CN109992984A - A kind of file identification method and equipment based on two dimensional code - Google Patents

A kind of file identification method and equipment based on two dimensional code Download PDF

Info

Publication number
CN109992984A
CN109992984A CN201910306871.9A CN201910306871A CN109992984A CN 109992984 A CN109992984 A CN 109992984A CN 201910306871 A CN201910306871 A CN 201910306871A CN 109992984 A CN109992984 A CN 109992984A
Authority
CN
China
Prior art keywords
file
dimensional code
data
information
identification method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910306871.9A
Other languages
Chinese (zh)
Other versions
CN109992984B (en
Inventor
彭红林
刘少磊
沈怡
罗年庆
祝哲海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unitec (jiaxing) Information Technology Co Ltd
Original Assignee
Unitec (jiaxing) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unitec (jiaxing) Information Technology Co Ltd filed Critical Unitec (jiaxing) Information Technology Co Ltd
Priority to CN201910306871.9A priority Critical patent/CN109992984B/en
Publication of CN109992984A publication Critical patent/CN109992984A/en
Application granted granted Critical
Publication of CN109992984B publication Critical patent/CN109992984B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to field of data recognition, especially planar bar code technology.The present invention proposes a kind of file identification method based on two dimensional code, comprising: step 1: obtaining the encryption data of two dimensional code;Step 2: decrypting the encryption data;Step 3: obtaining the file data of respective file data level;Step 4: file data is presented.The present invention solves the problems, such as anti-fake environmental suitability, reduces data hidden danger and data maintenance cost.The expansion that two dimensional code file of the invention passes through data storage capacity, information is directly placed into file, it realizes and is obtained in two dimensional code by way of information parsing offline, achieve the effect that fake certification, it is no longer dependent on region network, the requirement for environment is lower, is not necessarily to database maintenance, it is at low cost, it is highly-safe.

Description

A kind of file identification method and equipment based on two dimensional code
Technical field
The present invention relates to software approach fields, especially planar bar code technology.
Background technique
Two dimensional code especially needs to carry out efficiently article in hi-tech industry, storage transport service, wholesale and retail industry etc. The industry of beacon information is widely used.The prior art one is the Chinese patent application that patent publication No. is CN105719147A, such as Shown in Fig. 1, disclose it is a kind of produced using quality system and planar bar code technology, storage is propagated and the method for tracking electronic file. Invention needs can login account system, although this can increase the safety of file, this similarly limits file Preview;The invention needs the support of database, and the data of centralization do not ensure that the safety of data, and data maintenance cost It is high;The invention needs to rely on URL i.e. network carries out reading data, this makes the use environment of the invention require to get higher , and easy parameter high concurrent leads to database corruption.The prior art two is that patent publication No. is in CN104573073A State's patent application, as shown in Fig. 2, disclosing a kind of two dimensional code document automatic classification method.The invention is only simple to utilize two Code spot file is tieed up, but file content still needs to be stored in advance, and the two dimensional code can only carry out data It is used on the machine of storage, limitation is very big;This method does not ensure that file security, because the file on machine is can be usurped Change, although two dimensional code address be encrypted be it is safe, the authenticity of file itself can not be guaranteed.
Summary of the invention
In order to solve the problems, such as anti-fake environmental suitability, solving data hidden danger and reduce data maintenance cost, the present invention is mentioned For providing a kind of file identification method and equipment based on two dimensional code, information is directly placed into file, is realized by solving offline Analysis obtains the mode of information in two dimensional code, achievees the effect that fake certification.The present invention is no longer dependent on region network, for environment Requirement it is lower, be not necessarily to database maintenance, at low cost, highly-safe, operating process is simple.
To achieve the above object, the present invention provides a kind of file identification method based on two dimensional code, comprising:
Step 1: obtaining the encryption data of two dimensional code;
Step 2: decrypting the encryption data;
Step 3: obtaining the file data of respective file data level;
Step 4: file data is presented.
It preferably, further include two dimensional code preparation process, the preparation process includes:
Preparation process 1: the file information of the file is acquired;
Preparation process 2: the file information of the acquisition is encoded to the two dimensional code;
Preparation process 3: by the two dimensional code and integrating documents.
Preferably, according to the grade mark in identification equipment, or according to log-on message acquisition grade mark, corresponding two are obtained Tie up the file data of the corresponding grade label in code.
Preferably, the file are as follows: official document, legal documents, examining report are announced, notice;The file is papery Version file or electronic document page.
Preferably, the encryption data includes and the one-to-one information flag of different brackets file data.
Preferably, the grade mark and the information flag corresponding relationship are as follows: one-to-one, many-one, it is one-to-many.
Preferably, the file information includes that file signs and issues unit, and file is signed and issued the time, document content information or part text Part content information.
Preferably, the preparation process 2 further includes ciphering process and compression process, and the ciphering process is asymmetric adds It is close, symmetric cryptography;The compression process is binary compression algorithms.
Preferably, two dimensional code preparation process 2 encoded prints in conjunction with the file;
Or, the two dimensional code that preparation process 2 is encoded prints, and affix on file.
Preferably, the encryption data includes adding with first in the identification equipment for the encryption data for obtaining two dimensional code Close the second ciphering signature to match of signing.
Preferably, when scanning the encryption data of the two dimensional code using identification equipment, if the first ciphering signature and second adds Close signatures match then exports the encryption data;Otherwise, stop output process or display reminding information.
Preferably, the step 3 are as follows:
Step 3.1: obtaining the class information of identification equipment or the class information of log-on message;
Step 3.2: the information flag of corresponding grade information is obtained according to class information;
Step 3.3: obtaining the hierarchical file data of the information flag of corresponding grade information.
Preferably, the step 3.3 are as follows: symmetrical code key and/or the decryption of asymmetric code key in offline service rating information Encryption data data.
A kind of file identification equipment based on two dimensional code, comprising:
Resolution unit is inputted, for obtaining two dimensional code and parsing the encryption data of the two dimensional code;
Decryption unit obtains file data for decrypting the encryption data;
Compare display unit, for obtaining and pair in corresponding two dimensional code being presented according to the grade mark in identification equipment Answer the file data of grade mark.
Preferably, the input resolution unit includes analysis program.
Preferably, the decryption unit includes symmetrical code key, and/or, asymmetric code key.
Preferably, the file data of the presentation is the file data with identification device levels information matches.
Preferably, the identification equipment is plate, cell phone, computer, equipment for customizing;Or, based on cell phone Application software or small routine.
In order to solve the problems, such as that anti-fake environmental suitability, two dimensional code file of the invention can store a large amount of data, The information needed is directly placed into two dimensional code.Transmitting carrier of the two dimensional code as file data, can also be used as data encryption It ensures.The setting may be implemented to obtain parsing offline in two dimensional code by way of information, to achieve the effect that fake certification.This Invention is no longer dependent on region network, while reducing the requirement of use environment, has saved the network cost in use.Simultaneously Offline mode solves the problems such as common fault of network server, high concurrent.
The two dimensional code that the present invention uses is formed by stacking by multi-enciphering, and the difficulty being cracked is larger.The two dimensional code can be with The safety for guaranteeing data, discharges the pressure of system end.No longer need the guarantee of special login system etc.Only possess tool The entity or individual of standby respective level identification equipment, just it can be seen that the file information carried in two dimensional code.
All data have all been put into two dimensional code by the present invention, so the present invention does not need database, point of person's local data Class processing, does not need maintenance data and data device server yet, reduces system cost.And there is no local data base, it reduces The risk of leaking data.
In order to solve the problems, such as anti-fake environmental suitability, data hidden danger and data maintenance cost, two dimension of the invention are reduced Information is directly placed into file by code file by the expansion of data storage capacity, is realized and is obtained in two dimensional code by parsing offline The mode of information, achievees the effect that fake certification.The present invention is no longer dependent on region network, and the requirement for environment is lower, nothing Database maintenance is needed, it is at low cost, it is highly-safe, it is easy to operate.
Detailed description of the invention
Fig. 1 is one structural schematic diagram of prior art
Two structural schematic diagram of the position Fig. 2 prior art
Fig. 3 is the file identification method flow chart based on two dimensional code that the embodiment of the present invention one provides.
Specific embodiment
With reference to the attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, belongs to the scope of the present invention.
It can not achieve in view of existing method and meet the needs of different application scene, quickly and easily data medium acquisition Method, the embodiment of the invention provides a kind of acquisition methods of two-dimensional code data carrier.
Embodiment one
The present embodiment provides a kind of acquisition methods of two-dimensional code data carrier, as shown in figure 3, design cycle of the invention is such as Under:
1. file content typing
File type can be with are as follows: official document, legal documents, examining report, all kinds of bulletins, all kinds of notices etc.
The typing of file content, which can be, is responsible for information collection by authoritative unit.Certain this kind of mode, mainly for law The file content that letter is issued by special unit.
2. generating two dimensional code
Above-mentioned two dimensional code is a kind of two dimensional code of high capacity.Two dimensional code can support the total amount of the file information, i.e. file Information can all be encoded as binary data, and store into two dimensional code.It can also be stored in its outer two dimensional code related on file Information, for example there was only file main contents information on file, but the telephone number etc. of the unit can be stored in two dimensional code Other sensitive and crucial information.The generating process of two dimensional code is a kind of generation program of stand-alone development, is a kind of private Generation method.Generating process combines a variety of encryptions and compress technique, and tactical rule complicated difficult is to crack.Above-mentioned a variety of encryption skills Art can be asymmetric encryption, symmetric cryptography etc..Above-mentioned compress technique is mainly binary compression algorithms.So two dimensional code is It can not forge, can not distort, it is ensured that the safety of data.Since all data have been stored in two dimensional code, so Server is not needed to support data to store, cost is greatly saved.The information in original data library will be by two one by one Dimension code is undertaken, and the decentralization of data is realized.
Two dimensional code is presented in conjunction with file
Two dimensional code can bind directly electronic document, and directly two dimensional code is encoded on electronic document.One can also be set up another Page pdf stores two dimensional code, and new pdf document is generated together with electronic document.
The display form of two dimensional code can also print together with file, and General Two-Dimensional code can be presented on the tail portion of file.It beats When printed text part, directly two dimensional code is printed together.Two dimensional code can certainly be attached on file, the side pasted by label Formula.
Two dimensional code, the transmitting carrier as file can certainly directly be used.That is a two dimensional code is exactly one The file content of part electronic edition.So text document you can deposit in the mobile device of oneself and make directly as a picture With.When you need to others show or others wish to obtain your file when, using mobile device parsing picture obtain Obtain the file of electronic edition.Which has safe guarantee, and can prevent the loss of paper document, also solves usual life Middle file problem inconvenient to carry.
File is veritified using equipment for customizing or app
Above-mentioned equipment for customizing is the equipment containing two dimensional code analysis program.Above-mentioned equipment for customizing can be divided into following 5 part;
Importation: for receiving two dimensional code;
Parsing part: the data of encryption are obtained for parsing two dimensional code containing two dimensional code analysis program;
Decryption portion: using the asymmetric code key in equipment, ciphertext data, and signature section letter is obtained according to integration rules Breath;
Rating unit: it for comparing signature, ensures information security;
Part is presented: for rendering as a result, presentation mode can be the both sides' difference or tripartite's difference of multiplicity;
Device type can be with are as follows: pad, cell phone, customization android equipment etc..Above-mentioned cell phone can be utilization App on cell phone is also possible to small routine etc..If it is small routine, need just to may be implemented in the case where network File is veritified.
Two dimensional code is non-public technology, so two dimensional code has and can only be customized equipment parsing, it ensure that the private of information It is sexual and authoritative.
Equipment for customizing contains the ciphering signature that file signs and issues unit, and the equally encryption label containing the unit in two dimensional code Name.While the setting can guarantee the safety of equipment for customizing, accomplish the binding of equipment and two dimensional code, accomplishes the double-deck guarantor Card.If there is criminal wants steal information or spurious information, then he must steal while generating code, oneself Reforming equipment.This is practically impossible to for technological layer, is also huge in cost.
Verification procedure after decryption completion, can be naked eye comparing, be also possible to be directly realized by OCR comparison.It is first First successful decryption is the authority for realizing data, then comparison data, then can prove the authentic and valid of data.So this method The anti-fake of file may be implemented, protect the safety of information and file distribution unit.
And after decryption is completed, since other phases other than the content of file itself can also be contained in two dimensional code Close information, such as unit telephone number.While can protect sensitive information, convenient acquisition of information is provided to related personnel.
The present invention is since all data are stored in two dimensional code, and analysis program is also in equipment.So the present invention can be with Verification procedure is completed under off-line state.All Files content is all independently present in two dimensional code, and which achieves going for data Centralization solves the problems, such as the high concurrent under network.Which also saves network and the costs of data simultaneously.
In conclusion the data medium acquisition methods for the two dimensional code that the embodiment of the present invention provides, have below beneficial to effect Fruit:
(1) file of the invention based on two dimensional code can verify the file true and false in off-line case, strengthen it to ring The adaptability in border, expands use scope;
(2) two dimensional code file of the invention can store the other information other than file, while protecting privacy information, Reinforce being directed to for information to spread through sex intercourse;
(3) two dimensional code in file of the present invention is a information carrier, does not need the support of huge database, has saved number According to cost, decentralization is realized, no data library risk of leakage improves safety.
Particular embodiments described above, to the purpose of the present invention, technical scheme and beneficial effects have been carried out further in detail Describe in detail it is bright, it should be understood that above is only a specific embodiment of the present invention, the protection model being not intended to limit the present invention It encloses, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in the present invention Protection scope within.

Claims (18)

1. a kind of file identification method based on two dimensional code characterized by comprising
Step 1: obtaining the encryption data of two dimensional code;
Step 2: decrypting the encryption data;
Step 3: obtaining the hierarchical file data of respective file data level;
Step 4: hierarchical file data are presented.
2. one kind is as described in claim 1 based on the file identification method of two dimensional code, which is characterized in that further include that two dimensional code prepares Process, the preparation process include:
Preparation process 1: the file information of the file is acquired;
Preparation process 2: the file information of the acquisition is encoded to the two dimensional code;
Preparation process 3: by the two dimensional code and integrating documents.
3. one kind is as described in claim 1 based on the file identification method of two dimensional code, which is characterized in that according in identification equipment Grade mark, or grade mark is obtained according to log-on message, obtain the file data of the corresponding grade label in corresponding two dimensional code.
4. one kind is as described in claim 1 based on the file identification method of two dimensional code, which is characterized in that the file are as follows: reddish tone File, legal documents, examining report are announced, notice;The file is papery version file or electronic document page.
5. one kind is as described in claim 1 based on the file identification method of two dimensional code, which is characterized in that the encryption data includes With the one-to-one information flag of different brackets file data.
6. one kind is as claimed in claim 5 based on the file identification method of two dimensional code, which is characterized in that the grade mark and institute State information flag corresponding relationship are as follows: one-to-one, many-one, it is one-to-many.
7. one kind is as claimed in claim 2 based on the file identification method of two dimensional code, which is characterized in that the file information includes File signs and issues unit, and file is signed and issued the time, document content information or partial file content information.
8. one kind is as claimed in claim 2 based on the file identification method of two dimensional code, which is characterized in that the preparation process 2 is also Including ciphering process and compression process, the ciphering process is asymmetric encryption, symmetric cryptography;The compression process is binary system Compression algorithm.
9. one kind is as claimed in claim 2 based on the file identification method of two dimensional code, which is characterized in that encode preparation process 2 The two dimensional code printed in conjunction with the file;
Or, the two dimensional code that preparation process 2 is encoded prints, and affix on file.
10. one kind is as described in claim 1 based on the label identification method of two dimensional code, which is characterized in that the encrypted packet Include the second ciphering signature to match with the first ciphering signature in the identification equipment for the encryption data for obtaining two dimensional code.
11. one kind is as claimed in claim 10 based on the file identification method of two dimensional code, which is characterized in that swept using identification equipment When retouching the encryption data of the two dimensional code, if the first ciphering signature is matched with the second ciphering signature, the encryption data is exported; Otherwise, stop output process or display reminding information.
12. one kind is as described in claim 1 based on the file identification method of two dimensional code, which is characterized in that the step 3 are as follows:
Step 3.1: obtaining the class information of identification equipment or the class information of log-on message;
Step 3.2: the information flag of corresponding grade information is obtained according to class information;
Step 3.3: obtaining the hierarchical file data of the information flag of corresponding grade information.
13. one kind is as claimed in claim 11 based on the file identification method of two dimensional code, which is characterized in that the step 3.3 are as follows: Symmetrical code key is used offline, and/or, asymmetric code key decrypts encryption data data.
14. a kind of file identification equipment based on two dimensional code characterized by comprising
Resolution unit is inputted, for obtaining two dimensional code and parsing the encryption data of the two dimensional code;
Decryption unit obtains file data for decrypting the encryption data;
Compare display unit, for obtaining and the correspondence etc. in corresponding two dimensional code being presented according to the grade mark in identification equipment The file data of grade label.
15. a kind of file identification equipment based on two dimensional code as claimed in claim 14, which is characterized in that the input parsing is single Member includes analysis program.
16. a kind of file identification equipment based on two dimensional code as claimed in claim 14, which is characterized in that the decryption unit packet Symmetrical code key is included, and/or, asymmetric code key.
17. a kind of file identification equipment based on two dimensional code as claimed in claim 14, which is characterized in that the file of the presentation Data are the file data with identification device levels information matches.
18. a kind of file identification equipment based on two dimensional code as claimed in claim 14, which is characterized in that the identification equipment is Plate, cell phone, computer, equipment for customizing;Or, application software or small routine based on cell phone.
CN201910306871.9A 2019-04-17 2019-04-17 File identification method and equipment based on two-dimensional code Active CN109992984B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910306871.9A CN109992984B (en) 2019-04-17 2019-04-17 File identification method and equipment based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910306871.9A CN109992984B (en) 2019-04-17 2019-04-17 File identification method and equipment based on two-dimensional code

Publications (2)

Publication Number Publication Date
CN109992984A true CN109992984A (en) 2019-07-09
CN109992984B CN109992984B (en) 2022-01-14

Family

ID=67133895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910306871.9A Active CN109992984B (en) 2019-04-17 2019-04-17 File identification method and equipment based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN109992984B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021106A (en) * 2019-04-17 2019-07-16 尤尼泰克(嘉兴)信息技术有限公司 A kind of bank slip recognition method and apparatus based on two dimensional code
WO2022193620A1 (en) * 2021-03-15 2022-09-22 尤尼泰克嘉兴信息技术有限公司 Encoding method and apparatus for network file protection, and decoding method and apparatus for network file protection

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281665A (en) * 2008-05-12 2008-10-08 上海伊诺尔印务有限公司 Method for preventing false bills
CN102034127A (en) * 2009-09-28 2011-04-27 上海易悠通信息科技有限公司 Novel high-capacity two-dimensional barcode and system, encoding and decoding methods and applications thereof
CN102291382A (en) * 2011-04-29 2011-12-21 北京恒信彩虹科技有限公司 Method and device for authenticating digital media contents
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
CN104573073A (en) * 2015-01-27 2015-04-29 江苏汉德天坤数字技术有限公司 Automatic two-dimension code document classifying method
CN104615791A (en) * 2015-03-09 2015-05-13 浪潮集团有限公司 Three-dimensional code generating and parsing method and device
US20150205940A1 (en) * 2012-08-09 2015-07-23 Fujian Foxit Software Development Joint Stock Co., Ltd. Method for controlling online previewing of e-book page
CN105279469A (en) * 2015-09-15 2016-01-27 重庆智韬信息技术中心 Two-dimension code oriented authorization method
CN105719147A (en) * 2016-01-25 2016-06-29 上海网环信息科技有限公司 Method for generating, storing, transmitting and tracking electronic files through quality system and planar bar code technology
CN106203229A (en) * 2016-07-07 2016-12-07 立德高科(昆山)数码科技有限责任公司 The terminal unit recognition Quick Response Code of different rights is with the method for the different information of display
CN107528833A (en) * 2017-08-09 2017-12-29 成都派沃特科技有限公司 The method and its system of contactless network transmission are carried out based on Quick Response Code
CN108256339A (en) * 2016-12-28 2018-07-06 航天信息股份有限公司 A kind of method and system protected based on Quick Response Code to electronic invoice information

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281665A (en) * 2008-05-12 2008-10-08 上海伊诺尔印务有限公司 Method for preventing false bills
CN102034127A (en) * 2009-09-28 2011-04-27 上海易悠通信息科技有限公司 Novel high-capacity two-dimensional barcode and system, encoding and decoding methods and applications thereof
CN102291382A (en) * 2011-04-29 2011-12-21 北京恒信彩虹科技有限公司 Method and device for authenticating digital media contents
US20150205940A1 (en) * 2012-08-09 2015-07-23 Fujian Foxit Software Development Joint Stock Co., Ltd. Method for controlling online previewing of e-book page
CN102932148A (en) * 2012-10-25 2013-02-13 成都市易恒信科技有限公司 System and method for preventing safety two-dimensional code counterfeiting on basis of combination of public key (CPK) authentication
CN104573073A (en) * 2015-01-27 2015-04-29 江苏汉德天坤数字技术有限公司 Automatic two-dimension code document classifying method
CN104615791A (en) * 2015-03-09 2015-05-13 浪潮集团有限公司 Three-dimensional code generating and parsing method and device
CN105279469A (en) * 2015-09-15 2016-01-27 重庆智韬信息技术中心 Two-dimension code oriented authorization method
CN105719147A (en) * 2016-01-25 2016-06-29 上海网环信息科技有限公司 Method for generating, storing, transmitting and tracking electronic files through quality system and planar bar code technology
CN106203229A (en) * 2016-07-07 2016-12-07 立德高科(昆山)数码科技有限责任公司 The terminal unit recognition Quick Response Code of different rights is with the method for the different information of display
CN108256339A (en) * 2016-12-28 2018-07-06 航天信息股份有限公司 A kind of method and system protected based on Quick Response Code to electronic invoice information
CN107528833A (en) * 2017-08-09 2017-12-29 成都派沃特科技有限公司 The method and its system of contactless network transmission are carried out based on Quick Response Code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ALTAF T. SHAH等: "Overview and an Approach for QR-Code Based Messaging and File Sharing on Android Platform in View of Security", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=8282711》 *
续爱民等: "基于二维码自动识别的海工设备调试管理技术", 《造船技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021106A (en) * 2019-04-17 2019-07-16 尤尼泰克(嘉兴)信息技术有限公司 A kind of bank slip recognition method and apparatus based on two dimensional code
WO2022193620A1 (en) * 2021-03-15 2022-09-22 尤尼泰克嘉兴信息技术有限公司 Encoding method and apparatus for network file protection, and decoding method and apparatus for network file protection

Also Published As

Publication number Publication date
CN109992984B (en) 2022-01-14

Similar Documents

Publication Publication Date Title
CN108229188B (en) Method for signing file and verifying file by using identification key
US20120308003A1 (en) Authentic barcodes using digital signatures
US8285991B2 (en) Electronically signing a document
US20140254796A1 (en) Method and apparatus for generating and/or processing 2d barcode
CN104021482A (en) Certificate false-proof verification method base on identification authentication technology
CN111581653A (en) Contract document signing method, device, equipment and computer readable storage medium
CN107886333A (en) A kind of Antiforge system and its method for anti-counterfeit with dynamic anti-fake information
CN102930317A (en) Device for generating two-dimension code identifiers of books, two-dimension code identification device and system
CN102930307A (en) Anti-counterfeiting authentication method for famous wine
CN106709537A (en) Dynamic information anti-counterfeiting system with electronic ink technology and anti-counterfeiting method thereof
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
CN103020682A (en) Two-dimension code identification generating device, two-dimension code identification recognition device and two-dimension code identification system of book
CN107229879A (en) Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN104320253B (en) A kind of Quick Response Code Verification System and method based on CBS signature mechanisms
CN106953732A (en) The key management system and method for chip card
CN111222178A (en) Data signature method and device
CN109992984A (en) A kind of file identification method and equipment based on two dimensional code
CN110020540A (en) A kind of certificate recognition methods and equipment based on two dimensional code
CN110009079A (en) A kind of label identification method and equipment based on two dimensional code
JP2003169051A (en) Electronic seal system
CN104156645A (en) Copy verification system and application method thereof
WO2021005405A1 (en) A method and system for generating and validating documents and document holder using machine readable barcode
WO2012142061A1 (en) Authentic barcodes using digital signatures
CN111145447A (en) Bank self-service intelligent printing system and method
CN101951365B (en) Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant