Five-pointed star encryption code generation method
A five-pointed star and password technology, which is applied to record carriers, instruments, computer parts, etc. used by machines, can solve the failure of two-dimensional codes, the insecurity of the three positioning points of two-dimensional codes, and the many restrictions on the use of two-dimensional codes. and other problems to achieve the effect of high reading reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0019] refer to figure 1 , a specific embodiment of the present invention includes the following steps,
[0020] A. Set the five-pointed star frame;
[0021] B. Determine the positions of the five corners of the five-pointed star frame; fill in positioning feature 1 in each corner;
[0022] C. Fill encrypted data in other blank areas of the five-pointed star frame.
[0023] In step B, the positioning feature includes three similar triangles nested inside and outside, and the border width of the non-overlapping area of each triangle is 1 unit width.
[0024] In step C, an isolation interval 2 is set between the encrypted data and the positioning feature, and the width of the isolation interval 2 is 1 unit width.
[0025] In step C, the encrypted data is composed of several grids of the same size, and the side length of the grid is 1.5 unit width.
[0026] In step C, the pentagon surrounded by five vertex extension lines is defined as the main data area 3, and the five ind...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
