Method and device for generating two-dimensional code based on text compression and method and device for reading two-dimensional code based on text compression

A text compression and two-dimensional code technology, which is applied in secure communication devices, record carriers used by machines, user identity/authority verification, etc., can solve the problems of increasing ciphertext transmission costs and low efficiency of anti-counterfeiting two-dimensional codes

Inactive Publication Date: 2017-05-24
HUNAN UNIV OF TECH
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the ciphertext is too long, it not only increases the cost of ciphertext transmission, but

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating two-dimensional code based on text compression and method and device for reading two-dimensional code based on text compression
  • Method and device for generating two-dimensional code based on text compression and method and device for reading two-dimensional code based on text compression
  • Method and device for generating two-dimensional code based on text compression and method and device for reading two-dimensional code based on text compression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060]In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of generating two-dimensional code compression through data compression and encryption, and particularly relates to a method and a device for generating a two-dimensional code based on text compression and a method and a device for reading a two-dimensional code based on text compression. In allusion to a problem that an RSA encrypted anti-counterfeiting two-dimensional code is low in generation efficiency, the method provided by the invention improves the generation efficiency of the anti-counterfeiting two-dimensional code through performing compression on a ciphertext and reducing the amount of written information by using the experience of text compression for reference, and the overall performance of the system is improved. Meanwhile, a modular exponentiation operation of large numbers is required to be performed in an RSA encryption algorithm, thereby resulting in high computation complexity, and slowing down the performance of the system. Further research will be conducted on improving the computation complexity of the RSA encryption algorithm in the future.

Description

technical field [0001] The invention belongs to the technical field of anti-counterfeit two-dimensional code generation, and in particular relates to a text compression-based two-dimensional code generation and reading method and a generation and reading device. Background technique [0002] Two-dimensional code is to record the information of data symbols with a specific geometric figure distributed on the plane according to certain rules in black and white. Since the birth of two-dimensional code in the 1980s, the technology of two-dimensional code has gradually matured. Two-dimensional codes include: PDF417, QR Code, Data Matrix, Maxi Code, etc. Among them, the QR two-dimensional code is the most common and widely used two-dimensional code. As a very popular information dissemination carrier, QR two-dimensional code has been widely used in today's society. Because the traditional two-dimensional code is not strong in information protection, it is very easy to be copied ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06K19/06
CPCG06K19/06037G06K19/06103H04L9/3249H04L63/0428
Inventor 李长云吴岳忠郑志学倪伟
Owner HUNAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products