Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-dimensional code and encryption and decryption method thereof

An encryption method and two-dimensional code technology, which is applied to record carriers used by machines, instruments, and electronic digital data processing, etc., can solve the problem that ordinary two-dimensional codes cannot be fully and effectively used, and ordinary two-dimensional codes cannot be encrypted. and other issues to achieve the effect of high security

Pending Publication Date: 2021-11-05
BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Ordinary two-dimensional codes cannot encrypt the data that needs to be recorded, which makes ordinary two-dimensional codes unable to be fully and effectively used in some usage scenarios that require encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional code and encryption and decryption method thereof
  • Two-dimensional code and encryption and decryption method thereof
  • Two-dimensional code and encryption and decryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment provides a two-dimensional code that can improve encryption technology and has high security. figure 1 It is a schematic diagram of the two-dimensional code provided by Embodiment 1 of the present invention.

[0044] see figure 1 , the two-dimensional code of this embodiment includes: an encrypted data area 1, a non-encrypted data area 2, and a positioning mark point 3; Surrounding; the encrypted data area 1 is used to store encrypted data (encrypted binary data needs to be decrypted with the correct decryption key to read the stored data information); the non-encrypted data area 2 is used to store non-encrypted Encrypted data (unencrypted binary data, the data contained in it can be read without a decryption key); the encrypted data is the data obtained by encrypting plaintext information with an encryption key. The two-dimensional code is an asymmetric key encrypted two-dimensional code, which realizes the encryption of the data that needs to be reco...

Embodiment 2

[0049] This embodiment provides a two-dimensional code encryption method, figure 2 It is a flow chart of the two-dimensional code encryption method provided by Embodiment 2 of the present invention.

[0050] see figure 2 , the encryption method first generates encrypted data, which is the data obtained by encrypting the plaintext information with the encryption key; then the encrypted graph is generated from the encrypted data to obtain the encrypted data area; finally, the encrypted data area, the positioning marker points and the non-encrypted The data area is spliced ​​to obtain the QR code encrypted by the secret key. Encryption methods, specifically:

[0051]Step 101: Perform binary encoding on plaintext information to obtain plaintext encoded data.

[0052] Step 102: performing wavelet transformation on the plaintext coded data, so that the plaintext coded data is sparse in the spatial domain, thereby obtaining sparse data.

[0053] Step 103: Encrypt the sparse dat...

Embodiment 3

[0057] This embodiment provides a two-dimensional code decryption method, and the two-dimensional code decryption method is used to decrypt the two-dimensional code encrypted by the medium encryption method in embodiment 2.

[0058] image 3 For the flow chart of the two-dimensional code decryption method provided in Embodiment 3 of the present invention, see image 3 , the decryption method includes:

[0059] Step 201: Obtain graphic data of the two-dimensional code. The two-dimensional code is the two-dimensional code obtained in step 105 in the second embodiment.

[0060] Step 202: Perform template matching on the graphic data, and determine positioning marker points in the graphic data. Specifically: performing grayscale mapping, Gaussian noise reduction and binarization processing on the graphic data to obtain a binarized initial graphic; performing trapezoidal correction and aspect ratio scaling to the binarized initial graphic to obtain a binarized Correcting the gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-dimensional code and an encryption and decryption method thereof. The two-dimensional code comprises an encrypted data area, a non-encrypted data area and a positioning mark point; the non-encrypted data area and the positioning mark point are located around the encrypted data area; the encrypted data area is used for storing encrypted data; the non-encrypted data area is used for storing non-encrypted data; the encrypted data is data obtained after plaintext information is encrypted by adopting an encryption key. The data needing to be recorded are encrypted. The method can be used for use scenes needing to be encrypted and is high in safety.

Description

technical field [0001] The invention relates to the field of two-dimensional codes, in particular to a two-dimensional code and an encryption and decryption method thereof. Background technique [0002] A two-dimensional code is a plane information code. First, the information to be recorded is coded in binary, and then the binary data is mapped into two image states of light and dark, and the data is recorded in the form of an image on a two-dimensional plane. QR codes are widely used in product traceability, information query, mobile payment and other fields. With the corresponding client software, users can easily query the QR code records and related information. The encoding and decoding methods of ordinary QR codes are public, and anyone can create and use them. This is also used by some criminals to damage the interests of consumers by forging QR codes. Ordinary two-dimensional codes cannot encrypt the data that needs to be recorded, which makes ordinary two-dimensio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06G06F21/60
CPCG06K19/06037G06F21/602
Inventor 陆利坤王英博
Owner BEIJING INSTITUTE OF GRAPHIC COMMUNICATION
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More