Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server

A server and two-dimensional code technology, applied in the field of information processing, can solve the problems of increasing the cost of reading two-dimensional codes, not being able to guarantee the security of private information, and unfavorable application of two-dimensional codes, so as to reduce generation and reading costs and ensure safety , the effect of expanding the scope of application

Active Publication Date: 2015-02-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The first type of two-dimensional code generation method encrypts private information, so that the information recorded in the generated two-dimensional code contains encrypted private information, and the encrypted private information has the risk of being cracked, and the security of private information cannot be guaranteed. , and the encryption of private information increases the cost of generating two-dimensional codes; the first reading method of two-dimensional codes needs to use the decryption method corresponding to the encryption method, which increases the cost of reading two-dimensional codes and is not conducive to two-dimensional codes Applications
The second generation method of the two-dimensional code makes the generated two-dimensional code contain private information, and the security of the private information cannot be guaranteed; although the second method of reading the two-dimensional code can indicate the display of the private information through the privacy indicator, However, the security of private information cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server
  • Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server
  • Two-dimension code generating method, terminal and server and two-dimension code reading method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] For private information, an embodiment of the present invention provides a method for generating a two-dimensional code, the method is applicable to a system for generating a two-dimensional code, the system includes a terminal and a server, and both the terminal and the server are in a network environment. Taking the perspective of the terminal executing the method provided by the embodiment of the present invention as an example, see figure 1 , the method flow includes:

[0071] 101: Obtain the private information input by the user, and send the obtained private information to the server through the network, and the server stores the private information, and generates an information access address corresponding to the private information;

[0072] 102: receiving the information access address returned by the server through the network;

[0073] As an optional embodiment, receiving the information access address returned by the server through the network includes:

...

Embodiment 2

[0091] Regarding the method for generating a two-dimensional code provided in the first embodiment above, the embodiment of the present invention provides a method for reading a two-dimensional code, which is suitable for a two-dimensional code reading system, the system includes a terminal and a server, and Both the terminal and the server are in the network environment. Taking the perspective of the terminal executing the method provided by the embodiment of the present invention as an example, see image 3 , the method flow includes:

[0092] 301: Obtain a two-dimensional code containing an information access address, and scan the two-dimensional code to obtain the information access address contained in the two-dimensional code, and the information access address is used to access private information;

[0093] 302: Send the information access address to the server through the network, and the server queries the corresponding private information according to the informatio...

Embodiment 3

[0114] An embodiment of the present invention provides a method for generating a two-dimensional code. The method provided by the embodiment of the present invention is explained in detail in combination with the content of the first embodiment above. see Figure 5 , the method flow includes:

[0115] 501: The terminal obtains the private information input by the user, and sends the obtained private information to the server through the network;

[0116] This embodiment does not specifically limit the manner of obtaining the private information input by the user. During specific implementation, it includes but is not limited to providing an information input interface, which also provides a submit button; obtaining the information input by the user through the information input interface, and when it is detected that the user clicks the submit button, the information input by the user through the information input interface The information is used as the obtained private inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimension code generating method, terminal and server and a two-dimension code reading method, terminal and server, and belongs to the technical field of information processing. The two-dimension code generating method comprises the steps of obtaining privacy information input by a user, sending the privacy information to the two-dimension code generating server through a network, receiving an information access address returned by the server through the network and generating a two-dimension code containing the information access address. The two-dimension code reading method comprises the steps of obtaining the two-dimension code containing the information access address, scanning the two-dimension code to obtain the information access address contained in the two-dimension code, sending the information access address to the two-dimension code reading server through the network, receiving the privacy information returned by the server through the network and using the privacy information as the reading result of the two-dimension code, wherein the information access address is used for enabling the user to have access to privacy information. According to the two-dimension code generating method, terminal and server and the two-dimension code reading method, terminal and server, the information access address is used for replacing the privacy information, so that the security of the privacy information is guaranteed; encryption and decryption are not needed, so that the generating and reading cost of the two-dimension code is reduced, and the application range of the two-dimension-code is widened.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to a method for generating and reading a two-dimensional code, a terminal and a server. Background technique [0002] With the continuous development of information processing technology, two-dimensional codes have been widely used due to their wide coding range and strong fault tolerance. QR (Quick Response, quick response) two-dimensional code is a kind of two-dimensional code, and each QR two-dimensional code is represented in the form of an image, and the image is a square array. The generation of two-dimensional codes refers to the conversion of information into images, and the reading of two-dimensional codes refers to the conversion of images into information. Due to the expansion of the application scope of two-dimensional codes, the types and quantities of information recorded in two-dimensional codes are increasing, especially information related to user pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06G06K7/10G06F17/30H04L29/06
CPCH04L63/10G06F16/9554G06K7/1417G06K19/06037H04L9/0643
Inventor 卜满钊唐文宁黄平杨海松
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products