QR code security authentication method and system based on Hamming codes

An authentication method and an authentication system technology, which are applied in the field of Hamming code-based QR code security authentication methods and systems, can solve problems such as the inability to prevent the illegal operation of a single QR code, and achieve the effects of increasing the amount of embedding and increasing concealment.

Active Publication Date: 2019-08-06
绍兴聚量数据技术有限公司 +1
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although it mentions the use of Hamming code to check and correct the encoded data, it judges whether the encoded data is correct based on whether the serial number is continuous, that is, combines multiple encoded data to determine whether the encoded data is lost, and cannot prevent a single QR code illegal operation of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • QR code security authentication method and system based on Hamming codes
  • QR code security authentication method and system based on Hamming codes
  • QR code security authentication method and system based on Hamming codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] like figure 1 As shown, this embodiment proposes a Hamming code-based QR code authentication method, including:

[0067] Step S1, encode the QR code information to generate a preliminary QR code;

[0068] In the present invention, the authentication information is embedded in the preliminary QR code. Therefore, before diving into the authentication information, a preliminary QR code needs to be generated, including:

[0069] Step S1.1, data analysis: analyze the QR code information, determine the corresponding coded character type, and select an appropriate error detection and correction level;

[0070] Specifically, the QR code is provided with different versions (kinds) of 1 to 40, and each version has an inherent symbol structure (number of symbols). Symbols are the square black and white dots that make up the QR code. "Symbol structure" refers to the number of symbols in a two-dimensional code. Starting from version 1 (21 symbols x 21 symbols), it is incremente...

Embodiment 2

[0112] like Figure 5 As shown, this embodiment proposes a Hamming code-based QR code authentication system, including:

[0113] An encoding module for encoding the QR code information to generate a preliminary QR code;

[0114] a grouping module for grouping the data modules in the preliminary QR code;

[0115] an embedding module for embedding authentication information into the preliminary QR code to obtain a final module matrix;

[0116] a mask module for performing a mask operation on the final module matrix;

[0117] The authentication module is used to authenticate the information of the QR code.

[0118] In the present invention, the authentication information is embedded in the preliminary QR code. Therefore, before sneaking into the authentication information, a preliminary QR code needs to be generated. The encoding module specifically includes:

[0119] The data analysis module is used to analyze the QR code information, determine the corresponding coded chara...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a QR code authentication method and system based on Hamming codes. The QR code authentication method comprises the steps of S1, encoding QR code information to generate preliminary QR codes; S2, grouping the data modules in the preliminary QR code; S3, embedding 3-bit authentication information into the preliminary QR code by a (7,4) Hamming error correction mechanism to obtain a final module matrix; S4, carrying out mask operation on the final module matrix; and S5, authenticating the information of the QR code. The method not only resists printing and photographing, but also has the characteristic of high information capacity. In the method, authentication information is embedded into the modules in the module matrix through the Hamming codes (7, 4). Under the fixed QR code error correction level, more authentication information can be embedded in the QR code error correction method.

Description

technical field [0001] The invention relates to the field of safety authentication, in particular to a method and system for safety authentication of QR codes based on Hamming codes. Background technique [0002] With the advent of the mobile Internet era, the development of the information industry driven by "Internet +" has made a major breakthrough. As the most iconic product of the Internet age, QR code breaks the constraints of the original industry marketing model by virtue of its online-offline information docking advantages, and promotes the transformation of traditional industrial structure to "Internet +" industry. Nowadays, QR codes are used more and more widely. In the field of e-commerce, payment by scanning codes has gradually replaced the traditional cash payment mode. This new payment method is changing people's consumption habits; in the field of mobile social networking, more and more social software such as WeChat, QQ, etc. Scan QR codes to obtain user i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K19/06G06K7/14
CPCG06K19/06075G06K7/1473G06K7/1417
Inventor 李黎张善卿陆剑锋
Owner 绍兴聚量数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products