CN102930192B - Security information generates and acquisition methods and relevant apparatus - Google Patents

Security information generates and acquisition methods and relevant apparatus Download PDF

Info

Publication number
CN102930192B
CN102930192B CN201210349206.6A CN201210349206A CN102930192B CN 102930192 B CN102930192 B CN 102930192B CN 201210349206 A CN201210349206 A CN 201210349206A CN 102930192 B CN102930192 B CN 102930192B
Authority
CN
China
Prior art keywords
dimensional code
user profile
secure
described secure
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210349206.6A
Other languages
Chinese (zh)
Other versions
CN102930192A (en
Inventor
王曦
胡博
莫沙
谢郑凯
冯诚
黄英
周睿奕
贺柏森
李未
张凯
刘玉磊
唐廷勇
杨惠姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210349206.6A priority Critical patent/CN102930192B/en
Publication of CN102930192A publication Critical patent/CN102930192A/en
Application granted granted Critical
Publication of CN102930192B publication Critical patent/CN102930192B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of user profile to generate and acquisition methods and relevant apparatus, for providing a kind of methods of exhibiting that is safe, user profile easily.Embodiment of the present invention method comprises: obtain the user profile that user provides; Generate secure two-dimensional code according to described user profile, described secure two-dimensional code is applied in logistics list, makes user profile acquisition device obtain described user profile by the described secure two-dimensional code of scanning.

Description

Security information generates and acquisition methods and relevant apparatus
Technical field
The present invention relates to field of information processing, particularly relate to a kind of security information and generate and acquisition methods and relevant apparatus.
Background technology
Quick Response Code is that expand on the basis of bar code a kind of has readable bar code.Compare bar code, Quick Response Code records more complicated data, such as picture, network linking etc.Compare with one-dimension code, 2 D code information capacity is large, picture, sound, word, fingerprint etc. can digitized information can be carried out encoding and showing, can outfit as many as 1,850 capitalization/2,710 numeral/1,108 many, byte/500 Chinese characters, are tens times of one-dimension code information capacity.Device scan two-dimensional bar code, by identifying binary data described in the length of bar code and width, can obtain wherein comprised information.Quick Response Code also has encryption mechanism, can first by certain cryptographic algorithm by information encryption, then to represent with two-dimensional bar code.When identifying two-dimensional bar code, more in addition certain decipherment algorithm, just can recover represented information.
In existing logistical applications, need the artificial naked eyes recognition user information of staff in logistics progress, carry out the operations such as sorting, efficiency is lower; Further, the exhibition method of the user profile of user is expressly display, and all personal information of user is directly exposed to outside, causes great information leakage risk; When logistics list is because of a variety of causes generation local damage, be easy to cause logistics personnel to be difficult to correctly identify the relevant information of user.
Summary of the invention
Embodiments provide a kind of security information to generate and acquisition methods and relevant apparatus, for providing a kind of methods of exhibiting that is safe, user profile easily.
The security information generation method that the embodiment of the present invention provides, comprising:
Obtain the user profile that user provides;
Generate secure two-dimensional code according to described user profile, be the unique identify label of described secure two-dimensional code assign ment in the database storing described secure two-dimensional code, and distribute for identify label and store use restriction parameter;
Wherein, described secure two-dimensional code is applied in document, making user profile acquisition device under the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, obtaining described user profile by scanning described secure two-dimensional code.
The user information acquiring method that the embodiment of the present invention provides, comprising:
In the network data base of storage security Quick Response Code, determine the unique identity of distributed described secure two-dimensional code, determine that the use of the described secure two-dimensional code that described unique identity is corresponding limits parameter, and when meeting the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, the secure two-dimensional code in scanning document;
According to presetting rule, described secure two-dimensional code is decoded;
Result according to described decoding obtains user profile.
The document that the embodiment of the present invention provides, based on security information generation method described above, described document comprises:
Secure two-dimensional code, the user profile in described secure two-dimensional code labeling document, making user profile acquisition device using under the specific service condition limiting the described secure two-dimensional code that parameter limits, obtaining described user profile by scanning described secure two-dimensional code;
Wherein, after the described secure two-dimensional code of generation, in the database storing described secure two-dimensional code, be assigned the unique identity of described secure two-dimensional code, and distribute by described unique identity and the use of the described secure two-dimensional code stored restriction parameter.
The user profile generating apparatus that the embodiment of the present invention provides, comprising:
Information acquisition unit, for obtaining the user profile that user provides;
Quick Response Code generation unit, for generating secure two-dimensional code according to described user profile, be the unique identify label of described secure two-dimensional code assign ment in the database storing described secure two-dimensional code, and be that described unique identify label distributes and stores use restriction parameter;
Wherein, described secure two-dimensional code is applied in document, making user profile acquisition device under the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, obtaining described user profile by scanning described secure two-dimensional code.
The user profile acquisition device that the embodiment of the present invention provides, comprising:
Scanning element, for in the network data base of storage security Quick Response Code, determine distributed unique identity, determine that the use of the described secure two-dimensional code that described unique identity is corresponding limits parameter, and when meeting the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, the secure two-dimensional code in scanning document;
Decoding unit, for decoding to described secure two-dimensional code according to presetting rule;
User profile acquiring unit, obtains user profile for the result according to described decoding.
As can be seen from the above technical solutions, the embodiment of the present invention has the following advantages:
User information revealing mode based on Quick Response Code can not only be supplied to the effective userspersonal information in logistics side fast, ensure that the individual privacy information of user is not obtained by unrelated person, simultaneously can the intellectuality sorting of adaptive machine, improve the treatment effeciency of logistics mail; Further, because the fault-tolerant ability of Quick Response Code is strong, when Quick Response Code causes local damage because of perforation, stained etc., when even impaired area reaches 50%, still can correctly distinguish, its decoding error rate is no more than 1/10000000th.
Accompanying drawing explanation
Fig. 1 is a schematic flow sheet of embodiment of the present invention security information generation method;
Fig. 2 is another schematic flow sheet of embodiment of the present invention security information generation method;
Fig. 3 is the exemplary plot that in the embodiment of the present invention, secure two-dimensional code generates;
Fig. 4 is another exemplary plot that in the embodiment of the present invention, secure two-dimensional code generates;
Fig. 5 is an application flow schematic diagram of embodiment of the present invention security information generation method;
Fig. 6 is a logical organization schematic diagram of embodiment of the present invention user profile generating apparatus;
Fig. 7 is a logical organization schematic diagram of embodiment of the present invention user profile acquisition device.
Embodiment
Embodiments provide a kind of security information to generate and acquisition methods and relevant apparatus, for providing a kind of methods of exhibiting that is safe, user profile easily.
Refer to Fig. 1, in the embodiment of the present invention, an embodiment of security information generation method comprises:
101, the user profile that user provides is obtained;
User profile generating apparatus obtains the user profile that user provides.Optionally, described user profile specifically can comprise: the name of user, contact method and contact address.
102, secure two-dimensional code is generated according to described user profile;
User profile generating apparatus generates secure two-dimensional code according to described user profile, and described secure two-dimensional code is applied in document, makes user profile acquisition device obtain described user profile by the described secure two-dimensional code of scanning.
User information revealing mode based on Quick Response Code can not only be supplied to the effective userspersonal information in logistics side fast, ensure that the individual privacy information of user is not obtained by unrelated person, simultaneously can the intellectuality sorting of adaptive machine, improve the treatment effeciency of logistics mail; Further, because the fault-tolerant ability of Quick Response Code is strong, when Quick Response Code causes local damage because of perforation, stained etc., when even impaired area reaches 50%, still can correctly distinguish, its decoding error rate is no more than 1/10000000th.
In actual applications; the user profile generation method of the embodiment of the present invention may be used for the information security protecting logistics user; can also limit the usable range of secure two-dimensional code, refer to Fig. 2, in the embodiment of the present invention, another embodiment of user profile generation method comprises:
201, the user profile that user provides is obtained;
User profile generating apparatus obtains the user profile (i.e. logistics information) that user provides.Optionally, described user profile specifically can comprise: the name of user, contact method and contact address.
202, secure two-dimensional code is generated according to described user profile;
User profile generating apparatus generates secure two-dimensional code according to described user profile, described secure two-dimensional code is applied in document (being specifically as follows logistics list), makes user profile acquisition device obtain described user profile by the described secure two-dimensional code of scanning.
Exemplary, following method specifically can be adopted in the embodiment of the present invention to generate secure two-dimensional code:
1, data analysis: determine the character types of encoding, convert sign character to by corresponding character set; Select error-correction level, under the condition that specification is certain, the capacity of error-correction level its True Data higher is less.
Refer to Fig. 3, each QR code sign is made up of nominal square modules, forms a quadrate array, and it is by coding region and comprise and seek the functional graphic resembling figure, separator, positioning pattern and correction graph and form; Functional graphic can not be used for data encoding, and the surrounding of symbol is surrounded by clear area.
2, data encoding: data character is converted to bit stream, every 8 code words, the overall codeword sequence forming data.In fact know that this code word data sequence is just aware of the data content of Quick Response Code.
Data can be encoded according to a kind of pattern, to decode more efficiently, such as: to data: 01234567 coding (version 1-H),
1) divide into groups: 01234567
2) scale-of-two is changed into: 012 → 0000001100
345→0101011001
67→1000011
3) sequence is changed into: 000000110001010110011000011
4) number of characters changes into scale-of-two: 8 → 0000001000
5) mode indicators (upper figure numeral) 0001:00010000001000000000110001010110011000011 is added
The content such as mode, pattern of just dividing into groups for letter, Chinese, Japanese etc. is distinguished to some extent.Basic skills is consistent.
3, Error Correction of Coding: on demand by codeword sequence piecemeal above, and according to the code word of error-correction level and piecemeal, produce error correction code word, and error correction code word is joined after code word data sequence, becomes a new sequence.
When Quick Response Code specification and error-correction level are determined, in fact it can hold code word sum and error correcting code number of words also just determine, such as: version 10, during error-correction level during H, altogether can hold 346 code words, wherein 224 error correction code words.
In other words in two-dimension code area about 1/3 code word time redundancy.For these 224 error correction code words, it can be corrected 112 and substitute mistake (as confuse right and wrongs) or 224 according to read error (cannot read or cannot decoding), and such error correction capability is: 112/346=32.4%.
4, final data information is constructed: under the condition that specification is determined, the sequence in order produced above is put as in piecemeal, by regulation deblocking, then each block is calculated, draw corresponding error correcting code block block, error correcting code block block is formed a sequence in order, adds to after original code word data sequence.
As: D1, D12, D23, D35, D2, D13, D24, D36 ... D11, D22, D33, D45, D34, D46, E1, E23, E45, E67, E2, E24, E46, E68 ...
5, structural matrix: detection figure, separator, positioning pattern, correction graph and code word module are put into matrix.Refer to Fig. 4, the complete sequence in step 4 is filled in the region of Quick Response Code matrix of dimension.
6, mask: coding region mask figure being used for symbol, makes dark color in two-dimension code pattern and light color (black and white) region can the distribution of ratio optimum.In order to meet above-mentioned condition, mask should be carried out according to the following steps.
1) mask is not used in functional graphic;
2) continuously xor operation is carried out to the module figure of known coding region (format information and version information except) with multiple Matrix Pattern.Module figure is successively placed on each mask graph by xor operation, and will correspond to the module negate (light color becomes dark, or on the contrary) of the dark module of mask graph;
3) the nonconforming part of each result figure is scored, to assess these results;
4) figure that score is minimum is selected.
7, form and version information: production form and version information put into respective regions.
Version 7-40 contains version information, and what do not have version information is 0 entirely.On Quick Response Code, two positions contain version information, and they are redundancies.
Version information totally 18, the matrix of 6X3, wherein 6 time data be that, as version number 8, during the information of data bit 001000, below 12 is error correction bit.
203, parameter is limited for described secure two-dimensional code assign ment uses;
User profile generating apparatus is that described secure two-dimensional code assign ment uses restriction parameter, described use limits parameter and uses under given conditions for limiting described secure two-dimensional code, described use limits parameter and comprises: access times, the combination of any one or more than two in service time and place to use.
Exemplary, after the described secure two-dimensional code of generation, in the database storing described secure two-dimensional code, can be the unique identify label of described secure two-dimensional code assign ment, and distribute for identify label and store use restriction parameter.Concrete, in actual applications, logistics personnel generally need the address information obtaining corresponding network data base by scanning this secure two-dimensional code, then arrive and to verify in this network data base and to extract corresponding user profile.Parameter is limited by described use, network data base record uses the definitions relevant information of this secure two-dimensional code, as: the logistics personnel that can limit target place just can obtain corresponding user profile by this secure two-dimensional code of scanning, also access times and the time range of this secure two-dimensional code can be limited, in order to avoid user profile is stolen in other occasions.
For the ease of understanding, with an embody rule scene, the user profile generation method described in the above embodiments, user profile acquisition and document being described in detail below, please refer to Fig. 5, be specially:
501, user provides logistics information;
On shopping website, user confirms to buy certain article and after placing an order, user provides logistics information (comprising name, cell-phone number, address etc.) to website.
502, logistics information is converted to secure two-dimensional code;
Website, after the logistics information obtaining this user, generates secure two-dimensional code by logistics information generating apparatus according to described logistics information.
503, the logistics information of this user is issued seller with secure two-dimensional coding mode by website;
504, seller is by secure two-dimensional code printing on logistics list, is supplied to logistics company and delivers;
Optionally, above are only a kind of scene in practical application, be understandable that, the logistics information of user also directly can be sent to seller by website in actual applications, described logistics information is converted to secure two-dimensional code by logistics information generating apparatus by seller, by seller, secure two-dimensional code is supplied to corresponding logistics company again, the concrete mode used is not construed as limiting herein.
505, logistics side identifies by logistics information acquisition device geographical location information that Quick Response Code is with, and carries out sorting, the work such as transport;
506, send part personnel to go out Quick Response Code by task equipment scanning recognition and be with the information such as user's contact method, send this goods with charge free and use to the buyer.
Buyer user successfully receives, and this logistics list also can directly abandon, and does not worry the leakage of personal information on logistics list.
Above-mentioned user profile generating apparatus and user profile acquisition device are virtual bench, it is the general designation of all devices that can realize user profile generation method and user information acquiring method in the embodiment of the present invention, in specific implementation, it can be software program, also can be hardware device, be not construed as limiting herein.
Only with some examples, the application scenarios in the embodiment of the present invention is illustrated above, is understandable that, in actual applications, more application scenarios can also be had, be specifically not construed as limiting herein.
The embodiment of the present invention additionally provides a kind of document, and this document specifically includes:
Secure two-dimensional code, the user profile in described secure two-dimensional code labeling document, makes user profile acquisition device obtain described user profile by the described secure two-dimensional code of scanning.
Be described the embodiment of the user profile generating apparatus of the present invention for performing above-mentioned user profile generation method below, its logical organization please refer to Fig. 6, and in the embodiment of the present invention, an embodiment of user profile generating apparatus comprises:
Information acquisition unit 601, for obtaining the user profile that user provides;
Quick Response Code generation unit 602, for generating secure two-dimensional code according to described user profile, described secure two-dimensional code is applied in document, makes user profile acquisition device obtain described user profile by the described secure two-dimensional code of scanning.
Optionally, described user profile generating apparatus also comprises:
Parametric distribution unit 603, for limiting parameter for described secure two-dimensional code assign ment uses, described use limits parameter and uses under given conditions for limiting described secure two-dimensional code, described use limits parameter and comprises: access times, the combination of any one or more than two in service time and place to use.
Be described the embodiment of the user profile acquisition device of the present invention for performing above-mentioned user information acquiring method below, its logical organization please refer to Fig. 7, and in the embodiment of the present invention, an embodiment of user profile acquisition device comprises:
Scanning element 701, for scanning the secure two-dimensional code in document;
Decoding unit 702, for decoding to described secure two-dimensional code according to presetting rule;
User profile acquiring unit 703, obtains user profile for the result according to described decoding.
Further, described user profile acquiring unit 703 specifically for:
Directly described user profile is obtained by decoding; Or, by obtaining Object linking address, by user profile described in network to described Object linking address acquisition after straight decoding of decoding.
Above-mentioned user profile generating apparatus and the concrete method of operating of user profile acquisition device unit have had corresponding description in above-mentioned Fig. 1, Fig. 2 and Fig. 4 embodiment, repeat no more herein.
In several embodiments that the application provides, should be understood that, disclosed apparatus and method can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection domain of claim.

Claims (10)

1. a security information generation method, is characterized in that, comprising:
Obtain the user profile that user provides;
Generate secure two-dimensional code according to described user profile, be the unique identify label of described secure two-dimensional code assign ment in the database storing described secure two-dimensional code, and distribute for identify label and store use restriction parameter;
Wherein, described secure two-dimensional code is applied in document, making user profile acquisition device under the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, obtaining described user profile by scanning described secure two-dimensional code.
2. method according to claim 1, is characterized in that, described user profile comprises:
The name of user, cell-phone number and contact address.
3. method according to claim 1 and 2, is characterized in that, described use limits parameter and comprises: access times, the combination of any one or more than two in service time and place to use.
4. a user information acquiring method, is characterized in that, comprising:
In the network data base of storage security Quick Response Code, determine the unique identity of distributed described secure two-dimensional code, determine that the use of the described secure two-dimensional code that described unique identity is corresponding limits parameter, and when meeting the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, the secure two-dimensional code in scanning document;
According to presetting rule, described secure two-dimensional code is decoded;
Result according to described decoding obtains user profile.
5. method according to claim 4, is characterized in that, the described result according to described decoding obtains user profile, comprising:
Directly described user profile is obtained by decoding;
Or,
Object linking address is obtained, by user profile described in network to described Object linking address acquisition by decoding.
6. a document, is characterized in that, based on the security information generation method described in any one of claim 1-3, described document comprises:
Secure two-dimensional code, the user profile in described secure two-dimensional code labeling document, making user profile acquisition device using under the specific service condition limiting the described secure two-dimensional code that parameter limits, obtaining described user profile by scanning described secure two-dimensional code;
Wherein, after the described secure two-dimensional code of generation, in the database storing described secure two-dimensional code, be assigned the unique identity of described secure two-dimensional code, and distribute by described unique identity and the use of the described secure two-dimensional code stored restriction parameter.
7. a user profile generating apparatus, is characterized in that, comprising:
Information acquisition unit, for obtaining the user profile that user provides;
Quick Response Code generation unit, for generating secure two-dimensional code according to described user profile, be the unique identify label of described secure two-dimensional code assign ment in the database storing described secure two-dimensional code, and be that described unique identify label distributes and stores use restriction parameter;
Wherein, described secure two-dimensional code is applied in document, making user profile acquisition device under the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, obtaining described user profile by scanning described secure two-dimensional code.
8. device according to claim 7, is characterized in that, described user profile generating apparatus also comprises:
Parametric distribution unit, for limiting parameter for described secure two-dimensional code assign ment uses, described use limits parameter and uses under given conditions for limiting described secure two-dimensional code, described use limits parameter and comprises: access times, the combination of any one or more than two in service time and place to use.
9. a user profile acquisition device, is characterized in that, comprising:
Scanning element, for in the network data base of storage security Quick Response Code, determine distributed unique identity, determine that the use of the described secure two-dimensional code that described unique identity is corresponding limits parameter, and when meeting the specific service condition of the described described secure two-dimensional code using restriction parameter to limit, the secure two-dimensional code in scanning document;
Decoding unit, for decoding to described secure two-dimensional code according to presetting rule;
User profile acquiring unit, obtains user profile for the result according to described decoding.
10. device according to claim 9, is characterized in that, described user profile acquiring unit specifically for:
Directly described user profile is obtained by decoding;
Or,
Object linking address is obtained, by user profile described in network to described Object linking address acquisition by decoding.
CN201210349206.6A 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus Active CN102930192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210349206.6A CN102930192B (en) 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210349206.6A CN102930192B (en) 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus

Publications (2)

Publication Number Publication Date
CN102930192A CN102930192A (en) 2013-02-13
CN102930192B true CN102930192B (en) 2016-02-03

Family

ID=47644989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210349206.6A Active CN102930192B (en) 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus

Country Status (1)

Country Link
CN (1) CN102930192B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3267357A1 (en) * 2016-07-07 2018-01-10 Hand Held Products, Inc. Energizing scanners

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237022A (en) * 2013-04-12 2013-08-07 江苏圆坤二维码研究院有限公司 Two-dimensional code logistics information safety method and cloud system
CN103473661A (en) * 2013-09-02 2013-12-25 深圳市华傲数据技术有限公司 Logistic encryption signing method and system
CN103440517A (en) * 2013-09-02 2013-12-11 章玺 Logistics information receipt using bar codes
CN104517130A (en) * 2013-09-26 2015-04-15 爱国者欧途欧(北京)网络科技有限公司 Code generation method
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN103699922A (en) * 2014-01-06 2014-04-02 立德高科(北京)数码科技有限责任公司 Logistics label with dot patterns, and method and system for querying logistics information
CN103886474A (en) * 2014-04-14 2014-06-25 湖南惠农科技有限公司 Product information processing method and device
CN104615786A (en) * 2015-03-04 2015-05-13 庞迪 Method and system for querying bus information based on two-dimensional codes
CN104933371B (en) * 2015-06-04 2018-06-22 南京邮电大学 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code
CN105184174A (en) * 2015-07-17 2015-12-23 中国科学院信息工程研究所 Export method and system for confidential inspection result
CN105234088A (en) * 2015-09-10 2016-01-13 岭南师范学院 Automatic express sorting and delivery dialing method
CN106557929A (en) * 2015-09-23 2017-04-05 阿里巴巴集团控股有限公司 Logistics information processing method and processing device
CN105234087B (en) * 2015-10-12 2018-04-17 杨彦明 A kind of express delivery automatic sorting method and system
CN109063492B (en) * 2018-07-05 2020-11-13 北京小米智能科技有限公司 Information processing method and device
CN112949801A (en) * 2021-01-29 2021-06-11 中北大学 Three-dimensional code based on micro-lens array, three-dimensional code generation method and three-dimensional code identification method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588435A (en) * 2004-09-22 2005-03-02 珠海金联安警用技术研究发展中心有限公司 Anti-fake bill processing system
CN102333051A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for obtaining contact information based on network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4058529B2 (en) * 2003-09-08 2008-03-12 株式会社デンソーウェーブ Optical information reader

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588435A (en) * 2004-09-22 2005-03-02 珠海金联安警用技术研究发展中心有限公司 Anti-fake bill processing system
CN102333051A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for obtaining contact information based on network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3267357A1 (en) * 2016-07-07 2018-01-10 Hand Held Products, Inc. Energizing scanners

Also Published As

Publication number Publication date
CN102930192A (en) 2013-02-13

Similar Documents

Publication Publication Date Title
CN102930192B (en) Security information generates and acquisition methods and relevant apparatus
CN100369059C (en) Matrix type two-dimensional bar code and its encoding and decoding method
CN101645081A (en) Method and system for tracing farm product information through two-dimension code
CN105447546A (en) Two-dimensional code capable of being embedded with large-ratio graph as well as coding and decoding method and device therefor
CN105976005A (en) Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device
CN101339599A (en) Method and terminal for obtaining two-dimension code
CN108256863A (en) The method of Quick Response Code generation, storage, identification and related encryption and decryption based on SE
Mandal et al. A new approach of text Steganography based on mathematical model of number system
CN102044010A (en) Method for realizing temporary vehicle number plate information data transmission by utilizing two-dimensional bar codes
CN104899748A (en) Two-dimensional code and scratch-off code composite identifying method based on identity authentication technology
CN102842053B (en) A kind of false proof figure code label and manufacture method thereof
CN103778453B (en) Writable two-dimensional bar code based on fault-tolerant mechanism and generating method thereof
CN109344940B (en) Three-dimensional lattice projection graph coding and decoding method for commodity outer package
CN111062456A (en) Two-dimensional code encryption algorithm
CN201518129U (en) Two-dimensional code information tracing system for agricultural product
CN103713968A (en) Method for recovering and checking RFID label data based on cloud storage technology
Ahlawat et al. A Review on QR Codes: Colored and Image Embedded.
Bunma et al. Using augment reality to increase capacity in QR code
CN102378984A (en) System for recovering data from an unreadable tag
US11157788B2 (en) Two-dimensional marker for marking an object, method and system for generating the marker, method and system for generating a marker code, and method and system for authenticating an object
Melgar et al. An alternative proposal of tracking products using digital signatures and QR codes
Sahu et al. Encryption in QR code using stegnography
CN202887227U (en) Anti-fake pattern code label
Wang et al. Robust image authentication scheme with self‐repair capability for greyscale source document images via PNG format
CN109242509A (en) Dot character information encoding-decoding method for commodity outer packing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant