Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone two-dimensional code safe use method based on information hiding

A technology of information hiding and two-dimensional code, which is applied in the recording carrier used by the machine, security device, wireless communication, etc., can solve the problems of personal information leakage, infringement of other people's rights, information leakage, etc., and achieve strong practicality and operability , The structure system is simple and clear, and the division of labor is clear

Active Publication Date: 2013-11-27
上海翰星电子科技有限公司
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, while mobile phone QR codes give us convenience, they are not all advantages and no disadvantages.
The first is the issue of information leakage
QR codes have the characteristics of a large amount of information, but this is a double-edged sword. While we can obtain more information through QR codes, it is also possible that our personal information will be leaked because of this small QR code.
In the application of these two-dimensional codes, mobile phones that can receive multimedia messages can receive the two-dimensional code. At this time, if the multimedia message is forwarded by criminals, criminals can also use the two-dimensional code to steal other people's identities to board the plane or watch movies , shopping, and meeting sign-in, seriously infringing on the rights and interests of others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone two-dimensional code safe use method based on information hiding
  • Mobile phone two-dimensional code safe use method based on information hiding
  • Mobile phone two-dimensional code safe use method based on information hiding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Here, the above-mentioned two-dimensional code safe use scheme is applied to daily life. Since there are many types of two-dimensional codes in reality, the present invention selects a representative QR Code code for detailed description. A is an ordinary user who needs to travel recently and has booked a plane ticket online. B is an employee of an airline. After receiving A's order, B returns a QR code to A as a voucher. C is an airport staff member who verifies the QR code held by A.

[0053] The specific implementation steps will be described in this case based on the above-mentioned method flow:

[0054] Step 1) A needs to book a ticket on the website of an airline company. The airline uses a mobile phone QR code to provide the flight certificate to the user. For safety reasons, A is required to enter secret information for the QR code certificate. Protect. Therefore, A provides personal name and ID number while adding personal secret information. To simplify the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile phone two-dimensional code safe use method based on information hiding. With the development of information technology and Internet technology, people pay more attention to the convenient and environmental-friendly two-dimensional code technology, and the use of the two-dimensional code is wider and wider. However, a traditional mobile phone two-dimensional code is lack of a necessary security mechanism, people can use a two-dimensional code as long as the people have the two-dimensional code, and the security of the private information of the user is invaded. The method is based on the information hiding technology, the cryptography theory and bar code technology are utilized, through a method of embedding user secret information in encoding and carrying out extraction, operation and comparison in decoding, the safe use problem of the mobile phone two-dimensional code is solved, the leakage and stealing of the information are prevented, and the integrity and confidentiality of the information are ensured. The method is simple and practical, with the gradual popularization of the Internet technology at the present age, and method plays an important role for the security of the information.

Description

technical field [0001] The invention belongs to the intersecting field of Internet of Things technology and information security technology. Involving information hiding technology, cryptography theory and barcode technology, it mainly solves the problem of safe use of mobile phone QR codes, and plays an important role in information security in the era when Internet of Things technology is gradually popularized. [0002] Background technique [0003] In the era of information technology, new technologies and new equipment allow information to be expressed in various forms, and the carrier of information is also changing. The two-dimensional code technology that was born a long time ago has "blossomed" in various fields in recent years. Two-dimensional code is a new generation of barcode technology that records data symbol information in a black and white rectangular matrix distributed on a plane (two-dimensional direction) according to certain rules. It consists of a two-d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W88/02G06K19/06G06K7/10
Inventor 黄海平杨晟黄世超王汝传许媛马军陈磊徐佳
Owner 上海翰星电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products