind of information source checking method and device based on two dimensional code |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN109886006A true CN109886006A (en) | 2019-06-14 |
Family
ID=66930002
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910151335.6A Pending CN109886006A (en) | 2019-02-28 | 2019-02-28 | A kind of information source checking method and device based on two dimensional code |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109886006A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113254970A (en) * | 2021-06-08 | 2021-08-13 | 中教云智数字科技有限公司 | Digital teaching material auditing and verifying method |
| CN115484224A (en) * | 2022-09-16 | 2022-12-16 | 北京奇艺世纪科技有限公司 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101281581A (en) * | 2007-09-27 | 2008-10-08 | 北京数字证书认证中心有限公司 | Method for checking whether contents of paper file is distorted or not |
| CN102622631A (en) * | 2012-02-28 | 2012-08-01 | 深圳润鸿鑫数码技术有限公司 | Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment |
| CN103559526A (en) * | 2013-10-31 | 2014-02-05 | 北京天威诚信电子商务服务有限公司 | Method and system for generation and verification of two-dimensional code |
| CN103810457A (en) * | 2014-03-12 | 2014-05-21 | 河南融信数据有限公司 | Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code |
| CN104008322A (en) * | 2014-06-14 | 2014-08-27 | 河南融信数据有限公司 | Two-dimension code publisher identity authentication method based on reliable digital signature |
| CN104408502A (en) * | 2014-10-22 | 2015-03-11 | 全联斯泰克科技有限公司 | Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key) |
| CN105024824A (en) * | 2014-11-05 | 2015-11-04 | 祝国龙 | Method for generating and verifying credible label based on asymmetrical encryption algorithm and system |
| US20160308680A1 (en) * | 2012-10-15 | 2016-10-20 | Ty Lindteigen | Certificate Authority Server Protection |
| CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
| CN106897761A (en) * | 2017-03-06 | 2017-06-27 | 山东渔翁信息技术股份有限公司 | A kind of two-dimensional code generation method and device |
| CN109190347A (en) * | 2018-08-17 | 2019-01-11 | 江苏诺安科技有限公司 | A kind of electric endorsement method |
| CN109302292A (en) * | 2018-11-01 | 2019-02-01 | 北京冠群信息技术股份有限公司 | Inspection of document method, apparatus, electronic equipment and storage medium |
-
2019
- 2019-02-28 CN CN201910151335.6A patent/CN109886006A/en active Pending
Patent Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101281581A (en) * | 2007-09-27 | 2008-10-08 | 北京数字证书认证中心有限公司 | Method for checking whether contents of paper file is distorted or not |
| CN102622631A (en) * | 2012-02-28 | 2012-08-01 | 深圳润鸿鑫数码技术有限公司 | Anti-counterfeiting inspection device and anti-counterfeiting method for anti-counterfeiting equipment |
| US20160308680A1 (en) * | 2012-10-15 | 2016-10-20 | Ty Lindteigen | Certificate Authority Server Protection |
| CN103559526A (en) * | 2013-10-31 | 2014-02-05 | 北京天威诚信电子商务服务有限公司 | Method and system for generation and verification of two-dimensional code |
| CN103810457A (en) * | 2014-03-12 | 2014-05-21 | 河南融信数据有限公司 | Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code |
| CN104008322A (en) * | 2014-06-14 | 2014-08-27 | 河南融信数据有限公司 | Two-dimension code publisher identity authentication method based on reliable digital signature |
| CN104408502A (en) * | 2014-10-22 | 2015-03-11 | 全联斯泰克科技有限公司 | Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key) |
| CN105024824A (en) * | 2014-11-05 | 2015-11-04 | 祝国龙 | Method for generating and verifying credible label based on asymmetrical encryption algorithm and system |
| CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
| CN106897761A (en) * | 2017-03-06 | 2017-06-27 | 山东渔翁信息技术股份有限公司 | A kind of two-dimensional code generation method and device |
| CN109190347A (en) * | 2018-08-17 | 2019-01-11 | 江苏诺安科技有限公司 | A kind of electric endorsement method |
| CN109302292A (en) * | 2018-11-01 | 2019-02-01 | 北京冠群信息技术股份有限公司 | Inspection of document method, apparatus, electronic equipment and storage medium |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113254970A (en) * | 2021-06-08 | 2021-08-13 | 中教云智数字科技有限公司 | Digital teaching material auditing and verifying method |
| CN113254970B (en) * | 2021-06-08 | 2024-02-02 | 中教云智数字科技有限公司 | Digital teaching material auditing and verifying method |
| CN115484224A (en) * | 2022-09-16 | 2022-12-16 | 北京奇艺世纪科技有限公司 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
| CN115484224B (en) * | 2022-09-16 | 2023-09-29 | 北京奇艺世纪科技有限公司 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wazid et al. | Secure authentication scheme for medicine anti-counterfeiting system in IoT environment | |
| CN101300808B (en) | Methods and Settings of Security Authentication | |
| CN102932148B (en) | Based on the safe two-dimension code anti-counterfeit System and method for of CPK certification | |
| US7961915B2 (en) | System and method for authenticated and privacy preserving biometric identification systems | |
| JP4866863B2 (en) | Security code generation method and user device | |
| CN108229188B (en) | Method for signing file and verifying file by using identification key | |
| CN101547095B (en) | Application service management system and management method based on digital certificate | |
| CN109583219A (en) | A kind of data signature, encryption and preservation method, apparatus and equipment | |
| JP2018516030A (en) | ID management service using blockchain | |
| Saranya et al. | Efficient mobile security for E health care application in cloud for secure payment using key distribution | |
| MX2015002929A (en) | Method and system for verifying an access request. | |
| JP2003521154A (en) | How to issue electronic identification information | |
| CN106341493A (en) | Entity rights oriented digitalized electronic contract signing method | |
| CN110290134A (en) | A kind of identity identifying method, device, storage medium and processor | |
| CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
| CN101060400B (en) | Data generating device, data analysis device, control method and data processing system | |
| CN106779705A (en) | A kind of dynamic payment method and system | |
| CN101547097B (en) | Digital media management system and management method based on digital certificate | |
| CN107229879A (en) | Electronics confirmation request automatic generation method and system based on safe Quick Response Code | |
| CN113961956B (en) | Method, device, equipment and medium for generating and applying labeled network information service | |
| CN110569672A (en) | efficient credible electronic signature system and method based on mobile equipment | |
| CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
| CN109886006A (en) | A kind of information source checking method and device based on two dimensional code | |
| CN201717885U (en) | Code providing equipment and code identification system | |
| CN205015906U (en) | Anti -fake verification system of electron certificate |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |