Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information transmission method based on encrypted double-layer two-dimensional code with verifiable information source

A technology of information transmission and two-dimensional codes, applied in transmission systems, electrical components, etc., can solve problems such as safety performance concerns, and achieve the effect of preventing virus infection

Active Publication Date: 2018-04-27
福州市数字产业互联科技有限责任公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Defects of traditional two-dimensional code-based information transmission methods: two-dimensional codes are used as information carriers, and links such as URLs carried by them have security concerns, such as two-dimensional code viruses, two-dimensional code Trojan horses, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information transmission method based on encrypted double-layer two-dimensional code with verifiable information source

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0042] Now in conjunction with accompanying drawing, describe the specific embodiment of the present invention in detail:, example is as follows.

[0043] Such as figure 1As shown, an information transmission method based on an encrypted double-layer QR code with a verifiable information source includes a cloud management background, a smart phone, and the cloud management background generates an encrypted double-layer QR code that does not assign information; the information publisher is in the cloud The management background injects information into the encrypted double-layer QR code; the information receiver obtains the information by scanning the encrypted double-layer QR code injected with the mobile phone software;

[0044] (1) The steps of generating an encrypted double-layer QR code without information in the cloud management background are as follows:

[0045] Step S101: Combine a two-dimensional code of the identity code and a two-dimensional code of the verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information transmission method capable of verifying an information source based on an encrypted double-layered two-dimension bar code. The information transmission method comprises a cloud management background and a mobile terminal. The cloud management background generates the encrypted double-layered two-dimension bar code which is not provided with information. An information publisher adds information for the encrypted double-layered two-dimension bar code on the cloud management background. An information receiver obtains the information by scanning the encrypted double-layered two-dimension bar code with the information via the mobile terminal. The method is integrated with a computer, network communication, information coding and two-dimension bar code making technology, so it is ensured that the information receiver is capable of identifying the source publishing source when receiving the information so as to ensure there are only one entrance and one exit for the information, thereby preventing the two-dimension bar code from being infected with viruses to cause leakage of private information and endangering to information safety when a user is scanning the two-dimension bar code to receive information.

Description

technical field [0001] The invention relates to the field of information security, in particular to an Internet two-dimensional code information transmission method. Background technique [0002] Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), and security systems, such as UniNAC, DLP, etc., as long as A security breach can threaten global...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/083
Inventor 涂新魁陈珂
Owner 福州市数字产业互联科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products