CN103685206B - The generation method and system of identification information - Google Patents
The generation method and system of identification information Download PDFInfo
- Publication number
- CN103685206B CN103685206B CN201210360039.5A CN201210360039A CN103685206B CN 103685206 B CN103685206 B CN 103685206B CN 201210360039 A CN201210360039 A CN 201210360039A CN 103685206 B CN103685206 B CN 103685206B
- Authority
- CN
- China
- Prior art keywords
- character string
- identification information
- server
- object content
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
This application discloses a kind of generation method of identification information and equipment, pass through the technical scheme of application the embodiment of the present application, server according to including identification information to be created object content identification information request to create, the generation character string corresponding with the object content, the character string is converted into identification information, and the identification information is returned to the initiator of the identification information request to create, so as to, by using the configuration of business association mechanism, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and associated particular content can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, moreover, because identification information is in itself without any physical meaning, therefore, only the identification information is reported after server matched, it just can determine that specific association content, solve the safety issue of identification information.
Description
Technical field
The application is related to the communications field, more particularly to a kind of identification information generation method and system.
Background technology
Quick Response Code (Dimensional Barcode), also known as two-dimensional bar code, are expanded on the basis of bar code
It is a kind of that there is readable bar code.Two described in device scan two-dimensional bar code, the length and width by recognizing bar code enter
Data processed, can obtain the information included in it.
Compared to bar code, Quick Response Code records more complicated data, such as picture, network linking etc..
In the application of existing Quick Response Code, what the information of Quick Response Code was to determine, i.e., user shoot after as obtained by conversion i.e.
Content is unique, such as text message, addresses of items of mail, network address.Once after Quick Response Code generation, its corresponding object content is just true
It is fixed, it is impossible to have other changes again.And the content is also true that content, i.e. user want obtained content, such as want
The network address for sending the email address of mail or desiring access to.
During the application is realized, present applicant have found that there is following defect in prior art:
Existing 2 D code information exist can cracking, security is high.
Because Quick Response Code is set by user terminal, usual Quick Response Code application is all unicity, such as one Quick Response Code can only
Correspondence passage, an Email address or a network address.Moreover, existing 2 D code information is all by two-dimentional code book
Body is transmitted, by reading and reduction that content is realized to the encryption of text message, although part Quick Response Code supports identity
Secondary-confirmation, but its content inherently in plain text it is visible, exist can cracking, the security to user profile causes hidden
Suffer from.
The content of the invention
This application provides a kind of generation method of identification information and system, it can solve the problem that the security of identification information is asked
Topic.
To reach above-mentioned purpose, on the one hand the embodiment of the present application provides a kind of generation method of identification information, including:
Server receives identification information request to create, and the identification information request to create includes identification information to be created
Object content;
The server generates the character string corresponding with the object content according to the identification information request to create;
The character string is converted to identification information by the server;
The server returns to the identification information initiator of the identification information request to create.
It is preferred that, the server is received before identification information request to create, in addition to:
The server receives the log-on message transmitted by user;
Log-on message described in the server authentication;
If be proved to be successful, the server returns to the user and logins successfully confirmation message, trigger the user after
Supervention send corresponding identification information request to create.
It is preferred that, the server generates the character corresponding with the object content according to institute's identification information request to create
String, is specifically included:
The server directly generates a character string at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing by the server, and by institute
Map listing is stated to be stored.
It is preferred that, the server directly generates a character string at random, and by the object content and the character string
It is corresponding, specifically include:
The server is corresponding with an object content by generated character string;Or,
The server is corresponding with same object content by the multiple character strings generated, and configures corresponding correspondence
Come into force rule;Or,
The server is corresponding with multiple object contents by generated character string, and configures corresponding correspondence life
Effect rule.
It is preferred that, the corresponding relation of the object content and the character string is saved in map listing by the server
Afterwards, in addition to:
The server keeps the character string object content corresponding with the character string constant;And/or,
The server, in the case where keeping the character string constant, adjusts the word according to default regulation rule
The corresponding object content of symbol string;And/or,
The server is according to default regulation rule, and in the case where keeping the object content constant, adjustment is described
The corresponding character string of object content;And/or,
The server is according to default regulation rule, while adjusting the character string mesh corresponding with the character string
Mark content;And/or,
The server adjusts the corresponding relation of existing character string and object content according to default regulation rule.
It is preferred that, the character string is specifically generated by the server, and with uniqueness.
It is preferred that, the character string is converted to identification information by the server, is specifically included:
The character string is converted into one-dimension code according to rule set in advance;Or
The character string is converted into Quick Response Code according to rule set in advance;Or
According to rule set in advance, a variety of colors and/or shaped formation are combined into formed figure.
On the other hand, the embodiment of the present application additionally provides a kind of method of performance objective content, including:
The server receives identification information;
The identification information is converted to corresponding character string by the server, and with the map listing that is locally stored
Character string matched, the corresponding relation of character string and the object content is preserved in the map listing;
If the match is successful, the corresponding relation of character string and object content in the map listing, the service
Device determines the corresponding object content of the character string;
The server performs the corresponding business of object content.
On the other hand, the embodiment of the present application additionally provides a kind of system for generating identification information, including:
Receiving module, for receiving identification information request to create, the identification information request to create includes being intended to create knowledge
The object content of other information;
Generation module, for the identification information request to create generation according to received by the receiving module and the target
The corresponding character string of content;
Modular converter, the character string for the generation module to be generated is converted to identification information;
Sending module, the identification information for the modular converter to be changed returns to the identification information request to create
Initiator.
It is preferred that, the generation module, specifically for:
One character string of generation, and the object content is corresponding with the character string at random;
The corresponding relation of the object content and the character string is saved in map listing, and by the map listing
Stored.
It is preferred that, the system also include adjusting module, specifically for the generation module by the object content with
After the corresponding relation of the character string is saved in map listing:
Keep the character string object content corresponding with the character string constant;And/or,
According to default regulation rule, in the case where keeping the character string constant, the character string is adjusted corresponding
Object content;And/or,
According to default regulation rule, in the case where keeping the object content constant, the object content phase is adjusted
Corresponding character string;And/or,
According to default regulation rule, while adjusting the character string object content corresponding with the character string;With/
Or,
According to default regulation rule, the corresponding relation of existing character string and object content is adjusted.
On the other hand, the embodiment of the present application additionally provides a kind of performance objective content system, including:
Receiving module, for receiving identification information;
Modular converter, for the identification information to be converted into corresponding character string;
Matching module, for the word of the character string of being changed the modular converter in the map listing locally stored
Symbol string is matched, and the corresponding relation of character string and the object content is preserved in the map listing;
Processing module, for when the match is successful for the matching module, according to character string and target in the map listing
The corresponding relation of content, determines the corresponding object content of the character string, and to perform the object content.
Compared with prior art, the application at least has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created
Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes
Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism
Configuration, corresponding business tine is added for the identification information without any concrete meaning.Because identification information is not appointed in itself
What physical meaning, the identification information therefore, only reported after server matched, just can determine that specific association is interior
Hold, solve the safety issue of identification information.
Brief description of the drawings
A kind of schematic flow sheet of the generation method for identification information that Fig. 1 provides for the embodiment of the present application;
A kind of schematic flow sheet of the method for performance objective content that Fig. 2 provides for the embodiment of the present application;
The flow of the generation method of identification information under a kind of concrete application scene that Fig. 3 provides for the embodiment of the present application is shown
It is intended to;
A kind of structural representation of the system for generation identification information that Fig. 4 provides for the embodiment of the present application;
A kind of structural representation of the system for performance objective content that Fig. 5 provides for the embodiment of the present application.
Embodiment
As stated in the Background Art, in existing Quick Response Code application scheme, because Quick Response Code is really according to fixed
Business information Content Transformation is obtained, therefore, and the processing mode for directly generating Quick Response Code according to specific business information content makes two
Tie up code book body exist can cracking, the information security to user causes hidden danger.
The problem of in order to solve such, present applicant proposes a kind of generation method of identification information, by user-association and
The configuration of business response mechanism, corresponding business tine is added for the identification information without any concrete meaning, actually should
In, because identification information is in itself without any physical meaning, therefore, the identification information is only reported into server progress
After matching, specific association user and corresponding business tine are just can determine that, the safety issue of identification information is solved.
As shown in figure 1, a kind of schematic flow sheet of the generation method of the identification information provided for the embodiment of the present application, bag
Include:
Step S101, server receive identification information request to create, and the request to create includes identification information to be created
Object content.
In specifically processing scene, the identification information request to create may come from homologous ray by internal network
Other service servers of connection, can be from the client being connected with the server by internet, such as mobile phone,
Computer or other can access the electric terminal of internet.
In order to further improve the security of identification information treatment mechanism, authentication can also be included before this step
Mechanism, specific authentication process itself is as follows:
(1) server receives the log-on message transmitted by the user.It is mentioned herein in specifically processing scene
And log-on message there may be following two sending methods:
Mode one, user are actively sent to server.
For example, sending jointly to server in the access request that user carries the log-on message of itself.
Mode two, server requirement reporting of user.
For example, sending access request with user orientation server, server returns to user and requires the finger that the user is logged in
Show that the user response instruction returns to the log-on message of itself to server.
(2) log-on message described in the server authentication.
If be proved to be successful, the server returns to the user and logins successfully confirmation message, triggers the user
Continue to send corresponding identification information request to create, and start to perform step S101.
If authentication failed, the server returns to login failure confirmation message to the user, notifies the user to step on
Record failure, it is impossible to proceed corresponding identification information establishment processing, other processing are proceeded to trigger the user, when
So, in specifically processing scene, mentioned other processing here can be the user again by the log-on message institute
The heavy login process of triggering or the user use the login process that other log-on messages are carried out, it is of course also possible to be to adopt
Other processing schemes are taken, be will not enumerate herein.
The object content of identification information to be created can be the identity information of a certain user, such as account ID, or email address,
Network address, by or the different business functions of correspondence, such as:Video, game are played, herein to the form and species of object content not
Limit.
It should be noted that in the case of the specific business function of correspondence, according to the difference of objectives content, its institute
The mode of the business of realization is there is also corresponding difference, for example:
Business function for playing video, if object content is an online broadcasting network address, its corresponding broadcasting
The business of video will be realized by opening the network address and playing video;
If object content is address or the video download address of given server, the corresponding industry for playing video
Business, by being asked to the server or directly downloading corresponding video file and realize by way of playing the video;
And if object content is one section of function on code, then its corresponding business for playing video simply will be local
Video playback instrument is opened, and plays the mode of specific video file (such as local default video file) to realize.
Except cited aforesaid way, specific object content can also include a variety of situations, no longer say one by one herein
Bright, such change has no effect on protection scope of the present invention.
Step S102, the server generate the character string corresponding with the object content according to request to create.
The server directly generates a character string at random, and the object content is corresponding with character string.And will
Corresponding relation is saved in a map listing, and the map listing is stored in the server.
It should be noted that:
1st, object content and the corresponding relation of character string include following three kinds in the map listing:
Corresponded manner one, character string and object content are corresponded.
Such corresponded manner is the simplest, treatment effeciency also highest, can be preferential in the case of service logic is simple
Using.
For example, the character string is corresponding with fixed network address all the time, then, when business user passes through the character string
During triggering business, the website information will can be obtained all the time.
Corresponded manner two, multiple character strings are corresponding with same object content.
, it is necessary to configure the corresponding corresponding rule that comes into force under the scene of such a corresponded manner of application.
On the one hand, all character strings can be made while coming into force, so, different business users can be by different
Character string triggers the business corresponding to same object content, and diversified business triggers path, for example, different user groups obtains
Different character strings are got, it is thus possible to trigger identical business by different character strings.
On the other hand, each character string can also be made to come into force respectively, so, can be realized by coming into force different character strings
The control in business triggering source, for example, in the case of different character strings are got in different user groups, only getting
The user group of the character string come into force can trigger corresponding business by the character string come into force, and only get current Pending The Entry Into Force
The user group of character string can not then trigger the business.
Corresponded manner three, a character string are corresponding with multiple object contents.
It is similar with above-mentioned corresponded manner two, it is necessary to configure corresponding right under the scene of such a corresponded manner of application
Should be come into force rule.
Correspondence as specific object content comes into force rule, the regulation rule of the actual business tine corresponding to it,
It may rely on the direct setting of user itself, or the adjustment mode pre-set in accordance with user to carry out, for example, user sets
Put at daily 8 points to 20 points, for " calling me ", (object content corresponding to it is telephone number to associated business
Information, the business operation still made a phone call is not limited herein), and at 8 points of daily 20 points to next day, associated business
For " sending out mail to me " (object content corresponding to it is the information of addresses of items of mail, or hair mail business operation herein not
Limit).
In actual applications, the association for specifically carrying out business tine using which kind of above-mentioned mode can be according to actual need
Set, it is such to change the protection domain for having no effect on the application.
2nd, after the corresponding relation of the object content and the character string is saved in map listing by server, also wrap
Include further content adjustable strategies.
The diversified forms of corresponding relation in map listing are illustrated in above-mentioned 1, and it should be noted that specific in 2
The adjustable strategies of contents in table (character string and/or object content) and corresponding relation, particular content is as follows:
Strategy one, the server keep the character string object content corresponding with the character string constant.
Similar with foregoing corresponded manner one, this is equally a kind of static treatment mode, and such mode is the simplest,
Treatment effeciency also highest, in the case of service logic is simple, can preferentially be used.
For example, the character string is corresponding with fixed network address all the time, and character string and object content are remained not
Become, then, when business user triggers business by the character string, the website information will can be obtained all the time.
Strategy two, the server are according to default regulation rule, in the case where keeping the character string constant, adjustment
The corresponding object content of the character string.
Such mode can avoid frequently foreground content (identification information) change that adjustment character string is brought, on backstage
In the case that content (object content and its corresponding business tine) changes, without adjusting foreground content, you can realize
New business.
For example, after the blog address information that user A has issued oneself extensively by way of issuing identification information, its
Prepare to change blog address, but go the processing mode for changing announced identification information obviously too cumbersome one by one, also easily go out
Now omit, it is therefore possible to use above-mentioned strategy, keeps the character string corresponding to the identification information constant, directly in map listing
It is new blog address to connect the object content adjusted corresponding to it.After the completion of adjustment, other users can be continuing with original
Identification information triggering adjustment after object content, so as to access user A new blog.
Strategy three, the server, in the case where keeping the object content constant, are adjusted according to default regulation rule
The corresponding character string of the whole object content.
Such mode can adjust to realize the renewal of foreground content by the content of character string, so as to realize customer group
The adjustment and renewal of body, and improve the security of business triggering mode.
For example, user group X can trigger the business made a phone call to user A by current identification information, and user A is not
Wish to be connected to the phone of the user group again, then user A then can be by way of changing character string in map listing, adjustment
Foreground content, makes identification information content change, so that, user group X will be unable to triggering by the identification information before modification
The business made a phone call to user A, the business made a phone call to user A could be triggered by only getting the user of new identification information,
Such processing mode can efficiently realize the adjustment of interactive colony during user's handover network social environment.
Further, in the case where disabled user gets identification information, user can make original by adjusting character string
There is identification information failure, so as to avoid being encroached on by disabled user, improve the security of corresponding service.
Strategy four, the server are according to default regulation rule, while adjusting the character string and the character string phase
Corresponding object content.
Such adjustment can then realize comprehensive renewal of foreground content and backstage content, be in existing list item before
The comprehensive change held, is updated to business tine and its trigger condition.
Strategy five, the server adjust existing character string and the correspondence of object content according to default regulation rule
Relation.
This tactful regulating object is no longer specific contents in table, but the corresponding relation between each list item is (i.e. foregoing
Corresponded manner one to three).
By the adjustment of corresponding relation, the object content and character string generated is matched again, so that, same
Trigger condition under, different business tines can be triggered.
This tactful specific example may be referred to the example of foregoing corresponded manner three, and both realizes that effect is consistent,
In foregoing corresponded manner three, selected in existing multiple corresponding relations but concrete implementation mode is then slightly different
The one or more corresponding relations come into force are selected, and in this strategy, be then that directly to create new corresponding relation existing to replace
Corresponding relation, such change can be temporary transient or permanent.
It should be further stated that, the realization of the adjustable strategies corresponding to above-mentioned strategy two to five is the server
According to specific regulation rule, the different application scenarios of correspondence carry out the adjustment operation of specific contents in table or corresponding relation.
Under the scene of such a mode of application, specific regulation rule can be that timing adjustment (is fixed on some time
Point carries out the dynamic adjustment of identification information, for example, at 0 point in daily evening), period modulation is (i.e. right after the default cycle
Identification information enters Mobile state adjustment, for example, often passing through 3 day time, Mobile state adjustment is just entered to identification information) or trigger-type adjustment
(i.e. according to certain trigger condition, the adjustment of identification information is triggered, for example, when its corresponding business tine changes, i.e.,
Identification information is adjusted) etc..
It should be noted that above-mentioned regulation rule may be used alone, can also be used in combination, specifically using which kind of or
Which plants regulation rule to realize the dynamic adjustment of identification information, can't influence the protection domain of the application.
Believe it should be noted that above-mentioned specific character string can't have in itself with subscriber identity information or other business
The substantive content that manner of breathing is closed, that is to say, that character string does not have in all senses in itself, and only server is according to rule or random
The unduplicated character string of generation, the character string and object content are in addition to mapping relations, without any association.
In order to ensure the security of information, the character string that server is generated necessarily is differed with object content, for example, working as
Need the object content of mapping when being 123, the character string generated necessarily with 123 character combinations without any association, than
Such as X67E, server generates corresponding identification information according to the character combination, and such text string generation mode can be effective
Avoid identification information from being cracked and cause the danger of information leakage.
The character string is converted to identification information by step 103, the server.
Such conversion regime can use existing conversion regime, it would however also be possible to employ other identification informations newly defined turn
Rule is changed, such change has no effect on the protection domain of the application.
The identification information is returned to request initiator by step 104, the server.
Specific feedback system can directly feed back the identification information content or feedback identifying information generated
Successful confirmation message is generated, specific feedback system can be determined according to actual needs.
By said process, server generates identification information, and is associated respectively with corresponding object content, complete
Into the complete generating process of identification information.
As shown in Fig. 2 the application has further disclosed a kind of method of performance objective content, it is described as follows:
Step S201, the server receive identification information.
The identification information is converted to corresponding character string by step S202, the server, and locally stored
Character string in map listing is matched.
If the match is successful, step S203 is performed;
If it fails to match, directly stop the processing to the identification information, and return to the logical of identification information processing failure
Know message.
It should be noted that in specifically processing scene, in order to further improve the safety of identification information treatment mechanism
Property, subscriber authentication mechanism can also be included before this step, specific authentication process itself is as follows:
The server receives the authentication information, the authentication machine with the first user in abovementioned steps S101
System is similar, and server is actively sent to there is also user for authentication information herein or server requirement user reports
Two kinds of possible situations of respective identity checking information, such change has no effect on the protection domain of the application.
Authentication information described in the server authentication.
If be proved to be successful, the server performs above-mentioned step S202, and the identification information is converted to accordingly
Character string, and character string is matched in the map listing locally stored.
And if authentication failed, then server directly stops the processing to the identification information, and to returning at identification information
Reason failure or the notification message of authentication failure.
Step S203, the corresponding relation according to character string in map listing and object content, the server determine described
The corresponding object content of character string.
Step S204, the server perform the corresponding business of object content.
By above-mentioned explanation, present applicant proposes a kind of association process of dependence server side come the identification information realized
Application scheme, identification information in itself without any substantive implication, it is necessary to the incidence relation stored by server, ability
Specific user identity and the business tine corresponding to identification information are determined, in specific application process, above-mentioned identification letter
The concrete form of breath can include following several:
The bar code of gained is changed according to preset rules;Or,
The Quick Response Code of gained is changed according to preset rules;Or,
According to certain rule, a variety of colors and/or shaped formation are combined into formed figure, for example, arranged by ad hoc rules
Round dot, square, color lump of row etc., or the figure of a variety of element compositions above.
In actual application scenarios, in order to mitigate the processing load of server, the conversion and knowledge of specific identification information
Other process can have specific external terminal to realize.
For example, specific character string and user identity and the incidence relation of business tine are simply stored in server, and
Specific two-dimension code identification terminal is converted to Quick Response Code after the character string that server is issued is received, by the character string and presented
To the user needed to use, or, the two-dimension code identification terminal is recognized after the Quick Response Code of user's offer, recognizes the Quick Response Code,
Specific character string is converted to, and the character string is sent to server and is matched, corresponding user identity and business is obtained
Content.
By such processing, (storage of character string shows the processing pressure and storage burden that can mitigate in terms of server
So storage resource is more saved than figure storage), it is such to change the protection domain for having no effect on the application.
By above-mentioned processing, each strategy provided with reference to step S102, the application can at least provide four kinds specifically
Identification information building mechanism.
For same user, four kinds of identification information building mechanisms are described individually below, for convenience of explanation,
In every kind of mechanism, it is illustrated by taking Quick Response Code as an example, certainly, this is a kind of specific example, other kinds of identification
Information can also be applied to the technical scheme that the application is proposed.
(1) identification information is fixed, and associated services content is fixed (strategy one in step S102).
That is double static configuration schemes of identification information and associated services, no matter when, get the identification information,
The business tine realized is consistent.
Under such a scenario, in order to improve the security of business, corresponding authentication mechanism can be added, for example, according to
User name and or the mode of password verified, or, verified etc. according to the mode of white list.
It is described as follows by taking Quick Response Code as an example:
First user is in setting business and after generating Quick Response Code, there is provided only oneself contacts list (above-mentioned white list
A kind of concrete mode) in people's (first and second) can just obtain the corresponding business of Quick Response Code, and if third shoots Quick Response Code
When asking the business, then it may be notified that uncommitted, it is impossible to obtain the business.
(2) identification information is fixed, associated services content-variable (strategy two in step S102).
The allocation plan that i.e. static identification information and the business of dynamically associating are combined, identification information just will not once generation
Change again, still, the business tine associated by it then can be adjusted conversion according to certain mechanism.
So processing can carry out interim control to business tine, improve the controllability of business processing.
It is described as follows by taking Quick Response Code as an example:
First user is after generation Quick Response Code, there is provided the regulation rule of associated services content, here set rule,
In addition to the regular situation according to time change communication mode cited in step S102, it can also further increase triggering machine
System carries out further flexibly control, for example, for a same Quick Response Code, first shoots the Quick Response Code at 9 points in the morning, got
Be the business that phone contact is carried out with the first user, and second shoots the Quick Response Code at 12 points at noon, is advised according to original time
Then, also should be now the business tine of phone contact, but due to the first user just in session, it triggers disturbance-free service, because
This, the business that tone information is simply carried out to the first user that second is got, and when first shoots the Quick Response Code at 9 points again at night
When, due to the change of time, accessed by it is the business that mail is sent to the first user.
By above example it can be seen that, although any change does not occur for Quick Response Code content, but due to the change of time, nothing
Whether by being same user, its business tine for shooting accessed by the Quick Response Code may be different, such treatment mechanism
The first user is helped to realize the flexible control of business.
(3) identification information is variable, and associated services content is fixed (mode three in step S102).
The allocation plan that i.e. Dynamic Recognition information and static association business are combined, identification information can be according to certain machine
System is adjusted conversion, but no matter how the particular content of the identification information converts, and the business tine corresponding to it is kept not
Become.
So processing can increase the validity limitation of identification information in itself, improve the ageing of business processing.
It is described as follows by taking Quick Response Code as an example:
First user is in setting business and after generating Quick Response Code, and Quick Response Code every other day can all enter Mobile state renewal, but its
Associated business tine can't change.First and second are getting Quick Response Code on the same day, but first passes through shooting on the day of
The Quick Response Code requested service, and succeeding, and second shot the Quick Response Code requested service at second day, due to Quick Response Code by
Dynamic adjustment, so, second may be notified that Quick Response Code is invalid, it is impossible to obtain the business, certainly, if second can be regained after adjustment
Quick Response Code, then can still ask the business, pass through such processing, it is possible to achieve the interim authority of user is limited.
(4) identification information is variable, associated services content-variable (strategy two in step S102).
That is the double acting state allocation plan of identification information and associated services, according to corresponding regulation rule, identification information is in itself
Content and its associated by business tine can be carried out adjustment.
So processing can make user parallel realize multi-service control,
It is described as follows by taking Quick Response Code as an example:
First user is different from sale tri- commodity of A, B, C on the net, three commodity prices and attribute, and to buy business
The user of product have again first, second, the third three, then, the first and second the third three that different orders can be generated when buying different commodity is (different
Business), Quick Response Code also can be different, but final beneficiary is entirely same user.
Strategy five in step S102 can be embodied by the example of above-mentioned (2) into (4), be not repeated herein
It is bright.
Above-mentioned four kinds of identification information building mechanisms can be configured according to actual needs, and such change can't influence
The protection domain of the application.
Compared with prior art, the embodiment of the present application has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created
Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes
Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism
Configuration, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and is closed
The particular content of connection can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, not only such as
This, because identification information is in itself without any physical meaning, therefore, only reports server progress by the identification information
After matching somebody with somebody, specific association content is just can determine that, the safety issue of identification information is solved.
Below in conjunction with the accompanying drawing in the application, clear, complete description is carried out to the technical scheme in the application, is shown
So, described embodiment is a part of embodiment of the application, rather than whole embodiments.Based on the implementation in the application
Example, the every other embodiment that those of ordinary skill in the art are obtained on the premise of creative work is not made all belongs to
The scope protected in the application.
Specifically, combining the generation method for the identification information that actual application scenarios are provided the embodiment of the present application and its answering
It is illustrated with process, for convenience of explanation, follow-up explanation is described exemplified by equally using Quick Response Code.
As shown in figure 3, Quick Response Code generating process under a kind of concrete application scene proposed by the embodiment of the present application
Schematic flow sheet, specifically includes following steps:
Step S301, user A access server, and request accesses system service.
Step S302, server return to the message for requiring that user A is logged in.
Step S303, user A submit log-on message, and the log-on message includes username and password.
Step S304, server check username and password validity.
If it is valid, performing step S305;
If invalid, user's A login failures are notified, and terminate currently processed process.
Step S305, server notify user A to login successfully.
Step S306, user A send Quick Response Code request to create to server.
Step S307, server generate Quick Response Code at random, and 2 D code information is associated with user A ID.
It is to be appreciated that wherein the Quick Response Code of server generation when, firstly generate specific character string, the specific character string can be with
Associated with user account or pure business is not in contact with user account, can dynamically (such as have in one end time
Effect), can also be static (once generation i.e. continuously effective).Specific character string is converted to two by server according to preset rules
Tie up code.
Specific processing mode and create-rule are not repeated herein referring to preceding description.
Step S308, server prompts user A set business corresponding with Quick Response Code.
Step S309, user's A login service devices, set business corresponding with Quick Response Code.
In specifically processing scene, when user's A login services device sets business corresponding with Quick Response Code, can freely it set
Put one or more business corresponding with Quick Response Code.
For example, user applies for a string of Quick Response Codes at backstage (server), corresponding function has " business card ", " payment " and " closed
Note me " three functions;User can be put into Quick Response Code forum or print, and such Quick Response Code is constant, but user
Corresponding content can be set on login system backstage at any time, such as be revised as " business card " One function, i.e., foregoing static identification
The allocation plan that information and dynamic service content are combined.
For example, user asks Quick Response Code by mobile phone client software from trend server, then each Quick Response Code is all
It is different, such as just automatically updates once within every five minutes, but business function is " being paid the bill to me " all the time, i.e., foregoing is dynamic
The allocation plan that state identification information and static traffic content are combined.
For example, user asks Quick Response Code by mobile phone client software from trend server, then each Quick Response Code is all
Be different, such as just automatically update once within every five minutes, but service end know all the time the Quick Response Code it is corresponding which is
User;And user can set the Quick Response Code to be on duty interval scale " hair me mail " on backstage, interval scale of coming off duty " is stayed to me
Speech ", i.e., foregoing identification information and the double acting state allocation plan of business tine.
Certainly, also simplest pair static configuration scheme, will not be repeated here.
By above-mentioned processing, complete after Quick Response Code generating process, user B gets the Quick Response Code that user A asks generation
Information, and send the 2 D code information to server.Server is received after the 2 D code information, first determines whether that the Quick Response Code is believed
The legitimacy of breath, if Quick Response Code is legal in itself, it is required that user B validation informations (can be determined according to user A setting
Whether requirement is verified), after user's B validation informations, server is verified to checking information, after verification passes through, and parses two
The corresponding user of dimension code information simultaneously gets correspondence business, and service lists or information are returned to user B.User B is according to return
Service lists (when the Quick Response Code multiple business of correspondence) or information selection business, and perform corresponding business to user A.
Compared with prior art, the embodiment of the present application has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created
Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes
Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism
Configuration, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and is closed
The particular content of connection can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, not only such as
This, because identification information is in itself without any physical meaning, therefore, only reports server progress by the identification information
After matching somebody with somebody, specific association content is just can determine that, the safety issue of identification information is solved.
In order to realize above-mentioned technical scheme, the embodiment of the present application provides a kind of system for generating identification information, and it is tied
Structure schematic diagram is as shown in figure 4, at least include:
Receiving module 41, for receiving identification information request to create, the identification information request to create includes being intended to create
The object content of identification information;
Generation module 42, for according to received by the receiving module 41 identification information request to create generation with it is described
The corresponding character string of object content;
Modular converter 43, the character string for the generation module 42 to be generated is converted to identification information;
Sending module 44, the identification information for the modular converter 43 to be changed returns to the identification information establishment please
The initiator asked.
It is preferred that, the generation module 42, specifically for:
One character string of generation, and the object content is corresponding with the character string at random;
The corresponding relation of the object content and the character string is saved in map listing, and by the map listing
Stored.
It is preferred that, the system of the generation identification information also includes adjusting module 45, specifically in the generation module
After 42 are saved in the corresponding relation of the object content and the character string in map listing:
Keep the character string object content corresponding with the character string constant;And/or,
According to default regulation rule, in the case where keeping the character string constant, the character string is adjusted corresponding
Object content;And/or,
According to default regulation rule, in the case where keeping the object content constant, the object content phase is adjusted
Corresponding character string;And/or,
According to default regulation rule, while adjusting the character string object content corresponding with the character string;With/
Or,
According to default regulation rule, the corresponding relation of existing character string and object content is adjusted.
Further, the embodiment of the present application provides a kind of system of performance objective content, its structural representation such as Fig. 5 institutes
Show, at least include:
Receiving module 51, for receiving identification information;
Modular converter 52, for the identification information to be converted into corresponding character string;
Matching module 53, for the character string of being changed the modular converter 52 in the map listing locally stored
Character string matched, the corresponding relation of character string and the object content is preserved in the map listing;
Processing module 54, for when the match is successful for the matching module 53, according to character string in the map listing with
The corresponding relation of object content, determines the corresponding object content of the character string, and to perform the object content.
Compared with prior art, the embodiment of the present application has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created
Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes
Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism
Configuration, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and is closed
The particular content of connection can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, not only such as
This, because identification information is in itself without any physical meaning, therefore, only reports server progress by the identification information
After matching somebody with somebody, specific association content is just can determine that, the safety issue of identification information is solved.
It will be appreciated by those skilled in the art that the module in device in embodiment can be divided according to embodiment description
It is distributed in the device of embodiment, respective change can also be carried out and be disposed other than in one or more devices of the present embodiment.On
The module for stating embodiment can be merged into a module, can also be further split into multiple submodule.
Above-mentioned the embodiment of the present application sequence number is for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that the application can be by
Software adds the mode of required general hardware platform to realize, naturally it is also possible to which by hardware, but in many cases, the former is more
Good embodiment.Understood based on such, what the technical scheme of the application substantially contributed to prior art in other words
Part can be embodied in the form of software product, and the computer software product is stored in a storage medium, if including
Dry instruction is to cause a station terminal equipment (can be mobile phone, personal computer, server, or network equipment etc.) to perform sheet
Apply for the method described in each embodiment.
Described above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, on the premise of the application principle is not departed from, some improvements and modifications can also be made, these improvements and modifications also should
Depending on the protection domain of the application.
Claims (10)
1. a kind of generation method of identification information, it is characterised in that including:
Server receives identification information request to create, and the identification information request to create includes the target of identification information to be created
Content;
The server generates the character string corresponding with the object content according to the identification information request to create;
The character string is converted to identification information by the server;
The server returns to the identification information initiator of the identification information request to create;
Wherein, the server generates the character string corresponding with the object content, tool according to institute's identification information request to create
Body includes:
The server generates one or more character strings at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing by the server, and is reflected described
List is penetrated to be stored.
2. the method as described in claim 1, it is characterised in that the server is received before identification information request to create, also
Including:
The server receives the log-on message transmitted by user;
Log-on message described in the server authentication;
If be proved to be successful, the server returns to the user and logins successfully confirmation message, triggers the user and continues to send out
Send corresponding identification information request to create.
3. the method as described in claim 1, it is characterised in that the server generates one or more character strings at random, and
The object content is corresponding with the character string, specifically include:
The server is corresponding with an object content by generated character string;Or,
The server is corresponding with same object content by the multiple character strings generated, and configures corresponding accordingly come into force
Rule;Or,
The server is corresponding with multiple object contents by generated character string, and configures corresponding corresponding rule of coming into force
Then.
4. the method as described in claim 1, it is characterised in that the server is by the object content and the character string
After corresponding relation is saved in map listing, in addition to:
The server keeps the character string object content corresponding with the character string constant;And/or,
The server, in the case where keeping the character string constant, adjusts the character string according to default regulation rule
Corresponding object content;And/or,
The server, in the case where keeping the object content constant, adjusts the target according to default regulation rule
The corresponding character string of content;And/or,
The server is according to default regulation rule, while adjusting in the character string target corresponding with the character string
Hold;And/or,
The server adjusts the corresponding relation of existing character string and object content according to default regulation rule.
5. the method as described in any one in Claims 1-4, it is characterised in that the character string, specifically by the service
Device is generated, and with uniqueness.
6. the method as described in any one in Claims 1-4, it is characterised in that:The server turns the character string
Identification information is changed to, is specifically included:
The character string is converted into one-dimension code according to rule set in advance;Or
The character string is converted into Quick Response Code according to rule set in advance;Or
According to rule set in advance, a variety of colors and/or shaped formation are combined into formed figure.
7. a kind of method of performance objective content, it is characterised in that including:
Server receives identification information;
The identification information is converted to corresponding character string by the server, and with the word in the map listing that is locally stored
Symbol string is matched, and the corresponding relation of character string and the object content is preserved in the map listing;
If the match is successful, the corresponding relation of character string and object content in the map listing, the server is true
The corresponding object content of the fixed character string;
The server performs the object content;
Wherein, the generation of the map listing, is specifically included:
The server generates one or more character strings at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing by the server, and is reflected described
List is penetrated to be stored.
8. a kind of system for generating identification information, it is characterised in that including:
Receiving module, for receiving identification information request to create, the identification information request to create includes being intended to create identification letter
The object content of breath;
Generation module, for the identification information request to create generation according to received by the receiving module and the object content
Corresponding character string;
Modular converter, the character string for the generation module to be generated is converted to identification information;
Sending module, the identification information for the modular converter to be changed returns to the initiation of the identification information request to create
Side;
Wherein, the generation module, specifically for:
One or more character strings are generated at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing, and the map listing is carried out
Storage.
9. system as claimed in claim 8, it is characterised in that also including adjusting module, specifically in the generation module
After the corresponding relation of the object content and the character string is saved in map listing:
Keep the character string object content corresponding with the character string constant;And/or,
According to default regulation rule, in the case where keeping the character string constant, the corresponding mesh of the character string is adjusted
Mark content;And/or,
According to default regulation rule, in the case where keeping the object content constant, the object content is adjusted corresponding
Character string;And/or,
According to default regulation rule, while adjusting the character string object content corresponding with the character string;And/or,
According to default regulation rule, the corresponding relation of existing character string and object content is adjusted.
10. a kind of system of performance objective content, it is characterised in that including:
Receiving module, for receiving identification information;
Modular converter, for the identification information to be converted into corresponding character string;
Matching module, for the character string of the character string of being changed the modular converter in the map listing locally stored
Matched, the corresponding relation of character string and the object content is preserved in the map listing;
Processing module, for when the match is successful for the matching module, according to character string and object content in the map listing
Corresponding relation, determine the corresponding object content of the character string, and to perform the object content;
Wherein, the matching module, specifically for:
One or more character strings are generated at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing, and the map listing is carried out
Storage.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210360039.5A CN103685206B (en) | 2012-09-25 | 2012-09-25 | The generation method and system of identification information |
CN201710656871.2A CN107579954B (en) | 2012-09-25 | 2012-09-25 | Method and system for generating identification information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210360039.5A CN103685206B (en) | 2012-09-25 | 2012-09-25 | The generation method and system of identification information |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710656871.2A Division CN107579954B (en) | 2012-09-25 | 2012-09-25 | Method and system for generating identification information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103685206A CN103685206A (en) | 2014-03-26 |
CN103685206B true CN103685206B (en) | 2017-09-22 |
Family
ID=50321532
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210360039.5A Active CN103685206B (en) | 2012-09-25 | 2012-09-25 | The generation method and system of identification information |
CN201710656871.2A Active CN107579954B (en) | 2012-09-25 | 2012-09-25 | Method and system for generating identification information |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710656871.2A Active CN107579954B (en) | 2012-09-25 | 2012-09-25 | Method and system for generating identification information |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN103685206B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205382A (en) * | 2014-06-24 | 2015-12-30 | 鸿合科技有限公司 | Two-dimension code identity authentication method and device |
CN104680114B (en) * | 2015-03-03 | 2018-06-01 | 深圳家电网科技实业股份有限公司 | One Quick Response Code handles the method and its system of multiple requests |
CN106850393A (en) * | 2015-12-07 | 2017-06-13 | 中国移动通信集团公司 | A kind of information analysis method, terminal device and system |
CN107563474B (en) * | 2016-06-30 | 2020-11-24 | 百度在线网络技术(北京)有限公司 | Two-dimensional code generation method and device |
CN107315819A (en) * | 2017-06-30 | 2017-11-03 | 天津飞鸿达安全印务有限公司 | A kind of method of two-dimensional code display, device and equipment |
CN108134790A (en) * | 2017-12-21 | 2018-06-08 | 知而行(上海)营销咨询有限公司 | A kind of customer identification information processing method |
CN110750684B (en) * | 2018-07-06 | 2022-08-16 | 武汉斗鱼网络科技有限公司 | Message prompting method for multi-dimensional verification, storage medium, electronic device and system |
CN110378094A (en) * | 2019-07-04 | 2019-10-25 | 绿漫科技有限公司 | A kind of omnipotent 2 D code verification method based on garden system |
CN110458571B (en) * | 2019-07-05 | 2023-06-02 | 创新先进技术有限公司 | Risk identification method, device and equipment for information leakage |
CN111598096A (en) * | 2020-04-03 | 2020-08-28 | 维沃移动通信有限公司 | Image processing method and electronic equipment |
CN112148124B (en) * | 2020-09-10 | 2024-07-26 | 维沃移动通信有限公司 | Image processing method and device and electronic equipment |
CN112800803B (en) * | 2021-04-09 | 2021-07-30 | 腾讯科技(深圳)有限公司 | Graphic code identification method, device, equipment and storage medium |
CN113794735B (en) * | 2021-09-29 | 2023-05-30 | 北京雅丁信息技术有限公司 | Sensitive data security protection method in SAAS system scene |
CN114707084A (en) * | 2022-03-24 | 2022-07-05 | 中国银行股份有限公司 | Two-dimensional code content preview method, related device and computer storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1468173A (en) * | 2000-10-05 | 2004-01-14 | ������������ʽ���� | Identification code creating method in network and identification code creating program |
CN1628291A (en) * | 2002-02-08 | 2005-06-15 | 株式会社电通Tec | Information providing system using code information |
CN1818935A (en) * | 2006-03-17 | 2006-08-16 | 北京紫光捷通科技有限公司 | Two-dimensional code construction based on hexadecimal coding |
EP1870835A2 (en) * | 2006-06-21 | 2007-12-26 | NAMCO BANDAI Games Inc. | Two-dimensional code generation method, two-dimensional code, two-dimensional code recognition method, and image recognition device |
CN101482948A (en) * | 2008-01-07 | 2009-07-15 | 唐红波 | Method for implementing mobile phone payment based on two-dimensional code |
CN101132293B (en) * | 2007-08-24 | 2010-06-02 | 华为技术有限公司 | Individual information processing method, system and device |
CN102103627A (en) * | 2010-11-26 | 2011-06-22 | 中兴通讯股份有限公司 | Method and device for identifying two-dimensional codes on mobile terminal |
CN202282032U (en) * | 2011-08-25 | 2012-06-20 | 广州宽度信息技术有限公司 | Application system adopting two-dimensional code to realize food information tracing back |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4110728B2 (en) * | 2000-09-28 | 2008-07-02 | 株式会社デンソー | Mobile phone and communication system |
CN1845165A (en) * | 2006-03-25 | 2006-10-11 | 福建新大陆电脑股份有限公司 | Application method for two-dimension code and mobile phone in ticket system |
CN102438067B (en) * | 2011-10-25 | 2013-12-25 | 福州博远无线网络科技有限公司 | Method for installing mobile phone software by mobile phone scanning two-dimension code |
CN102571803B (en) * | 2012-01-19 | 2016-04-27 | 北京远鉴科技有限公司 | A kind of graphic based Quick Response Code protection account, prevent order from distorting and the method and system of phishing attack |
-
2012
- 2012-09-25 CN CN201210360039.5A patent/CN103685206B/en active Active
- 2012-09-25 CN CN201710656871.2A patent/CN107579954B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1468173A (en) * | 2000-10-05 | 2004-01-14 | ������������ʽ���� | Identification code creating method in network and identification code creating program |
CN1628291A (en) * | 2002-02-08 | 2005-06-15 | 株式会社电通Tec | Information providing system using code information |
CN1818935A (en) * | 2006-03-17 | 2006-08-16 | 北京紫光捷通科技有限公司 | Two-dimensional code construction based on hexadecimal coding |
EP1870835A2 (en) * | 2006-06-21 | 2007-12-26 | NAMCO BANDAI Games Inc. | Two-dimensional code generation method, two-dimensional code, two-dimensional code recognition method, and image recognition device |
CN101132293B (en) * | 2007-08-24 | 2010-06-02 | 华为技术有限公司 | Individual information processing method, system and device |
CN101482948A (en) * | 2008-01-07 | 2009-07-15 | 唐红波 | Method for implementing mobile phone payment based on two-dimensional code |
CN102103627A (en) * | 2010-11-26 | 2011-06-22 | 中兴通讯股份有限公司 | Method and device for identifying two-dimensional codes on mobile terminal |
CN202282032U (en) * | 2011-08-25 | 2012-06-20 | 广州宽度信息技术有限公司 | Application system adopting two-dimensional code to realize food information tracing back |
Also Published As
Publication number | Publication date |
---|---|
CN107579954A (en) | 2018-01-12 |
CN107579954B (en) | 2021-06-04 |
CN103685206A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103685206B (en) | The generation method and system of identification information | |
US11356457B2 (en) | Parameter based key derivation | |
CN106797371B (en) | Method and system for user authentication | |
US9178866B2 (en) | Techniques for user authentication | |
EP3230917B1 (en) | System and method for enabling secure authentication | |
CN112035827B (en) | Cipher data processing method, device, equipment and readable storage medium | |
EP2761487B1 (en) | Parameter based key derivation | |
CN1937498A (en) | Dynamic cipher authentication method, system and device | |
US9001977B1 (en) | Telephone-based user authentication | |
CN112073440B (en) | Internet of things information recording method and system | |
CN101252437A (en) | Dynamic verification method, system and apparatus of client terminal identification under C/S architecture | |
CN207504911U (en) | A kind of data deposit system based on block chain technology | |
CN108234443A (en) | Contracting method, system and computer readable storage medium | |
CN105591745A (en) | Method and system for performing identity authentication on user using third-party application | |
CN110458559A (en) | Transaction data processing method, device, server and storage medium | |
CN100452712C (en) | Method for automatic adding member and its system | |
CN103368831B (en) | A kind of anonymous instant communicating system identified based on frequent visitor | |
CN107808227A (en) | A kind of distributing method and system of work order of constructing | |
US20090094689A1 (en) | Authentication method and system | |
CN113055185A (en) | Token-based authentication method and device, storage medium and electronic device | |
CN104639421A (en) | Instant communication information processing method and instant communication information processing system based on intelligent television | |
CN1829143A (en) | Novel method for network account number identity affirmation without cipher and encryption | |
CN115955364B (en) | User identity information confidentiality method and system of network bidding transaction system | |
CN111953711A (en) | Communication authentication method based on security authentication mechanism | |
CN104038497A (en) | Electronic identity authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191210 Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands Patentee after: Innovative advanced technology Co., Ltd Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Patentee before: Alibaba Group Holding Co., Ltd. |