Encrypted gallery management system and implementation method thereof

A technology of management system and implementation method, applied in the field of encrypted gallery management system

Pending Publication Date: 2020-01-31
庄连豪
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above problems, based on the experience of designing in related fields for many years, the inventor conducted relevant analysis and research on the existing digital image codes and their management systems, hoping to design an encrypted library management system that can solve the above problems; For this reason, the main purpose of the present invention is to provide an encrypted gallery management system and its implementation method that can manage and limit information access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted gallery management system and implementation method thereof
  • Encrypted gallery management system and implementation method thereof
  • Encrypted gallery management system and implementation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach S2

[0057] see Figure 4 , shown in the figure is the implementation flowchart of the present invention, and please refer to Figure 5~Figure 6 , shown in the figure is the implementation schematic diagram (two)~(three) of the present invention, as shown in the figure, the implementation method S2 of the encrypted gallery management system of the present invention, as follows:

[0058] (1) Scan encrypted image Step S21: After an information device 102 scans an encrypted image 103 with its scanning module 1022, a program execution module 1021 of the information device 102 analyzes the obtained encrypted image 103 to obtain a time number Information totem D1, and an encryption key totem D2;

[0059] (2) Return the totem step S22: the information device 102 transmits the time digital information totem D1 and the encryption key totem D2 to the management server 101, wherein the information device 102 can pass the time through an Internet or a short-distance transmission technology. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encrypted image generation method, an encrypted gallery management system and an implementation method thereof. The encrypted gallery management system comprises a management server and at least one information device, a system converts one or more groups of corresponding time digital information (composed of digital images, pictures, totems and text data) into a time digital information totem and an encryption key totem. The time digital information totem and the encryption key totem are synthesized into an encrypted image. When a user uses the information device to scan the encrypted image to obtain totems, the information device can upload the totems to the management server for verification and comparison, so that the management server can respond to specific service information of the information device, the purpose of limiting information access is achieved, and other unauthorized people are prevented from obtaining the service information.

Description

technical field [0001] The invention relates to an encrypted gallery management system, in particular to an encrypted gallery management system capable of generating and managing information access restrictions and an implementation method thereof. Background technique [0002] With the popularity of two-dimensional barcodes, two-dimensional barcodes have been commonly used in commercial implementations. Scanning two-dimensional barcodes through electronic products to obtain relevant information, and there are various types of two-dimensional barcodes, common two-dimensional barcodes include PDF417 codes, quick response matrix Graphic code (Quick Response Code, QR code), Chinese Sensible code, color bar code, EZ code, AztecCode, QuickMark, Data Matrix, etc. Among them, the quick response matrix code has the user does not need to align, no matter it is scanned at any angle, The advantage that the data can be read correctly makes the quick response matrix code the most popular...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/08H04L29/06
CPCG06F21/602H04L63/06H04L9/08
Inventor 庄连豪
Owner 庄连豪
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products