CN115484224B - Information association method, two-dimensional code generation method, device, electronic equipment and medium - Google Patents
Information association method, two-dimensional code generation method, device, electronic equipment and medium Download PDFInfo
- Publication number
- CN115484224B CN115484224B CN202211129091.XA CN202211129091A CN115484224B CN 115484224 B CN115484224 B CN 115484224B CN 202211129091 A CN202211129091 A CN 202211129091A CN 115484224 B CN115484224 B CN 115484224B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- enterprise
- dimensional code
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 238000012795 verification Methods 0.000 claims description 17
- 238000004891 communication Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 13
- 238000012545 processing Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 9
- 238000004590 computer program Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides an information association method, a two-dimensional code generation method, a device, electronic equipment and a medium, wherein the information association method comprises the following steps: receiving user information and enterprise information sent by a server, wherein the user information comprises: user first signature information and a user identifier; the user information is obtained by scanning a two-dimensional code, and the two-dimensional code is generated based on a user identifier, a user private key and enterprise information of an enterprise to be focused; verifying the first signature information of the user by using the public key of the user, the user identification and the enterprise information; and when the first signature information is verified to be valid information, associating the user identification with the enterprise identification of the enterprise to be concerned. According to the method, the public key of the user, the user identification and the enterprise information are utilized to correlate the user identification with the enterprise identification, and under the condition that a user side does not have a network, the enterprise side scans the two-dimensional code to achieve correlation between the user and the enterprise to be focused, so that the mode of focusing on the public number of the enterprise is expanded, and the focusing efficiency of the public number of the enterprise is improved.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an information association method, a two-dimensional code generating method, an apparatus, an electronic device, and a computer storage medium.
Background
The public number is an account number applied by the service provider for the service-requiring party. Individuals, businesses, institutions, and other entities may apply for public numbers on a public number platform. The public number is public, and an individual user can pay attention to the public number by scanning the two-dimensional code through the APP on the mobile terminal, so that the user identification of the user and the public number are associated on a public number platform. Communication may be made between the public number and the user.
However, in the related art, when the APP on the mobile terminal focuses on the public number of the enterprise by scanning the two-dimensional code, the APP can smoothly scan the two-dimensional code focusing on the public number of the enterprise under the condition that a network signal or a wifi signal is required, if no network information or no wifi signal is available, the operation focusing on the public number of the enterprise cannot be completed, because the request of scanning the two-dimensional code cannot reach the enterprise server, the public number of the enterprise cannot be focused, that is, the association between the user identification and the enterprise cannot be performed.
Therefore, how to pay attention to the public number of the enterprise under the condition that the mobile terminal has no network or wifi signal is a technical problem to be solved at present.
Disclosure of Invention
The invention provides an information association method, a two-dimensional code generation method, a device, electronic equipment and a medium, which at least solve the technical problem that a user cannot pay attention to an enterprise public number because a mobile terminal does not have a network or wifi in the related art. The technical scheme of the invention is as follows:
according to a first aspect of an embodiment of the present invention, there is provided an information association method, including:
receiving user information and enterprise information sent by a server, wherein the user information comprises: first signature information of a user and a user identification; the user information is obtained by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused;
verifying the first signature information of the user by using the public key of the user, the user identification and the enterprise information;
and when the first signature information of the user is verified to be effective information, associating the user identification of the user with the enterprise identification of the enterprise to be concerned.
Optionally, the verifying the first signature information of the user by using the public key of the user, the user identifier and the enterprise information includes:
Generating second signature information of the user by utilizing the public key of the user, the user identification and the enterprise information encryption;
and if the second signature information is consistent with the content of the first signature information, determining the first signature information of the user as effective information.
Optionally, after associating the user identifier of the user with the enterprise identifier of the enterprise to be focused, the method further includes:
and sending information of success of the user and the enterprise to be concerned to the server.
According to a second aspect of an embodiment of the present invention, there is provided a two-dimensional code generating method, the method including:
acquiring enterprise information of an enterprise to be focused, and user identification and user private key information of a user, wherein the enterprise information is obtained by scanning an enterprise two-dimensional code of a public number of the enterprise to be focused;
generating signature information of the user according to the enterprise information, the user identification and the user private key information;
and generating a two-dimensional code of the user based on the user identification and the signature information of the user, and displaying the two-dimensional code.
Optionally, the generating signature information of the user according to the enterprise information, the user identifier and the user private key includes:
And generating signature information of the user through an encryption algorithm according to the enterprise information, the user identification and the private key information of the user.
According to a third aspect of an embodiment of the present invention, there is provided an information association method, the method including:
acquiring user information sent by a client, wherein the user information is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused;
transmitting the user information and the enterprise information to a server so that the server verifies and associates the user information based on the enterprise information;
and receiving information that the user identification of the user and the enterprise to be concerned are successfully associated, wherein the information is sent by the server.
According to a third aspect of an embodiment of the present invention, there is provided an information association method, the method including:
acquiring user information sent by a client, wherein the user information is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused;
Transmitting the user information and the enterprise information to a server so that the server verifies and associates the user information based on the enterprise information;
and receiving information that the user identification of the user and the enterprise to be concerned are successfully associated, wherein the information is sent by the server.
According to a fourth aspect of an embodiment of the present invention, there is provided an information association method, the method including:
scanning a two-dimensional code of a user to obtain user information, wherein the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused; the user information includes: signature information of a user and a user identifier;
and sending the user information to a first server, so that the first server requests a second server to verify the validity of the signature information of the user based on the user identification, and when the verification is valid, the second server associates the user identification of the user with the enterprise to be concerned.
According to a fifth aspect of an embodiment of the present invention, there is provided an information associating apparatus including:
the receiving module is used for receiving the user information and the enterprise information sent by the server, and the user information comprises: the method comprises the steps of obtaining first signature information and user identification of a user, wherein the user information is obtained by scanning a two-dimensional code of the user, and the two-dimensional code of the user is generated based on the user identification of the user, a user private key and enterprise information of an enterprise to be focused;
The verification module is used for verifying the first signature information of the user by utilizing the public key of the user, the user identification and the enterprise information;
and the association module is used for associating the user identification of the user with the enterprise identification of the enterprise to be focused when the first signature information of the user is verified to be effective information.
Optionally, the verification module includes:
the generation module is used for generating second signature information of the user by utilizing the public key of the user, the user identification and the enterprise information encryption;
and the determining module is used for determining the first signature information of the user as effective information when the second signature information is consistent with the content of the first signature information.
Optionally, the apparatus further includes:
and the first sending module is used for sending information of successful attention of the user and the enterprise to be attended to the server after the association module associates the user identification of the user with the enterprise identification of the enterprise to be attended to.
Optionally, the apparatus further includes:
and the second sending module is used for sending verification failure information to the enterprise server when the first signature information of the user is verified to be invalid information.
According to a sixth aspect of the embodiment of the present invention, there is provided a two-dimensional code generating apparatus, including:
the system comprises an acquisition module, a user identification module and a user private key module, wherein the acquisition module is used for acquiring enterprise information of an enterprise to be focused, and user identification and user private key information of a user, wherein the enterprise information is obtained by scanning an enterprise two-dimensional code of a public number of the enterprise to be focused;
the first generation module is used for generating signature information of the user according to the enterprise information, the user identification and the user private key information;
the second generation module is used for generating the two-dimensional code of the user based on the user identification and the signature information of the user and displaying the two-dimensional code.
Optionally, the first generating module is specifically configured to generate signature information of the user through an encryption algorithm according to the enterprise information, the user identifier, and private key information of the user.
According to a seventh aspect of embodiments of the present invention, there is provided an information associating apparatus, the apparatus including:
the acquisition module is used for acquiring user information sent by a client, wherein the user information is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identifier of the user, a user private key and enterprise information of an enterprise to be focused;
The sending module is used for sending the user information and the enterprise information to a server so that the server can verify and correlate the user information based on the enterprise information;
and the receiving module is used for receiving the information that the user identification of the user and the enterprise identification of the enterprise to be focused are successfully associated, which is sent by the server.
According to a seventh aspect of embodiments of the present invention, there is provided an information associating apparatus, the apparatus including:
the acquisition module is used for acquiring user information sent by a client, wherein the user information is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identifier of the user, a user private key and enterprise information of an enterprise to be focused;
the sending module is used for sending the user information and the enterprise information to a server so that the server can verify and correlate the user information based on the enterprise information;
and the receiving module is used for receiving the information that the user identification of the user and the enterprise identification of the enterprise to be focused are successfully associated, which is sent by the server.
According to an eighth aspect of an embodiment of the present invention, there is provided an information associating apparatus including:
The scanning module is used for scanning the two-dimensional code of the user to obtain user information, and the two-dimensional code of the user is generated based on the user identification of the user, the user private key and enterprise information of the enterprise to be focused. The user information includes: signature information of a user and a user identifier;
and the sending module is used for sending the user information to a first server so that the first server requests a second server to verify the validity of the signature information of the user based on the user identification, and when the verification is valid, the second server associates the user identification of the user with the enterprise identification of the enterprise to be concerned.
According to a ninth aspect of an embodiment of the present invention, there is provided an electronic apparatus including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the information association method as described above or the two-dimensional code generation method as described above.
According to a tenth aspect of embodiments of the present invention, there is provided a computer-readable storage medium, which when executed by a processor of an electronic device, causes the electronic device to perform the information association method as described above or the two-dimensional code generation method as described above.
According to an eleventh aspect of the embodiments of the present invention, there is provided a computer program product comprising a computer program/instruction which, when executed by a processor, implements the information association method as described above or the two-dimensional code generation method as described above.
The technical scheme provided by the embodiment of the invention at least has the following beneficial effects:
in the embodiment of the invention, user information and enterprise information sent by a server are received, wherein the user information comprises: first signature information of a user and a user identification; the user information is obtained by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused; verifying the first signature information of the user by using the public key of the user, the user identification and the enterprise information; and when the first signature information of the user is verified to be effective information, associating the user identification of the user with the enterprise identification of the enterprise to be concerned. That is, the user side server verifies the signature information of the user by using the public key of the user, the user identification and the enterprise information, and associates the user identification of the user with the enterprise identification of the enterprise when the verification is effective, so that the enterprise side can realize the association between the user and the enterprise to be focused by scanning the two-dimensional code of the user under the condition that the user side has no network or no wifi signal, namely, the public number of the enterprise to be focused is automatically focused. Not only expands the attention mode of paying attention to the public numbers of enterprises, but also improves the attention efficiency of the public numbers of enterprises.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention and do not constitute a undue limitation on the invention.
Fig. 1 is a flowchart of an information association method according to an embodiment of the present invention.
Fig. 2 is a flowchart of a two-dimensional code generating method according to an embodiment of the present invention.
Fig. 3 is another flowchart of an information association method according to an embodiment of the present invention.
Fig. 4 is a flowchart of an information association method according to an embodiment of the present invention.
Fig. 5 is a flowchart of an application example provided in an embodiment of the present invention.
Fig. 6 is a block diagram of an information associating device according to an embodiment of the present invention.
Fig. 7 is a block diagram of a two-dimensional code generating device according to an embodiment of the present invention.
Fig. 8 is another block diagram of an information associating device according to an embodiment of the present invention.
Fig. 9 is a further block diagram of an information associating device according to an embodiment of the present invention.
Fig. 10 is a block diagram of an electronic device according to an embodiment of the present invention.
Fig. 11 is a block diagram of an apparatus for generating a two-dimensional code according to an embodiment of the present invention.
Detailed Description
In order to enable a person skilled in the art to better understand the technical solutions of the present invention, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the accompanying claims.
Fig. 1 is a flowchart of an information association method provided in an embodiment of the present invention, as shown in fig. 1, the information association method is applied to a server of a user application program (server of a user APP, abbreviated as a user side server), and includes the following steps:
Step 101: receiving user information and enterprise information sent by a server, wherein the user information comprises: first signature information of a user and a user identification; the user information is obtained by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused;
step 102: verifying the first signature information of the user by using the public key of the user, the user identification and the enterprise information;
step 103: and when the first signature information of the user is verified to be effective information, associating the user identification of the user with the enterprise identification of the enterprise to be concerned.
The information association method of the present invention can be applied to a terminal, a server, etc., and is not limited herein, and the terminal implementation device can be an electronic device such as a smart phone, a notebook computer, a tablet computer, etc., and is not limited herein.
The following describes in detail the steps of implementing an information association method according to an embodiment of the present invention with reference to fig. 1. The method comprises the following steps:
in step 101, user information and enterprise information sent by a server are received, where the user information includes: first signature information of a user and a user identification; the user information is obtained by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused.
The server in the step is an enterprise server, after receiving user information sent by an enterprise client, the enterprise server obtains the user information by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused. And then, the enterprise server acquires the enterprise information, and then, the enterprise server transmits the user information and the enterprise information to the user side server, namely, the user side server receives the user information and the enterprise information transmitted by the enterprise server.
In step 102, the first signature information of the user is verified using the public key of the user, and the user identification and the enterprise information.
In the step, after receiving user information and enterprise information sent by an enterprise server, a user side server firstly acquires public key information of the user, and then generates second signature information of the user by utilizing the public key of the user, the user identifier and the enterprise information encryption; the encryption method is well known to those skilled in the art, and will not be described herein. And then judging whether the content of the second signature information is consistent with that of the first signature information, if so, determining that the first signature information of the user is valid information, otherwise, if not, determining that the first signature information of the user is invalid information, namely, failure in verification.
The step is based on a user side server, and the stored public key of the user, the private key of the user in the received APP, enterprise information and the like are compared through an encryption algorithm, so that enterprise authentication is completed, and the function that the user can pay attention to the public number of the enterprise to be focused under the condition that no network signal or WiFi signal exists is achieved.
In step 103, when the first signature information of the user is verified to be valid information, the user identification of the user is associated with the enterprise to be focused.
In the step, when the user side server verifies that the first signature information of the user is effective information, the user identification of the user is associated with the enterprise to be focused, namely, the user side server automatically sets the relationship between the user identification of the user and the enterprise to be focused, namely, the user successfully focuses on the public number of the enterprise to be focused.
In the embodiment of the invention, when the user information and the enterprise information sent by the server are received, the public key of the user, the user identification and the enterprise information are utilized to verify the first signature information of the user, and when the first signature information of the user is verified to be effective information, the user identification of the user is associated with the enterprise to be concerned. That is, the user side server verifies the signature information of the user by using the public key of the user, the user identification and the enterprise information, and associates the user identification of the user with the enterprise identification of the enterprise when the verification is effective, so that the enterprise side can realize the association between the user and the enterprise to be focused by scanning the two-dimensional code of the user under the condition that the user side has no network or no wifi signal, namely, the public number of the enterprise to be focused is automatically focused. Not only expands the attention mode of paying attention to the public numbers of enterprises, but also improves the attention efficiency of the public numbers of enterprises.
Referring also to fig. 2, a flowchart of a two-dimensional code generating method according to an embodiment of the present invention is provided, where the method is applied to an application program on a mobile terminal, and may be referred to as a user APP, a user's client or a user side client, and the method includes:
step 201: and acquiring enterprise information of the enterprise to be focused, user identification of the user and user private key information, wherein the enterprise information is obtained by scanning an enterprise two-dimensional code of the public number of the enterprise to be focused.
In this step, when the user wants to pay attention to a public number of an enterprise (or a merchant), and then the mobile terminal uses the two-dimension code scanning function in the mobile terminal APP (such as a mobile phone APP) to scan the two-dimension code of the enterprise to be paid attention to, and by analyzing the two-dimension code of the enterprise, relevant information of the enterprise, such as information of an enterprise identifier, can be obtained from the two-dimension code of the enterprise.
It should be noted that, the APP on the mobile phone supports the public number of the enterprise, and provides a function of locally analyzing the two-dimension code and a function of generating the two-dimension code of the enterprise under the condition that the APP on the mobile phone is network-free or WiFi-signal-free or network signal is poor.
For example, when APP (abbreviated as a company) in a user mobile phone supports focusing on public numbers of enterprises (abbreviated as B company), the a company provides a function of locally analyzing two-dimension codes and a function of generating enterprise two-dimension codes under the condition that no network or network signals are poor, which can be understood as follows: and the company B two-dimensional code provided by the company A can locally analyze and acquire data in the company B two-dimensional code on the APP of the company A to obtain the enterprise information of the company B. The enterprise information may include: enterprise ID, enterprise name, etc., the enterprise information is generated by a company B registered in advance with a company a. That is, the B company registers the company information in advance in the a company; b, the enterprise B acquires the two-dimensional code of the enterprise B from the enterprise A; under the condition that an APP of an A company in a user mobile phone is free of a network, scanning a B enterprise two-dimensional code, analyzing the B enterprise two-dimensional code, and acquiring enterprise data of the B enterprise; and the APP on the user mobile phone encrypts the enterprise data and the user data to generate a two-dimensional code, and the B enterprise uploads the two-dimensional code data through an external interface of the A company.
Step 202: and generating signature information of the user according to the enterprise information, the user identification and the user private key information.
In the step, after obtaining the enterprise information, the mobile terminal APP generates unique signature information through an encryption algorithm by the obtained enterprise information, the obtained user identification and the obtained user private key.
Step 203: and generating a two-dimensional code of the user based on the user identification and the signature information of the user, and displaying the two-dimensional code.
In this embodiment, the mobile terminal APP generates the two-dimensional code of the user according to the user identifier and the signature information, specifically, may generate the two-dimensional code of the user by using a two-dimensional code generator, that is, input the two-dimensional code of the user to be generated into the two-dimensional code generator to generate the two-dimensional code of the user. The two-dimensional code generator is actually two-dimensional code generating software, and the working principle of the two-dimensional code generator is that required user identification and signature information are input into the two-dimensional code generator to generate corresponding two-dimensional codes, and then the generated two-dimensional codes are stored.
Wherein, the two-dimensional code is a digital matrix consisting of a plurality of 0 and 1. The two-dimensional code (2-dimensional bar code) records data symbol information by using a pattern of black and white alternately distributed on a plane (two-dimensional direction) according to a certain rule by a certain specific geometric figure.
In the embodiment of the invention, enterprise information of an enterprise to be focused, user identification of a user and user private key information are acquired, and then signature information of the user is generated according to the enterprise information, the user identification and the user private key information; and generating a two-dimensional code of the user based on the user identification and the signature information of the user. That is, a user may first obtain enterprise information of an enterprise to be focused, then generate signature information of the user based on the enterprise information, a user identifier and the user private key information, generate a two-dimensional code of the user based on the user identifier and the signature information of the user, so as to obtain the signature information and the user identifier of the user when the enterprise APP actively scans the two-dimensional code of the user, so that the enterprise APP sends the obtained user signature information and the user identifier to an enterprise server, and then the enterprise server requests a user side server to verify the validity of the signature information of the user by using the public key of the user, and automatically sets the relationship between the user and the enterprise to be focused to a focused state after the validity is verified. The enterprise server associates the user with the enterprise under the condition that the user side has no network or wifi signal, namely, automatically pays attention to the public number of the enterprise to be paid attention to. Not only expands the attention mode of paying attention to the public numbers of enterprises, but also improves the attention efficiency of the public numbers of enterprises.
Referring also to fig. 3, another flowchart of an information association method provided by an embodiment of the present invention, as shown in fig. 3, the information association method is applied to an enterprise server, and includes the following steps:
step 301: user information sent by a client is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused.
The client in this embodiment is an enterprise Application (APP) client, which is referred to as an enterprise client for short, and the enterprise client is a mobile phone client specially developed by an enterprise, which may also be referred to as an enterprise APP in this embodiment.
In this embodiment, the server (i.e., the enterprise server) obtains the user information sent by the client (i.e., the enterprise client). The enterprise client may actively sweep the two-dimensional code generated by the user to obtain user information of the user, where the user information may include signature information of the user, a user Identification (ID) of the user, and the like, and then send the user information to the enterprise server. Thus, user signature information and user ID of the user are acquired in the enterprise APP, and the two-dimensional code of the user is generated based on the user identification of the user, the user private key and the acquired enterprise information of the enterprise to be focused. The generation process can comprise the following steps: acquiring enterprise information of an enterprise to be focused, and user identification and user private key information of a user, wherein the enterprise information is obtained by scanning an enterprise two-dimensional code of a public number of the enterprise to be focused; generating signature information of the user according to the enterprise information, the user identification and the user private key information; and generating a two-dimensional code of the user based on the user identification and the signature information of the user. The specific implementation process is described in detail below and is not described in detail herein.
Step 302: and sending the user information and the enterprise information to a server so that the server verifies and associates the user information based on the enterprise information.
In this step, the enterprise Server sends the user information and the enterprise information to a Server of the user application program (i.e. a Server of the user APP, abbreviated as a user side Server).
Specifically, in this step, after receiving the user information, the enterprise server first obtains enterprise information of the enterprise to which the user is concerned, where the enterprise information may include an enterprise identifier and the like, and of course, may also include other information, which is not limited in this embodiment. And then, the enterprise server sends the user information and the enterprise information to a user side server so that the user side server verifies and associates the user information based on the enterprise information. When the user side server receives the user information and the enterprise information sent by the enterprise server, the user side server verifies the validity of signature information of the user in the user information by utilizing the public key of the user and the user identification and the enterprise information; and when the signature information of the user is verified to be effective information, the user identification of the user is associated with the enterprise to be concerned, namely, the user side server sets the relationship between the user and the enterprise to be concerned, and after the user and the enterprise are successfully set, communication can be carried out between the user and the enterprise. The specific implementation process is described below, and is not described here again.
Step 303: and receiving information that the user identification of the user and the enterprise to be concerned are successfully associated, wherein the information is sent by the server.
In this embodiment, after the user identifier of the user is successfully associated with the enterprise to be focused, the user side server sends a message of successful association to the enterprise server, that is, the enterprise server receives the message of successful association between the user identifier and the enterprise to be focused, which is sent by the user side server.
In the embodiment of the invention, the user information sent by the client is acquired, and the user information and the enterprise information are sent to the server, so that the server verifies and associates the user information based on the enterprise information. That is, in the embodiment of the invention, after the user information of the user is obtained by scanning the two-dimensional code of the user, the obtained user information and enterprise information are actively sent to the user side server to request the user side server to verify and pay attention, so that the enterprise side realizes the association between the user and the enterprise to be paid attention by scanning the two-dimensional code of the user under the condition that the user side has no network or wifi signal, namely, the user automatically pays attention to the public number of the enterprise to be paid attention. Not only expands the attention mode of paying attention to the public numbers of enterprises, but also improves the attention efficiency of the public numbers of enterprises.
Referring also to fig. 4, a further flowchart of a method for associating information in an embodiment of the present invention is provided, where the method is applied to an enterprise APP, abbreviated as an enterprise client, and the method includes:
step 401: scanning a two-dimensional code of a user to obtain user information, wherein the two-dimensional code of the user is generated based on a user identification of the user, a user private key and acquired enterprise information of an enterprise to be focused. The user information includes: signature information of the user and user identification.
In the step, the client of the enterprise APP can actively scan the two-dimensional code generated by the user to acquire the signature information and the user identification of the user, so that the signature information and the user identification of the user can be obtained from the client of the enterprise APP.
In this embodiment, the two-dimensional code of the user is generated by a client of the user application program (i.e., a client of the user APP, abbreviated as a user side client) based on the user identifier of the user, the user private key and the acquired enterprise information of the enterprise to be focused. The user information includes: signature information of the user and user identification.
Step 402: and sending the user information to a first server, so that the first server requests a second server to verify the validity of the signature information of the user based on the user identification, and when the verification is valid, the second server associates the user identification of the user with an enterprise to be concerned.
In the step, a client of an enterprise APP uploads collected user information to a first server (namely an enterprise guest server) so that the first server requests a second server (a user side server) to verify the validity of signature information of a user based on a user identifier, namely, the user identifier and the enterprise information are utilized to verify the signature information of the user; and when the signature information is verified to be valid, the second server associates the user identification of the user with the enterprise.
In the embodiment of the invention, an enterprise client actively scans a two-dimensional code of a user to obtain user information comprising user signature information and user identification, and sends the user information to an enterprise server, so that the enterprise server sends the user information and the enterprise information to a user side server, the user side server is requested to verify the validity of the signature information of the user by utilizing a public key of the user, and when the verification is valid, the user side server associates the user identification of the user with an enterprise to be focused. The enterprise client side actively scans the two-dimensional code of the user, so that the enterprise server can verify the validity of the signature information of the user by requesting the server at the user side to utilize the public key of the user under the condition that the user side does not have a network or wifi signal, and the user is associated with the enterprise to be focused, namely, the public number of the enterprise is focused automatically. Not only expands the attention mode of paying attention to the public numbers of enterprises, but also improves the attention efficiency of the public numbers of enterprises.
Referring to fig. 5, a schematic diagram of an application example of an information association method according to an embodiment of the present invention is shown, where the method involves an execution body: user APP (i.e., a client of the user APP), enterprise APP (i.e., a client of the enterprise APP), a server of the user APP, and an enterprise server, the embodiment taking the operation of the user without network signals and wifi signals as an example, the method comprises:
step 501: and the user APP actively scans the enterprise two-dimensional code of the public number of the enterprise to be concerned to obtain enterprise information.
In the step, when a user wants to pay attention to a certain enterprise public number, the user can acquire the related information of the enterprise from the enterprise two-dimension code when scanning the enterprise two-dimension code through a two-dimension code scanning function in the mobile phone APP.
It should be noted that, the APP on the mobile phone supports the public number of the enterprise, and provides a function of locally analyzing the two-dimension code and a function of generating the two-dimension code of the enterprise under the condition that the APP on the mobile phone is network-free or WiFi-signal-free or network signal is poor.
Step 502: and the user APP generates signature information of the user according to the enterprise information, the user identification of the user and the user private key information.
In the step, a user generates unique signature information, namely signature information of the user through an encryption algorithm by utilizing a mobile phone APP, and merchant information, a user identification ID of the user and a private key of the user.
Step 503: and the user APP generates a two-dimensional code according to the user identification and the signature information of the user, and displays the two-dimensional code.
Step 504: the enterprise APP can actively sweep the two-dimensional code of the user to obtain user information, wherein the user information comprises signature information (namely first signature information) of the user and a user identifier.
In this step, the enterprise APP has the signature information and the user identifier of the user.
Step 505: the enterprise APP uploads the collected user information to an enterprise server (i.e., enterprise server).
Step 506: the enterprise server transmits the user information and the enterprise information to a server of the user APP (namely a server of the user APP).
In this step, the enterprise server requests a server open interface of the user APP, and uploads information (i.e., first signature information) such as the related data user ID, enterprise information, and user signature.
Step 507: and the server of the user APP encrypts the received user identification and enterprise information by using the public key of the user to generate second signature information.
Step 508: comparing, by the server of the user APP, whether the content of the second signature information is consistent with the content of the first signature information, and if so, executing step 509; otherwise, step 511 is performed.
In the step, the server of the user APP compares the generated second signature information with the first user signature uploaded by the enterprise server, if the second signature information is consistent with the first user signature uploaded by the enterprise server, the signature information is valid, otherwise, the signature information is invalid.
Step 509: the server of the user APP automatically sets the relationship between the user and the enterprise into a concerned state, namely, the user identification of the user is associated with the enterprise identification of the enterprise.
Step 510: the server of the user APP returns the result of the successful association to the enterprise server.
Step 511: the server of the user APP sends failure information that the signature is invalid to the enterprise server. I.e. failure of interest.
In the embodiment of the invention, when a user has a network signal through a mobile terminal APP, the user can acquire the enterprise information of an enterprise to be focused, then generates the signature information of the user based on the enterprise information, the user identification and the user private key information, then generates and displays the two-dimensional code of the user, when the enterprise APP actively scans the two-dimensional code of the user, acquires the signature information and the user identification of the user, and sends the acquired user signature information and the user identification to an enterprise server, and the enterprise server requests the server of the user APP to verify the validity of the user signature by using the public key of the user, and automatically sets the relationship between the user and the enterprise into a focused state after verifying that the signature information is valid. The enterprise server actively associates the user with the enterprise by scanning the two-dimensional code generated by the user under the condition that the user side has no network or wifi signal, even if the user automatically pays attention to the public number of the enterprise. Not only expands the attention mode of paying attention to the public numbers of enterprises, but also improves the attention efficiency of the public numbers of enterprises.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the present disclosure is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required for the present invention.
Referring to fig. 6, another block diagram of an information associating device according to an embodiment of the present invention is shown. Referring to fig. 6, the apparatus includes: a receiving module 601, a verifying module 602 and an associating module 603, wherein,
the receiving module 601 is configured to receive user information and enterprise information sent by a server, where the user information includes: the method comprises the steps of obtaining first signature information and user identification of a user, wherein the user information is obtained by scanning a two-dimensional code of the user, and the two-dimensional code of the user is generated based on the user identification of the user, a user private key and enterprise information of an enterprise to be focused;
the verification module 602 is configured to verify the first signature information of the user using the public key of the user, the user identifier and the enterprise information;
The associating module 603 is configured to associate a user identifier of the user with an enterprise identifier of the enterprise to be focused when the first signature information of the user is verified to be valid information.
Optionally, in another embodiment, based on the above embodiment, the verification module 602 includes: a generation module and a determination module (not shown), wherein,
the generation module is used for generating second signature information of the user by utilizing the public key of the user, the user identification and the enterprise information encryption;
the determining module is used for determining that the first signature information of the user is valid information when the second signature information is consistent with the content of the first signature information.
Optionally, in another embodiment, on the basis of the foregoing embodiment, the apparatus further includes: a first transmitting module (not shown), wherein,
the first sending module is used for sending information of successful attention of the user and the enterprise to be attended to the server after the association module associates the user identification of the user with the enterprise identification of the enterprise to be attended to.
Optionally, in another embodiment, on the basis of the foregoing embodiment, the apparatus further includes: a second transmitting module (not shown), wherein,
And the second sending module is used for sending verification failure information to the enterprise server when the first signature information of the user is verified to be invalid information.
Referring also to fig. 7, a block diagram of a two-dimensional code generating device according to an embodiment of the present invention is shown. Referring to fig. 7, the apparatus includes: an acquisition module 701, a first generation module 702 and a second generation module 703, wherein,
the acquiring module 701 is configured to acquire enterprise information of an enterprise to be focused, and user identification and user private key information of a user, where the enterprise information is obtained by scanning an enterprise two-dimensional code of a public number of the enterprise to be focused;
the first generating module 702 is configured to generate signature information of the user according to the enterprise information, the user identifier, and the user private key information;
the second generating module 703 is configured to generate a two-dimensional code of the user based on the user identifier and the signature information of the user, and display the two-dimensional code.
Optionally, in another embodiment, based on the foregoing embodiment, the first generating module 702 is specifically configured to generate signature information of the user through an encryption algorithm according to the enterprise information, the user identifier, and private key information of the user.
Referring to fig. 8, another block diagram of an information associating device according to an embodiment of the present invention is shown. Referring to fig. 8, the apparatus includes: an acquisition module 801, a transmission module 802 and a reception module 8603, wherein,
the obtaining module 801 is configured to obtain user information sent by a client, where the user information is obtained by the client by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identifier of the user, a user private key, and enterprise information of an enterprise to be focused;
the sending module 802 is configured to send the user information and the enterprise information to a server, so that the server verifies and associates the user information based on the enterprise information;
the receiving module 803 is configured to receive information that the user identifier of the user and the enterprise identifier of the enterprise to be focused sent by the server are successfully associated.
Referring to fig. 9, another block diagram of an information associating device according to an embodiment of the present invention is shown. Referring to fig. 9, the apparatus includes: a scanning module 901 and a transmitting module 902, wherein,
the scanning module 901 is configured to scan a two-dimensional code of a user to obtain user information, where the two-dimensional code of the user is generated based on a user identifier of the user, a user private key, and enterprise information of an enterprise to be focused. The user information includes: signature information of a user and a user identifier;
The sending module 902 is configured to send the user information to a first server, so that the first server requests a second server to verify the validity of the signature information of the user based on a user identifier, and when the verification is valid, the second server associates the user identifier of the user with the enterprise identifier of the enterprise to be focused.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Optionally, an embodiment of the present invention further provides an electronic device, including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the information association method as described above or the two-dimensional code generation method as described above.
Optionally, an embodiment of the present invention further provides a computer readable storage medium, where instructions in the computer readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the information association method as described above or the two-dimensional code generation method as described above. Alternatively, the computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
Optionally, an embodiment of the present invention further provides a computer program product, including a computer program/instruction, which when executed by a processor implements the information association method as described above or the two-dimensional code generation method as described above.
Fig. 10 is a block diagram of an electronic device 1000 according to an embodiment of the present invention. For example, the electronic device 1000 may be a mobile terminal or a server, and in the embodiment of the present invention, the electronic device is taken as an example of the mobile terminal. For example, electronic device 1000 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 10, an electronic device 1000 may include one or more of the following components: a processing component 1002, a memory 1004, a power component 1006, a multimedia component 1008, an audio component 1010, an input/output (I/O) interface 1012, a sensor component 1014, and a communication component 1016.
The processing component 1002 generally controls overall operation of the electronic device 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1002 can include one or more processors 1020 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1002 can include one or more modules that facilitate interaction between the processing component 1002 and other components. For example, the processing component 1002 can include a multimedia module to facilitate interaction between the multimedia component 1008 and the processing component 1002.
The memory 1004 is configured to store various types of data to support operations at the device 1000. Examples of such data include instructions for any application or method operating on the electronic device 1000, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1004 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 1006 provides power to the various components of the electronic device 1000. The power components 1006 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 1000.
The multimedia component 1008 includes a screen between the electronic device 1000 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia assembly 1008 includes a front-facing camera and/or a rear-facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 1000 is in an operational mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 1010 is configured to output and/or input audio signals. For example, the audio component 1010 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 1000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in memory 1004 or transmitted via communication component 1016. In some embodiments, the audio component 1010 further comprises a speaker for outputting audio signals.
The I/O interface 1012 provides an interface between the processing assembly 1002 and peripheral interface modules, which may be a keyboard, click wheel, buttons, and the like. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 1014 includes one or more sensors for providing status assessment of various aspects of the electronic device 1000. For example, the sensor assembly 1014 may detect an on/off state of the device 1000, a relative positioning of components such as a display and keypad of the electronic device 1000, the sensor assembly 1014 may also detect a change in position of the electronic device 1000 or a component of the electronic device 1000, the presence or absence of a user's contact with the electronic device 1000, an orientation or acceleration/deceleration of the electronic device 1000, and a change in temperature of the electronic device 1000. The sensor assembly 1014 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. The sensor assembly 1014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1014 can also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1016 is configured to facilitate communication between the electronic device 1000 and other devices, either wired or wireless. The electronic device 1000 may access a wireless network based on a communication standard, such as WiFi, an operator network (e.g., 2G, 3G, 4G, or 5G), or a combination thereof. In one exemplary embodiment, the communication component 1016 receives broadcast signals or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1016 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an embodiment, the electronic device 1000 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the information association method or the two-dimensional code generation method as shown above.
In an embodiment, a computer-readable storage medium is also provided, such as a memory 1004 including instructions executable by the processor 1020 of the electronic device 1000 to perform the information association method or the two-dimensional code generation method shown above. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In an embodiment, a computer program product is also provided, which when instructions in the computer program product are executed by the processor 1020 of the electronic device 1000, causes the electronic device 1000 to perform the information association method or the two-dimensional code generation method shown above.
Fig. 11 is a block diagram of an apparatus 1100 for information association provided by an embodiment of the present invention. For example, apparatus 1100 may be provided as a server. Referring to FIG. 11, apparatus 1100 includes a processing component 1122 that further includes one or more processors and memory resources, represented by memory 1132, for storing instructions, such as application programs, executable by processing component 1122. The application programs stored in memory 1132 may include one or more modules each corresponding to a set of instructions. Further, processing component 1122 is configured to execute instructions to perform the methods described above.
The apparatus 1100 may also include a power component 1126 configured to perform power management of the apparatus 1100, a wired or wireless network interface 1150 configured to connect the apparatus 1100 to a network, and an input-output (I/O) interface 1158. The device 1100 may operate based on an operating system stored in the memory 1132, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
The user information (including but not limited to user equipment information, user personal information, etc.), related data, etc. related to the present application are all information authorized by the user or authorized by each party.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (13)
1. An information association method, the method comprising:
receiving user information and enterprise information sent by a server, wherein the user information comprises: first signature information of a user and a user identification; the user information is obtained by scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused;
Verifying the first signature information of the user by using the public key of the user, the user identification and the enterprise information;
and when the first signature information of the user is verified to be effective information, associating the user identification of the user with the enterprise identification of the enterprise to be concerned.
2. The information association method according to claim 1, wherein the verifying the first signature information of the user using the public key of the user, the user identification, and the enterprise information includes:
generating second signature information of the user by utilizing the public key of the user, the user identification and the enterprise information encryption;
and if the second signature information is consistent with the content of the first signature information, determining the first signature information of the user as effective information.
3. The information association method according to claim 1, wherein after associating the user identification of the user with the enterprise identification of the enterprise to be focused, the method further comprises:
and sending information of success of the user and the enterprise to be concerned to the server.
4. The two-dimensional code generation method is characterized by comprising the following steps of:
Acquiring enterprise information of an enterprise to be focused, and user identification and user private key information of a user, wherein the enterprise information is obtained by scanning an enterprise two-dimensional code of a public number of the enterprise to be focused;
generating signature information of the user according to the enterprise information, the user identification and the user private key information;
and generating a two-dimensional code of the user based on the user identification and the signature information of the user, and displaying the two-dimensional code.
5. The two-dimensional code generation method according to claim 4, wherein the generating signature information of the user according to the enterprise information, the user identification, and the user private key comprises:
and generating signature information of the user through an encryption algorithm according to the enterprise information, the user identification and the private key information of the user.
6. An information association method, the method comprising:
acquiring user information sent by a client, wherein the user information is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused;
Transmitting the user information and the enterprise information to a server so that the server verifies and associates the user information based on the enterprise information;
and receiving information that the user identification of the user and the enterprise to be concerned are successfully associated, wherein the information is sent by the server.
7. An information association method, the method comprising:
scanning a two-dimensional code of a user to obtain user information, wherein the two-dimensional code of the user is generated based on a user identification of the user, a user private key and enterprise information of an enterprise to be focused; the user information includes: signature information of a user and a user identifier;
and sending the user information to a first server, so that the first server requests a second server to verify the validity of the signature information of the user based on the user identification, and when the verification is valid, the second server associates the user identification of the user with the enterprise to be concerned.
8. An information associating apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving the user information and the enterprise information sent by the server, and the user information comprises: the method comprises the steps of obtaining first signature information and user identification of a user, wherein the user information is obtained by scanning a two-dimensional code of the user, and the two-dimensional code of the user is generated based on the user identification of the user, a user private key and enterprise information of an enterprise to be focused;
The verification module is used for verifying the first signature information of the user by utilizing the public key of the user, the user identification and the enterprise information;
and the association module is used for associating the user identification of the user with the enterprise identification of the enterprise to be focused when the first signature information of the user is verified to be effective information.
9. A two-dimensional code generation apparatus, characterized in that the apparatus comprises:
the system comprises an acquisition module, a user identification module and a user private key module, wherein the acquisition module is used for acquiring enterprise information of an enterprise to be focused, and user identification and user private key information of a user, wherein the enterprise information is obtained by scanning an enterprise two-dimensional code of a public number of the enterprise to be focused;
the first generation module is used for generating signature information of the user according to the enterprise information, the user identification and the user private key information;
the second generation module is used for generating the two-dimensional code of the user based on the user identification and the signature information of the user and displaying the two-dimensional code.
10. An information associating apparatus, characterized in that the apparatus comprises:
the acquisition module is used for acquiring user information sent by a client, wherein the user information is obtained by the client through scanning a two-dimensional code of a user, and the two-dimensional code of the user is generated based on a user identifier of the user, a user private key and enterprise information of an enterprise to be focused;
The sending module is used for sending the user information and the enterprise information to a server so that the server can verify and correlate the user information based on the enterprise information;
and the receiving module is used for receiving the information that the user identification of the user and the enterprise identification of the enterprise to be focused are successfully associated, which is sent by the server.
11. An information associating apparatus, characterized in that the apparatus comprises:
the scanning module is used for scanning the two-dimensional code of the user to obtain user information, and the two-dimensional code of the user is generated based on the user identification of the user, the user private key and enterprise information of the enterprise to be focused; the user information includes: signature information of a user and a user identifier;
and the sending module is used for sending the user information to a first server so that the first server requests a second server to verify the validity of the signature information of the user based on the user identification, and when the verification is valid, the second server associates the user identification of the user with the enterprise identification of the enterprise to be concerned.
12. An electronic device, comprising:
a processor;
A memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the information association method of any one of claims 1 to 3, 6 and 7 or the two-dimensional code generation method of any one of claims 4 and 5.
13. A computer-readable storage medium, characterized in that instructions in the computer-readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the information association method of any one of claims 1 to 3, 6 and 7 or the two-dimensional code generation method of any one of claims 4 and 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211129091.XA CN115484224B (en) | 2022-09-16 | 2022-09-16 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211129091.XA CN115484224B (en) | 2022-09-16 | 2022-09-16 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115484224A CN115484224A (en) | 2022-12-16 |
CN115484224B true CN115484224B (en) | 2023-09-29 |
Family
ID=84392718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211129091.XA Active CN115484224B (en) | 2022-09-16 | 2022-09-16 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115484224B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205664A (en) * | 2015-09-25 | 2015-12-30 | 中城智慧科技有限公司 | Novel offline payment method |
CN105407079A (en) * | 2015-09-25 | 2016-03-16 | 中城智慧科技有限公司 | Novel terminal safety soft secret key management method |
CN107657367A (en) * | 2017-09-18 | 2018-02-02 | 福建凯斯诺物联科技股份有限公司 | Retail achievement statistical method based on Quick Response Code |
CN109729046A (en) * | 2017-10-31 | 2019-05-07 | 北京京东尚科信息技术有限公司 | Two-dimensional code scanning method and terminal, authentication method and server and service system |
CN109886006A (en) * | 2019-02-28 | 2019-06-14 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information source checking method and device based on two dimensional code |
WO2020024710A1 (en) * | 2018-08-02 | 2020-02-06 | 阿里巴巴集团控股有限公司 | Method and apparatus for generating payment two-dimensional code |
WO2020073715A1 (en) * | 2018-10-12 | 2020-04-16 | 阿里巴巴集团控股有限公司 | Two-dimensional code anti-counterfeiting method, device and system based on security application |
WO2020098419A1 (en) * | 2018-11-16 | 2020-05-22 | 阿里巴巴集团控股有限公司 | Method and apparatus for providing security identity information, and method and apparatus for acquiring security identity information |
CN112364333A (en) * | 2020-11-30 | 2021-02-12 | 中国银行股份有限公司 | Method and system for providing service by using two-dimension code and one-code platform |
CN112416642A (en) * | 2020-11-25 | 2021-02-26 | 国能日新科技股份有限公司 | Remote operation and maintenance method and device |
CN112737769A (en) * | 2020-12-21 | 2021-04-30 | 浙江大华技术股份有限公司 | Password resetting method and device, storage medium and electronic device |
CN114298258A (en) * | 2021-12-21 | 2022-04-08 | 北京格灵深瞳信息技术股份有限公司 | Offline two-dimensional code generation method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200279270A1 (en) * | 2019-02-28 | 2020-09-03 | Dan Lieberman | Identity-backed authentication and authorization system |
-
2022
- 2022-09-16 CN CN202211129091.XA patent/CN115484224B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205664A (en) * | 2015-09-25 | 2015-12-30 | 中城智慧科技有限公司 | Novel offline payment method |
CN105407079A (en) * | 2015-09-25 | 2016-03-16 | 中城智慧科技有限公司 | Novel terminal safety soft secret key management method |
CN107657367A (en) * | 2017-09-18 | 2018-02-02 | 福建凯斯诺物联科技股份有限公司 | Retail achievement statistical method based on Quick Response Code |
CN109729046A (en) * | 2017-10-31 | 2019-05-07 | 北京京东尚科信息技术有限公司 | Two-dimensional code scanning method and terminal, authentication method and server and service system |
WO2020024710A1 (en) * | 2018-08-02 | 2020-02-06 | 阿里巴巴集团控股有限公司 | Method and apparatus for generating payment two-dimensional code |
WO2020073715A1 (en) * | 2018-10-12 | 2020-04-16 | 阿里巴巴集团控股有限公司 | Two-dimensional code anti-counterfeiting method, device and system based on security application |
WO2020098419A1 (en) * | 2018-11-16 | 2020-05-22 | 阿里巴巴集团控股有限公司 | Method and apparatus for providing security identity information, and method and apparatus for acquiring security identity information |
CN109886006A (en) * | 2019-02-28 | 2019-06-14 | 尤尼泰克(嘉兴)信息技术有限公司 | A kind of information source checking method and device based on two dimensional code |
CN112416642A (en) * | 2020-11-25 | 2021-02-26 | 国能日新科技股份有限公司 | Remote operation and maintenance method and device |
CN112364333A (en) * | 2020-11-30 | 2021-02-12 | 中国银行股份有限公司 | Method and system for providing service by using two-dimension code and one-code platform |
CN112737769A (en) * | 2020-12-21 | 2021-04-30 | 浙江大华技术股份有限公司 | Password resetting method and device, storage medium and electronic device |
CN114298258A (en) * | 2021-12-21 | 2022-04-08 | 北京格灵深瞳信息技术股份有限公司 | Offline two-dimensional code generation method |
Also Published As
Publication number | Publication date |
---|---|
CN115484224A (en) | 2022-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104125067B (en) | Account and token secret key binding method and device | |
CN106453245B (en) | Verify the method and device of identity | |
CN109039990B (en) | Behavior verification method and device based on verification code | |
KR20160048707A (en) | Method and device for certification of operation | |
CN111368232A (en) | Password sharing reflux method and device, electronic equipment and storage medium | |
CN106375096B (en) | short message verification method and device | |
CN107230060B (en) | Account loss reporting method and device | |
CN110765434A (en) | Identity authentication method and device, electronic equipment and storage medium | |
CN104715337A (en) | Attendance method, and attendance management method and device | |
CN106204029A (en) | The method and apparatus of Quick Response Code payment | |
CN104010094A (en) | Information sending method and device in voice services | |
CN107959757B (en) | User information processing method and device, APP server and terminal equipment | |
CN110619097A (en) | Two-dimensional code generation method and device, electronic equipment and storage medium | |
CN111917728A (en) | Password verification method and device | |
CN109246094B (en) | User terminal verification method, device and storage medium | |
CN105681261A (en) | Security authentication method and apparatus | |
CN106651379A (en) | Payment method and device | |
CN109873823B (en) | Verification method and device, electronic equipment and storage medium | |
CN115484224B (en) | Information association method, two-dimensional code generation method, device, electronic equipment and medium | |
CN114124462B (en) | Verification code transmission method and device, electronic equipment and storage medium | |
CN106712960B (en) | Processing method and device of verification code information | |
CN106408304B (en) | Account security management method and device | |
CN109255601B (en) | Terminal bus card processing method and device | |
CN107241318B (en) | Account loss reporting method and device | |
CN107704295B (en) | Method, device and storage medium for setting self-starting authority |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |