CN107454038A - A kind of method that Data Encryption Transmission is carried out by Quick Response Code - Google Patents

A kind of method that Data Encryption Transmission is carried out by Quick Response Code Download PDF

Info

Publication number
CN107454038A
CN107454038A CN201610371494.3A CN201610371494A CN107454038A CN 107454038 A CN107454038 A CN 107454038A CN 201610371494 A CN201610371494 A CN 201610371494A CN 107454038 A CN107454038 A CN 107454038A
Authority
CN
China
Prior art keywords
quick response
response code
data
code sequence
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610371494.3A
Other languages
Chinese (zh)
Other versions
CN107454038B (en
Inventor
贾利滨
赵晓辉
刘岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinchuang Great Wall Beijing Technology Co ltd
Original Assignee
Beijing Military Source Joint Scientific And Technological Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Military Source Joint Scientific And Technological Development Co Ltd filed Critical Beijing Military Source Joint Scientific And Technological Development Co Ltd
Priority to CN201610371494.3A priority Critical patent/CN107454038B/en
Publication of CN107454038A publication Critical patent/CN107454038A/en
Application granted granted Critical
Publication of CN107454038B publication Critical patent/CN107454038B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Facsimile Transmission Control (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method that Data Encryption Transmission is carried out by Quick Response Code, including:Transmitting terminal shows the first checking Quick Response Code;Receiving terminal scanning the first checking Quick Response Code, is identified to the described first checking Quick Response Code, generates and show the second checking Quick Response Code;Transmitting terminal scanning the second checking Quick Response Code, is identified to the described second checking Quick Response Code, obtains the data for needing to transmit, and the data is parsed into generation Quick Response Code sequence, and show the Quick Response Code sequence;Receiving terminal scans the Quick Response Code sequence, and parsing obtains the information that the Quick Response Code sequence includes.Due to having carried out identification and confirmation in each stage of information transfer, and the data transmitted to needs are encrypted, and are then transmitted by Quick Response Code, and the safety coefficient of information transfer is improved while ensureing that transmission means is simple and convenient.

Description

A kind of method that Data Encryption Transmission is carried out by Quick Response Code
Technical field
The present invention relates to field of information transmission, particularly relate to a kind of carry out Data Encryption Transmission by Quick Response Code Method.
Background technology
As mobile terminal and Wearable user are more and more, passed through between mobile terminal and Wearable Often need to transmit various data files.At present, between mobile terminal and various Wearables file transmission Method largely for the mode based on bluetooth and relies on network mode.Although both modes can meet Under certain condition transmit file needs, but its all there is different shortcomings or limitation.Wherein, based on indigo plant The mode of tooth has that interaction is cumbersome, is paired into that power is low, tends to have the problem of interference, relies on network and account Mode can not be transmitted under without network condition, to user limit it is very high, inconvenient for use, transmission quality is low, The problems such as transmission complex operation be present in the problem of consumed flow, on the whole, the transmission method of existing file.
On the other hand, file content directly transmits, and when receiving terminal is unexpected receiving terminal, easily causes text The problem of part content obtains unexpected receiving terminal, the use to user brings many inconvenience.
Although the method that information transfer is carried out using Quick Response Code in the prior art be present, safety coefficient is transmitted It is low, it is impossible to which that the data of effective guarantee user transmission are not compromised.
The content of the invention
In view of this, it is an object of the invention to propose it is a kind of based on Quick Response Code it is simple, conveniently, safety system The high information transferring method of number.
Based on a kind of above-mentioned purpose method that Data Encryption Transmission is carried out by Quick Response Code provided by the invention, bag Include:
Transmitting terminal shows the first checking Quick Response Code;
Receiving terminal scanning the first checking Quick Response Code, is identified to the described first checking Quick Response Code, generates And show the second checking Quick Response Code;
Transmitting terminal scanning the second checking Quick Response Code, is identified to the described second checking Quick Response Code, transfers The data transmitted are needed, the data are parsed into generation Quick Response Code sequence, and show the Quick Response Code sequence;
Receiving terminal scans the Quick Response Code sequence, and parsing obtains the data that the Quick Response Code sequence includes.
Further, the second checking Quick Response Code includes identification information and encrypted public key, the encryption Public key is used to the data for needing to transmit be encrypted, and then parses and generate the Quick Response Code sequence.
Further, the process that the data are parsed to generation Quick Response Code sequence includes:
Parsing encryption is carried out to the data for needing to transmit according to the encrypted public key, by the data after encryption Generate Quick Response Code sequence.
Further, after the generation Quick Response Code sequence, in addition to:
The two-dimension code image included to the Quick Response Code sequence is numbered, and continuous series is generated, in the number Some random digits of radom insertion in row, the length for making the ordered series of numbers after insertion random digit are square number, according to Ordered series of numbers generation square formation after the insertion random digit, unit matrix is turned to by the square formation, and by the change of square formation Transformation matrix generation two-dimension code image during changing, by the two-dimension code image in the Quick Response Code sequence and The order rearrangement of the two-dimension code image generated according to transformation matrix generates new Quick Response Code sequence and shows the One two-dimension code image.
Further, receiving terminal completes the scanning to a two-dimension code image in the new Quick Response Code sequence, The 3rd checking Quick Response Code is shown, the 3rd checking Quick Response Code includes identification information and prompting is completed in scanning Information.
Further, transmitting terminal scanning the 3rd checking Quick Response Code, is parsed to the 3rd Quick Response Code, After confirming the scanning that receiving terminal completes two-dimension code image, the two dimension in the new Quick Response Code sequences of next Zhang Suoshu is shown Code picture.
Further, after receiving terminal scans the Quick Response Code sequence, generated according to described according to transformation matrix Two-dimension code image reduce the square formation, further reduce the continuous series, delete the random number, root The two-dimension code image received is ranked up according to the continuous series, reduces the Quick Response Code sequence, is utilized Encryption key is decrypted to the Quick Response Code sequence, obtains the data.
A kind of Data Encryption Transmission is carried out by Quick Response Code from the above it can be seen that provided by the invention Method, including:Transmitting terminal shows the first checking Quick Response Code;Receiving terminal scanning the first checking Quick Response Code, Described first checking Quick Response Code is identified, generates and shows the second checking Quick Response Code;Transmitting terminal scans institute The second checking Quick Response Code is stated, the described second checking Quick Response Code is identified, obtains the data for needing to transmit, The data are parsed into generation Quick Response Code sequence, and show the Quick Response Code sequence;Receiving terminal scanning described two Code sequence is tieed up, parsing obtains the information that the Quick Response Code sequence includes.Due to each stage in information transfer Identification and confirmation are carried out, and the data transmitted to needs are encrypted, and are then passed by Quick Response Code It is defeated, the safety coefficient of information transfer is improved while ensureing that transmission means is simple and convenient.
Brief description of the drawings
Fig. 1 is the schematic diagram of method one embodiment that the present invention carries out Data Encryption Transmission by Quick Response Code;
Fig. 2 is the reality for one preferred embodiment of method that the present invention carries out Data Encryption Transmission by Quick Response Code Illustration is applied to be intended to.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with specific embodiment, And referring to the drawings, the present invention is described in more detail.
As shown in figure 1, carry out method one embodiment of Data Encryption Transmission by Quick Response Code for the present invention Schematic diagram.In the present embodiment, the method bag provided by the invention that Data Encryption Transmission is carried out by Quick Response Code Include following steps:
Step 101:When information transfer starts, transmitting terminal shows the first checking Quick Response Code, and described first tests Demonstrate,proving Quick Response Code includes the identification information and data transfer initiation identification information of transmitting terminal.
Step 102:Receiving terminal scanning the first checking Quick Response Code, is carried out to the described first checking Quick Response Code Identification, generates and shows the second checking Quick Response Code, and receiving terminal obtains the identity information of transmitting terminal and data pass After defeated initiation identification information, generate and show the second checking Quick Response Code.
Step 103:Transmitting terminal scanning the second checking Quick Response Code, is carried out to the described second checking Quick Response Code Identification, the data for needing to transmit are transferred, the data are parsed into generation Quick Response Code sequence, and show described two Tie up code sequence.
Step 104:Receiving terminal scans the Quick Response Code sequence, and parsing obtains what the Quick Response Code sequence included Data.
In the present embodiment, the second checking Quick Response Code includes identification information and encrypted public key, described Encrypted public key is used to the data for needing to transmit be encrypted, and then parses and generate the Quick Response Code sequence.
Preferably, the process that the data are parsed to generation Quick Response Code sequence includes:
Parsing encryption is carried out to the data for needing to transmit according to the encrypted public key, by the data after encryption Generate Quick Response Code sequence.
In addition, after the generation Quick Response Code sequence, in addition to:
The two-dimension code image included to the Quick Response Code sequence is numbered, and continuous series is generated, in the number Some random digits of radom insertion in row, the length for making the ordered series of numbers after insertion random digit are square number, according to Ordered series of numbers generation square formation after the insertion random digit, unit matrix is turned to by the square formation, and by the change of square formation Transformation matrix generation two-dimension code image during changing, by the two-dimension code image in the Quick Response Code sequence and The order rearrangement of the two-dimension code image generated according to transformation matrix generates new Quick Response Code sequence and shows the One two-dimension code image.
In some embodiments of the invention, receiving terminal is completed to a two dimension in the new Quick Response Code sequence The scanning of code picture, the checking Quick Response Code of display the 3rd, the 3rd checking Quick Response Code include identification information Prompt message is completed with scanning.Transmitting terminal scanning the 3rd checking Quick Response Code, enters to the 3rd Quick Response Code Row parsing, after confirming the scanning that receiving terminal completes two-dimension code image, show the new Quick Response Code sequences of next Zhang Suoshu In two-dimension code image.
In some embodiments of the invention, after receiving terminal scans the Quick Response Code sequence, according to described The square formation is reduced according to the two-dimension code image of transformation matrix generation, the continuous series is further reduced, deletes The random number, the two-dimension code image received is ranked up according to the continuous series, reduction described two Code sequence is tieed up, the Quick Response Code sequence is decrypted using encryption key, obtains the data.
As shown in Fig. 2 the method one for carrying out Data Encryption Transmission by Quick Response Code for the present invention is preferable to carry out The embodiment schematic diagram of example.In the present embodiment, the method that Data Encryption Transmission is carried out by Quick Response Code Comprise the following steps:
Step 201:Transmitting terminal shows the first checking Quick Response Code, and the first checking Quick Response Code includes transmitting terminal Identification information and data transfer initiate identification information.
When data transfer starts, firstly the need of authentication is completed between transmitting terminal and receiving terminal, pass through two The form for tieing up code shows identification information, and initiates data transfer request by transmitting terminal, passes through Quick Response Code Display data transmissions initiate identification information.
Step 202:Receiving terminal scanning the first checking Quick Response Code, is carried out to the described first checking Quick Response Code Identification, obtains the identification information in the first checking Quick Response Code and data transfer initiates identification information, passes through The identification information carries out identity validation to transmitting terminal.
Step 203:Asymmetric-key encryption system is provided with receiving terminal, it is true to the identity of transmitting terminal in completion After recognizing, receiving terminal transfers encrypted public key, and is believed according to the identity of the encrypted public key and receiving terminal itself The checking Quick Response Code of breath generation second is simultaneously shown.
Step 204:Transmitting terminal scanning recognition second verifies Quick Response Code, and the identification information is recognized Very, and encrypted public key is obtained.
Step 205:Transmitting terminal transfers transmission data, and data are encrypted using encrypted public key, generation two Tie up code sequence.
Parsing encryption is carried out to the data for needing to transmit according to the encrypted public key, by the data after encryption Generate Quick Response Code sequence.
Step 206:To the picture number in Quick Response Code sequence, continuous series is generated, is inserted in continuous series Enter random number, and generate square formation.
The two-dimension code image included to the Quick Response Code sequence is numbered, and continuous series is generated, in the number Some random digits of radom insertion in row, the length for making the ordered series of numbers after insertion random digit are square number, according to Ordered series of numbers generation square formation after the insertion random digit.
Step 207:Square formation is turned into unit matrix, transformation matrix is generated into two-dimension code image, and be added to two New Quick Response Code sequence is generated in dimension code sequence, shows the first pictures of new Quick Response Code sequence.
The square formation is turned into unit matrix, and the transformation matrix in the conversion process of square formation is generated into Quick Response Code figure Piece, by two-dimension code image in the Quick Response Code sequence and the two-dimension code image generated according to transformation matrix Order rearrangement generates new Quick Response Code sequence and shows first two-dimension code image.
Step 208:The checking Quick Response Code of picture generation the 3rd of the new Quick Response Code sequence of receiving terminal scanning recognition.
Receiving terminal completes the scanning to a two-dimension code image in the new Quick Response Code sequence, and display the 3rd is tested Quick Response Code is demonstrate,proved, the 3rd checking Quick Response Code includes identification information and prompt message is completed in scanning.Send End scanning the 3rd checking Quick Response Code, parses to the 3rd Quick Response Code, confirms that receiving terminal completes two After the scanning for tieing up code picture, the two-dimension code image in the new Quick Response Code sequences of next Zhang Suoshu is shown.
Step 209:Receiving terminal scans whole pictures in new Quick Response Code sequence, and data are reduced.
After receiving terminal scans the Quick Response Code sequence, according to the Quick Response Code figure generated according to transformation matrix Piece reduces the square formation, further reduces the continuous series, deletes the random number, according to described continuous Ordered series of numbers is ranked up to the two-dimension code image received, is reduced the Quick Response Code sequence, is utilized encryption key pair The Quick Response Code sequence decryption, obtains the data.
Using the data of the method transmission that Data Encryption Transmission is carried out by Quick Response Code of the present invention, if can not The order of picture in correct arrangement Quick Response Code sequence, then can not be reduced in Quick Response Code sequence by AES and taken The initial data of band.
It should be noted that the statement of all use " first " and " second " is in the embodiment of the present invention In order to distinguish two non-equal entities of same names or non-equal parameter, it is seen that " first " " second " Only for the convenience of statement, should not be construed as the restriction to the embodiment of the present invention, subsequent embodiment to this no longer Illustrate one by one.
Those of ordinary skills in the art should understand that:The discussion of any of the above embodiment is exemplary only, It is not intended to imply that the scope of the present disclosure (including claim) is limited to these examples;In the think of of the present invention Under road, it can also be combined between the technical characteristic in above example or different embodiments, step can To be realized with random order, and many other changes of the different aspect of the present invention as described above be present, be It is concise they do not provided in details.
In addition, to simplify explanation and discussing, and in order to obscure the invention, what is provided It can be shown in accompanying drawing or the known power supply with integrated circuit (IC) chip and other parts can not be shown / grounding connection.Furthermore, it is possible to device is shown in block diagram form, to avoid obscuring the invention, And this have also contemplated that following facts, i.e. the details on the embodiment of these block diagram arrangements is that height depends on In will implement the present invention platform (that is, these details should be completely in the reason of those skilled in the art In the range of solution).Elaborating detail (for example, circuit) with the exemplary embodiment of the description present invention In the case of, it will be apparent to those skilled in the art that can be in these no details In the case of or implement the present invention in the case that these details change.Therefore, these descriptions should be recognized To be illustrative and not restrictive.
Although having been incorporated with specific embodiment of the invention, invention has been described, according to above Description, many replacements of these embodiments, modifications and variations will be for those of ordinary skills Obviously.For example, other memory architectures (for example, dynamic ram (DRAM)) can use The embodiment discussed.
Embodiments of the invention be intended to fall within the broad range of appended claims it is all so Replacement, modifications and variations.Any omission for therefore, within the spirit and principles of the invention, being done, Modification, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (7)

  1. A kind of 1. method that Data Encryption Transmission is carried out by Quick Response Code, it is characterised in that including:
    Transmitting terminal shows the first checking Quick Response Code;
    Receiving terminal scanning the first checking Quick Response Code, is identified to the described first checking Quick Response Code, generates And show the second checking Quick Response Code;
    Transmitting terminal scanning the second checking Quick Response Code, is identified to the described second checking Quick Response Code, transfers The data transmitted are needed, the data are parsed into generation Quick Response Code sequence, and show the Quick Response Code sequence;
    Receiving terminal scans the Quick Response Code sequence, and parsing obtains the data that the Quick Response Code sequence includes.
  2. 2. the method according to claim 1 that Data Encryption Transmission is carried out by Quick Response Code, its feature It is, the second checking Quick Response Code includes identification information and encrypted public key, and the encrypted public key is used for The data for needing to transmit are encrypted, and then parses and generates the Quick Response Code sequence.
  3. 3. the method according to claim 2 that Data Encryption Transmission is carried out by Quick Response Code, its feature It is, the process that the data are parsed to generation Quick Response Code sequence includes:
    Parsing encryption is carried out to the data for needing to transmit according to the encrypted public key, by the data after encryption Generate Quick Response Code sequence.
  4. 4. the method according to claim 3 that Data Encryption Transmission is carried out by Quick Response Code, its feature It is, after the generation Quick Response Code sequence, in addition to:
    The two-dimension code image included to the Quick Response Code sequence is numbered, and continuous series is generated, in the number Some random digits of radom insertion in row, the length for making the ordered series of numbers after insertion random digit are square number, according to Ordered series of numbers generation square formation after the insertion random digit, unit matrix is turned to by the square formation, and by the change of square formation Transformation matrix generation two-dimension code image during changing, by the two-dimension code image in the Quick Response Code sequence and The order rearrangement of the two-dimension code image generated according to transformation matrix generates new Quick Response Code sequence and shows the One two-dimension code image.
  5. 5. the method according to claim 4 that Data Encryption Transmission is carried out by Quick Response Code, its feature It is, receiving terminal completes the scanning to a two-dimension code image in the new Quick Response Code sequence, display the 3rd Quick Response Code is verified, the 3rd checking Quick Response Code includes identification information and prompt message is completed in scanning.
  6. 6. the method according to claim 5 that Data Encryption Transmission is carried out by Quick Response Code, its feature It is, transmitting terminal scanning the 3rd checking Quick Response Code, the 3rd Quick Response Code is parsed, confirms to connect After receiving end completes the scanning of two-dimension code image, the two-dimension code image in the new Quick Response Code sequences of next Zhang Suoshu is shown.
  7. 7. the method according to claim 6 that Data Encryption Transmission is carried out by Quick Response Code, its feature It is, after receiving terminal scans the Quick Response Code sequence, according to the Quick Response Code generated according to transformation matrix Picture reduces the square formation, further reduces the continuous series, deletes the random number, according to the company Continuous ordered series of numbers is ranked up to the two-dimension code image received, is reduced the Quick Response Code sequence, is utilized encryption key The Quick Response Code sequence is decrypted, obtains the data.
CN201610371494.3A 2016-05-30 2016-05-30 Method for encrypting and transmitting data through two-dimensional code Active CN107454038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610371494.3A CN107454038B (en) 2016-05-30 2016-05-30 Method for encrypting and transmitting data through two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610371494.3A CN107454038B (en) 2016-05-30 2016-05-30 Method for encrypting and transmitting data through two-dimensional code

Publications (2)

Publication Number Publication Date
CN107454038A true CN107454038A (en) 2017-12-08
CN107454038B CN107454038B (en) 2021-06-29

Family

ID=60485691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610371494.3A Active CN107454038B (en) 2016-05-30 2016-05-30 Method for encrypting and transmitting data through two-dimensional code

Country Status (1)

Country Link
CN (1) CN107454038B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109165961A (en) * 2018-09-12 2019-01-08 鸿博股份有限公司 The lottery anti-counterfeiting method and system of combined two-dimension code
CN109754045A (en) * 2019-01-25 2019-05-14 海明联合能源集团矩网科技有限公司 A kind of ring code, annular code generating method and its application
WO2019139539A1 (en) * 2018-01-12 2019-07-18 新加坡能源创新发展有限公司 Data transmission system and method
CN110650111A (en) * 2018-06-27 2020-01-03 上海赢亥信息科技有限公司 Digital asset transmission method, system, terminal and storage medium
CN111860730A (en) * 2020-08-27 2020-10-30 南京轩宁信息技术有限公司 Different network information transmission system based on image processing
CN111917875A (en) * 2020-07-31 2020-11-10 展讯通信(上海)有限公司 Offline file transmission method and system
CN112364272A (en) * 2021-01-13 2021-02-12 统信软件技术有限公司 Interaction method, system and computing equipment
CN112765185A (en) * 2019-11-05 2021-05-07 株洲中车时代电气股份有限公司 Data updating method, device, equipment and storage medium for vehicle-mounted equipment
CN113497702A (en) * 2020-03-20 2021-10-12 周通 Novel data encryption and transmission method
CN113595984A (en) * 2021-06-29 2021-11-02 北京来也网络科技有限公司 Data transmission method and device combining RPA and AI, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103415007A (en) * 2013-07-09 2013-11-27 南京邮电大学 Mobile phone two-dimensional code safe use method based on information hiding
CN103559221A (en) * 2013-10-18 2014-02-05 北京奇虎科技有限公司 Multi-media data processing method and device and browser
US20140359294A1 (en) * 2013-05-30 2014-12-04 Cartasite, Inc. Configurable, secure quick response code creation and use
CN105049425A (en) * 2015-06-28 2015-11-11 南威软件股份有限公司 Physical isolation transmission method based on two-dimension code
CN105205664A (en) * 2015-09-25 2015-12-30 中城智慧科技有限公司 Novel offline payment method
US9280643B2 (en) * 2012-05-11 2016-03-08 Netgear, Inc. Establishing access to a secure network based on user-created credential indicia
CN105407079A (en) * 2015-09-25 2016-03-16 中城智慧科技有限公司 Novel terminal safety soft secret key management method
CN105453483A (en) * 2013-06-13 2016-03-30 维萨国际服务协会 Image based key derivation function

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9280643B2 (en) * 2012-05-11 2016-03-08 Netgear, Inc. Establishing access to a secure network based on user-created credential indicia
US20140359294A1 (en) * 2013-05-30 2014-12-04 Cartasite, Inc. Configurable, secure quick response code creation and use
CN105453483A (en) * 2013-06-13 2016-03-30 维萨国际服务协会 Image based key derivation function
CN103415007A (en) * 2013-07-09 2013-11-27 南京邮电大学 Mobile phone two-dimensional code safe use method based on information hiding
CN103559221A (en) * 2013-10-18 2014-02-05 北京奇虎科技有限公司 Multi-media data processing method and device and browser
CN105049425A (en) * 2015-06-28 2015-11-11 南威软件股份有限公司 Physical isolation transmission method based on two-dimension code
CN105205664A (en) * 2015-09-25 2015-12-30 中城智慧科技有限公司 Novel offline payment method
CN105407079A (en) * 2015-09-25 2016-03-16 中城智慧科技有限公司 Novel terminal safety soft secret key management method

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110049279A (en) * 2018-01-12 2019-07-23 新加坡能源创新发展有限公司 Data transmission system and method
WO2019139539A1 (en) * 2018-01-12 2019-07-18 新加坡能源创新发展有限公司 Data transmission system and method
CN110650111A (en) * 2018-06-27 2020-01-03 上海赢亥信息科技有限公司 Digital asset transmission method, system, terminal and storage medium
CN109165961B (en) * 2018-09-12 2021-01-19 鸿博股份有限公司 Lottery anti-counterfeiting method and system combining two-dimension codes
CN109165961A (en) * 2018-09-12 2019-01-08 鸿博股份有限公司 The lottery anti-counterfeiting method and system of combined two-dimension code
CN109754045A (en) * 2019-01-25 2019-05-14 海明联合能源集团矩网科技有限公司 A kind of ring code, annular code generating method and its application
CN109754045B (en) * 2019-01-25 2020-01-21 海明联合能源集团矩网科技有限公司 Annular code, annular code generation method and application thereof
CN112765185A (en) * 2019-11-05 2021-05-07 株洲中车时代电气股份有限公司 Data updating method, device, equipment and storage medium for vehicle-mounted equipment
CN112765185B (en) * 2019-11-05 2023-04-07 株洲中车时代电气股份有限公司 Data updating method, device, equipment and storage medium for vehicle-mounted equipment
CN113497702A (en) * 2020-03-20 2021-10-12 周通 Novel data encryption and transmission method
CN111917875A (en) * 2020-07-31 2020-11-10 展讯通信(上海)有限公司 Offline file transmission method and system
CN111860730A (en) * 2020-08-27 2020-10-30 南京轩宁信息技术有限公司 Different network information transmission system based on image processing
CN112364272A (en) * 2021-01-13 2021-02-12 统信软件技术有限公司 Interaction method, system and computing equipment
CN112364272B (en) * 2021-01-13 2021-07-16 统信软件技术有限公司 Interaction method, system and computing equipment
CN113595984A (en) * 2021-06-29 2021-11-02 北京来也网络科技有限公司 Data transmission method and device combining RPA and AI, electronic equipment and storage medium
CN113595984B (en) * 2021-06-29 2024-01-12 北京来也网络科技有限公司 Data transmission method and device combining RPA and AI, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN107454038B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN107454038A (en) A kind of method that Data Encryption Transmission is carried out by Quick Response Code
CN104918237B (en) The method, communication master device, communication of wireless communication connection are established from equipment, server and system
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN109218825B (en) Video encryption system
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN104244237B (en) Data sending, receiving method and reception send terminal and data transmitter-receiver set
CN109151508B (en) Video encryption method
CN106778285B (en) Method and device for upgrading equipment
CN109617675B (en) Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal
KR20170042549A (en) Method for the authentication of a first electronic entity by a second electronic entity, and electronic entity implementing such a method
CN107306261B (en) Encryption communication method, device and system
CN101789068B (en) Card reader safety certification device and method
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN101789863B (en) Safe data information transmission method
CN102264068B (en) Shared key consultation method, system, network platform and terminal
CN101938741A (en) Method, system and device for mutual authentication
JP6471039B2 (en) Wireless communication system and wireless terminal
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
CN103313244A (en) Authentication method and device based on generic bootstrapping architecture (GBA)
CN110166410A (en) A kind of method of safety-oriented data transfer, terminal and multi-mode communication terminal
CN102264069B (en) Authentication control method, device and system based on universal guide architecture
CN108932619B (en) Terminal offline charging service method and system
CN107113701A (en) A kind of matching method, contrast means and intelligent terminal and smart card
CN106603486B (en) Method and system for security authorization of mobile terminal
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210823

Address after: Room 405-017, block a, floor 4, No. 138 andingmenwai street, Dongcheng District, Beijing 100840

Patentee after: BEIJING JUNDI UNITED NETWORK TECHNOLOGY CENTER

Address before: 100036 710, unit 3, building 4, yard 1, wujiachang Road, Haidian District, Beijing

Patentee before: BEIJING JUNYUAN HEZHONG TECHNOLOGY DEVELOPMENT Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240422

Address after: Room 199, Zone A, 2nd Floor, Zhongguancun Dongsheng Science and Technology Park, No.18 Xueqing Road, Haidian District, Beijing, 100083

Patentee after: Xinchuang Great Wall (Beijing) Technology Co.,Ltd.

Country or region after: China

Address before: Room 405-017, block a, floor 4, No. 138 andingmenwai street, Dongcheng District, Beijing 100840

Patentee before: BEIJING JUNDI UNITED NETWORK TECHNOLOGY CENTER

Country or region before: China

TR01 Transfer of patent right