KR101570704B1 - System for utilizing information code and reader reading information code - Google Patents

System for utilizing information code and reader reading information code Download PDF

Info

Publication number
KR101570704B1
KR101570704B1 KR1020140090119A KR20140090119A KR101570704B1 KR 101570704 B1 KR101570704 B1 KR 101570704B1 KR 1020140090119 A KR1020140090119 A KR 1020140090119A KR 20140090119 A KR20140090119 A KR 20140090119A KR 101570704 B1 KR101570704 B1 KR 101570704B1
Authority
KR
South Korea
Prior art keywords
code
data
information
unit
identification information
Prior art date
Application number
KR1020140090119A
Other languages
Korean (ko)
Other versions
KR20150009937A (en
Inventor
마사히로 하라
Original Assignee
가부시끼가이샤 덴소 웨이브
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 가부시끼가이샤 덴소 웨이브 filed Critical 가부시끼가이샤 덴소 웨이브
Publication of KR20150009937A publication Critical patent/KR20150009937A/en
Application granted granted Critical
Publication of KR101570704B1 publication Critical patent/KR101570704B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/36Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols with means for detecting characters not meant for transmission
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/1434Barcodes with supplemental or add-on codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

It is an object of the present invention to provide an information code reading apparatus capable of reading an information code which is difficult to recognize in the presence of the presence of the non-visible data, , And a configuration that can more accurately distinguish whether or not it is not.
The information code reading device (20) comprises a judging section for judging whether or not a code data code is arranged after the end or end position of the termination identification code, and a judging section for judging, A second decode unit for decrypting the secret code, and a second decode unit for decrypting the secret code when the secret code is decrypted by the second decode unit, And a correspondence processing section for performing at least any one of the correspondence processing and for outputting or storing the preset identification information.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention [0001] The present invention relates to an information code using system,

The present invention relates to an information code using system and an information code reading apparatus.

As a technique for generating or reading a two-dimensional code including secret data, for example, there is "information transmission method and portable terminal" disclosed in Patent Document 1 below. In this prior art, the transmitting-side portable terminal encrypts the transmission data with the encryption key input from the key input device, converts it into a QR code (registered trademark), generates a QR code, and displays it on the screen of the display device Document 1, paragraph 0020, 0021, FIG. 4).

On the other hand, in the portable terminal on the receiving side, the image of the QR code displayed on the screen of the transmitting-side portable terminal is read by a camera or the like to determine whether or not the QR code is encrypted. . Then, the QR code is inversely converted, and the transmission data is decoded by the input encryption key to display the restored data on the screen (Patent Document 1; paragraph 0022, Fig. 5).

[Patent Document 1] Japanese Patent Application Laid-Open No. 2004-147006

However, according to the " information transmission method and portable terminal " disclosed in Patent Document 1, when the encrypted data is inversely converted into the QR code, usually the encrypted data itself does not have meaning as character information, And the like displayed on the screen are meaningless information or information equivalent to a control code that can affect the control of the screen display or the like.

For this reason, in the case of meaningless information, there is a possibility that the user of the portable terminal or the like may be distrusted, or the user who can recognize that the information is encrypted may be given an improper motivation to attempt to decipher Which may cause security problems.

In order to solve such a problem, the inventor of the present invention has found that, when the total number of start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in code areas to which code words should be allocated, End identification information indicating the end of the code string constituted by the start data code arranged in the code string is placed at the end of the code string or the end identification information capable of specifying the end position of the code string constituted by the start data code is arranged at a predetermined position of the code string Quot; information code " of a configuration in which a non-voice data code coded as a code word indicating data to be encoded is placed after the end position specified by the end identification code or after the end identification code.

When the information code is constructed as described above, the result of deciphering the secret code is not obtained, but the result of deciphering the secret code is obtained. Therefore, It becomes difficult to recognize that the data code is recorded. On the other hand, in the case of reading with a special reading device, since the result of decoding the secret code is obtained, it becomes easy to handle the decoding data of the secret code. However, there is a problem in that it is not possible to distinguish whether the data after the reading which is handled by the special reading device is originally made confidential data or not, simply by constituting in this way.

SUMMARY OF THE INVENTION The present invention has been made to solve the problems described above, and it is an object of the present invention to provide a reading apparatus capable of reading an information code configured to make it difficult to recognize the presence of the non- And to provide the above objects. It is another object of the present invention to provide a configuration capable of more accurately discriminating whether or not data after reading which is handled by the reading apparatus is originally encoded data.

According to a first aspect of the present invention,

An information code using system comprising an information code generation device for generating an information code and an information code reading device capable of reading the information code generated by the information code generation device,

The information code generating apparatus includes:

When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string,

Generating the information code in a configuration in which the encoded nonvolatile data code is coded as a code word indicating data to be encoded, after the ending identification code or after the ending position specified by the ending identification information,

The information code reading apparatus includes:

A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,

A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;

A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,

When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a correspondence processor for outputting or storing the preset identification information.

In the second invention,

When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string and a code word There is provided an information code reading device capable of reading an information code which is obtained by arranging a coded confidential data code after the termination identification code or after the termination position specified by the termination identification information,

A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,

A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;

A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,

When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a correspondence processor for outputting or storing the preset identification information.

An information code handled in the invention of claim 1 is placed behind an end position, which is specified by the end of the ending identification code or by the ending identification information. Therefore, in the reading apparatus of the general structure in which the data before the ending identification code or the ending position is treated as data to be decrypted, decoding of the code data code is not attempted. It becomes difficult to recognize itself. On the other hand, in the information code reading apparatus constituting the main part of the present invention, when it is judged by the judging section that the vinylic data code is arranged, since the vinylic data code is decoded by the second decoding section, It becomes possible to decode the secret data.

Further, in the information code reading apparatus, when the second decoding unit decodes the code data, at least either the output of the decoding result of the corresponding code data code by the corresponding processing unit, the storage of the decryption result, One correspondence process is performed, and output or storage of predetermined identification information is performed. In this way, in addition to the correspondence processing, the outputting or storing of the preset identification information is carried out, so that in the information code reading apparatus or the external apparatus, the data handled in the corresponding processing based on the presence or absence of the output of the identification information, It is possible to more accurately determine whether or not the data is the concealment data of the video data.

In the invention of claim 2, in the case where the secret code is decrypted by the second decode unit, the correspondence processing unit stores the decrypted decrypted decrypted data and the identification information in association with each other, And when the non-encoded data is not decoded by the second decode unit, the arrangement information before the termination identification code in the code string or the termination code in the code string The output result of the arrangement contents preceding the end position specified by the identification information is stored in the storage unit or the output unit.

In this configuration, in the case where the second decode unit decodes the enciphered data, since the identification information is associated with the deciphered data of the enciphered data code to be output or stored, whether the output data or the stored data is regular non- And it becomes easy to discriminate clearly.

According to a third aspect of the present invention, in the case where the second decode unit decodes the secret code, the correspondence processing unit disposes the front side identification information as the identification information in front of the data array of the decryption data, The combination data of the data structure in which the rear side identification information as the identification information is arranged on the rear side of the data arrangement is output or stored in the storage section.

According to this configuration, it is possible to more accurately determine whether or not the output or stored data is regular non-plain data, and to specify in which range of the data array the regular non-plain data exists among the output or stored data It becomes easier to do.

According to a fourth aspect of the present invention, there is provided a communication system including a connection unit for connecting to each site in a predetermined network, wherein the information code generating apparatus generates the above-mentioned non-technical data code with a configuration including address information specifying an address in the network, Wherein the correspondence processing unit outputs or stores at least the address information and the identification information in correspondence with each other when the second decode unit decodes the non-unique data code, and the connection unit outputs the address information and the identification information, Or connected to a site specified by the address information on condition that the stored information is stored.

In this configuration, only when the address information and the identification information correspond to each other in the data output or stored by the corresponding processing unit, the connection unit accesses the site specified by the address information. Conversely, when the output or stored data is not regular non-visible data, access to the site specified by such unauthorized data can be restricted.

With such a technique, for example, even if another two-dimensional code in which an address of an additional site is recorded is attached to the information code on which the non-visible data is recorded, and the negation that leads to another site is performed, Access to a separate site by the connection unit is not performed unless it is cleared. Therefore, access by such illegal induction can be prevented more effectively.

According to a fifth aspect of the present invention, the information code generation apparatus generates the enciphered data code by encrypting and encoding the data to be enciphered based on a predetermined encryption key, and the information code reading apparatus stores a decryption key And the second decode unit attempts to decrypt the enciphered data code using the decryption key stored in the decryption key storage unit when it is determined by the determination unit that the enciphered data code is disposed A configuration in which the corresponding processing is performed when the decryption using the decryption key is successful and the outputting or storing of the identification information is performed and the decryption of the decryption using the decryption key is failed, Respectively.

In this configuration, for example, in the case where the decryption key stored in the reading device is not a regular key, a predetermined notification process is performed. Therefore, the user can not normally perform the corresponding process And it is easy to understand the cause.

According to the invention of claim 6, an information code reading apparatus which achieves the same effect as the invention of claim 1 can be realized.

According to the invention of claim 7, it is possible to realize an information code reading apparatus which achieves the same effect as the invention of claim 2.

According to the eighth aspect of the present invention, it is possible to realize an information code reading apparatus that achieves the same effect as the invention of claim 3.

According to the invention of claim 9, an information code reading device which achieves the same effect as the invention of claim 4 can be realized.

According to the invention of claim 10, an information code reading apparatus which achieves the same effect as the invention of claim 5 can be realized.

1 is an explanatory diagram conceptually illustrating an information code using system according to the first embodiment.
FIG. 2 is an explanatory diagram conceptually illustrating an application example of the information code using system of FIG. 1; FIG.
FIG. 3 (a) is an explanatory diagram conceptually illustrating a configuration example of an information code generating apparatus used in the information code using system of FIG. 1, and FIG. 3 (b) Fig. 2 is a block diagram showing an example of a hardware configuration of a printing apparatus; Fig.
4 is a flowchart illustrating the flow of the information code generating process performed by the information code generating apparatus of FIG.
Fig. 5 is an explanatory diagram showing an example of the format of data or code to be information-processed by the code generation processing shown in Fig. 4, Fig. 5 (a) is an example of data records of print data, Fig. Fig. 5C shows an example after each code is added by steps S121 to S137, Fig. 5D shows a configuration example 1 of Fig. 5C, Fig. 5E 5C shows the configuration example 2 of the viral code shown in Fig. 5C, and Fig. 5F shows the configuration example 3 of the viral code shown in Fig. 5C, respectively.
6 is an explanatory diagram showing a configuration example of a 1-type QR code.
7 is a block diagram showing a hardware configuration example of an information code reading apparatus used in the information code using system of FIG.
8 is a flowchart illustrating the flow of decoding processing performed by the information code reading apparatus of Fig.
FIG. 9 is a flow chart illustrating the flow of the decoding process performed in the decoding process of FIG. 8;
10 is a flowchart illustrating the flow of the data transfer process performed in the decode process of Fig.
11 is a flowchart illustrating the flow of a connection process performed by the information terminal of FIG.
12 is an explanatory diagram showing a specific example of the information code SQ generated by the information code generating apparatus shown in Fig. 3 and the like.
13 is an explanatory diagram showing an example of the format of a general QR code.
14 is an explanatory view for explaining an example of a correspondence relationship between a mode identifier and a mode.

[First Embodiment]

Hereinafter, a first embodiment of the present invention will be described with reference to the drawings.

The information code using system 100 (hereinafter, simply referred to as a system 100) shown in FIG. 1 includes an information code generating apparatus 1 (hereinafter also simply referred to as a generating apparatus 1) for generating an information code, An information code reading apparatus 20 (hereinafter simply referred to as a reading apparatus 20) capable of reading the information code SQ generated by the code generating apparatus 1 is provided and the information code generating apparatus 1 The information code reading apparatus 20 can use the information code SQ generated by the information code reading apparatus 20 as an information code. The system 100 also includes an information terminal 60 configured as an information processing apparatus capable of performing wireless or wire communication with the reading apparatus 20 and a management apparatus 80 connected to the Internet and registered with site information and the like .

In the following description, the QR code (registered trademark) is listed as an example of the information code SQ handled in the information code using system 100. The information code is not limited to this, and for example, , A maxi code, a CP code, a PDF 417, or an RSS composite, the present invention can be applied to a QR code. In either case, the information code SQ is placed in the code area when the total number of the starting data codes coded as the code word indicating the data to be started is less than the capacity that can be accommodated in the code area in which the code word is to be placed And an end identification code indicating the end of the code string constituted by the start data code is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string constituted by the start data code is arranged at a predetermined position of the code string Respectively. The information code (SQ) is configured such that the encoded nonvolatile data code is arranged after the end position specified by the end identification code or the end identification code.

The system 100 shown in Fig. 1 can be applied, for example, as shown in Fig. Hereinafter, an example in which the system 100 is applied as shown in Fig. 2 will be described as a representative example. However, application examples of the system 100 are not limited to this example.

In the example of Fig. 2, the address information of the predetermined site in the information code (SQ) generated by the generating apparatus 1 is encrypted and recorded. The reading apparatus 20 reads the password of the information code SQ The reading device 20 is able to obtain the address information of the predetermined site. The data structure of the information code SQ is shown in FIG. 12, for example, and this point will be described later in detail. On the other hand, the reading device 20 is also capable of reading the two-dimensional code (QR) configured as a general QR code. If the address information of the site is recorded in the two-dimensional code (QR) It is possible. The data structure of the two-dimensional code QR is shown in Fig. 13, for example.

The reading device 20 is capable of transmitting the address code acquired from the information code SQ or the two-dimensional code QR to the information terminal 60 and the information terminal 60 is capable of transmitting the address information acquired from the reading device 20 An attempt is made to connect to the site specified by the address information. However, the information terminal 60 determines whether the acquired data is obtained by decrypting the information code SQ or not, based on the identification information added to the transmission data (the symbol for identifying the secret data in the example of Fig. 2) QR). It is connected to the site of the address obtained by decrypting the information code SQ, but is not connected to the site of the address obtained by decrypting the two-dimensional code QR. Hereinafter, such a system will be described as a representative example.

First, the information code generating apparatus 1 will be described with reference to Fig. 3 (a) is an explanatory diagram showing a printing apparatus 10 and a personal computer (hereinafter referred to as "personal computer") 1 connected thereto, and FIG. 1 (b) There is shown a block diagram showing an example of a hardware configuration of the system 10 shown in FIG.

1 and 3 (a), an information code generating apparatus 1 is mainly constituted by an information processing apparatus 2 and a printing apparatus 10, and includes an information processing apparatus 2 and a printing apparatus 10 are connected to each other through a cable 5. Then, the printing apparatus 10 reads the character data (hereinafter referred to as " print data ") of alphanumeric characters, Chinese characters and symbols (hereinafter collectively referred to as "print data") output from the information processing apparatus 2 and input to the printing apparatus 10, And has a function of generating a code and printing it on a label P or the like. The term " QR code " used herein refers to a two-dimensional code symbol-QR code-basic structure (JIS X 0510: 2004) of Japanese Industrial Standard (JIS).

The information processing apparatus 2 is configured, for example, as a known personal computer, and includes a personal computer 4 and a display 3. [ The personal computer 4 is a device including an MPU, a main memory (main memory), a hard disk (auxiliary memory), an input / output interface, a communication interface, a keyboard, and a bonding device. The display 3 is a device that can display information output from the personal computer 4 by being connected to the personal computer 4.

A device driver of the printing apparatus 10 is installed (incorporated) in the personal computer 4 and the user of the information processing apparatus 2 includes characters and the like to be printed on the label P as a QR code So that the print data can be arbitrarily output from the personal computer 4 to the printing apparatus 10.

3 (b), the printing apparatus 10 mainly includes an MPU 11, a memory 12, an interface 13, a roller control unit 14, a head control unit 15, a roller 17, (18) and the like. In addition, they are mounted on a printed wiring board (not shown) or housed in a housing (not shown).

The MPU 11 is capable of constituting an information processing apparatus together with a memory 12 connected via a memory bus in a microcomputer (hereinafter referred to as " microcomputer ") capable of controlling the entire printing apparatus 10, And has an information processing function. In addition to the memory 12, an interface 13, a roller control unit 14 and a head control unit 15 are also connected to the MPU 11.

The memory 12 corresponds to, for example, RAM (DRAM, SRAM, etc.) or ROM (EPROM, EEPROM, etc.) in the semiconductor memory device. In addition to the buffer area for storing the character data sent from the information processing apparatus 2, the RAM in the memory 12 also has a work area and the like used by the MPU 11 for each processing such as arithmetic operation and logical operation . The ROM stores in advance a predetermined program capable of executing code generation processing and the like described below, and a system program capable of controlling each hardware such as the roller control unit 14 and the head control unit 15 in advance.

The interface 13 is an input interface for receiving print data or the like sent from the personal computer 4 of the information processing apparatus 2 and is connected to the MPU 11 via a serial bus or the like. The print data input to the MPU 11 via the interface 13 is subjected to information processing and coded by a code generation process as described later.

The roller control unit 14 is a control device that can control a driving mechanism (not shown) of the roller 17 and is connected to the MPU 11 via a serial bus or the like. Thus, in accordance with the control signal received from the MPU 11, the start / stop of the rotation of the roller 17, the rotation direction, and the like are controlled.

The head control unit 15 is, for example, a thermal head capable of printing an arbitrary pattern on a label made of a thermal paper, and is connected to the MPU 11 via a serial bus or the like. In the present embodiment, the QR code generated by the code generation processing described later can be printed on the thermal label. In this embodiment, the position at which the QR code is configured in synchronization with the paper feeding timing of the thermal label by the roller controller 14 A detection pattern, a timing pattern, a data code, and the like are printed on the corresponding label.

Hereinafter, the case of the thermal head as the head control unit 15 will be described as an example. As long as the QR code can be printed, it may be a head for inkjet or dot impact, Or a LED printer.

The printing data output from the information processing apparatus 2 and input to the printing apparatus 10 by the printing apparatus 10 is temporarily stored in the buffer area of the memory 12 via the interface 13, It is transferred to the code generation processing described below.

Here, the code generation processing will be described with reference to Figs. 4 to 6. Fig. 4 is a flowchart showing the flow of code generation processing. Fig. 5 shows an example of the format of data or code that is information-processed by the code generation processing shown in Fig. 6 shows a configuration example of a 1-type QR code.

As shown in Fig. 4, the code generation process is started by the MPU 11 and the memory 12 that are started by turning on the power supply of the printing apparatus 10, and the initial setting process is performed first in step S101. In this processing, a work area of the memory 12 or a buffer area for storing print data is cleared, or a predetermined flag, a counter, or the like is cleared.

In step S103, this step is repeated until print data is received in the process of determining whether or not the print data has been received (S103; No). When it is judged that the print data is received (S103; Yes), a process of clearing the count value of the timer is performed in the succeeding step S105. The timer in which the counter value is cleared in step S105 is to measure the elapse of a preset time by the next step S107.

In step S107, a process of determining whether or not a preset time has elapsed by the timer described above is performed. In other words, it is judged in the next step S111 whether the print data sent from the information processing apparatus 2 includes data relating to encryption or the like, for example, If no encryption-related data has been sent from the information processing apparatus 2 until this time has elapsed, the process proceeds to step S109 with the lapse of a predetermined time (S107; Yes) .

On the other hand, if the preset time has not elapsed (S107; No), the data record of the data (hereinafter, referred to as " (Cryptographic key) to be used for encryption and the secret data position information indicating the positional relationship among the secret information and the secret information. If it is judged that they are being received (S111; No), the process returns to the above-described step S107 and the process returns to the step S113. .

If it is determined in step S107 that a predetermined time has elapsed (S107; Yes), " 0 " is set to the predetermined flag in step S109. This flag indicates whether or not the print data includes the nonvicidal data. When "0" is set, it indicates that the nonvicin data is not included. When "1" is set, Is included. Therefore, if it is determined in step S111 that data relating to encryption or the like is received (S111; Yes), a process of setting "1" to this flag is performed in subsequent step S113.

When " 1 " is set in the flag set in advance in step S113, processing for aligning the start data and the non-matching data is performed in the following step S115. That is, the print data includes data (disclosure data) to be started by a third party and data (non-connec- tion data) to be concealed by a third party as a third party. When these data are mixed in the data records, Processing for dividing the order of data into a set of start data and a set of non-unique data is performed based on " position information indicating the positional relationship in the data records of the "

For example, as shown in Fig. 5 (a), the start data (A), the secret data (?), The start data (B), and the print data The sequence of these data is changed in step S115 so that the start data A, the start data B, and the start data A, as shown in Fig. 5B, , The sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence. As a result, the start data and the non-unique data are respectively arranged, so that an additional process of the ending identification code by the later step S121 and an additional process of the process of adding the non-unique identification code by the step S125 are facilitated.

In the next step S117, processing is performed to encode each data such as start data and transparent data according to the JIS basic structure (JIS X 0510: 2004). As a result, a starting data code coded as a code word indicating data to be started is generated, and a coded vinic data code is generated as a code word indicating data to be coded.

Subsequently, in step S121, a process of adding an ending identification code to the start data code is performed. The termination identification code is, for example, "0000" in a 4-bit pattern and is located immediately after the start data code B following the start data code A, as shown in FIG. 5 (c). 5C, the start data code is represented by "start code" and the end identification code is represented by "end terminal" for the sake of convenience.

In the next step S123, a process of determining whether or not the above-described preset flag is set to " 1 ", i.e., whether or not the non-visible data is included, is performed. If the flag is set to "1" (S123; Yes), the process proceeds to step S125. If no non-match data is included (flag is "0" ": S123; No), the series of the concealment processing (S125 to S133) is skipped and the process proceeds to step S135.

Steps S125 to S133 are a series of secret processes to be executed when the print data includes the secret data. First, in step S125, a process of adding a code identification code immediately after the termination identification code is performed.

The processing in this step S125 is to place the concealment identification code immediately after the termination identification code so that the data code arranged after the termination identification code is " coded as a code word representing the data to be " . Thus, when a QR code (information code SQ) generated by the present code generating process is decoded by a QR code reader or the like (for example, the information code reading device 20 or the like), the information code SQ It is possible to recognize that the nonvic data code (data code arranged after the ending identification code) is contained, so that it is possible to prevent reading out data other than the reading object, data obtained by data conversion, etc., And it is also possible to prevent the occurrence of a malfunction caused by this.

In the next step S127, a process is performed in which the data length of the secret data code is calculated and obtained, and the data length is added immediately after the secret code. As a result, it is possible to know the area and the range in which the vinic data codes are arranged, so that the QR code reader or the like (for example, the information code reading device 20 or the like) can read the information code SQ generated by the code generating process It becomes possible to recognize when the decoded data is a non-voice data code or an encrypted data code.

For example, in the example shown in Fig. 5 (c), the sum of the data length of the secret data code? And the data length of the secret data code? Is calculated as the corresponding data length and added immediately after the secret identification code. In Fig. 5C, for the sake of convenience, the vinic data code is referred to as a " vicic code " and the vicic identification code is referred to as a " vicic identifier ".

Subsequently, in step S129, it is determined whether or not there is a cryptographic key (encryption key), thereby determining whether or not it is necessary to encrypt the cryptic data code. That is, when the encryption key is received from the information processing apparatus 2 by the step S111, since there is the encryption key (encryption key) (S129; Yes), the process proceeds to the step S131 to perform the encryption processing. On the other hand, when the encryption key is not received from the information processing apparatus 2 in step S111, since there is no encryption key (S129; No), the encryption processing in step S131 is skipped and the process proceeds to step S133.

Even when the encryption key is not received in step S111, when the information processing apparatus 2 holds the encryption key in the information storage medium such as the memory 12 or the hard disk in advance, the encryption key is present (S129 Yes), the encryption processing is performed in step S131.

In step S131, a process of encrypting the secret data code is performed. This process encrypts the enciphered data code using, for example, a known time-decryption-type encryption technique (time-decryption-type secret distribution method). As a result, the strength of security can be increased as compared with a case in which such unencrypted plain text data is added.

For example, in the example shown in Fig. 5 (d), the portion of the "encrypted data" constituting the secret data code α is encrypted, and the "start digit", "number of characters", and "decryption key check data" . The " starting digits " located at the beginning corresponds to the address information of the encrypted encrypted data, which is representable when the head of the print data is the zero address. In addition, the following "number of characters" is the number of characters of the encrypted vinyl data. Accordingly, even when a positional relationship in a data record before being coded as a code word is mixed back and forth, when a QR code reader or the like decodes the information code (SQ) generated by the present code generating process, Can be arranged in a positional relationship before coding based on the positional information.

The "decryption key check data" added last is key specifying information that can specify a decryption key used to decrypt the cipher, and the cipher key is a common key cipher ("secret key cipher Method "), the decryption key check data can also specify the encryption key. Accordingly, when the QR code reader or the like decodes the information code SQ generated by the present code generation processing, it is possible to easily specify the decryption key (decryption key) of the non-key code, Can be determined.

The same information as in the case of the enciphered data code? May be added as the decryption key for decrypting the enciphered data code? As the " decipher key check data "Quot; decryption key check data " for specifying another decryption key may be added when the non-key data of the non-key data code? Is encrypted with another cryptographic key different from the cryptographic key of the non-key data code? Accordingly, when a QR code reader or the like decodes the information code SQ generated by the present code generating process, it is possible to easily specify a key that can be decoded for each of the non-key data codes, Can be determined.

In step S133, the process of adding the enciphered data code immediately after the data length is performed. In the example shown in Fig. 5 (d), the enciphered data code α and the encapsulated data code β are added after the data length. Accordingly, in the two-dimensional code reading apparatus of the general structure, the pad code or the like arranged after the termination identification code is not subjected to reading in the two-dimensional code decoding process, The subsequent non-visible data code can not be read. Therefore, even if the two-dimensional code including the above-mentioned non-visible data code is read by the reader of the general structure, the presence of the corresponding non-visible data code is unknown, so that the user of the reading apparatus can not recognize the presence of the non- .

In the succeeding step S135, for example, a process of adding a pad code (pad data) after the enciphered data code is performed in accordance with the processing algorithm described in the basic structure of JIS (JIS X 0510: 2004). In step S137, a process of adding an error correction code is performed. Further, the error correction code added in step S137 is a code for decrypting the data to be decrypted (such as the start data code or the secret code) by a known method (for example, a method described in JIS X 0510: 2004 An error correction code generation algorithm), and generates an error correction code by coding it. The data code of the format shown in Fig. 5 (c) is generated by the above processing.

In step S139, each cell is generated based on the data code generated in step S137, and the process of arranging the cell in the data block shown in Fig. 6 is performed. In other words, in the 1-type QR code shown in Fig. 6, since one side is composed of a square of 21 cells (modules), the position detection pattern and the type information (hatched portion shown in Fig. 6) provided at three corners, 26 blocks (A0 to A25) of data blocks constituted by arranging 8 cells in 4 rows and 2 columns are arranged in a code area excluding the timing pattern.

For example, in the example shown in Fig. 5C, the start data code A is set to A0 to A2, the start data code B is set to A3 to A6, and the termination identification code is set to A7. In the rear of the termination identification code, a concealment identification code, a data length, a concealment identification code and the like are arranged in A8 to A17 corresponding to the position where the pad code is normally disposed.

In other words, the enciphered identification code is arranged in A8, the data length is arranged in A9 subsequent thereto, and the enciphered data code (?) Is placed in A10 to A13 and the enciphered data code (?) Is arranged in A14 to A17. Then, similarly to the normal QR code, the error correction codes are arranged in the last A20 to A25, and the pad codes are arranged in the empty portions A18 to A19 between them. Since A15 and A18 are positioned with the timing pattern therebetween, A15 is divided into A15 and A15 ', and A18 is divided into A18 and A18'.

Also, in step S131, the decryption key itself may be added instead of the " decryption key inspection data " as shown in Fig. 5 (e). Thereby, when the QR code reader or the like decodes the information code SQ generated by the present code generation processing, for example, even if the QR code reader or the like does not have a decryption key of the nonviral data code? , And when it is configured to attempt to decode the data code subsequent to the label identification code when recognizing the presence of the label identification code, the label data code? Can be decoded and returned to the original plaintext.

Similarly, the decryption key itself may be added instead of the " decryption key inspection data ". The decryption key to be added may be the same as the decryption key for decrypting the secret data code alpha and may be added to other secret keys different from the secret key of the secret code Another decryption key corresponding to this different encryption key may be added. Accordingly, when the QR code reader or the like decodes the information code (SQ) generated by the present code generation processing, even if the corresponding QR code reader does not have a corresponding decryption key for each of the nonvic data codes, It is possible to decode each of the encoded data codes and restore the original plaintext data to the original plaintext data.

5 (f), even if it is determined in step S123 that the non-encrypted data is not included (when the flag is set to "0": S123; No) The processing step of adding the " number of start digits " and " number of characters " added in step S131 in advance may be provided between step S123 and step S135. Accordingly, even when the positional relationship in the data records before being coded as a code word is mixed back and forth, when the QR code reader or the like decodes the information code (SQ) generated by the present code generating process, Can be arranged in a positional relationship before coding based on the positional information.

As described above, according to the above information code generating apparatus 1, in the information code (SQ) generated by the code generating process executed by the MPU 11, in step S133, Or after the terminating identification code on behalf of the whole. As a result, since the non-code data code arranged behind the termination identification code is not subjected to reading in a reading device having a general structure, even if a two-dimensional code including such a code data is read by a reading device having a general structure, The presence of data to be encoded by the code is unknown. Therefore, the user of the reader of the general structure can be prevented from recognizing the presence of the secret data.

Therefore, even if such a code data includes such a code data, since the screen data corresponding to the decoded data of the corresponding code data is not displayed on the reading device of the general structure, the user does not recognize the presence of the code data. There is no irrational motivation to distrust or try to deter. In addition, even if the control data corresponds to the decoded data of the corresponding vinic data code, it is not displayed on the screen, so that the screen display is not disturbed.

In the above example, the case where the information code SQ is printed on the label P by the printing apparatus 10 is described. However, the present invention is not limited to this, and any information code SQ may be used as long as it can visually represent the information code SQ, For example, the code generation processing shown in Fig. 4 may be executed by the personal computer 4 to display the information code SQ on the display 3. Fig. In this case, the code generation processing of Fig. 4 can be conceived as a computer program. Accordingly, a computer functioning as a device for generating a two-dimensional code by the generation program of the two-dimensional code has the same function and effect as the MPU 11 and the like of the printing apparatus 10 described above.

In the above example, the configuration in which the information processing apparatus 2 is connected to the printing apparatus 10 and the printing data is sent from the information processing apparatus 2 has been described as an example. However, the character data such as alphanumeric characters, The above-described operation and effect can be obtained even when adopting a configuration in which a digital camera, a portable telephone, a handheld computer, a handy terminal, or the like having such functions is connected to the printing apparatus 10.

Next, the configuration of the information code reading apparatus 20 will be described.

The information code reading apparatus 20 reads the information code SQ (for example, the information code SQ printed by the printing apparatus 10) generated in the information code generating apparatus 1 and displayed on the medium, Which is a device that can decode the data. The configuration of the information code SQ that can be decoded by the information code reading apparatus 20 has already been described with reference to Figs. 5 and 6, and a description thereof will be omitted here. The information code reading apparatus 20 is also capable of reading a general two-dimensional code QR (a general QR code in which there is no nonvisual data after the ending identification code). Hereinafter, an object to be read by the information code reading apparatus 20 including these information codes SQ and general two-dimensional codes QR will be referred to as an information code C.

7, the information code reading apparatus 20 mainly includes an optical system such as an illumination light source 21, a light receiving sensor 23, and an image forming lens 27, a memory 35, a control circuit 40, An operation switch 42 and a liquid crystal display 46 and a power supply system such as a power switch 41 and a battery 49. [ They are built in a housing (not shown) mounted on a printed wiring board (not shown), and are configured in the same manner as a general QR code reader (reading device) in terms of hardware.

The optical system is composed of an illumination light source 21, a light receiving sensor 23, an image forming lens 27, and the like. The illuminating light source 21 functions as an illuminating light source capable of emitting the illumination light Lf. The illuminating light source 21 is composed of, for example, a red LED, a diffusing lens and a condensing lens provided on the emitting side of the LED. In this configuration, the illumination light source 21 is provided on both sides of the light receiving sensor 23, and the illumination light Lf can be irradiated toward the label P through a reading opening of a case (not shown) have. The information code (C) is printed on the label (P).

The light receiving sensor 23 is configured to be able to receive the reflected light Lr that is irradiated on the label P or the information code C and reflected thereby. The light receiving sensor 23 is a solid-state imaging device such as a C- An area sensor in which elements are arranged in two dimensions corresponds to this. The light receiving sensor 23 is mounted on a printed circuit board (not shown) so that incident light incident through the imaging lens 27 can be received by the light receiving surface 23a.

The imaging lens 27 functions as an imaging optical system that focuses the incident light incident from the outside through a reading aperture so as to form an image on the light receiving surface 23a of the light receiving sensor 23. For example, And a plurality of condenser lenses accommodated in the housing.

Next, a configuration outline of the micom system will be described. The microcomputer includes an amplifying circuit 31, an A / D converting circuit 33, a memory 35, an address generating circuit 36, a synchronizing signal generating circuit 38, a control circuit 40, an operation switch 42, An LED 43, a buzzer 44, a liquid crystal display 46, a communication interface 48, and the like. This microcomputer system is composed mainly of a control circuit 40 and a memory 35 which can function as a microcomputer as the name suggests.

The image signal outputted from the light receiving sensor 23 of the optical system is inputted to the amplifying circuit 31 and amplified to a predetermined gain and then inputted into the A / D converting circuit 33, the analog signal is converted into a digital signal . When the digitized image signal, that is, image data, is input to the memory 35, it is accumulated in the image data accumulation area. The synchronizing signal generating circuit 38 is configured to generate a synchronizing signal for the light receiving sensor 23 and the address generating circuit 36. The address generating circuit 36 is connected to the synchronizing signal generating circuit 38 based on the synchronizing signal supplied from the synchronizing signal generating unit 38. [

The memory 35 corresponds to, for example, a RAM (DRAM, SRAM, etc.) or a ROM (EPROM, EEPROM, etc.) in the semiconductor memory device. The RAM in the memory 35 is configured so as to be able to secure a working area used by the control circuit 40 in each processing such as an arithmetic operation and a logical operation in addition to the above-described image data accumulation area. The ROM stores in advance a predetermined program capable of executing a decoding process, which will be described later, and a system program capable of controlling hardware such as the illumination light source 21 and the light receiving sensor 23 in advance.

The control circuit 40 is a microcomputer capable of controlling the entire information code reading apparatus 20 and is constituted by a CPU, a system bus, an input / output interface, etc., and can constitute an information processing apparatus together with the memory 35, And has an information processing function. In the second embodiment, the power switch 41, the operation switch 42, the LED 43, and the power switch 41 are connected to the input / A buzzer 44, a liquid crystal display 46, a communication interface 48, and the like.

Thus, for example, it is possible to monitor and manage the power switch 41 and the operation switch 42, and to turn on / off the LED 43 functioning as an indicator, A communication interface (not shown) for controlling the screen of the liquid crystal display 46 capable of displaying the contents of the code by the read information code C or the serial communication with the external device 48 and the like. The external device connected to the communication interface 48 includes a host computer (HST) corresponding to the host system of the information code reading device 20 and the like. The communication interface 48 also functions as an interface capable of communicating with a later-described information terminal 60 (Fig. 1, etc.) with a known wireless communication method such as wireless LAN communication or infrared communication or a wired communication method .

The power supply system includes a power switch 41 and a battery 49. The power supply switch 41 is controlled by the control circuit 40 so that the battery 49 is supplied to each of the above- The conduction or interruption of the driving voltage supplied from the driving circuit is controlled. Further, the battery 49 is a secondary battery capable of generating a predetermined DC voltage, for example, a lithium ion battery or the like. In the case of adopting a configuration in which power is supplied from an external device such as the host computer HST (management device 80) connected via the communication interface 48 without depending on the battery 49 In this case, the battery 49 becomes unnecessary.

In this manner, when the information code reading device 20 is configured, for example, when the power switch 41 is turned on to perform predetermined self-diagnosis processing and the like and the information code C can be read, (For example, a trigger switch) for instructing light emission of the light source Lf. Accordingly, the user turns on the trigger switch so that the control circuit 40 outputs the light emission signal to the illumination light source 21 on the basis of the synchronization signal. Therefore, the illumination light source 21, which receives the light emission signal, And illuminates the illumination light Lf.

Since the illumination light Lf irradiated on the information code C is reflected and the reflected light Lf is incident on the imaging lens 27 through the reading aperture, the light receiving surface 23a of the light receiving sensor 23 is provided with an information code (C) image is formed. Thus, since the image of the information code C exposes the light receiving sensor 23, the image data of the corresponding information code C processed by the microcomputer system is transferred through the image data storing area of the memory 35 Which will be described later.

The information terminal 60 is configured as a stationary or portable computer, for example. The hardware configuration may be configured as a personal computer such as a desktop type, a notebook type, or a tablet type, or may be configured as an information processing terminal such as a smart phone or a mobile phone. It is also possible to use other types of information processing apparatuses as long as they can communicate with the reading apparatus 20 and can access the Internet. The information terminal 60 includes at least a CPU, a storage unit including a ROM, a RAM, a nonvolatile memory, and other storage devices, an operation unit including an input device such as a key button or a touch panel, A display unit formed of a display device, and a communication unit that performs communication using a known wireless communication method such as wireless LAN communication or infrared communication, or a known wired communication method.

The management apparatus 80 (the management apparatus 80 in the present specification is also referred to as a host computer (HST)) is configured, for example, as a known computer. The management device 80 includes at least a CPU, a storage unit including a ROM, a RAM, a nonvolatile memory, and other storage devices, an operation unit including an input device such as a key button or a touch panel, A display unit formed of a display device, and a communication unit that performs communication using a known wireless communication method such as wireless LAN communication or infrared communication, or a known wired communication method. In this configuration, for example, an encryption key used for encrypting the secret data is supplied from the management apparatus 80 (host computer HST) to the information code generating apparatus 1, and the same decryption key as the encryption key Or may be passed from the management device 80 to the reading device 20. [

Here, the decoding process will be described with reference to Figs. 8, 9 and 10. Fig. 8 is a flowchart showing a flow of a decoding process performed by the reading device 20. As shown in Fig. 9 is a flowchart showing the flow of the decoding process shown in S23 of Fig. Fig. 10 is a flowchart showing the flow of data transfer processing shown in S24 of Fig.

8, the decoding process is started by the control circuit 40 and the memory 35 that are activated by turning on the power supply of the information code reading apparatus 20, for example. First, in step S11, Setting processing is performed. This processing clears the working area of the memory 35 or the image data accumulation area for storing the image data, or clears a preset flag, a counter, or the like. The information code reading apparatus 20 described here is connected to the host computer HST (management apparatus 80) and is assumed to acquire data of the decryption key as setting data from the host computer HST .

In step S12, a process of clearing the count value of the timer is performed. The timer at which the counter value is cleared at this step S12 indicates elapsing of a predetermined time by the next step S13.

In step S13, a process for determining whether or not a predetermined time has elapsed by the timer described above is performed. That is, it is necessary to determine whether or not the setting data sent from the host computer HST includes data of the decryption key (decryption key) in the next step S14, for example, for 5 seconds If it is determined that the data has not been transmitted from the host computer HST until this time has elapsed, the process proceeds to step S16 with the lapse of a predetermined time (S205; Yes).

On the other hand, if the predetermined time has not elapsed (S13; No), a process for determining whether or not a decryption key (decryption key) has been received is performed in the next step S14. When it is judged that the decryption key is received (S14; Yes), the process proceeds to the succeeding step S15. If the decryption key is not received (S14; No) Determine the passage of time. Further, the decryption key (decryption key) sent from the host computer HST can be stored in the memory 35, for example. In this case, the memory 35 corresponds to an example of a decryption key storing unit for storing a decryption key.

If it is determined in step S13 that a predetermined time has elapsed (S13; Yes), the value of the flag " Key " preset in step S16 is set to " 0 ". This flag " Key " indicates whether or not the decryption key of the enciphered data code of the information code SQ is to be decrypted. When " 0 " is set (Key = 0) When " 1 " is set (when Key = 1), it indicates that decoding is performed with the decryption key. Therefore, if it is determined in S14 that the decryption key is received (S14; Yes), a process of setting the value of this flag " Key " to " 1 "

After the value of the flag " Key " preset at step S15 is set to " 1 ", or after the value of the flag " Key " is set at " 1 " at step S16, the image data is acquired at step S17 Processing is performed. In other words, a process of reading the accumulated image data from the image data storing area of the memory 35 is performed. Thus, for example, a code image of an information code (C) as conceptually shown in Fig. 6 is obtained.

In the succeeding step S18, processing for detecting the position detection pattern is performed. That is, as shown in Fig. 6, the information codes C are provided with the position detection patterns at the three corners thereof, and by detecting them, the code outline of the information code C is detected by the next step S19. It should be noted that the detection of the three-corner position detection pattern and the detection of the code outline may be performed by a well-known method implemented by a QR code (registered trademark).

Then, in step S20, a process for calculating the center coordinates of each cell is performed. In step S21, the monochrome of each cell is discriminated. 6) and the data block can be recognized. Therefore, if there is a data block such as a defect in the subsequent step S22, it is judged that the block can be error-corrected .

If it is determined in step S22 that error correction is possible (S22; Yes), error correction is performed, and decryption processing is performed in step S23. On the other hand, if it is determined in step S22 that the error can not be corrected (S22; No), since the error correction can not be performed, the process proceeds to step S17 to acquire image data again and perform the processes in steps S17 to S22 Conduct. It should be noted that the processes of steps S20 to S22 may be performed by a well-known method implemented by a QR code (registered trademark).

The details of the step S23 are shown in Fig. 9. The decoding processing will be described here with reference to Fig. As shown in Fig. 9, in the decryption process, first, the process of setting the values of the flags " Encryption " and " KeyError " Then, in step S32, a process of setting the values of "n", "Len1", and "Len2" to 0 (zero) is performed.

In step S33, a process of acquiring the n-th data code indicated by the counter (n) is performed. In the following step S34, a process of determining whether or not the n-th data code acquired in step S33 is an end-point identification code is performed. Accordingly, when it is determined that the corresponding data code acquired in step S33 is the termination identification code (S34; Yes), the normal data code arranged before the termination identification code is no longer included in the information code C The process proceeds to step S40.

On the other hand, if the corresponding data code acquired in step S33 can not be determined to be the termination identification code (S34; No), the normal data code exists before the termination identification code, so the process proceeds to subsequent step S35 (The number of characters) (i) of the (n + 1) th data code. This is based on the fact that the number of characters is stored at the position corresponding to the second character of the data code as described with reference to Fig. 5 (d), and the details are described in " 8.4 (JIS X 0510: 2004) Encoding of data ".

(Number of characters) (i) is acquired in step S35, processing for acquiring the number of data (j) by the number of characters (i) is performed in the following step S36, , I.e., a process of decoding (decoding) the start data code (data code coded as a code word indicating data to be started) is performed.

When the decoding of the data code by step S37 is completed, a process of setting "n + j + 1" to the counter n is performed in step S38 so that the counter n indicates the next data code. Then, in step S39, the value of the character number (i) obtained in S35 is added to the value of the current " Len1 ". Thus, " Len1 " indicates the cumulative number of characters counted up to the termination identification code. When proceeding to Yes in step S34, the total number of characters up to immediately before the termination identification code is obtained. After step S39, the process returns to step S33 to acquire the n-th data code.

In this manner, in steps S33 to S39, a normal data code (the first data code, the first data code, and the second data code), which is placed before the terminating identification code (on the data front side in the data string as shown in FIG. 5 Data code) is acquired and decoded. The control circuit 40 or the like that executes each of these steps corresponds to an example of the " first decode unit " and functions to decipher the arrangement content prior to the termination identification code in the code string.

In step S40, a process for determining whether or not "1" is set in the above-mentioned predetermined flag "Key", that is, whether or not to decode the enciphered data code of the information code C is performed. If the flag is not set to " 1 "(S40; No), it is not necessary to decode it with the decryption key.

On the other hand, when "1" is set in the preset flag "Key" (S40; Yes), since it is necessary to decode by the decryption key, the process goes to the next step S41 to set n + 1 in the counter n , The process of acquiring the n-th data code indicated by the counter n is performed in step S42.

In the subsequent step S43, a process for determining whether the n-th data code acquired from the step S42 is a secret identification code or not is performed. The control circuit 40 or the like that executes this step S43 corresponds to an example of the " determination unit " and functions to determine whether or not a code sequence code is placed after the termination identification code. That is, if it is determined in S43 that the label is a label identification code, it can be specified that the label identification code is located after the label identification code. If the label identification code is not determined in S43, It is possible to specify that there is no such information. Therefore, in S43, this judgment is practically carried out.

Thus, when it is determined that the data code is a secret identification code (S43; Yes), since the secret code exists after the secret code, the process proceeds to the next step S44, (The number of ciphers) (i) of the second data code. This is also based on the fact that the number of characters is stored at the position corresponding to the second character of the data code similarly to the step S35.

If it is determined in step S43 that a secret code is arranged, the host computer HST may be notified that the secret code is placed in the information code C, for example. Thus, the host computer (HST) can grasp that the data code behind the termination identification code is the code for the non-binary data. It is also possible that a code area other than the pad code (that is, not the non-code data code) (for example, the code code is included in the pad code In this case, information indicating that the code is a non-code data code is not output to the host computer HST. Therefore, a malfunction that may be caused by decoding a code other than the non-code data code can be prevented.

On the other hand, when the corresponding data code can not be determined to be the non-visible identification code (S43; No), since the non-visible data code is no longer included in the corresponding information code C after the visible identification code, And terminates.

If the number of characters (the number of ciphers (also referred to as the number of digits)) (i) is acquired in step S44, then in step S45, the enciphered data codes and the like are acquired from the empty data area (data area subsequent to the enciphered identification code). Then, the process of acquiring the secret data by the number of data (j) of the number (i) of ciphers is performed. In step S47, the counter n is set to "n + 1 + j" to indicate the next data, that is, the decryption key check data, and then the nth decryption key check data Key identifying information) is performed.

Then, it is determined whether or not the decryption key received from the host computer HST by the preceding step S14 is suitable as a key for decrypting the encrypted data of the n-th piece of the non-visible data code based on the decryption key inspection data acquired in step S47 That is, whether or not the encryption key used when the n-th piece of the non-visible data code is encrypted is suitable for the prepared decryption key) is determined in step S48. If it is determined in step S48 that the decryption key is appropriate (S48; Yes), the encrypted data (the non-encrypted data) is decrypted in step S49.

In this case, as described above, the known time-decryption type encryption technique (time-decryption type secret decryption method) is used, and thus, the encrypted data of the secret code is encrypted by the time- It can be decoded and returned to the original plaintext.

On the other hand, if it is determined in step S48 that the decryption key is not appropriate (S48; No), the value of "KeyError" is set to "1" in step S52. Thus, the value of "KeyError" is information indicating whether the decryption key (decryption key) stored in the reading device 20 is suitable for the encryption key (encryption key) used for encryption of the secret data code, and "KeyError Quot; = 1 indicates that the decryption key (decryption key) stored in the reading device 20 is not suitable for the encryption key (encryption key) used for encryption of the secret data code.

In step S50, a process for decoding the secret code is performed. That is, since the encrypted data (the secret data) can be decrypted by the previous step S49, the secret data code is decrypted (decoded) based on the encrypted data decrypted in this step S49. At this time, the decoded character number (k) is also acquired.

When the decoding processing by step S50 is finished, the value of " Encryption " is set to 1 in step S51. As described above, the value of "Encryption" is information for specifying whether or not the enciphered data code has been decrypted. If the enciphered data code is "1", it means that the enciphered data has been deciphered. If the enciphered data code is "0" . In S51, the value of " Len1 + k " is set as the value of " Len2 ".

As described above, in the processes after S34 and S40 in Fig. 9, a process of obtaining and decoding the data code (the non-code data code) which is arranged behind the termination identification code and which is not originally decoded is executed. The control circuit 40 or the like that executes each of these steps corresponds to an example of the " second decode unit " and functions to decode the encode data codes when it is determined by the determination unit that the encode data codes are arranged.

In the process of Fig. 9, as shown in Fig. 12, one type of the nonvicic data (encrypted data) is arranged after the nonvicencryption code (the nonvic identifier), the cipher digits (the number of characters) A flow capable of decrypting the information code SQ of the configuration in which the decryption key inspection data is arranged on the rear side (that is, the configuration in which one kind of the secret code? Is recorded in the data configuration as shown in FIG. 5C) It is assumed that the information codes SQ in which a plurality of types of secret codes are recorded as shown in Fig. 5C are read out, the processes of S42 to S50 are performed on a plurality of secret codes, .

As described above, according to the information code reading apparatus 20 relating to this configuration, the code area (empty area of the code area) subsequent to the ending identification code which is not disposed outside the original pad code, Code) can be arranged, it is possible to decode this non-binary data code. Therefore, it is possible to decode the data code existing in the empty portion of the code area in which the code word is to be arranged. Therefore, the information code reading apparatus 20 can decode the information code SQ generated by the information code generating apparatus 1 described above.

For example, as described with reference to Fig. 5 (e), when the decryption key itself is added to the non-encrypted data code, the decryption key check data of S47 The decryption key may be acquired instead of the processing.

In a case where the respective decryption keys are added to each of the non-encrypted data codes even if they are encrypted with different encryption keys for each of the non-encrypted data codes, the decryption keys are acquired instead of the step S47, Even if the corresponding information code reading device 20 does not have a key, it is possible to decode each of the pieces of the secret code to return to the original plaintext.

Next, the data transfer process performed in S24 of Fig. 8 will be described. This data transfer process is performed, for example, by the flow shown in FIG. 10, and is a process for transferring data from the reader 20 to another information terminal 60, for example. The information terminal 60 to be transferred may be a predetermined device predetermined in the reading device 20 or may be a device in which communication with the reading device 20 is established in the process of Fig. 10 .

In this processing, first, it is determined whether the value of " KeyError " is 1 or not. When "KeyError" is 1, it indicates that the decryption key (decryption key) stored in the reader 20 is not suitable for the encryption key used for encryption of the secret data code. In this case, the secret data code is decrypted It is not. In such a case, the process proceeds from S61 to Yes, and an error process is performed in S72. The error process here may be, for example, pronunciation by the buzzer 44 or display of an error message by the display unit such as the liquid crystal display 46. [ Alternatively, it may be a predetermined indication (for example, flashing) of the LED 43.

On the other hand, if the value of " KeyError " is 0, the process advances to No in S61, and the value of n is initialized to zero. The value of " cp " is set to the leading address of the decryption data (readout result) obtained in the decryption process of Fig.

In S63, it is determined whether the value of " Encryption " is 0 or not. If the value of " Encryption " is 1, the process proceeds from S63 to No and transmits the character of " SQ " as a code mark. That is, when the information code C to be read in FIG. 8 is the information code SQ generated by the above-described generating apparatus 1 and the secret code is decoded in the decoding process of FIG. 9, Since the value of " Encryption " is set to 1 in S51, the character of " SQ " as identification information is transmitted in S64.

In this configuration, the control circuit 40 for performing processes such as S63 and S64 corresponds to an example of the " corresponding processing section ". In this example, when the " second decode section & (Corresponding to "SQ" mark) in correspondence with the output of the result of the decoding of the result of the enciphering of the enciphered data code Function.

On the other hand, if the value of " Encryption " is 0, the process proceeds from S63 to Yes, and the character of "QR" as a code mark is transmitted to the information terminal 60. That is, in the case where the information code C to be read in FIG. 8 is a general QR code not including the above-mentioned non-vital data code, No is determined in S40 of the process of FIG. 9 or No in S43. In this case, since the value of "Encryption" is 0 which is the initial value, the character of "QR" is transmitted to the information terminal 60 in S65. That is, in this configuration, when the secret code is decrypted in the decryption process of Fig. 9, the character " SQ " is transmitted as the first identification information, and in the decryption process of Fig. 9, Quot; QR " is transmitted as the second identification information distinguishing from the first identification information.

After S64 or S65, the process of S66 is performed to determine whether n is equal to &quot; Len1 &quot;. If No in S66, the process of S67 is performed to determine whether n is equal to &quot; Len2 &quot;. If No in S67, the data of the address cp is transmitted to the information terminal 60 in S70, and then the value of n and the value of cp are incremented thereafter. In this process, if the address designated by cp is within the range of the read result of the start data code, the process of No in S66, No in S67, and S70 are repeated, and the read result of the start data code is transmitted in order. On the other hand, when n is &quot; Len1 &quot;, that is, when all of the reading results of the start data code have been transmitted, the process proceeds from S66 to Yes and the mark of &quot; << &quot; In the transfer process of S70, which is repeated after S68, the result of reading out the secret code is sequentially transmitted. In this process, if the address designated by cp is within the range of the result of reading out the nonvolatile data code after S68, the process of No in S66, No in S67, and S70 are repeated, and the result of reading out the secret code is transmitted in order. When n is &quot; Len2 &quot;, that is, when all of the results of reading the nonvolatile data code have been transmitted, the process proceeds from S67 to Yes, and a mark of &quot; >> &quot;

The information terminal 60 reads the result of reading the start data code (the start data recorded as the start data code) and the result of reading out the nonvolatile data code surrounded by the nonvolatile data start identifier and the nonvolatile data end identifier And the like are recorded as the non-visible data code).

For example, in the example of Fig. 12, the data arrangement of the information code SQ is as shown in Fig. 12, "information of the introduction site of the QR code" is handled as start data, . The address of the site &quot; http://www.abcdef.com &quot; is treated as the nonvic data, encrypted and recorded in the information code SQ as the nonvic data code. When the reading device 20 decodes such an information code SQ by the process of FIG. 8 and transfers it to the process of FIG. 10, the information terminal 60 which receives the transmission data firstly reads the information code SQ After obtaining the identification information, the reading result of the start data code, that is, the information of the introduction site of the QR code, is acquired. Then, information such as &quot; << http://www.abcdef.com >> &quot; is obtained. The information terminal 60 can detect the identification information &quot; SQ &quot; by analyzing the series of data thus received, and can recognize that there is the non-unique data in the received data. By detecting the symbols &quot; &quot; &quot; &quot; &quot; &quot;, it is possible to specify that the data arranged between these symbols is the non-visible data. That is, it is possible to specify that &quot; http://www.abcdef.com &quot; is originally the regular vinyl data. On the other hand, when the information code C read by the reading device 20 in the process of FIG. 8 is an array of general QR codes (registered trademark) as shown in FIG. 13, in the information terminal 60 receiving the reading result, , And obtains the read result of the start data code (the address data "http://www.abcdef.com" in the example of FIG. 13) after acquiring the information "QR".

14 shows an example of a mode identifier (mode indicator) commonly handled in an information code SQ and a general QR code. In this configuration, for example, a mode identifier of "0000" . In either case of the information code (SQ) and the general QR code, the data format of the start data and the ending identification code can be the same. For example, as shown in FIG. 13, A mode identifier is assigned to the data head side of each of the data, and it is possible to specify which mode each data is in.

Next, connection processing performed by the information terminal 60 will be described. In the connection process shown in Fig. 11, various initial settings are first performed in S81, and thereafter, a process of determining whether data has been received from the reading device 20 is performed (S82). If no data is received from the reading device 20 after completion of the initial setting, the process proceeds to No in S82 to continue the waiting state (a state of waiting for data reception from the reading device 20). On the other hand, if data is received from the reading device 20 after completion of the initial setting, the process proceeds from S82 to Yes to determine whether or not a terminator indicating the end of data has been received. Until the terminator is received, the storing process of No and S84 is repeated in S83. When the terminator is received (that is, all of the series of transmission data transmitted from the reader 20 is received), the processing proceeds from S83 to Yes.

In the case of proceeding from S83 to Yes, the code mark is detected from the data received from the reading device 20 (i.e., the data transmitted by the transmission process in Fig. 9), and the code mark is included in the data received from the reading device 20 If the code mark is not &quot; QQ &quot; instead of &quot; SQ &quot;, this data does not decode the nonvic data code. In this case, the process proceeds to S86 and the connection process is terminated. That is, when the data sent from the reading device 20 is not the information code SQ including the non-text data but is decoded by the general two-dimensional code QR, (An address on the Internet) is included, the connection processing to the corresponding website is not performed.

On the other hand, when the code mark included in the data received from the reading device 20 is &quot; SQ &quot;, this data can be said to be a decoded version of the nonvic data code. In this case, the process advances from S86 to Yes, and it is determined whether or not "<" and ">" are detected from the received data (S87). If the connic data identifier can be detected, the process proceeds from S87 to Yes, and the address information (URL) of the Web site on the Internet specified by the data in this range is extracted (S88). If the non-visible data identifier can not be detected, the process advances to S87 to terminate the processing of Fig. Thereafter, the user accesses a Web site on the Internet specified by the address information extracted in step S88, and displays the connection result on a display screen or the like (S89). For example, if the address arranged between the &quot; &quot; &quot; &quot; and &quot; The image obtained from the web site is acquired from the web site and displayed on the display unit of the information terminal 60. [ As described above, in the process of FIG. 11, connection to the site is not performed unless address information (an address to which a non-visible data identifier is attached) obtained from the secret data code is present.

In the above-described information code reading apparatus 20, in the case where the control circuit 40 corresponding to the second decoding unit decodes the secret code, the control circuit 40 corresponding to the corresponding processing unit, ("SQ" mark and "<<" ">>" mark) in addition to the output of the decoding result of the data code. As described above, since the result of decryption of the enciphered data code and the identification information are outputted in correspondence with each other, the information terminal 60, which is an external apparatus, can more easily discriminate whether or not the outputted data is the regular enciphered data.

The control circuit 40 corresponding to the correspondence processing section reads out the front side identification information (&quot; &quot; of the &quot; &quot; Mark), and rear side identification information (a mark of &quot; >> &quot;) as identification information is arranged on the rear side of the data arrangement of the decryption data (for example, &quot; http: // www. quot; abcdef.com &quot;). According to this configuration, it is possible to more accurately determine whether the outputted data is regular vinic data and to which range of the data array the normal vinic data exists among the output data.

The control circuit 40 corresponding to the correspondence processing section does not decode the enciphered data codes and decodes the start data codes without associating the marks of &quot; SQ &quot; as the identification information, And outputs the decoding result of the start data code (that is, the decoding result of the arrangement contents before the ending identification code in the code string). With this configuration, it is possible to specify that the output data does not contain regular non-regular data if the mark of &quot; SQ &quot; does not correspond to the output data, or if the mark of &quot; QR &quot; .

8 and 9, the control circuit 40 corresponding to the correspondence processing section determines whether or not the decryption data decrypting the enciphered data code and the identification information (the mark &quot; SQ &quot; and &quot; (Mark) of &quot; &quot; &quot; &quot; &quot;) in correspondence to each other and stored in an external storage device connected to the memory 35 That is, in the above example, the same data as the data to be transmitted in S24 may be stored in the memory 35 when the nonvic data code is decoded. As described above, even when the identification information is stored in correspondence with the decrypted data of the noncognitive data code in the case where the enciphered data code is deciphered, it is easy to quickly and reliably discriminate whether or not the stored data is regular nonvicic data.

8 and 9, the control circuit 40 corresponding to the corresponding processing unit does not decode the non-encoded data codes, and when the start data codes are decoded, the control circuit 40 does not correspond the marks of &quot; SQ &quot;Quot; QR &quot; as the additional information, and stores the decoded result of this start data code (that is, the decoded result of the arrangement prior to the termination identification code in the code string) in the memory 35 Or may be stored in an external storage device connected to the reading device 20 or the like. By doing so, if the mark of "SQ" is not associated with the stored data, or if the mark of "QR" is matched, it can be specified that the stored data does not contain regular non-uniform data.

In the above example, as an example of the corresponding processing in the case where the secret code is decrypted, the output of the decryption result of the corresponding secret code is stored or the decryption result is stored. However, . The &quot; processing according to the decoding result of the &quot; nonvic data code &quot; may be the execution of the command included in the decoding result of the nonvic data code. For example, when the above-described address information and a command indicating &quot; transmission to the information terminal 60 &quot; are recorded as the contents of the secret code, the same processing as in Fig. 10 is performed in accordance with this command, And the identification information to the information terminal 60 in correspondence with each other. If the preset information and the command indicating &quot; storage in the memory 35 &quot; are recorded as the contents of the secret code, the preset information and the identification information are associated with each other and stored in the memory 35 . In this case, it is possible to specify later that the preset information stored in the memory 35 was the regular vinyl data.

In this configuration, the information terminal 60 (connection unit) connected to each site in the predetermined network is provided. The information code generating apparatus 1 includes address information specifying an address in the network, The data code is being generated. On the other hand, the corresponding processing unit of the reading device 20 outputs at least the address information and the identification information to the information terminal 60 in a case where the second decoding unit decodes the vinic data code, Is connected to the site specified by the address information on condition that the address information and the identification information are outputted in correspondence with each other.

In this configuration, only when the address information and the identification information correspond to each other in the data output by the corresponding processing unit, the information terminal 60 (connection unit) accesses the site specified by the address information. On the other hand, when the outputted data is not regular non-visible data, access to the site specified by such unauthorized data can be restricted.

With such a technique, for example, even if another two-dimensional code in which an address of an additional site is recorded is attached to the information code on which the non-visible data is recorded, and the negation that leads to another site is performed, Access to another site by the information terminal 60 (connection unit) is not performed unless it is cleared. Therefore, access by such illegal induction can be prevented more effectively.

In addition, the information code generating apparatus 1 encrypts and codes the data to be encrypted based on a predetermined encryption key, thereby generating a piece of the enciphered data code. The information code reading apparatus includes a memory 35 (decryption key storing section) for storing a decryption key. When it is determined that the enciphered data codes are arranged, the control circuit 40 corresponding to the second decode section (Decryption key storing unit) 35 and decrypts the secret code by using the decryption key stored in the decryption key storing unit 35 (decryption key storing unit). When the decryption using the decryption key is successful, the corresponding process is performed. And performs pre-set notification processing (processing of S72) when the decryption by the decryption key is unsuccessful.

In this configuration, for example, in the case where the decryption key stored in the reading device 20 is not a regular key, a predetermined notification process is performed when the decryption fails. Therefore, It becomes easy to understand what is not normally performed and its cause.

[Other Embodiments]

The present invention is not limited to the embodiments described above with reference to the above description and drawings, and for example, the following embodiments are also included in the technical scope of the present invention.

1 and the like shows an example in which the information code generating apparatus 1 and the information code reading apparatus 20 are configured as separate apparatuses. The information code generating apparatus 1 is configured as the information code reading apparatus 20 There may be.

The information terminal 60 different from the reading apparatus 20 is configured as a connection unit in the above embodiment, but a part of the reading apparatus 20 (the control circuit 40 and the communication interface 48) may be configured as a connection unit . That is, a program for performing the processing as shown in Fig. 11 may be stored in the reading device 20, and the control circuit 40 may execute the program. In this case, the &quot; transfer &quot; part in FIG. 10 may be replaced with the concept of acceptance to the program. 11 may be replaced with the concept of reading in the reading apparatus 20. In this case, In this case, the control circuit 40 corresponding to the corresponding processing unit of the reading device 20 may store at least address information and identification information in the memory 35 in correspondence with each other in the case where the secret code is deciphered. When the address information and the identification information are stored in correspondence with each other in the memory 35 when the program for performing the processing of Fig. 11 is activated in the reading apparatus 20, Or the like may be used.

Although the information code generating apparatus 1 has shown an example of printing and forming the information code SQ, the information code SQ may not be printed. For example, the information code generating apparatus 1 may generate image data for displaying an image of the information code SQ. In this case, the information code generating apparatus 1 may transmit the generated information code SQ through data transmission or storage media (A portable information terminal equipped with a display device or a stationary information terminal) by data migration and display the information code SQ on the display medium. In addition, the information code generating apparatus 1 may be configured to mark the information code SQ generated by the processing of Fig. 4 on an object by a known direct marking process.

In the above embodiment, the information code SQ generated by the information code generating apparatus 1 is a code word that can be accommodated in the code area in which the code word is to be placed, In the case where the capacity is not satisfied, an example is shown in which the ending identification code indicating the end of the code string constituted by the start data code arranged in the code area is arranged at the end of this code string. However, the present invention is not limited to this example. For example, the information code (SQ) generated by the information code generating apparatus 1 is a code word indicating data to be started. The total number of coded start data codes is a capacity that can be accommodated in a code area End identification information capable of specifying the end position of the code string formed by the start data code may be arranged at a predetermined position of the code string. In this case, the enciphered code data as the code word indicating the data to be enciphered may be arranged after the end position specified by the end identification information.

However, it is also possible to use, instead of the termination identification code of the first embodiment, for example, a termination position of a code string formed by the start data code, which is obtained by calculating the data length of all the start data codes, The end position data that can be specified (that is, data that can specify the length of the data up to the end position) may be arranged or added to the head of the start data code. By doing so, the length and range of the data up to the end position of the start data code can be specified, and the position (end position) of the end of the start data code can be grasped. In this method, when the enciphered data code is included in the information code (SQ), the enciphered identification code or the like is successively added to the end position specified by the end identification information (end position data) The identification code may be disposed.

The information code (SQ) may include the above-described non-specific data code itself coded as a code word indicating data to be encoded, or the above-mentioned non-code data code itself placed after the end position specified by the termination identification information, May be preliminarily machined on the vinic data code of the first embodiment. The predetermined processing includes, for example, alignment of bits constituting the non-visible data, dispersion of the bits constituting the non-visible data, and conversion of data values specified by the bits constituting the non-visible data. Even in such a case, if the processing method can be specified on the side of the reading device 20, it becomes possible to decode the secret code.

1: Information code generating device
20: Information code reading device
35: Memory (storage unit, decryption key storage unit)
40: control circuit (first decoding unit, determination unit, second decoding unit, corresponding processing unit)
60: Information terminal (connection section)
100: Information code using system
SQ: Information code

Claims (10)

An information code using system comprising an information code generation device for generating an information code and an information code reading device capable of reading the information code generated by the information code generation device,
The information code generating apparatus includes:
When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string,
Generating the information code in a configuration in which the encoded nonvolatile data code is coded as a code word indicating data to be encoded, after the ending identification code or after the ending position specified by the ending identification information,
The information code reading apparatus includes:
A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,
A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;
A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,
When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a corresponding processing section for outputting or storing the preset identification information
Information code utilization system.
The method according to claim 1,
The correspondence processing unit,
And a second decode unit operable to store the decrypted decrypted decrypted data and the identification information in correspondence with each other in an output or preset memory unit when the enciphered data is decrypted by the second decryption unit,
When the second decode unit does not decode the enciphered data, the enciphered content does not correspond to the enciphered information, and the content of the enciphered content preceding the termination identification code in the code string or the termination identification information in the code string And outputs the decryption result of the arrangement contents prior to the end position specified by the output unit or the storage unit.
Information code utilization system.
3. The method of claim 2,
Wherein the correspondence processing section disposes the front side identification information as the identification information in front of the data arrangement of the decryption data when the second decode section decodes the vinylic data code, And the combination data of the data structure in which the rear side identification information as the identification information is arranged is output or stored in the storage section
Information code utilization system.
4. The method according to any one of claims 1 to 3,
And a connection unit for connecting to each site in the predetermined network,
Wherein the information code generation device generates the non-specific data code with a configuration including address information specifying an address in the network,
Wherein the correspondence processing unit outputs or stores at least the address information and the identification information in a correspondence relationship when the second decode unit decodes the enciphered data code,
Wherein the connection unit is connected to a site specified by the address information on condition that the address information and the identification information are outputted or stored in correspondence with each other
Information code utilization system.
4. The method according to any one of claims 1 to 3,
The information code generation device generates the secret code by encrypting and encoding the secret data based on a predetermined encryption key,
The information code reading apparatus includes a decryption key storage unit for storing a decryption key,
Wherein the second decode unit attempts to decrypt the enciphered data code using the decryption key stored in the decryption key storage unit when the determination unit determines that the enciphered data code is disposed, When the decryption using the decryption key is successful, performs the corresponding processing, and also outputs or stores the identification information, and when the decryption using the decryption key has failed, performs predetermined notification processing
Information code utilization system.
When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string and a code word There is provided an information code reading device capable of reading an information code which is obtained by arranging a coded confidential data code after the termination identification code or after the termination position specified by the termination identification information,
A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,
A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;
A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,
When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a corresponding processing section for outputting or storing the preset identification information
Information code reading device.
The method according to claim 6,
The correspondence processing unit,
And a second decode unit operable to store the decrypted decrypted decrypted data and the identification information in correspondence with each other in an output or preset memory unit when the enciphered data is decrypted by the second decryption unit,
When the second decode unit does not decode the non-visible data code, the arrangement information before the identification information of the code string, or the content of the identification information in the code string, And outputs the decryption result of the contents arranged before the end position specified by the decryption unit to the output or the storage unit
Information code reading device.
8. The method of claim 7,
Wherein the correspondence processing section disposes the front side identification information as the identification information in front of the data arrangement of the decryption data when the second decode section decodes the vinylic data code, And the combination data of the data structure in which the rear side identification information as the identification information is arranged is output or stored in the storage section
Information code reading device.
9. The method according to any one of claims 6 to 8,
And a connection unit for connecting to each site in the predetermined network,
Wherein the secret code is generated in a configuration including address information specifying an address in the network,
Wherein the correspondence processing unit outputs or stores at least the address information and the identification information in a correspondence relationship when the second decode unit decodes the enciphered data code,
Wherein the connection unit is connected to a site specified by the address information on condition that the address information and the identification information are outputted or stored in correspondence with each other
Information code reading device.
9. The method according to any one of claims 6 to 8,
The enciphered data code is encoded and coded based on a predetermined encryption key,
And a decryption key storage unit for storing a decryption key,
Wherein the second decode unit attempts to decrypt the enciphered data code using the decryption key stored in the decryption key storage unit when the determination unit determines that the enciphered data code is disposed, When the decryption using the decryption key is successful, performs the corresponding processing, and also outputs or stores the identification information, and when the decryption using the decryption key has failed, performs predetermined notification processing
Information code reading device.
KR1020140090119A 2013-07-17 2014-07-17 System for utilizing information code and reader reading information code KR101570704B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2013148826A JP6136688B2 (en) 2013-07-17 2013-07-17 Information code utilization system and information code reader
JPJP-P-2013-148826 2013-07-17

Publications (2)

Publication Number Publication Date
KR20150009937A KR20150009937A (en) 2015-01-27
KR101570704B1 true KR101570704B1 (en) 2015-11-23

Family

ID=52275574

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140090119A KR101570704B1 (en) 2013-07-17 2014-07-17 System for utilizing information code and reader reading information code

Country Status (3)

Country Link
JP (1) JP6136688B2 (en)
KR (1) KR101570704B1 (en)
FR (1) FR3008812B1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10512033B2 (en) * 2015-01-29 2019-12-17 Qualcomm Incorporated Timing information for discovery in unlicensed spectrum

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004147006A (en) 2002-10-23 2004-05-20 Sharp Corp Information transmitting method and portable terminal
JP2013015946A (en) 2011-07-01 2013-01-24 Denso Wave Inc Information code reading system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2004090804A1 (en) * 2003-04-03 2006-07-06 株式会社ワイヤーアクション Two-dimensional barcode generation device, two-dimensional barcode decoding device, two-dimensional barcode generation method, two-dimensional barcode decoding method and program
JP4924468B2 (en) * 2007-05-29 2012-04-25 株式会社デンソーウェーブ Two-dimensional code generation method and reader
JP4924206B2 (en) * 2007-05-29 2012-04-25 株式会社デンソーウェーブ Two-dimensional code generation method and reader
JP5737116B2 (en) * 2011-10-03 2015-06-17 株式会社デンソーウェーブ Information provision system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004147006A (en) 2002-10-23 2004-05-20 Sharp Corp Information transmitting method and portable terminal
JP2013015946A (en) 2011-07-01 2013-01-24 Denso Wave Inc Information code reading system

Also Published As

Publication number Publication date
KR20150009937A (en) 2015-01-27
FR3008812B1 (en) 2018-07-27
JP2015022436A (en) 2015-02-02
FR3008812A1 (en) 2015-01-23
JP6136688B2 (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US8879737B2 (en) Method for producing two-dimensional code and reader for reading the two-dimensional code
CN101320436B (en) Method for producing two-dimensional code and reader for reading the two-dimensional code
US8365262B2 (en) Method for automatically generating and filling in login information and system for the same
US7770018B2 (en) Setting up a security access system
EP2765531B1 (en) Two-dimensional code authentication device, two-dimensional code authentication method and program
JP4924206B2 (en) Two-dimensional code generation method and reader
JP5023949B2 (en) Two-dimensional code and its reading device
EP1846830B1 (en) Access keys
US10679023B2 (en) Two-dimensional code, two-dimensional code output system, two-dimensional code output method, two-dimensional code reading system, and two-dimensional code reading method
CN104126292A (en) Strong authentication token with visual output of pki signatures
US20060107315A1 (en) System that uses access keys
US20060107041A1 (en) Assembling a security access system
US9563830B2 (en) Incremental information object with an embedded information region
KR101608184B1 (en) Authentication server, authentication system, authentication method, and program
US20060107065A1 (en) System that generates access keys
KR101234040B1 (en) Method for generating barcodes and judging a validity of the bar-codes, bar-code generating device, and system having the same
JP3921489B2 (en) Authentication system
US10204249B2 (en) Information code reading system and information code reader
KR101570704B1 (en) System for utilizing information code and reader reading information code
KR20200139641A (en) Method of Registration And Access Control of Identity For Third-Party Certification
JP5196046B2 (en) Two-dimensional code generating program and two-dimensional code
JP2008312001A (en) Confidential data generating/reading system, and confidential data generating/reading method
KR101945931B1 (en) Method and Electronic Apparatus for Creating of Verifying Code for Verifying of Object
JP4862347B2 (en) Input device and program for preventing illegal reading of input information
JP7488460B2 (en) Method for generating two-dimensional code, two-dimensional code, and two-dimensional code reader

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20181113

Year of fee payment: 4