CN107992923A - A kind of QR Quick Response Codes generation and the method read - Google Patents
A kind of QR Quick Response Codes generation and the method read Download PDFInfo
- Publication number
- CN107992923A CN107992923A CN201711405586.XA CN201711405586A CN107992923A CN 107992923 A CN107992923 A CN 107992923A CN 201711405586 A CN201711405586 A CN 201711405586A CN 107992923 A CN107992923 A CN 107992923A
- Authority
- CN
- China
- Prior art keywords
- information
- bit stream
- privacy
- privacy information
- string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of generation of QR Quick Response Codes and the method read, including:Information to be encoded is divided into public information and privacy information;Privacy information is encrypted, and bit stream is carried out to itself and public information and converts to obtain privacy information and the bit stream string of public information, it is linked in sequence into final bit stream string according to bit stream string and the full stop of the bit stream string of public information, full stop, privacy information designator, privacy information;Call QR codes generating algorithm to encode final bit stream and concatenate into QR Quick Response Codes;Call QR codes to read algorithm and Quick Response Code is switched into final bit stream string;The information read before final first full stop of bit stream string is public information, between privacy information designator and second full stop for encrypted privacy information;The correct key inputted in real time during using preset or barcode scanning, is decrypted encrypted privacy information, obtains privacy information.The present invention realizes the access control for different information, can effectively protect the privacy of the sensitive information of carrying.
Description
Technical field
The present invention relates to QR planar bar code technologies, and in particular to a kind of QR Quick Response Codes generation and the method read.
Background technology
QR (Quick Response, quick response) Quick Response Code, is that information is stored in image by one kind, then is changed by image
For the information coding and decoding technology of information.Since QR Quick Response Codes are only the carrier of information, for the privacy and correctness of information
There is no any guarantee, display is all carried into information when scanning QR Quick Response Codes;However, in practical applications, frequently encountering needs
The scene of access control is done to all or part of information carried in Quick Response Code, such as following scene:
(1) barcode scanning is paid;
Current barcode scanning is paid, and the account information of payee is the example by being determined after providing the bank serviced or company numbering
Such as:Some gathering code that wechat is paid is identified as after the processing of QR Quick Response Codes decoding algorithm:wxp://
f2f05gxXLsbYnCGT0dTRktXzpfphxBPU6ZAU;Alipay some gathering code it is decoded after, be identified as:
HTTPS://QR.ALIPAY.COM/FKX043cOCVC56NwVWQ6UF6;Although enterprise can be compiled using privately owned rule
Code, to protect the account information of payee, still, decoding every time is required for the server of enterprise to participate in parsing, once enterprise
Coding rule is disclosed, then all similar Quick Response Codes all no longer have data-privacy;As it can be seen that to payee, requestee, gold
The classification of the information such as volume, time accesses control, and not only on the server of enterprise, could realize that information blinds coding
And decoding.
(2) equipment management;
At present, many large scale equipments are all printed on Quick Response Code, have recorded the information such as unit type, date of manufacture;Although two
Dimension code brings managerial convenience, but unit type is exposed to owner, and these facility informations should not be utilized to tracking,
Personal behavior is linked, encroaches on privacy, it should there are appropriate access control mechanisms.
(3) express delivery menu manager;
Quick Response Code on express delivery list, have recorded the relevant information of express delivery;But if not accessing control to carrying information,
Privacy of user will cover all at one glance, and still, if encrypted to full detail, express delivery article can not be supervised in itself,
Ground connection violates《People's Republic of China's anti-terrorism method》In requirement on express delivery system of real name, it is seen then that Quick Response Code needs
A part of information is disclosed, this partial information cannot be used for tracking individual privacy, and the information for being related to individual privacy should have suitable
When access control mechanisms.
(4) train ticket information management;
There are the information such as user identity card number in train ticket Quick Response Code before 2012, thereafter, to the user on train ticket
Identification card number has carried out encryption, can not see direct information on current train ticket, still, rider can not yet
Confirmed by Quick Response Code train number of oneself etc. should disclosed information, if pair doing access control with personal relevant information,
Rider can confirm information disclosed in train number of oneself etc. by Quick Response Code.
(5) the account book data query based on block chain;
The essence of block chain is the data processing of the distributed account book and foundation of a safety on it;Can using Quick Response Code
So that the data that user stores on quick search block chain whenever and wherever possible, exemplified by concrete application can trace to the source for food is false proof, show
So, the information such as food variety, date of manufacture, weight needs disclosure, however, the specific information that the producer is preset, sells Ru specific
Business, anti-counterfeiting information etc., then should keep secret, otherwise easily be forged;As it can be seen that the information carried at this time on Quick Response Code needs
Appropriate access control mechanisms.
In conclusion be improved there is an urgent need for one kind to existing QR Quick Response Codes, realize to all or part of information of carrying into
Row access control, to solve the problems, such as that existing QR Quick Response Codes do not have any guarantee to the privacy and correctness of information, prevents hidden
Private information leakage.
The content of the invention
The technical problems to be solved by the invention are that existing QR Quick Response Codes can not realize all or part of information to carrying
The problem of access control, and the privacy and correctness to information do not have any guarantee, cause leakage of private information.
In order to solve the above-mentioned technical problem, the technical solution adopted in the present invention is to provide a kind of QR Quick Response Codes generation and reads
The method taken, comprises the following steps:
Generated for QR Quick Response Codes:
Step S10, information to be encoded is divided into public information and privacy information according to privacy classes;
Step S20, privacy information is encrypted using Encryption Algorithm, and the encrypted privacy information and public affairs that will be obtained
Open information and carry out bit stream conversion, the bit stream string of privacy information and the bit stream string of public information are respectively obtained, according to public information
Bit stream string, full stop, privacy information designator, bit stream string and the full stop of privacy information be linked in sequence into final bit stream string;
Step S30, QR code generating algorithms are called, coding generation QR image in 2 D code is carried out to final bit stream string;
Read for QR Quick Response Codes:
Step S40, barcode scanning equipment calls QR codes read algorithm, and Quick Response Code is converted into final bit stream string;
Step S50, final bit stream string is read, the information before running into first full stop is public information;Privacy information
Information between designator and second full stop is encrypted privacy information;
The correct key inputted in real time when step S60, using preset or barcode scanning, is decrypted encrypted privacy information,
Obtain privacy information.
In the above-mentioned methods, the privacy information designator is after designator of resuming studies, and is defined as " READCONTINUE " word
Symbol string;
In the above-mentioned methods, full stop is defined according to QR codes standard, wherein, QR codes standard is ISO/IEC18004 standards.
In the above-mentioned methods,
When public information is not present, the bit stream string of public information is empty string, adds full stop behind;Barcode scanning reads letter
During breath, correspondingly, public information part is null character string;
When privacy information is not present, privacy indicator is not added, when barcode scanning reads information, correspondingly, reading full stop
Afterwards, if continuing to read without privacy indicator, stopping below;Alternatively, when privacy information is not present, privacy indicator is added,
The bit stream string of encrypted privacy information is sky, and full stop is added after the bit stream string of encrypted privacy information, and barcode scanning reads information
When, correspondingly, reading the bit stream string of the encrypted privacy information after privacy indicator, until reading full stop, decryption is encrypted
The bit stream string of privacy information, if decrypted result is empty string or mess code, final privacy information part is recorded as null character string.
In the above-mentioned methods, step S20 specifically includes following steps:
Step S21, bit stream is carried out to public information to convert to obtain the bit stream string of public information, and in the disclosure information
Full stop is added after bit stream string;
Step S22, judge whether the information to be encoded carries privacy information, if so, performing step S23;Otherwise, perform
Step S27, by the bit stream string of the public information with full stop bit stream string the most final;
Step S23, information pattern is added after the full stop of the bit stream string of public information and judges that type privacy information indicates
Symbol;
Step S24, QR Quick Response Codes generation equipment is encrypted privacy information using Encryption Algorithm;
Step S25, bit stream is carried out to encrypted privacy information to convert to obtain the bit stream string of privacy information, and in the privacy
Full stop is added after bit stream string;
Step S26, the bit stream string of the privacy information with full stop is added to privacy information designator
After READCONTINUE, final bit stream string is obtained;
Step S27, terminate.
In the above-mentioned methods, step S50 specifically includes following steps:
Step S51, start to be successively read final bit stream string;
Step S52, judge whether to read first full stop, if not provided, performing step S51;Otherwise, step is performed
S53;
Step S53, the information read before first full stop is stored in public information memory space;
Whether the character late for step S54, judging first full stop is privacy information designator, if so, performing
Step S55;Otherwise, terminate;
Step S55, it is successively read the bit stream string after privacy information designator;
Step S56, whether interpretation reads second full stop, if not provided, performing step S55;Otherwise, step is performed
S57;
Step S57, privacy information memory space is stored in after the information that will be read before second full stop, is encrypted
Privacy information afterwards, then terminates the reading of bit stream string.
QR Quick Response Codes are needed the information that carries to be effectively separated according to degree of privacy by the present invention, then by public information and
Encrypted privacy information utilizes standard QR encryption algorithm generation QR Quick Response Codes;Calculated since the QR Quick Response Codes are based on standard QR coding
Method generates, therefore the form of the QR Quick Response Codes and common Q R two-dimensional code decoders are compatible, and common Q R two-dimensional code decoders can be read
Public information part is taken, as long as the common customer that is, with QR two-dimensional code decoders can read QR Quick Response Codes first " eventually
Public information before only symbol ", but privacy information can not be read;After barcode scanning equipment inputs correct decruption key, the barcode scanning equipment
Privacy information can be just read, it is achieved thereby that for the access control function of different information, ensures that QR Quick Response Codes carry hidden
The safety of personal letter breath, avoids leakage of private information.
Brief description of the drawings
Fig. 1 provides the flow chart the present invention provides a kind of generation of QR Quick Response Codes and the method read for the present invention;
Fig. 2 is the structure diagram of final bit stream string in the present invention;
Fig. 3 is the QR Quick Response Codes generated by the present invention;
Fig. 4 is the particular flow sheet of step S20 in the present invention;
Fig. 5 is the bit stream string structure schematic diagram of existing QR Quick Response Codes;
Fig. 6 is the particular flow sheet of step S50 in the present invention.
Embodiment
The information of QR Quick Response Codes is divided into public information and privacy information two parts by the present invention, then privacy information is added
Close processing, is not only effectively protected the privacy of the sensitive information carried in QR Quick Response Codes;It can also according to using need
Will, being disclosed after barcode scanning to barcode scanning person is necessary disclosed information.
The present invention is described in detail with reference to Figure of description and specific embodiment.
As shown in Figure 1, the present invention provides a kind of generation of QR Quick Response Codes and the method read, comprise the following steps:
Generated for QR Quick Response Codes:
Step S10, information to be encoded is divided into public information and privacy information according to privacy classes.
Step S20, first privacy information is encrypted using Encryption Algorithm, then by obtained encrypted privacy information and
Public information carries out bit stream conversion, respectively obtains the bit stream string of privacy information and the bit stream string of public information, such first right
Privacy information is encrypted, then carries out the mode of error correcting code coding, once QR Quick Response Codes are damaged or contaminated, encrypted privacy information
Also correct cipher-text information can be recovered, so as to recover privacy information because of the effect of error correcting code;If first privacy information is carried out
Error correcting code encodes, then is encrypted,, can not be extensive due to lacking corresponding ciphertext bit once QR Quick Response Codes are damaged or contaminated
The bit stream string appeared again before encoding, so that privacy information can not be recovered;Finally (pressed according to bit stream string, the full stop of public information
According to QR codes standard define, be shown in Table 1), bit stream string and the full stop of privacy information designator, privacy information be linked in sequence into most final position
Stream string (as shown in Figure 2);Wherein, privacy information designator is after designator of resuming studies, and is defined as " READCONTINUE " character string.
The input coding pattern and respective indicator of table 1, ISO/IEC18004 standards (QR codes standard).
Step S30, QR code generating algorithms are called, coding generation QR image in 2 D code is carried out to final bit stream string (such as Fig. 3 institutes
Show).
Read for QR Quick Response Codes:
When step S40, reading Quick Response Code, barcode scanning equipment calls QR codes read algorithm, and Quick Response Code is converted into final bit stream
String.
Step S50, final bit stream string is read, the information before running into first full stop is public information;Privacy information
Information between designator and second full stop is encrypted privacy information.
Step S60, the correct decruption key that inputs in real time when the decoder module of scanning device is using preset or barcode scanning, it is right
Encrypted privacy information is decrypted, and obtains privacy information, otherwise, can not read privacy information;It is in this way, only authorized
The barcode scanning equipment of (having correct key) could read privacy information, and with no authorized can only read public information, therefore, only need appropriate
The key of kind keeping Encryption Algorithm, even if Encryption Algorithm is known, also can guarantee that the security of privacy information;In addition, at this
In invention, different Q R Quick Response Codes generation equipment can use identical Encryption Algorithm encryption privacy information, as long as the key of decryption is not
Together, the barcode scanning equipment that mutual privacy information can not just be authorized by other side is read, different Quick Response Code generation equipment generations
The privacy information that Quick Response Code each carries is exactly safe, and corresponding decruption key only is sent to needs or allows to read hidden
The equipment of personal letter breath could read the privacy information, and for the description of Encryption Algorithm, the length of key is shorter, thus
Protection key is easier than protection enciphering and deciphering algorithm, and flexibility is also more preferable.
QR Quick Response Codes are needed the information that carries to be effectively separated according to degree of privacy by the present invention, then by public information and
Encrypted privacy information utilizes standard QR encryption algorithm generation QR Quick Response Codes;Calculated since the QR Quick Response Codes are based on standard QR coding
Method generates, therefore the form of the QR Quick Response Codes and common Q R two-dimensional code decoders are compatible, and common Q R two-dimensional code decoders can be read
Public information part is taken, as long as the common customer that is, with QR two-dimensional code decoders can read QR Quick Response Codes first " eventually
Public information before only symbol ", but can not go to read privacy information;After barcode scanning equipment is authorized to, i.e., generated with QR Quick Response Codes
The correct key for the Encryption Algorithm that equipment uses, which can just read privacy information, it is achieved thereby that for difference
The access control function of information, ensures the safety for the privacy information that QR Quick Response Codes carry, avoids leakage of private information;For example, will
Ticket information is divided into public information:Date, train number, seat number, privacy information are:Name, identification card number, in ticketing spot, due to
The scanning device of ticketing spot is authorized to, and with correct key, when scanning the QR Quick Response Codes of ticket, can both solve public information,
Privacy information can also be solved;And after ticket abandoned or loss, when being scanned by other people, due to no authorized, Zhi Nengxian
Show public information, so ensure that the safety of Customer information in Quick Response Code.
In the present invention, when public information is not present, the bit stream string of public information is empty string, and addition behind terminates
Symbol;When barcode scanning reads information, correspondingly, public information part is null character string.
When privacy information is not present, privacy indicator is not added;When barcode scanning reads information, correspondingly, reading full stop
Afterwards, if continuing to read without privacy indicator, stopping below;Or when privacy information is not present, privacy indicator is added, is added
The bit stream string of close privacy information is sky, and full stop is added after the bit stream string of encrypted privacy information, when barcode scanning reads information,
Correspondingly, reading the bit stream string of the encrypted privacy information after privacy indicator, until reading full stop, encrypted privacy is decrypted
Bit stream string, decrypted result are empty string or mess code, and final privacy information part is recorded as null character string.
In the present invention, as shown in figure 4, step S20 specifically includes following steps:
Step S21, bit stream is carried out to public information to convert to obtain the bit stream string of public information, and in the disclosure information
Full stop is added after bit stream string.
Step S22, judge whether the information to be encoded carries privacy information, if so, performing step S23;Otherwise, perform
Step S27, by the bit stream string of the public information with full stop bit stream string the most final.
Step S23, information pattern is added after the full stop of the bit stream string of public information and judges that type privacy information indicates
Symbol is (i.e. after the designator READCONTINUE that resumes studies).
Step S24, QR Quick Response Codes generation equipment is encrypted privacy information using Encryption Algorithm, which can be with
It is that QR Quick Response Codes generate the exclusive encryption method of equipment oneself or existing encryption method, such as:
(1) symmetric cryptography:
If Encryption Algorithm is aes algorithm, key is " 1234567890123456 ", it is necessary to which encrypted privacy information is
" 1234567890 ", then encrypted privacy information is (hexadecimal representation):
" 40ef3577b51ea84589637e77d75a39cd ", QR two dimensions decoding apparatus only generate device authorization in QR Quick Response Codes, obtain
Encrypted privacy information could be decrypted after to key " 1234567890123456 ".
(2) asymmetric encryption:
If it is " 1234567890 " to need encrypted privacy information, Encryption Algorithm RSA, public key is:
-----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCFk/azlnJ0k/
ycCMH3OgCyOhVCRwA2Fryve2pqJSMXqdWBYkHl4snL38vfu9kqJGsQbnMs+YHcnHnj+
1X4g2wLKZWhzsA11LU9VTrCpOEJOsp6EXWaeSflHeWJZRcQhEjD3u9ra/
ISZozfmQCW06b7IX3qzg4i3nd2k7qykd1SAQIDAQAB
-----END PUBLIC KEY-----
Private key is:
-----BEGIN RSA PRIVATE KEY-----
MIICXAIBAAKBgQCFk/azlnJ0k/ycCMH3OgCyOhVCRwA2Fryve2pqJSMXqdWBYkHl4snL3
8vfu9kqJGsQbnMs+YHcnHnj+1X4g2wLKZWhzsA11LU9VTrCpOEJOsp6EXWaeSflHeWJZRcQhEjD3u
9ra/ISZozfmQCW06b7IX3qzg4i3nd2k7qykd1SAQIDAQABAoGAe1ifdUQWmonQuLDpk4ZvACTcXqA
7lLa4M37OTAfQ+Nft/JSj70jVOLqGgynuJZkNeFXVaxFXFkUz1Q7QWzPYPrTshZnseZG7zTeObWHI
YN1tH9rKwnCe0lw9OIDm2I5rnpEvDFuZ6rVvxCBU+mUAX4s+yrOYADMccbX7lxM03tUCQQDlrCBy7
DlAQLW1iTMnDnSOGRKis0SLNcPaxfTdbZXZq/bCNS6/NnzwRxW97v4KcFr0K5Y/
MDlvS7KWutHoFb2XAkEAlOPjvBcueXPAasvWwLl2lfw37GcEWjVpXsYZegW3k4Kzahu1FcjnSjEWc
YHqGWtU9g+U+njcf270cY/V+WwQJwJAaz5moIMhcJlGwA/irNgZIMkgZIyk8wQWAi/
xWPv0vwGHZcQDohHFYUUwJ9JTGXjBX8aCj9rq1sdYCv4NSfvs3QJAfeWVE96mNZxi/+sM1Dn+
xCRZRVR2obC4QKNRt5RN/jVucDKtlJYkvN91EtW/lW7kkIvsdT7tc/
PmToBJdnah0QJBANr8EYHxYfTr1zLP11P/oPNQ5zfrfq3aMQRhT8KaUD4Bwp6rlUenHIPKlLPt92y
LVtGA09XJjba5AzFGpwJ3jGU=
-----END RSA PRIVATE KEY-----
Encrypted privacy information is:
QRZkMj/J6cZEfQjUQ/d28adKXyg3qsFxJffmcWF7guGo4sIU0NUaBYepF68EnI7aoPQTD
dqcCw2awz/9/yjFpv08UyoR5d05CP4Bh+V+EkEnQDJ7XTl0Zt1/t9JOGJrfE1hnV9YJFQ25i+6jq+
PSb3JRmqZEi/wj0CO/ZrXuwbg=
For brevity, it is above Base64 codings;Principle is same as above, QR two dimensions decoding apparatus only be authorized to obtain it is close
After key, encrypted privacy information could be decrypted;Difference is that the public key of asymmetric encryption is different with private key, only needs profit
It is encrypted with the public key of other side's encryption method, you can realize and privacy information is sent by QR Quick Response Codes;If scan reading
Privacy information on the QR Quick Response Codes of opposite end generation, then need opposite end to provide correct decrypted private key, could decrypt encrypted hidden
Personal letter ceases.The These characteristics of asymmetric encryption are used using the present invention, real name report can be carried out using the present invention, will be reported
Event as public information, then the personal information such as the name of informer, address, phone utilizes report as privacy information
After the public key of platform encryption method encrypts privacy information, generation carries public information and encrypts the QR Quick Response Codes of privacy information,
So general public can read the event of report by scanning QR Quick Response Codes, but can not know informer, but report platform
The personal information of informer can be read using the private key of its encryption method, avoids informer's information from leaking outside, informer can be protected
Safety.
Step S25, bit stream is carried out to encrypted privacy information to convert to obtain the bit stream string of privacy information, and in the privacy
Full stop is added after bit stream string.
Step S26, the bit stream string of the privacy information with full stop is added to privacy information designator
After READCONTINUE, final bit stream string is obtained, compared with the bit stream string (such as Fig. 5) of existing QR Quick Response Codes, QR two dimensions of the present invention
The final bit stream string (as shown in Figure 2) of code further includes privacy information designator and encrypted privacy information part, is so reading
, can also be according to the legitimacy of scanning person (whether the correspondence decipherment algorithm with encrypted privacy information) display to after public information
Private Parts.
Step S27, terminate.
In the present invention, as shown in fig. 6, step S50 specifically includes following steps:
Step S51, start to be successively read final bit stream string.
Step S52, judge whether to read first full stop, if not provided, performing step S51;Otherwise, step is performed
S53。
Step S53, the information read before first full stop is stored in public information memory space.
Whether the character late for step S54, judging first full stop is privacy information designator, if so, performing
Step S55;Otherwise, terminate.
Step S55, it is successively read the bit stream string after privacy information designator.
Step S56, whether interpretation reads second full stop, if not provided, performing step S55, continues to read bit stream
String;Otherwise, step S57 is performed.
Step S57, privacy information memory space is stored in after the information that will be read before second full stop, is encrypted
Privacy information afterwards, then terminates the reading of bit stream string.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these modification and variations.
Claims (6)
1. a kind of QR Quick Response Codes generation and the method read, it is characterised in that comprise the following steps:
Generated for QR Quick Response Codes:
Step S10, information to be encoded is divided into public information and privacy information according to privacy classes;
Step S20, privacy information is encrypted using Encryption Algorithm, and the encrypted privacy information and open letter that will be obtained
Breath carries out bit stream conversion, the bit stream string of privacy information and the bit stream string of public information is respectively obtained, according to the position of public information
Stream string, full stop, privacy information designator, bit stream string and the full stop of privacy information are linked in sequence into final bit stream string;
Step S30, QR code generating algorithms are called, coding generation QR image in 2 D code is carried out to final bit stream string;
Read for QR Quick Response Codes:
Step S40, barcode scanning equipment calls QR codes read algorithm, and Quick Response Code is converted into final bit stream string;
Step S50, final bit stream string is read, the information before running into first full stop is public information;Privacy information indicates
Information between symbol and second full stop is encrypted privacy information;
The correct key inputted in real time when step S60, using preset or barcode scanning, is decrypted encrypted privacy information, obtains
Privacy information.
It is 2. fixed according to the method described in claim 1, it is characterized in that, the privacy information designator is after designator of resuming studies
Justice is " READCONTINUE " character string.
3. method according to claim 1 or 2, it is characterised in that full stop is defined according to QR codes standard, wherein, QR codes
Standard is ISO/IEC18004 standards.
4. according to the method described in claim 3, it is characterized in that,
When public information is not present, the bit stream string of public information is empty string, adds full stop behind;Barcode scanning reads information
When, correspondingly, public information part is null character string;
When privacy information is not present, privacy indicator is not added, when barcode scanning reads information, correspondingly, after reading full stop, such as
Continue to read without privacy indicator, stopping behind fruit;Alternatively, when privacy information is not present, privacy indicator is added, it is encrypted
The bit stream string of privacy information is sky, full stop is added after the bit stream string of encrypted privacy information, when barcode scanning reads information, accordingly
, the bit stream string of the encrypted privacy information after privacy indicator is read, until reading full stop, decrypts encrypted privacy information
Bit stream string, if decrypted result is empty string or mess code, final privacy information part is recorded as null character string.
5. according to the method described in claim 4, it is characterized in that, step S20 specifically includes following steps:
Step S21, bit stream is carried out to public information to convert to obtain the bit stream string of public information, and in the disclosure bit stream
Full stop is added after string;
Step S22, judge whether the information to be encoded carries privacy information, if so, performing step S23;Otherwise, step is performed
S27, by the bit stream string of the public information with full stop bit stream string the most final;
Step S23, information pattern is added after the full stop of the bit stream string of public information and judges type privacy information designator;
Step S24, QR Quick Response Codes generation equipment is encrypted privacy information using Encryption Algorithm;
Step S25, bit stream is carried out to encrypted privacy information to convert to obtain the bit stream string of privacy information, and in the privacy information
Bit stream string after add full stop;
Step S26, after the bit stream string of the privacy information with full stop being added to privacy information designator READCONTINUE,
Obtain final bit stream string;
Step S27, terminate.
6. according to the method described in claim 5, it is characterized in that, step S50 specifically includes following steps:
Step S51, start to be successively read final bit stream string;
Step S52, judge whether to read first full stop, if not provided, performing step S51;Otherwise, step S53 is performed;
Step S53, the information read before first full stop is stored in public information memory space;
Whether the character late for step S54, judging first full stop is privacy information designator, if so, performing step
S55;Otherwise, terminate;
Step S55, it is successively read the bit stream string after privacy information designator;
Step S56, whether interpretation reads second full stop, if not provided, performing step S55;Otherwise, step S57 is performed;
Step S57, privacy information memory space is stored in after the information that will be read before second full stop, is obtained encrypted
Privacy information, then terminates the reading of bit stream string.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711405586.XA CN107992923A (en) | 2017-12-22 | 2017-12-22 | A kind of QR Quick Response Codes generation and the method read |
GBGB1721870.2A GB201721870D0 (en) | 2017-12-22 | 2017-12-27 | The method of generating and reading QR two dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711405586.XA CN107992923A (en) | 2017-12-22 | 2017-12-22 | A kind of QR Quick Response Codes generation and the method read |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107992923A true CN107992923A (en) | 2018-05-04 |
Family
ID=61131753
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711405586.XA Pending CN107992923A (en) | 2017-12-22 | 2017-12-22 | A kind of QR Quick Response Codes generation and the method read |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107992923A (en) |
GB (1) | GB201721870D0 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108985759A (en) * | 2018-06-15 | 2018-12-11 | 杭州复杂美科技有限公司 | A kind of address generating method and system, equipment and storage medium encrypting currency |
CN109150513A (en) * | 2018-08-27 | 2019-01-04 | 深圳前海益链网络科技有限公司 | Private key storage method, computer equipment and storage medium based on block chain |
CN110213251A (en) * | 2019-05-22 | 2019-09-06 | 杭州复杂美科技有限公司 | It reports an offender anonymously and rewards distribution method and get method, equipment and storage medium |
CN110544091A (en) * | 2018-05-29 | 2019-12-06 | 北京意锐新创科技有限公司 | Payment method and device for supporting financial grade |
CN110544083A (en) * | 2018-05-29 | 2019-12-06 | 北京意锐新创科技有限公司 | two-dimensional code display method and device based on mobile payment equipment |
CN110544085A (en) * | 2018-05-29 | 2019-12-06 | 北京意锐新创科技有限公司 | Voice-based payment method and device |
CN110991591A (en) * | 2020-03-03 | 2020-04-10 | 支付宝(杭州)信息技术有限公司 | Two-dimensional code encoding and decoding method and device, encoding equipment and decoding equipment |
CN111126516A (en) * | 2018-10-31 | 2020-05-08 | 东莞市芯天下智能化设备有限公司 | Intelligent sole identification production process |
CN114254719A (en) * | 2021-12-17 | 2022-03-29 | 广州市宝绅科技应用有限公司 | Novel anti-counterfeiting two-dimensional code generation method and device |
US20220173893A1 (en) * | 2017-10-24 | 2022-06-02 | 0Chain Corp. | Non-fungible token blockchain processing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400173A (en) * | 2013-07-25 | 2013-11-20 | 中国科学院信息工程研究所 | Generating method and reading method of two-dimensional code containing private information |
CN104268610A (en) * | 2014-09-11 | 2015-01-07 | 重庆大学 | Method for generating and reading graded QR code |
CN104281866A (en) * | 2013-07-09 | 2015-01-14 | 航天信息股份有限公司 | Two-dimensional code application method and device |
CN105825257A (en) * | 2016-03-09 | 2016-08-03 | 东北大学 | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof |
CN107358284A (en) * | 2017-07-11 | 2017-11-17 | 北京捷润科技有限公司 | Generation method, read method, generating means and the reading device of Quick Response Code |
-
2017
- 2017-12-22 CN CN201711405586.XA patent/CN107992923A/en active Pending
- 2017-12-27 GB GBGB1721870.2A patent/GB201721870D0/en not_active Ceased
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104281866A (en) * | 2013-07-09 | 2015-01-14 | 航天信息股份有限公司 | Two-dimensional code application method and device |
CN103400173A (en) * | 2013-07-25 | 2013-11-20 | 中国科学院信息工程研究所 | Generating method and reading method of two-dimensional code containing private information |
CN104268610A (en) * | 2014-09-11 | 2015-01-07 | 重庆大学 | Method for generating and reading graded QR code |
CN105825257A (en) * | 2016-03-09 | 2016-08-03 | 东北大学 | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof |
CN107358284A (en) * | 2017-07-11 | 2017-11-17 | 北京捷润科技有限公司 | Generation method, read method, generating means and the reading device of Quick Response Code |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220173893A1 (en) * | 2017-10-24 | 2022-06-02 | 0Chain Corp. | Non-fungible token blockchain processing |
US11979490B2 (en) * | 2017-10-24 | 2024-05-07 | 0Chain Corp. | Non-fungible token blockchain processing |
CN110544091A (en) * | 2018-05-29 | 2019-12-06 | 北京意锐新创科技有限公司 | Payment method and device for supporting financial grade |
CN110544083A (en) * | 2018-05-29 | 2019-12-06 | 北京意锐新创科技有限公司 | two-dimensional code display method and device based on mobile payment equipment |
CN110544085A (en) * | 2018-05-29 | 2019-12-06 | 北京意锐新创科技有限公司 | Voice-based payment method and device |
CN108985759A (en) * | 2018-06-15 | 2018-12-11 | 杭州复杂美科技有限公司 | A kind of address generating method and system, equipment and storage medium encrypting currency |
CN108985759B (en) * | 2018-06-15 | 2020-10-23 | 杭州复杂美科技有限公司 | Address generating method, system, equipment and storage medium for cryptocurrency |
CN109150513A (en) * | 2018-08-27 | 2019-01-04 | 深圳前海益链网络科技有限公司 | Private key storage method, computer equipment and storage medium based on block chain |
CN111126516A (en) * | 2018-10-31 | 2020-05-08 | 东莞市芯天下智能化设备有限公司 | Intelligent sole identification production process |
CN110213251A (en) * | 2019-05-22 | 2019-09-06 | 杭州复杂美科技有限公司 | It reports an offender anonymously and rewards distribution method and get method, equipment and storage medium |
CN110991591A (en) * | 2020-03-03 | 2020-04-10 | 支付宝(杭州)信息技术有限公司 | Two-dimensional code encoding and decoding method and device, encoding equipment and decoding equipment |
CN114254719B (en) * | 2021-12-17 | 2022-11-22 | 广州市宝绅科技应用有限公司 | Anti-counterfeiting two-dimensional code generation method and device |
CN114254719A (en) * | 2021-12-17 | 2022-03-29 | 广州市宝绅科技应用有限公司 | Novel anti-counterfeiting two-dimensional code generation method and device |
Also Published As
Publication number | Publication date |
---|---|
GB201721870D0 (en) | 2018-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107992923A (en) | A kind of QR Quick Response Codes generation and the method read | |
CN101897165B (en) | Method of authentication of users in data processing systems | |
CN105719120B (en) | A method of encryption express delivery list privacy information | |
CN105825257B (en) | Information hiding and hiding information extracting method and system based on two-dimensional bar code | |
CN103198344B (en) | Tax control secure two-dimensional code coding, decoding processing method | |
JP6489464B2 (en) | Optical code, information transmission method, and authentication method | |
Purnomo et al. | Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure | |
CN105976005A (en) | Two-dimensional code encrypting method, two-dimensional code generating device and two-dimensional code scanning device | |
US20160132871A1 (en) | Secure redemption code generation for gift cards and promotions | |
US10552618B2 (en) | Method and apparatus for transmission of visually encoded data | |
EP2910042B1 (en) | Secure information transfer via bar codes | |
CN105577376A (en) | Two-dimensional code coding-and-decoding and authentication method and two-dimensional code coding-and-decoding and authentication device | |
CN109617703B (en) | Key management method and device, electronic equipment and storage medium | |
EP3921774A1 (en) | Content encryption and in-place decryption using visually encoded cyphertext | |
KR101242684B1 (en) | User certification system and method for 2 dimensional barcode | |
CN108268921A (en) | Quick Response Code generates and coding/decoding method, device, transaction system and storage medium | |
CN111625802B (en) | Projector authorization using method under condition of projector connectionless internet | |
Gaikwad et al. | Advanced security in 2LQR code generation and document authentication | |
KR101226319B1 (en) | Identification Authentication method and System therefor | |
El-Taj et al. | CryptoQR System based on RSA | |
Moretto | Secure 2D barcodes based on visual cryptography | |
US20230351923A1 (en) | Content encryption and in-place decryption using visually encoded ciphertext | |
Husny et al. | Encrypted QR code system | |
Kim et al. | Design of an efficient image protection method based on QR code | |
Ouk et al. | Mobile App security for E-Commerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |
|
RJ01 | Rejection of invention patent application after publication |