Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

QR code secret sharing method based on visual password

A secret sharing, two-dimensional code technology, applied in the field of two-dimensional code secret sharing based on visual password, can solve the security problems of secret sharing algorithm and other problems, and achieve the effect of good security

Pending Publication Date: 2020-10-02
绍兴聚量数据技术有限公司 +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the value of n is very large, it still cannot be completely avoided, so the security problem of the secret sharing algorithm still exists

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • QR code secret sharing method based on visual password
  • QR code secret sharing method based on visual password
  • QR code secret sharing method based on visual password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. The two-dimensional code secret sharing method based on visual password, its specific steps are described as follows figure 1 Shown in S1~S4. Wherein, the specific steps of the code word adjustment method based on visual password are described as follows: image 3 Shown:

[0048] Step 1: Read the carrier QR code C separately 1 ,C 2 ,...,C n information, and according to their version number and verification level, using the standard two-dimensional code coding process, through data analysis, data coding, redundant coding, code word filling and other operations, the M 1 , M 2 ,...,M n Content codeword.

[0049] In this embodiment, set n=10, 10 carrier two-dimensional codes and secret two-dimensional code images refer to figure 2 . Among them, the versions of 10 QR codes are all 4-H, and they contain meaningful content infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a QR code secret sharing method based on a visual password. The method comprises the steps: designing a 0-1 planning strategy by analyzing secret unrecoverable conditions of a shared subset, and then constructing a secret sharing matrix; based on the secret sharing matrix, adjusting the content code words of the carrier QR code by using an XOR visual password technology; andfinally, generating a secret sharing copy QR code according to the adjusted carrier QR code content code word, thereby realizing sharing of a secret QR code image. The method not only inherits the advantages of easy realization of visual cipher technology coding and low decoding calculation complexity, but also is superior to other existing methods in robustness, and the secret image has better security.

Description

technical field [0001] The invention belongs to the field of secret information sharing, and in particular relates to a two-dimension code secret sharing method based on a visual password. Background technique [0002] As the core sensing technology of the Internet of Things and an important information portal of the Internet, two-dimensional codes have gradually penetrated into various fields of my country's national economy and social life, becoming an important part of the country's real economy and an important strategic fulcrum for the competition of the global emerging information industry. However, with the rapid popularization of QR codes, security issues have become increasingly prominent, especially in the fields of O2O e-commerce and mobile payment. Since the two-dimensional code adopts the international common codec technology standard, criminals can easily steal the information in it when it is transmitted on an open channel or stored in an open network environm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06K19/06G09C5/00
CPCG06F21/602G06K19/06037G09C5/00
Inventor 黄鹏程张真诚栗永徽刘燕君李黎骆挺
Owner 绍兴聚量数据技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products