Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Off-line verifiable secure two-dimensional code structure verification method and device

A technology of verification method and construction method, which is applied in the field of information technology and security verification, and can solve problems such as information being easily modified and forged, security cannot be judged, and two-dimensional code security verification.

Active Publication Date: 2018-03-30
王栋
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

QR codes are coded in clear codes. Although they have information error-tolerant redundancy checks, the information is easy to be modified and forged, and it is difficult to verify the source of the release.
The current verification methods include two types: one is to use an application system similar to the scan code guard, scan and identify the QR code information, connect to the dedicated server of the application system through the network, and retrieve the QR code URL information and the database records in the server Comparison: If a matching record can be retrieved in the system database, it can be given whether the source of the QR code is safe according to the attributes of the record; if there is no matching record, the security cannot be judged
The other is to encrypt the two-dimensional code information, connect to a dedicated server through the network, read the authentication information, and compare it with the encrypted information in the two-dimensional code for verification; this type of application is a closed system, and the encrypted password The key information is stored in a dedicated server, and the QR code information can only be input and decrypted by the internal dedicated system, and cannot be read and verified by the public users themselves.
[0004] The existing two-dimensional code security verification method has the following main problems: it needs to be verified through a network connection server, and it cannot be verified in an environment where there is no network connection or inconvenient network connection; the verification method based on URL search and comparison can only verify the Scan the verified QR code information, the newly generated QR code information needs to be added to the database before it can be verified
[0005] In order to solve the existing two-dimensional code security verification problem, the present invention proposes a secure two-dimensional code structure verification method and device that can be verified offline, which can verify the release source of the two-dimensional code offline without network connection, and can be applied safely and securely QR code information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Off-line verifiable secure two-dimensional code structure verification method and device
  • Off-line verifiable secure two-dimensional code structure verification method and device
  • Off-line verifiable secure two-dimensional code structure verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0126] ABC Bank generates a public information security QR code that can be read by public users for its online banking entrance address, and users can safely scan the code and access the online banking system.

[0127] The specific implementation steps are as follows:

[0128] 1. Enter the information and type information to be encoded

[0129] The information to be encoded includes basic information, target information, and dynamic information. The basic information is: Base:{Name:ABCBank}, the target information is: OBJ:{URI:https: / / www.abc.com}, and the dynamic information is: DYN:{Created:2016-1-1 12:00: 00|Expired: 2026-1-1 12:00:00}. The type information is a public information security QR code.

[0130] Connect the input information with vertical bars and bracket symbols, as shown in Table 1.

[0131] Table 1 Encoding information required in Embodiment 1

[0132][OBJ:{URI:https: / / www.abc.com}Base:{Name:ABC Bank}DYN:{Created:2016-1-1 12:00:00|Expired:2026-1-1 12:00...

Embodiment 2

[0190] The ABC Pay payment platform, for taxi mobile payment applications, generates public information security QR codes for each taxi operator that can be read by public users, and passengers can safely scan the code to pay for car rentals.

[0191] The specific implementation steps are as follows:

[0192] 1. Enter the information and type information to be encoded

[0193] The information to be encoded includes basic information, target information, and dynamic information. The basic information is: Base:{TaxiID: Shanghai A12345|LicenseID:123456|UserID:12345678|Domain:abcpay.com}, the target information is: OBJ:{URI:https: / / sqr.abcpay.com / zrk1rjziurlr2w3ira}, dynamic The information is: DYN:{Created:2016-1-1 12:00:00|Expired:2017-1-1 12:00:00}. The type information is a public information security QR code.

[0194] Connect the input information with vertical bars and bracket symbols, as shown in Table 8.

[0195] Table 8 Embodiment 2 needs to encode information

[019...

Embodiment 3

[0225] ABC Mall shopping center, when the user pays, uses the device of the present invention to generate in real time a public information security two-dimensional code containing information such as the name of the receiving merchant, date, amount, and valid time, and the user can scan the code to pay safely.

[0226] The specific implementation steps are as follows:

[0227] 1. Enter the information and type information to be encoded

[0228] The information to be encoded includes basic information, target information, and dynamic information. The basic information is: Base:{Name:ABCMall|Addr:No.1288,ABC Rd.,Shanghai|Domain:abcpay.com}, the target information is: OBJ:{URI:https: / / pay.abcpay.com / dkri67zin9oo8tzxy9ojquz8mcaedhzcljix1jeu }, the dynamic information is: DYN:{Created:2016-5-1 12:00:00|Expired:2016-5-1 12:10:00|PaymentID:e7db7c48642c78a669fd|Total:580.00RMB}. The type information is a public information security QR code.

[0229] Connect the input information wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a verification construction method and device capable of offline verification of a safety information tag, comprising: input information to be encoded and type information, perform a digital signature operation and an encryption operation on input information according to an information release type to construct combined information, and encode according to an information tag encoding rule to generate an offline-verifiable safety information tag; input safety information tag information and identify the combined information and type information comprised therein, analyze and decrypt the combined information according to information tag type information to obtain independent sub-information, and verify digital certificate validity information, a digital signature of the input information and valid time limit of the input information; if the verification succeeds, the safety information tag is correct in offline verification, the encoding information source of the safety information tag is credible, otherwise the information release source thereof is incredible. The safety information tag of the present invention is tamper-resistant, unforgeable and undeniable, can release public or private information, and can verify information integrity of the information tag and whether the source thereof is real or not offline without network connection.

Description

technical field [0001] The invention relates to the fields of information technology and security verification, in particular to a method and device for offline verification of a secure two-dimensional code structure verification. Background technique [0002] A two-dimensional code is a specific geometric figure that uses several symbols corresponding to the binary system to distribute on a two-dimensional plane according to certain rules to record data information. Two-dimensional codes use graphic symbols to represent textual and numerical information. Various code systems have been developed in terms of symbolic representation technology, such as QR Code, Data Matrix, Maxi Code, PDF417 and so on. Two-dimensional codes are identified by image input equipment or photoelectric scanning equipment, which can deal with common problems such as symbol size and ratio changes, graphic rotation, and partial defacement, and realize automatic identification of encoded information. It...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32G06K19/06G06K17/00
CPCG06K17/00G06K19/06037G06K19/06056H04L9/0861H04L9/3247H04L9/3263
Inventor 王栋
Owner 王栋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products