CN104618334A - Method and system for generating and verifying dynamic two-dimensional code - Google Patents
Method and system for generating and verifying dynamic two-dimensional code Download PDFInfo
- Publication number
- CN104618334A CN104618334A CN201410844748.XA CN201410844748A CN104618334A CN 104618334 A CN104618334 A CN 104618334A CN 201410844748 A CN201410844748 A CN 201410844748A CN 104618334 A CN104618334 A CN 104618334A
- Authority
- CN
- China
- Prior art keywords
- dynamic
- dimension code
- code
- time
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention refers to the technical field of coding and decoding of a two-dimensional code, and particularly relates to a method for generating and verifying a dynamic two-dimensional code. The method for generating and verifying the dynamic two-dimensional code includes the following steps: generating the dynamic two-dimensional code according to original data input by a user and encrypting the data content of the dynamic two-dimensional code; applying a mobile terminal to scan the dynamic two-dimensional code and performing time verification, data decryption, inspection of data integrity and hardware information matching on one frame of obtained dynamic two-dimensional code data; if the whole inspections are passed, performing subsequent normal flows; otherwise, giving up the data. The dynamic two-dimensional code makes that every two-dimensional code image is dynamically encrypted and generated by using different secrete keys respectively within a period of time on the basis of an original QR Code; its content is encrypted through a security algorithm according with the national password standard and then mixed, so that the data transmission is safer.
Description
Technical field
The present invention relates to the coding and decoding technical field of Quick Response Code, particularly relate to a kind of dynamic two-dimension code and generate verification method and system.
Background technology
Along with science and technology and the development of network technology, particularly the popularizing of smart mobile phone in recent years, and the advancing by leaps and bounds of development of Mobile Internet technology, network information transfer has penetrated into the every aspect of people's life, as electronic business transaction, and social networks, network marketing, instant messaging etc.; Along with the generation of these business, Quick Response Code is large with its memory space, is easy to identify and resolve, and the feature such as to propagate fast on the internet, be used widely gradually at internet arena.
In recent years, along with popularizing of smart mobile phone, Internet of Things, mobile Internet undergoes an unusual development rapidly, a lot of enterprise and mechanism utilize Quick Response Code, traditional media carries out popularization and propaganda, as outdoor advertising, television advertising, and on the internet by Quick Response Code store company and mechanism external network address, serve URL etc., allow domestic consumer by smart mobile phone or mobile terminal device just energy rapid scanning identification Quick Response Code, and open the network address of company and mechanism fast and the URL of service is externally provided.
The maximum feature of development of Mobile Internet technology is simple operation, and transmission is rapidly, more powerful than traditional the Internet; A lot of enterprise and mechanism can carry out popularization and propaganda oneself by Internet Transmission instrument, as traditional instant communication software, BBS (Bulletin Board System), Web Community, blogs etc., in recent years along with the rise of social networks, microblogging, micro-letter can propagate all kinds of publicity and action message that enterprise and mechanism issue especially fast, and Quick Response Code, in the process of transmission, can be good at the effect of serving as transmission bridge and intermediary.
The cipher memory of existing most of information system at human brain, be stored in server-side database, constant at relatively long time internal fixtion, use same password during each login authentication, be called static password, be also static password.
In traditional static two dimensional code, the reusing of static password adds its risk of losing, revealing and being cracked, and reduces the coefficient of safety of information system.In a network environment, hacker, wooden horse and spreading unchecked of virus allow static password seem more fragile.
Summary of the invention
The object of the invention is to the deficiency overcoming above-mentioned technology, and provide a kind of dynamic two-dimension code to generate verification method and system, prevent image in 2 D code from maliciously being obtained, ensure its information security.
The present invention for achieving the above object, by the following technical solutions: a kind of dynamic two-dimension code generates verification method, it is characterized in that: comprising:
The Raw Data Generation dynamic two-dimension code image inputted according to user is also encrypted dynamic two-dimension code data content;
Utilize this dynamic two-dimension code of mobile terminal barcode scanning and certain the frame two-dimensional code data obtained is decrypted, advanced line time checking, if checking is not passed through, abandon this data, otherwise carry out data deciphering, checking mark code is in order to check data integrality and coupling hardware information, if verify by; carry out follow-up normal flow, otherwise abandon this data;
Wherein, the mode of described dynamic two-dimension code data content encryption is:
1) the dynamic two-dimension code formation component be deployed on terminal platform provides open interface, convenient called at any time in case with dynamic two-dimension code authentication server at least synchronous initial key A every day;
2) the dynamic two-dimension code formation component be deployed on terminal platform is synchronous by the communications protocol of standard with between dynamic two-dimension code authentication server, and its message content is encrypted, and gives tacit consent to known key encryption and decryption message with two ends;
3) dynamic two-dimension code authentication server is when receiving Quick Response Code content, intercept the assistant key M after the flag bit H be set in advance in Quick Response Code content, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, after M and initial key A is done cryptographic calculation, obtain real encryption and decryption key K;
Wherein, described time verifying is verified in the following manner:
1) dynamic two-dimension code formation component and dynamic two-dimension code authentication server exchange I effective time of initial key A and the every frame image data of dynamic two-dimension code, dynamic two-dimension code formation component record current its own system time ST1;
2) dynamic two-dimension code authentication server obtains initial key A and Dynamic Two-dimensional code data I effective time, server record current its own system time RT1;
3) user's executable operations, dynamic two-dimension code formation component generates a width image in 2 D code every the time of W;
4) calculate the time difference C1 of rise time ST2 and the ST1 of this width image in 2 D code current, C1 is as being expressly included in image in 2 D code;
5) dynamic two-dimension code authentication server receives image in 2 D code data, and current its own system time RT2 when record receives, is the time difference C2 of RT2 and RT1;
6) calculate the poor Q of C2 and C1, if Q is less than or equal to I, time verifying passes through, otherwise this frame 2 D code information lost efficacy.
Preferably, described dynamic two-dimension code image generates in the following manner:
1) dynamic two-dimension code formation component opens one for receiving the interface of user's input information:
User inputs an initial data, dynamic two-dimension code formation component can be cut into several substrings according to the initial data length of user's input, each substring inserts one or more dynamic factor, then a character string G is combined into, G is drawn character string B through MD5 computing, B will be used for dynamic two-dimension code validate service device confirmation integrality, the position that each dynamic factor inserts be formed a character string C and be placed in before G, and ending character string B being placed in G forms a new character string D;
2) character string D key K is obtained ciphertext E with security algorithm encryption;
3) in the beginning of ciphertext character string E, add mark prefix H, assistant key M, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, finally obtains F;
4) F is generated image in 2 D code according to the standard of QR code;
5) time interval W that the numerical value that dynamic two-dimension code formation component can input according to user convert as image in 2 D code, W is inputted by the interface that dynamic two-dimension code formation component is open, and dynamic two-dimension code formation component generates image in 2 D code every the W time according to above-mentioned steps.
Preferably, LOGO can be added in the middle of each frame image in 2 D code described or other are not more than the image of prescribed level.
A kind of dynamic two-dimension code generates verification system, it is characterized in that: comprise
Dynamic two-dimension code formation component, is encrypted dynamic two-dimension code data content for the Raw Data Generation dynamic two-dimension code image that inputs according to user;
Dynamic two-dimension code authentication server, for utilizing this dynamic two-dimension code of mobile terminal barcode scanning and certain the frame two-dimensional code data obtained being decrypted, advanced line time checking, if checking is not passed through, abandon this data, otherwise carry out data deciphering, checking mark code in order to check data integrality and coupling hardware information, if verification by; carry out follow-up normal flow, otherwise abandon this data;
Wherein, described dynamic two-dimension code data content cipher mode is:
1) the dynamic two-dimension code formation component be deployed on terminal platform provides open interface, convenient called at any time in case with dynamic two-dimension code authentication server at least synchronous initial key A every day;
2) the dynamic two-dimension code formation component be deployed on terminal platform is synchronous by the communications protocol of standard with between dynamic two-dimension code authentication server, and its message content is encrypted, and gives tacit consent to known key encryption and decryption message with two ends;
3) when receiving Quick Response Code content, intercept the assistant key M after the flag bit H be set in advance in Quick Response Code content, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, after M and initial key A is done cryptographic calculation, obtain real encryption and decryption key K;
Wherein, described time verifying is verified in the following manner:
1) dynamic two-dimension code formation component and dynamic two-dimension code authentication server exchange I effective time of initial key A and the every frame image data of dynamic two-dimension code, dynamic two-dimension code formation component record current its own system time ST1;
2) dynamic two-dimension code authentication server obtains initial key A and Dynamic Two-dimensional code data I effective time, server record current its own system time RT1;
3) user's executable operations, dynamic two-dimension code formation component generates a width image in 2 D code every the time of W;
4) calculate the time difference C1 of rise time ST2 and the ST1 of this width image in 2 D code current, C1 is as being expressly included in image in 2 D code;
5) dynamic two-dimension code authentication server receives image in 2 D code data, and current its own system time RT2 when record receives, is the time difference C2 of RT2 and RT1;
6) calculate the poor Q of C2 and C1, if Q is less than or equal to I, time verifying passes through, otherwise this frame 2 D code information lost efficacy.
Preferably, described dynamic two-dimension code image generates in the following manner:
1) dynamic two-dimension code formation component opens one for receiving the interface of user's input information:
User inputs an initial data, dynamic two-dimension code formation component can be cut into several substrings according to the initial data length of user's input, each substring inserts one or more dynamic factor, then a character string G is combined into, G is drawn character string B through MD5 computing, B will be used for dynamic two-dimension code validate service device confirmation integrality, the position that each dynamic factor inserts be formed a character string C and be placed in before G, and ending character string B being placed in G forms a new character string D;
2) character string D key K is obtained ciphertext E with security algorithm encryption;
3) in the beginning of ciphertext character string E, add mark prefix H, assistant key M, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, finally obtains F;
4) F is generated image in 2 D code according to the standard of QR code;
5) time interval W that the numerical value that dynamic two-dimension code formation component can input according to user convert as image in 2 D code, W is inputted by the interface that dynamic two-dimension code formation component is open, and dynamic two-dimension code formation component generates image in 2 D code every the W time according to above-mentioned steps.
Preferably, LOGO can be added in the middle of each frame image in 2 D code described or other are not more than the image of prescribed level.
The invention has the beneficial effects as follows: dynamic two-dimension code of the present invention is on the basis of former QR Code code, make within a period of time, multiple different image in 2 D code constantly switch, each width image in 2 D code generates by different key dynamic encryption respectively, general Quick Response Code code reader can not scan its true content, its content is the security algorithm encryption by meeting state's Data Encryption Standard and the content after obscuring, and makes transfer of data safer; And with the addition of time verifying mechanism on this basis, guarantee that the information that each frame image in 2 D code comprises is only effective within a period of time, based on above 2 points, even if image in 2 D code is maliciously obtained, also can ensure its information security.
Accompanying drawing explanation
Fig. 1 is that dynamic two-dimension code generates and checking flow chart;
Fig. 2 is dynamic two-dimension code verification system structure chart.
Embodiment
Describe the specific embodiment of the present invention in detail below in conjunction with accompanying drawing and preferred embodiment, this patent is on the basis based on former static two dimensional code, provide one safer, more reliable Quick Response Code generates and verification technique-dynamic two-dimension code.
Dynamic two-dimension code image by one can cross-platform deployment assembly generate, this assembly can be deployed on multiple hardwares carrier, ATM, PC, web browser etc.This assembly mainly realizes following function:
1. data encryption:
In order to prevent Quick Response Code content from being resolved by general Quick Response Code code reader, need to be encrypted Quick Response Code content.Encryption method adopts the security algorithm encryption meeting state's Data Encryption Standard.
1) the dynamic two-dimension code formation component be deployed on terminal platform provides open interface, convenient called at any time in case with dynamic two-dimension code authentication server at least synchronous initial key A every day.
2) the dynamic two-dimension code formation component be deployed on terminal platform is synchronous by the communications protocol of standard with between dynamic two-dimension code authentication server, and its message content is encrypted, and gives tacit consent to known key encryption and decryption message with two ends.
3) when receiving Quick Response Code content, intercept the assistant key M after the flag bit H be set in advance in Quick Response Code content, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, after M and initial key A is done cryptographic calculation, obtain real encryption and decryption key K.
2. dynamic two-dimension code Computer image genration:
1) dynamic two-dimension code formation component opens one for receiving the interface of user's input information:
User inputs an initial data, dynamic two-dimension code formation component can be cut into several substrings according to the initial data length of user's input, each substring inserts one or more dynamic factor, then a character string G is combined into, G is drawn character string B through MD5 computing, B will be used for dynamic two-dimension code validate service device confirmation integrality, the position that each dynamic factor inserts be formed a character string C and be placed in before G, and ending character string B being placed in G forms a new character string D.
2) character string D key K is obtained ciphertext E with security algorithm encryption.
3) in the beginning of ciphertext character string E, add mark prefix H (being generally the identification character using mechanism), assistant key M, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, finally obtains F.
4) F is generated image in 2 D code according to the standard of QR code.
5) time interval W that the numerical value that dynamic two-dimension code formation component can input according to user convert as image in 2 D code, W is inputted by the interface that dynamic two-dimension code formation component is open.Dynamic two-dimension code formation component generates image in 2 D code every the W time according to above-mentioned steps.
6) LOGO can be added in the middle of each frame image in 2 D code or other are not more than the image of prescribed level.
3. time verifying mechanism:
1) I effective time that dynamic two-dimension code formation component on terminal platform and dynamic two-dimension code authentication server exchange initial key A and the every frame image data of dynamic two-dimension code is deployed in.Dynamic two-dimension code formation component record current its own system time ST1.
2) dynamic two-dimension code authentication server obtains initial key A and Dynamic Two-dimensional code data I effective time.Server record current its own system time RT1.
3) user's executable operations, dynamic two-dimension code formation component generates a width image in 2 D code every the time of W.
4) calculate the time difference C1 of rise time ST2 and the ST1 of this width image in 2 D code current, C1 is as being expressly included in image in 2 D code.
5) dynamic two-dimension code authentication server receives image in 2 D code data, current its own system time RT2 when record receives.Be the time difference C2 of RT2 and RT1.
6) calculate the poor Q of C2 and C1, if Q is less than or equal to I, time verifying passes through, otherwise this frame 2 D code information lost efficacy.
4. operating procedure:
1) the Raw Data Generation dynamic two-dimension code image that the dynamic two-dimension code formation component on terminal platform inputs according to user is deployed in.(as: computer end)
2) be equipped with specific program this dynamic two-dimension code of mobile scanning terminal and certain the frame two-dimensional code data obtained is mail to dynamic two-dimension code authentication server deciphering.(as: mobile phone terminal)
3) dynamic two-dimension code authentication server carries out time verifying, if be verified, to decrypt data, otherwise abandons this data.
4) dynamic two-dimension code authentication server data decryption, checking mark code in order to check data integrality and coupling hardware information, if verification by; perform next step, otherwise abandon this data.
5) critical data that last solution ciphertext data is dynamic two-dimension code generation side is obtained.
The present embodiment is for ATM (ATM), dynamic two-dimension code formation component is deployed in ATM, the form that the predefined dynamic two-dimension code transaction application programs comprising dynamic two-dimension code scan function is applied with mobile phone is deployed in the program storage of smart mobile phone.
Composition graphs 1, dynamic two-dimension code generates and checking flow chart, and concrete process of exchange is:
Step 1, user select on ATM and perform adopt dynamic two-dimension code without bank card business dealing function time, ATM generates dynamic two-dimension code image according to above-mentioned Dynamic Two-dimensional code generating method, table 1-1 is that dynamic two-dimension code dynamic factor inserts example table, in the dynamic two-dimension code image finally obtained, wherein the value that comprises of a certain two field picture for (each frame dynamic two-dimension code image to comprise the data after encryption be different, but its initial data is consistent): ATMC0113460730EB9F93C3E66D2584C07DBEABEF4CA6C4448C39B1B9 315FC105B2EEA9C483F9945CB49BE5B7796CE04EE965E6F4F28315A4 D0C785F99AB2A90F05402AF75E3AB6F805028CED5B22723CA136F603 E7A01FFF44776735C82D6516993AABE7177D05EF28F732327D3C76E1 931F8D3F714889
Table 1-1 Dynamic Two-dimensional Code Element dynamic factor inserts example table
Figure place | Random number number | Example | The relative position inserted | Inserted value | Result | |
Bank number belonging to ATM | 12 | 2 | 873400150323 | 5 9 | 6 9 | 87346001950323 |
Transaction journal number | 8 | 1 | 22375536 | 7 | 6 | 223755636 |
The Quick Response Code date of formation | 8 | 1 | 20140806 | 4 | 2 | 201240806 |
The Quick Response Code rise time | 6 | 1 | 120847 | 2 | 3 | 1320847 |
ATM numbers | 8 | 1 | 15000000 | 3 | 6 | 156000000 |
Dealing money | 12 | 2 | 000000120000 | 6 9 | 3 8 | 00000301820000 |
Step 2, user use it to be mounted to APP application scan dynamic two-dimension code image in mobile phone, are transmitted to dynamic two-dimension code authentication server after obtaining information
Step 3, dynamic two-dimension code authentication server carry out time verifying, by after be decrypted, otherwise abandon this data.
Data integrity after step 4, dynamic two-dimension code authentication server checking deciphering, legitimacy, match user performs the ATM hardware information of transaction.
Step 5, acquisition generation side critical data: 87,346,001,950,323,223,755,636,201,240,806,132,084,715,600,000,000,000,301 820000.
Local zone time due to every platform ATM may be all inconsistent, certainly they also may be inconsistent with the local zone time of dynamic two-dimension code authentication server, so devise the verification method based on the time difference above, such server need not record separately the local time information of every platform ATM terminal, thus simplifies system.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (6)
1. dynamic two-dimension code generates a verification method, it is characterized in that: comprising:
The Raw Data Generation dynamic two-dimension code image inputted according to user is also encrypted dynamic two-dimension code data content;
Utilize this dynamic two-dimension code of mobile terminal barcode scanning and certain the frame two-dimensional code data obtained is decrypted, advanced line time checking, if checking is not passed through, abandon this data, otherwise carry out data deciphering, checking mark code is in order to check data integrality and coupling hardware information, if verify by; carry out follow-up normal flow, otherwise abandon this data;
Wherein, the mode of described dynamic two-dimension code data content encryption is:
1) the dynamic two-dimension code formation component be deployed on terminal platform provides open interface, convenient called at any time in case with dynamic two-dimension code authentication server at least synchronous initial key A every day;
2) the dynamic two-dimension code formation component be deployed on terminal platform is synchronous by the communications protocol of standard with between dynamic two-dimension code authentication server, and its message content is encrypted, and gives tacit consent to known key encryption and decryption message with two ends;
3) dynamic two-dimension code authentication server is when receiving Quick Response Code content, intercept the assistant key M after the flag bit H be set in advance in Quick Response Code content, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, after M and initial key A is done cryptographic calculation, obtain real encryption and decryption key K;
Wherein, described time verifying is verified in the following manner:
1) dynamic two-dimension code formation component and dynamic two-dimension code authentication server exchange I effective time of initial key A and the every frame image data of dynamic two-dimension code; Dynamic two-dimension code formation component record current its own system time ST1;
2) dynamic two-dimension code authentication server obtains initial key A and Dynamic Two-dimensional code data I effective time; Server record current its own system time RT1;
3) user's executable operations, dynamic two-dimension code formation component generates a width image in 2 D code every the time of W;
4) calculate the time difference C1 of rise time ST2 and the ST1 of this width image in 2 D code current, C1 is as being expressly included in image in 2 D code;
5) dynamic two-dimension code authentication server receives image in 2 D code data, and current its own system time RT2 when record receives, is the time difference C2 of RT2 and RT1;
6) calculate the poor Q of C2 and C1, if Q is less than or equal to I, time verifying passes through, otherwise this frame 2 D code information lost efficacy.
2. dynamic two-dimension code according to claim 1 generates verification method, it is characterized in that: described dynamic two-dimension code image generates in the following manner:
1) dynamic two-dimension code formation component opens one for receiving the interface of user's input information:
User inputs an initial data, dynamic two-dimension code formation component can be cut into several substrings according to the initial data length of user's input, each substring inserts one or more dynamic factor, then a character string G is combined into, G is drawn character string B through MD5 computing, B will be used for dynamic two-dimension code validate service device confirmation integrality, the position that each dynamic factor inserts be formed a character string C and be placed in before G, and ending character string B being placed in G forms a new character string D;
2) character string D key K is obtained ciphertext E with security algorithm encryption;
3) in the beginning of ciphertext character string E, add mark prefix H, assistant key M, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, finally obtains F;
4) F is generated image in 2 D code according to the standard of QR code;
5) time interval W that the numerical value that dynamic two-dimension code formation component can input according to user convert as image in 2 D code, W is inputted by the interface that dynamic two-dimension code formation component is open, and dynamic two-dimension code formation component generates image in 2 D code every the time of W according to above-mentioned steps.
3. dynamic two-dimension code according to claim 2 generates verification method, it is characterized in that: can add LOGO in the middle of each frame image in 2 D code described or other are not more than the image of prescribed level.
4. dynamic two-dimension code generates a verification system, it is characterized in that: comprise
Dynamic two-dimension code formation component, is encrypted dynamic two-dimension code data content for the Raw Data Generation dynamic two-dimension code image that inputs according to user;
Dynamic two-dimension code authentication server, for utilizing this dynamic two-dimension code of mobile terminal barcode scanning and certain the frame two-dimensional code data obtained being decrypted, advanced line time checking, if checking is not passed through, abandon this data, otherwise carry out data deciphering, checking mark code in order to check data integrality and coupling hardware information, if verification by; carry out follow-up normal flow, otherwise abandon this data;
Wherein, described dynamic two-dimension code data content cipher mode is:
1) the dynamic two-dimension code formation component be deployed on terminal platform provides open interface, convenient called at any time in case with dynamic two-dimension code authentication server at least synchronous initial key A every day;
2) the dynamic two-dimension code formation component be deployed on terminal platform is synchronous by the communications protocol of standard with between dynamic two-dimension code authentication server, and its message content is encrypted, and gives tacit consent to known key encryption and decryption message with two ends;
3) dynamic two-dimension code authentication server is when receiving Quick Response Code content, intercept the assistant key M after the flag bit H be set in advance in Quick Response Code content, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, after M and initial key A is done cryptographic calculation, obtain real encryption and decryption key K;
Wherein, described time verifying is verified in the following manner:
1) dynamic two-dimension code formation component and dynamic two-dimension code authentication server exchange I effective time of initial key A and the every frame image data of dynamic two-dimension code; Dynamic two-dimension code formation component record current its own system time ST1;
2) dynamic two-dimension code authentication server obtains initial key A and Dynamic Two-dimensional code data I effective time, server record current its own system time RT1;
3) user's executable operations, dynamic two-dimension code formation component generates a width image in 2 D code every the time of W;
4) calculate the time difference C1 of rise time ST2 and the ST1 of this width image in 2 D code current, C1 is as being expressly included in image in 2 D code;
5) dynamic two-dimension code authentication server receives image in 2 D code data, and current its own system time RT2 when record receives, is the time difference C2 of RT2 and RT1;
6) calculate the poor Q of C2 and C1, if Q is less than or equal to I, time verifying passes through, otherwise this frame 2 D code information lost efficacy.
5. dynamic two-dimension code according to claim 4 generates verification system, it is characterized in that: described dynamic two-dimension code image generates in the following manner:
1) dynamic two-dimension code formation component opens one for receiving the interface of user's input information:
User inputs an initial data, dynamic two-dimension code formation component can be cut into several substrings according to the initial data length of user's input, each substring inserts one or more dynamic factor, then a character string G is combined into, G is drawn character string B through MD5 computing, B will be used for dynamic two-dimension code validate service device confirmation integrality, the position that each dynamic factor inserts be formed a character string C and be placed in before G, and ending character string B being placed in G forms a new character string D;
2) character string D key K is obtained ciphertext E with security algorithm encryption;
3) in the beginning of ciphertext character string E, add mark prefix H, assistant key M, wherein, M is the time difference C1 of the rise time ST2 of image in 2 D code and dynamic two-dimension code formation component current its own system time ST1 when exchanging key, finally obtains F;
4) F is generated image in 2 D code according to the standard of QR code;
5) time interval W that the numerical value that dynamic two-dimension code formation component can input according to user convert as image in 2 D code, W is inputted by the interface that dynamic two-dimension code formation component is open, and dynamic two-dimension code formation component generates image in 2 D code every the W time according to above-mentioned steps.
6. dynamic two-dimension code according to claim 5 generates verification system, it is characterized in that: can add LOGO in the middle of each frame image in 2 D code described or other are not more than the image of prescribed level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410844748.XA CN104618334A (en) | 2014-12-29 | 2014-12-29 | Method and system for generating and verifying dynamic two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410844748.XA CN104618334A (en) | 2014-12-29 | 2014-12-29 | Method and system for generating and verifying dynamic two-dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104618334A true CN104618334A (en) | 2015-05-13 |
Family
ID=53152610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410844748.XA Pending CN104618334A (en) | 2014-12-29 | 2014-12-29 | Method and system for generating and verifying dynamic two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104618334A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105162764A (en) * | 2015-07-30 | 2015-12-16 | 北京石盾科技有限公司 | Dual authentication method, system and device for SSH safe login |
CN105426765A (en) * | 2015-07-09 | 2016-03-23 | 深圳百云信息技术有限公司 | Two-dimensional code dynamic encryption and decryption algorithm |
CN106650849A (en) * | 2016-12-23 | 2017-05-10 | 广州酷狗计算机科技有限公司 | Data transmission method, device and system |
CN106934608A (en) * | 2017-03-13 | 2017-07-07 | 张福生 | Polymorphic Quick Response Code synthesizes to exempt to sign with user exempts from close method of commerce |
CN106981012A (en) * | 2017-03-21 | 2017-07-25 | 上海动联信息技术股份有限公司 | A kind of dynamic two-dimension code order generation method and equipment |
CN107169540A (en) * | 2017-05-11 | 2017-09-15 | 北京京东尚科信息技术有限公司 | The information transmission system, method and apparatus |
CN107395581A (en) * | 2017-07-11 | 2017-11-24 | 上海众人网络安全技术有限公司 | Quick Response Code generates and read method, device, system, equipment and storage medium |
CN108010174A (en) * | 2018-01-08 | 2018-05-08 | 江门市奕钊科技有限公司 | Access control system control method based on Quick Response Code, apparatus and system |
CN108134790A (en) * | 2017-12-21 | 2018-06-08 | 知而行(上海)营销咨询有限公司 | A kind of customer identification information processing method |
CN108270736A (en) * | 2016-12-30 | 2018-07-10 | ***通信集团内蒙古有限公司 | A kind of method for interchanging data and device |
CN108416400A (en) * | 2018-01-31 | 2018-08-17 | 杭州晟元数据安全技术股份有限公司 | A kind of method of payment and payment system based on dynamic two-dimension code |
CN108460442A (en) * | 2018-03-12 | 2018-08-28 | 北京知道创宇信息技术有限公司 | Color 2 D code generating method and device |
CN108881121A (en) * | 2017-05-12 | 2018-11-23 | 慧荣兴科技成都有限公司 | A kind of P2P credit based on mobile Internet mutually sees system and method |
CN108960385A (en) * | 2018-06-29 | 2018-12-07 | 苏州酷豆物联科技有限公司 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
CN109344947A (en) * | 2018-10-25 | 2019-02-15 | 福建昇兴云物联网科技有限公司 | Digital content generation method, two-dimensional code generation method and the recognition methods of two dimensional code |
CN109726578A (en) * | 2019-01-22 | 2019-05-07 | 江苏哩咕信息科技有限公司 | A kind of anti-fake solution of novel dynamic two-dimension code |
CN110298421A (en) * | 2019-06-26 | 2019-10-01 | 云宝宝大数据产业发展有限责任公司 | A kind of online generation, offline generation and the verification method and device of two dimensional code |
CN110365501A (en) * | 2019-08-20 | 2019-10-22 | 广州华多网络科技有限公司 | The method and device that processing is added in group is carried out based on graphic code |
CN111104629A (en) * | 2019-11-26 | 2020-05-05 | 广州羊城通有限公司 | Verification method and device of dynamic two-dimensional code |
CN112716508A (en) * | 2019-10-14 | 2021-04-30 | 上海西门子医疗器械有限公司 | Verification method of handheld control device and medical imaging system |
US11263416B2 (en) | 2018-02-07 | 2022-03-01 | Beijing Sankuai Online Technology Co., Ltd | Two-dimensional code generation and identification |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878057A (en) * | 2005-06-07 | 2006-12-13 | 王向东 | Composition of encrypted two dimensional bar codes and application method therefor |
US20120096277A1 (en) * | 2009-04-20 | 2012-04-19 | Alter Core, S.L. | System and method for personal authentication using a mobile device |
CN103152172A (en) * | 2011-12-07 | 2013-06-12 | 中国电信股份有限公司 | Method and client side and server and system for mobile token dynamic password generation |
CN103198344A (en) * | 2013-03-01 | 2013-07-10 | 重庆市远大印务有限公司 | Tax-control safety two-dimensional code encoding and decoding processing method |
CN103955982A (en) * | 2014-05-22 | 2014-07-30 | 国家电网公司 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
-
2014
- 2014-12-29 CN CN201410844748.XA patent/CN104618334A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878057A (en) * | 2005-06-07 | 2006-12-13 | 王向东 | Composition of encrypted two dimensional bar codes and application method therefor |
US20120096277A1 (en) * | 2009-04-20 | 2012-04-19 | Alter Core, S.L. | System and method for personal authentication using a mobile device |
CN103152172A (en) * | 2011-12-07 | 2013-06-12 | 中国电信股份有限公司 | Method and client side and server and system for mobile token dynamic password generation |
CN103198344A (en) * | 2013-03-01 | 2013-07-10 | 重庆市远大印务有限公司 | Tax-control safety two-dimensional code encoding and decoding processing method |
CN103955982A (en) * | 2014-05-22 | 2014-07-30 | 国家电网公司 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426765A (en) * | 2015-07-09 | 2016-03-23 | 深圳百云信息技术有限公司 | Two-dimensional code dynamic encryption and decryption algorithm |
CN105162764A (en) * | 2015-07-30 | 2015-12-16 | 北京石盾科技有限公司 | Dual authentication method, system and device for SSH safe login |
CN106650849A (en) * | 2016-12-23 | 2017-05-10 | 广州酷狗计算机科技有限公司 | Data transmission method, device and system |
CN108270736A (en) * | 2016-12-30 | 2018-07-10 | ***通信集团内蒙古有限公司 | A kind of method for interchanging data and device |
CN106934608A (en) * | 2017-03-13 | 2017-07-07 | 张福生 | Polymorphic Quick Response Code synthesizes to exempt to sign with user exempts from close method of commerce |
CN106981012A (en) * | 2017-03-21 | 2017-07-25 | 上海动联信息技术股份有限公司 | A kind of dynamic two-dimension code order generation method and equipment |
CN107169540A (en) * | 2017-05-11 | 2017-09-15 | 北京京东尚科信息技术有限公司 | The information transmission system, method and apparatus |
CN107169540B (en) * | 2017-05-11 | 2020-11-24 | 北京京东尚科信息技术有限公司 | Information transmission system, method and device |
CN108881121A (en) * | 2017-05-12 | 2018-11-23 | 慧荣兴科技成都有限公司 | A kind of P2P credit based on mobile Internet mutually sees system and method |
CN108881121B (en) * | 2017-05-12 | 2021-11-26 | 慧荣兴科技成都有限公司 | P2P credit mutual-watching system and method based on mobile internet |
CN107395581B (en) * | 2017-07-11 | 2020-11-17 | 上海众人网络安全技术有限公司 | Two-dimensional code generation and reading method, device, system, equipment and storage medium |
CN107395581A (en) * | 2017-07-11 | 2017-11-24 | 上海众人网络安全技术有限公司 | Quick Response Code generates and read method, device, system, equipment and storage medium |
CN108134790A (en) * | 2017-12-21 | 2018-06-08 | 知而行(上海)营销咨询有限公司 | A kind of customer identification information processing method |
CN108010174A (en) * | 2018-01-08 | 2018-05-08 | 江门市奕钊科技有限公司 | Access control system control method based on Quick Response Code, apparatus and system |
CN108416400A (en) * | 2018-01-31 | 2018-08-17 | 杭州晟元数据安全技术股份有限公司 | A kind of method of payment and payment system based on dynamic two-dimension code |
US11263416B2 (en) | 2018-02-07 | 2022-03-01 | Beijing Sankuai Online Technology Co., Ltd | Two-dimensional code generation and identification |
CN108460442A (en) * | 2018-03-12 | 2018-08-28 | 北京知道创宇信息技术有限公司 | Color 2 D code generating method and device |
CN108460442B (en) * | 2018-03-12 | 2021-06-08 | 北京知道创宇信息技术股份有限公司 | Color two-dimensional code generation method and device |
CN108960385A (en) * | 2018-06-29 | 2018-12-07 | 苏州酷豆物联科技有限公司 | Two dimensional code generation and verification method and system based on the encryption of multiple code key |
CN109344947A (en) * | 2018-10-25 | 2019-02-15 | 福建昇兴云物联网科技有限公司 | Digital content generation method, two-dimensional code generation method and the recognition methods of two dimensional code |
CN109726578A (en) * | 2019-01-22 | 2019-05-07 | 江苏哩咕信息科技有限公司 | A kind of anti-fake solution of novel dynamic two-dimension code |
CN110298421A (en) * | 2019-06-26 | 2019-10-01 | 云宝宝大数据产业发展有限责任公司 | A kind of online generation, offline generation and the verification method and device of two dimensional code |
CN110298421B (en) * | 2019-06-26 | 2023-11-03 | 云宝宝大数据产业发展有限责任公司 | Online generation, offline generation and verification method and device for two-dimensional code |
CN110365501A (en) * | 2019-08-20 | 2019-10-22 | 广州华多网络科技有限公司 | The method and device that processing is added in group is carried out based on graphic code |
CN110365501B (en) * | 2019-08-20 | 2021-06-18 | 广州华多网络科技有限公司 | Method and device for group joining processing based on graphic code |
CN112716508A (en) * | 2019-10-14 | 2021-04-30 | 上海西门子医疗器械有限公司 | Verification method of handheld control device and medical imaging system |
CN111104629A (en) * | 2019-11-26 | 2020-05-05 | 广州羊城通有限公司 | Verification method and device of dynamic two-dimensional code |
CN111104629B (en) * | 2019-11-26 | 2023-04-11 | 广州羊城通有限公司 | Verification method and device of dynamic two-dimensional code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
TWI683567B (en) | Security verification method, device, server and terminal | |
Liao et al. | A novel user authentication scheme based on QR-code | |
CN104835046B (en) | A kind of data false distinguishing method for two-dimension code safe verification | |
KR102323805B1 (en) | Apparatus for authentication and payment based on web, method for authentication and payment based on web, system for authentication and payment based on web and computer readable medium having computer program recorded therefor | |
CN109766979B (en) | Two-dimensional code generation method, verification method and device | |
US20200313882A1 (en) | Method for realizing network electronic identity identification information protection based on key dispersion calculation | |
US20140331291A1 (en) | Method for generating and check-controlling network identity indentification code in network electronic identification card | |
CN104392354A (en) | Association and retrieval method and system used for public key addresses and user accounts of crypto-currency | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
CN105515783A (en) | Identity authentication method, server and authentication terminal | |
CN102790767B (en) | Information safety control method, information safety display equipment and electronic trading system | |
CN107196840B (en) | Data processing method, device and equipment | |
CN104464117A (en) | Automatic tell machine money withdrawing method and system based on dynamic two-dimensional code | |
CN105025019A (en) | Data safety sharing method | |
CN105306211A (en) | Identity authentication method for client software | |
CN104050431A (en) | Self-signing method and self-signing device for RFID chips | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN103237305A (en) | Password protection method for smart card on mobile terminals | |
CN106027228A (en) | Encryption and decryption methods and encryption and decryption systems for webpage identification | |
CN105187389A (en) | Webpage access method and system based on digital mixed encryption | |
CN103685255A (en) | File encryption method based on two-dimension code scanning | |
CN102624687A (en) | Networking program user authentication method based on mobile terminal | |
CN102404337A (en) | Data encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20180914 |