Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bidirectional authentication method and system based on encrypted two-dimensional code

A technology of two-way authentication and two-dimensional code, applied in the field of two-way authentication method and system based on encrypted two-dimensional code, can solve problems such as security loopholes, and achieve the effect of improving information security

Pending Publication Date: 2019-08-02
深圳市星火电子工程公司
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The one-way identification method has great security loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional authentication method and system based on encrypted two-dimensional code
  • Bidirectional authentication method and system based on encrypted two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0049] Such as figure 2 As shown, a two-way authentication system based on an encrypted two-dimensional code is applied to the method described in Embodiment 1. The system includes the access terminal and the accessed terminal, among which

[0050] Access terminals include:

[0051] An acquisition module, configured to acquire the first public key disclosed by the accessed terminal, preferably acquire the first public key from the public key two-dimensional code by scanning codes, and the first public key corresponds to the accessed terminal's first private key;

[0052] A key generation module, configured to randomly generate the second public key and the second key;

[0053] The first encryption module is configured to use the first public key to encrypt the first information that needs to be sent to the accessed terminal and its own second public key to form a first encrypted two-dimensional code, and the second public key corresponds to The second private key of the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a bidirectional authentication method and system based on an encrypted two-dimensional code. The method comprises the steps of 1, using an accessed end to disclose a first public key; step 2, after the access end obtains the first public key, encrypting the first information needing to be sent to an accessed end and a second public key of the access end by using the first public key to form a first encrypted two-dimensional code, and sending the first two-dimensional code to the accessed end; step 3, after the accessed end receives the first encrypted two-dimensional code, decrypting the first encrypted two-dimensional code by using the first private key to obtain the first information and a second public key, then encrypting the second information needing to be fedback to the access end by using the second public key to form a second encrypted two-dimensional code, and sending the second encrypted two-dimensional code to the access end; and step 4, after the access end receives the second encrypted two-dimensional code, decrypting the second encrypted two-dimensional code by using the second private key to obtain the second information. According to the method, the information security is greatly improved, and the access end can be ensured not to be recognized.

Description

technical field [0001] The invention relates to information transmission, in particular to a two-way authentication method and system based on an encrypted two-dimensional code. Background technique [0002] Because the QR code itself can be read by computers and can contain a large amount of information, it is widely used in various aspects such as making friends, identification, payment, publicity, and links. [0003] The one-way identification method has great security loopholes. There are reports on the Internet that thieves have changed the payment QR codes of large merchants and chain stores. As a result, the customer's transaction amount has entered the thief's account for a period of time. Using two-way authentication can solve the problem of no verification or simple verification methods in the interaction process. Vulnerabilities to supplement the current two-dimensional code application loopholes. Contents of the invention [0004] In order to solve the shortc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08G06K19/06
CPCH04L9/3273H04L9/0822H04L9/0861G06K19/06037
Inventor 王学军周峰刘译文
Owner 深圳市星火电子工程公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products