KR20150009937A - System for utilizing information code and reader reading information code - Google Patents
System for utilizing information code and reader reading information code Download PDFInfo
- Publication number
- KR20150009937A KR20150009937A KR20140090119A KR20140090119A KR20150009937A KR 20150009937 A KR20150009937 A KR 20150009937A KR 20140090119 A KR20140090119 A KR 20140090119A KR 20140090119 A KR20140090119 A KR 20140090119A KR 20150009937 A KR20150009937 A KR 20150009937A
- Authority
- KR
- South Korea
- Prior art keywords
- code
- data
- information
- unit
- identification information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/36—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols with means for detecting characters not meant for transmission
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1434—Barcodes with supplemental or add-on codes
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
The present invention relates to an information code using system and an information code reading apparatus.
As a technique for generating or reading a two-dimensional code including secret data, for example, there is "information transmission method and portable terminal" disclosed in
On the other hand, in the portable terminal on the receiving side, the image of the QR code displayed on the screen of the transmitting-side portable terminal is read by a camera or the like to determine whether or not the QR code is encrypted. . Then, the QR code is inversely converted, and the transmission data is decoded by the input encryption key to display the restored data on the screen (
However, according to the " information transmission method and portable terminal " disclosed in
For this reason, in the case of meaningless information, there is a possibility that the user of the portable terminal or the like may be distrusted, or the user who can recognize that the information is encrypted may be given an improper motivation to attempt to decipher Which may cause security problems.
In order to solve such a problem, the inventor of the present invention has found that, when the total number of start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in code areas to which code words should be allocated, End identification information indicating the end of the code string constituted by the start data code arranged in the code string is placed at the end of the code string or the end identification information capable of specifying the end position of the code string constituted by the start data code is arranged at a predetermined position of the code string Quot; information code " of a configuration in which a non-voice data code coded as a code word indicating data to be encoded is placed after the end position specified by the end identification code or after the end identification code.
When the information code is constructed as described above, the result of deciphering the secret code is not obtained, but the result of deciphering the secret code is obtained. Therefore, It becomes difficult to recognize that the data code is recorded. On the other hand, in the case of reading with a special reading device, since the result of decoding the secret code is obtained, it becomes easy to handle the decoding data of the secret code. However, there is a problem in that it is not possible to distinguish whether the data after the reading which is handled by the special reading device is originally made confidential data or not, simply by constituting in this way.
SUMMARY OF THE INVENTION The present invention has been made to solve the problems described above, and it is an object of the present invention to provide a reading apparatus capable of reading an information code configured to make it difficult to recognize the presence of the non- And to provide the above objects. It is another object of the present invention to provide a configuration capable of more accurately discriminating whether or not data after reading which is handled by the reading apparatus is originally encoded data.
According to a first aspect of the present invention,
An information code using system comprising an information code generation device for generating an information code and an information code reading device capable of reading the information code generated by the information code generation device,
The information code generating apparatus includes:
When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string,
Generating the information code in a configuration in which the encoded nonvolatile data code is coded as a code word indicating data to be encoded, after the ending identification code or after the ending position specified by the ending identification information,
The information code reading apparatus includes:
A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,
A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;
A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,
When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a correspondence processor for outputting or storing the preset identification information.
In the second invention,
When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string and a code word There is provided an information code reading device capable of reading an information code which is obtained by arranging a coded confidential data code after the termination identification code or after the termination position specified by the termination identification information,
A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,
A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;
A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,
When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a correspondence processor for outputting or storing the preset identification information.
An information code handled in the invention of
Further, in the information code reading apparatus, when the second decoding unit decodes the code data, at least either the output of the decoding result of the corresponding code data code by the corresponding processing unit, the storage of the decryption result, One correspondence process is performed, and output or storage of predetermined identification information is performed. In this way, in addition to the correspondence processing, the outputting or storing of the preset identification information is carried out, so that in the information code reading apparatus or the external apparatus, the data handled in the corresponding processing based on the presence or absence of the output of the identification information, It is possible to more accurately determine whether or not the data is the concealment data of the video data.
In the invention of
In this configuration, in the case where the second decode unit decodes the enciphered data, since the identification information is associated with the deciphered data of the enciphered data code to be output or stored, whether the output data or the stored data is regular non- And it becomes easy to discriminate clearly.
According to a third aspect of the present invention, in the case where the second decode unit decodes the secret code, the correspondence processing unit disposes the front side identification information as the identification information in front of the data array of the decryption data, The combination data of the data structure in which the rear side identification information as the identification information is arranged on the rear side of the data arrangement is output or stored in the storage section.
According to this configuration, it is possible to more accurately determine whether or not the output or stored data is regular non-plain data, and to specify in which range of the data array the regular non-plain data exists among the output or stored data It becomes easier to do.
According to a fourth aspect of the present invention, there is provided a communication system including a connection unit for connecting to each site in a predetermined network, wherein the information code generating apparatus generates the above-mentioned non-technical data code with a configuration including address information specifying an address in the network, Wherein the correspondence processing unit outputs or stores at least the address information and the identification information in correspondence with each other when the second decode unit decodes the non-unique data code, and the connection unit outputs the address information and the identification information, Or connected to a site specified by the address information on condition that the stored information is stored.
In this configuration, only when the address information and the identification information correspond to each other in the data output or stored by the corresponding processing unit, the connection unit accesses the site specified by the address information. Conversely, when the output or stored data is not regular non-visible data, access to the site specified by such unauthorized data can be restricted.
With such a technique, for example, even if another two-dimensional code in which an address of an additional site is recorded is attached to the information code on which the non-visible data is recorded, and the negation that leads to another site is performed, Access to a separate site by the connection unit is not performed unless it is cleared. Therefore, access by such illegal induction can be prevented more effectively.
According to a fifth aspect of the present invention, the information code generation apparatus generates the enciphered data code by encrypting and encoding the data to be enciphered based on a predetermined encryption key, and the information code reading apparatus stores a decryption key And the second decode unit attempts to decrypt the enciphered data code using the decryption key stored in the decryption key storage unit when it is determined by the determination unit that the enciphered data code is disposed A configuration in which the corresponding processing is performed when the decryption using the decryption key is successful and the outputting or storing of the identification information is performed and the decryption of the decryption using the decryption key is failed, Respectively.
In this configuration, for example, in the case where the decryption key stored in the reading device is not a regular key, a predetermined notification process is performed. Therefore, the user can not normally perform the corresponding process And it is easy to understand the cause.
According to the invention of
According to the invention of
According to the eighth aspect of the present invention, it is possible to realize an information code reading apparatus that achieves the same effect as the invention of
According to the invention of claim 9, an information code reading device which achieves the same effect as the invention of
According to the invention of
1 is an explanatory diagram conceptually illustrating an information code using system according to the first embodiment.
FIG. 2 is an explanatory diagram conceptually illustrating an application example of the information code using system of FIG. 1; FIG.
FIG. 3 (a) is an explanatory diagram conceptually illustrating a configuration example of an information code generating apparatus used in the information code using system of FIG. 1, and FIG. 3 (b) Fig. 2 is a block diagram showing an example of a hardware configuration of a printing apparatus; Fig.
4 is a flowchart illustrating the flow of the information code generating process performed by the information code generating apparatus of FIG.
Fig. 5 is an explanatory diagram showing an example of the format of data or code to be information-processed by the code generation processing shown in Fig. 4, Fig. 5 (a) is an example of data records of print data, Fig. Fig. 5C shows an example after each code is added by steps S121 to S137, Fig. 5D shows a configuration example 1 of Fig. 5C, Fig. 5E 5C shows the configuration example 2 of the viral code shown in Fig. 5C, and Fig. 5F shows the configuration example 3 of the viral code shown in Fig. 5C, respectively.
6 is an explanatory diagram showing a configuration example of a 1-type QR code.
7 is a block diagram showing a hardware configuration example of an information code reading apparatus used in the information code using system of FIG.
8 is a flowchart illustrating the flow of decoding processing performed by the information code reading apparatus of Fig.
FIG. 9 is a flow chart illustrating the flow of the decoding process performed in the decoding process of FIG. 8;
10 is a flowchart illustrating the flow of the data transfer process performed in the decode process of Fig.
11 is a flowchart illustrating the flow of a connection process performed by the information terminal of FIG.
12 is an explanatory diagram showing a specific example of the information code SQ generated by the information code generating apparatus shown in Fig. 3 and the like.
13 is an explanatory diagram showing an example of the format of a general QR code.
14 is an explanatory view for explaining an example of a correspondence relationship between a mode identifier and a mode.
[First Embodiment]
Hereinafter, a first embodiment of the present invention will be described with reference to the drawings.
The information code using system 100 (hereinafter, simply referred to as a system 100) shown in FIG. 1 includes an information code generating apparatus 1 (hereinafter also simply referred to as a generating apparatus 1) for generating an information code, An information code reading apparatus 20 (hereinafter simply referred to as a reading apparatus 20) capable of reading the information code SQ generated by the
In the following description, the QR code (registered trademark) is listed as an example of the information code SQ handled in the information
The
In the example of Fig. 2, the address information of the predetermined site in the information code (SQ) generated by the generating
The
First, the information
1 and 3 (a), an information
The
A device driver of the
3 (b), the
The
The
The
The
The
Hereinafter, the case of the thermal head as the
The printing data output from the
Here, the code generation processing will be described with reference to Figs. 4 to 6. Fig. 4 is a flowchart showing the flow of code generation processing. Fig. 5 shows an example of the format of data or code that is information-processed by the code generation processing shown in Fig. 6 shows a configuration example of a 1-type QR code.
As shown in Fig. 4, the code generation process is started by the
In step S103, this step is repeated until print data is received in the process of determining whether or not the print data has been received (S103; No). When it is judged that the print data is received (S103; Yes), a process of clearing the count value of the timer is performed in the succeeding step S105. The timer in which the counter value is cleared in step S105 is to measure the elapse of a preset time by the next step S107.
In step S107, a process of determining whether or not a preset time has elapsed by the timer described above is performed. In other words, it is judged in the next step S111 whether the print data sent from the
On the other hand, if the preset time has not elapsed (S107; No), the data record of the data (hereinafter, referred to as " (Cryptographic key) to be used for encryption and the secret data position information indicating the positional relationship among the secret information and the secret information. If it is judged that they are being received (S111; No), the process returns to the above-described step S107 and the process returns to the step S113. .
If it is determined in step S107 that a predetermined time has elapsed (S107; Yes), " 0 " is set to the predetermined flag in step S109. This flag indicates whether or not the print data includes the nonvicidal data. When "0" is set, it indicates that the nonvicin data is not included. When "1" is set, Is included. Therefore, if it is determined in step S111 that data relating to encryption or the like is received (S111; Yes), a process of setting "1" to this flag is performed in subsequent step S113.
When " 1 " is set in the flag set in advance in step S113, processing for aligning the start data and the non-matching data is performed in the following step S115. That is, the print data includes data (disclosure data) to be started by a third party and data (non-connec- tion data) to be concealed by a third party as a third party. When these data are mixed in the data records, Processing for dividing the order of data into a set of start data and a set of non-unique data is performed based on " position information indicating the positional relationship in the data records of the "
For example, as shown in Fig. 5 (a), the start data (A), the secret data (?), The start data (B), and the print data The sequence of these data is changed in step S115 so that the start data A, the start data B, and the start data A, as shown in Fig. 5B, , The sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence of the sequence. As a result, the start data and the non-unique data are respectively arranged, so that an additional process of the ending identification code by the later step S121 and an additional process of the process of adding the non-unique identification code by the step S125 are facilitated.
In the next step S117, processing is performed to encode each data such as start data and transparent data according to the JIS basic structure (JIS X 0510: 2004). As a result, a starting data code coded as a code word indicating data to be started is generated, and a coded vinic data code is generated as a code word indicating data to be coded.
Subsequently, in step S121, a process of adding an ending identification code to the start data code is performed. The termination identification code is, for example, "0000" in a 4-bit pattern and is located immediately after the start data code B following the start data code A, as shown in FIG. 5 (c). 5C, the start data code is represented by "start code" and the end identification code is represented by "end terminal" for the sake of convenience.
In the next step S123, a process of determining whether or not the above-described preset flag is set to " 1 ", i.e., whether or not the non-visible data is included, is performed. If the flag is set to "1" (S123; Yes), the process proceeds to step S125. If no non-match data is included (flag is "0" ": S123; No), the series of the concealment processing (S125 to S133) is skipped and the process proceeds to step S135.
Steps S125 to S133 are a series of secret processes to be executed when the print data includes the secret data. First, in step S125, a process of adding a code identification code immediately after the termination identification code is performed.
The processing in this step S125 is to place the concealment identification code immediately after the termination identification code so that the data code arranged after the termination identification code is " coded as a code word representing the data to be " . Thus, when a QR code (information code SQ) generated by the present code generating process is decoded by a QR code reader or the like (for example, the information
In the next step S127, a process is performed in which the data length of the secret data code is calculated and obtained, and the data length is added immediately after the secret code. As a result, it is possible to know the area and the range in which the vinic data codes are arranged, so that the QR code reader or the like (for example, the information
For example, in the example shown in Fig. 5 (c), the sum of the data length of the secret data code? And the data length of the secret data code? Is calculated as the corresponding data length and added immediately after the secret identification code. In Fig. 5C, for the sake of convenience, the vinic data code is referred to as a " vicic code " and the vicic identification code is referred to as a " vicic identifier ".
Subsequently, in step S129, it is determined whether or not there is a cryptographic key (encryption key), thereby determining whether or not it is necessary to encrypt the cryptic data code. That is, when the encryption key is received from the
Even when the encryption key is not received in step S111, when the
In step S131, a process of encrypting the secret data code is performed. This process encrypts the enciphered data code using, for example, a known time-decryption-type encryption technique (time-decryption-type secret distribution method). As a result, the strength of security can be increased as compared with a case in which such unencrypted plain text data is added.
For example, in the example shown in Fig. 5 (d), the portion of the "encrypted data" constituting the secret data code α is encrypted, and the "start digit", "number of characters", and "decryption key check data" . The " starting digits " located at the beginning corresponds to the address information of the encrypted encrypted data, which is representable when the head of the print data is the zero address. In addition, the following "number of characters" is the number of characters of the encrypted vinyl data. Accordingly, even when a positional relationship in a data record before being coded as a code word is mixed back and forth, when a QR code reader or the like decodes the information code (SQ) generated by the present code generating process, Can be arranged in a positional relationship before coding based on the positional information.
The "decryption key check data" added last is key specifying information that can specify a decryption key used to decrypt the cipher, and the cipher key is a common key cipher ("secret key cipher Method "), the decryption key check data can also specify the encryption key. Accordingly, when the QR code reader or the like decodes the information code SQ generated by the present code generation processing, it is possible to easily specify the decryption key (decryption key) of the non-key code, Can be determined.
The same information as in the case of the enciphered data code? May be added as the decryption key for decrypting the enciphered data code? As the " decipher key check data "Quot; decryption key check data " for specifying another decryption key may be added when the non-key data of the non-key data code? Is encrypted with another cryptographic key different from the cryptographic key of the non-key data code? Accordingly, when a QR code reader or the like decodes the information code SQ generated by the present code generating process, it is possible to easily specify a key that can be decoded for each of the non-key data codes, Can be determined.
In step S133, the process of adding the enciphered data code immediately after the data length is performed. In the example shown in Fig. 5 (d), the enciphered data code α and the encapsulated data code β are added after the data length. Accordingly, in the two-dimensional code reading apparatus of the general structure, the pad code or the like arranged after the termination identification code is not subjected to reading in the two-dimensional code decoding process, The subsequent non-visible data code can not be read. Therefore, even if the two-dimensional code including the above-mentioned non-visible data code is read by the reader of the general structure, the presence of the corresponding non-visible data code is unknown, so that the user of the reading apparatus can not recognize the presence of the non- .
In the succeeding step S135, for example, a process of adding a pad code (pad data) after the enciphered data code is performed in accordance with the processing algorithm described in the basic structure of JIS (JIS X 0510: 2004). In step S137, a process of adding an error correction code is performed. Further, the error correction code added in step S137 is a code for decrypting the data to be decrypted (such as the start data code or the secret code) by a known method (for example, a method described in JIS X 0510: 2004 An error correction code generation algorithm), and generates an error correction code by coding it. The data code of the format shown in Fig. 5 (c) is generated by the above processing.
In step S139, each cell is generated based on the data code generated in step S137, and the process of arranging the cell in the data block shown in Fig. 6 is performed. In other words, in the 1-type QR code shown in Fig. 6, since one side is composed of a square of 21 cells (modules), the position detection pattern and the type information (hatched portion shown in Fig. 6) provided at three corners, 26 blocks (A0 to A25) of data blocks constituted by arranging 8 cells in 4 rows and 2 columns are arranged in a code area excluding the timing pattern.
For example, in the example shown in Fig. 5C, the start data code A is set to A0 to A2, the start data code B is set to A3 to A6, and the termination identification code is set to A7. In the rear of the termination identification code, a concealment identification code, a data length, a concealment identification code and the like are arranged in A8 to A17 corresponding to the position where the pad code is normally disposed.
In other words, the enciphered identification code is arranged in A8, the data length is arranged in A9 subsequent thereto, and the enciphered data code (?) Is placed in A10 to A13 and the enciphered data code (?) Is arranged in A14 to A17. Then, similarly to the normal QR code, the error correction codes are arranged in the last A20 to A25, and the pad codes are arranged in the empty portions A18 to A19 between them. Since A15 and A18 are positioned with the timing pattern therebetween, A15 is divided into A15 and A15 ', and A18 is divided into A18 and A18'.
Also, in step S131, the decryption key itself may be added instead of the " decryption key inspection data " as shown in Fig. 5 (e). Thereby, when the QR code reader or the like decodes the information code SQ generated by the present code generation processing, for example, even if the QR code reader or the like does not have a decryption key of the nonviral data code? , And when it is configured to attempt to decode the data code subsequent to the label identification code when recognizing the presence of the label identification code, the label data code? Can be decoded and returned to the original plaintext.
Similarly, the decryption key itself may be added instead of the " decryption key inspection data ". The decryption key to be added may be the same as the decryption key for decrypting the secret data code alpha and may be added to other secret keys different from the secret key of the secret code Another decryption key corresponding to this different encryption key may be added. Accordingly, when the QR code reader or the like decodes the information code (SQ) generated by the present code generation processing, even if the corresponding QR code reader does not have a corresponding decryption key for each of the nonvic data codes, It is possible to decode each of the encoded data codes and restore the original plaintext data to the original plaintext data.
5 (f), even if it is determined in step S123 that the non-encrypted data is not included (when the flag is set to "0": S123; No) The processing step of adding the " number of start digits " and " number of characters " added in step S131 in advance may be provided between step S123 and step S135. Accordingly, even when the positional relationship in the data records before being coded as a code word is mixed back and forth, when the QR code reader or the like decodes the information code (SQ) generated by the present code generating process, Can be arranged in a positional relationship before coding based on the positional information.
As described above, according to the above information
Therefore, even if such a code data includes such a code data, since the screen data corresponding to the decoded data of the corresponding code data is not displayed on the reading device of the general structure, the user does not recognize the presence of the code data. There is no irrational motivation to distrust or try to deter. In addition, even if the control data corresponds to the decoded data of the corresponding vinic data code, it is not displayed on the screen, so that the screen display is not disturbed.
In the above example, the case where the information code SQ is printed on the label P by the
In the above example, the configuration in which the
Next, the configuration of the information
The information
7, the information
The optical system is composed of an
The
The
Next, a configuration outline of the micom system will be described. The microcomputer includes an amplifying
The image signal outputted from the
The
The
Thus, for example, it is possible to monitor and manage the
The power supply system includes a
In this manner, when the information
Since the illumination light Lf irradiated on the information code C is reflected and the reflected light Lf is incident on the
The
The management apparatus 80 (the
Here, the decoding process will be described with reference to Figs. 8, 9 and 10. Fig. 8 is a flowchart showing a flow of a decoding process performed by the
8, the decoding process is started by the
In step S12, a process of clearing the count value of the timer is performed. The timer at which the counter value is cleared at this step S12 indicates elapsing of a predetermined time by the next step S13.
In step S13, a process for determining whether or not a predetermined time has elapsed by the timer described above is performed. That is, it is necessary to determine whether or not the setting data sent from the host computer HST includes data of the decryption key (decryption key) in the next step S14, for example, for 5 seconds If it is determined that the data has not been transmitted from the host computer HST until this time has elapsed, the process proceeds to step S16 with the lapse of a predetermined time (S205; Yes).
On the other hand, if the predetermined time has not elapsed (S13; No), a process for determining whether or not a decryption key (decryption key) has been received is performed in the next step S14. When it is judged that the decryption key is received (S14; Yes), the process proceeds to the succeeding step S15. If the decryption key is not received (S14; No) Determine the passage of time. Further, the decryption key (decryption key) sent from the host computer HST can be stored in the
If it is determined in step S13 that a predetermined time has elapsed (S13; Yes), the value of the flag " Key " preset in step S16 is set to " 0 ". This flag " Key " indicates whether or not the decryption key of the enciphered data code of the information code SQ is to be decrypted. When " 0 " is set (Key = 0) When " 1 " is set (when Key = 1), it indicates that decoding is performed with the decryption key. Therefore, if it is determined in S14 that the decryption key is received (S14; Yes), a process of setting the value of this flag " Key " to " 1 "
After the value of the flag " Key " preset at step S15 is set to " 1 ", or after the value of the flag " Key " is set at " 1 " at step S16, the image data is acquired at step S17 Processing is performed. In other words, a process of reading the accumulated image data from the image data storing area of the
In the succeeding step S18, processing for detecting the position detection pattern is performed. That is, as shown in Fig. 6, the information codes C are provided with the position detection patterns at the three corners thereof, and by detecting them, the code outline of the information code C is detected by the next step S19. It should be noted that the detection of the three-corner position detection pattern and the detection of the code outline may be performed by a well-known method implemented by a QR code (registered trademark).
Then, in step S20, a process for calculating the center coordinates of each cell is performed. In step S21, the monochrome of each cell is discriminated. 6) and the data block can be recognized. Therefore, if there is a data block such as a defect in the subsequent step S22, it is judged that the block can be error-corrected .
If it is determined in step S22 that error correction is possible (S22; Yes), error correction is performed, and decryption processing is performed in step S23. On the other hand, if it is determined in step S22 that the error can not be corrected (S22; No), since the error correction can not be performed, the process proceeds to step S17 to acquire image data again and perform the processes in steps S17 to S22 Conduct. It should be noted that the processes of steps S20 to S22 may be performed by a well-known method implemented by a QR code (registered trademark).
The details of the step S23 are shown in Fig. 9. The decoding processing will be described here with reference to Fig. As shown in Fig. 9, in the decryption process, first, the process of setting the values of the flags " Encryption " and " KeyError " Then, in step S32, a process of setting the values of "n", "Len1", and "Len2" to 0 (zero) is performed.
In step S33, a process of acquiring the n-th data code indicated by the counter (n) is performed. In the following step S34, a process of determining whether or not the n-th data code acquired in step S33 is an end-point identification code is performed. Accordingly, when it is determined that the corresponding data code acquired in step S33 is the termination identification code (S34; Yes), the normal data code arranged before the termination identification code is no longer included in the information code C The process proceeds to step S40.
On the other hand, if the corresponding data code acquired in step S33 can not be determined to be the termination identification code (S34; No), the normal data code exists before the termination identification code, so the process proceeds to subsequent step S35 (The number of characters) (i) of the (n + 1) th data code. This is based on the fact that the number of characters is stored at the position corresponding to the second character of the data code as described with reference to Fig. 5 (d), and the details are described in " 8.4 (JIS X 0510: 2004) Encoding of data ".
(Number of characters) (i) is acquired in step S35, processing for acquiring the number of data (j) by the number of characters (i) is performed in the following step S36, , I.e., a process of decoding (decoding) the start data code (data code coded as a code word indicating data to be started) is performed.
When the decoding of the data code by step S37 is completed, a process of setting "n + j + 1" to the counter n is performed in step S38 so that the counter n indicates the next data code. Then, in step S39, the value of the character number (i) obtained in S35 is added to the value of the current " Len1 ". Thus, " Len1 " indicates the cumulative number of characters counted up to the termination identification code. When proceeding to Yes in step S34, the total number of characters up to immediately before the termination identification code is obtained. After step S39, the process returns to step S33 to acquire the n-th data code.
In this manner, in steps S33 to S39, a normal data code (the first data code, the first data code, and the second data code), which is placed before the terminating identification code (on the data front side in the data string as shown in FIG. 5 Data code) is acquired and decoded. The
In step S40, a process for determining whether or not "1" is set in the above-mentioned predetermined flag "Key", that is, whether or not to decode the enciphered data code of the information code C is performed. If the flag is not set to " 1 "(S40; No), it is not necessary to decode it with the decryption key.
On the other hand, when "1" is set in the preset flag "Key" (S40; Yes), since it is necessary to decode by the decryption key, the process goes to the next step S41 to set n + 1 in the counter n , The process of acquiring the n-th data code indicated by the counter n is performed in step S42.
In the subsequent step S43, a process for determining whether the n-th data code acquired from the step S42 is a secret identification code or not is performed. The
Thus, when it is determined that the data code is a secret identification code (S43; Yes), since the secret code exists after the secret code, the process proceeds to the next step S44, (The number of ciphers) (i) of the second data code. This is also based on the fact that the number of characters is stored at the position corresponding to the second character of the data code similarly to the step S35.
If it is determined in step S43 that a secret code is arranged, the host computer HST may be notified that the secret code is placed in the information code C, for example. Thus, the host computer (HST) can grasp that the data code behind the termination identification code is the code for the non-binary data. It is also possible that a code area other than the pad code (that is, not the non-code data code) (for example, the code code is included in the pad code In this case, information indicating that the code is a non-code data code is not output to the host computer HST. Therefore, a malfunction that may be caused by decoding a code other than the non-code data code can be prevented.
On the other hand, when the corresponding data code can not be determined to be the non-visible identification code (S43; No), since the non-visible data code is no longer included in the corresponding information code C after the visible identification code, And terminates.
If the number of characters (the number of ciphers (also referred to as the number of digits)) (i) is acquired in step S44, then in step S45, the enciphered data codes and the like are acquired from the empty data area (data area subsequent to the enciphered identification code). Then, the process of acquiring the secret data by the number of data (j) of the number (i) of ciphers is performed. In step S47, the counter n is set to "n + 1 + j" to indicate the next data, that is, the decryption key check data, and then the nth decryption key check data Key identifying information) is performed.
Then, it is determined whether or not the decryption key received from the host computer HST by the preceding step S14 is suitable as a key for decrypting the encrypted data of the n-th piece of the non-visible data code based on the decryption key inspection data acquired in step S47 That is, whether or not the encryption key used when the n-th piece of the non-visible data code is encrypted is suitable for the prepared decryption key) is determined in step S48. If it is determined in step S48 that the decryption key is appropriate (S48; Yes), the encrypted data (the non-encrypted data) is decrypted in step S49.
In this case, as described above, the known time-decryption type encryption technique (time-decryption type secret decryption method) is used, and thus, the encrypted data of the secret code is encrypted by the time- It can be decoded and returned to the original plaintext.
On the other hand, if it is determined in step S48 that the decryption key is not appropriate (S48; No), the value of "KeyError" is set to "1" in step S52. Thus, the value of "KeyError" is information indicating whether the decryption key (decryption key) stored in the
In step S50, a process for decoding the secret code is performed. That is, since the encrypted data (the secret data) can be decrypted by the previous step S49, the secret data code is decrypted (decoded) based on the encrypted data decrypted in this step S49. At this time, the decoded character number (k) is also acquired.
When the decoding processing by step S50 is finished, the value of " Encryption " is set to 1 in step S51. As described above, the value of "Encryption" is information for specifying whether or not the enciphered data code has been decrypted. If the enciphered data code is "1", it means that the enciphered data has been deciphered. If the enciphered data code is "0" . In S51, the value of " Len1 + k " is set as the value of " Len2 ".
As described above, in the processes after S34 and S40 in Fig. 9, a process of obtaining and decoding the data code (the non-code data code) which is arranged behind the termination identification code and which is not originally decoded is executed. The
In the process of Fig. 9, as shown in Fig. 12, one type of the nonvicic data (encrypted data) is arranged after the nonvicencryption code (the nonvic identifier), the cipher digits (the number of characters) A flow capable of decrypting the information code SQ of the configuration in which the decryption key inspection data is arranged on the rear side (that is, the configuration in which one kind of the secret code? Is recorded in the data configuration as shown in FIG. 5C) It is assumed that the information codes SQ in which a plurality of types of secret codes are recorded as shown in Fig. 5C are read out, the processes of S42 to S50 are performed on a plurality of secret codes, .
As described above, according to the information
For example, as described with reference to Fig. 5 (e), when the decryption key itself is added to the non-encrypted data code, the decryption key check data of S47 The decryption key may be acquired instead of the processing.
In a case where the respective decryption keys are added to each of the non-encrypted data codes even if they are encrypted with different encryption keys for each of the non-encrypted data codes, the decryption keys are acquired instead of the step S47, Even if the corresponding information
Next, the data transfer process performed in S24 of Fig. 8 will be described. This data transfer process is performed, for example, by the flow shown in FIG. 10, and is a process for transferring data from the
In this processing, first, it is determined whether the value of " KeyError " is 1 or not. When "KeyError" is 1, it indicates that the decryption key (decryption key) stored in the
On the other hand, if the value of " KeyError " is 0, the process advances to No in S61, and the value of n is initialized to zero. The value of " cp " is set to the leading address of the decryption data (readout result) obtained in the decryption process of Fig.
In S63, it is determined whether the value of " Encryption " is 0 or not. If the value of " Encryption " is 1, the process proceeds from S63 to No and transmits the character of " SQ " as a code mark. That is, when the information code C to be read in FIG. 8 is the information code SQ generated by the above-described
In this configuration, the
On the other hand, if the value of " Encryption " is 0, the process proceeds from S63 to Yes, and the character of "QR" as a code mark is transmitted to the
After S64 or S65, the process of S66 is performed to determine whether n is equal to " Len1 ". If No in S66, the process of S67 is performed to determine whether n is equal to " Len2 ". If No in S67, the data of the address cp is transmitted to the
The
For example, in the example of Fig. 12, the data arrangement of the information code SQ is as shown in Fig. 12, "information of the introduction site of the QR code" is handled as start data, . The address of the site " http://www.abcdef.com " is treated as the nonvic data, encrypted and recorded in the information code SQ as the nonvic data code. When the
14 shows an example of a mode identifier (mode indicator) commonly handled in an information code SQ and a general QR code. In this configuration, for example, a mode identifier of "0000" . In either case of the information code (SQ) and the general QR code, the data format of the start data and the ending identification code can be the same. For example, as shown in FIG. 13, A mode identifier is assigned to the data head side of each of the data, and it is possible to specify which mode each data is in.
Next, connection processing performed by the
In the case of proceeding from S83 to Yes, the code mark is detected from the data received from the reading device 20 (i.e., the data transmitted by the transmission process in Fig. 9), and the code mark is included in the data received from the
On the other hand, when the code mark included in the data received from the
In the above-described information
The
The
8 and 9, the
8 and 9, the
In the above example, as an example of the corresponding processing in the case where the secret code is decrypted, the output of the decryption result of the corresponding secret code is stored or the decryption result is stored. However, . The " processing according to the decoding result of the " nonvic data code " may be the execution of the command included in the decoding result of the nonvic data code. For example, when the above-described address information and a command indicating " transmission to the
In this configuration, the information terminal 60 (connection unit) connected to each site in the predetermined network is provided. The information
In this configuration, only when the address information and the identification information correspond to each other in the data output by the corresponding processing unit, the information terminal 60 (connection unit) accesses the site specified by the address information. On the other hand, when the outputted data is not regular non-visible data, access to the site specified by such unauthorized data can be restricted.
With such a technique, for example, even if another two-dimensional code in which an address of an additional site is recorded is attached to the information code on which the non-visible data is recorded, and the negation that leads to another site is performed, Access to another site by the information terminal 60 (connection unit) is not performed unless it is cleared. Therefore, access by such illegal induction can be prevented more effectively.
In addition, the information
In this configuration, for example, in the case where the decryption key stored in the
[Other Embodiments]
The present invention is not limited to the embodiments described above with reference to the above description and drawings, and for example, the following embodiments are also included in the technical scope of the present invention.
1 and the like shows an example in which the information
The
Although the information
In the above embodiment, the information code SQ generated by the information
However, it is also possible to use, instead of the termination identification code of the first embodiment, for example, a termination position of a code string formed by the start data code, which is obtained by calculating the data length of all the start data codes, The end position data that can be specified (that is, data that can specify the length of the data up to the end position) may be arranged or added to the head of the start data code. By doing so, the length and range of the data up to the end position of the start data code can be specified, and the position (end position) of the end of the start data code can be grasped. In this method, when the enciphered data code is included in the information code (SQ), the enciphered identification code or the like is successively added to the end position specified by the end identification information (end position data) The identification code may be disposed.
The information code (SQ) may include the above-described non-specific data code itself coded as a code word indicating data to be encoded, or the above-mentioned non-code data code itself placed after the end position specified by the termination identification information, May be preliminarily machined on the vinic data code of the first embodiment. The predetermined processing includes, for example, alignment of bits constituting the non-visible data, dispersion of the bits constituting the non-visible data, and conversion of data values specified by the bits constituting the non-visible data. Even in such a case, if the processing method can be specified on the side of the
1: Information code generating device
20: Information code reading device
35: Memory (storage unit, decryption key storage unit)
40: control circuit (first decoding unit, determination unit, second decoding unit, corresponding processing unit)
60: Information terminal (connection section)
100: Information code using system
SQ: Information code
Claims (10)
The information code generating apparatus includes:
When the total number of the start data codes coded as code words representing data to be started is less than the capacity that can be accommodated in the code area to which the code words should be allocated, the end of the code string constituted by the start data codes arranged in the code area Is arranged at the end of the code string or the end identification information capable of specifying the end position of the code string formed by the start data code is arranged at a predetermined position of the code string,
Generating the information code in a configuration in which the encoded nonvolatile data code is coded as a code word representing data to be encoded, after the ending identification code or after the ending position specified by the ending identification information,
The information code reading apparatus includes:
A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,
A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;
A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,
When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a corresponding processing section for outputting or storing the preset identification information
Information code utilization system.
The correspondence processing unit,
And a second decode unit operable to store the decrypted decrypted decrypted data and the identification information in correspondence with each other in an output or preset memory unit when the enciphered data is decrypted by the second decryption unit,
When the second decode unit does not decode the enciphered data, the enciphered content does not correspond to the enciphered information, and the content of the enciphered content preceding the termination identification code in the code string or the termination identification information in the code string And outputs the decryption result of the arrangement contents prior to the end position specified by the output unit or the storage unit.
Information code utilization system.
Wherein the correspondence processing section disposes the front side identification information as the identification information in front of the data arrangement of the decryption data when the second decode section decodes the vinylic data code, And the combination data of the data structure in which the rear side identification information as the identification information is arranged is output or stored in the storage section
Information code utilization system.
And a connection unit for connecting to each site in the predetermined network,
Wherein the information code generation device generates the non-specific data code with a configuration including address information specifying an address in the network,
Wherein the correspondence processing unit outputs or stores at least the address information and the identification information in a correspondence relationship when the second decode unit decodes the enciphered data code,
Wherein the connection unit is connected to a site specified by the address information on condition that the address information and the identification information are outputted or stored in correspondence with each other
Information code utilization system.
The information code generation device generates the secret code by encrypting and encoding the secret data based on a predetermined encryption key,
The information code reading apparatus includes a decryption key storage unit for storing a decryption key,
Wherein the second decode unit attempts to decrypt the enciphered data code using the decryption key stored in the decryption key storage unit when the determination unit determines that the enciphered data code is disposed, When the decryption using the decryption key is successful, performs the corresponding processing, and also outputs or stores the identification information, and when the decryption using the decryption key has failed, performs predetermined notification processing
Information code utilization system.
A first decoding unit for attempting to decode an arrangement content preceding the termination identification code in the code string or prior to the termination position specified by the termination identification information in the code string,
A judging unit for judging whether or not the above-mentioned enciphered data code is disposed after the ending identification code or after the ending position;
A second decoding unit which decodes the non-specific data code when it is judged by the judging unit that the non-visible data code is arranged,
When the second decode unit decrypts the secret code, at least one of the output of the decryption result of the corresponding secret code, the storage of the decryption result, or the process according to the decryption result is performed And a corresponding processing section for outputting or storing the preset identification information
Information code reading device.
The correspondence processing unit,
And a second decode unit operable to store the decrypted decrypted decrypted data and the identification information in correspondence with each other in an output or preset memory unit when the enciphered data is decrypted by the second decryption unit,
When the second decode unit does not decode the non-visible data code, the arrangement information before the identification information of the code string, or the content of the identification information in the code string, And outputs the decryption result of the contents arranged before the end position specified by the decryption unit to the output or the storage unit
Information code reading device.
Wherein the correspondence processing section disposes the front side identification information as the identification information in front of the data arrangement of the decryption data when the second decode section decodes the vinylic data code, And the combination data of the data structure in which the rear side identification information as the identification information is arranged is output or stored in the storage section
Information code reading device.
And a connection unit for connecting to each site in the predetermined network,
Wherein the information code generation device generates the non-specific data code with a configuration including address information specifying an address in the network,
Wherein the correspondence processing unit outputs or stores at least the address information and the identification information in a correspondence relationship when the second decode unit decodes the enciphered data code,
Wherein the connection unit is connected to a site specified by the address information on condition that the address information and the identification information are outputted or stored in correspondence with each other
Information code reading device.
The enciphered data code is encoded and coded based on a predetermined encryption key,
And a decryption key storage unit for storing a decryption key,
Wherein the second decode unit attempts to decrypt the enciphered data code using the decryption key stored in the decryption key storage unit when the determination unit determines that the enciphered data code is disposed, When the decryption using the decryption key is successful, performs the corresponding processing, and also outputs or stores the identification information, and when the decryption using the decryption key has failed, performs predetermined notification processing
Information code reading device.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPJP-P-2013-148826 | 2013-07-17 | ||
JP2013148826A JP6136688B2 (en) | 2013-07-17 | 2013-07-17 | Information code utilization system and information code reader |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20150009937A true KR20150009937A (en) | 2015-01-27 |
KR101570704B1 KR101570704B1 (en) | 2015-11-23 |
Family
ID=52275574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020140090119A KR101570704B1 (en) | 2013-07-17 | 2014-07-17 | System for utilizing information code and reader reading information code |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP6136688B2 (en) |
KR (1) | KR101570704B1 (en) |
FR (1) | FR3008812B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160227476A1 (en) * | 2015-01-29 | 2016-08-04 | Qualcomm Incorporated | Timing information for discovery in unlicensed spectrum |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004147006A (en) | 2002-10-23 | 2004-05-20 | Sharp Corp | Information transmitting method and portable terminal |
JPWO2004090804A1 (en) * | 2003-04-03 | 2006-07-06 | 株式会社ワイヤーアクション | Two-dimensional barcode generation device, two-dimensional barcode decoding device, two-dimensional barcode generation method, two-dimensional barcode decoding method and program |
JP4924206B2 (en) * | 2007-05-29 | 2012-04-25 | 株式会社デンソーウェーブ | Two-dimensional code generation method and reader |
JP4924468B2 (en) * | 2007-05-29 | 2012-04-25 | 株式会社デンソーウェーブ | Two-dimensional code generation method and reader |
JP5708309B2 (en) | 2011-07-01 | 2015-04-30 | 株式会社デンソーウェーブ | Information code reading system |
JP5737116B2 (en) * | 2011-10-03 | 2015-06-17 | 株式会社デンソーウェーブ | Information provision system |
-
2013
- 2013-07-17 JP JP2013148826A patent/JP6136688B2/en active Active
-
2014
- 2014-07-16 FR FR1456808A patent/FR3008812B1/en active Active
- 2014-07-17 KR KR1020140090119A patent/KR101570704B1/en active IP Right Grant
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160227476A1 (en) * | 2015-01-29 | 2016-08-04 | Qualcomm Incorporated | Timing information for discovery in unlicensed spectrum |
US10512033B2 (en) * | 2015-01-29 | 2019-12-17 | Qualcomm Incorporated | Timing information for discovery in unlicensed spectrum |
Also Published As
Publication number | Publication date |
---|---|
JP6136688B2 (en) | 2017-05-31 |
FR3008812A1 (en) | 2015-01-23 |
JP2015022436A (en) | 2015-02-02 |
KR101570704B1 (en) | 2015-11-23 |
FR3008812B1 (en) | 2018-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8879737B2 (en) | Method for producing two-dimensional code and reader for reading the two-dimensional code | |
CN101320436B (en) | Method for producing two-dimensional code and reader for reading the two-dimensional code | |
US7770018B2 (en) | Setting up a security access system | |
EP2765531B1 (en) | Two-dimensional code authentication device, two-dimensional code authentication method and program | |
JP4924206B2 (en) | Two-dimensional code generation method and reader | |
EP1846830B1 (en) | Access keys | |
US10679023B2 (en) | Two-dimensional code, two-dimensional code output system, two-dimensional code output method, two-dimensional code reading system, and two-dimensional code reading method | |
CN104126292A (en) | Strong authentication token with visual output of pki signatures | |
US20060107315A1 (en) | System that uses access keys | |
US20060107041A1 (en) | Assembling a security access system | |
US20060107309A1 (en) | Using an access key | |
KR101608184B1 (en) | Authentication server, authentication system, authentication method, and program | |
US20060107065A1 (en) | System that generates access keys | |
CN102413278A (en) | Camera management device, network camera system, network camera control method, and network equipment control method | |
KR101234040B1 (en) | Method for generating barcodes and judging a validity of the bar-codes, bar-code generating device, and system having the same | |
US20120280029A1 (en) | Incremental information object with an embedded information region | |
JP3921489B2 (en) | Authentication system | |
KR20200139641A (en) | Method of Registration And Access Control of Identity For Third-Party Certification | |
US10204249B2 (en) | Information code reading system and information code reader | |
KR101570704B1 (en) | System for utilizing information code and reader reading information code | |
JP5196046B2 (en) | Two-dimensional code generating program and two-dimensional code | |
JP4862347B2 (en) | Input device and program for preventing illegal reading of input information | |
JP7488460B2 (en) | Method for generating two-dimensional code, two-dimensional code, and two-dimensional code reader | |
JP5196045B2 (en) | Printer for printing two-dimensional code, display device for displaying two-dimensional code, and system | |
JP2020086893A (en) | Two-dimensional code evaluation system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20181113 Year of fee payment: 4 |