Encrypted three-dimensional code generation and identification method and system

An identification method and three-dimensional code technology, which are applied in electromagnetic radiation induction, record carriers used by machines, instruments, etc., can solve the problems of confidentiality and easy reading of the content information of the code map, so as to achieve low encryption cost and increase data load. , The effect of high recognition efficiency

Active Publication Date: 2022-03-08
CN3WM XIAMEN NETWORK TECH CO LTD
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the problems existing in the above-mentioned prior art, the present invention proposes an encrypted three-dimensional code generation and identification method, which encrypts the two-dimensional code by setting a custom encryption module and corresponding encryption rules, and solves the need for confidentiality. In the usage environment, the content information of the code map needs to be kept confidential and easy to read.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted three-dimensional code generation and identification method and system
  • Encrypted three-dimensional code generation and identification method and system
  • Encrypted three-dimensional code generation and identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] see figure 1 , this embodiment provides an encrypted three-dimensional code generation and identification method, which can be used for cross-network business card or communication information transmission, including the code generation step and the identification step;

[0048] The code generation steps are as follows:

[0049] A plurality of custom encryption modules are preset, and encryption rules of each of the custom encryption modules are configured. Can be encrypted with a custom mask.

[0050] Encrypt; generate three positioning modules and one calibration module, among which the three positioning modules present an isosceles right triangle; the ratio of the black and white part of the locator is 1:1:3:1:1, and the ratio of the black and white part of the calibration symbol is 1:1:1:1:1, generate a functional area, the custom encryption rules contained in the functional area can be user-defined mask information and version information, there are 40 versions, ...

Embodiment 2

[0061] see Figure 6 , this embodiment provides an encrypted three-dimensional code generation and recognition system, including a code generation module and a recognition module.

[0062] The code generation module includes a self-defined encryption unit, an encryption unit and a three-dimensional code generation unit.

[0063] The self-defined encryption unit is preset with a plurality of self-defined encryption modules, and is used to configure the encryption rules of each of the self-defined encryption modules.

[0064] The encryption unit is used to obtain the content information of the three-dimensional code to be generated, generate a two-dimensional code containing the content information, determine the two-dimensional code version, and add the encryption of the custom encryption module in the functional area of ​​the two-dimensional code matrix Rules; according to the encryption rules of the self-defined encryption module in the functional area, the data area of ​​th...

Embodiment 3

[0073] This embodiment provides an encrypted three-dimensional code generation and identification device, including a memory, a processor, and a computer program stored on the memory and operable on the processor. The method described in the examples.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for generating and identifying an encrypted three-dimensional code. The method comprises a code generating step and an identifying step, the code generation step specifically comprises the following steps: presetting a plurality of user-defined encryption modules and encryption rules; the method comprises the steps of obtaining to-be-coded content, determining a user-defined encryption rule, compiling the to-be-coded content into an unencrypted two-dimensional code matrix, and performing encryption operation according to the selected user-defined encryption rule to generate an encrypted two-dimensional code matrix; drawing a two-dimensional code graph through the encrypted two-dimensional code matrix, and obtaining a background picture to be fused with the two-dimensional code graph to generate an encrypted three-dimensional code; the decoding step specifically comprises the following steps: configuring an encrypted three-dimensional code decryption program containing respective defined encryption rules at a code scanning end; and the code scanning end scans the encrypted three-dimensional code picture to be identified, determines the self-defined encryption rule used by the encrypted three-dimensional code, decrypts the encrypted three-dimensional code through the corresponding decryption rule to obtain an unencrypted two-dimensional code matrix, and decodes the unencrypted two-dimensional code matrix to obtain the code making content.

Description

technical field [0001] The invention relates to an encrypted three-dimensional code generation and recognition method, which belongs to symbol coding and recognition technology and is suitable for high-density symbol coding systems. Background technique [0002] Secret-related units need to strictly implement the confidentiality system, including communication tools, communication networks, etc.; in terms of secret-related confidentiality, take personal business cards as an example, code the personal business card information with a two-dimensional code, and paste the code picture on the bulletin board Or when it is displayed on electronic screens and other publicity means, it is easy to be identified by outsiders with third-party software, or the code map will be flowed out by taking pictures, resulting in the leakage of personnel information of confidential units. Similarly, the confidentiality of important information such as communication URLs and device models is not hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/06G06K7/14G06F21/60
CPCG06K19/06037G06K19/06046G06F21/602G06K7/1417G06K7/1495
Inventor 陈绳旭王秋婉马吉良柳璞都何荣茂
Owner CN3WM XIAMEN NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products