CN110011993B - Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption - Google Patents

Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption Download PDF

Info

Publication number
CN110011993B
CN110011993B CN201910228555.4A CN201910228555A CN110011993B CN 110011993 B CN110011993 B CN 110011993B CN 201910228555 A CN201910228555 A CN 201910228555A CN 110011993 B CN110011993 B CN 110011993B
Authority
CN
China
Prior art keywords
data
dimensional code
decryption
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910228555.4A
Other languages
Chinese (zh)
Other versions
CN110011993A (en
Inventor
林恒昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoyun Technologies Co Ltd
Original Assignee
Haoyun Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoyun Technologies Co Ltd filed Critical Haoyun Technologies Co Ltd
Priority to CN201910228555.4A priority Critical patent/CN110011993B/en
Publication of CN110011993A publication Critical patent/CN110011993A/en
Application granted granted Critical
Publication of CN110011993B publication Critical patent/CN110011993B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a two-dimensional code big data safe transmission device based on dynamic multilevel encryption and decryption, which comprises: the first data exchange interface is used for acquiring and sending data information to be exchanged; the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption; the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image; the two-dimensional code display module is used for displaying the two-dimensional code image; the acquisition module is used for acquiring the two-dimensional code image; the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information; the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages; the second data exchange interface is used for outputting the decrypted exchange data; the invention greatly improves the capacity of data transmission and the safety of data transmission.

Description

Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption
Technical Field
The invention relates to the technical field of data security transmission, in particular to a two-dimensional code big data security transmission device based on dynamic multilevel encryption and decryption.
Background
At present, the internal and external network data transmission method of the common two-dimensional code is to scan the two-dimensional code and then decode the two-dimensional code to obtain the exchange information, namely, the method comprises the following steps:
(1) extracting data to be exchanged from an intranet database, coding the data, and generating a two-dimensional code pattern;
(2) acquiring a two-dimensional code image on a display screen of an intranet device terminal through a camera of the extranet device terminal;
(3) performing decoding calculation on the terminal equipment of the external network device to finally obtain exchange data;
this method can transmit less data capacity and can cause data insecurity.
Disclosure of Invention
The invention provides a two-dimensional code big data safe transmission device based on dynamic multistage encryption and decryption, which aims to solve the technical problems that the capacity of transmitted data is small and data is unsafe in the prior art, so that the capacity of the transmitted data and the data transmission safety are greatly improved through a matrix two-dimensional code technology.
In order to solve the above technical problem, an embodiment of the present invention provides a two-dimensional code big data secure transmission device based on dynamic multilevel encryption and decryption, including:
the first data exchange interface is used for acquiring and sending data information to be exchanged;
the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption;
the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image;
the two-dimensional code display module is used for displaying the two-dimensional code image;
the acquisition module is used for acquiring the two-dimensional code image;
the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information;
the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages;
the second data exchange interface is used for outputting the decrypted exchange data;
in the dynamic multi-level encryption and the dynamic multi-level decryption, comprising: setting a key table in a database, and recording sub-key information of the key table on a key identification bit in the generated two-dimensional code; and reading the data on the two-dimensional code key identification position, acquiring a real key through a built-in key table, and encrypting and decrypting the data by combining auxiliary key information.
Preferably, the keys used by the dynamic multilevel encryption algorithm and the dynamic multilevel decryption algorithm are configured by replacing according to a preset frequency.
As a preferred scheme, the two-dimensional code image generating module encodes the encrypted data to be exchanged to generate a two-dimensional code image, and the method comprises the following steps:
segmenting, encrypting and adding check information to data information to be exchanged to form a plurality of segments of data;
mapping the data into a plurality of two-dimensional code pictures;
and carrying out fragment analysis on the two-dimensional code picture to obtain fragment data, and then assembling the fragment data into complete text information.
As a preferred scheme, each piece of sliced data has piece information, and the piece information includes a data unique identifier, a piece number, a piece serial number, a key identifier, and time authentication information.
Preferably, the two-dimensional code image generating module is further configured to determine whether a total number of the sliced data decoded in the data decoding and assembling process is equal to the number of the slices, and if so, perform an assembling operation to generate final exchange data.
Preferably, the two-dimensional code image has a two-dimensional code matrix sequence, and the two-dimensional code matrix sequence stores proprietary equipment authentication information and time authentication information.
As a preferred scheme, the two-dimensional code image recognition module is further configured to verify the device authentication information, determine whether the device authentication information meets a standard, and stop reading and analyzing the two-dimensional code if the device authentication information does not meet the standard.
Preferably, the characteristic data information includes an identification code of the device.
As a preferred scheme, the two-dimensional code image identification module is further configured to verify the time authentication information, determine whether valid time exceeds a preset time value, automatically set invalid data if valid time exceeds the preset time value, and stop reading and analyzing the two-dimensional code.
Preferably, the preset time value is 2 minutes.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the invention is based on the dynamic multilevel encryption and decryption technology, solves the technical problems of less data transmission capacity and unsafe data in the prior art by combining the data encryption module and the data decryption module, and greatly improves the capacity of data transmission and the data transmission safety.
Drawings
FIG. 1: the structure schematic diagram of the two-dimension code big data safety transmission device based on dynamic multi-stage encryption and decryption in the embodiment of the invention is shown.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a preferred embodiment of the present invention provides a two-dimensional code big data secure transmission device based on dynamic multi-level encryption and decryption, including:
the first data exchange interface is used for acquiring and sending data information to be exchanged;
the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption;
the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image;
the two-dimensional code display module is used for displaying the two-dimensional code image;
the acquisition module is used for acquiring the two-dimensional code image;
the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information;
the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages;
the second data exchange interface is used for outputting the decrypted exchange data;
in the dynamic multi-level encryption and the dynamic multi-level decryption, comprising: setting a key table in a database, and recording sub-key information of the key table on a key identification bit in the generated two-dimensional code; and reading the data on the two-dimensional code key identification position, acquiring a real key through a built-in key table, and encrypting and decrypting the data by combining auxiliary key information.
In this embodiment, the keys used by the dynamic multi-level encryption algorithm and the dynamic multi-level decryption algorithm are configured by replacing at a preset frequency.
In this embodiment, the two-dimensional code image generating module encodes the encrypted data to be exchanged to generate the two-dimensional code image, and includes the following steps:
segmenting, encrypting and adding check information to data information to be exchanged to form a plurality of segments of data;
mapping the data into a plurality of two-dimensional code pictures;
and carrying out fragment analysis on the two-dimensional code picture to obtain fragment data, and then assembling the fragment data into complete text information.
In this embodiment, each piece of sliced data has piece information, and the piece information includes a data unique identifier, a piece number, a piece serial number, a key identifier, and time authentication information.
In this embodiment, the two-dimensional code image generating module is further configured to determine whether a total number of sliced data decoded in the data decoding and assembling process is equal to the number of slices, and if so, perform an assembling operation to generate final exchange data.
In this embodiment, the two-dimensional code image has a two-dimensional code matrix sequence in which proprietary device authentication information and time authentication information are stored.
In this embodiment, the two-dimensional code image recognition module is further configured to verify the device authentication information, determine whether the device authentication information meets a standard, and stop reading and analyzing the two-dimensional code if the device authentication information does not meet the standard.
In this embodiment, the characteristic data information includes an identification code of the device.
In this embodiment, the two-dimensional code image recognition module is further configured to verify the time authentication information, determine whether valid time exceeds a preset time value, automatically set the valid time to invalid data if the valid time exceeds the preset time value, and stop reading and analyzing the two-dimensional code.
In this embodiment, the preset time value is 2mi n.
The following describes the steps of the implementation principle of the present device in detail.
1. In the technical scheme, the data are exchanged from the internal network to the external network by the following steps:
(1) extracting data to be exchanged from an intranet database, then encrypting, wherein an encryption algorithm adopts a dynamic multi-stage encryption mode, and then coding to generate a two-dimensional code matrix sequence;
(2) the two-dimensional code image matrix sequence stores special equipment authentication information and time authentication information;
(3) the external network system collects the effective two-dimensional code image through a camera, decrypts the effective two-dimensional code image through a dynamic multi-stage decryption mode, and decodes the effective two-dimensional code image to obtain final exchange data;
2. the dynamic multistage encryption and decryption algorithm used in the above steps 1(1) and 1(3) is implemented according to the following principle:
(1) a key table is arranged in an internal and external network system database, auxiliary key information A of the key table is recorded on a key identification position M in a generated two-dimensional code, a two-dimensional code acquisition device reads data on the key identification position of an effective two-dimensional code, a real key B (a multi-stage encryption algorithm) is found through the internal key table, and then the data are encrypted and decrypted.
(2) The key frequency replacement configuration used for encryption and decryption of the two-dimensional code can be replaced once per hour (rotation according to data table data) or daily, for example.
3. The principle of the device authentication information stored in the two-dimensional code matrix sequence in the above steps 1 and 2 is as follows:
the two-dimensional code generating end needs to generate a two-dimensional code image containing equipment characteristic data information, the two-dimensional code acquisition end firstly checks the characteristic data, and if the characteristic data are found not to be met, the reading and analyzing work is stopped; the characteristic data information comprises an identification code of the device;
4. the principle of the time authentication information stored in the two-dimensional code matrix sequence in the above steps 1 and 2 is as follows:
the two-dimensional code generating end needs to generate a two-dimensional code image containing time verification information, the two-dimensional code acquisition end firstly carries out time verification, the effective default time is 2 min, invalid data are automatically set when the effective default time exceeds 2 min, and reading and analyzing work is stopped;
5. the principle of generating the two-dimensional code matrix sequence in the above step 1(1) is as follows:
one piece of information can be automatically segmented, encrypted and added with verification information to finally form a plurality of pieces of data, the data are mapped into a plurality of two-dimensional code pictures, at an information reading end, the two-dimensional code pictures analyze the fragments to obtain fragment data, and then the fragment data are assembled into complete text information. Each data fragment contains fragment information including a data unique identifier, a fragment number, a fragment serial number, a key identifier and time authentication information. In the data decoding and assembling process, when the total number of the decoded fragment data is equal to the number of the fragments, the assembling action is executed to generate the final exchange data.
The invention is based on the dynamic multilevel encryption and decryption technology, solves the technical problems of less data transmission capacity and unsafe data in the prior art by combining the data encryption module and the data decryption module, and greatly improves the capacity of data transmission and the data transmission safety.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and are not intended to limit the scope of the present invention. It should be understood that any modifications, equivalents, improvements and the like, which come within the spirit and principle of the invention, may occur to those skilled in the art and are intended to be included within the scope of the invention.

Claims (10)

1. The utility model provides a big data security transmission device of two-dimensional code based on developments multistage encryption and decryption which characterized in that includes:
the first data exchange interface is used for acquiring and sending data information to be exchanged;
the data encryption module is used for receiving the data information to be exchanged and carrying out dynamic multi-stage encryption;
the two-dimensional code image generation module is used for encoding the encrypted data to be exchanged to generate a two-dimensional code image;
the two-dimensional code display module is used for displaying the two-dimensional code image;
the acquisition module is used for acquiring the two-dimensional code image;
the two-dimensional code image identification module is used for identifying the acquired two-dimensional code image and extracting characteristic data information;
the data decryption module is used for dynamically decrypting the characteristic data information in multiple stages;
the second data exchange interface is used for outputting the decrypted exchange data;
in the dynamic multi-level encryption and the dynamic multi-level decryption, comprising: setting a key table in a database, and recording sub-key information of the key table on a key identification bit in the generated two-dimensional code; and reading the data on the two-dimensional code key identification position, acquiring a real key through a built-in key table, and encrypting and decrypting the data by combining auxiliary key information.
2. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption as claimed in claim 1, wherein the keys used by the dynamic multistage encryption algorithm and the dynamic multistage decryption algorithm are configured by changing according to a preset frequency.
3. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption as claimed in claim 1, wherein the two-dimension code image generation module encodes the encrypted data to be exchanged to generate a two-dimension code image, comprising the following steps:
segmenting, encrypting and adding check information to data information to be exchanged to form a plurality of segments of data;
mapping the data into a plurality of two-dimensional code pictures;
and carrying out fragment analysis on the two-dimensional code picture to obtain fragment data, and then assembling the fragment data into complete text information.
4. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption of claim 3, wherein each piece of data has piece information, and the piece information comprises a data unique identifier, a piece number, a piece serial number, a key identifier and time authentication information.
5. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption as claimed in claim 3, wherein the two-dimension code image generation module is further configured to determine whether the total number of the sliced data decoded in the data decoding and assembling process is equal to the number of the sliced data, and if so, perform the assembling action to generate the final exchange data.
6. The two-dimension code big data security transmission device based on dynamic multistage encryption and decryption of claim 1, wherein the two-dimension code image has a two-dimension code matrix sequence, and proprietary equipment authentication information and time authentication information are stored in the two-dimension code matrix sequence.
7. The dynamic multi-stage encryption and decryption-based two-dimensional code big data secure transmission device according to claim 6, wherein the two-dimensional code image recognition module is further configured to verify the device authentication information, determine whether the device authentication information meets a standard, and stop reading and analyzing the two-dimensional code if the device authentication information does not meet the standard.
8. The two-dimension code big data safety transmission device based on dynamic multistage encryption and decryption as claimed in claim 7, wherein the characteristic data information includes an identification code of a device.
9. The dynamic multi-stage encryption and decryption-based two-dimensional code big data secure transmission device according to claim 6, wherein the two-dimensional code image recognition module is further configured to verify the time authentication information, determine whether valid time exceeds a preset time value, automatically set invalid data if valid time exceeds the preset time value, and stop reading and analyzing the two-dimensional code.
10. The two-dimension code big data security transmission device based on dynamic multi-stage encryption and decryption of claim 9, wherein the preset time value is 2 minutes.
CN201910228555.4A 2019-03-25 2019-03-25 Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption Active CN110011993B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910228555.4A CN110011993B (en) 2019-03-25 2019-03-25 Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910228555.4A CN110011993B (en) 2019-03-25 2019-03-25 Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption

Publications (2)

Publication Number Publication Date
CN110011993A CN110011993A (en) 2019-07-12
CN110011993B true CN110011993B (en) 2021-07-27

Family

ID=67167973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910228555.4A Active CN110011993B (en) 2019-03-25 2019-03-25 Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption

Country Status (1)

Country Link
CN (1) CN110011993B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177763A (en) * 2020-01-03 2020-05-19 玉溪市电子政务内网信息技术中心 Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption
CN111209579A (en) * 2020-01-03 2020-05-29 玉溪市电子政务内网信息技术中心 Electronic analysis equipment and method for encrypting confidential files by utilizing two-dimensional code in multiple ways
CN113037733A (en) * 2021-03-01 2021-06-25 安徽商信政通信息技术股份有限公司 Non-physical contact nondestructive transmission method and system for aerospace secret-related data
CN113111990A (en) * 2021-04-02 2021-07-13 北京点聚信息技术有限公司 Data processing method and system for OFD electronic file
CN117350319B (en) * 2023-12-06 2024-05-28 深圳华龙讯达信息技术股份有限公司 Method and system for preventing error of product associated data
CN117811837B (en) * 2024-02-29 2024-05-28 广州天竞智能科技有限公司 Unidirectional data transmission system with high privacy security

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462695A (en) * 2018-02-02 2018-08-28 北京云知声信息技术有限公司 The method, apparatus and system of safety-oriented data transfer
CN109344941A (en) * 2018-09-03 2019-02-15 佛山科学技术学院 A kind of big data secure sharing method and device
CN109409460A (en) * 2018-10-24 2019-03-01 江苏税软软件科技有限公司 A method of list data is transmitted using two dimensional code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010246027A (en) * 2009-04-09 2010-10-28 Canon Inc Image forming apparatus, image forming method, and computer program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462695A (en) * 2018-02-02 2018-08-28 北京云知声信息技术有限公司 The method, apparatus and system of safety-oriented data transfer
CN109344941A (en) * 2018-09-03 2019-02-15 佛山科学技术学院 A kind of big data secure sharing method and device
CN109409460A (en) * 2018-10-24 2019-03-01 江苏税软软件科技有限公司 A method of list data is transmitted using two dimensional code

Also Published As

Publication number Publication date
CN110011993A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110011993B (en) Two-dimensional code big data safety transmission device based on developments multistage encryption and decryption
CN110022314B (en) Big data secure transmission method based on matrix two-dimensional code
CN101295343B (en) Two-dimensional code multi-enciphering anti-fake printing method
CN107016499B (en) Transformer substation equipment inspection method based on two-dimensional code encryption identification
WO2017045594A1 (en) Anti-counterfeit method
CN106610995B (en) Method, device and system for creating ciphertext index
TW201610742A (en) Encrypting and decrypting information
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN110210270B (en) Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system
CN101010691A (en) Systems and methods for digital content security
CN1336051A (en) Method and system for the application of a safety marking
CN103049777A (en) Security application method for two-dimension code and encoding/decoding system
CN105812816B (en) A kind of compression encryption certification joint coding method
CN103473824A (en) Attendance checking method based on two-dimensional code label
GB2526636A (en) Encoder, decoder and methods employing partial data encryption
CN111177763A (en) Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption
CN117834186A (en) Data encryption transmission method and system
CN116341582B (en) Electronic traffic data management method and system based on two-dimension code
CN109829322B (en) Authorization information based real-time encryption and decryption method and system for digital media files
CN115150134A (en) Intelligent power grid data encryption transmission method and system
CN214376529U (en) Credible digital identity verification terminal combining camera code scanning and face verification
CN109902528B (en) Encoding and decoding method of two-dimension code
CN111309987B (en) Encryption algorithm identification method and device in actual attack scene
CN108337514A (en) A kind of encrypted domain HEVC video data hidden methods
CN113626861A (en) Medical data encryption and decryption method based on data segmentation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant