CN109242645A - A kind of shared bicycle charging method based on precise positioning and safe barcode scanning - Google Patents
A kind of shared bicycle charging method based on precise positioning and safe barcode scanning Download PDFInfo
- Publication number
- CN109242645A CN109242645A CN201811176663.3A CN201811176663A CN109242645A CN 109242645 A CN109242645 A CN 109242645A CN 201811176663 A CN201811176663 A CN 201811176663A CN 109242645 A CN109242645 A CN 109242645A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- location information
- vehicle
- shared bicycle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/0042—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
- G07F17/0057—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Traffic Control Systems (AREA)
Abstract
The present invention is a kind of shared bicycle charging method based on precise positioning and safe barcode scanning, shared bicycle charge system based on precise positioning and safe barcode scanning includes two-dimension code label, mobile phone terminal, lock and product safety authentication server, and the product safety authentication server includes database, receiving module, analysis contrast module and sending module.Information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles, when user's barcode scanning is unlocked, the two-dimensional barcode information of scanning is verified, the generation that user is cheated by counterfeit two dimensional code is prevented.Passed through surrounding user location information at the beginning and end of using bicycle simultaneously to verify user's location information, confirmation accurately uses position.This kind, which enjoys bicycle charging method, ensures location information safety, has both facilitated pick-up, can also resist the attack problem of malice two dimensional code, realizes Secure Billing.
Description
Technical field
The present invention is shared bicycle field, specifically a kind of based on precise positioning and the shared bicycle of safe barcode scanning
Charging method.
Background technique
The concept of shared bicycle is derived from public bicycles system, but be different from fixed service website it is public voluntarily
Vehicle, according to Urban Traffic Planning, it can be laid in subway outlet, community's front door and tourist attractions et al. stream concentrated area,
Staff can be with the shared bicycle of management lease by shared bicycle management system.Individually shared bicycle and server it
Between interconnection, service is also conveniently given back while facilitating citizen to lease.
Current, shared bicycle system has been developing progressively certain scale, but current leasing system exists in popularization and application
Following problem:
(1) share the position position inaccurate of bicycle: shared bicycle becomes as a kind of simple current equipment, easily generation position
It is dynamic, once and it is maliciously parked or accident occurs docks to lonely and remote area, also or user stops vehicle into cell or secret
Space leads to not give for change, just will receive economic loss.
(2) there are security risks for payment: it is the two dimensional code that convenient shared bicycle uses originally, it but may be by some illegal points
Son utilizes, and becomes the tool of its defraudation.And the safety defect of two dimensional code barcode scanning technology, it is primarily due to the following:
First is that code technology processed is almost zero gate sill, criminal can be easily by virus, trojan horse program, software of deducting fees etc.
It is implanted into two dimensional code, consumer is allowed to have dust thrown into the eyes;Second is that two dimensional code is a kind of with the naked eye unrecognized information technology, it is some
Criminal adopts in the method for paste, covers businessman doorway, normal two dimensional code on sales counter with virulent two dimensional code, commonly
Consumer has no way of identifying at all, it is difficult to effectively prevention.Domestic widely used two dimensional code is the quick response derived from Japan at present
Code (QR code), due to the two dimensional code of the not no independent intellectual property right in the country at that time, market is almost occupied by QR code.QR code is not in state
It inside applies for a patent, takes the market strategy to open for free.This also means that anyone can download two dimensional code by network
Generator.It only needs to paste the content of publication in two-dimension code generator, two dimensional code needed for software generates user immediately.Appoint
Who can make two dimensional code, and the two dimensional code generated has no idea to trace to the source, and also provide and recognize without relevant management organization
Card, the production and circulation of two dimensional code carry out unified management there is no specific main body.
(3) it under fortuitous event, locks as customer forgets to close by other people secondary uses, pays the problem of how carrying out.It closes
In how to determine location information this problem of shared bicycle, the shared bicycle Freight Basis on existing market is mostly by traditional
The location information of GPS positioning system determines, is inaccurate so in fact.And due to remotely shutting this method, possible user
Just remember that needs carry out end vehicle after leaving bicycle certain distance, thus cause shared bicycle payment when there may be
Fault in charging.
All there is certain loophole in process for using in shared bicycle currently on the market.User needs that vehicle is turned off manually
Lock.This process is the presence of very big drawback, and lock is turned off manually and is easy to forget, has given party's opportunity of stealing a ride.Although machine
Tool lock is easy to under-buy, but can not cannot be accurately positioned the rearmost position of vehicle really with time-based charging, be easy to cause vehicle
Lose and charging fault.
Summary of the invention
The present invention aiming at the shortcomings in the prior art, provides a kind of based on precise positioning and the shared bicycle of safe barcode scanning
Charging method.
To achieve the above object, the invention adopts the following technical scheme:
A kind of shared bicycle charging method based on precise positioning and safe barcode scanning, it is characterised in that: be based on precise positioning and peace
The shared bicycle charge system of full barcode scanning includes two-dimension code label, mobile phone terminal, lock and product safety authentication server, described
Product safety authentication server include database, receiving module, analysis contrast module and sending module, specific charging method is such as
Under:
Step 1, information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles;
Step 2, two dimensional code digital information is stored in product safety authentication server, two-dimension code label reality is made in two dimensional code
Object, two-dimension code label are pasted on vehicle;
Step 3, user scans the two-dimension code label on any one vehicle by mobile phone terminal, is believed by surrounding user position
Breath verifies user's location information, confirms accurately position, while mobile phone terminal believes the vehicle in two-dimension code label
Breath and encryption information are sent to receiving module, and the data information received is sent analysis contrast module by receiving module, analysis
Comparison module carries out fractionation verifying to encryption information, if encryption information verifies achievement, carries out step 4, if encryption information verifying is lost
It loses, carries out step 5;
Step 4, change vehicle-state in the database to using and User Status, and issue and unlock from sending module to lock
Instruction, and execute step 6;
Step 5, sending prompt information by sending module has security risk to mobile phone terminal notifying two dimensional code;Return step 3;
Step 6, for user in use every time t, software will pass through user of GPS or mobile base station automatic collection
Location information, and upload onto the server, server records user location, if location information varies enormously, will lead to
It crosses vehicle-mounted receiving module and one acquisition is also carried out to location information, and upload server records, when passing through after the completion of use
Between and location point line calculate using distance carry out charging;
Step 7, user terminates after being confirmed with vehicle, is tested by the location information of surrounding user the location information of the user
Card, confirms final stroke, changes vehicle-state after confirming successfully in the database and issues to free and from sending module to lock
Shut instruction.
Encryption information and information of vehicles are according to license plate number, encrypted license plate number, corresponding with license plate number in the step 1
Key and its encrypted data arrangement, separated between adjacent data using #.
Described license plate number, encrypted license plate number, key corresponding with license plate number and its encrypted data form tool
Volume data: Num#SHA1#Key#SHA256, the SHA1 are 40, and SHA256 is 65, and Key is 50, the generation of Key
Random number is used, is generated at random from 68 exportable characters in ACSII code.
In the step 3 analyses and comparison module to encryption information carry out split verifying specific step is as follows: Num#SHA1#
Key#SHA256 data are sent to analyses and comparison module analysis comparison module, and whether the cryptographic Hash for verifying Num and Key is correct, if
The cryptographic Hash of Num and Key is correct, then is proved to be successful, if the cryptographic Hash mistake of Num and Key, authentication failed.
The side that user's location information is verified by surrounding user location information in the step 3 and step 7
Method, the specific steps are as follows: user's location information is verified by surrounding user location information, peripherad user is straight
The checking request of auxiliary belt User ID is received and sent, other users verify the auxiliary received automatically in backstage upload after receiving request
Request, is compared, and be modified to the location information of two users by solicited message of the server to two users, from
And confirms and accurately use position;If surrounding does not have other users, user will directly transmit checking request, vehicle to vehicle
On receiver receive information after, it will server is sent by user's information and self-position, by server by user
Location information is compared with the location information of vehicle, confirms accurately position.
A kind of beneficial effect of the shared bicycle charging method based on precise positioning and safe barcode scanning of the present invention is: by right
The design of two dimensional code is unique, and secret information is hidden, and can carry out to the information in two dimensional code when scanning the two-dimensional code
Verifying can give the prompt of user's correlation when QR code content mistake, prevent user is cheated from causing damages.It is positioning
Certification on, by way of authenticating in many ways, it is ensured that location information safety, both facilitated pick-up, and can also resist malice two dimensional code
Attack problem realizes Secure Billing.
Detailed description of the invention
Fig. 1 is a kind of structure principle chart of the shared bicycle charge system based on precise positioning and safe barcode scanning of the present invention.
Fig. 2 is that a kind of shared bicycle charging method customer position information based on precise positioning and safe barcode scanning of the present invention is true
Fixed process principle figure.
Specific embodiment
In conjunction with the accompanying drawings, the present invention is further explained in detail.
As shown in Figure 1, a kind of shared bicycle charging method based on precise positioning and safe barcode scanning, it is characterised in that: base
In the shared bicycle charge system of precise positioning and safe barcode scanning include two-dimension code label, mobile phone terminal, lock and product safety
Authentication server, the product safety authentication server include database, receiving module, analysis contrast module and send mould
Block, specific charging method are as follows:
Step 1, information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles;
Step 2, two dimensional code digital information is stored in product safety authentication server, two-dimension code label reality is made in two dimensional code
Object, two-dimension code label are pasted on vehicle;
Step 3, user scans the two-dimension code label on any one vehicle by mobile phone terminal, is believed by surrounding user position
Breath verifies user's location information, and peripherad user directly transmits the checking request of auxiliary belt User ID, other use
Family receives the auxiliary checking request that will receive automatically in backstage upload after request, by server to the solicited message of two users into
Row compares, and is modified to the location information of two users, so that confirmation accurately uses position;If surrounding is without other
User, user will directly transmit checking request to vehicle, after the receiver on vehicle receives information, it will believe user
Breath and self-position are sent to server, and user's location information is compared with the location information of vehicle by server, confirm
Accurately position.Simultaneously mobile phone terminal by two-dimension code label information of vehicles and encryption information be sent to receiving module, receive
The data information received is sent analysis contrast module by module, and analyses and comparison module carries out fractionation verifying to encryption information,
If encryption information verifies achievement, step 4 is carried out, if encryption information authentication failed, carries out step 5;
Step 4, change vehicle-state in the database to using and User Status, and issue and unlock from sending module to lock
Instruction, and execute step 6;
Step 5, sending prompt information by sending module has security risk to mobile phone terminal notifying two dimensional code;Return step 3;
Step 6, for user in use every time t, software will pass through user of GPS or mobile base station automatic collection
Location information, and upload onto the server, server records user location, if location information varies enormously, will lead to
It crosses vehicle-mounted receiving module and one acquisition is also carried out to location information, and upload server records.When passing through after the completion of use
Between and location point line calculate using distance carry out charging;
Step 7, user terminates after being confirmed with vehicle, is tested by the location information of surrounding user the location information of the user
Card, confirms final stroke, changes vehicle-state after confirming successfully in the database and issues to free and from sending module to lock
Shut instruction.
In the present embodiment, information of vehicles is encrypted with key K and generates ciphertext S, then by ciphertext S and information of vehicles
It is made into the image in 2 D code of individual style together, the image in 2 D code of generation is fabricated to two-dimension code label, finally by two dimensional code
Label is pasted on vehicle, finally carries out overlay film, protection to two-dimension code label.
In the present embodiment, mobile phone terminal is believed the two dimensional code swept to by the mobile phone user after being accurately positioned after being used for barcode scanning
Breath is uploaded onto the server, and is compared by server;It is clicked directly in application program after end vehicle and shuts end vehicle.It produces
Product secure verification servers are for verifying two-dimension code safe and carrying out data management.Wherein database is for preserving two dimensional code
Information, car status information, user information;Receiving module is used to receive the two-dimensional barcode information of user terminal scanning and passes information
It is defeated by analyses and comparison module;Analyses and comparison module is used to extract wherein encryption information and information of vehicles according to the two-dimensional barcode information,
Ciphertext is carried out according to corresponding Encryption Algorithm to compare to distinguish two-dimension code safe, and scanning result is transferred to transmission mould
Block;Sending module is for sending the result to user terminal.
It is specific as follows for QR code content information and verification process in the present embodiment: information of vehicles is encrypted
After form that specific vehicle information data includes license plate number, encrypted license plate number and corresponding key and its is encrypted
Data are divided to form Num#SHA1#Key#SHA256 between consecutive number data using " # ", and SHA1 therein is 40, and SHA256 is
65, Key is 50, and the generation of Key uses random number, generates at random from 68 exportable characters in ACSII code.
Receiving module transmits information to analyses and comparison module after receiving information, and analyses and comparison module is by tearing encryption information open
Point, whether the cryptographic Hash for verifying Num and Key is correct.
In the present embodiment, if being proved to be successful, unlocking instruction is sent by sending module, while modifying vehicle shape in the database
State, if authentication failed, sending prompt information by sending module has security risk to user terminal prompt two dimensional code.It can be to avoid
User is imitated two dimensional code deception and causes damages.
In the present embodiment, every time t in using, software will once be used by GPS or mobile base station automatic collection
The location information at family, and upload onto the server, server records user location, will if location information varies enormously
One acquisition is also carried out to location information by vehicle-mounted receiving module, and upload server records.It is tied until user issues
Shu Zhiling, line records ride distance and the distance of user, and carries out charging according to path distance data.User issues knot
After Shu Zhiling, terminal sends user information to server for vehicle, and server, which is modified User Status and sent, shuts instruction, to
Lock is closed and the car status information after return information in server modification vehicle status data library.If return information fails,
The then misregistration information in vehicle status data library, and information of vehicles is put into vehicle database to be repaired.
It should be noted that the term of such as "upper", "lower", "left", "right", "front", "rear" cited in invention, also
Only being illustrated convenient for narration, rather than to limit the scope of the invention, relativeness is altered or modified, in nothing
Under essence change technology contents, when being also considered as the enforceable scope of the present invention.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment,
All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art
For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as protection of the invention
Range.
Claims (5)
1. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning, it is characterised in that: based on precise positioning and
The shared bicycle charge system of safe barcode scanning includes two-dimension code label, mobile phone terminal, lock and product safety authentication server, institute
The product safety authentication server stated includes database, receiving module, analysis contrast module and sending module, specific charging method
It is as follows:
Step 1, information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles;
Step 2, two dimensional code digital information is stored in product safety authentication server, two-dimension code label reality is made in two dimensional code
Object, two-dimension code label are pasted on vehicle;
Step 3, user scans the two-dimension code label on any one vehicle by mobile phone terminal, is believed by surrounding user position
Breath verifies user's location information, confirms accurately position, while mobile phone terminal believes the vehicle in two-dimension code label
Breath and encryption information are sent to receiving module, and the data information received is sent analysis contrast module by receiving module, analysis
Comparison module carries out fractionation verifying to encryption information, if encryption information verifies achievement, carries out step 4, if encryption information verifying is lost
It loses, carries out step 5;
Step 4, change vehicle-state in the database to using and User Status, and issue and unlock from sending module to lock
Instruction, and execute step 6;
Step 5, sending prompt information by sending module has security risk to mobile phone terminal notifying two dimensional code;Return step 3;
Step 6, for user in use every time t, software will pass through user of GPS or mobile base station automatic collection
Location information, and upload onto the server, server records user location, if location information varies enormously, will lead to
It crosses vehicle-mounted receiving module and one acquisition is also carried out to location information, and upload server records, when passing through after the completion of use
Between and location point line calculate using distance carry out charging;
Step 7, user terminates after being confirmed with vehicle, is tested by the location information of surrounding user the location information of the user
Card, confirms final stroke, changes vehicle-state after confirming successfully in the database and issues to free and from sending module to lock
Shut instruction.
2. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as described in claim 1, feature exist
In: encryption information and information of vehicles are according to license plate number, encrypted license plate number, corresponding with license plate number close in the step 1
Key and its encrypted data arrangement are separated using # between adjacent data.
3. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as claimed in claim 2, feature exist
In: described license plate number, encrypted license plate number, key corresponding with license plate number and its encrypted data form specific number
According to: Num#SHA1#Key#SHA256, the SHA1 are 40, and SHA256 is 65, and Key is 50, and the generation of Key uses
Be random number, generated at random from 68 exportable characters in ACSII code.
4. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as claimed in claim 3, feature exist
In: in the step 3 analyses and comparison module to encryption information carry out split verifying specific step is as follows: Num#SHA1#Key#
SHA256 data are sent to analyses and comparison module analysis comparison module, and whether the cryptographic Hash for verifying Num and Key correct, if Num with
The cryptographic Hash of Key is correct, then is proved to be successful, if the cryptographic Hash mistake of Num and Key, authentication failed.
5. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as described in claim 1, feature exist
In: the method that user's location information is verified by surrounding user location information in the step 3 and step 7, tool
Steps are as follows for body: being verified by surrounding user location information to user's location information, peripherad user directly transmits
The checking request of auxiliary belt User ID, other users receive the auxiliary checking request that will be received automatically in backstage upload after request,
It is compared by solicited message of the server to two users, and the location information of two users is modified, thus really
Recognize and accurately uses position;If surrounding does not have other users, user will directly transmit checking request to vehicle, on vehicle
After receiver receives information, it will server is sent by user's information and self-position, by server by user position
Information is compared with the location information of vehicle, confirms accurately position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811176663.3A CN109242645A (en) | 2018-10-10 | 2018-10-10 | A kind of shared bicycle charging method based on precise positioning and safe barcode scanning |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811176663.3A CN109242645A (en) | 2018-10-10 | 2018-10-10 | A kind of shared bicycle charging method based on precise positioning and safe barcode scanning |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109242645A true CN109242645A (en) | 2019-01-18 |
Family
ID=65055074
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811176663.3A Pending CN109242645A (en) | 2018-10-10 | 2018-10-10 | A kind of shared bicycle charging method based on precise positioning and safe barcode scanning |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242645A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902528A (en) * | 2019-02-28 | 2019-06-18 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of decoding method of two dimensional code |
CN110163633A (en) * | 2019-04-25 | 2019-08-23 | 江苏大学 | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car |
CN111985589A (en) * | 2020-08-26 | 2020-11-24 | 广州南沙珠江啤酒有限公司 | Movable equipment management system based on code scanning positioning |
CN112037372A (en) * | 2020-08-04 | 2020-12-04 | 摩拜(北京)信息技术有限公司 | Unlocking method and terminal for vehicle |
CN112418880A (en) * | 2020-11-07 | 2021-02-26 | 许尧龙 | Two-dimensional code electronic authentication label and system |
CN112926087A (en) * | 2021-03-09 | 2021-06-08 | 南京信息工程大学 | Secret sharing method with verification function and high embedding capacity based on two-dimensional code |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600797A (en) * | 2017-01-25 | 2017-04-26 | 北京信通力创科技有限公司 | Dynamic graphic password lock, server, sharing system and unlocking and locking methods thereof |
CN106886920A (en) * | 2017-02-16 | 2017-06-23 | 湖北大学 | Based on the shared bicycle Secure Billing method that home is proved |
CN107181742A (en) * | 2017-05-16 | 2017-09-19 | 珠海晶通科技有限公司 | A kind of shared bicycle electronic lock system and its method for unlocking |
-
2018
- 2018-10-10 CN CN201811176663.3A patent/CN109242645A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600797A (en) * | 2017-01-25 | 2017-04-26 | 北京信通力创科技有限公司 | Dynamic graphic password lock, server, sharing system and unlocking and locking methods thereof |
CN106886920A (en) * | 2017-02-16 | 2017-06-23 | 湖北大学 | Based on the shared bicycle Secure Billing method that home is proved |
CN107181742A (en) * | 2017-05-16 | 2017-09-19 | 珠海晶通科技有限公司 | A kind of shared bicycle electronic lock system and its method for unlocking |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902528A (en) * | 2019-02-28 | 2019-06-18 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of decoding method of two dimensional code |
CN109902528B (en) * | 2019-02-28 | 2023-10-20 | 尤尼泰克(嘉兴)信息技术有限公司 | Encoding and decoding method of two-dimension code |
CN110163633A (en) * | 2019-04-25 | 2019-08-23 | 江苏大学 | A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car |
CN112037372A (en) * | 2020-08-04 | 2020-12-04 | 摩拜(北京)信息技术有限公司 | Unlocking method and terminal for vehicle |
CN111985589A (en) * | 2020-08-26 | 2020-11-24 | 广州南沙珠江啤酒有限公司 | Movable equipment management system based on code scanning positioning |
CN112418880A (en) * | 2020-11-07 | 2021-02-26 | 许尧龙 | Two-dimensional code electronic authentication label and system |
CN112926087A (en) * | 2021-03-09 | 2021-06-08 | 南京信息工程大学 | Secret sharing method with verification function and high embedding capacity based on two-dimensional code |
CN112926087B (en) * | 2021-03-09 | 2023-05-05 | 南京信息工程大学 | Secret sharing method with verification function and high embedding capacity based on two-dimensional code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109242645A (en) | A kind of shared bicycle charging method based on precise positioning and safe barcode scanning | |
CN106780859B (en) | A kind of control method and system that time type vehicle is unlocked/shut | |
CN108569250A (en) | The automatic authorization method of bluetooth key based on shared automobile | |
CN108648287A (en) | The implementation method of private savings parking stall leasing system based on block chain | |
CN107822208A (en) | Electronic cigarette and electronic cigarette activation system | |
KR101129318B1 (en) | Method and system providing lending service using biometrics card | |
CN105099702B (en) | A kind of safety certifying method and system of city public bicycle lease | |
US20140122890A1 (en) | Method and system for securing the exchange of data between a client module and a server module | |
CN103338188A (en) | Dynamic authentication method of client side suitable for mobile cloud | |
CN105404907A (en) | RFID electronic license plate generation system, method, license plate recognition system and method | |
CN110035071A (en) | A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system | |
CN104363199A (en) | Security authentication method based on time synchronization codes and time synchronization code module | |
CN109729046A (en) | Two-dimensional code scanning method and terminal, authentication method and server and service system | |
CN110445805A (en) | A kind of false-proof authentication system and method for two dimensional code | |
EP3140825B1 (en) | Authentication method for vehicular number plate recognition | |
CN109215204A (en) | A kind of intelligent door lock security system based on ether mill | |
CN107248212A (en) | A kind of intelligent lock system and its method for unlocking based on NFC | |
CN113569213A (en) | Industrial park application safety support system and method based on 5G technology | |
CN106780860B (en) | A kind of control method and system that challenge type vehicle is unlocked/shut | |
CN106682905B (en) | Application unlocking method | |
CN107426155A (en) | A kind of method for unlocking of integrated cabinet | |
CN113643489B (en) | Public transit pos machine based on face identification | |
CN101741561A (en) | Method and system for authenticating two-way hardware | |
CN110599636A (en) | Customs lock, customs lock key, and customs lock opening and closing method and system | |
CN113538814A (en) | Intelligent bus vehicle-mounted terminal supporting digital RMB payment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 210044 No. 219 Ningliu Road, Jiangbei New District, Nanjing City, Jiangsu Province Applicant after: Nanjing University of Information Science and Technology Address before: 211500 Yuting Square, 59 Wangqiao Road, Liuhe District, Nanjing City, Jiangsu Province Applicant before: Nanjing University of Information Science and Technology |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |