Unlock instant, AI-driven research and patent intelligence for your innovation.

Five-pointed star encryption code generation method

A five-pointed star and password technology, which is applied to record carriers, instruments, computer parts, etc. used by machines, can solve the failure of two-dimensional codes, the insecurity of the three positioning points of two-dimensional codes, and the many restrictions on the use of two-dimensional codes. and other problems to achieve the effect of high reading reliability

Pending Publication Date: 2020-03-31
HAIMING UNITED ENERGY GRP MATRIXNETS TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition to the advantages of being able to quickly and accurately identify data, two-dimensional codes also have some problems. To be precise, the shape is fixed. The algorithm mechanism of two-dimensional codes causes two-dimensional codes to follow its shape rules and does not allow any modification of the appearance outline. Modifications
At the same time, the situation of the three positioning points of the QR code is too unsafe. Any missing or interference of any of the three positioning points will cause the entire QR code to fail.
[0003] In the existing seal encryption field, there are many encryption methods, such as Chinese invention patents CN 106570355 B, CN104504738 B, Chinese invention patent application CN 107944252 A and other disclosed seal encryption methods, all based on traditional two-dimensional codes, although specific The encryption methods are different, but none of them solve the problem of many restrictions on the use of traditional QR codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Five-pointed star encryption code generation method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0019] refer to figure 1 , a specific embodiment of the present invention includes the following steps,

[0020] A. Set the five-pointed star frame;

[0021] B. Determine the positions of the five corners of the five-pointed star frame; fill in positioning feature 1 in each corner;

[0022] C. Fill encrypted data in other blank areas of the five-pointed star frame.

[0023] In step B, the positioning feature includes three similar triangles nested inside and outside, and the border width of the non-overlapping area of ​​each triangle is 1 unit width.

[0024] In step C, an isolation interval 2 is set between the encrypted data and the positioning feature, and the width of the isolation interval 2 is 1 unit width.

[0025] In step C, the encrypted data is composed of several grids of the same size, and the side length of the grid is 1.5 unit width.

[0026] In step C, the pentagon surrounded by five vertex extension lines is defined as the main data area 3, and the five ind...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a five-pointed star encryption code generation method. The method comprises the following steps: A, setting a five-pointed star outer frame; b, determining five vertex angle positions of the pentagram outer frame; filling each vertex angle with a positioning feature; and C, filling other blank areas of the pentagram outer frame with encrypted data. The method can overcome the defects in the prior art, improves the recognition reliability of the encryption code, reduces the use limiting conditions of the encryption code, and is especially suitable for the encryption of aseal pattern.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a method for generating a five-pointed star encryption code. Background technique [0002] QRcode is a widely used identification code at present. The identification form of QRcode two-dimensional code includes positioning system, description system, data system and error correction system. The positioning system can be used to quickly find the position of the QR code, and at the same time, it can perform image projection perspective restoration and check the security of the QR code. After finding the location of the two-dimensional code correctly, the description system can be used to accurately understand the data format level information of the two-dimensional code. Through the data system and error correction system, the two-dimensional code that has been damaged to a certain extent can be perfectly repaired. The two-dimensional code represents the binary numbers o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06
CPCG06K19/06046G06K19/06131G06K19/06075
Inventor 桑海明甘戈谭亚楠
Owner HAIMING UNITED ENERGY GRP MATRIXNETS TECH CO LTD