[go: up one dir, main page]

CN102073977A - Methods and equipment for generating and authenticating digital signatures and digital signature system - Google Patents

Methods and equipment for generating and authenticating digital signatures and digital signature system Download PDF

Info

Publication number
CN102073977A
CN102073977A CN 201010586845 CN201010586845A CN102073977A CN 102073977 A CN102073977 A CN 102073977A CN 201010586845 CN201010586845 CN 201010586845 CN 201010586845 A CN201010586845 A CN 201010586845A CN 102073977 A CN102073977 A CN 102073977A
Authority
CN
China
Prior art keywords
text
character string
dimensional code
digital signature
generate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201010586845
Other languages
Chinese (zh)
Inventor
贾宝军
郭强
郝芸霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN 201010586845 priority Critical patent/CN102073977A/en
Publication of CN102073977A publication Critical patent/CN102073977A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明提供一种数字签名的生成和验证的方法、设备及系统。该方法包括将正文特征信息和环境数据进行加密和/或编码,生成字符串;对所述字符串采用二维码进行编码,生成二维码图片;将所述二维码图片作为数字签名,与待发送的正文一起发送;将接收到的二维码图片进行扫描还原成字符串;将所述字符串进行解密,得到环境数据和正文特征信息;根据所述正文特征信息核对接收到的正文。本发明可以实现比字符串作为数字签名更有效的签名效果。

Figure 201010586845

The invention provides a method, device and system for generating and verifying digital signatures. The method includes encrypting and/or encoding text feature information and environmental data to generate a character string; encoding the character string with a two-dimensional code to generate a two-dimensional code picture; using the two-dimensional code picture as a digital signature, Send it together with the text to be sent; scan the received QR code picture and restore it to a string; decrypt the string to obtain environmental data and text feature information; check the received text according to the text feature information . The invention can realize more effective signature effects than character strings used as digital signatures.

Figure 201010586845

Description

The generation of digital signature and verification method, equipment and system
Technical field
The present invention relates to the communication technology, relate in particular to a kind of generation and verification method, equipment and system of digital signature.
Background technology
Digital signature be by an one-way function to the message that will transmit handle obtain in order to message identifying source and examine the number of characters word string whether message changes.
Problems such as digital signature can solve and deny, forges, distorts and pretend to be, specific requirement: message signature, the recipient that the sender can not deny sending afterwards can examine that message signature that the sender sends, message signature, recipient that the recipient can not forge the sender can not carry out that part is distorted to sender's message, a certain user in the network can not pretend to be another user as sender or recipient.
In realizing process of the present invention, the inventor finds that there are the following problems at least in the prior art: adopt character string as digital signature in the prior art usually, effect is outstanding inadequately.
Summary of the invention
The embodiment of the invention provides a kind of generation and verification method, equipment and system of digital signature, in order to solve the problem that causes as digital signature with character string in the prior art, realizes that the digital signature effect is more outstanding.
On the one hand, the embodiment of the invention provides a kind of generation method of digital signature, comprising:
Text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Adopt two-dimension code to encode to described character string, generate two-dimension code image;
Described two-dimension code image as digital signature, is sent with text to be sent.
On the other hand, the embodiment of the invention provides a kind of verification method of digital signature, comprising:
The two-dimension code image that receives scanned be reduced into character string;
Described character string is decrypted, obtains environmental data and text characteristic information;
Check the text that receives according to described text characteristic information.
On the one hand, the embodiment of the invention provides a kind of generation equipment of digital signature, comprising:
The information encryption module is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string;
Two-dimensional code generation module is used for adopting two-dimension code to encode to described character string, generates two-dimension code image;
Sending module is used for described two-dimension code image sending with text to be sent as digital signature.
On the other hand, the embodiment of the invention provides a kind of Authentication devices of digital signature, comprising:
Two-dimension code scan module, the two-dimension code image that is used for receiving scan and are reduced into character string;
The decrypts information module is used for described character string is decrypted, and obtains environmental data and text characteristic information;
The text authentication module is used for checking the text that receives according to described text characteristic information.
The embodiment of the invention provides the system of digital signature, comprising: the generation equipment of above-mentioned digital signature and the Authentication devices of digital signature.
As shown from the above technical solution, the generation of the digital signature of the embodiment of the invention and verification method, equipment and system, by with two-dimension code as digital signature, because picture has the visual sense feeling more formal than character string, so the effect that adopts two-dimension code more can push oneself to the front and sign as digital signature.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the accompanying drawing of required use is done an introduction simply in will describing embodiment below, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the generation method flow synoptic diagram of first embodiment of the invention;
Fig. 2 is the verification method schematic flow sheet of second embodiment of the invention;
Fig. 3 is the generation device structure synoptic diagram of third embodiment of the invention;
Fig. 4 is the Authentication devices structural representation of fourth embodiment of the invention;
Fig. 5 is the system architecture synoptic diagram of fifth embodiment of the invention;
Fig. 6 is the method flow synoptic diagram of sixth embodiment of the invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Fig. 1 is the generation method flow synoptic diagram of first embodiment of the invention, comprising:
Step 11: text characteristic information and environmental data are encrypted and/or encoded, generate character string;
Wherein, the text characteristic information can obtain in the following way:
Text to be sent is encoded, generate described text characteristic information, the algorithm of described coding comprises hashing algorithm.
Environmental data comprises at least: the apparatus characteristic information of user name, transmitting time and the information of transmission;
Described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
Particularly, text characteristic and environmental data are encrypted and/or the algorithm of encoding can adopt rivest, shamir, adelman, also can be adopted the high symmetric encipherment algorithm of Cipher Strength.
Step 12: adopt two-dimension code to encode to described character string, generate two-dimension code image;
Wherein, the algorithm of two-dimension code coding can be PDF417, QRCode, Code49, code16K or CodeOne.
Step 13: described two-dimension code image as digital signature, is sent with text to be sent;
For example, can be with the annex of described two-dimension code image as mail, the perhaps signature of delivering as forum's speech sends after being attached to described text together.
This forum includes but not limited to: internet forum, news analysis, Web Community etc.
Further, present embodiment can also send user name with above-mentioned two-dimension code, text to be sent.Since expressly carry user name, can be so that the effect of digital signature be more outstanding.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 2 is the verification method schematic flow sheet of second embodiment of the invention, comprising:
Step 21: the two-dimension code image that receives scanned be reduced into character string;
For example, be reduced into character string after can adopting existing two-dimensional code reading equipment with the scanning of the two-dimension code image that receives.
Step 22: described character string is decrypted, obtains environmental data and text characteristic information;
Particularly, can decipher character string, obtain environmental data and text characteristic information by the key and the decipherment algorithm of making an appointment.
Described environmental data comprises at least: the apparatus characteristic information of user name, transmitting time, transmission information; Described apparatus characteristic information comprises at least one in following: the network interface card identification number of machine, IP address, machine name.
Step 23: check the text that receives according to described text characteristic information.
Particularly,,, environmental data expressly can be obtained, the evidence that send related data of this environmental data as transmit leg the denial of transmit leg can be avoided afterwards through deciphering to character string for environmental data.Perhaps, if comprise environmental data expressly in the data that send, the environmental data that the environmental data after then can relatively deciphering expressly carries, whether legal to check the source that sends data.For example,, then can compare the user name and this user name of expressly carrying that obtain after the deciphering, if both unanimities show that then the source of data of this reception is effectively legal if the data that transmit leg sends further comprise user name.For the text characteristic information, can be in the following way:
Adopt hashing algorithm to encode to the text that receives, generate the text characteristic information;
If the text characteristic information of described generation is identical with the text characteristic information that receives (i.e. the text characteristic information that obtains by the deciphering character string), then checked result is that text is effective.Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 3 is the generation device structure synoptic diagram of third embodiment of the invention, comprises information encryption module 31, two-dimensional code generation module 32 and sending module 33; Information encryption module 31 is used for text characteristic information and environmental data being encrypted and/or being encoded, and generates character string; Two-dimensional code generation module 32 is used for adopting two-dimension code to encode to described character string, generates two-dimension code image; Sending module 33 is used for described two-dimension code image sending with text to be sent as digital signature.
Further, present embodiment can also comprise text eigenwert generation module 34, and text eigenwert generation module 34 is used for text to be sent is encoded, and generates described text characteristic information, and the algorithm of described coding comprises hashing algorithm.
Particularly, described information encryption module 31 specifically is used for text characteristic information and environmental data are adopted rivest, shamir, adelman, perhaps adopts the high symmetric encipherment algorithm of Cipher Strength, encrypts and/or encodes, and generates character string; And/or described two-dimensional code generation module 32 specifically is used for described character string is adopted PDF417, QRCode, Code49, code16K or CodeOne algorithm, encodes, and generates two-dimension code image; And/or described sending module 33 specifically is used for the annex of described two-dimension code image as mail, and the perhaps signature of delivering as forum's speech sends after being attached to described text together.
Perhaps, the sending module of present embodiment can also specifically be used for user name with described two-dimension code image and described environmental data as digital signature, sends with text to be sent.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 4 is the Authentication devices structural representation of fourth embodiment of the invention, comprises two-dimension code scan module 41, decrypts information module 42 and text authentication module 43; The two-dimension code image that two-dimension code scan module 41 is used for receiving scans and is reduced into character string; Decrypts information module 42 is used for described character string is decrypted, and obtains environmental data and text characteristic information; Text authentication module 43 is used for checking the text that receives according to described text characteristic information.
Wherein, described decrypts information module 42 specifically is used to adopt key and corresponding decipherment algorithm that described character string is decrypted, and obtains environmental data and text characteristic information.
Obtain environmental data expressly after the described character string deciphering, the environmental data that described text authentication module 43 can be used for specifically that deciphering is obtained sends the evidence of related data as transmit leg, avoid the denial of transmit leg, perhaps, if transmit leg has carried user name simultaneously when sending data, the user name that obtains after the user name that also can expressly carry by comparison and the deciphering then, if both unanimities, then checked result for the source effectively.
Perhaps, present embodiment can also comprise text eigenwert generation module 44, and described text eigenwert generation module 44 is used for adopting hashing algorithm to encode to the text that receives, and generates the text characteristic information; If it is identical with the text characteristic information that receives that described text authentication module 43 specifically is used for the text characteristic information of described generation, then checked result is that text is effective.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Fig. 5 is the system architecture synoptic diagram of fifth embodiment of the invention, comprise the generation equipment 51 of digital signature and the Authentication devices 52 of digital signature, wherein, the generation equipment 51 of digital signature can be specifically as shown in Figure 3, and the Authentication devices 52 of digital signature can be specifically as shown in Figure 4.
Correspondingly, corresponding to this system, the method for execution as shown in Figure 6, Fig. 6 is the method flow synoptic diagram of sixth embodiment of the invention, comprising:
Step 61: the generation equipment of digital signature is encrypted text characteristic information and environmental data and/or is encoded, and generates character string;
Step 62: the generation equipment of digital signature adopts two-dimension code to encode to described character string, generates two-dimension code image;
Step 63: the generation equipment of digital signature as digital signature, sends described two-dimension code image with text to be sent;
Step 64: the Authentication devices of digital signature scans the two-dimension code image that receives and is reduced into character string;
Step 65: the Authentication devices of digital signature is decrypted described character string, obtains environmental data and text characteristic information;
Step 66: the Authentication devices of digital signature is checked the text that receives according to described text characteristic information.
The particular content of above steps can be referring to the various embodiments described above.
Present embodiment by with two-dimension code as digital signature, can realize than the more effective signature effect of character string, and can utilize existing two dimension code reading equipment, can simply and efficiently be applied in the occasion that can adopt two-dimension code.
Be understandable that the reference mutually of the correlated characteristic in said method and the equipment.In addition, " first " in the foregoing description, " second " etc. are to be used to distinguish each embodiment, and do not represent the quality of each embodiment.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of programmed instruction, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (19)

1.一种数字签名的生成方法,其特征在于,包括:1. A method for generating a digital signature, comprising: 将正文特征信息和环境数据进行加密和/或编码,生成字符串;Encrypt and/or encode text feature information and environment data to generate a character string; 对所述字符串采用二维码进行编码,生成二维码图片;Encoding the character string with a two-dimensional code to generate a two-dimensional code picture; 将所述二维码图片作为数字签名,与待发送的正文一起发送。The two-dimensional code picture is used as a digital signature and sent together with the text to be sent. 2.根据权利要求1所述的方法,其特征在于,还包括:2. The method according to claim 1, further comprising: 将待发送的正文进行编码,生成所述正文特征信息,所述编码的算法包括散列算法。The text to be sent is encoded to generate the text feature information, and the encoding algorithm includes a hash algorithm. 3.根据权利要求1所述的方法,其特征在于,所述环境数据至少包括:3. The method according to claim 1, wherein the environmental data at least includes: 用户名、发送时间及发送信息的设备特征信息。User name, sending time, and device feature information for sending information. 4.根据权利要求3所述的方法,其特征在于,所述设备特征信息包括如下项中的至少一项:机器的网卡标识号、IP地址、机器名。4. The method according to claim 3, wherein the device feature information includes at least one of the following items: a network card identification number of the machine, an IP address, and a machine name. 5.根据权利要求1至4任一项所述的方法,其特征在于,所述将正文特征信息和环境数据进行加密和/或编码,生成字符串,包括:5. The method according to any one of claims 1 to 4, wherein said encrypting and/or encoding text feature information and environment data to generate a character string includes: 将正文特征信息和环境数据采用非对称加密算法,或者采用加密强度高的对称加密算法,进行加密和/或编码,生成字符串。Encrypt and/or encode text feature information and environment data using an asymmetric encryption algorithm or a symmetric encryption algorithm with high encryption strength to generate a character string. 6.根据权利要求1至4任一项所述的方法,其特征在于,所述对所述字符串采用二维码进行编码,生成二维码图片,包括:6. The method according to any one of claims 1 to 4, wherein said character string is encoded using a two-dimensional code to generate a two-dimensional code picture, comprising: 对所述字符串采用PDF417、QRCode、Code49、code16K或者CodeOne算法,进行编码,生成二维码图片。The character string is encoded using PDF417, QRCode, Code49, code16K or CodeOne algorithm to generate a two-dimensional code image. 7.根据权利要求1至4任一项所述的方法,其特征在于,所述将所述二维码图片作为数字签名,与待发送的正文一起发送,包括:7. The method according to any one of claims 1 to 4, wherein the sending the two-dimensional code picture as a digital signature together with the text to be sent includes: 将所述二维码图片作为邮件的附件,或者作为论坛言论发表的签名,附在所述正文后一起发送。The two-dimensional code picture is sent as an attachment of an email, or as a signature of a forum speech, attached to the text and sent together. 8.一种数字签名的验证方法,其特征在于,包括:8. A method for verifying a digital signature, comprising: 将接收到的二维码图片进行扫描还原成字符串;Scan the received QR code image and restore it to a string; 将所述字符串进行解密,得到环境数据和正文特征信息;Decrypting the character string to obtain environmental data and text feature information; 根据所述正文特征信息核对接收到的正文。Checking the received text according to the text feature information. 9.根据权利要求8所述的方法,所述将所述字符串进行解密,得到环境数据和正文特征信息,包括:9. The method according to claim 8, wherein said character string is decrypted to obtain environmental data and text characteristic information, comprising: 采用密钥和相应的解密算法对所述字符串进行解密,得到环境数据和正文特征信息。The character string is decrypted by using a key and a corresponding decryption algorithm to obtain environmental data and text feature information. 10.根据权利要求8或9所述的方法,其特征在于,所述环境数据至少包括:用户名、发送时间及发送信息的设备特征信息。10. The method according to claim 8 or 9, wherein the environment data at least includes: user name, sending time and characteristic information of the device sending the information. 11.根据权利要求10所述的方法,其特征在于,所述设备特征信息包括如下项中的至少一项:11. The method according to claim 10, wherein the device characteristic information includes at least one of the following items: 机器的网卡标识号、IP地址、机器名。The network card identification number, IP address, and machine name of the machine. 12.根据权利要求8或9所述的方法,其特征在于,还包括:12. The method according to claim 8 or 9, further comprising: 对接收到的正文采用散列算法进行编码,生成正文特征信息;Encode the received text using a hash algorithm to generate text feature information; 所述根据所述正文特征信息核对接收到的正文,包括:The checking of the received text according to the text characteristic information includes: 如果所述生成的正文特征信息与接收到的正文特征信息相同,则核对结果为正文有效。If the generated text characteristic information is the same as the received text characteristic information, the verification result indicates that the text is valid. 13.一种数字签名的生成设备,其特征在于,包括:13. A device for generating a digital signature, comprising: 信息加密模块,用于将正文特征信息和环境数据进行加密和/或编码,生成字符串;An information encryption module, configured to encrypt and/or encode text feature information and environmental data to generate a character string; 二维码生成模块,用于对所述字符串采用二维码进行编码,生成二维码图片;A two-dimensional code generating module, configured to encode the character string using a two-dimensional code to generate a two-dimensional code picture; 发送模块,用于将所述二维码图片作为数字签名,与待发送的正文一起发送。The sending module is used to send the two-dimensional code picture as a digital signature together with the text to be sent. 14.根据权利要求13所述的设备,其特征在于,还包括:14. The device of claim 13, further comprising: 正文特征值生成模块,用于将待发送的正文进行编码,生成所述正文特征信息,所述编码的算法包括散列算法。The text feature value generation module is used to encode the text to be sent to generate the text feature information, and the encoding algorithm includes a hash algorithm. 15.根据权利要求13或14所述的设备,其特征在于,15. Apparatus according to claim 13 or 14, characterized in that, 所述信息加密模块具体用于将正文特征信息和环境数据采用非对称加密算法,或者采用加密强度高的对称加密算法,进行加密和/或编码,生成字符串;The information encryption module is specifically used to encrypt and/or encode text feature information and environmental data using an asymmetric encryption algorithm, or a symmetric encryption algorithm with high encryption strength, to generate a character string; 和/或,and / or, 所述二维码生成模块具体用于对所述字符串采用PDF417、QRCode、Code49、code16K或者CodeOne算法,进行编码,生成二维码图片;The two-dimensional code generation module is specifically used to encode the character string using PDF417, QRCode, Code49, code16K or CodeOne algorithm to generate a two-dimensional code picture; 和/或,and / or, 所述发送模块具体用于将所述二维码图片作为邮件的附件,或者作为论坛言论发表的签名,附在所述正文后一起发送。The sending module is specifically used to send the two-dimensional code picture as an attachment of an email, or as a signature of a speech published in a forum, after attaching it to the text. 16.一种数字签名的验证设备,其特征在于,包括:16. A verification device for a digital signature, comprising: 二维码扫描模块,用于将接收到的二维码图片进行扫描还原成字符串;The two-dimensional code scanning module is used to scan the received two-dimensional code picture and restore it into a character string; 信息解密模块,用于将所述字符串进行解密,得到环境数据和正文特征信息;An information decryption module, configured to decrypt the character string to obtain environmental data and text feature information; 正文验证模块,用于根据所述正文特征信息核对接收到的正文。A text verification module, configured to check the received text according to the text characteristic information. 17.根据权利要求16所述的设备,其特征在于,所述信息解密模块具体用于采用密钥和相应的解密算法对所述字符串进行解密,得到环境数据和正文特征信息。17. The device according to claim 16, wherein the information decryption module is specifically configured to use a key and a corresponding decryption algorithm to decrypt the character string to obtain environmental data and text feature information. 18.根据权利要求16所述的设备,其特征在于,还包括:18. The device of claim 16, further comprising: 正文特征值生成模块,用于对接收到的正文采用散列算法进行编码,生成正文特征信息;Text feature value generating module, used to encode the received text using a hash algorithm to generate text feature information; 所述正文验证模块具体用于如果所述生成的正文特征信息与接收到的正文特征信息相同,则核对结果为正文有效。The text verification module is specifically configured to: if the generated text characteristic information is the same as the received text characteristic information, then the verification result is that the text is valid. 19.一致数字签名的系统,其特征在于,包括:19. A consistent digital signature system, characterized in that it includes: 如权利要求13-15任一项所述的数字签名的生成设备;以及,The digital signature generating device according to any one of claims 13-15; and, 如权利要求16-18任一项所述的数字签名的验证设备。The digital signature verification device according to any one of claims 16-18.
CN 201010586845 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system Pending CN102073977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010586845 CN102073977A (en) 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010586845 CN102073977A (en) 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system

Publications (1)

Publication Number Publication Date
CN102073977A true CN102073977A (en) 2011-05-25

Family

ID=44032508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010586845 Pending CN102073977A (en) 2010-12-13 2010-12-13 Methods and equipment for generating and authenticating digital signatures and digital signature system

Country Status (1)

Country Link
CN (1) CN102073977A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102270294A (en) * 2011-08-12 2011-12-07 华南农业大学 Bar code and two-dimension code hybrid coding and decoding methods and devices
CN102724668A (en) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN103226500A (en) * 2012-01-31 2013-07-31 英飞凌科技股份有限公司 System and method of computation by signature analysis
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103248553A (en) * 2012-02-07 2013-08-14 腾讯科技(深圳)有限公司 Mail encryption method, mail decryption method and clients
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN104063779A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Email box attachment downloading method and email box attachment downloading system thereof
CN104966116A (en) * 2015-07-14 2015-10-07 苏州奥莱维信息技术有限公司 Encrypted electronic seal based on two-dimension code
CN104993923A (en) * 2015-07-02 2015-10-21 武汉大学 Radar data protection method based on combination of information hiding and encryption techniques
CN105844520A (en) * 2015-01-13 2016-08-10 伍彬 Electronic receipt generating and verifying method
CN106033543A (en) * 2015-03-11 2016-10-19 株式会社理光 Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system
CN108632663B (en) * 2018-06-19 2021-02-02 西安中科深度生态环境科技有限责任公司 Method and system for processing digitized audio/video and subtitles

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004040506A1 (en) * 2002-10-31 2004-05-13 Iconlab, Inc. Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same
CN101645140A (en) * 2008-08-06 2010-02-10 华为技术有限公司 Two-dimensional code generation method, decoding method and device
CN101834726A (en) * 2010-03-19 2010-09-15 广州广大通电子科技有限公司 Safe encryption method based on bi-dimensional codes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004040506A1 (en) * 2002-10-31 2004-05-13 Iconlab, Inc. Two-dimensional code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same
CN101645140A (en) * 2008-08-06 2010-02-10 华为技术有限公司 Two-dimensional code generation method, decoding method and device
CN101834726A (en) * 2010-03-19 2010-09-15 广州广大通电子科技有限公司 Safe encryption method based on bi-dimensional codes

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102270294A (en) * 2011-08-12 2011-12-07 华南农业大学 Bar code and two-dimension code hybrid coding and decoding methods and devices
CN103226500A (en) * 2012-01-31 2013-07-31 英飞凌科技股份有限公司 System and method of computation by signature analysis
CN103226500B (en) * 2012-01-31 2016-08-10 英飞凌科技股份有限公司 The system and method calculated by signature analysis
CN103248553A (en) * 2012-02-07 2013-08-14 腾讯科技(深圳)有限公司 Mail encryption method, mail decryption method and clients
CN102724668A (en) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN104063779A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Email box attachment downloading method and email box attachment downloading system thereof
CN103236929B (en) * 2013-04-26 2016-09-14 天地融科技股份有限公司 A kind of information processing method and deciphering device
WO2014173233A1 (en) * 2013-04-26 2014-10-30 天地融科技股份有限公司 Information processing method and deciphering apparatus
CN103236929A (en) * 2013-04-26 2013-08-07 天地融科技股份有限公司 Information processing method and encryption device
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN105844520A (en) * 2015-01-13 2016-08-10 伍彬 Electronic receipt generating and verifying method
CN106033543A (en) * 2015-03-11 2016-10-19 株式会社理光 Document modification detecting method, original document manuscript providing device, duplicated document detecting device, and document modification detection system
CN104993923A (en) * 2015-07-02 2015-10-21 武汉大学 Radar data protection method based on combination of information hiding and encryption techniques
CN104993923B (en) * 2015-07-02 2018-03-27 武汉大学 The radar data guard method that a kind of Information hiding is combined with encryption technology
CN104966116A (en) * 2015-07-14 2015-10-07 苏州奥莱维信息技术有限公司 Encrypted electronic seal based on two-dimension code
CN104966116B (en) * 2015-07-14 2018-08-07 苏州奥莱维信息技术有限公司 The acquisition methods of encrypted electronic seal based on Quick Response Code
CN108632663B (en) * 2018-06-19 2021-02-02 西安中科深度生态环境科技有限责任公司 Method and system for processing digitized audio/video and subtitles

Similar Documents

Publication Publication Date Title
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN112564906B (en) Block chain-based data security interaction method and system
US8744078B2 (en) System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths
CN101388776B (en) Encryption and decryption method and device for printed document
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
JP6489464B2 (en) Optical code, information transmission method, and authentication method
CN101355684A (en) Image digital content sending and receiving method and its sender and receiver
CN107222501A (en) A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code
US7660987B2 (en) Method of establishing a secure e-mail transmission link
CN104243149A (en) Encrypting and decrypting method, device and server
CN104268610A (en) Method for generating and reading graded QR code
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN111698084A (en) Block chain-based concealed communication method
CN102404337A (en) Data encryption method and device
CN107294964A (en) A kind of method of information transfer
WO2018113708A1 (en) Mail sending, reading, and read control method, and apparatus for same
CN115022042B (en) A compliance code verification method and computer-readable medium for protecting data privacy
CN1889419A (en) Method and apparatus for realizing encrypting
CN102332978B (en) Lottery ticket off-line verification system
CN101841785A (en) Method for sending encrypted message by cellphone and system thereof
CN112866288B (en) A Symmetric Data Encryption Method for Double Plaintext Transmission
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
CN110175471B (en) File storage method and system
CN103188271A (en) Secure mail client local data storage and identification methods and devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110525