CN101834726A - Safe encryption method based on bi-dimensional codes - Google Patents

Safe encryption method based on bi-dimensional codes Download PDF

Info

Publication number
CN101834726A
CN101834726A CN201010131021A CN201010131021A CN101834726A CN 101834726 A CN101834726 A CN 101834726A CN 201010131021 A CN201010131021 A CN 201010131021A CN 201010131021 A CN201010131021 A CN 201010131021A CN 101834726 A CN101834726 A CN 101834726A
Authority
CN
China
Prior art keywords
document
dimension code
digital signature
encryption method
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010131021A
Other languages
Chinese (zh)
Inventor
刘伟强
杨辉
张冬
张�浩
邱然
朱大为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU GUANGDATONG ELECTRONIC TECHNOLOGY CO LTD
Original Assignee
GUANGZHOU GUANGDATONG ELECTRONIC TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU GUANGDATONG ELECTRONIC TECHNOLOGY CO LTD filed Critical GUANGZHOU GUANGDATONG ELECTRONIC TECHNOLOGY CO LTD
Priority to CN201010131021A priority Critical patent/CN101834726A/en
Publication of CN101834726A publication Critical patent/CN101834726A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a safe encryption method based on bi-dimensional codes, comprising the following steps: performing encryption operation on a file at an encryption end by an MD5 algorithm, and obtaining a digital signature represented by a bi-dimensional code picture after encryption; identifying and reading out the integral quantity of the digital signature in step 1 at a decryption end; and performing encryption operation on the file again by the MD5 algorithm so as to obtain the integral quantity, and completing the decryption process for the file if the identified and read integral quantity is the same with the integral quantity obtained from encryption operation.

Description

Safe encryption method based on two-dimension code
Technical field
The present invention relates to a kind of safe encryption method based on two-dimension code.
Background technology
Two-dimension code (2-dimensional bar code) is with certain specific geometric figure chequered with black and white graphic recording data symbol information that (being on the two-dimensional directional) distributes according to certain rules on the plane; On coding, utilize " 0 ", the notion of " 1 " bit stream that constitutes the computer-internal logical foundations dexterously, use several and the corresponding geometrical body of binary system to represent the literal numerical information, handle automatically with realization information by image input device or photoelectric scanning device automatically identifying and reading.
Two-dimension code has following characteristics: 1. high density is encoded, and information capacity is big, but 1850 capitalizations of outfit as many as or 2710 numerals or 1108 bytes, or more than 500 Chinese character, higher approximately tens times than common bar code information capacity.2. coding range is wide, and this bar code can digitized information be encoded picture, sound, literal, signature, fingerprint etc., shows with bar code; Can represent the multilingual literal; But presentation video data.3. fault-tolerant ability is strong, has error correction, and this makes two-dimensional bar code because of perforation, stained etc. when causing local damage, can correctly obtain recognition in the same old way, but damaged area reaches 50% recovering information still.4. reliability of decode height, it is more much lower than common bar code decoding error rate 2/1000000ths, and the error rate is no more than 1/10000000th.5. can introduce encryption measures: confidentiality, antifalsification are good.6. cost is low, easily makes durable.In sum, characteristics such as two-dimensional bar code has that storage capacity is big, confidentiality is high, tracking property height, anti-damage property is strong, redundant is big, cost is cheap, and these characteristics are specially adapted to aspects such as list, safe and secret, tracking, license, stock taking, data redundant.
Chinese invention patent application CN1976383A (application number 200610155158.1) discloses a kind of electronci file antifake identifying system, this system mainly comprises scanner, anti-fake certificate machine and PC terminating machine, wherein the anti-fake certificate machine is used for gated sweep instrument scanning electron document, add the digital watermark information of encrypting in the time of the scanner scanning image, the image after will encrypting at last sends to the PC terminating machine.Carried out anti-fake encrpted although this patent has made full use of the technology of digital watermarking to the transmission of document, make the electron image archives in local, transmission course unalterable feature, the image that has guaranteed document is consistent foreground and backstage, but it still exists following shortcoming: the hardware cost height of whole system; The transmission of document must be carried out with image, otherwise just can't carry out false proof; If want the document after the transmission is carried out superencipher, can't realize substantially.
Chinese invention patent application CN101281581A (application number 200710152342.5) discloses a kind of method of checking contents of paper file whether to be distorted, this invention is used in combination two-dimension code with digital signature, specifically be that the content of electronic document current page, the page number information and the content of pages signature of current page are formed electronic data with set form, electronic data is formed two-dimension code, being placed on the footer blank space of electronic document current page, is paper file with the electronic document printout; Can guarantee the true and reliable of contents of paper file, prevent to be difficult to after contents of paper file from being distorted to differentiate, and can guarantee that by this mechanism document drafts the people to the approval of contents of paper file and undeniable; Solved the electronic document printout and be the problem of document content authenticity and validation verification behind the paper file.But this invention still exists following shortcoming: this encryption method can only not mentioned for the file encryption of multipage at the single page file encryption; Require the two-dimension code on the paper document to reach certain definition, also require the blank space of each page that corresponding space can both be provided.
Summary of the invention
The objective of the invention is to overcome the shortcoming of prior art with not enough, a kind of safe encryption method based on two-dimension code is provided, this scheme can be carried out the encryption of the secondary overall situation to document, and need not to carry out the secondary conversion of document format in ciphering process, and hardware cost is almost nil.
Purpose of the present invention is achieved through the following technical solutions: the safe encryption method based on two-dimension code may further comprise the steps:
Step 1, encrypt end, adopting the MD5 algorithm that document is carried out cryptographic calculation, drawing a digital signature that characterizes with two-dimension code image after the encryption;
Step 2, in decrypting end, distinguish out the integer value of the described digital signature of step 1; Adopt the MD5 algorithm to carry out cryptographic calculation to document again, thereby draw an integer value; If the described integer value of distinguishing out is identical with the integer value that cryptographic calculation draws, then finish the decrypting process of document.
In above-mentioned safe encryption method based on two-dimension code, also comprise step 3, decipher after user's reply or modification as if document, to being given an written reply or amended document adopts the MD5 algorithm to carry out cryptographic calculation, thereby draw a digital signature that characterizes with two-dimension code image.
Described digital signature is kept in the other a document.
Described document transmits between encryption end, decrypting end with former document or with the form of other text formattings outside the former document.
The present invention has following advantage and effect with respect to prior art:
1, except the basic PC terminal of needs is moved related software and online, only need the mobile phone of usual usefulness can finish ciphering process; Practicality is very strong, can effectively utilize the existing on hand equipment of user, and need not add unnecessary equipment.Therefore almost nil on the hardware cost.
2, in whole encryption, deciphering, superencipher process, document can be to transmit between encryption end, decrypting end with the form of former document, also can be to transmit between encryption end, decrypting end with the form of other text formattings outside the former document; Therefore in encrypted process, need not carry out the secondary conversion of document format, also needn't leave no choice but transmit with image.
3,, can carry out superencipher to the document after the transmission easily in decrypting end.
4, adopt the MD5 algorithm that document is carried out the overall situation and encrypt, all file contents are revised and can both be differentiated.
5, the digital signature of encryption back generation is kept at other a document with the form of two-dimension code image, thereby has guaranteed enough spaces.
Description of drawings
Fig. 1 is the flow chart of file encryption of the present invention;
Fig. 2 is the flow chart of document deciphering of the present invention;
Fig. 3 is the flow chart of document superencipher of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with embodiment and accompanying drawing, but embodiments of the present invention are not limited thereto.
Embodiment
As shown in Figure 1, 2, the present invention mainly is divided into the ciphering process of document, the decrypting process of document and the superencipher process three parts of document when specifically implementing.
1) encrypting end, the ciphering process of document adopts the MD5 algorithm, encrypts the back and generates a digital signature that saves as a document part with the two-dimension code form; Specifically may further comprise the steps:
Step 11, to intending the full content of encrypted document, carry out the computing of data cover, make that the byte length (is unit with byte) of data behind the cover is 56 to the result of 64 complementations.
Need to prove, the full content of intending encrypted document described in this step is meant the modification time word string of whole part of document (no matter how many pages or leaves are arranged) and the document, for example whole part of document is " hello world ", the modification time of the document is " 2010-1-21 10:23:02 ", and the full content of intending encrypted document so is " helloworld edited in 2010-1-21 10:23:02 ".
Step 12, behind cover the back additional data length of data.Be specially: with the original length (is unit with bit) of one 64 integer representation data, with 8 bytes of this numeral by low level preceding, high-order after order be attached to cover after the back of data.After this step process, the part of intending encrypted document by: original plan encrypted document, the modification time of document, step 11 the data of cover and the data length that this step is added.
The informative abstract of step 13, the plan encrypted document of calculating after step 12 is handled.Be specially: with four 32 integer variables (A, B, C, D) computing information summary, each variable is initialized to the following numerical value of representing with hexadecimal number, and wherein the byte of low level in front.
word?A:01?23?45?67
word?B:89?ab?cd?ef
word?C:fe?dc?ba?98
word?D:76?54?32?10
The byte of noting low level refers on the platform of small end syllable sequence the arrangement mode of byte in the internal memory in front.
Step 14, four step-by-step operation function and four functions that are respectively applied for the four-wheel conversion that algorithm is basic of definition are done the four-wheel loop computation to the plan encrypted document after handling through step 12 then.
Unique digital signature signature of encrypted document is intended in step 15, output; This digital signature is kept in another part document with the form of two-dimension code image and original plan encrypted document co-exists in together.
2) in decrypting end, encrypted document only needs to distinguish out one 128 the integer value that is attached to the last digital signature signature of document by the two-dimension code identification software earlier in the needs deciphering; And then document is carried out the cryptographic calculation (being step 11-15) that above-mentioned employing MD5 algorithm carries out, thereby draw one 128 integer value by software.If this integer value of two 128 (128 the integer value that 128 integer value and the cryptographic calculation of distinguishing out draws) is identical, prove that then the document through distorting, finishes the decrypting process of document.If different, prove that then the document is through distorting.
3) the superencipher process of document.After the document deciphering, if the user need give an written reply or revise document, the document that the user only needs will give an written reply or revise by software carries out the cryptographic calculation (being step 11-15) that above-mentioned employing MD5 algorithm carries out, and cryptographic calculation drawn the digital signature (also being 128 integer values) that characterizes with two-dimension code, in another part document of preserving with the form of two-dimension code image and original plan encrypted document be returned to the original author together and get final product.
In above-mentioned encryption, deciphering and superencipher process, document can also can transmit between encryption end, decrypting end with the form of other text formattings outside the former document with the form of former document.
The foregoing description is a preferred implementation of the present invention; but embodiments of the present invention are not restricted to the described embodiments; other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; all should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (5)

1. based on the safe encryption method of two-dimension code, it is characterized in that may further comprise the steps:
Step 1, encrypt end, adopting the MD5 algorithm that document is carried out cryptographic calculation, drawing a digital signature that characterizes with two-dimension code image after the encryption;
Step 2, in decrypting end, distinguish out the integer value of the described digital signature of step 1; Adopt the MD5 algorithm to carry out cryptographic calculation to document again, thereby draw an integer value; If the described integer value of distinguishing out is identical with the integer value that cryptographic calculation draws, then finish the decrypting process of document.
2. the safe encryption method based on two-dimension code according to claim 1 is characterized in that also comprising:
Step 3, if document deciphering after user's reply or revise, to being given an written reply or amended document adopts the MD5 algorithm to carry out cryptographic calculation, thereby draws a digital signature that characterizes with two-dimension code image.
3. the safe encryption method based on two-dimension code according to claim 1 and 2 is characterized in that: described digital signature is kept in the other a document.
4. the safe encryption method based on two-dimension code according to claim 1 and 2 is characterized in that: described document transmits between encryption end, decrypting end with former document or with the form of other text formattings outside the former document.
5. the safe encryption method based on two-dimension code according to claim 1 and 2 is characterized in that: described digital signature is 128 integer values.
CN201010131021A 2010-03-19 2010-03-19 Safe encryption method based on bi-dimensional codes Pending CN101834726A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010131021A CN101834726A (en) 2010-03-19 2010-03-19 Safe encryption method based on bi-dimensional codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010131021A CN101834726A (en) 2010-03-19 2010-03-19 Safe encryption method based on bi-dimensional codes

Publications (1)

Publication Number Publication Date
CN101834726A true CN101834726A (en) 2010-09-15

Family

ID=42718664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010131021A Pending CN101834726A (en) 2010-03-19 2010-03-19 Safe encryption method based on bi-dimensional codes

Country Status (1)

Country Link
CN (1) CN101834726A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073977A (en) * 2010-12-13 2011-05-25 中国联合网络通信集团有限公司 Methods and equipment for generating and authenticating digital signatures and digital signature system
CN102231186A (en) * 2011-07-11 2011-11-02 北京鼎软科技有限公司 Report anticounterfeiting system based on bar code identification, encryption and decryption
CN102880833A (en) * 2012-08-28 2013-01-16 福州讯华信息技术有限公司 Two-dimensional code anti-fake verification method for documents
CN103092847A (en) * 2011-10-27 2013-05-08 镇江金软计算机科技有限责任公司 Two-dimensional bar code based electronic document set retrieval realization
CN103188068A (en) * 2011-12-27 2013-07-03 北大方正集团有限公司 Digital content sending method, digital content sending device, digital content receiving method and digital content receiving device
CN103441983A (en) * 2013-07-11 2013-12-11 盛科网络(苏州)有限公司 Information protection method and device based on link layer discovery protocol
CN104392197A (en) * 2014-11-24 2015-03-04 深圳市通用条码技术开发中心 Method for increasing reading rate and encryption of website two-dimensional code tags
CN105515783A (en) * 2016-02-05 2016-04-20 中金金融认证中心有限公司 Identity authentication method, server and authentication terminal
CN106127061A (en) * 2016-06-22 2016-11-16 杨越 Computer Cryptography Security ensures computational methods
CN117150536A (en) * 2023-11-01 2023-12-01 北京敏行通达信息技术有限公司 A document anti-counterfeiting method, device, equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1529859A (en) * 2001-06-19 2004-09-15 富士施乐株式会社 Electronic document format management system and method
CN1717896A (en) * 2003-03-04 2006-01-04 国际商业机器公司 Long-term secure digital signature
CN1829149A (en) * 2006-02-08 2006-09-06 于蕾 Making method for electronic false-proof seal
US7216233B1 (en) * 2000-08-14 2007-05-08 Sun Microsystems, Inc. Apparatus, methods, and computer program products for filtering information
CN101127107A (en) * 2006-08-16 2008-02-20 鸿富锦精密工业(深圳)有限公司 Electronic document automatic signature system and method
CN101281581A (en) * 2007-09-27 2008-10-08 北京数字证书认证中心有限公司 Method for checking whether contents of paper file is distorted or not

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7216233B1 (en) * 2000-08-14 2007-05-08 Sun Microsystems, Inc. Apparatus, methods, and computer program products for filtering information
CN1529859A (en) * 2001-06-19 2004-09-15 富士施乐株式会社 Electronic document format management system and method
CN1717896A (en) * 2003-03-04 2006-01-04 国际商业机器公司 Long-term secure digital signature
CN1829149A (en) * 2006-02-08 2006-09-06 于蕾 Making method for electronic false-proof seal
CN101127107A (en) * 2006-08-16 2008-02-20 鸿富锦精密工业(深圳)有限公司 Electronic document automatic signature system and method
CN101281581A (en) * 2007-09-27 2008-10-08 北京数字证书认证中心有限公司 Method for checking whether contents of paper file is distorted or not

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073977A (en) * 2010-12-13 2011-05-25 中国联合网络通信集团有限公司 Methods and equipment for generating and authenticating digital signatures and digital signature system
CN102231186A (en) * 2011-07-11 2011-11-02 北京鼎软科技有限公司 Report anticounterfeiting system based on bar code identification, encryption and decryption
CN103092847A (en) * 2011-10-27 2013-05-08 镇江金软计算机科技有限责任公司 Two-dimensional bar code based electronic document set retrieval realization
CN103188068A (en) * 2011-12-27 2013-07-03 北大方正集团有限公司 Digital content sending method, digital content sending device, digital content receiving method and digital content receiving device
CN102880833A (en) * 2012-08-28 2013-01-16 福州讯华信息技术有限公司 Two-dimensional code anti-fake verification method for documents
CN103441983A (en) * 2013-07-11 2013-12-11 盛科网络(苏州)有限公司 Information protection method and device based on link layer discovery protocol
CN104392197A (en) * 2014-11-24 2015-03-04 深圳市通用条码技术开发中心 Method for increasing reading rate and encryption of website two-dimensional code tags
CN104392197B (en) * 2014-11-24 2017-05-17 深圳市通用条码技术开发中心 Method for increasing reading rate and encryption of website two-dimensional code tags
CN105515783A (en) * 2016-02-05 2016-04-20 中金金融认证中心有限公司 Identity authentication method, server and authentication terminal
CN105515783B (en) * 2016-02-05 2019-02-15 中金金融认证中心有限公司 Identity identifying method, server and certification terminal
CN106127061A (en) * 2016-06-22 2016-11-16 杨越 Computer Cryptography Security ensures computational methods
WO2017219474A1 (en) * 2016-06-22 2017-12-28 杨越 Computation method for guaranteeing security of computer password
CN117150536A (en) * 2023-11-01 2023-12-01 北京敏行通达信息技术有限公司 A document anti-counterfeiting method, device, equipment and readable storage medium
CN117150536B (en) * 2023-11-01 2024-01-02 北京敏行通达信息技术有限公司 Anti-counterfeiting method, device and equipment for document and readable storage medium

Similar Documents

Publication Publication Date Title
CN101834726A (en) Safe encryption method based on bi-dimensional codes
CN100565546C (en) A kind of method of checking contents of paper file whether to be distorted
Agarwal Text steganographic approaches: a comparison
US8249350B2 (en) Brand protection and product autentication using portable devices
CN105550730B (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
CN104077624A (en) Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code
CN104268610B (en) One kind classification QR code generating methods and read method
CN102546174A (en) Two-dimensional code encryption/decryption method and anti-counterfeiting method
CN101957810A (en) Method and device for embedding and detecting watermark in document by using computer system
CN1394313A (en) Method for embedding and extracting text into/from electronic documents
CN104766113A (en) Plain and secret code type anti-fake label and anti-fake method thereof
CN109635756B (en) Two-dimensional code authentication method integrating fingerprint and finger vein
CN104517045A (en) Method for creating protected digital file
Memon et al. EVALUATION OF STEGANOGRAPHY FOR URDU/ARABIC TEXT.
CN113468546B (en) Image processing method and intelligent device
CN110210270A (en) Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system
Villán et al. Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
Singh et al. A review of digital watermarking techniques: Current trends, challenges and opportunities
Koley et al. A novel approach of secret message passing through text steganography
CN104376236A (en) Scheme self-adaptive digital watermark embedding and extracting method based on camouflage technology
CN116167807A (en) Bill anti-counterfeiting method and device, electronic equipment and storage medium
CN110069907A (en) Big data source tracing method and system based on digital watermarking
CN114900315A (en) Document electronic management system based on OCR and electronic signature technology
CN114021084A (en) Cross-media attack-based digital watermark technology implementation method
US20070133792A1 (en) Image processing apparatus, control method therefor, computer program, and computer-readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100915