CN108510022B - Two-dimensional code generation and verification method and server - Google Patents

Two-dimensional code generation and verification method and server Download PDF

Info

Publication number
CN108510022B
CN108510022B CN201810226314.1A CN201810226314A CN108510022B CN 108510022 B CN108510022 B CN 108510022B CN 201810226314 A CN201810226314 A CN 201810226314A CN 108510022 B CN108510022 B CN 108510022B
Authority
CN
China
Prior art keywords
mobile terminal
contact
dimensional code
information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810226314.1A
Other languages
Chinese (zh)
Other versions
CN108510022A (en
Inventor
安鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810226314.1A priority Critical patent/CN108510022B/en
Publication of CN108510022A publication Critical patent/CN108510022A/en
Application granted granted Critical
Publication of CN108510022B publication Critical patent/CN108510022B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K1/00Methods or arrangements for marking the record carrier in digital fashion
    • G06K1/12Methods or arrangements for marking the record carrier in digital fashion otherwise than by punching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Library & Information Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a two-dimensional code generation and verification method and a server. The generation method comprises the following steps: receiving a two-dimensional code generation request of a first mobile terminal, wherein the two-dimensional code generation request comprises second contact information of a preset contact party and first contact information of the first mobile terminal; generating a two-dimensional code identifier according to the information in the two-dimensional code generation request; the two-dimension code identification and the information in the two-dimension code generation request are stored in an associated mode; generating a two-dimensional code picture according to the two-dimensional code identifier; and sending the two-dimension code picture to the first mobile terminal. The invention can avoid the information safety problem caused by the leakage of personal contact information during information interaction.

Description

Two-dimensional code generation and verification method and server
Technical Field
The invention relates to the technical field of communication, in particular to a two-dimensional code generation and verification method and a server.
Background
With the popularization of mobile terminals, various application services on the mobile terminals basically need to use contact information (such as phone numbers, addresses, instant messaging accounts, and the like) of users, so that in the interaction process of the contact information, the contact information of the users can be shared to multiple service providers or service platforms, and the contact information is easily leaked. The leakage of personal contact information can bring great influence to personal life, such as spam messages and harassing calls, and mobile phone numbers are maliciously published on a social platform or even maliciously continuously dialed, so that the normal communication of people is influenced.
Therefore, the information security problem that the personal contact information is leaked exists in the prior art when information interaction is carried out.
Disclosure of Invention
The embodiment of the invention provides a two-dimensional code generation and verification method and a server, and aims to solve the information security problem that personal contact information is leaked during information interaction in the prior art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a two-dimensional code generation method, which is applied to a server, and the method includes:
receiving a two-dimensional code generation request of a first mobile terminal, wherein the two-dimensional code generation request comprises second contact information of a preset contact party and first contact information of the first mobile terminal;
generating a two-dimensional code identifier according to the information in the two-dimensional code generation request;
the two-dimension code identification and the information in the two-dimension code generation request are stored in an associated mode;
generating a two-dimensional code picture according to the two-dimensional code identifier;
and sending the two-dimension code picture to the first mobile terminal.
In a second aspect, an embodiment of the present invention provides a two-dimensional code verification method, which is applied to a server, and the method includes:
receiving an access request of a second mobile terminal to a target address corresponding to a two-dimensional code picture, wherein the two-dimensional code picture is the two-dimensional code picture of the first mobile terminal, and the access request comprises contact information of the second mobile terminal;
acquiring a two-dimensional code identifier in the target address;
searching target contact party record information stored in association with the two-dimension code identifier in pre-stored contact party record information, wherein the target contact party record information comprises first contact information of the first mobile terminal and second contact information of a preset contact party authorized by the first mobile terminal;
if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information, acquiring the first contact information of the first mobile terminal;
and sending the first contact information of the first mobile terminal to the second mobile terminal.
In a third aspect, an embodiment of the present invention further provides a server, where the server includes:
the mobile terminal comprises a first receiving module, a second receiving module and a first sending module, wherein the first receiving module is used for receiving a two-dimensional code generation request of a first mobile terminal, and the two-dimensional code generation request comprises second contact information of a preset contact party and first contact information of the first mobile terminal;
the first generation module is used for generating a two-dimension code identifier according to the information in the two-dimension code generation request;
the storage module is used for storing the two-dimension code identification and the information in the two-dimension code generation request in a correlation manner;
the second generation module is used for generating a two-dimensional code picture according to the two-dimensional code mark;
and the first sending module is used for sending the two-dimension code picture to the first mobile terminal.
In a fourth aspect, an embodiment of the present invention further provides a server, where the server includes:
the second receiving module is used for receiving an access request of a second mobile terminal to a target address corresponding to a two-dimensional code picture, wherein the two-dimensional code picture is the two-dimensional code picture of the first mobile terminal, and the access request comprises contact information of the second mobile terminal;
the first acquisition module is used for acquiring the two-dimension code identification in the target address;
the searching module is used for searching target contact party record information which is stored in association with the two-dimension code identifier in pre-stored contact party record information, wherein the target contact party record information comprises first contact information of the first mobile terminal and second contact information of a preset contact party authorized by the first mobile terminal;
the second obtaining module is used for obtaining the first contact information of the first mobile terminal if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information;
and the second sending module is used for sending the first contact information of the first mobile terminal to the second mobile terminal.
In a fifth aspect, an embodiment of the present invention further provides a server, including: the two-dimensional code generating method comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the computer program realizes the steps of the two-dimensional code generating method when being executed by the processor.
In a sixth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the two-dimensional code generation method are implemented.
In a seventh aspect, an embodiment of the present invention further provides a server, including: the two-dimensional code verification method comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the computer program realizes the steps of the two-dimensional code verification method when being executed by the processor.
In an eighth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the two-dimensional code verification method are implemented.
In this way, in the embodiment of the present invention, the two-dimensional code representing the personal contact information is scanned to obtain the two-dimensional code identifier, the contact party record information authorized by the user corresponding to the two-dimensional code is found according to the two-dimensional code identifier, and the first contact information of the first mobile terminal corresponding to the target preset contact party can be returned to the second mobile terminal when the contact information in the access request sent by the second mobile terminal at the side requesting verification of the two-dimensional code is consistent with the contact information of the target preset contact party corresponding to the contact party record information. Only authorized contacts can obtain the personal contact information (here, the first contact information) of the first mobile terminal by scanning the two-dimensional code picture, and the information safety problem caused by the fact that the personal contact information is leaked during information interaction is avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a flowchart of a two-dimensional code generation method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a two-dimensional code verification method according to a second embodiment of the present invention;
FIG. 3 is a block diagram of a server of a third embodiment of the present invention;
FIG. 4 is a block diagram of a server according to a fourth embodiment of the present invention;
fig. 5 is a schematic hardware configuration diagram of a server according to a fifth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
First embodiment
Referring to fig. 1, a flowchart of a two-dimensional code generation method according to an embodiment of the present invention is shown, and is applied to a server, where the server of the method according to the embodiment of the present invention interacts with an application program (APP) on a mobile terminal side, where the server is a background server of the APP.
The method may specifically comprise the steps of:
step 101, receiving a two-dimensional code generation request of a first mobile terminal;
here, the user of the first mobile terminal is taken as the user a as an example.
First, the user a is a registered user of the APP, wherein the user a needs to input an account ID (accountid), an account password, and personal contact information (e.g., a phone number, i.e., a mobile phone number) of the APP when registering the APP, so that the server side can create the account ID of the user a and the personal contact information of the user a bound to the account ID.
The method of the embodiment of the invention provides a method for generating the two-dimensional code, when the user/service platform needs to acquire the contact information of the user A, the user A only needs to give the two-dimensional code to the user A, so that the safety of the personal contact information of the user A is ensured.
In order to generate a two-dimensional code representing personal contact information of a user a of a first mobile terminal, the following procedure is performed:
after the user a opens and logs in the APP, the parameters may be input: contact information (code) of the contact party is preset, namely second contact information.
The preset contact is a mobile terminal authorized by the user a to obtain personal contact information (for example, a phone number, an address, an instant messaging account, and the like, which is described in this embodiment by taking the phone number as an example). Wherein, in the process of generating a two-dimensional code, the one group of parameters or the plurality of groups of parameters can be input. That is, one two-dimensional code may correspond to the contact information of one contact party, or may correspond to the contact information of a plurality of contact parties.
The account corresponding to the preset contact party can be a personal user account or an enterprise service platform account. When the account corresponding to the preset contact party is a personal user account, the second contact information of the preset contact party comprises a telephone number, an address, an instant messaging account and the like; and when the account corresponding to the preset contact party is an enterprise service platform account, the second contact information of the preset contact party may include a domain name.
Therefore, no matter whether the individual user at the mobile terminal side or the enterprise service platform requests to ask for the individual contact information of the user, the method of the embodiment of the invention can generate the corresponding two-dimensional codes aiming at the contacts so as to represent the individual contact information for information interaction.
Optionally, when the user inputs the above parameters, the number of times of availability (connectittime) of each preset contact may also be input.
Optionally, when the user inputs the above parameters, an identification password (password) may also be input, where when parameter information of multiple contacts is input for a generated two-dimensional code, different identification passwords may be input and set for different contacts, and the explanation is given by taking personal contact information as a telephone number, and the input multiple sets of parameters are: the phone number of the user B, the number of times that the user B can contact the user A, and the identification password 1 which needs to be exchanged when the user A and the user B perform two-dimensional code exchange; the telephone number of the user C, the number of times that the user C can contact the user A, and the identification password 2 which needs to be exchanged when the user A and the user C exchange two-dimensional codes; the domain name of the service platform C, the contact times of the service platform C for contacting the user A, and the identification password 3 which needs to be exchanged when the user A and the service platform C perform two-dimensional code exchange.
Of course, when parameter information of a plurality of contact parties is input for one generated two-dimensional code, the user may set the same identification code for different contact parties, that is, the identification code 1, the identification code 2, and the identification code 3 are the same identification code when inputting the identification code. That is, only one identification code is set for a two-dimensional code to be currently generated, and can be applied to a plurality of contacts set for the two-dimensional code.
When a user A of a certain mobile terminal provides the generated two-dimensional code as personal contact information to users of other mobile terminals or service platforms, the user A also needs to provide the corresponding identification code to the other users or the service platforms, so that the verification of the two-dimensional code is facilitated, and finally, the server provides the personal contact information of the user A to the other users or the service platforms, thereby ensuring the information security of the personal contact information of the user A.
Optionally, when the user a of the first mobile terminal inputs the parameter, the user a may also input an account ID (first contact information belonging to the first mobile terminal) of the user a, so as to generate a subsequent two-dimensional code generation request. The first contact information may include an account ID and/or a phone number and/or an address and/or an instant messaging account, and the like. Since the personal contact information (i.e. the phone number and/or address and/or instant messaging account) of the first mobile terminal and the account ID thereof are stored in association, when generating the two-dimensional code identifier of the two-dimensional code representing the personal contact information of the first mobile terminal, only the account ID can be used, and when acquiring the personal contact information of the first mobile terminal, the personal contact information of the user corresponding to the account ID can be searched by means of the account ID; a set of personal contact information of the first mobile terminal may also be used as the contact information of the first mobile terminal.
In this example, the method of the embodiment of the present invention is described by taking an example that the user a inputs parameters of a group of contacts (for example, the user B) when generating the two-dimensional code, that is, the authorized user B can obtain personal contact information (for example, a phone number) of the user a.
After the user a inputs the above parameters, the user a may click a "generate two-dimensional code" button on the APP to generate a two-dimensional code generation request, such as an Http request, sent to the server. The two-dimensional code generation request carries various parameters input by the user A, including a telephone number of the user B, the number of times that the user B can contact the user A, and an account ID of the user A (on one hand, the account ID can be obtained from the parameters input by the user when the user A inputs the parameters, and on the other hand, the account ID of the user A can also be directly obtained from login information because the user A has already logged in the account), optionally, for example, the user A also inputs an identification password (because only one contact party is provided, the identification password is uniquely corresponding to the contact party user B and the two-dimensional code to be generated).
Then, the server according to the embodiment of the present invention may receive a two-dimensional code generation request sent by the first mobile terminal used by the user a.
102, generating a two-dimension code identifier according to information in the two-dimension code generation request;
specifically, the method of the embodiment of the present invention may splice each piece of information in the two-dimensional code generation request; and encrypting the spliced data by adopting a preset encryption algorithm to generate a two-dimension code identifier (two-dimension code ID).
When information in the two-dimensional code generation request is spliced, the splicing principle includes but is not limited to splicing in a space, plus sign, bar and other modes, and in the splicing sequence of each parameter, the parameter information of each contact party can be spliced in sequence by taking the contact party as a unit, and optionally, a serial number can be added to further distinguish each two-dimensional code ID during splicing. Then, the spliced parameters are encrypted through a digest algorithm (such as MD5) or processed through other encryption algorithms, so that a thief is prevented from stealing parameter information by reading the two-dimensional code ID.
103, storing the two-dimension code identification and the information in the two-dimension code generation request in a correlation manner;
as shown in table 1, the structure of the two-dimensional code ID and the storage structure of the two-dimensional code ID and the respective parameter information in the two-dimensional code generation request are shown.
Figure GDA0003183943080000071
TABLE 1
Each two-dimensional code generated by the embodiment of the invention only has a unique two-dimensional code ID.
104, generating a two-dimensional code picture according to the two-dimensional code identifier;
specifically, when the two-dimensional code picture is generated, the two-dimensional code picture corresponds to a two-dimensional code access address, and the two-dimensional code ID can be written in the access address in a parameter manner.
Alternatively, the server side may use the two-dimensional code ID as the file name of the generated two-dimensional code picture, and store the two-dimensional code picture locally.
And 105, sending the two-dimensional code picture to the first mobile terminal.
In an embodiment, the server may directly push the two-dimensional code picture to the first mobile terminal used by the user a.
In another embodiment, in order to increase the distribution speed of the two-dimensional code picture, the server may also push the two-dimensional code picture to a Content Distribution Network (CDN), so as to obtain a storage address of the two-dimensional code picture returned from the CDN on the CDN; and then, sending the storage address to the first mobile terminal. When the user a needs to use the two-dimensional code as the personal contact information for information interaction, the user a may log in the APP of the first mobile terminal and initiate an access request to the locally stored CDN address, and then the server of the present invention may receive the access request and send the two-dimensional code image corresponding to the storage address to the first mobile terminal in response to the access request.
The first mobile terminal side can load and store the two-dimensional code picture to the local, and then the user A can transmit the two-dimensional code picture in a mode of social tool sharing, printer printing, and scanning/photographing by a second mobile terminal used by other users or a service platform.
Thus, once a user or a service platform wants to ask for the phone number of the user a, the two-dimensional code picture can be shared to the untrusted person (i.e. an unauthorized user, such as a product promoter, in a situation where the user a needs to fill in personal contact information), and the two-dimensional code picture cannot be known to the phone number of the user a even though the two-dimensional code picture is scanned because the two-dimensional code picture is not authorized; for authorized users or service platforms, in order to avoid situations that telephone numbers are leaked due to direct provision of telephone numbers and are often disturbed by harassing calls, the authorized contacts, such as a server of the service platform, cannot directly store the telephone numbers of the users a, only store the two-dimensional codes provided by the users a, and even if an eavesdropper (i.e., an unauthorized person) eavesdrops the two-dimensional codes, the eavesdropper cannot obtain the telephone numbers of the users a through two-dimensional code verification, so that the information security of the telephone numbers of the users is ensured, and the telephone numbers of the users a are prevented from being leaked on the service platform side or on other authorized user sides. In addition, in the two-dimensional code, a contactable frequency parameter is set for an authorized contact person, that is, even if the authorized contact person is, the telephone number of the user a cannot be permanently acquired, so that the user a can adjust the authority of the user a at any time according to the information protection condition of other users or the service platform on the telephone number of the user a, that is, the user a can contact the frequency of the user a.
In the embodiment of the invention, by generating the two-dimensional code picture representing the personal contact information of the first mobile terminal and setting the two-dimensional code identifier in the two-dimensional code picture, the two-dimension code identification is generated according to the contact information of the authorized preset contact method and the contact information of the first mobile terminal, therefore, the two-dimensional code picture is provided with the contact information of the authorized contact persons in the background, when information interaction is carried out, the user only needs to share the two-dimensional code picture as personal contact information to other users or a second mobile terminal of the service platform, only authorized contacts can acquire the personal contact information of the first mobile terminal by scanning the two-dimensional code picture, so that the information safety problem that the mobile phone number is leaked during information interaction is avoided, and the telephone number is prevented from being stolen and leaked during information interaction, thereby bringing inconvenience to the life of a user.
Second embodiment
Referring to fig. 2, a flowchart of a two-dimensional code verification method according to an embodiment of the present invention is shown, and is applied to a server, where the server of the method according to the embodiment of the present invention interacts with an application program (APP) on a mobile terminal side, where the server is a background server of the APP.
The method specifically comprises the following steps:
step 201, receiving an access request of a second mobile terminal to a target address corresponding to a two-dimensional code picture;
for example, in the above embodiment, the two-dimensional code picture of the user B authorized to the second mobile terminal generated by the user a (i.e., the user a of the first mobile terminal) side is sent to the second mobile terminal.
Optionally, when the first mobile terminal of the user a generates the two-dimensional code picture, the input parameters may further include an identification password (i.e. a first identification password herein), and when the first mobile terminal of the user a shares the two-dimensional code picture with the second mobile terminal of the user B, the first identification password is also sent to the second mobile terminal of the user B, where the identification password sent by the user a to the user B is referred to as a second identification password, and the identification password stored by the first mobile terminal of the user a on the server for the two-dimensional code picture is referred to as a first identification password.
When the two-dimensional code is generated at the first mobile terminal of the user a, the first identification password may be a plurality of identification passwords for different preset contacts (that is, when one two-dimensional code picture is generated, when a plurality of groups of parameters of the contacts are set, different identification passwords may be set for each contact respectively), or one identification password for the two-dimensional code picture (that is, when one two-dimensional code picture is generated, no matter which group or group of parameters of the contacts are set, the same identification password may be set for different contacts, that is, one two-dimensional code picture corresponds to one identification password and is irrelevant to the contacts).
Taking the above two-dimensional code generation method embodiment and the example in table 1 as an example, for example, if only one identification password is set for the two-dimensional code picture, the user a will also send password (5642) in table 1 to the user B.
In addition, the APP of the embodiment of the present invention has Root authority, and after the APP is opened by the user B, the APP can directly acquire personal contact information of the user B, such as a mobile phone number. The user B may be a registered user of the APP, or a guest, that is, a non-registered user.
Then, the user B may scan the two-dimensional code picture shared by the user a by using the APP, and analyze a URL corresponding to the two-dimensional code picture, that is, a target address (that is, the two-dimensional code access address in the embodiment shown in fig. 1), and then, the APP sends an access request for the URL to the server, where when sending the access request, the APP may write the obtained contact information (including but not limited to a phone number, an address, an instant messaging account number, and the like, where, for example, the phone number of the user B) of the second mobile terminal into the access request, and optionally, may also include a second identification password input by the user B. That is, the access request includes the contact information of the second mobile terminal (here, the mobile phone number of the user B), and optionally, further includes a second identification password;
step 202, acquiring a two-dimensional code identifier in the target address;
after receiving the access request sent by the APP side, the server side can analyze the unique two-dimensional code ID information contained in the URL.
The two-dimensional code ID may adopt the generation rule, that is, the encoding rule in the first embodiment.
Step 203, searching target contact party record information which is stored in association with the two-dimension code identifier in pre-stored contact party record information;
as shown in table 1 in the first embodiment, when generating a two-dimensional code, the server side in the embodiment of the present invention stores contact party record information as shown in table 1 for two-dimensional codes generated by different users, where the contact party record information includes second contact information of a preset contact party authorized by a first mobile terminal that generates the two-dimensional code, first contact information (here, an account ID) of the first mobile terminal, and optionally, the number of times that each preset contact party can be contacted; optionally, a first identification password may also be included.
And each group of contact party record information is stored in association with the two-dimensional code ID of the generated two-dimensional code.
Therefore, in this step, it is necessary to search the pre-stored contact record information for the target contact record information stored in association with the two-dimensional code ID obtained by the analysis.
The target contact party record information includes second contact information of a preset contact party authorized by the first mobile terminal, first contact information (here, an account ID) of the first mobile terminal, and optionally, the number of times that each preset contact party can be contacted; optionally, a first identification password may also be included.
Step 204, if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information, acquiring the first contact information of the first mobile terminal;
since the access request carries the second contact information of the second mobile terminal, which is the phone number of the user B, it is possible to search whether there is contact information that is consistent with the phone number of the user B in the parameter information of the contact authorized when the first mobile terminal generates the two-dimensional code of the user a (i.e., search for a target record in which the code parameter is consistent with the contact information of the second mobile terminal in the access request in table 1);
if the first record with the code value of 139000000000 is found in table 1, that is, the user B of the second mobile terminal is a user authorized by the user a of the first mobile terminal to obtain the personal contact information of the user, and therefore, the first contact information of the first mobile terminal may need to be obtained;
in this example, table 1 only stores the accountID for the first contact information of the first mobile terminal, so that other contact information of the first mobile terminal corresponding to the accountID, such as a phone number and/or an address and/or an instant messaging account number, etc., can be looked up by means of the accountID (i.e., Pk07an) in the destination record.
In yet another embodiment, if the first contact information part of table 1 about the first mobile terminal stores not only the account id but also other contact information such as a phone number and/or address and/or an instant messaging account number, the required first contact information (e.g. the phone number of user a) of the first mobile terminal may be directly obtained from the target record.
Step 205, sending the first contact information of the first mobile terminal to the second mobile terminal.
And searching target second contact information of a target preset contact party matched with the contact information of the second mobile terminal in the target contact party record information, wherein the target second contact information indicates that the second mobile terminal is a mobile terminal authorized by the first mobile terminal, and therefore the first contact information of the first mobile terminal can be sent to the second mobile terminal.
On the contrary, if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is not found in the target contact record information, it indicates that the second mobile terminal does not belong to the mobile terminal authorized by the first mobile terminal, and the first contact information of the first mobile terminal is not returned to the second mobile terminal.
Optionally, if the target contact party package record information includes the number of times that the target preset contact party can contact, before the step 204 of obtaining the first contact information of the first mobile terminal is executed, the method according to the embodiment of the present invention may further include:
judging whether the contact times of the target preset contact party are greater than zero or not;
for example, it is determined whether the value of connectTime in the first record in table 1 is greater than 0.
Correspondingly, when the first contact information of the first mobile terminal is obtained in step 204, if the number of times that the target preset contact party can contact is greater than zero, the first contact information of the first mobile terminal is obtained;
further, after step 205, the method according to an embodiment of the present invention may further include:
and reducing the number of times of contact of the target preset contact party in the target contact party record information by one.
For example, the value of connectTime in the first record in table 1 is modified from 2 to 1.
Optionally, in another embodiment, if the target contact record information further includes a first identification password (i.e. password parameter), the access request further includes a second identification password sent by the first mobile terminal (first mobile terminal used by user a) to the second mobile terminal (mobile terminal used by user B);
before the acquiring of the first contact information of the first mobile terminal in step 204 is performed, the method according to the embodiment of the present invention may further include:
judging whether a target first identification password corresponding to the target preset contact party is consistent with a second identification password in the access request or not;
that is, it is determined whether the identification password in the access request sent by the second mobile terminal of user B is the value 5642 of the password parameter in the first record in table 1.
Correspondingly, when the first contact information of the first mobile terminal is obtained in step 204, if the target first identification password corresponding to the target preset contact party is consistent with the second identification password in the access request, the first contact information of the first mobile terminal is obtained.
In addition, in another embodiment, the step of determining whether the identification codes are consistent may be performed before determining whether the number of times of reaching the target preset contact party is greater than zero, and the determination of the number of times of reaching the target preset contact party is performed only if the identification codes are consistent.
In the above embodiment, the account corresponding to the preset contact party may be a personal user account or an enterprise service platform account. When the account corresponding to the preset contact party is a personal user account, the second contact information of the preset contact party comprises a telephone number, an address, an instant messaging account and the like; and when the account corresponding to the preset contact party is an enterprise service platform account, the second contact information of the preset contact party may include a domain name.
Therefore, no matter whether the individual user at the mobile terminal side or the enterprise service platform requesting for the user individual contact information is requested, the method of the embodiment of the invention can verify the two-dimensional codes aiming at the contact parties, thereby ensuring that the user individual contact information at the first mobile terminal side is not leaked during information interaction.
In this way, in the embodiment of the present invention, the two-dimensional code representing the personal contact information is scanned to obtain the two-dimensional code identifier, the contact party record information authorized by the user corresponding to the two-dimensional code is found according to the two-dimensional code identifier, and the first contact information of the first mobile terminal corresponding to the target preset contact party can be returned to the second mobile terminal when the contact information in the access request sent by the second mobile terminal at the side requesting verification of the two-dimensional code is consistent with the contact information of the target preset contact party corresponding to the contact party record information. Only authorized contacts can obtain the personal contact information (here, the first contact information) of the first mobile terminal by scanning the two-dimensional code picture, and the information safety problem caused by the fact that the personal contact information is leaked during information interaction is avoided.
Third embodiment
Referring to FIG. 3, a block diagram of a server of one embodiment of the present invention is shown. The server of the embodiment of the invention can realize the details of the two-dimensional code generation method in the first embodiment and achieve the same effect. The server shown in fig. 3 includes:
the first receiving module 31 is configured to receive a two-dimensional code generation request of a first mobile terminal, where the two-dimensional code generation request includes second contact information of a preset contact and first contact information of the first mobile terminal;
the first generating module 32 is configured to generate a two-dimensional code identifier according to information in the two-dimensional code generation request;
the storage module 33 is configured to perform associated storage on the two-dimensional code identifier and the information in the two-dimensional code generation request;
the second generating module 34 is configured to generate a two-dimensional code picture according to the two-dimensional code identifier;
and the first sending module 35 is configured to send the two-dimensional code picture to the first mobile terminal.
Optionally, the first sending module 35 includes:
the pushing submodule is used for pushing the two-dimension code picture to a content distribution network to obtain a storage address of the two-dimension code picture on the content distribution network;
the sending submodule is used for sending the storage address to the first mobile terminal;
the receiving submodule is used for receiving an access request of the first mobile terminal to the storage address;
and the response submodule is used for responding to the access request and sending the two-dimensional code picture corresponding to the storage address to the first mobile terminal.
Optionally, the two-dimensional code generation request further includes the number of times of contact of each preset contact, a plurality of identification passwords for different preset contacts, or one identification password for the two-dimensional code picture to be generated.
Optionally, the second contact information of the preset contact includes a telephone number or a domain name.
The server provided by the embodiment of the present invention can implement each process implemented by the server in the above two-dimensional code generation method, and is not described herein again to avoid repetition.
Fourth embodiment
Referring to FIG. 4, a block diagram of a server of one embodiment of the present invention is shown. The server of the embodiment of the invention can realize the details of the two-dimensional code verification method in the second embodiment and achieve the same effect. The server shown in fig. 4 includes:
a second receiving module 41, configured to receive an access request from a second mobile terminal to a target address corresponding to a two-dimensional code picture, where the two-dimensional code picture is a two-dimensional code picture of a first mobile terminal, and the access request includes contact information of the second mobile terminal;
a first obtaining module 42, configured to obtain a two-dimensional code identifier in the target address;
the searching module 43 is configured to search, in pre-stored contact record information, target contact record information stored in association with the two-dimensional code identifier, where the target contact record information includes first contact information of the first mobile terminal and second contact information of a preset contact authorized by the first mobile terminal;
a second obtaining module 44, configured to obtain the first contact information of the first mobile terminal if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information;
and a second sending module 45, configured to send the first contact information of the first mobile terminal to the second mobile terminal.
Optionally, the server further comprises:
the first judgment module is used for judging whether the contact times of the target preset contact party are greater than zero or not if the target contact party record information comprises the contact times of the target preset contact party;
the second acquisition module includes:
the first obtaining sub-module is used for obtaining first contact information of the first mobile terminal if the first judging module determines that the number of times of contact of the target preset contact party is greater than zero;
the server further comprises:
and the modifying module is used for reducing the contact times of the target preset contact party in the target contact party record information by one.
Optionally, the server further comprises:
the second judging module is used for judging whether a target first identification password corresponding to the target preset contact party is consistent with a second identification password in the access request or not when the access request further comprises the second identification password sent by the first mobile terminal to the second mobile terminal if the target contact party record information further comprises the first identification password;
the second obtaining module 44 includes:
and the second obtaining sub-module is configured to obtain the first contact information of the first mobile terminal if the second judging module determines that the target first identification password corresponding to the target preset contact party is consistent with the second identification password in the access request.
Optionally, the first identification password comprises a plurality of identification passwords aiming at different preset contacts or one identification password aiming at the two-dimensional code picture.
Optionally, the contact information of the preset contact includes a telephone number or a domain name.
The server provided by the embodiment of the invention can realize each process realized by the server in the two-dimensional code verification method embodiment, and is not repeated here to avoid repetition.
Fifth embodiment
Figure 5 is a hardware architecture diagram of a server implementing various embodiments of the invention,
the server 400 includes, but is not limited to: radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, processor 410, and power supply 411. Those skilled in the art will appreciate that the server architecture shown in FIG. 4 is not meant to be limiting, and that a server may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the server includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The radio frequency unit 401 is configured to receive a two-dimensional code generation request of a first mobile terminal, where the two-dimensional code generation request includes second contact information of a preset contact and first contact information of the first mobile terminal; and sending the two-dimension code picture to the first mobile terminal.
The processor 410 is used for generating a two-dimensional code identifier according to the information in the two-dimensional code generation request; the two-dimension code identification and the information in the two-dimension code generation request are stored in an associated mode; and generating a two-dimensional code picture according to the two-dimensional code identification.
In the embodiment of the invention, by generating the two-dimensional code picture representing the personal contact information of the first mobile terminal and setting the two-dimensional code identifier in the two-dimensional code picture, the two-dimension code identification is generated according to the contact information of the authorized preset contact method and the contact information of the first mobile terminal, therefore, the two-dimensional code picture is provided with the contact information of the authorized contact persons in the background, when information interaction is carried out, the user only needs to share the two-dimensional code picture as personal contact information to other users or a second mobile terminal of the service platform, only authorized contacts can acquire the personal contact information of the first mobile terminal by scanning the two-dimensional code picture, so that the information safety problem that the mobile phone number is leaked during information interaction is avoided, and the telephone number is prevented from being stolen and leaked during information interaction, thereby bringing inconvenience to the life of a user.
Or, the radio frequency unit 401 is configured to receive a two-dimensional code generation request of a first mobile terminal, where the two-dimensional code generation request includes second contact information of a preset contact and first contact information of the first mobile terminal; and sending the first contact information of the first mobile terminal to the second mobile terminal.
The processor 410 is configured to obtain a two-dimensional code identifier in the target address; searching target contact party record information stored in association with the two-dimension code identifier in pre-stored contact party record information, wherein the target contact party record information comprises first contact information of the first mobile terminal and second contact information of a preset contact party authorized by the first mobile terminal; and if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information, acquiring the first contact information of the first mobile terminal.
In this way, in the embodiment of the present invention, the two-dimensional code representing the personal contact information is scanned to obtain the two-dimensional code identifier, the contact party record information authorized by the user corresponding to the two-dimensional code is found according to the two-dimensional code identifier, and the first contact information of the first mobile terminal corresponding to the target preset contact party can be returned to the second mobile terminal when the contact information in the access request sent by the second mobile terminal at the side requesting verification of the two-dimensional code is consistent with the contact information of the target preset contact party corresponding to the contact party record information. Only authorized contacts can obtain the personal contact information (here, the first contact information) of the first mobile terminal by scanning the two-dimensional code picture, and the information safety problem caused by the fact that the personal contact information is leaked during information interaction is avoided.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 401 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 410; in addition, the uplink data is transmitted to the base station. Typically, radio unit 401 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio unit 401 can also communicate with a network and other devices through a wireless communication system.
The server provides wireless broadband internet access to the user via the network module 402, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 403 may convert audio data received by the radio frequency unit 401 or the network module 402 or stored in the memory 409 into an audio signal and output as sound. Also, the audio output unit 403 may also provide audio output related to a specific function performed by the server 400 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 403 includes a speaker, a buzzer, a receiver, and the like.
The input unit 404 is used to receive audio or video signals. The input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or video obtained by an image capturing apparatus (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 406. The image frames processed by the graphic processor 4041 may be stored in the memory 409 (or other storage medium) or transmitted via the radio frequency unit 401 or the network module 402. The microphone 4042 may receive sound, and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 401 in case of the phone call mode.
The server 400 also includes at least one sensor 405, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 4061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 4061 and/or the backlight when the server 400 moves to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify server gestures (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 405 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described in detail herein.
The display unit 406 is used to display information input by the user or information provided to the user. The Display unit 406 may include a Display panel 4061, and the Display panel 4061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 407 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the server. Specifically, the user input unit 407 includes a touch panel 4071 and other input devices 4072. Touch panel 4071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 4071 using a finger, a stylus, or any suitable object or attachment). The touch panel 4071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 410, receives a command from the processor 410, and executes the command. In addition, the touch panel 4071 can be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 4071, the user input unit 407 may include other input devices 4072. Specifically, the other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 4071 can be overlaid on the display panel 4061, and when the touch panel 4071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 410 to determine the type of the touch event, and then the processor 410 provides a corresponding visual output on the display panel 4061 according to the type of the touch event. Although in fig. 5, the touch panel 4071 and the display panel 4061 are two independent components to implement the input and output functions of the server, in some embodiments, the touch panel 4071 and the display panel 4061 may be integrated to implement the input and output functions of the server, which is not limited herein.
The interface unit 408 is an interface for connecting an external device to the server 400. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 408 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the server 400 or may be used to transmit data between the server 400 and an external device.
The memory 409 may be used to store software programs as well as various data. The memory 409 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 409 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 410 is a control center of the server, connects various parts of the entire server using various interfaces and lines, performs various functions of the server and processes data by operating or executing software programs and/or modules stored in the memory 409 and calling data stored in the memory 409, thereby performing overall monitoring of the server. Processor 410 may include one or more processing units; preferably, the processor 410 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The server 400 may further include a power supply 411 (e.g., a battery) for supplying power to various components, and preferably, the power supply 411 may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the server 400 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, an embodiment of the present invention further provides a server, which includes a processor 410, a memory 409, and a computer program that is stored in the memory 409 and can be run on the processor 410, and when being executed by the processor 410, the computer program implements each process of the foregoing two-dimensional code generation method embodiment or the foregoing two-dimensional code verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements each process of the foregoing two-dimensional code generation method embodiment or the foregoing two-dimensional code verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (8)

1. A two-dimensional code verification method is applied to a server, and is characterized by comprising the following steps:
receiving an access request of a second mobile terminal to a target address corresponding to a two-dimensional code picture, wherein the second mobile terminal is a terminal authorized by a first mobile terminal, the two-dimensional code picture is the two-dimensional code picture of the first mobile terminal, the two-dimensional code picture comprises second contact information of a preset contact party and first contact information of the first mobile terminal, and the access request comprises the contact information of the second mobile terminal;
acquiring a two-dimensional code identifier in the target address;
searching target contact party record information stored in association with the two-dimension code identifier in pre-stored contact party record information, wherein the target contact party record information comprises first contact information of the first mobile terminal and second contact information of a preset contact party authorized by the first mobile terminal;
if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information, acquiring the first contact information of the first mobile terminal;
and sending the first contact information of the first mobile terminal to the second mobile terminal.
2. The method of claim 1,
if the target contact party record information comprises the contact times of the target preset contact party;
before the obtaining of the first contact information of the first mobile terminal, the method further includes:
judging whether the contact times of the target preset contact party are greater than zero or not;
the acquiring the first contact information of the first mobile terminal includes:
if the number of times of contact of the target preset contact party is greater than zero, acquiring first contact information of the first mobile terminal;
after the sending the first contact information of the first mobile terminal to the second mobile terminal, the method further includes:
and reducing the number of times of contact of the target preset contact party in the target contact party record information by one.
3. The method of claim 1,
if the target contact party record information further comprises a first identification password, the access request further comprises a second identification password sent by the first mobile terminal to the second mobile terminal;
before the obtaining of the first contact information of the first mobile terminal, the method further includes:
judging whether a target first identification password corresponding to the target preset contact party is consistent with the second identification password in the access request or not;
the acquiring the first contact information of the first mobile terminal includes:
and if the target first identification password corresponding to the target preset contact party is consistent with the second identification password in the access request, acquiring first contact information of the first mobile terminal.
4. The method of claim 3, wherein the first identification code comprises a plurality of identification codes for different preset contacts or one identification code for the two-dimensional code picture.
5. The method of claim 1, wherein the contact information of the preset contact comprises a telephone number or a domain name.
6. A server, characterized in that the server comprises:
the second receiving module is used for receiving an access request of a second mobile terminal to a target address corresponding to a two-dimensional code picture, wherein the second mobile terminal is a terminal authorized by a first mobile terminal, the two-dimensional code picture is the two-dimensional code picture of the first mobile terminal, the two-dimensional code picture comprises second contact information of a preset contact party and first contact information of the first mobile terminal, and the access request comprises the contact information of the second mobile terminal;
the first acquisition module is used for acquiring the two-dimension code identification in the target address;
the searching module is used for searching target contact party record information which is stored in association with the two-dimension code identifier in pre-stored contact party record information, wherein the target contact party record information comprises first contact information of the first mobile terminal and second contact information of a preset contact party authorized by the first mobile terminal;
the second obtaining module is used for obtaining the first contact information of the first mobile terminal if the target second contact information of the target preset contact matched with the contact information of the second mobile terminal is found in the target contact record information;
and the second sending module is used for sending the first contact information of the first mobile terminal to the second mobile terminal.
7. A server, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps in the two-dimensional code authentication method according to any one of claims 1 to 5.
8. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps in the two-dimensional code authentication method according to any one of claims 1 to 5.
CN201810226314.1A 2018-03-19 2018-03-19 Two-dimensional code generation and verification method and server Active CN108510022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810226314.1A CN108510022B (en) 2018-03-19 2018-03-19 Two-dimensional code generation and verification method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810226314.1A CN108510022B (en) 2018-03-19 2018-03-19 Two-dimensional code generation and verification method and server

Publications (2)

Publication Number Publication Date
CN108510022A CN108510022A (en) 2018-09-07
CN108510022B true CN108510022B (en) 2022-02-01

Family

ID=63377631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810226314.1A Active CN108510022B (en) 2018-03-19 2018-03-19 Two-dimensional code generation and verification method and server

Country Status (1)

Country Link
CN (1) CN108510022B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109658091A (en) * 2018-12-13 2019-04-19 青岛博宁福田智能交通科技发展有限公司 Service implementation method, system, equipment and storage medium based on two-dimension code
CN109753784B (en) * 2018-12-24 2021-07-30 维沃移动通信有限公司 Authorization method based on multi-dimensional code, mobile terminal and server
CN110298421B (en) * 2019-06-26 2023-11-03 云宝宝大数据产业发展有限责任公司 Online generation, offline generation and verification method and device for two-dimensional code
CN110297807B (en) * 2019-07-01 2023-03-14 深圳盒子信息科技有限公司 Two-dimensional code management method and device
CN110727886A (en) * 2019-09-06 2020-01-24 深圳前海金融资产交易所有限公司 Multi-terminal linkage method and device and computer readable storage medium
CN111661531B (en) * 2020-06-05 2022-07-19 广东慧福信息科技有限公司 Medical waste recovery system and data storage method thereof
CN113238738A (en) * 2021-06-16 2021-08-10 杭州遥望网络科技有限公司 Automatic generation method, device, equipment and medium for small program two-dimensional code
CN114039844A (en) * 2021-10-26 2022-02-11 深圳毅芯半导体有限公司 Internet of things equipment management method, system and device
CN116409066B (en) * 2021-12-31 2023-09-01 芯电智联(北京)科技有限公司 NFC label issuing method and device
CN114745184B (en) * 2022-04-15 2024-03-22 商客通尚景科技江苏有限公司 Number graphical encryption method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100876434B1 (en) * 2008-06-23 2008-12-29 주식회사 스마트카드연구소 System for error verification of usim card and method thereof
CN103647634A (en) * 2013-12-17 2014-03-19 王天田 Indirect communication method capable of protecting privacy
CN103810165A (en) * 2012-11-06 2014-05-21 金蝶软件(中国)有限公司 Processing method, relevant device and relevant system for statistical data
CN104917766A (en) * 2015-06-10 2015-09-16 飞天诚信科技股份有限公司 Security authentication method for two-dimension code

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100876434B1 (en) * 2008-06-23 2008-12-29 주식회사 스마트카드연구소 System for error verification of usim card and method thereof
CN103810165A (en) * 2012-11-06 2014-05-21 金蝶软件(中国)有限公司 Processing method, relevant device and relevant system for statistical data
CN103647634A (en) * 2013-12-17 2014-03-19 王天田 Indirect communication method capable of protecting privacy
CN104917766A (en) * 2015-06-10 2015-09-16 飞天诚信科技股份有限公司 Security authentication method for two-dimension code

Also Published As

Publication number Publication date
CN108510022A (en) 2018-09-07

Similar Documents

Publication Publication Date Title
CN108510022B (en) Two-dimensional code generation and verification method and server
CN108616652B (en) Data protection method and device, terminal and computer readable storage medium
WO2017084288A1 (en) Method and device for verifying identity
CN108595946B (en) Privacy protection method and terminal
CN110188524B (en) Information encryption method, information decryption method and terminal
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN110035183B (en) Information sharing method and terminal
CN107317680B (en) Method and system for marking safety account and computer readable storage medium
CN110990849A (en) Encryption and decryption method for private data and terminal
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN110990850A (en) Authority management method and electronic equipment
CN113221150A (en) Data protection method and device
CN111159687B (en) Account information processing method, electronic equipment and server
CN111159738B (en) Authority configuration method, application login method and device
CN109451143B (en) Call method and mobile terminal
CN110851408A (en) File compression method, file decompression method and electronic equipment
CN110717163B (en) Interaction method and terminal equipment
CN108737341B (en) Service processing method, terminal and server
CN115174758A (en) Picture encryption method and device, electronic equipment and storage medium
CN110784467B (en) Network link processing method in message and electronic equipment
CN108040186A (en) The sending method and mobile terminal of a kind of dtmf signal
CN109257441B (en) Wireless local area network position acquisition method and device
CN109246290B (en) Authority management method and mobile terminal
CN108012023B (en) Communication message processing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant