CN108898206A - A kind of method and barcode scanning safe checking method generating gathering code - Google Patents

A kind of method and barcode scanning safe checking method generating gathering code Download PDF

Info

Publication number
CN108898206A
CN108898206A CN201810596992.7A CN201810596992A CN108898206A CN 108898206 A CN108898206 A CN 108898206A CN 201810596992 A CN201810596992 A CN 201810596992A CN 108898206 A CN108898206 A CN 108898206A
Authority
CN
China
Prior art keywords
code
dimensional code
user
gathering
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810596992.7A
Other languages
Chinese (zh)
Inventor
董温彬
陈逢源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201810596992.7A priority Critical patent/CN108898206A/en
Publication of CN108898206A publication Critical patent/CN108898206A/en
Priority to PCT/CN2018/124947 priority patent/WO2019237718A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The method and a kind of barcode scanning safe checking method that gathering code generates are generated in anti-tamper two dimensional code server end this application provides a kind of.The method for generating gathering code in anti-tamper two dimensional code server end generates request including receiving the gathering code that client is sent;It includes the User Identity that client corresponds to user that the gathering code, which generates request,;Two dimensional code is generated according to the User Identity;The user identifier picture for the corresponding user that two dimensional code generated and client are submitted is combined, gathering code is obtained, so as to based on gathering code progress barcode scanning safety check.By audit to the user identifier picture and with the binding of User Identity, the user identifier picture in the user identifier picture stored in server database and payment code can be verified, improve the safety of barcode scanning payment.

Description

A kind of method and barcode scanning safe checking method generating gathering code
【Technical field】
This application involves internet application field more particularly to a kind of gathering code generating method and barcode scanning safety check sides Method.
【Background technique】
With the fast development of computer technology, it is more and more convenient that people's lives also depend on technology development.For example, very Multi-service all begins to use barcode scanning function, can be obtained by relevant business information by sweeping to sweep, executes corresponding business.With For payment application, barcode scanning payment has been more and more widely used in people's daily life, and user is not required in payment Cash is used, the static gathering code for sweeping beneficiary can be swept, so that it may complete payment.
Static state gathering code is mainly that trade company to payment mechanism application is pasted on the two dimensional code collected money before shop.At present Relatively common is that the Alipay two dimension gathering code that perhaps wechat official provides or one kind that Ba Deng mechanism provides of collecting money are integrated The gathering code of type, common type are the square of white background black block.
The two dimensional code issued at present is although convenient and efficient, but there is also security risks, since people fails to see code, even if oneself Two dimensional code be replaced and can not also learn:
1, for trade company, there is the risk that can be tampered, often produce similar event on network at present in two dimensional code, right Trade company causes serious economic loss, and often traces difficulty.
2, for paying party, in certain close quarters, compare the ownership for being difficult to distinguish two dimensional code, and since part is illegal The presence of molecule, is likely to result in potential monetary losses, and the safety of barcode scanning is unable to get guarantee.
The safety for how ensureing barcode scanning mode while barcode scanning mode brings advantage to the user and one need It solves the problems, such as.
【Summary of the invention】
The many aspects of the application provide a kind of gathering code generating method and barcode scanning safe checking method, for improving barcode scanning Safety.
The one side of the application provides a kind of method for generating gathering code in anti-tamper two dimensional code server end, including:It connects It receives the gathering code that client is sent and generates request;It includes the user identity mark that client corresponds to user that the gathering code, which generates request, Know;Two dimensional code is generated according to the User Identity;The use for the corresponding user that two dimensional code generated and client are submitted Family mark picture is combined, and obtains gathering code, to carry out barcode scanning safety check based on the gathering code.
The one side of the application provides a kind of barcode scanning safe checking method, including:Anti-tamper two dimensional code server receives visitor The service request for the gathering code that family end is sent;Wherein, the gathering code is by anti-tamper two dimensional code server according to beneficiary User Identity generates two dimensional code;The two dimensional code of generation and beneficiary user identifier picture are combined; Anti-tamper two dimensional code server is searched corresponding based on the corresponding User Identity of gathering code for including in the service request User identifier picture for safety check;Anti-tamper two dimensional code server marks the corresponding user for being used for safety check Know picture and be sent to the client, to determine safety in client based on the user identifier picture for safety check Check results.
The another aspect of the application provides a kind of barcode scanning safe checking method, including:Anti-tamper two dimensional code server receives The service request for the gathering code that client is sent;Wherein, the gathering code is by anti-tamper two dimensional code server according to beneficiary User Identity generate two dimensional code;Two dimensional code generated and beneficiary user identifier picture are combined; Anti-tamper two dimensional code server searches corresponding be used for based on the corresponding User Identity of gathering code for including in service request The user identifier picture of safety check;Anti-tamper two dimensional code server is to the user identifier in the gathering code for including in service request The user identifier picture for safety check that picture and lookup obtain carries out similitude and compares to determine safety check result.
The another aspect of the application, provides a kind of equipment, and the equipment includes:One or more processors;Storage device, For storing one or more programs, when one or more of programs are executed by one or more of processors, so that institute It states one or more processors and realizes any above-mentioned method.
The another aspect of the application provides a kind of computer readable storage medium, is stored thereon with computer program, special Sign is that the program realizes any above-mentioned method when being executed by processor.
By the technical solution it is found that the embodiment of the present application, by increasing user identifier picture in two dimensional code, so that with Whether safely family can verify two dimensional code by the mark picture, to improve the safety of barcode scanning payment transaction.
【Detailed description of the invention】
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some realities of the application Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is a kind of method for generating gathering code in anti-tamper two dimensional code server end that the embodiment of the present application one provides Flow diagram;
Fig. 2 is a kind of flow diagram for barcode scanning method of calibration that the embodiment of the present application two provides;
Fig. 3 is a kind of flow diagram for barcode scanning method of calibration that the embodiment of the present application two provides;
Fig. 4 is a kind of flow diagram for barcode scanning method of calibration that the embodiment of the present application two provides;
Fig. 5 is the block diagram suitable for being used to realize the exemplary computer system/server of the embodiment of the present invention.
【Specific embodiment】
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical solution in some embodiments of the present application is clearly and completely described, it is clear that described reality Applying example is some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, the common skill in this field Art personnel whole other embodiments obtained without creative efforts, belong to the model of the application protection It encloses.
In addition, the terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist Three kinds of relationships, for example, A and/or B, can indicate:Individualism A exists simultaneously A and B, these three situations of individualism B.Separately Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or".
Fig. 1 is a kind of stream of method that gathering code is generated in anti-tamper two dimensional code server end provided by the embodiments of the present application Journey schematic diagram, as shown in Figure 1, including:
In a kind of preferred implementation of the present embodiment, beneficiary needs to infuse to anti-tamper two dimensional code server in advance Volume, anti-tamper two dimensional code server distributes the User Identity of the user for identification for it after succeeding in registration.Only register Beneficiary user after success just can request that anti-tamper two dimensional code server generates gathering code for it.
Preferably, beneficiary sends registration request to anti-tamper two dimensional code server by client, by anti-tamper two dimension Code server is based on the registration request, is the identity of beneficiary distributing user.
Beneficiary opens client on mobile terminals or opens the corresponding webpage of anti-tamper two dimensional code server, in user It is registered, such as input username and password is registered, can also be received anti-by filling in phone number in register interface It is verified after distorting the verifying short message of two dimensional code code agency transmission to register.
Anti-tamper two dimensional code server is the identity of beneficiary distributing user, and sends prompt of succeeding in registration to beneficiary Message prompts user registration success.
The User Identity can identify beneficiary identity, and be used to determine the qualifications text that beneficiary uploads Part, user identifier picture etc..
In a kind of preferred implementation of the present embodiment, beneficiary needs to upload qualifications file in advance to anti-tamper Two dimensional code server, so that anti-tamper two dimensional code server audits the qualifications file.
Preferably, after beneficiary succeeds in registration, user's qualifications are submitted to anti-tamper two dimensional code server;Anti-tamper two Dimension code server audits user's qualifications information, the qualifications information and the use that audit is passed through Family identity is matched, wherein the identity of existence anduniquess validated user matches with the qualifications information.
Preferably, beneficiary can click the upload qualifications file option in client or corresponding webpage, Xiang Fang Distort the qualifications file, such as identity card, business license etc. of the selection of two dimensional code server upload user;Receive anti-tamper two Tie up the qualifications Note Auditing success message that code server returns.
The qualifications file can prove the identity of beneficiary, improve the safety of payment.By to beneficiary Qualifications file is audited, it can be ensured that the identity of beneficiary prevents other people from usurping beneficiary identity, improves payment Safety.
Client in the present embodiment can be the client that anti-tamper two dimensional code code agency provides, and can also include it He is recognized or other clients authorizing, that technical scheme may be implemented by corresponding anti-tamper two dimensional code code agency End.Server can be anti-tamper two dimensional code server.
The anti-tamper two dimensional code server is for providing the gathering of the user identifier picture comprising beneficiary for beneficiary Code, and the user identifier picture being stored in server database is supplied in paying party and gathering code when scanning payment User identifier picture compares verification, and gathering code is prevented to be tampered, to improve the safety of barcode scanning payment.
In a preferred embodiment of the present embodiment, anti-tamper two dimensional code code agency can be same with payment mechanism Mechanism, i.e., the client that anti-tamper two dimensional code code agency provides are client, anti-tamper two dimensional code server and payment services Device is same server.
In another preferred embodiment of the present embodiment, anti-tamper two dimensional code code agency and payment mechanism can be for not Same mechanism is called the service of anti-tamper two dimensional code code agency by payment mechanism.
In step s 11, client sends gathering code to anti-tamper two dimensional code server and generates request;The gathering code is raw It include the User Identity that client corresponds to user at request;
Preferably, beneficiary can click the gathering code option of the generation in client, and triggering user end to server is sent Code of collecting money generates request, is that the beneficiary generates a corresponding gathering code with request server.
In step s 12, the gathering code that anti-tamper two dimensional code server receives that client is sent generates request;According to described User Identity generates two dimensional code.
This step can generate logic using conventional two dimensional code, repeat no more.The two dimensional code includes the use of beneficiary Family identity.The two dimensional code can also include the chained address of the anti-tamper two dimensional code server of direction.
In step s 13, the corresponding user that anti-tamper two dimensional code server submits two dimensional code generated with client User identifier picture be combined, obtain gathering code, so as to based on the gathering code progress barcode scanning safety check.
Preferably, the user identifier picture can be the portrait of user, logo or other it is any can be with identity user The mark picture of identity.
In a kind of preferred implementation of the present embodiment, it includes user identifier picture in request that the gathering code, which generates,.
In another preferred implementation of the present embodiment, client uploads to the user identifier picture anti-in advance Two dimensional code server is distorted, so that anti-tamper two dimensional code server audits the user identifier picture.Anti-tamper two dimension Code server generates the identity for the user for including in request according to the gathering code, searches corresponding user identifier picture. Picture is identified by prior upload user, the successful speed that gathering code generates can be improved.
Preferably, beneficiary can click the mark picture option of the upload user in client, to selected by server upload The user identifier picture selected;Receive the user identifier picture examination success message that server returns.
Preferably, the user identifier picture that anti-tamper two dimensional code server uploads beneficiary by image recognition technology into Row audit, so that whether the user identifier picture for determining uploaded is consistent with submitter or its business license.For example, if institute Stating user identifier picture is user's portrait, then judges whether user's portrait is consistent with user identity card;If user's mark Knowledge picture is logo, then judges whether the logo is consistent with business license.
Preferably, anti-tamper two dimensional code server can be examined in the form of the user identifier picture uploaded to beneficiary carries out Core.For example, being audited automatically to the format of user identifier picture, size, resolution ratio etc.;Whether user identifier picture is violated Law or social morality carry out automatic or manual audit etc..
After the approval, the user identifier picture passed through of auditing is stored in server by anti-tamper two dimensional code server Database in, and to beneficiary issue the successful prompt information of user identifier picture examination.What is stored in the database is described User identifier picture is determined with corresponding User Identity.
If audit does not pass through, anti-tamper two dimensional code server issues mentioning for user identifier picture examination failure to beneficiary Show information, prompting beneficiary, upload user identifies picture again.
The user identifier picture is used for the background picture as two dimensional code and is combined with two dimensional code as gathering code, When paying party, which scans gathering code, pays the bill to beneficiary, anti-tamper two dimensional code server is first according to the corresponding user's body of gathering code Part mark searches corresponding user identifier picture in the database of server and is sent to client, to be shown to paying party, The background picture in gathering code scanned for paying party with it compares verification;If not, sending indicating risk to paying party Information, present the bill for payment side terminate payment, such as " current gathering code is not registered in anti-tamper two dimensional code payment system ".
Preferably, the user identifier picture is subjected to desalt processing;Using the user identifier picture after the desalination as The background picture of two dimensional code is simultaneously combined with two dimensional code.The desalination standard is that normal scan and can identify the gathering of generation Two dimensional code in code, as long as not influencing the fault-tolerant error-correcting performance of the two dimensional code.Error correction based on two dimensional code, even if part Capped or loss, still is able to scan and identify two dimensional code therein.
Preferably, the user identifier picture is shown in the neighboring area of two dimensional code.
Preferably, in barcode scanning payment scene, barcode scanning safety check is carried out based on the gathering code.
The corresponding User Identity of the gathering code is used to search for anti-tamper two dimensional code server corresponding for pacifying The user identifier picture that whole school tests;To determine safety check in client based on the corresponding user identifier picture of the gathering code As a result;Or, being used to pacify with what lookup obtained by image of the anti-tamper two dimensional code server to the gathering code for including in service request The user identifier picture that whole school tests carries out similitude and compares to determine safety check result.
In step S14, the gathering code of generation is sent to client by anti-tamper two dimensional code server.
Preferably, the gathering code is picture format, can be shown and be printed by client;Or, the gathering code It can be printed by server and be supplied to beneficiary.
Client can show the gathering code, scan the gathering code from paying party and pay the bill to beneficiary.Beneficiary can also To print and put up the gathering code, the gathering code is scanned for paying party and is paid the bill.
It is different from user's head image information in other existing gathering codes, by the user identifier picture in the present embodiment Audit and binding with User Identity, in the server by user identifier picture storage, so that paying party is swept Verification is compared according to the user identifier picture in the user identifier picture and payment code stored in server database when code, Improve the safety of barcode scanning payment.
Fig. 2 is a kind of flow diagram for barcode scanning method of calibration that the embodiment of the present application two provides, as shown in Fig. 2, when paying When scanning gathering code in money side's is paid the bill to beneficiary, process shown in Fig. 2 can be executed:
In the step s 21, client carries out barcode scanning to gathering code, and the industry of gathering code is sent to anti-tamper two dimensional code server Business request;
The client can be wechat, Alipay, contain and pay the payment softwares clients such as logical wallet, can also include other Recognized or other clients authorizing, that technical scheme may be implemented by corresponding anti-tamper two dimensional code code agency.
The gathering code is to generate two dimensional code according to the User Identity of beneficiary by anti-tamper two dimensional code server;It will What the two dimensional code and beneficiary user identifier picture generated was combined.
Paying party can open the client on oneself mobile phone when shopping, which terminates, to be paid the bill to beneficiary, scanning The gathering code that beneficiary provides sends service request to anti-tamper two dimensional code server.The service request is that request is anti-tamper Two dimensional code server carries out validity check to the gathering code.It is also possible to the payment request for the gathering code, first Validity check is carried out to the gathering code by anti-tamper two dimensional code server, verification is propped up after passing through for the two dimensional code It pays.
Preferably, client can parse the two dimensional code in gathering code, obtain receipts wherein included after code is collected money in scanning The User Identity of money side is used as the corresponding User Identity of gathering code, and anti-tamper according to the direction for including in two dimensional code Service request is sent to anti-tamper two dimensional code server by the chained address of two dimensional code server, and the service request includes scanning The corresponding User Identity of gathering code is obtained, carries out safety check for anti-tamper two dimensional code server.
In step S22, anti-tamper two dimensional code server receives the service request for the gathering code that client is sent, and is based on institute It states the corresponding User Identity of gathering code for including in service request and searches the corresponding user identifier figure for safety check Piece.
Preferably, the step further includes:Anti-tamper two dimensional code server includes according in the service request first The corresponding User Identity of gathering code determine corresponding user whether be anti-tamper two dimensional code payment system registration user, if It is that correspondence is searched in the database of server according to the corresponding User Identity of gathering code for including in the service request For safety check user identifier picture and be sent to client, to be shown to paying party, scanned for paying party with it User identifier picture in gathering code compares verification;If not, sending indicating risk information, present the bill for payment side to paying party Terminate payment, such as " current gathering code is not registered in anti-tamper two dimensional code payment system ".Wherein, the corresponding use It is to lead to audit after server audits the user identifier picture that beneficiary is sent in the user identifier picture of safety check The user identifier picture crossed is stored in the database of server.
In step S23, the user identifier picture is sent to client by anti-tamper two dimensional code server, in client It is shown to paying party in the payment interface at end, present the bill for payment side scans the user identifier picture shown in payment interface with it User identifier picture in gathering code compares.
In step s 24, if in the user identifier picture shown in the payment interface of client and the gathering code of scanning Background picture is identical, then paying party, which can be confirmed, continues to pay;If it is different, then paying party can terminate payment and inform gathering Side.
Preferably, paying party can click " confirmation " button in payment interface, continue to pay;Payment circle can also be clicked The " Cancel " button on face cancels payment.
In step s 25, anti-tamper two dimensional code server receives paying party and continues after paying order of accepting one's fate really, constructs phase The payment request answered, and the payment request is forwarded to payment server, the payment request is handled by payment server.
Preferably, include the identification information of respective pay software in the service request for the gathering code that client is sent, prevent It distorts two dimensional code server and corresponding payment request is constructed according to the identification information, and the payment request is forwarded to branch Pay the corresponding payment server of software.
Preferably, anti-tamper two dimensional code server, which receives paying party and cancels payment, accepts one's fate really after order, terminates payment behaviour Make.
Preferably, if anti-tamper two dimensional code server does not receive the confirmation instruction of user in the given time, for example, with Family is not confirmed, is not also cancelled, then terminates payment.
In step S26, after payment server receives the payment request, guidance paying party completes payment, is tied It calculates and beneficiary payment is notified to be completed.
Preferably, in another preferred embodiment of the invention,
Anti-tamper two dimensional code server is first according to the corresponding user identity mark of the gathering code for including in the service request Know determine corresponding user whether be anti-tamper two dimensional code payment system registration user, if so, according in the service request Including the corresponding User Identity of gathering code the corresponding user for safety check is searched in the database of server Mark picture is simultaneously sent to client, is scanned the corresponding user identifier picture for being used for safety check with it by client Gathering code in user identifier picture compare verification;If not, sending indicating risk information, present the bill for payment to paying party Side terminates payment, such as " current gathering code is not registered in anti-tamper two dimensional code payment system ".Wherein, described corresponding User identifier picture for safety check is after server audits the user identifier picture that beneficiary is sent, will to audit By user identifier picture be stored in the database of server.
The user in gathering code that client scans the corresponding user identifier picture for being used for safety check with it Mark picture compares verification, sends the consistent confirmation of comparing result to anti-tamper two dimensional code server according to check results and orders It enables, to continue to pay;Or, the inconsistent order of accepting one's fate really of comparing result is sent, to terminate payment;Or, confirmation order is not sent, with Terminate payment.
The payment that continues that anti-tamper two dimensional code server receives client transmission is accepted one's fate really after order, and corresponding branch is constructed Request is paid, and the payment request is forwarded to payment server, the payment request is handled by payment server.
Preferably, include the identification information of respective pay software in the service request for the gathering code that client is sent, prevent It distorts two dimensional code server and corresponding payment request is constructed according to the identification information, and the payment request is forwarded to branch Pay the corresponding payment server of software.
Preferably, anti-tamper two dimensional code server, which receives client and cancels payment, accepts one's fate really after order, terminates payment behaviour Make.Preferably, if anti-tamper two dimensional code server does not receive the confirmation instruction of client in the given time, for example, client End is not confirmed, is not also cancelled, then terminates payment.
It is different from user's head image information in other existing gathering codes, by the user identifier picture in the present embodiment Audit and binding with User Identity, paying party barcode scanning can be made to obtain the user stored in server database mark Know picture, compares verification with the user identifier picture in payment code, improve the safety of barcode scanning payment.
Fig. 3 is a kind of flow diagram for barcode scanning method of calibration that the embodiment of the present application two provides, as shown in figure 3, when paying When scanning gathering code in money side's is paid the bill to beneficiary, process shown in Fig. 3 can be executed:
In step S31, client carries out barcode scanning to gathering code, and the industry of gathering code is sent to anti-tamper two dimensional code server Business request;
The client can be wechat, Alipay, contain and pay the payment softwares clients such as logical wallet, can also include other Recognized or other clients authorizing, that technical scheme may be implemented by corresponding anti-tamper two dimensional code code agency.
The gathering code is to generate two dimensional code according to the User Identity of beneficiary by anti-tamper two dimensional code server;It will What the two dimensional code and beneficiary user identifier picture generated was combined.
Paying party can open the client on oneself mobile phone when shopping terminates to be paid the bill, and scanning beneficiary provides Gathering code sends service request to anti-tamper two dimensional code server.The service request is to request anti-tamper two dimensional code server Validity check is carried out to the gathering code.It is also possible to the payment request for the gathering code, first by anti-tamper two dimension Code server carries out validity check to the gathering code, and verification is paid after passing through for the two dimensional code.
Preferably, client can be after code be collected money in scanning, and the two dimensional code in parsing gathering code obtains receipts wherein included The User Identity of money side is used as the corresponding User Identity of gathering code, and anti-tamper according to the direction for including in two dimensional code Service request is sent to anti-tamper two dimensional code server by the chained address of two dimensional code server, and the service request includes scanning The obtained corresponding User Identity of gathering code carries out safety check for anti-tamper two dimensional code server.The service request It further include the user identifier picture in gathering code.
In step s 32, anti-tamper two dimensional code server receives the service request for the gathering code that client is sent, and is based on institute It states the corresponding User Identity of gathering code for including in service request and searches the corresponding user identifier figure for safety check Piece;To the user identifier picture in the gathering code for including in the service request and search the obtained user for safety check It identifies picture and carries out similitude judgement.Wherein, the obtained user identifier picture for safety check of searching is server After auditing to the user identifier picture that beneficiary is sent, the user identifier picture that audit passes through is stored in the number of server According in library.
Preferably, the step further includes:Anti-tamper two dimensional code server includes according in the service request first The corresponding User Identity of gathering code determine corresponding user whether be anti-tamper two dimensional code payment system registration user, if Be user identifier picture in the gathering code for including in the service request and searching obtain for safety check user identifier Picture carries out similitude comparison;If not, sending indicating risk information to paying party, present the bill for payment side, which terminates, to be paid, such as " when Preceding gathering code is not registered in anti-tamper two dimensional code payment system ".
In step S33, if the beneficiary user identifier picture in the gathering code for including in service request is obtained with lookup User identifier picture similarity be higher than preset threshold, continue to pay;Anti-tamper two dimensional code server construction is paid accordingly Request, and the payment request is forwarded to payment server, the payment request is handled by payment server.
It preferably, include the identification information of respective pay software, anti-tamper two dimension in the service request that client is sent Code server constructs corresponding payment request according to the identification information, and the payment request is forwarded to payment software pair The payment server answered executes step S35.
In step S34, if being lower than preset threshold, anti-tamper two dimensional code server terminates payment, sends to paying party Prompting message.
In step s 35, after payment server receives the payment request, guidance paying party completes payment, is tied It calculates and beneficiary payment is notified to be completed.
It is different from user's head image information in other existing gathering codes, by the user identifier picture in the present embodiment Audit and binding with User Identity, can be by the user identifier picture stored in server database and payment code In user identifier picture carry out automatic comparison verification, improve the safety of barcode scanning payment.
Fig. 4 is a kind of flow diagram for barcode scanning method of calibration that the embodiment of the present application two provides, as shown in figure 4, when paying When money direction beneficiary is paid the bill, process shown in Fig. 4 can be executed:
In step S41, client sends the service request of gathering code to anti-tamper two dimensional code server;
The client can be wechat, Alipay, contain and pay the payment softwares clients such as logical wallet, can also include other Recognized or other clients authorizing, that technical scheme may be implemented by corresponding anti-tamper two dimensional code code agency.
The gathering code is to generate two dimensional code according to the User Identity of beneficiary by anti-tamper two dimensional code server;It will What the two dimensional code and beneficiary user identifier picture generated was combined.
Paying party can open the client on oneself mobile phone when shopping terminates to be paid the bill, and shooting beneficiary provides Gathering code sends service request to anti-tamper two dimensional code server.The service request is to request anti-tamper two dimensional code server Validity check is carried out to the gathering code.It is also possible to the payment request for the gathering code, first by anti-tamper two dimension Code server carries out validity check to the gathering code, and verification is paid after passing through for the two dimensional code.
Preferably, the entrance that anti-tamper two dimensional code server has been preset in client, after opening the entrance, calling mobile phone Camera, shooting beneficiary provide gathering code, to anti-tamper two dimensional code server send service request, the service request Including the user identifier picture in gathering code, gathering code therein is identified for anti-tamper two dimensional code server, carries out safety check.
In step S42, anti-tamper two dimensional code server receives the service request that client sends gathering code, to the industry The user identifier picture in gathering code for including in business request is decoded, and obtains the corresponding user identity mark of the gathering code Know;The corresponding use for safety check is searched based on the corresponding User Identity of gathering code for including in the service request Family identifies picture;Safe school is used for what lookup obtained to the user identifier picture in the gathering code for including in the service request The user identifier picture tested carries out similitude judgement.Wherein, described to search the obtained user identifier picture for safety check It is that the user identifier picture that audit passes through is stored in clothes after server audits the user identifier picture that beneficiary is sent It is engaged in the database of device.
Preferably, the step further includes:Anti-tamper two dimensional code server includes according in the service request first The corresponding User Identity of gathering code determine corresponding user whether be anti-tamper two dimensional code payment system registration user, if Be user identifier picture in the gathering code for including in the service request and searching obtain for safety check user identifier Picture carries out similitude comparison;If not, sending indicating risk information to paying party, present the bill for payment side, which terminates, to be paid, such as " when Preceding gathering code is not registered in anti-tamper two dimensional code payment system ".
In step S43, if the beneficiary user identifier picture in the gathering code for including in service request is obtained with lookup User identifier picture similarity be higher than preset threshold, continue to pay;Anti-tamper two dimensional code server construction is paid accordingly Request, and the payment request is forwarded to payment server, the payment request is handled by payment server.
It preferably, include the identification information of respective pay software, anti-tamper two dimension in the service request that client is sent Code server constructs corresponding payment request according to the identification information, and the payment request is forwarded to payment software pair The payment server answered executes step S45.
In step S44, if being lower than preset threshold, anti-tamper two dimensional code server terminates payment, sends to paying party Prompting message.
In step S45, after payment server receives the payment request, guidance paying party completes payment, is tied It calculates and beneficiary payment is notified to be completed.
It is different from user's head image information in other existing gathering codes, by the user identifier picture in the present embodiment Audit and binding with User Identity, can be by the user identifier picture stored in server database and payment code In user identifier picture carry out automatic comparison verification, improve the safety of barcode scanning payment.
Fig. 5 shows the frame for being suitable for the exemplary computer system/server 012 for being used to realize embodiment of the present invention Figure.The computer system/server 012 that Fig. 5 is shown is only an example, should not function and use to the embodiment of the present invention Range band carrys out any restrictions.
As shown in figure 5, computer system/server 012 is showed in the form of universal computing device.Computer system/clothes The component of business device 012 can include but is not limited to:One or more processor or processing unit 016, system storage 028, connect the bus 018 of different system components (including system storage 028 and processing unit 016).
Bus 018 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 012 typically comprises a variety of computer system readable media.These media, which can be, appoints The usable medium what can be accessed by computer system/server 012, including volatile and non-volatile media, movably With immovable medium.
System storage 028 may include the computer system readable media of form of volatile memory, such as deposit at random Access to memory (RAM) 030 and/or cache memory 032.Computer system/server 012 may further include other Removable/nonremovable, volatile/non-volatile computer system storage medium.Only as an example, storage system 034 can For reading and writing immovable, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although in Fig. 5 It is not shown, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and to can The CD drive of mobile anonvolatile optical disk (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these situations Under, each driver can be connected by one or more data media interfaces with bus 018.Memory 028 may include At least one program product, the program product have one group of (for example, at least one) program module, these program modules are configured To execute the function of various embodiments of the present invention.
Program/utility 040 with one group of (at least one) program module 042, can store in such as memory In 028, such program module 042 includes --- but being not limited to --- operating system, one or more application program, other It may include the realization of network environment in program module and program data, each of these examples or certain combination.Journey Sequence module 042 usually executes function and/or method in embodiment described in the invention.
Computer system/server 012 can also with one or more external equipments 014 (such as keyboard, sensing equipment, Display 024 etc.) communication, in the present invention, computer system/server 012 is communicated with outside radar equipment, can also be with One or more enable a user to the equipment interacted with the computer system/server 012 communication, and/or with make the meter Any equipment (such as network interface card, the modulation that calculation machine systems/servers 012 can be communicated with one or more of the other calculating equipment Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 022.Also, computer system/clothes Being engaged in device 012 can also be by network adapter 020 and one or more network (such as local area network (LAN), wide area network (WAN) And/or public network, such as internet) communication.As shown in figure 5, network adapter 020 by bus 018 and computer system/ Other modules of server 012 communicate.It should be understood that computer system/server 012 can be combined although being not shown in Fig. 5 Using other hardware and/or software module, including but not limited to:Microcode, device driver, redundant processing unit, external magnetic Dish driving array, RAID system, tape drive and data backup storage system etc..
The program that processing unit 016 is stored in system storage 028 by operation, thereby executing described in the invention Function and/or method in embodiment.
Above-mentioned computer program can be set in computer storage medium, i.e., the computer storage medium is encoded with Computer program, the program by one or more computers when being executed, so that one or more computers execute in the present invention State method flow shown in embodiment and/or device operation.
With time, the development of technology, medium meaning is more and more extensive, and the route of transmission of computer program is no longer limited by Tangible medium, can also be directly from network downloading etc..It can be using any combination of one or more computer-readable media. Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer-readable storage medium Matter for example may be-but not limited to-system, device or the device of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or Any above combination of person.The more specific example (non exhaustive list) of computer readable storage medium includes:With one Or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium other than computer readable storage medium, which can send, propagate or Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or Wide area network (WAN) is connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service Quotient is connected by internet).
Finally it should be noted that:Above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that:It still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (23)

1. a kind of method for generating gathering code in anti-tamper two dimensional code server end, which is characterized in that including:
It receives the gathering code that client is sent and generates request, it includes the user that client corresponds to user that the gathering code, which generates request, Identity;
Two dimensional code is generated according to the User Identity;
The user identifier picture for the corresponding user that two dimensional code generated and client are submitted is combined, gathering code is obtained, To carry out barcode scanning safety check based on the gathering code.
2. the method according to claim 1, wherein the method also includes:
Obtain the registration request for the correspondence user that client is sent;
Based on the registration request, user's distributing user identity is corresponded to for client.
3. according to the method described in claim 2, it is characterized in that, described correspond to user's distributing user identity for client Further include later:
Obtain the user identifier picture for the correspondence user that client is submitted;
The user identifier picture is associated with the User Identity.
4. according to the method described in claim 3, it is characterized in that, described by the user identifier picture and the user identity Mark be associated including:
The user identifier picture is audited, the user identifier picture and the User Identity that audit is passed through It is associated.
5. according to the method described in claim 2, it is characterized in that,
It is described for the client correspond to the identity of user's distributing user later further include:
Obtain the user's qualifications information for the correspondence user that client is submitted;
User's qualifications information is audited, the qualifications information that audit is passed through and the user identity Mark is matched, wherein the identity of existence anduniquess validated user matches with the qualifications information.
6. the method according to claim 1, wherein
The two dimensional code includes the User Identity that the client corresponds to user;Also comprising being directed toward anti-tamper two dimensional code service The chained address of device.
7. the method according to claim 1, wherein two dimensional code generated and user identifier picture are carried out group Conjunction includes:
It is combined using the user identifier picture as the background picture of two dimensional code with two dimensional code;Alternatively,
The user identifier picture is shown in the neighboring area of two dimensional code.
8. the method according to claim 1, wherein the method also includes:
Client is sent by the gathering code of generation, so that paying party carries out barcode scanning payment.
9. a kind of barcode scanning safe checking method, which is characterized in that including:
Anti-tamper two dimensional code server receives the service request for the gathering code that client is sent;Wherein, the gathering code is by preventing It distorts two dimensional code server and two dimensional code is generated according to the User Identity of beneficiary;By the two dimensional code and beneficiary of generation User identifier picture is combined;
Anti-tamper two dimensional code server is based on the corresponding User Identity lookup pair of gathering code for including in the service request The user identifier picture for safety check answered;
The corresponding user identifier picture for being used for safety check is sent to the client by anti-tamper two dimensional code server, To determine safety check result in client based on the user identifier picture for safety check.
10. according to the method described in claim 9, it is characterized in that, described based on the gathering code for including in the service request Corresponding User Identity searches the corresponding user identifier picture for safety check:
Determine whether corresponding user is anti-tamper according to the corresponding User Identity of the gathering code for including in the service request The registration user of two dimensional code payment system, if so, based on the corresponding user identity of gathering code for including in the service request The corresponding user identifier picture for safety check of identifier lookup;If not, sending prompt information to client.
11. according to the method described in claim 9, it is characterized in that, the method also includes:
Anti-tamper two dimensional code server is according to the safety check as a result, executing respective operations.
12. according to the method for claim 11, which is characterized in that the anti-tamper two dimensional code server is according to the safety Check results, executing respective operations includes:
The consistent confirmation order of comparing result that client is sent is received, continues to pay;Or,
The consistent confirmation order of comparing result for not receiving client transmission, terminates payment;Or
The inconsistent order of accepting one's fate really of comparing result that client is sent is received, payment is terminated.
13. according to the method for claim 12, which is characterized in that it is described continue payment include:
It constructs corresponding payment request and handles;Or,
Construct corresponding payment request, and the payment request be forwarded to payment server, handled as payment server described in Payment request.
14. according to the method for claim 12, which is characterized in that the comparing result for not receiving client transmission is consistent Really order of accepting one's fate includes:
The consistent confirmation order of comparing result of client transmission is not received within a preset time.
15. a kind of barcode scanning safe checking method, it is characterised in that:
Anti-tamper two dimensional code server receives the service request for the gathering code that client is sent;Wherein, the gathering code is by preventing It distorts two dimensional code server and two dimensional code is generated according to the User Identity of beneficiary;Two dimensional code generated and beneficiary are used Family mark picture is combined;
Anti-tamper two dimensional code server is searched corresponding based on the corresponding User Identity of gathering code for including in service request User identifier picture for safety check;
Anti-tamper two dimensional code server is to the beneficiary user identifier picture in the gathering code for including in service request and searches To for safety check user identifier picture carry out similitude compare to determine safety check result.
16. according to the method for claim 15, which is characterized in that described based on the user identity mark for including in service request Know before searching the corresponding user identifier picture for safety check and further includes:
Anti-tamper two dimensional code server is according to determining pair of the corresponding User Identity of the gathering code for including in the service request Using family whether be anti-tamper two dimensional code payment system registration user, if so, based on the receipts for including in the service request The corresponding User Identity of money code searches the corresponding user identifier picture for safety check;If not, being sent out to client Send prompt information.
17. according to the method for claim 15, which is characterized in that the method also includes:
Anti-tamper two dimensional code server is according to the safety check as a result, executing respective operations.
18. according to the method for claim 17, which is characterized in that according to the safety check as a result, executing respective operations Including:
If the user identifier picture that the beneficiary user identifier picture and lookup in the gathering code for including in service request obtain Similarity is higher than preset threshold, continues to pay;If being lower than preset threshold, payment is terminated.
19. according to the method for claim 15, wherein the service request includes the gathering code and client to gathering Code carries out the User Identity obtained after barcode scanning.
20. according to the method for claim 15, wherein the service request includes the gathering code;
It is described also wrap before safety check based on the gathering code corresponding User Identity for including in the service request It includes:The corresponding User Identity of the gathering code is determined by parsing the gathering code.
21. according to the method for claim 18, which is characterized in that it is described continue payment include:
It constructs corresponding payment request and handles;Or,
Construct corresponding payment request, and the payment request be forwarded to payment server, handled as payment server described in Payment request.
22. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-21.
23. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The method as described in any in claim 1-21 is realized when execution.
CN201810596992.7A 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code Pending CN108898206A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810596992.7A CN108898206A (en) 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code
PCT/CN2018/124947 WO2019237718A1 (en) 2018-06-11 2018-12-28 Method for generating payment receiving code and code-scanning security verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810596992.7A CN108898206A (en) 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code

Publications (1)

Publication Number Publication Date
CN108898206A true CN108898206A (en) 2018-11-27

Family

ID=64344409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810596992.7A Pending CN108898206A (en) 2018-06-11 2018-06-11 A kind of method and barcode scanning safe checking method generating gathering code

Country Status (2)

Country Link
CN (1) CN108898206A (en)
WO (1) WO2019237718A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583894A (en) * 2018-11-28 2019-04-05 阿里巴巴集团控股有限公司 Offer, verification method and the device of two dimensional code
CN109753784A (en) * 2018-12-24 2019-05-14 维沃移动通信有限公司 A kind of authorization method based on multidimensional code, mobile terminal and server
CN110020699A (en) * 2018-12-11 2019-07-16 阿里巴巴集团控股有限公司 A kind of figure code check method and device
CN110197370A (en) * 2019-04-23 2019-09-03 努比亚技术有限公司 Two dimensional code generation, method of payment, terminal device and storage medium
WO2019237718A1 (en) * 2018-06-11 2019-12-19 上海掌门科技有限公司 Method for generating payment receiving code and code-scanning security verification method
CN110633979A (en) * 2019-08-30 2019-12-31 维沃移动通信有限公司 Payment method and terminal equipment
CN110851270A (en) * 2019-10-21 2020-02-28 ***股份有限公司 Resource transfer method, device, equipment and medium
CN110969434A (en) * 2019-11-29 2020-04-07 维沃移动通信有限公司 Payment method, server, terminal and system
CN110969428A (en) * 2019-10-30 2020-04-07 深圳市钱海网络技术有限公司 Static two-dimensional code payment method and device based on mobile terminal
CN111080284A (en) * 2019-12-17 2020-04-28 北京东方国信科技股份有限公司 Mobile payment code scanning payment method based on bidirectional verification and customer payment terminal
CN112819460A (en) * 2020-10-29 2021-05-18 ***股份有限公司 Two-dimensional code checking method and device and computer readable medium
CN113128983A (en) * 2021-03-18 2021-07-16 西安艾润物联网技术服务有限责任公司 Method for paying digital currency, electronic device and computer storage medium
CN113570362A (en) * 2021-07-30 2021-10-29 北京达佳互联信息技术有限公司 Two-dimensional code checking method and device
CN113869847A (en) * 2021-09-03 2021-12-31 中国银行股份有限公司 Stall management method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243539A (en) * 2015-09-15 2016-01-13 重庆智韬信息技术中心 Identity authentication method for realizing two-dimensional code safety payment
CN107507007A (en) * 2017-08-30 2017-12-22 努比亚技术有限公司 One kind pays 2 D code verification method, terminal and computer-readable recording medium
CN107609873A (en) * 2017-09-08 2018-01-19 阿里巴巴集团控股有限公司 A kind of barcode scanning safe checking method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9311584B2 (en) * 2013-05-24 2016-04-12 King Abdulaziz City for Science and Technology (KACST) Multidimensional color barcode
CN103646264B (en) * 2013-11-06 2016-07-06 杭州电子科技大学 A kind of dimension code anti-counterfeit method of multiple information encryption
CN105069497B (en) * 2015-07-27 2018-01-23 南京风力舰信息技术有限公司 A kind of method for the Quick Response Code for generating beautification
CN106919848A (en) * 2017-03-07 2017-07-04 江苏科大汇峰科技有限公司 A kind of contract method for anti-counterfeit based on mobile terminal fingerprint recognition
CN108898206A (en) * 2018-06-11 2018-11-27 上海掌门科技有限公司 A kind of method and barcode scanning safe checking method generating gathering code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243539A (en) * 2015-09-15 2016-01-13 重庆智韬信息技术中心 Identity authentication method for realizing two-dimensional code safety payment
CN107507007A (en) * 2017-08-30 2017-12-22 努比亚技术有限公司 One kind pays 2 D code verification method, terminal and computer-readable recording medium
CN107609873A (en) * 2017-09-08 2018-01-19 阿里巴巴集团控股有限公司 A kind of barcode scanning safe checking method and device

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019237718A1 (en) * 2018-06-11 2019-12-19 上海掌门科技有限公司 Method for generating payment receiving code and code-scanning security verification method
CN109583894A (en) * 2018-11-28 2019-04-05 阿里巴巴集团控股有限公司 Offer, verification method and the device of two dimensional code
TWI776084B (en) * 2018-11-28 2022-09-01 開曼群島商創新先進技術有限公司 Two-dimensional code provision, verification method and device
CN110020699A (en) * 2018-12-11 2019-07-16 阿里巴巴集团控股有限公司 A kind of figure code check method and device
CN109753784A (en) * 2018-12-24 2019-05-14 维沃移动通信有限公司 A kind of authorization method based on multidimensional code, mobile terminal and server
CN110197370A (en) * 2019-04-23 2019-09-03 努比亚技术有限公司 Two dimensional code generation, method of payment, terminal device and storage medium
CN110633979A (en) * 2019-08-30 2019-12-31 维沃移动通信有限公司 Payment method and terminal equipment
CN110851270A (en) * 2019-10-21 2020-02-28 ***股份有限公司 Resource transfer method, device, equipment and medium
CN110969428A (en) * 2019-10-30 2020-04-07 深圳市钱海网络技术有限公司 Static two-dimensional code payment method and device based on mobile terminal
CN110969434A (en) * 2019-11-29 2020-04-07 维沃移动通信有限公司 Payment method, server, terminal and system
CN111080284A (en) * 2019-12-17 2020-04-28 北京东方国信科技股份有限公司 Mobile payment code scanning payment method based on bidirectional verification and customer payment terminal
CN111080284B (en) * 2019-12-17 2024-04-16 北京东方国信科技股份有限公司 Mobile payment code scanning payment method and customer payment terminal based on two-way verification
CN112819460A (en) * 2020-10-29 2021-05-18 ***股份有限公司 Two-dimensional code checking method and device and computer readable medium
CN113128983A (en) * 2021-03-18 2021-07-16 西安艾润物联网技术服务有限责任公司 Method for paying digital currency, electronic device and computer storage medium
CN113570362A (en) * 2021-07-30 2021-10-29 北京达佳互联信息技术有限公司 Two-dimensional code checking method and device
CN113869847A (en) * 2021-09-03 2021-12-31 中国银行股份有限公司 Stall management method and device

Also Published As

Publication number Publication date
WO2019237718A1 (en) 2019-12-19

Similar Documents

Publication Publication Date Title
CN108898206A (en) A kind of method and barcode scanning safe checking method generating gathering code
US11475450B2 (en) Systems and methods for authenticating user identities in networked computer systems
CN102821157B (en) Use the method and apparatus that bar code image communicates
US8498940B2 (en) Unified identity verification
US8527417B2 (en) Methods and systems for authenticating an identity of a payer in a financial transaction
US11176554B2 (en) Validation identity tokens for transactions
TWI591554B (en) Electronic ticket security system and method
US8840019B2 (en) Mobile device financial transactions
US20070094152A1 (en) Secure electronic transaction authentication enhanced with RFID
CN107657445B (en) Online payment method and online payment system
CN108763898A (en) A kind of information processing method and system
CN114240408B (en) Electronic ticket business transaction method based on block chain technology
US20080178258A1 (en) Authentication system for financial transactions
JP2008199618A (en) Method, system, and computer program for using personal communication device to obtain additional information
CN112687042A (en) Authentication method, authentication device and electronic equipment
US20020013900A1 (en) User authentication device and electric commerce system using the device
EP3850552A1 (en) Advanced methods, systems and devices for registering information in a database
TWM633896U (en) Financial Data Authorization Device
CN109345215B (en) Digital currency processing method, device, computer equipment and storage medium
WO2012071418A2 (en) System and method for secure financial transactions
KR20090091051A (en) On-line credit card payment system and method using a cellular phone authentication
US20150286996A1 (en) Method and apparatus for carrying out an electronic transaction
KR20190081369A (en) System and method for dealing a digital currency with color code
TWM569016U (en) Debit authorization system
CN114219478A (en) Bank card binding method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination