Nothing Special   »   [go: up one dir, main page]

CN102930192A - Method for generating and acquiring safety information and relevant devices - Google Patents

Method for generating and acquiring safety information and relevant devices Download PDF

Info

Publication number
CN102930192A
CN102930192A CN2012103492066A CN201210349206A CN102930192A CN 102930192 A CN102930192 A CN 102930192A CN 2012103492066 A CN2012103492066 A CN 2012103492066A CN 201210349206 A CN201210349206 A CN 201210349206A CN 102930192 A CN102930192 A CN 102930192A
Authority
CN
China
Prior art keywords
user profile
dimension code
safe
decoding
scanning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103492066A
Other languages
Chinese (zh)
Other versions
CN102930192B (en
Inventor
王曦
胡博
莫沙
谢郑凯
冯诚
黄英
周睿奕
贺柏森
李未
张凯
刘玉磊
唐廷勇
杨惠姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210349206.6A priority Critical patent/CN102930192B/en
Publication of CN102930192A publication Critical patent/CN102930192A/en
Application granted granted Critical
Publication of CN102930192B publication Critical patent/CN102930192B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method for generating and acquiring safety information and relevant devices, and provides a method for displaying user information safely and conveniently. The method comprises the following steps of: acquiring user information provided by users; and generating safety two-dimension codes according to the user information, wherein the safety two-dimension codes are applied to a logistic order, so that a user information acquisition device acquires the user information by scanning the safety two-dimension codes.

Description

Security information generation and acquisition methods, and relevant apparatus
Technical field
The present invention relates to field of information processing, relate in particular to a kind of security information generation and acquisition methods, reach relevant apparatus.
Background technology
Two-dimension code is a kind of bar code with readability that expands on the basis of bar code.Compare bar code, the data that the two-dimension code record is more complicated are such as picture, network linking etc.Compare with the one dimension code, the 2 D code information capacity is large, can can digitized information encode picture, sound, literal, fingerprint etc. and show, but outfit as many as 1,850 capitalization/2,710 numeral/1,108 byte/more than 500 Chinese characters are tens times of one dimension code information capacity.The device scan two-dimensional bar code, the binary data by putting down in writing in the identification length of bar code and the width can obtain the information that wherein comprises.Two-dimension code also has encryption mechanism, can be first with certain cryptographic algorithm with information encryption, represent with two-dimensional bar code again.In identification during two-dimensional bar code, certain decipherment algorithm in addition just can recover represented information again.
In existing logistical applications, need the artificial naked eyes recognition user information of staff in the logistics progress, the operation such as sort, efficient is lower; And the exhibition method of user's user profile is expressly to show, all personal information of user are directly exposed to the outside, have caused great information leakage risk; When the single because a variety of causes generation local damage of logistics, be easy to cause the logistics personnel to be difficult to correctly identify user's relevant information.
Summary of the invention
The embodiment of the invention provides a kind of security information generation and acquisition methods, and relevant apparatus, is used for providing a kind of safe, methods of exhibiting of user profile easily.
The security information generation method that the embodiment of the invention provides comprises:
Obtain the user profile that the user provides;
Generate safe two-dimension code according to described user profile, described safe two-dimension code is applied in document, so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
The user information acquiring method that the embodiment of the invention provides comprises:
Safe two-dimension code in the scanning document;
According to presetting rule described safe two-dimension code is decoded;
Result according to described decoding obtains user profile.
The document that the embodiment of the invention provides comprises:
Safe two-dimension code, the user profile in the described safe two-dimension code mark document is so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
The user profile generating apparatus that the embodiment of the invention provides comprises:
Information acquisition unit is used for obtaining the user profile that the user provides;
The two-dimension code generation unit is used for generating safe two-dimension code according to described user profile, and described safe two-dimension code is applied in document, so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
The user profile deriving means that the embodiment of the invention provides comprises:
Scanning element is for the safe two-dimension code of scanning document;
Decoding unit is used for according to presetting rule described safe two-dimension code decoding;
The user profile acquiring unit is used for obtaining user profile according to the result of described decoding.
As can be seen from the above technical solutions, the embodiment of the invention has the following advantages:
User information revealing mode based on two-dimension code not only can offer the effective userspersonal information in logistics side fast, the individual privacy information that ensures the user is not obtained by unrelated person, intellectuality sorting that simultaneously can adaptive machine improves the treatment effeciency of logistics mail; And because the fault-tolerant ability of two-dimension code is strong, when two-dimension code causes local damage because of perforation, stained etc., even impaired area still can correctly distinguish when reaching 50%, and its decoding error rate is no more than 1/10000000th.
Description of drawings
Fig. 1 is a schematic flow sheet of embodiment of the invention security information generation method;
Fig. 2 is another schematic flow sheet of embodiment of the invention security information generation method;
Fig. 3 is the exemplary plot that safe two-dimension code generates in the embodiment of the invention;
Fig. 4 is another exemplary plot that safe two-dimension code generates in the embodiment of the invention;
Fig. 5 is an application flow schematic diagram of embodiment of the invention security information generation method;
Fig. 6 is a logical organization schematic diagram of embodiment of the invention user profile generating apparatus;
Fig. 7 is a logical organization schematic diagram of embodiment of the invention user profile deriving means.
Embodiment
The embodiment of the invention provides a kind of security information generation and acquisition methods, and relevant apparatus, is used for providing a kind of safe, methods of exhibiting of user profile easily.
See also Fig. 1, security information generation method embodiment comprises in the embodiment of the invention:
101, obtain the user profile that the user provides;
The user profile generating apparatus obtains the user profile that the user provides.Optionally, described user profile specifically can comprise: user's name, contact method and contact address.
102, generate safe two-dimension code according to described user profile;
The user profile generating apparatus generates safe two-dimension code according to described user profile, and described safe two-dimension code is applied in document, so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
User information revealing mode based on two-dimension code not only can offer the effective userspersonal information in logistics side fast, the individual privacy information that ensures the user is not obtained by unrelated person, intellectuality sorting that simultaneously can adaptive machine improves the treatment effeciency of logistics mail; And because the fault-tolerant ability of two-dimension code is strong, when two-dimension code causes local damage because of perforation, stained etc., even impaired area still can correctly distinguish when reaching 50%, and its decoding error rate is no more than 1/10000000th.
In actual applications; the user profile generation method of the embodiment of the invention can be for the protection of logistics user's information security; can also limit the usable range of safe two-dimension code, see also Fig. 2, another embodiment of user profile generation method comprises in the embodiment of the invention:
201, obtain the user profile that the user provides;
The user profile generating apparatus obtains the user profile (being logistics information) that the user provides.Optionally, described user profile specifically can comprise: user's name, contact method and contact address.
202, generate safe two-dimension code according to described user profile;
The user profile generating apparatus generates safe two-dimension code according to described user profile, and described safe two-dimension code is applied in document (being specifically as follows logistics single), so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
Exemplary, specifically can adopt following method to generate safe two-dimension code in the embodiment of the invention:
1, data analysis: determine the character types of coding, convert sign character to by corresponding character set; Select error-correction level, under the certain condition of specification, the capacity of higher its True Data of error-correction level is less.
See also Fig. 3, each QR code sign is made of nominal square modules, forms a quadrate array, and it is by coding region and comprise that seeking the functional graphic that resembles figure, separator, positioning pattern and correction graph forms; Functional graphic can not be used for data encoding, is surrounded by the clear area around the symbol.
2, data encoding: data character is converted to bit stream, per 8 code words, the whole codeword sequence that consists of data.Know that in fact this code word data sequence just known the data content of two-dimension code.
Data can be encoded according to a kind of pattern, in order to decode more efficiently, for example: to data: and 01234567 coding (version 1-H),
1) grouping: 012 345 67
2) change into scale-of-two: 012 → 0000001100
345→0101011001
67→1000011
3) change into sequence: 0,000,001,100 0,101,011,001 1000011
4) number of characters changes into scale-of-two: 8 → 0000001000
5) add mode indicators (upper figure numeral) 0001:0001 0,000,001,000 00,000,011,000,101,011,001 1000011
For letter, Chinese, Japanese etc. just the contents such as mode, pattern of grouping distinguish to some extent.Basic skills is consistent.
3, Error Correction of Coding: on demand with top codeword sequence piecemeal, and according to the code word of error-correction level and piecemeal, produce the error correction code word, and the error correction code word is joined code word data sequence back, become a new sequence.
In the situation that two-dimension code specification and error-correction level determine, its code word sum and the error correcting code number of words that can hold is also just definite in fact, such as version 10, during H, altogether can hold 346 code words, wherein 224 error correction code words during error-correction level.
In other words redundancy during about 1/3 code word in the two-dimension code zone.For these 224 error correction code words, it can be corrected 112 and substitute wrong (such as confuse right and wrongs) or 224 according to read error (can't read or can't decipher), and error correction capability is like this: 112/346=32.4%.
4, structure final data information: under the condition that specification is determined, the sequence that produces is above put in order as in the piecemeal, in accordance with regulations deblocking, then each piece is calculated, draw corresponding error correcting code block piece, error correcting code block piece is consisted of a sequence in order, add original code word data sequence back to.
As: D1, D12, D23, D35, D2, D13, D24, D36 ... D11, D22, D33, D45, D34, D46, E1, E23, E45, E67, E2, E24, E46, E68 ...
5, structural matrix: will survey figure, separator, positioning pattern, correction graph and code word module and put into matrix.See also Fig. 4, the complete sequence in the step 4 is filled in the zone of two-dimension code matrix of dimension.
6, mask: the mask figure is used for the coding region of symbol, so that the distribution that the dark color in the two-dimension code figure and light color (black and white) zone can the ratio optimum.In order to satisfy above-mentioned condition, should carry out according to the following steps mask.
1) mask is not used in functional graphic;
2) continuously the module figure (except format information and the version information) of known coding region is carried out xor operation with a plurality of Matrix Patterns.Xor operation is successively placed on the module figure on each mask graph, and will be corresponding to the module negate (light color becomes dark color, or opposite) of the dark module of mask graph;
3) to each as a result the nonconforming part of figure score, to assess these results;
4) select the minimum figure of score.
7, form and version information: production form and version information are put into respective regions.
Version 7-40 has comprised version information, and what do not have version information is 0 entirely.Two positions have comprised version information on the two-dimension code, and they are redundant.
Totally 18 of version informations, the matrix of 6X3, wherein data are 6 the time, such as version number 8, during the information of data bit 001000,12 of the back is error correction bit.
203, be that described safe two-dimension code distributes use to limit parameter;
The user profile generating apparatus is that described safe two-dimension code distributes use to limit parameter, described use limits parameter and uses under given conditions for limiting described safe two-dimension code, described use limits parameter and comprises: access times, any one or the combination more than two in service time and the place to use.
Exemplary, after generating described safe two-dimension code, in the database of the described safe two-dimension code of storage, can distribute unique identify label for described safe two-dimension code, and limit parameter for identify label distributes and stores to use.Concrete, in actual applications, logistics personnel generally need to obtain by scanning this safe two-dimension code the address information of corresponding network data base, then verify and extract corresponding user profile in this network data base.Limit parameter by described use, the network data base record uses the relevant prescribed information of this safe two-dimension code, as: the logistics personnel that can limit the target place just can obtain corresponding user profile by scanning this safe two-dimension code, also can limit access times and the time range of this safe two-dimension code, in order to avoid user profile is stolen in other occasions.
For the ease of understanding, the below obtains with document user profile generation method, the user profile described in the above embodiments with a concrete application scenarios and is described in detail, and please refer to Fig. 5, is specially:
501, the user provides logistics information;
After user on the shopping website confirmed to buy certain article and places an order, the user provided logistics information (comprising name, cell-phone number, address etc.) to the website.
502, logistics information is converted to safe two-dimension code;
The website generates safe two-dimension code by the logistics information generating apparatus according to described logistics information after the logistics information that obtains this user.
503, the website is issued the seller with this user's logistics information in safe two-dimension code mode;
504, the seller prints to safe two-dimension code on the logistics list, offers logistics company and delivers;
Optionally, above-mentionedly only be a kind of scene in the practical application, be understandable that, the website also can be directly sends to the seller with user's logistics information in actual applications, convert described logistics information to safe two-dimension code by the seller by the logistics information generating apparatus, by the seller safe two-dimension code is offered corresponding logistics company again, the concrete mode of using is not construed as limiting herein.
505, the logistics square tube is crossed the logistics information deriving means and is identified geographical location information that two-dimension code is with, and sorts, the work such as transportation;
506, send the part personnel to go out two-dimension code by the task equipment scanning recognition and be with the information such as user's contact method, send this goods with charge free and use to the buyer.
Buyer user successfully receives, and this logistics is single also can directly to be abandoned, and does not worry the leakage of personal information on the logistics list.
Above-mentioned user profile generating apparatus and user profile deriving means are virtual bench, it is the general designation that can realize all devices of user profile generation method and user information acquiring method in the embodiment of the invention, on specific implementation, can be software program, also can be hardware device, be not construed as limiting herein.
The above only is illustrated the application scenarios in the embodiment of the invention with some examples, is understandable that, in actual applications, more application scenarios can also be arranged, and specifically is not construed as limiting herein.
The embodiment of the invention also provides a kind of document, specifically includes on this document:
Safe two-dimension code, the user profile in the described safe two-dimension code mark document is so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
The below describes the embodiment for the user profile generating apparatus of the present invention of carrying out above-mentioned user profile generation method, and its logical organization please refer to Fig. 6, and the user profile generating apparatus embodiment comprises in the embodiment of the invention:
Information acquisition unit 601 is used for obtaining the user profile that the user provides;
Two-dimension code generation unit 602 is used for generating safe two-dimension code according to described user profile, and described safe two-dimension code is applied in document, so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
Optionally, described user profile generating apparatus also comprises:
Parametric distribution unit 603, be used to described safe two-dimension code to distribute and use the restriction parameter, described use limits parameter and uses under given conditions for limiting described safe two-dimension code, described use limits parameter and comprises: access times, any one or the combination more than two in service time and the place to use.
The below describes the embodiment for the user profile deriving means of the present invention of carrying out above-mentioned user information acquiring method, and its logical organization please refer to Fig. 7, and the user profile deriving means embodiment comprises in the embodiment of the invention:
Scanning element 701 is for the safe two-dimension code of scanning document;
Decoding unit 702 is used for according to presetting rule described safe two-dimension code decoding;
User profile acquiring unit 703 is used for obtaining user profile according to the result of described decoding.
Further, described user profile acquiring unit 703 specifically is used for:
Directly obtain described user profile by decoding; Or, by obtaining the Object linking address after the straight decoding of decoding, arrive the described user profile of described Object linking address acquisition by network.
The concrete method of operating of above-mentioned user profile generating apparatus and user profile deriving means unit has had corresponding description in above-mentioned Fig. 1, Fig. 2 and Fig. 4 embodiment, repeat no more herein.
In several embodiment that the application provides, should be understood that, disclosed apparatus and method can realize by another way.For example, device embodiment described above only is schematic, for example, the division of described unit, only be that a kind of logic function is divided, during actual the realization other dividing mode can be arranged, for example a plurality of unit or assembly can in conjunction with or can be integrated into another system, or some features can ignore, or do not carry out.Another point, the shown or coupling each other discussed or direct-coupling or communication connection can be by some interfaces, indirect coupling or the communication connection of device or unit can be electrically, machinery or other form.
Described unit as separating component explanation can or can not be physically to separate also, and the parts that show as the unit can be or can not be physical locations also, namely can be positioned at a place, perhaps also can be distributed on a plurality of network element.Can select according to the actual needs wherein some or all of unit to realize the purpose of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in the processing unit, also can be that the independent physics of unit exists, and also can be integrated in the unit two or more unit.Above-mentioned integrated unit both can adopt the form of hardware to realize, also can adopt the form of SFU software functional unit to realize.
If described integrated unit is realized with the form of SFU software functional unit and during as independently production marketing or use, can be stored in the computer read/write memory medium.Based on such understanding, part or all or part of of this technical scheme that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product is stored in the storage medium, comprise that some instructions are with so that a computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out all or part of step of the described method of each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), the various media that can be program code stored such as random access memory (RAM, Random Access Memory), magnetic disc or CD.
The above; be the specific embodiment of the present invention only, but protection scope of the present invention is not limited to this, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection domain with claim.

Claims (10)

1. a security information generation method is characterized in that, comprising:
Obtain the user profile that the user provides;
Generate safe two-dimension code according to described user profile, described safe two-dimension code is applied in document, so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
2. method according to claim 1 is characterized in that, described user profile comprises:
User's name, contact method and contact address.
3. method according to claim 1 and 2 is characterized in that, generates after the safe two-dimension code according to described user profile, comprising:
For distributing to use, described safe two-dimension code limits parameter, described use limits parameter and uses under given conditions for limiting described safe two-dimension code, described use limits parameter and comprises: access times, any one or the combination more than two in service time and the place to use.
4. a user information acquiring method is characterized in that, comprising:
Safe two-dimension code in the scanning document;
According to presetting rule described safe two-dimension code is decoded;
Result according to described decoding obtains user profile.
5. method according to claim 4 is characterized in that, described result according to described decoding obtains user profile, comprising:
Directly obtain described user profile by decoding;
Or,
Obtain the Object linking address by decoding, arrive the described user profile of described Object linking address acquisition by network.
6. a document is characterized in that, comprising:
Safe two-dimension code, the user profile in the described safe two-dimension code mark document is so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
7. a user profile generating apparatus is characterized in that, comprising:
Information acquisition unit is used for obtaining the user profile that the user provides;
The two-dimension code generation unit is used for generating safe two-dimension code according to described user profile, and described safe two-dimension code is applied in document, so that the user profile deriving means obtains described user profile by scanning described safe two-dimension code.
8. device according to claim 7 is characterized in that, described user profile generating apparatus also comprises:
The parametric distribution unit, be used to described safe two-dimension code to distribute and use the restriction parameter, described use limits parameter and uses under given conditions for limiting described safe two-dimension code, described use limits parameter and comprises: access times, any one or the combination more than two in service time and the place to use.
9. a user profile deriving means is characterized in that, comprising:
Scanning element is for the safe two-dimension code of scanning document;
Decoding unit is used for according to presetting rule described safe two-dimension code decoding;
The user profile acquiring unit is used for obtaining user profile according to the result of described decoding.
10. device according to claim 9 is characterized in that, described user profile acquiring unit specifically is used for:
Directly obtain described user profile by decoding;
Or,
By obtaining the Object linking address after the straight decoding of decoding, arrive the described user profile of described Object linking address acquisition by network.
CN201210349206.6A 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus Active CN102930192B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210349206.6A CN102930192B (en) 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210349206.6A CN102930192B (en) 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus

Publications (2)

Publication Number Publication Date
CN102930192A true CN102930192A (en) 2013-02-13
CN102930192B CN102930192B (en) 2016-02-03

Family

ID=47644989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210349206.6A Active CN102930192B (en) 2012-09-19 2012-09-19 Security information generates and acquisition methods and relevant apparatus

Country Status (1)

Country Link
CN (1) CN102930192B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237022A (en) * 2013-04-12 2013-08-07 江苏圆坤二维码研究院有限公司 Two-dimensional code logistics information safety method and cloud system
CN103440517A (en) * 2013-09-02 2013-12-11 章玺 Logistics information receipt using bar codes
CN103473661A (en) * 2013-09-02 2013-12-25 深圳市华傲数据技术有限公司 Logistic encryption signing method and system
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN103699922A (en) * 2014-01-06 2014-04-02 立德高科(北京)数码科技有限责任公司 Logistics label with dot patterns, and method and system for querying logistics information
CN103886474A (en) * 2014-04-14 2014-06-25 湖南惠农科技有限公司 Product information processing method and device
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
CN104517130A (en) * 2013-09-26 2015-04-15 爱国者欧途欧(北京)网络科技有限公司 Code generation method
CN104615786A (en) * 2015-03-04 2015-05-13 庞迪 Method and system for querying bus information based on two-dimensional codes
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN105184174A (en) * 2015-07-17 2015-12-23 中国科学院信息工程研究所 Export method and system for confidential inspection result
CN105234087A (en) * 2015-10-12 2016-01-13 杨彦明 Method and system for automatically sorting parcels
CN105234088A (en) * 2015-09-10 2016-01-13 岭南师范学院 Automatic express sorting and delivery dialing method
WO2017050163A1 (en) * 2015-09-23 2017-03-30 阿里巴巴集团控股有限公司 Logistic information processing method and device
CN109063492A (en) * 2018-07-05 2018-12-21 北京小米智能科技有限公司 Information processing method and device
CN112949801A (en) * 2021-01-29 2021-06-11 中北大学 Three-dimensional code based on micro-lens array, three-dimensional code generation method and three-dimensional code identification method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9864887B1 (en) * 2016-07-07 2018-01-09 Hand Held Products, Inc. Energizing scanners

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588435A (en) * 2004-09-22 2005-03-02 珠海金联安警用技术研究发展中心有限公司 Anti-fake bill processing system
US20050051627A1 (en) * 2003-09-08 2005-03-10 Takeshi Matushima Optical information reading apparatus and related information reading method
CN102333051A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for obtaining contact information based on network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050051627A1 (en) * 2003-09-08 2005-03-10 Takeshi Matushima Optical information reading apparatus and related information reading method
CN1588435A (en) * 2004-09-22 2005-03-02 珠海金联安警用技术研究发展中心有限公司 Anti-fake bill processing system
CN102333051A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method for obtaining contact information based on network

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237022A (en) * 2013-04-12 2013-08-07 江苏圆坤二维码研究院有限公司 Two-dimensional code logistics information safety method and cloud system
CN103440517A (en) * 2013-09-02 2013-12-11 章玺 Logistics information receipt using bar codes
CN103473661A (en) * 2013-09-02 2013-12-25 深圳市华傲数据技术有限公司 Logistic encryption signing method and system
CN104517130A (en) * 2013-09-26 2015-04-15 爱国者欧途欧(北京)网络科技有限公司 Code generation method
CN104281936A (en) * 2013-10-07 2015-01-14 深圳市华傲数据技术有限公司 Package information hierarchical display method and system
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN103699922A (en) * 2014-01-06 2014-04-02 立德高科(北京)数码科技有限责任公司 Logistics label with dot patterns, and method and system for querying logistics information
CN103886474A (en) * 2014-04-14 2014-06-25 湖南惠农科技有限公司 Product information processing method and device
CN104615786A (en) * 2015-03-04 2015-05-13 庞迪 Method and system for querying bus information based on two-dimensional codes
CN104933371A (en) * 2015-06-04 2015-09-23 南京邮电大学 Logistics personal information privacy protection system based on multilayer-encrypted two-dimensional code
CN104933371B (en) * 2015-06-04 2018-06-22 南京邮电大学 Logistics personal information intimacy protection system based on multi-layer security Quick Response Code
CN105184174A (en) * 2015-07-17 2015-12-23 中国科学院信息工程研究所 Export method and system for confidential inspection result
CN105234088A (en) * 2015-09-10 2016-01-13 岭南师范学院 Automatic express sorting and delivery dialing method
WO2017050163A1 (en) * 2015-09-23 2017-03-30 阿里巴巴集团控股有限公司 Logistic information processing method and device
CN106557929A (en) * 2015-09-23 2017-04-05 阿里巴巴集团控股有限公司 Logistics information processing method and processing device
CN105234087A (en) * 2015-10-12 2016-01-13 杨彦明 Method and system for automatically sorting parcels
CN105234087B (en) * 2015-10-12 2018-04-17 杨彦明 A kind of express delivery automatic sorting method and system
CN109063492A (en) * 2018-07-05 2018-12-21 北京小米智能科技有限公司 Information processing method and device
CN112949801A (en) * 2021-01-29 2021-06-11 中北大学 Three-dimensional code based on micro-lens array, three-dimensional code generation method and three-dimensional code identification method

Also Published As

Publication number Publication date
CN102930192B (en) 2016-02-03

Similar Documents

Publication Publication Date Title
CN102930192B (en) Security information generates and acquisition methods and relevant apparatus
Tiwari An introduction to QR code technology
CN100369059C (en) Matrix type two-dimensional bar code and its encoding and decoding method
CN105447546B (en) The two dimensional code and its coding and decoding methods and equipment of embeddable large scale figure
CN101645081A (en) Method and system for tracing farm product information through two-dimension code
Deineko et al. Usage and Application Prospects QR Codes
CN102800243A (en) Anti-counterfeiting annular code and encoding method thereof
CN103415007A (en) Mobile phone two-dimensional code safe use method based on information hiding
EP3132422A1 (en) Contour encryption and decryption
CN111033527A (en) Method and apparatus for encoding and decoding circular symbol code
CN111539502A (en) Anti-counterfeiting two-dimensional code generation method and device, server and storage medium
Mandal et al. A new approach of text Steganography based on mathematical model of number system
Sahu et al. QR code and application in India
CN104915698B (en) Chemical producting safety information quick search and complete period tracking digital labelling system
CN102044010A (en) Method for realizing temporary vehicle number plate information data transmission by utilizing two-dimensional bar codes
CN101957929A (en) Method for identifying object on basis of two-dimensional lattice code
CN103778453B (en) Writable two-dimensional bar code based on fault-tolerant mechanism and generating method thereof
CN114898373B (en) File desensitization method, device, electronic equipment and storage medium
CN102842053A (en) Anti-fake pattern and core tag and manufacturing method thereof
CN111062456A (en) Two-dimensional code encryption algorithm
CN201518129U (en) Two-dimensional code information tracing system for agricultural product
Bunma et al. Using augment reality to increase capacity in QR code
CN101303742A (en) Microminiature Hanxin code and method for generating symbol thereof
US11157788B2 (en) Two-dimensional marker for marking an object, method and system for generating the marker, method and system for generating a marker code, and method and system for authenticating an object
Sahu et al. Encryption in QR code using stegnography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant