[go: up one dir, main page]

CN103685206B - The generation method and system of identification information - Google Patents

The generation method and system of identification information Download PDF

Info

Publication number
CN103685206B
CN103685206B CN201210360039.5A CN201210360039A CN103685206B CN 103685206 B CN103685206 B CN 103685206B CN 201210360039 A CN201210360039 A CN 201210360039A CN 103685206 B CN103685206 B CN 103685206B
Authority
CN
China
Prior art keywords
character string
identification information
server
object content
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210360039.5A
Other languages
Chinese (zh)
Other versions
CN103685206A (en
Inventor
孟超峰
诸寅嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201210360039.5A priority Critical patent/CN103685206B/en
Priority to CN201710656871.2A priority patent/CN107579954B/en
Publication of CN103685206A publication Critical patent/CN103685206A/en
Application granted granted Critical
Publication of CN103685206B publication Critical patent/CN103685206B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

This application discloses a kind of generation method of identification information and equipment, pass through the technical scheme of application the embodiment of the present application, server according to including identification information to be created object content identification information request to create, the generation character string corresponding with the object content, the character string is converted into identification information, and the identification information is returned to the initiator of the identification information request to create, so as to, by using the configuration of business association mechanism, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and associated particular content can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, moreover, because identification information is in itself without any physical meaning, therefore, only the identification information is reported after server matched, it just can determine that specific association content, solve the safety issue of identification information.

Description

The generation method and system of identification information
Technical field
The application is related to the communications field, more particularly to a kind of identification information generation method and system.
Background technology
Quick Response Code (Dimensional Barcode), also known as two-dimensional bar code, are expanded on the basis of bar code It is a kind of that there is readable bar code.Two described in device scan two-dimensional bar code, the length and width by recognizing bar code enter Data processed, can obtain the information included in it.
Compared to bar code, Quick Response Code records more complicated data, such as picture, network linking etc..
In the application of existing Quick Response Code, what the information of Quick Response Code was to determine, i.e., user shoot after as obtained by conversion i.e. Content is unique, such as text message, addresses of items of mail, network address.Once after Quick Response Code generation, its corresponding object content is just true It is fixed, it is impossible to have other changes again.And the content is also true that content, i.e. user want obtained content, such as want The network address for sending the email address of mail or desiring access to.
During the application is realized, present applicant have found that there is following defect in prior art:
Existing 2 D code information exist can cracking, security is high.
Because Quick Response Code is set by user terminal, usual Quick Response Code application is all unicity, such as one Quick Response Code can only Correspondence passage, an Email address or a network address.Moreover, existing 2 D code information is all by two-dimentional code book Body is transmitted, by reading and reduction that content is realized to the encryption of text message, although part Quick Response Code supports identity Secondary-confirmation, but its content inherently in plain text it is visible, exist can cracking, the security to user profile causes hidden Suffer from.
The content of the invention
This application provides a kind of generation method of identification information and system, it can solve the problem that the security of identification information is asked Topic.
To reach above-mentioned purpose, on the one hand the embodiment of the present application provides a kind of generation method of identification information, including:
Server receives identification information request to create, and the identification information request to create includes identification information to be created Object content;
The server generates the character string corresponding with the object content according to the identification information request to create;
The character string is converted to identification information by the server;
The server returns to the identification information initiator of the identification information request to create.
It is preferred that, the server is received before identification information request to create, in addition to:
The server receives the log-on message transmitted by user;
Log-on message described in the server authentication;
If be proved to be successful, the server returns to the user and logins successfully confirmation message, trigger the user after Supervention send corresponding identification information request to create.
It is preferred that, the server generates the character corresponding with the object content according to institute's identification information request to create String, is specifically included:
The server directly generates a character string at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing by the server, and by institute Map listing is stated to be stored.
It is preferred that, the server directly generates a character string at random, and by the object content and the character string It is corresponding, specifically include:
The server is corresponding with an object content by generated character string;Or,
The server is corresponding with same object content by the multiple character strings generated, and configures corresponding correspondence Come into force rule;Or,
The server is corresponding with multiple object contents by generated character string, and configures corresponding correspondence life Effect rule.
It is preferred that, the corresponding relation of the object content and the character string is saved in map listing by the server Afterwards, in addition to:
The server keeps the character string object content corresponding with the character string constant;And/or,
The server, in the case where keeping the character string constant, adjusts the word according to default regulation rule The corresponding object content of symbol string;And/or,
The server is according to default regulation rule, and in the case where keeping the object content constant, adjustment is described The corresponding character string of object content;And/or,
The server is according to default regulation rule, while adjusting the character string mesh corresponding with the character string Mark content;And/or,
The server adjusts the corresponding relation of existing character string and object content according to default regulation rule.
It is preferred that, the character string is specifically generated by the server, and with uniqueness.
It is preferred that, the character string is converted to identification information by the server, is specifically included:
The character string is converted into one-dimension code according to rule set in advance;Or
The character string is converted into Quick Response Code according to rule set in advance;Or
According to rule set in advance, a variety of colors and/or shaped formation are combined into formed figure.
On the other hand, the embodiment of the present application additionally provides a kind of method of performance objective content, including:
The server receives identification information;
The identification information is converted to corresponding character string by the server, and with the map listing that is locally stored Character string matched, the corresponding relation of character string and the object content is preserved in the map listing;
If the match is successful, the corresponding relation of character string and object content in the map listing, the service Device determines the corresponding object content of the character string;
The server performs the corresponding business of object content.
On the other hand, the embodiment of the present application additionally provides a kind of system for generating identification information, including:
Receiving module, for receiving identification information request to create, the identification information request to create includes being intended to create knowledge The object content of other information;
Generation module, for the identification information request to create generation according to received by the receiving module and the target The corresponding character string of content;
Modular converter, the character string for the generation module to be generated is converted to identification information;
Sending module, the identification information for the modular converter to be changed returns to the identification information request to create Initiator.
It is preferred that, the generation module, specifically for:
One character string of generation, and the object content is corresponding with the character string at random;
The corresponding relation of the object content and the character string is saved in map listing, and by the map listing Stored.
It is preferred that, the system also include adjusting module, specifically for the generation module by the object content with After the corresponding relation of the character string is saved in map listing:
Keep the character string object content corresponding with the character string constant;And/or,
According to default regulation rule, in the case where keeping the character string constant, the character string is adjusted corresponding Object content;And/or,
According to default regulation rule, in the case where keeping the object content constant, the object content phase is adjusted Corresponding character string;And/or,
According to default regulation rule, while adjusting the character string object content corresponding with the character string;With/ Or,
According to default regulation rule, the corresponding relation of existing character string and object content is adjusted.
On the other hand, the embodiment of the present application additionally provides a kind of performance objective content system, including:
Receiving module, for receiving identification information;
Modular converter, for the identification information to be converted into corresponding character string;
Matching module, for the word of the character string of being changed the modular converter in the map listing locally stored Symbol string is matched, and the corresponding relation of character string and the object content is preserved in the map listing;
Processing module, for when the match is successful for the matching module, according to character string and target in the map listing The corresponding relation of content, determines the corresponding object content of the character string, and to perform the object content.
Compared with prior art, the application at least has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism Configuration, corresponding business tine is added for the identification information without any concrete meaning.Because identification information is not appointed in itself What physical meaning, the identification information therefore, only reported after server matched, just can determine that specific association is interior Hold, solve the safety issue of identification information.
Brief description of the drawings
A kind of schematic flow sheet of the generation method for identification information that Fig. 1 provides for the embodiment of the present application;
A kind of schematic flow sheet of the method for performance objective content that Fig. 2 provides for the embodiment of the present application;
The flow of the generation method of identification information under a kind of concrete application scene that Fig. 3 provides for the embodiment of the present application is shown It is intended to;
A kind of structural representation of the system for generation identification information that Fig. 4 provides for the embodiment of the present application;
A kind of structural representation of the system for performance objective content that Fig. 5 provides for the embodiment of the present application.
Embodiment
As stated in the Background Art, in existing Quick Response Code application scheme, because Quick Response Code is really according to fixed Business information Content Transformation is obtained, therefore, and the processing mode for directly generating Quick Response Code according to specific business information content makes two Tie up code book body exist can cracking, the information security to user causes hidden danger.
The problem of in order to solve such, present applicant proposes a kind of generation method of identification information, by user-association and The configuration of business response mechanism, corresponding business tine is added for the identification information without any concrete meaning, actually should In, because identification information is in itself without any physical meaning, therefore, the identification information is only reported into server progress After matching, specific association user and corresponding business tine are just can determine that, the safety issue of identification information is solved.
As shown in figure 1, a kind of schematic flow sheet of the generation method of the identification information provided for the embodiment of the present application, bag Include:
Step S101, server receive identification information request to create, and the request to create includes identification information to be created Object content.
In specifically processing scene, the identification information request to create may come from homologous ray by internal network Other service servers of connection, can be from the client being connected with the server by internet, such as mobile phone, Computer or other can access the electric terminal of internet.
In order to further improve the security of identification information treatment mechanism, authentication can also be included before this step Mechanism, specific authentication process itself is as follows:
(1) server receives the log-on message transmitted by the user.It is mentioned herein in specifically processing scene And log-on message there may be following two sending methods:
Mode one, user are actively sent to server.
For example, sending jointly to server in the access request that user carries the log-on message of itself.
Mode two, server requirement reporting of user.
For example, sending access request with user orientation server, server returns to user and requires the finger that the user is logged in Show that the user response instruction returns to the log-on message of itself to server.
(2) log-on message described in the server authentication.
If be proved to be successful, the server returns to the user and logins successfully confirmation message, triggers the user Continue to send corresponding identification information request to create, and start to perform step S101.
If authentication failed, the server returns to login failure confirmation message to the user, notifies the user to step on Record failure, it is impossible to proceed corresponding identification information establishment processing, other processing are proceeded to trigger the user, when So, in specifically processing scene, mentioned other processing here can be the user again by the log-on message institute The heavy login process of triggering or the user use the login process that other log-on messages are carried out, it is of course also possible to be to adopt Other processing schemes are taken, be will not enumerate herein.
The object content of identification information to be created can be the identity information of a certain user, such as account ID, or email address, Network address, by or the different business functions of correspondence, such as:Video, game are played, herein to the form and species of object content not Limit.
It should be noted that in the case of the specific business function of correspondence, according to the difference of objectives content, its institute The mode of the business of realization is there is also corresponding difference, for example:
Business function for playing video, if object content is an online broadcasting network address, its corresponding broadcasting The business of video will be realized by opening the network address and playing video;
If object content is address or the video download address of given server, the corresponding industry for playing video Business, by being asked to the server or directly downloading corresponding video file and realize by way of playing the video;
And if object content is one section of function on code, then its corresponding business for playing video simply will be local Video playback instrument is opened, and plays the mode of specific video file (such as local default video file) to realize.
Except cited aforesaid way, specific object content can also include a variety of situations, no longer say one by one herein Bright, such change has no effect on protection scope of the present invention.
Step S102, the server generate the character string corresponding with the object content according to request to create.
The server directly generates a character string at random, and the object content is corresponding with character string.And will Corresponding relation is saved in a map listing, and the map listing is stored in the server.
It should be noted that:
1st, object content and the corresponding relation of character string include following three kinds in the map listing:
Corresponded manner one, character string and object content are corresponded.
Such corresponded manner is the simplest, treatment effeciency also highest, can be preferential in the case of service logic is simple Using.
For example, the character string is corresponding with fixed network address all the time, then, when business user passes through the character string During triggering business, the website information will can be obtained all the time.
Corresponded manner two, multiple character strings are corresponding with same object content.
, it is necessary to configure the corresponding corresponding rule that comes into force under the scene of such a corresponded manner of application.
On the one hand, all character strings can be made while coming into force, so, different business users can be by different Character string triggers the business corresponding to same object content, and diversified business triggers path, for example, different user groups obtains Different character strings are got, it is thus possible to trigger identical business by different character strings.
On the other hand, each character string can also be made to come into force respectively, so, can be realized by coming into force different character strings The control in business triggering source, for example, in the case of different character strings are got in different user groups, only getting The user group of the character string come into force can trigger corresponding business by the character string come into force, and only get current Pending The Entry Into Force The user group of character string can not then trigger the business.
Corresponded manner three, a character string are corresponding with multiple object contents.
It is similar with above-mentioned corresponded manner two, it is necessary to configure corresponding right under the scene of such a corresponded manner of application Should be come into force rule.
Correspondence as specific object content comes into force rule, the regulation rule of the actual business tine corresponding to it, It may rely on the direct setting of user itself, or the adjustment mode pre-set in accordance with user to carry out, for example, user sets Put at daily 8 points to 20 points, for " calling me ", (object content corresponding to it is telephone number to associated business Information, the business operation still made a phone call is not limited herein), and at 8 points of daily 20 points to next day, associated business For " sending out mail to me " (object content corresponding to it is the information of addresses of items of mail, or hair mail business operation herein not Limit).
In actual applications, the association for specifically carrying out business tine using which kind of above-mentioned mode can be according to actual need Set, it is such to change the protection domain for having no effect on the application.
2nd, after the corresponding relation of the object content and the character string is saved in map listing by server, also wrap Include further content adjustable strategies.
The diversified forms of corresponding relation in map listing are illustrated in above-mentioned 1, and it should be noted that specific in 2 The adjustable strategies of contents in table (character string and/or object content) and corresponding relation, particular content is as follows:
Strategy one, the server keep the character string object content corresponding with the character string constant.
Similar with foregoing corresponded manner one, this is equally a kind of static treatment mode, and such mode is the simplest, Treatment effeciency also highest, in the case of service logic is simple, can preferentially be used.
For example, the character string is corresponding with fixed network address all the time, and character string and object content are remained not Become, then, when business user triggers business by the character string, the website information will can be obtained all the time.
Strategy two, the server are according to default regulation rule, in the case where keeping the character string constant, adjustment The corresponding object content of the character string.
Such mode can avoid frequently foreground content (identification information) change that adjustment character string is brought, on backstage In the case that content (object content and its corresponding business tine) changes, without adjusting foreground content, you can realize New business.
For example, after the blog address information that user A has issued oneself extensively by way of issuing identification information, its Prepare to change blog address, but go the processing mode for changing announced identification information obviously too cumbersome one by one, also easily go out Now omit, it is therefore possible to use above-mentioned strategy, keeps the character string corresponding to the identification information constant, directly in map listing It is new blog address to connect the object content adjusted corresponding to it.After the completion of adjustment, other users can be continuing with original Identification information triggering adjustment after object content, so as to access user A new blog.
Strategy three, the server, in the case where keeping the object content constant, are adjusted according to default regulation rule The corresponding character string of the whole object content.
Such mode can adjust to realize the renewal of foreground content by the content of character string, so as to realize customer group The adjustment and renewal of body, and improve the security of business triggering mode.
For example, user group X can trigger the business made a phone call to user A by current identification information, and user A is not Wish to be connected to the phone of the user group again, then user A then can be by way of changing character string in map listing, adjustment Foreground content, makes identification information content change, so that, user group X will be unable to triggering by the identification information before modification The business made a phone call to user A, the business made a phone call to user A could be triggered by only getting the user of new identification information, Such processing mode can efficiently realize the adjustment of interactive colony during user's handover network social environment.
Further, in the case where disabled user gets identification information, user can make original by adjusting character string There is identification information failure, so as to avoid being encroached on by disabled user, improve the security of corresponding service.
Strategy four, the server are according to default regulation rule, while adjusting the character string and the character string phase Corresponding object content.
Such adjustment can then realize comprehensive renewal of foreground content and backstage content, be in existing list item before The comprehensive change held, is updated to business tine and its trigger condition.
Strategy five, the server adjust existing character string and the correspondence of object content according to default regulation rule Relation.
This tactful regulating object is no longer specific contents in table, but the corresponding relation between each list item is (i.e. foregoing Corresponded manner one to three).
By the adjustment of corresponding relation, the object content and character string generated is matched again, so that, same Trigger condition under, different business tines can be triggered.
This tactful specific example may be referred to the example of foregoing corresponded manner three, and both realizes that effect is consistent, In foregoing corresponded manner three, selected in existing multiple corresponding relations but concrete implementation mode is then slightly different The one or more corresponding relations come into force are selected, and in this strategy, be then that directly to create new corresponding relation existing to replace Corresponding relation, such change can be temporary transient or permanent.
It should be further stated that, the realization of the adjustable strategies corresponding to above-mentioned strategy two to five is the server According to specific regulation rule, the different application scenarios of correspondence carry out the adjustment operation of specific contents in table or corresponding relation.
Under the scene of such a mode of application, specific regulation rule can be that timing adjustment (is fixed on some time Point carries out the dynamic adjustment of identification information, for example, at 0 point in daily evening), period modulation is (i.e. right after the default cycle Identification information enters Mobile state adjustment, for example, often passing through 3 day time, Mobile state adjustment is just entered to identification information) or trigger-type adjustment (i.e. according to certain trigger condition, the adjustment of identification information is triggered, for example, when its corresponding business tine changes, i.e., Identification information is adjusted) etc..
It should be noted that above-mentioned regulation rule may be used alone, can also be used in combination, specifically using which kind of or Which plants regulation rule to realize the dynamic adjustment of identification information, can't influence the protection domain of the application.
Believe it should be noted that above-mentioned specific character string can't have in itself with subscriber identity information or other business The substantive content that manner of breathing is closed, that is to say, that character string does not have in all senses in itself, and only server is according to rule or random The unduplicated character string of generation, the character string and object content are in addition to mapping relations, without any association.
In order to ensure the security of information, the character string that server is generated necessarily is differed with object content, for example, working as Need the object content of mapping when being 123, the character string generated necessarily with 123 character combinations without any association, than Such as X67E, server generates corresponding identification information according to the character combination, and such text string generation mode can be effective Avoid identification information from being cracked and cause the danger of information leakage.
The character string is converted to identification information by step 103, the server.
Such conversion regime can use existing conversion regime, it would however also be possible to employ other identification informations newly defined turn Rule is changed, such change has no effect on the protection domain of the application.
The identification information is returned to request initiator by step 104, the server.
Specific feedback system can directly feed back the identification information content or feedback identifying information generated Successful confirmation message is generated, specific feedback system can be determined according to actual needs.
By said process, server generates identification information, and is associated respectively with corresponding object content, complete Into the complete generating process of identification information.
As shown in Fig. 2 the application has further disclosed a kind of method of performance objective content, it is described as follows:
Step S201, the server receive identification information.
The identification information is converted to corresponding character string by step S202, the server, and locally stored Character string in map listing is matched.
If the match is successful, step S203 is performed;
If it fails to match, directly stop the processing to the identification information, and return to the logical of identification information processing failure Know message.
It should be noted that in specifically processing scene, in order to further improve the safety of identification information treatment mechanism Property, subscriber authentication mechanism can also be included before this step, specific authentication process itself is as follows:
The server receives the authentication information, the authentication machine with the first user in abovementioned steps S101 System is similar, and server is actively sent to there is also user for authentication information herein or server requirement user reports Two kinds of possible situations of respective identity checking information, such change has no effect on the protection domain of the application.
Authentication information described in the server authentication.
If be proved to be successful, the server performs above-mentioned step S202, and the identification information is converted to accordingly Character string, and character string is matched in the map listing locally stored.
And if authentication failed, then server directly stops the processing to the identification information, and to returning at identification information Reason failure or the notification message of authentication failure.
Step S203, the corresponding relation according to character string in map listing and object content, the server determine described The corresponding object content of character string.
Step S204, the server perform the corresponding business of object content.
By above-mentioned explanation, present applicant proposes a kind of association process of dependence server side come the identification information realized Application scheme, identification information in itself without any substantive implication, it is necessary to the incidence relation stored by server, ability Specific user identity and the business tine corresponding to identification information are determined, in specific application process, above-mentioned identification letter The concrete form of breath can include following several:
The bar code of gained is changed according to preset rules;Or,
The Quick Response Code of gained is changed according to preset rules;Or,
According to certain rule, a variety of colors and/or shaped formation are combined into formed figure, for example, arranged by ad hoc rules Round dot, square, color lump of row etc., or the figure of a variety of element compositions above.
In actual application scenarios, in order to mitigate the processing load of server, the conversion and knowledge of specific identification information Other process can have specific external terminal to realize.
For example, specific character string and user identity and the incidence relation of business tine are simply stored in server, and Specific two-dimension code identification terminal is converted to Quick Response Code after the character string that server is issued is received, by the character string and presented To the user needed to use, or, the two-dimension code identification terminal is recognized after the Quick Response Code of user's offer, recognizes the Quick Response Code, Specific character string is converted to, and the character string is sent to server and is matched, corresponding user identity and business is obtained Content.
By such processing, (storage of character string shows the processing pressure and storage burden that can mitigate in terms of server So storage resource is more saved than figure storage), it is such to change the protection domain for having no effect on the application.
By above-mentioned processing, each strategy provided with reference to step S102, the application can at least provide four kinds specifically Identification information building mechanism.
For same user, four kinds of identification information building mechanisms are described individually below, for convenience of explanation, In every kind of mechanism, it is illustrated by taking Quick Response Code as an example, certainly, this is a kind of specific example, other kinds of identification Information can also be applied to the technical scheme that the application is proposed.
(1) identification information is fixed, and associated services content is fixed (strategy one in step S102).
That is double static configuration schemes of identification information and associated services, no matter when, get the identification information, The business tine realized is consistent.
Under such a scenario, in order to improve the security of business, corresponding authentication mechanism can be added, for example, according to User name and or the mode of password verified, or, verified etc. according to the mode of white list.
It is described as follows by taking Quick Response Code as an example:
First user is in setting business and after generating Quick Response Code, there is provided only oneself contacts list (above-mentioned white list A kind of concrete mode) in people's (first and second) can just obtain the corresponding business of Quick Response Code, and if third shoots Quick Response Code When asking the business, then it may be notified that uncommitted, it is impossible to obtain the business.
(2) identification information is fixed, associated services content-variable (strategy two in step S102).
The allocation plan that i.e. static identification information and the business of dynamically associating are combined, identification information just will not once generation Change again, still, the business tine associated by it then can be adjusted conversion according to certain mechanism.
So processing can carry out interim control to business tine, improve the controllability of business processing.
It is described as follows by taking Quick Response Code as an example:
First user is after generation Quick Response Code, there is provided the regulation rule of associated services content, here set rule, In addition to the regular situation according to time change communication mode cited in step S102, it can also further increase triggering machine System carries out further flexibly control, for example, for a same Quick Response Code, first shoots the Quick Response Code at 9 points in the morning, got Be the business that phone contact is carried out with the first user, and second shoots the Quick Response Code at 12 points at noon, is advised according to original time Then, also should be now the business tine of phone contact, but due to the first user just in session, it triggers disturbance-free service, because This, the business that tone information is simply carried out to the first user that second is got, and when first shoots the Quick Response Code at 9 points again at night When, due to the change of time, accessed by it is the business that mail is sent to the first user.
By above example it can be seen that, although any change does not occur for Quick Response Code content, but due to the change of time, nothing Whether by being same user, its business tine for shooting accessed by the Quick Response Code may be different, such treatment mechanism The first user is helped to realize the flexible control of business.
(3) identification information is variable, and associated services content is fixed (mode three in step S102).
The allocation plan that i.e. Dynamic Recognition information and static association business are combined, identification information can be according to certain machine System is adjusted conversion, but no matter how the particular content of the identification information converts, and the business tine corresponding to it is kept not Become.
So processing can increase the validity limitation of identification information in itself, improve the ageing of business processing.
It is described as follows by taking Quick Response Code as an example:
First user is in setting business and after generating Quick Response Code, and Quick Response Code every other day can all enter Mobile state renewal, but its Associated business tine can't change.First and second are getting Quick Response Code on the same day, but first passes through shooting on the day of The Quick Response Code requested service, and succeeding, and second shot the Quick Response Code requested service at second day, due to Quick Response Code by Dynamic adjustment, so, second may be notified that Quick Response Code is invalid, it is impossible to obtain the business, certainly, if second can be regained after adjustment Quick Response Code, then can still ask the business, pass through such processing, it is possible to achieve the interim authority of user is limited.
(4) identification information is variable, associated services content-variable (strategy two in step S102).
That is the double acting state allocation plan of identification information and associated services, according to corresponding regulation rule, identification information is in itself Content and its associated by business tine can be carried out adjustment.
So processing can make user parallel realize multi-service control,
It is described as follows by taking Quick Response Code as an example:
First user is different from sale tri- commodity of A, B, C on the net, three commodity prices and attribute, and to buy business The user of product have again first, second, the third three, then, the first and second the third three that different orders can be generated when buying different commodity is (different Business), Quick Response Code also can be different, but final beneficiary is entirely same user.
Strategy five in step S102 can be embodied by the example of above-mentioned (2) into (4), be not repeated herein It is bright.
Above-mentioned four kinds of identification information building mechanisms can be configured according to actual needs, and such change can't influence The protection domain of the application.
Compared with prior art, the embodiment of the present application has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism Configuration, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and is closed The particular content of connection can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, not only such as This, because identification information is in itself without any physical meaning, therefore, only reports server progress by the identification information After matching somebody with somebody, specific association content is just can determine that, the safety issue of identification information is solved.
Below in conjunction with the accompanying drawing in the application, clear, complete description is carried out to the technical scheme in the application, is shown So, described embodiment is a part of embodiment of the application, rather than whole embodiments.Based on the implementation in the application Example, the every other embodiment that those of ordinary skill in the art are obtained on the premise of creative work is not made all belongs to The scope protected in the application.
Specifically, combining the generation method for the identification information that actual application scenarios are provided the embodiment of the present application and its answering It is illustrated with process, for convenience of explanation, follow-up explanation is described exemplified by equally using Quick Response Code.
As shown in figure 3, Quick Response Code generating process under a kind of concrete application scene proposed by the embodiment of the present application Schematic flow sheet, specifically includes following steps:
Step S301, user A access server, and request accesses system service.
Step S302, server return to the message for requiring that user A is logged in.
Step S303, user A submit log-on message, and the log-on message includes username and password.
Step S304, server check username and password validity.
If it is valid, performing step S305;
If invalid, user's A login failures are notified, and terminate currently processed process.
Step S305, server notify user A to login successfully.
Step S306, user A send Quick Response Code request to create to server.
Step S307, server generate Quick Response Code at random, and 2 D code information is associated with user A ID.
It is to be appreciated that wherein the Quick Response Code of server generation when, firstly generate specific character string, the specific character string can be with Associated with user account or pure business is not in contact with user account, can dynamically (such as have in one end time Effect), can also be static (once generation i.e. continuously effective).Specific character string is converted to two by server according to preset rules Tie up code.
Specific processing mode and create-rule are not repeated herein referring to preceding description.
Step S308, server prompts user A set business corresponding with Quick Response Code.
Step S309, user's A login service devices, set business corresponding with Quick Response Code.
In specifically processing scene, when user's A login services device sets business corresponding with Quick Response Code, can freely it set Put one or more business corresponding with Quick Response Code.
For example, user applies for a string of Quick Response Codes at backstage (server), corresponding function has " business card ", " payment " and " closed Note me " three functions;User can be put into Quick Response Code forum or print, and such Quick Response Code is constant, but user Corresponding content can be set on login system backstage at any time, such as be revised as " business card " One function, i.e., foregoing static identification The allocation plan that information and dynamic service content are combined.
For example, user asks Quick Response Code by mobile phone client software from trend server, then each Quick Response Code is all It is different, such as just automatically updates once within every five minutes, but business function is " being paid the bill to me " all the time, i.e., foregoing is dynamic The allocation plan that state identification information and static traffic content are combined.
For example, user asks Quick Response Code by mobile phone client software from trend server, then each Quick Response Code is all Be different, such as just automatically update once within every five minutes, but service end know all the time the Quick Response Code it is corresponding which is User;And user can set the Quick Response Code to be on duty interval scale " hair me mail " on backstage, interval scale of coming off duty " is stayed to me Speech ", i.e., foregoing identification information and the double acting state allocation plan of business tine.
Certainly, also simplest pair static configuration scheme, will not be repeated here.
By above-mentioned processing, complete after Quick Response Code generating process, user B gets the Quick Response Code that user A asks generation Information, and send the 2 D code information to server.Server is received after the 2 D code information, first determines whether that the Quick Response Code is believed The legitimacy of breath, if Quick Response Code is legal in itself, it is required that user B validation informations (can be determined according to user A setting Whether requirement is verified), after user's B validation informations, server is verified to checking information, after verification passes through, and parses two The corresponding user of dimension code information simultaneously gets correspondence business, and service lists or information are returned to user B.User B is according to return Service lists (when the Quick Response Code multiple business of correspondence) or information selection business, and perform corresponding business to user A.
Compared with prior art, the embodiment of the present application has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism Configuration, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and is closed The particular content of connection can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, not only such as This, because identification information is in itself without any physical meaning, therefore, only reports server progress by the identification information After matching somebody with somebody, specific association content is just can determine that, the safety issue of identification information is solved.
In order to realize above-mentioned technical scheme, the embodiment of the present application provides a kind of system for generating identification information, and it is tied Structure schematic diagram is as shown in figure 4, at least include:
Receiving module 41, for receiving identification information request to create, the identification information request to create includes being intended to create The object content of identification information;
Generation module 42, for according to received by the receiving module 41 identification information request to create generation with it is described The corresponding character string of object content;
Modular converter 43, the character string for the generation module 42 to be generated is converted to identification information;
Sending module 44, the identification information for the modular converter 43 to be changed returns to the identification information establishment please The initiator asked.
It is preferred that, the generation module 42, specifically for:
One character string of generation, and the object content is corresponding with the character string at random;
The corresponding relation of the object content and the character string is saved in map listing, and by the map listing Stored.
It is preferred that, the system of the generation identification information also includes adjusting module 45, specifically in the generation module After 42 are saved in the corresponding relation of the object content and the character string in map listing:
Keep the character string object content corresponding with the character string constant;And/or,
According to default regulation rule, in the case where keeping the character string constant, the character string is adjusted corresponding Object content;And/or,
According to default regulation rule, in the case where keeping the object content constant, the object content phase is adjusted Corresponding character string;And/or,
According to default regulation rule, while adjusting the character string object content corresponding with the character string;With/ Or,
According to default regulation rule, the corresponding relation of existing character string and object content is adjusted.
Further, the embodiment of the present application provides a kind of system of performance objective content, its structural representation such as Fig. 5 institutes Show, at least include:
Receiving module 51, for receiving identification information;
Modular converter 52, for the identification information to be converted into corresponding character string;
Matching module 53, for the character string of being changed the modular converter 52 in the map listing locally stored Character string matched, the corresponding relation of character string and the object content is preserved in the map listing;
Processing module 54, for when the match is successful for the matching module 53, according to character string in the map listing with The corresponding relation of object content, determines the corresponding object content of the character string, and to perform the object content.
Compared with prior art, the embodiment of the present application has advantages below:
By the technical scheme of application the embodiment of the present application, server is according to including the object content of identification information to be created Identification information request to create, generate the character string corresponding with the object content, the character string is converted into identification believes Breath, and by the initiator of the identification information return identification information request to create, so that, by using business association mechanism Configuration, corresponding business tine is added for the identification information without any concrete meaning, and business association mechanism and is closed The particular content of connection can be as needed adjusted in server side, realize the dynamic adjustment mechanism of identification information, not only such as This, because identification information is in itself without any physical meaning, therefore, only reports server progress by the identification information After matching somebody with somebody, specific association content is just can determine that, the safety issue of identification information is solved.
It will be appreciated by those skilled in the art that the module in device in embodiment can be divided according to embodiment description It is distributed in the device of embodiment, respective change can also be carried out and be disposed other than in one or more devices of the present embodiment.On The module for stating embodiment can be merged into a module, can also be further split into multiple submodule.
Above-mentioned the embodiment of the present application sequence number is for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that the application can be by Software adds the mode of required general hardware platform to realize, naturally it is also possible to which by hardware, but in many cases, the former is more Good embodiment.Understood based on such, what the technical scheme of the application substantially contributed to prior art in other words Part can be embodied in the form of software product, and the computer software product is stored in a storage medium, if including Dry instruction is to cause a station terminal equipment (can be mobile phone, personal computer, server, or network equipment etc.) to perform sheet Apply for the method described in each embodiment.
Described above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art For member, on the premise of the application principle is not departed from, some improvements and modifications can also be made, these improvements and modifications also should Depending on the protection domain of the application.

Claims (10)

1. a kind of generation method of identification information, it is characterised in that including:
Server receives identification information request to create, and the identification information request to create includes the target of identification information to be created Content;
The server generates the character string corresponding with the object content according to the identification information request to create;
The character string is converted to identification information by the server;
The server returns to the identification information initiator of the identification information request to create;
Wherein, the server generates the character string corresponding with the object content, tool according to institute's identification information request to create Body includes:
The server generates one or more character strings at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing by the server, and is reflected described List is penetrated to be stored.
2. the method as described in claim 1, it is characterised in that the server is received before identification information request to create, also Including:
The server receives the log-on message transmitted by user;
Log-on message described in the server authentication;
If be proved to be successful, the server returns to the user and logins successfully confirmation message, triggers the user and continues to send out Send corresponding identification information request to create.
3. the method as described in claim 1, it is characterised in that the server generates one or more character strings at random, and The object content is corresponding with the character string, specifically include:
The server is corresponding with an object content by generated character string;Or,
The server is corresponding with same object content by the multiple character strings generated, and configures corresponding accordingly come into force Rule;Or,
The server is corresponding with multiple object contents by generated character string, and configures corresponding corresponding rule of coming into force Then.
4. the method as described in claim 1, it is characterised in that the server is by the object content and the character string After corresponding relation is saved in map listing, in addition to:
The server keeps the character string object content corresponding with the character string constant;And/or,
The server, in the case where keeping the character string constant, adjusts the character string according to default regulation rule Corresponding object content;And/or,
The server, in the case where keeping the object content constant, adjusts the target according to default regulation rule The corresponding character string of content;And/or,
The server is according to default regulation rule, while adjusting in the character string target corresponding with the character string Hold;And/or,
The server adjusts the corresponding relation of existing character string and object content according to default regulation rule.
5. the method as described in any one in Claims 1-4, it is characterised in that the character string, specifically by the service Device is generated, and with uniqueness.
6. the method as described in any one in Claims 1-4, it is characterised in that:The server turns the character string Identification information is changed to, is specifically included:
The character string is converted into one-dimension code according to rule set in advance;Or
The character string is converted into Quick Response Code according to rule set in advance;Or
According to rule set in advance, a variety of colors and/or shaped formation are combined into formed figure.
7. a kind of method of performance objective content, it is characterised in that including:
Server receives identification information;
The identification information is converted to corresponding character string by the server, and with the word in the map listing that is locally stored Symbol string is matched, and the corresponding relation of character string and the object content is preserved in the map listing;
If the match is successful, the corresponding relation of character string and object content in the map listing, the server is true The corresponding object content of the fixed character string;
The server performs the object content;
Wherein, the generation of the map listing, is specifically included:
The server generates one or more character strings at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing by the server, and is reflected described List is penetrated to be stored.
8. a kind of system for generating identification information, it is characterised in that including:
Receiving module, for receiving identification information request to create, the identification information request to create includes being intended to create identification letter The object content of breath;
Generation module, for the identification information request to create generation according to received by the receiving module and the object content Corresponding character string;
Modular converter, the character string for the generation module to be generated is converted to identification information;
Sending module, the identification information for the modular converter to be changed returns to the initiation of the identification information request to create Side;
Wherein, the generation module, specifically for:
One or more character strings are generated at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing, and the map listing is carried out Storage.
9. system as claimed in claim 8, it is characterised in that also including adjusting module, specifically in the generation module After the corresponding relation of the object content and the character string is saved in map listing:
Keep the character string object content corresponding with the character string constant;And/or,
According to default regulation rule, in the case where keeping the character string constant, the corresponding mesh of the character string is adjusted Mark content;And/or,
According to default regulation rule, in the case where keeping the object content constant, the object content is adjusted corresponding Character string;And/or,
According to default regulation rule, while adjusting the character string object content corresponding with the character string;And/or,
According to default regulation rule, the corresponding relation of existing character string and object content is adjusted.
10. a kind of system of performance objective content, it is characterised in that including:
Receiving module, for receiving identification information;
Modular converter, for the identification information to be converted into corresponding character string;
Matching module, for the character string of the character string of being changed the modular converter in the map listing locally stored Matched, the corresponding relation of character string and the object content is preserved in the map listing;
Processing module, for when the match is successful for the matching module, according to character string and object content in the map listing Corresponding relation, determine the corresponding object content of the character string, and to perform the object content;
Wherein, the matching module, specifically for:
One or more character strings are generated at random, and the object content is corresponding with the character string;
The corresponding relation of the object content and the character string is saved in map listing, and the map listing is carried out Storage.
CN201210360039.5A 2012-09-25 2012-09-25 The generation method and system of identification information Active CN103685206B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210360039.5A CN103685206B (en) 2012-09-25 2012-09-25 The generation method and system of identification information
CN201710656871.2A CN107579954B (en) 2012-09-25 2012-09-25 Method and system for generating identification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210360039.5A CN103685206B (en) 2012-09-25 2012-09-25 The generation method and system of identification information

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201710656871.2A Division CN107579954B (en) 2012-09-25 2012-09-25 Method and system for generating identification information

Publications (2)

Publication Number Publication Date
CN103685206A CN103685206A (en) 2014-03-26
CN103685206B true CN103685206B (en) 2017-09-22

Family

ID=50321532

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201210360039.5A Active CN103685206B (en) 2012-09-25 2012-09-25 The generation method and system of identification information
CN201710656871.2A Active CN107579954B (en) 2012-09-25 2012-09-25 Method and system for generating identification information

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201710656871.2A Active CN107579954B (en) 2012-09-25 2012-09-25 Method and system for generating identification information

Country Status (1)

Country Link
CN (2) CN103685206B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205382A (en) * 2014-06-24 2015-12-30 鸿合科技有限公司 Two-dimension code identity authentication method and device
CN104680114B (en) * 2015-03-03 2018-06-01 深圳家电网科技实业股份有限公司 One Quick Response Code handles the method and its system of multiple requests
CN106850393A (en) * 2015-12-07 2017-06-13 中国移动通信集团公司 A kind of information analysis method, terminal device and system
CN107563474B (en) * 2016-06-30 2020-11-24 百度在线网络技术(北京)有限公司 Two-dimensional code generation method and device
CN107315819A (en) * 2017-06-30 2017-11-03 天津飞鸿达安全印务有限公司 A kind of method of two-dimensional code display, device and equipment
CN108134790A (en) * 2017-12-21 2018-06-08 知而行(上海)营销咨询有限公司 A kind of customer identification information processing method
CN110750684B (en) * 2018-07-06 2022-08-16 武汉斗鱼网络科技有限公司 Message prompting method for multi-dimensional verification, storage medium, electronic device and system
CN110378094A (en) * 2019-07-04 2019-10-25 绿漫科技有限公司 A kind of omnipotent 2 D code verification method based on garden system
CN110458571B (en) * 2019-07-05 2023-06-02 创新先进技术有限公司 Risk identification method, device and equipment for information leakage
CN111598096A (en) * 2020-04-03 2020-08-28 维沃移动通信有限公司 Image processing method and electronic equipment
CN112148124B (en) * 2020-09-10 2024-07-26 维沃移动通信有限公司 Image processing method and device and electronic equipment
CN112800803B (en) * 2021-04-09 2021-07-30 腾讯科技(深圳)有限公司 Graphic code identification method, device, equipment and storage medium
CN113794735B (en) * 2021-09-29 2023-05-30 北京雅丁信息技术有限公司 Sensitive data security protection method in SAAS system scene
CN114707084A (en) * 2022-03-24 2022-07-05 中国银行股份有限公司 Two-dimensional code content preview method, related device and computer storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1468173A (en) * 2000-10-05 2004-01-14 ������������ʽ���� Identification code creating method in network and identification code creating program
CN1628291A (en) * 2002-02-08 2005-06-15 株式会社电通Tec Information providing system using code information
CN1818935A (en) * 2006-03-17 2006-08-16 北京紫光捷通科技有限公司 Two-dimensional code construction based on hexadecimal coding
EP1870835A2 (en) * 2006-06-21 2007-12-26 NAMCO BANDAI Games Inc. Two-dimensional code generation method, two-dimensional code, two-dimensional code recognition method, and image recognition device
CN101482948A (en) * 2008-01-07 2009-07-15 唐红波 Method for implementing mobile phone payment based on two-dimensional code
CN101132293B (en) * 2007-08-24 2010-06-02 华为技术有限公司 Individual information processing method, system and device
CN102103627A (en) * 2010-11-26 2011-06-22 中兴通讯股份有限公司 Method and device for identifying two-dimensional codes on mobile terminal
CN202282032U (en) * 2011-08-25 2012-06-20 广州宽度信息技术有限公司 Application system adopting two-dimensional code to realize food information tracing back

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4110728B2 (en) * 2000-09-28 2008-07-02 株式会社デンソー Mobile phone and communication system
CN1845165A (en) * 2006-03-25 2006-10-11 福建新大陆电脑股份有限公司 Application method for two-dimension code and mobile phone in ticket system
CN102438067B (en) * 2011-10-25 2013-12-25 福州博远无线网络科技有限公司 Method for installing mobile phone software by mobile phone scanning two-dimension code
CN102571803B (en) * 2012-01-19 2016-04-27 北京远鉴科技有限公司 A kind of graphic based Quick Response Code protection account, prevent order from distorting and the method and system of phishing attack

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1468173A (en) * 2000-10-05 2004-01-14 ������������ʽ���� Identification code creating method in network and identification code creating program
CN1628291A (en) * 2002-02-08 2005-06-15 株式会社电通Tec Information providing system using code information
CN1818935A (en) * 2006-03-17 2006-08-16 北京紫光捷通科技有限公司 Two-dimensional code construction based on hexadecimal coding
EP1870835A2 (en) * 2006-06-21 2007-12-26 NAMCO BANDAI Games Inc. Two-dimensional code generation method, two-dimensional code, two-dimensional code recognition method, and image recognition device
CN101132293B (en) * 2007-08-24 2010-06-02 华为技术有限公司 Individual information processing method, system and device
CN101482948A (en) * 2008-01-07 2009-07-15 唐红波 Method for implementing mobile phone payment based on two-dimensional code
CN102103627A (en) * 2010-11-26 2011-06-22 中兴通讯股份有限公司 Method and device for identifying two-dimensional codes on mobile terminal
CN202282032U (en) * 2011-08-25 2012-06-20 广州宽度信息技术有限公司 Application system adopting two-dimensional code to realize food information tracing back

Also Published As

Publication number Publication date
CN107579954A (en) 2018-01-12
CN107579954B (en) 2021-06-04
CN103685206A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
CN103685206B (en) The generation method and system of identification information
US11356457B2 (en) Parameter based key derivation
CN106797371B (en) Method and system for user authentication
US9178866B2 (en) Techniques for user authentication
EP3230917B1 (en) System and method for enabling secure authentication
CN112035827B (en) Cipher data processing method, device, equipment and readable storage medium
EP2761487B1 (en) Parameter based key derivation
CN1937498A (en) Dynamic cipher authentication method, system and device
US9001977B1 (en) Telephone-based user authentication
CN112073440B (en) Internet of things information recording method and system
CN101252437A (en) Dynamic verification method, system and apparatus of client terminal identification under C/S architecture
CN207504911U (en) A kind of data deposit system based on block chain technology
CN108234443A (en) Contracting method, system and computer readable storage medium
CN105591745A (en) Method and system for performing identity authentication on user using third-party application
CN110458559A (en) Transaction data processing method, device, server and storage medium
CN100452712C (en) Method for automatic adding member and its system
CN103368831B (en) A kind of anonymous instant communicating system identified based on frequent visitor
CN107808227A (en) A kind of distributing method and system of work order of constructing
US20090094689A1 (en) Authentication method and system
CN113055185A (en) Token-based authentication method and device, storage medium and electronic device
CN104639421A (en) Instant communication information processing method and instant communication information processing system based on intelligent television
CN1829143A (en) Novel method for network account number identity affirmation without cipher and encryption
CN115955364B (en) User identity information confidentiality method and system of network bidding transaction system
CN111953711A (en) Communication authentication method based on security authentication mechanism
CN104038497A (en) Electronic identity authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191210

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands

Patentee after: Innovative advanced technology Co., Ltd

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Co., Ltd.