CN109242645A - A kind of shared bicycle charging method based on precise positioning and safe barcode scanning - Google Patents

A kind of shared bicycle charging method based on precise positioning and safe barcode scanning Download PDF

Info

Publication number
CN109242645A
CN109242645A CN201811176663.3A CN201811176663A CN109242645A CN 109242645 A CN109242645 A CN 109242645A CN 201811176663 A CN201811176663 A CN 201811176663A CN 109242645 A CN109242645 A CN 109242645A
Authority
CN
China
Prior art keywords
user
information
location information
vehicle
shared bicycle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811176663.3A
Other languages
Chinese (zh)
Inventor
熊礼治
蒋鹏程
王乐
韩啸
汤琳俪
曹梦琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN201811176663.3A priority Critical patent/CN109242645A/en
Publication of CN109242645A publication Critical patent/CN109242645A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/0042Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects
    • G07F17/0057Coin-freed apparatus for hiring articles; Coin-freed facilities or services for hiring of objects for the hiring or rent of vehicles, e.g. cars, bicycles or wheelchairs

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Traffic Control Systems (AREA)

Abstract

The present invention is a kind of shared bicycle charging method based on precise positioning and safe barcode scanning, shared bicycle charge system based on precise positioning and safe barcode scanning includes two-dimension code label, mobile phone terminal, lock and product safety authentication server, and the product safety authentication server includes database, receiving module, analysis contrast module and sending module.Information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles, when user's barcode scanning is unlocked, the two-dimensional barcode information of scanning is verified, the generation that user is cheated by counterfeit two dimensional code is prevented.Passed through surrounding user location information at the beginning and end of using bicycle simultaneously to verify user's location information, confirmation accurately uses position.This kind, which enjoys bicycle charging method, ensures location information safety, has both facilitated pick-up, can also resist the attack problem of malice two dimensional code, realizes Secure Billing.

Description

A kind of shared bicycle charging method based on precise positioning and safe barcode scanning
Technical field
The present invention is shared bicycle field, specifically a kind of based on precise positioning and the shared bicycle of safe barcode scanning Charging method.
Background technique
The concept of shared bicycle is derived from public bicycles system, but be different from fixed service website it is public voluntarily Vehicle, according to Urban Traffic Planning, it can be laid in subway outlet, community's front door and tourist attractions et al. stream concentrated area, Staff can be with the shared bicycle of management lease by shared bicycle management system.Individually shared bicycle and server it Between interconnection, service is also conveniently given back while facilitating citizen to lease.
Current, shared bicycle system has been developing progressively certain scale, but current leasing system exists in popularization and application Following problem:
(1) share the position position inaccurate of bicycle: shared bicycle becomes as a kind of simple current equipment, easily generation position It is dynamic, once and it is maliciously parked or accident occurs docks to lonely and remote area, also or user stops vehicle into cell or secret Space leads to not give for change, just will receive economic loss.
(2) there are security risks for payment: it is the two dimensional code that convenient shared bicycle uses originally, it but may be by some illegal points Son utilizes, and becomes the tool of its defraudation.And the safety defect of two dimensional code barcode scanning technology, it is primarily due to the following:
First is that code technology processed is almost zero gate sill, criminal can be easily by virus, trojan horse program, software of deducting fees etc. It is implanted into two dimensional code, consumer is allowed to have dust thrown into the eyes;Second is that two dimensional code is a kind of with the naked eye unrecognized information technology, it is some Criminal adopts in the method for paste, covers businessman doorway, normal two dimensional code on sales counter with virulent two dimensional code, commonly Consumer has no way of identifying at all, it is difficult to effectively prevention.Domestic widely used two dimensional code is the quick response derived from Japan at present Code (QR code), due to the two dimensional code of the not no independent intellectual property right in the country at that time, market is almost occupied by QR code.QR code is not in state It inside applies for a patent, takes the market strategy to open for free.This also means that anyone can download two dimensional code by network Generator.It only needs to paste the content of publication in two-dimension code generator, two dimensional code needed for software generates user immediately.Appoint Who can make two dimensional code, and the two dimensional code generated has no idea to trace to the source, and also provide and recognize without relevant management organization Card, the production and circulation of two dimensional code carry out unified management there is no specific main body.
(3) it under fortuitous event, locks as customer forgets to close by other people secondary uses, pays the problem of how carrying out.It closes In how to determine location information this problem of shared bicycle, the shared bicycle Freight Basis on existing market is mostly by traditional The location information of GPS positioning system determines, is inaccurate so in fact.And due to remotely shutting this method, possible user Just remember that needs carry out end vehicle after leaving bicycle certain distance, thus cause shared bicycle payment when there may be Fault in charging.
All there is certain loophole in process for using in shared bicycle currently on the market.User needs that vehicle is turned off manually Lock.This process is the presence of very big drawback, and lock is turned off manually and is easy to forget, has given party's opportunity of stealing a ride.Although machine Tool lock is easy to under-buy, but can not cannot be accurately positioned the rearmost position of vehicle really with time-based charging, be easy to cause vehicle Lose and charging fault.
Summary of the invention
The present invention aiming at the shortcomings in the prior art, provides a kind of based on precise positioning and the shared bicycle of safe barcode scanning Charging method.
To achieve the above object, the invention adopts the following technical scheme:
A kind of shared bicycle charging method based on precise positioning and safe barcode scanning, it is characterised in that: be based on precise positioning and peace The shared bicycle charge system of full barcode scanning includes two-dimension code label, mobile phone terminal, lock and product safety authentication server, described Product safety authentication server include database, receiving module, analysis contrast module and sending module, specific charging method is such as Under:
Step 1, information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles;
Step 2, two dimensional code digital information is stored in product safety authentication server, two-dimension code label reality is made in two dimensional code Object, two-dimension code label are pasted on vehicle;
Step 3, user scans the two-dimension code label on any one vehicle by mobile phone terminal, is believed by surrounding user position Breath verifies user's location information, confirms accurately position, while mobile phone terminal believes the vehicle in two-dimension code label Breath and encryption information are sent to receiving module, and the data information received is sent analysis contrast module by receiving module, analysis Comparison module carries out fractionation verifying to encryption information, if encryption information verifies achievement, carries out step 4, if encryption information verifying is lost It loses, carries out step 5;
Step 4, change vehicle-state in the database to using and User Status, and issue and unlock from sending module to lock Instruction, and execute step 6;
Step 5, sending prompt information by sending module has security risk to mobile phone terminal notifying two dimensional code;Return step 3;
Step 6, for user in use every time t, software will pass through user of GPS or mobile base station automatic collection Location information, and upload onto the server, server records user location, if location information varies enormously, will lead to It crosses vehicle-mounted receiving module and one acquisition is also carried out to location information, and upload server records, when passing through after the completion of use Between and location point line calculate using distance carry out charging;
Step 7, user terminates after being confirmed with vehicle, is tested by the location information of surrounding user the location information of the user Card, confirms final stroke, changes vehicle-state after confirming successfully in the database and issues to free and from sending module to lock Shut instruction.
Encryption information and information of vehicles are according to license plate number, encrypted license plate number, corresponding with license plate number in the step 1 Key and its encrypted data arrangement, separated between adjacent data using #.
Described license plate number, encrypted license plate number, key corresponding with license plate number and its encrypted data form tool Volume data: Num#SHA1#Key#SHA256, the SHA1 are 40, and SHA256 is 65, and Key is 50, the generation of Key Random number is used, is generated at random from 68 exportable characters in ACSII code.
In the step 3 analyses and comparison module to encryption information carry out split verifying specific step is as follows: Num#SHA1# Key#SHA256 data are sent to analyses and comparison module analysis comparison module, and whether the cryptographic Hash for verifying Num and Key is correct, if The cryptographic Hash of Num and Key is correct, then is proved to be successful, if the cryptographic Hash mistake of Num and Key, authentication failed.
The side that user's location information is verified by surrounding user location information in the step 3 and step 7 Method, the specific steps are as follows: user's location information is verified by surrounding user location information, peripherad user is straight The checking request of auxiliary belt User ID is received and sent, other users verify the auxiliary received automatically in backstage upload after receiving request Request, is compared, and be modified to the location information of two users by solicited message of the server to two users, from And confirms and accurately use position;If surrounding does not have other users, user will directly transmit checking request, vehicle to vehicle On receiver receive information after, it will server is sent by user's information and self-position, by server by user Location information is compared with the location information of vehicle, confirms accurately position.
A kind of beneficial effect of the shared bicycle charging method based on precise positioning and safe barcode scanning of the present invention is: by right The design of two dimensional code is unique, and secret information is hidden, and can carry out to the information in two dimensional code when scanning the two-dimensional code Verifying can give the prompt of user's correlation when QR code content mistake, prevent user is cheated from causing damages.It is positioning Certification on, by way of authenticating in many ways, it is ensured that location information safety, both facilitated pick-up, and can also resist malice two dimensional code Attack problem realizes Secure Billing.
Detailed description of the invention
Fig. 1 is a kind of structure principle chart of the shared bicycle charge system based on precise positioning and safe barcode scanning of the present invention.
Fig. 2 is that a kind of shared bicycle charging method customer position information based on precise positioning and safe barcode scanning of the present invention is true Fixed process principle figure.
Specific embodiment
In conjunction with the accompanying drawings, the present invention is further explained in detail.
As shown in Figure 1, a kind of shared bicycle charging method based on precise positioning and safe barcode scanning, it is characterised in that: base In the shared bicycle charge system of precise positioning and safe barcode scanning include two-dimension code label, mobile phone terminal, lock and product safety Authentication server, the product safety authentication server include database, receiving module, analysis contrast module and send mould Block, specific charging method are as follows:
Step 1, information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles;
Step 2, two dimensional code digital information is stored in product safety authentication server, two-dimension code label reality is made in two dimensional code Object, two-dimension code label are pasted on vehicle;
Step 3, user scans the two-dimension code label on any one vehicle by mobile phone terminal, is believed by surrounding user position Breath verifies user's location information, and peripherad user directly transmits the checking request of auxiliary belt User ID, other use Family receives the auxiliary checking request that will receive automatically in backstage upload after request, by server to the solicited message of two users into Row compares, and is modified to the location information of two users, so that confirmation accurately uses position;If surrounding is without other User, user will directly transmit checking request to vehicle, after the receiver on vehicle receives information, it will believe user Breath and self-position are sent to server, and user's location information is compared with the location information of vehicle by server, confirm Accurately position.Simultaneously mobile phone terminal by two-dimension code label information of vehicles and encryption information be sent to receiving module, receive The data information received is sent analysis contrast module by module, and analyses and comparison module carries out fractionation verifying to encryption information, If encryption information verifies achievement, step 4 is carried out, if encryption information authentication failed, carries out step 5;
Step 4, change vehicle-state in the database to using and User Status, and issue and unlock from sending module to lock Instruction, and execute step 6;
Step 5, sending prompt information by sending module has security risk to mobile phone terminal notifying two dimensional code;Return step 3;
Step 6, for user in use every time t, software will pass through user of GPS or mobile base station automatic collection Location information, and upload onto the server, server records user location, if location information varies enormously, will lead to It crosses vehicle-mounted receiving module and one acquisition is also carried out to location information, and upload server records.When passing through after the completion of use Between and location point line calculate using distance carry out charging;
Step 7, user terminates after being confirmed with vehicle, is tested by the location information of surrounding user the location information of the user Card, confirms final stroke, changes vehicle-state after confirming successfully in the database and issues to free and from sending module to lock Shut instruction.
In the present embodiment, information of vehicles is encrypted with key K and generates ciphertext S, then by ciphertext S and information of vehicles It is made into the image in 2 D code of individual style together, the image in 2 D code of generation is fabricated to two-dimension code label, finally by two dimensional code Label is pasted on vehicle, finally carries out overlay film, protection to two-dimension code label.
In the present embodiment, mobile phone terminal is believed the two dimensional code swept to by the mobile phone user after being accurately positioned after being used for barcode scanning Breath is uploaded onto the server, and is compared by server;It is clicked directly in application program after end vehicle and shuts end vehicle.It produces Product secure verification servers are for verifying two-dimension code safe and carrying out data management.Wherein database is for preserving two dimensional code Information, car status information, user information;Receiving module is used to receive the two-dimensional barcode information of user terminal scanning and passes information It is defeated by analyses and comparison module;Analyses and comparison module is used to extract wherein encryption information and information of vehicles according to the two-dimensional barcode information, Ciphertext is carried out according to corresponding Encryption Algorithm to compare to distinguish two-dimension code safe, and scanning result is transferred to transmission mould Block;Sending module is for sending the result to user terminal.
It is specific as follows for QR code content information and verification process in the present embodiment: information of vehicles is encrypted After form that specific vehicle information data includes license plate number, encrypted license plate number and corresponding key and its is encrypted Data are divided to form Num#SHA1#Key#SHA256 between consecutive number data using " # ", and SHA1 therein is 40, and SHA256 is 65, Key is 50, and the generation of Key uses random number, generates at random from 68 exportable characters in ACSII code. Receiving module transmits information to analyses and comparison module after receiving information, and analyses and comparison module is by tearing encryption information open Point, whether the cryptographic Hash for verifying Num and Key is correct.
In the present embodiment, if being proved to be successful, unlocking instruction is sent by sending module, while modifying vehicle shape in the database State, if authentication failed, sending prompt information by sending module has security risk to user terminal prompt two dimensional code.It can be to avoid User is imitated two dimensional code deception and causes damages.
In the present embodiment, every time t in using, software will once be used by GPS or mobile base station automatic collection The location information at family, and upload onto the server, server records user location, will if location information varies enormously One acquisition is also carried out to location information by vehicle-mounted receiving module, and upload server records.It is tied until user issues Shu Zhiling, line records ride distance and the distance of user, and carries out charging according to path distance data.User issues knot After Shu Zhiling, terminal sends user information to server for vehicle, and server, which is modified User Status and sent, shuts instruction, to Lock is closed and the car status information after return information in server modification vehicle status data library.If return information fails, The then misregistration information in vehicle status data library, and information of vehicles is put into vehicle database to be repaired.
It should be noted that the term of such as "upper", "lower", "left", "right", "front", "rear" cited in invention, also Only being illustrated convenient for narration, rather than to limit the scope of the invention, relativeness is altered or modified, in nothing Under essence change technology contents, when being also considered as the enforceable scope of the present invention.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment, All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as protection of the invention Range.

Claims (5)

1. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning, it is characterised in that: based on precise positioning and The shared bicycle charge system of safe barcode scanning includes two-dimension code label, mobile phone terminal, lock and product safety authentication server, institute The product safety authentication server stated includes database, receiving module, analysis contrast module and sending module, specific charging method It is as follows:
Step 1, information of vehicles is encrypted, encryption information is made into corresponding two dimensional code in sequence together with information of vehicles;
Step 2, two dimensional code digital information is stored in product safety authentication server, two-dimension code label reality is made in two dimensional code Object, two-dimension code label are pasted on vehicle;
Step 3, user scans the two-dimension code label on any one vehicle by mobile phone terminal, is believed by surrounding user position Breath verifies user's location information, confirms accurately position, while mobile phone terminal believes the vehicle in two-dimension code label Breath and encryption information are sent to receiving module, and the data information received is sent analysis contrast module by receiving module, analysis Comparison module carries out fractionation verifying to encryption information, if encryption information verifies achievement, carries out step 4, if encryption information verifying is lost It loses, carries out step 5;
Step 4, change vehicle-state in the database to using and User Status, and issue and unlock from sending module to lock Instruction, and execute step 6;
Step 5, sending prompt information by sending module has security risk to mobile phone terminal notifying two dimensional code;Return step 3;
Step 6, for user in use every time t, software will pass through user of GPS or mobile base station automatic collection Location information, and upload onto the server, server records user location, if location information varies enormously, will lead to It crosses vehicle-mounted receiving module and one acquisition is also carried out to location information, and upload server records, when passing through after the completion of use Between and location point line calculate using distance carry out charging;
Step 7, user terminates after being confirmed with vehicle, is tested by the location information of surrounding user the location information of the user Card, confirms final stroke, changes vehicle-state after confirming successfully in the database and issues to free and from sending module to lock Shut instruction.
2. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as described in claim 1, feature exist In: encryption information and information of vehicles are according to license plate number, encrypted license plate number, corresponding with license plate number close in the step 1 Key and its encrypted data arrangement are separated using # between adjacent data.
3. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as claimed in claim 2, feature exist In: described license plate number, encrypted license plate number, key corresponding with license plate number and its encrypted data form specific number According to: Num#SHA1#Key#SHA256, the SHA1 are 40, and SHA256 is 65, and Key is 50, and the generation of Key uses Be random number, generated at random from 68 exportable characters in ACSII code.
4. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as claimed in claim 3, feature exist In: in the step 3 analyses and comparison module to encryption information carry out split verifying specific step is as follows: Num#SHA1#Key# SHA256 data are sent to analyses and comparison module analysis comparison module, and whether the cryptographic Hash for verifying Num and Key correct, if Num with The cryptographic Hash of Key is correct, then is proved to be successful, if the cryptographic Hash mistake of Num and Key, authentication failed.
5. a kind of shared bicycle charging method based on precise positioning and safe barcode scanning as described in claim 1, feature exist In: the method that user's location information is verified by surrounding user location information in the step 3 and step 7, tool Steps are as follows for body: being verified by surrounding user location information to user's location information, peripherad user directly transmits The checking request of auxiliary belt User ID, other users receive the auxiliary checking request that will be received automatically in backstage upload after request, It is compared by solicited message of the server to two users, and the location information of two users is modified, thus really Recognize and accurately uses position;If surrounding does not have other users, user will directly transmit checking request to vehicle, on vehicle After receiver receives information, it will server is sent by user's information and self-position, by server by user position Information is compared with the location information of vehicle, confirms accurately position.
CN201811176663.3A 2018-10-10 2018-10-10 A kind of shared bicycle charging method based on precise positioning and safe barcode scanning Pending CN109242645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811176663.3A CN109242645A (en) 2018-10-10 2018-10-10 A kind of shared bicycle charging method based on precise positioning and safe barcode scanning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811176663.3A CN109242645A (en) 2018-10-10 2018-10-10 A kind of shared bicycle charging method based on precise positioning and safe barcode scanning

Publications (1)

Publication Number Publication Date
CN109242645A true CN109242645A (en) 2019-01-18

Family

ID=65055074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811176663.3A Pending CN109242645A (en) 2018-10-10 2018-10-10 A kind of shared bicycle charging method based on precise positioning and safe barcode scanning

Country Status (1)

Country Link
CN (1) CN109242645A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902528A (en) * 2019-02-28 2019-06-18 尤尼泰克(嘉兴)信息技术有限公司 A kind of decoding method of two dimensional code
CN110163633A (en) * 2019-04-25 2019-08-23 江苏大学 A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car
CN111985589A (en) * 2020-08-26 2020-11-24 广州南沙珠江啤酒有限公司 Movable equipment management system based on code scanning positioning
CN112037372A (en) * 2020-08-04 2020-12-04 摩拜(北京)信息技术有限公司 Unlocking method and terminal for vehicle
CN112418880A (en) * 2020-11-07 2021-02-26 许尧龙 Two-dimensional code electronic authentication label and system
CN112926087A (en) * 2021-03-09 2021-06-08 南京信息工程大学 Secret sharing method with verification function and high embedding capacity based on two-dimensional code

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600797A (en) * 2017-01-25 2017-04-26 北京信通力创科技有限公司 Dynamic graphic password lock, server, sharing system and unlocking and locking methods thereof
CN106886920A (en) * 2017-02-16 2017-06-23 湖北大学 Based on the shared bicycle Secure Billing method that home is proved
CN107181742A (en) * 2017-05-16 2017-09-19 珠海晶通科技有限公司 A kind of shared bicycle electronic lock system and its method for unlocking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600797A (en) * 2017-01-25 2017-04-26 北京信通力创科技有限公司 Dynamic graphic password lock, server, sharing system and unlocking and locking methods thereof
CN106886920A (en) * 2017-02-16 2017-06-23 湖北大学 Based on the shared bicycle Secure Billing method that home is proved
CN107181742A (en) * 2017-05-16 2017-09-19 珠海晶通科技有限公司 A kind of shared bicycle electronic lock system and its method for unlocking

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109902528A (en) * 2019-02-28 2019-06-18 尤尼泰克(嘉兴)信息技术有限公司 A kind of decoding method of two dimensional code
CN109902528B (en) * 2019-02-28 2023-10-20 尤尼泰克(嘉兴)信息技术有限公司 Encoding and decoding method of two-dimension code
CN110163633A (en) * 2019-04-25 2019-08-23 江苏大学 A kind of two-dimension code anti-counterfeit authentication method of shared bicycle and method of hiring a car
CN112037372A (en) * 2020-08-04 2020-12-04 摩拜(北京)信息技术有限公司 Unlocking method and terminal for vehicle
CN111985589A (en) * 2020-08-26 2020-11-24 广州南沙珠江啤酒有限公司 Movable equipment management system based on code scanning positioning
CN112418880A (en) * 2020-11-07 2021-02-26 许尧龙 Two-dimensional code electronic authentication label and system
CN112926087A (en) * 2021-03-09 2021-06-08 南京信息工程大学 Secret sharing method with verification function and high embedding capacity based on two-dimensional code
CN112926087B (en) * 2021-03-09 2023-05-05 南京信息工程大学 Secret sharing method with verification function and high embedding capacity based on two-dimensional code

Similar Documents

Publication Publication Date Title
CN109242645A (en) A kind of shared bicycle charging method based on precise positioning and safe barcode scanning
CN106780859B (en) A kind of control method and system that time type vehicle is unlocked/shut
CN108569250A (en) The automatic authorization method of bluetooth key based on shared automobile
CN108648287A (en) The implementation method of private savings parking stall leasing system based on block chain
CN107822208A (en) Electronic cigarette and electronic cigarette activation system
KR101129318B1 (en) Method and system providing lending service using biometrics card
CN105099702B (en) A kind of safety certifying method and system of city public bicycle lease
US20140122890A1 (en) Method and system for securing the exchange of data between a client module and a server module
CN103338188A (en) Dynamic authentication method of client side suitable for mobile cloud
CN105404907A (en) RFID electronic license plate generation system, method, license plate recognition system and method
CN110035071A (en) A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system
CN104363199A (en) Security authentication method based on time synchronization codes and time synchronization code module
CN109729046A (en) Two-dimensional code scanning method and terminal, authentication method and server and service system
CN110445805A (en) A kind of false-proof authentication system and method for two dimensional code
EP3140825B1 (en) Authentication method for vehicular number plate recognition
CN109215204A (en) A kind of intelligent door lock security system based on ether mill
CN107248212A (en) A kind of intelligent lock system and its method for unlocking based on NFC
CN113569213A (en) Industrial park application safety support system and method based on 5G technology
CN106780860B (en) A kind of control method and system that challenge type vehicle is unlocked/shut
CN106682905B (en) Application unlocking method
CN107426155A (en) A kind of method for unlocking of integrated cabinet
CN113643489B (en) Public transit pos machine based on face identification
CN101741561A (en) Method and system for authenticating two-way hardware
CN110599636A (en) Customs lock, customs lock key, and customs lock opening and closing method and system
CN113538814A (en) Intelligent bus vehicle-mounted terminal supporting digital RMB payment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 210044 No. 219 Ningliu Road, Jiangbei New District, Nanjing City, Jiangsu Province

Applicant after: Nanjing University of Information Science and Technology

Address before: 211500 Yuting Square, 59 Wangqiao Road, Liuhe District, Nanjing City, Jiangsu Province

Applicant before: Nanjing University of Information Science and Technology

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication