Embedded double two-dimensional code information secrecy method

A two-dimensional code information, two-dimensional code technology, applied in the field of embedded dual two-dimensional code information security, can solve the problem of low security of the two-dimensional code, and achieve the expansion of the password space, high reliability and high security. Effect

Inactive Publication Date: 2019-02-15
合肥译码智能科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem of low security of existing two-dimensional codes, the present invention provides an embedded double-two-dimensional code information security method, which improves the security of two-dimensional codes, and further improves security by increasing storage information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded double two-dimensional code information secrecy method
  • Embedded double two-dimensional code information secrecy method
  • Embedded double two-dimensional code information secrecy method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] A method for confidentiality of embedded double two-dimensional code information, including a code scanning client, a large two-dimensional code, and a small two-dimensional code, the large two-dimensional code is used to carry the text content to be released, and the text content is T, the small two-dimensional code is used to carry verification information, and the verification information is P, which also includes the following steps:

[0031] Such as figure 1 As shown, A, encoding and encryption:

[0032] A1. Determine the error correction level and version number of the large two-dimensional code according to the size of the text content T, and determine the error correction level and version number of the small two-dimensional code according to the size of the verification information P, and the text content T and verification information P can be fully encoded;

[0033] A2. Set an encryption password, the encryption password is K, and mix the encryption passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an embedded double two-dimensional code information secrecy method, comprising a scanning code client, a large two-dimensional code and a small two-dimensional code, wherein the large two-dimensional code is used for carrying the text content to be issued, the text content is T, the small two-dimensional code is used for carrying the verification information, the verification information is P, and the method further comprises the following steps: A, coding and encrypting; B, decode and decrypting.

Description

technical field [0001] The invention relates to the technical field of two-dimensional code information security, in particular to an embedded double two-dimensional code information security method. Background technique [0002] Two-dimensional code technology was born in the late 1980s. With the development of technology, a variety of code systems have been developed in the research of two-dimensional code symbol representation technology, among which QR code has been the most widely used in recent years (two-dimensional code described in this paper QR code refers specifically to QR code), which can be seen everywhere in the streets and alleys. QR code has many advantages, the most important of which is that it has strong coding ability, can express rich information, and is scalable. At the same time, it also has strong error correction ability and fast response characteristics, which is very convenient to use. This laid the foundation for its widespread use. [0003] Ho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/06G06F21/62G06F21/60
CPCG06F21/602G06F21/62G06K19/06037
Inventor 高宗彬
Owner 合肥译码智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products