WO2014027424A1 - 二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム - Google Patents
二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム Download PDFInfo
- Publication number
- WO2014027424A1 WO2014027424A1 PCT/JP2012/070938 JP2012070938W WO2014027424A1 WO 2014027424 A1 WO2014027424 A1 WO 2014027424A1 JP 2012070938 W JP2012070938 W JP 2012070938W WO 2014027424 A1 WO2014027424 A1 WO 2014027424A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dimensional code
- bit string
- correction
- information
- exclusive
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K5/00—Methods or arrangements for verifying the correctness of markings on a record carrier; Column detection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/146—Methods for optical code recognition the method including quality enhancement steps
- G06K7/1473—Methods for optical code recognition the method including quality enhancement steps error correction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06075—Constructional details the marking containing means for error correction
Definitions
- the present invention relates to a two-dimensional code authentication device, a two-dimensional code generation device, a two-dimensional code authentication method, and a program, particularly a two-dimensional code authentication device capable of detecting forgery of a two-dimensional code, a two-dimensional code generation device, and a two-dimensional code authentication.
- the present invention relates to a method and a program.
- QR Quality Response code
- the present invention has been made to solve the above problems, and provides a two-dimensional code authentication device, a two-dimensional code generation device, a two-dimensional code authentication method, and a program capable of detecting forgery of a two-dimensional code. With the goal.
- a two-dimensional code authentication device includes: A two-dimensional code authentication device for authenticating a two-dimensional code comprising: an information area that expresses predetermined information by a cell distribution pattern; and a correction area that expresses correction information for correcting an error by a cell distribution pattern Because Part of the correction area is replaced with exclusive OR of a first correction bit string generated from the part and a second correction bit string generated from a part of the correction area different from the part.
- Two-dimensional code reading means for reading the two-dimensional code and obtaining the correction information; Using the correction information acquired by the two-dimensional code reading means, an error detection means for detecting an exclusive OR of the first correction bit string and the second correction bit string as an error; By determining whether or not an exclusive OR of the first correction bit string included in the correction information and the error detected by the error detection unit matches the second correction bit string included in the correction information, Two-dimensional code authentication means for authenticating the two-dimensional code; It is characterized by providing.
- the two-dimensional code reading means includes the two-dimensional code in which a part of the correction area is replaced with an exclusive OR of the first correction bit string and an encrypted bit string obtained by encrypting the second correction bit string.
- the two-dimensional code authentication means decrypts the exclusive OR of the first correction bit string included in the correction information and the error detected by the error detection means by a method corresponding to the encryption, and the decoded bit string Authenticating the two-dimensional code by determining whether or not the second correction bit string included in the correction information matches. It may be a thing.
- a two-dimensional code generation device provides: A two-dimensional code generation device that generates a two-dimensional code that can be authenticated by the two-dimensional code authentication device according to claim 1, Correction bit string acquisition means for acquiring the first correction bit string and the second correction bit string from the correction region; An exclusive OR calculation means for calculating an exclusive OR of the first correction bit string and the second correction bit string acquired by the correction bit string acquisition means; Two-dimensional code generation for generating the two-dimensional code in which the second correction bit string is embedded as authentication information by replacing a part of the correction area with the exclusive OR calculated by the exclusive OR calculation means Means, It is characterized by providing.
- a two-dimensional code generation device that generates a two-dimensional code that can be authenticated by the two-dimensional code authentication device according to claim 2,
- Correction bit string acquisition means for acquiring the first correction bit string and the second correction bit string from the correction region;
- Encrypted bit string generating means for generating the encrypted bit string by encrypting the second corrected bit string acquired by the corrected bit string acquiring means;
- An exclusive OR calculating means for calculating an exclusive OR of the first corrected bit string acquired by the corrected bit string acquiring means and the encrypted bit string generated by the encrypted bit string generating means;
- Two-dimensional code generation means for generating the two-dimensional code in which the encrypted bit string is embedded as authentication information by replacing a part of the correction area with the exclusive OR calculated by the exclusive OR calculation means; , It is characterized by providing.
- the encrypted bit string generation means encrypts the second corrected bit string by an asymmetric encryption method; It may be a thing.
- the encrypted bit string generation means encrypts the second corrected bit string by an elliptic curve cryptosystem. It may be a thing.
- a two-dimensional code authentication method includes: A two-dimensional code authentication method for authenticating a two-dimensional code comprising: an information area expressing predetermined information by a cell distribution pattern; and a correction area expressing correction information for correcting an error by a cell distribution pattern Because Part of the correction area is replaced with exclusive OR of a first correction bit string generated from the part and a second correction bit string generated from a part of the correction area different from the part.
- a two-dimensional code reading step of reading the two-dimensional code and obtaining the correction information An error detection step of detecting an exclusive OR of the first correction bit string and the second correction bit string as an error using the correction information acquired by the two-dimensional code reading step; By determining whether or not an exclusive OR of the first correction bit string included in the correction information and the error detected by the error detection step matches the second correction bit string included in the correction information, A two-dimensional code authentication step for authenticating the two-dimensional code; It is characterized by providing.
- a program for authenticating a two-dimensional code comprising: an information area that expresses predetermined information by a cell distribution pattern; and a correction area that expresses correction information for correcting an error by a cell distribution pattern On the computer Part of the correction area is replaced with exclusive OR of a first correction bit string generated from the part and a second correction bit string generated from a part of the correction area different from the part.
- a two-dimensional code reading procedure for reading the two-dimensional code and obtaining the correction information;
- An error detection procedure for detecting an exclusive OR of the first correction bit string and the second correction bit string as an error using the correction information acquired by the two-dimensional code reading procedure;
- a two-dimensional code authentication procedure for authenticating the two-dimensional code; Is executed.
- a two-dimensional code authentication device it is possible to provide a two-dimensional code authentication device, a two-dimensional code generation device, a two-dimensional code authentication method, and a program that can detect forgery of a two-dimensional code.
- FIG. 1 is a block diagram showing a configuration example of a self-authentication type two-dimensional code generation apparatus according to the present embodiment.
- the self-authenticating two-dimensional code generation device 10 embeds authentication information in the embedding target two-dimensional code 100 to generate a self-authenticating two-dimensional code.
- a CPU Central Processing Unit
- a ROM Read Only This is realized by a general-purpose computer including a memory (RAM), a random access memory (RAM), a hard disk drive, and the like.
- FIG. 2 is a diagram illustrating a configuration example of a two-dimensional code to be embedded in the present embodiment.
- the two-dimensional code 100 satisfies a standard (JIS X 0510) of a so-called QR (Quick Response) code (registered trademark, the same applies hereinafter), and includes three positioning symbols 104A, 104B, 104C, an information code recording area 106, a timing cell 108, a format code 109, and the like.
- JIS X 0510 JIS X 0510
- QR Quick Response
- the three positioning symbols 104A, 104B, and 104C are respectively arranged at three vertices among the four vertices of the rectangular two-dimensional code 100.
- the timing cell 108 is arranged as a linear reference pattern in which white and black are alternately combined between the positioning symbols 104A, 104B, and 104C. This timing cell 108 is used as an index of each data cell position.
- the format code 109 is arranged in the vicinity of the positioning symbol 104A and indicates version information defined in advance for the format of the information code recorded in the information code recording area 106.
- Version information in the two-dimensional code (QR code) standard is a combination of 1 to 40 versions and four error correction levels L, M, Q, and H (in order from L to H) for each version. It consists of
- Versions 1 to 40 mainly correspond to the total number of symbols composed of 8 cells corresponding to 8 bits.
- the error correction level (L, M, Q, H) corresponds to a high ratio of allowing unreadable symbols out of all symbols, that is, a high allowable defect rate.
- the allowable defect rate of each level is about 30% for error correction level, about 25% for error correction level Q, about 15% for error correction level M, and about 7% for error correction level L.
- the two-dimensional code 100 having the error correction level H and the version 5 with the total number of symbols of 134 is used, and the version information is represented as “5-H”.
- the version of the two-dimensional code and the error correction level are arbitrary, and may be any of versions 1 to 40, and the error correction levels are L, M, Q. , H may be used.
- the information code recording area 106 is composed of two types of cells (monochrome patterns are omitted) having different optical characteristics, and an information code (information area) Cd and an RS (Reed Solomon) code (correction area) corresponding thereto. ) Contains code pairs with Ce.
- the information code is obtained by coding predetermined information, and the predetermined information is expressed by a cell distribution pattern (cell pattern) included in the information code.
- the RS code Ce is obtained by encoding correction information obtained by encoding predetermined information using RS (Reed-Solomon), and is used for correction for correcting an error by a cell pattern included in the RS code. Expresses information.
- an example of encoding using an RS code is illustrated as an optimal example, but the present invention is not limited to this, and other encoding methods may be used.
- a BCH code can be suitably applied to the present invention.
- Golay codes, Hadamard codes, Reed-Muller codes, low-density parity check codes, Goppa codes, fire codes, convolutional codes, turbo codes, concatenation codes between cyclic hamming and RS codes, etc. are also applicable to the present invention. is there.
- the information code recording area 106 is composed of a total of 134 symbols including 44 information symbols constituting the information code Cd and 90 RS symbols constituting the RS code Ce.
- the information code recording area 106 is divided into four blocks B1 to B4, of which two blocks B1 and B2 are a total of 33 pieces of 11 information symbols and 22 RS symbols corresponding thereto.
- the remaining two blocks B3 and B4 are composed of a total of 34 symbols including 11 information symbols and 23 RS symbols corresponding thereto.
- the self-authentication type two-dimensional code generation device 10 shown in FIG. Each of these units may be configured by a dedicated hardware device, or may be realized as a function of one or a plurality of processors based on a software program.
- the two-dimensional code decoding unit 1 decodes and reads the two-dimensional code 100, and includes a light receiving element such as a CCD (Charge Coupled Device) that takes in the two-dimensional code 100.
- the two-dimensional code decoding unit 1 decodes each block of the two-dimensional code 100 in accordance with a code arrangement rule, whereby an information bit string composed of 11 information symbols from each block and an RS composed of 22 or 23 RS symbols. Get bit string.
- the authentication information embedding unit 2 embeds authentication information in the RS symbol sequence acquired by the two-dimensional code decoding unit 1.
- the authentication information embedding unit 2 extracts 12 RS symbols from a predetermined position of the RS bit string of each block.
- the authentication information embedding unit 2 selects six predetermined symbols from the extracted 12 RS symbols, and a bit string m having a bit length of 192 consisting of a total of 24 RS symbols in a total of 4 blocks. (Second correction bit string) is acquired.
- the authentication information embedding unit 2 encrypts the bit string m using elliptic curve cryptography (ECC: Elliptic Curve Cryptography), RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard) -192, and the like, and the bit string c ( Get the encryption bit string).
- ECC Elliptic Curve Cryptography
- RSA Rivest-Shamir-Adleman
- AES Advanced Encryption Standard
- bit string c Get the encryption bit string.
- Elliptic curve cryptography is cryptographically strong because it depends on the mathematical difficulty of discrete logarithm problem (ECDLP) on the elliptic curve and there is no algorithm for efficiently solving ECDLP.
- ECDLP discrete logarithm problem
- the RSA 1024-bit key length encryption strength can be realized with only 160 bits, and the processing time is short. For this reason, it is most preferable to encrypt using elliptic curve cryptography.
- an example of encrypting a bit string using elliptic curve cryptography is illustrated, but the present invention is not limited to this, and other encryption methods may be used.
- asymmetric encryption public key encryption
- RSA encryption or El Gamal encryption is preferably applicable to the present invention.
- AES encryption, DES (Data Encryption Standard) encryption, and the like are also applicable to the present invention.
- the self-authentication type two-dimensional code generation unit 3 corrects by arranging the information bit string and the RS bit string in which the authentication information is embedded by the authentication information embedding unit 2 according to the code arrangement rule of the original two-dimensional code 100.
- a self-authentication type two-dimensional code 200 in which authentication information is embedded in the area is generated.
- the self-authenticating two-dimensional code 200 generated in this way is output by printing with a printer or displaying on a LCD (Liquid Crystal Display).
- FIG. 3 is a block diagram showing a configuration example of the two-dimensional code authentication device in the present embodiment.
- the two-dimensional code authentication device 20 determines whether or not the self-authentication type two-dimensional code 200 has been tampered with based on authentication information embedded in the self-authentication type two-dimensional code 200. Similar to the dimension code generation device 10, it is realized by a general-purpose computer including a CPU, a ROM, a RAM, a hard disk drive, and the like.
- the two-dimensional code authentication device 20 includes a two-dimensional code decoding unit 4, an error detection unit 5, and a two-dimensional code authentication unit 6.
- Each of these units may be configured by a dedicated hardware device, or may be realized as a function of one or a plurality of processors based on a software program.
- the two-dimensional code decoding unit 4 decodes and reads the self-authentication type two-dimensional code 200, and includes a light receiving element such as a CCD that takes in the self-authentication type two-dimensional code 200. It consists of The two-dimensional code decoding unit 4 decodes each block of the self-authenticating two-dimensional code 200 in accordance with the above-described code arrangement rule, so that an information bit string composed of 11 information symbols and 22 or 23 information symbols from each block. An RS bit string composed of RS symbols is acquired.
- the error detection unit 5 detects an error included in the self-authentication type two-dimensional code 200 by using an RS bit string (correction information) of the self-authentication type two-dimensional code 200.
- the error detection unit 5 obtains an exclusive OR of the data before being decoded by the two-dimensional code decoding unit 4 and the data after being decoded by the two-dimensional code decoding unit 4.
- a bit string c ′ composed of 24 RS symbols is detected as an error.
- the two-dimensional code authenticating unit 6 uses the bit string l and bit string m included in the RS bit string acquired by the two-dimensional code decoding unit 4 and the bit string c ′ detected as an error by the error detecting unit 5 to perform self-authentication. By authenticating the type two-dimensional code 200, it is determined whether or not the self-authenticating type two-dimensional code 200 has been tampered with. Specifically, the two-dimensional code authenticating unit 6 obtains the bit string c ′ embedded as the authentication information by calculating the exclusive OR of the bit string l included in the RS bit string and the bit string c ′ detected as an error. To do.
- the two-dimensional code authenticating unit 6 obtains a bit string md (decrypted bit string) by decrypting the bit string c ′ by using the decryption key corresponding to the encryption of the authentication information embedding unit 2. Then, the two-dimensional code authenticating unit 6 authenticates the self-authenticating two-dimensional code 200 by determining whether or not the decrypted bit string md matches the bit string m included in the RS bit string.
- the two-dimensional code authenticating unit 6 determines that the self-authenticating two-dimensional code 200 has not been tampered with. If the two do not match, the two-dimensional code authenticating unit 6 It is determined that 200 has been tampered with.
- FIG. 4 is a flowchart showing details of the self-authentication type two-dimensional code generation process executed by the self-authentication type two-dimensional code generation device.
- the self-authenticating two-dimensional code generation device 10 starts the self-authentication two-dimensional code generation process shown in FIG. .
- the self-authentication type two-dimensional code generation device 10 first decodes each block of the captured two-dimensional code 100 in accordance with a predetermined code arrangement rule by the two-dimensional code decoding unit 1.
- an information bit string composed of 11 information symbols and an RS bit string composed of 22 or 23 RS symbols are obtained from each block (step S1).
- the self-authentication type two-dimensional code generation device 10 extracts 12 RS symbols from a predetermined position of the RS bit string of each block (step S2). Subsequently, the self-authentication type two-dimensional code generation device 10 is the authentication information embedding unit 2, and the authentication information embedding unit 2 selects six predetermined symbols from the extracted 12 RS symbols.
- a bit string m having a bit length of 192 consisting of a total of 24 RS symbols in a total of 4 blocks is acquired (step S3).
- the self-authentication type two-dimensional code generation device 10 uses the self-authentication type two-dimensional code generation unit 3 to convert the information bit string and the RS bit string in which the authentication information is embedded in the authentication information embedding unit 2 into the original two bits.
- the self-authentication type two-dimensional code 200 in which the authentication information is embedded in the correction area is generated and output (step S8).
- FIG. 6 is a flowchart showing details of the two-dimensional code authentication process executed by the two-dimensional code authentication apparatus.
- the two-dimensional code authentication device 20 starts the two-dimensional code authentication process shown in FIG. 6 in response to the two-dimensional code decoding unit 4 reading the self-authentication type two-dimensional code 200.
- the two-dimensional code authentication device 20 first decodes each block of the captured self-authenticated two-dimensional code 200 in accordance with the above-described code arrangement rule by the two-dimensional code decoding unit 4. Then, an information bit string consisting of 11 information symbols and an RS bit string consisting of 22 or 23 RS symbols are acquired from each block (step S11).
- the two-dimensional code authentication device 20 uses the error detection unit 5 to perform an exclusive OR of the data before being decoded by the two-dimensional code decoding unit 4 and the data after being decoded by the two-dimensional code decoding unit 4.
- the bit string c ′ composed of 24 RS symbols is detected as an error (step S12).
- the two-dimensional code authentication unit 6 calculates the exclusive OR of the bit string l included in the RS bit string and the bit string c ′ detected as an error, thereby embedding it as authentication information.
- the obtained bit string c ′ is acquired (step S13).
- the two-dimensional code authentication device 20 uses the two-dimensional code authentication unit 6 to decrypt the bit string c ′ by using the decryption key corresponding to the encryption of the authentication information embedding unit 2, thereby obtaining the bit string md. Obtain (step S14).
- the two-dimensional code authentication device 20 uses the two-dimensional code authentication unit 6 to determine whether or not the decoded bit string md matches the bit string m included in the RS bit string.
- the code 200 is authenticated (step S15).
- step S15 If the two match as a result of the authentication (step S15; Yes), the two-dimensional code authenticating unit 6 determines that the self-authenticating two-dimensional code 200 has not been tampered with (step S16), and the two match. If not (step S15; No), it is determined that the self-authenticating two-dimensional code 200 has been tampered with (step S17).
- the self-authenticating two-dimensional code generation device 10 first includes the information code Cd that expresses predetermined information by the cell distribution pattern in the two-dimensional code decoding unit 1 and the read information.
- a two-dimensional code including RS code Ce that expresses correction information for correcting predetermined errors and obtaining predetermined information by a cell distribution pattern is read.
- the self-authentication type two-dimensional code generation device 10 generates the bit string l and the bit string m from the RS code Ce in the authentication information embedding unit 2 and also generates the bit string c by encrypting the bit string m. Subsequently, in the authentication information embedding unit 2, the self-authentication type two-dimensional code generation device 10 calculates the exclusive OR of the bit string ci obtained by dividing the bit string c into four and the bit string li, and generates the bit string ci. The self-authentication type two-dimensional code generation device 10 embeds the bit string c as authentication information in the RS code Ce by replacing the bit string li with the bit string ci in the authentication information embedding unit 2.
- the self-authentication type two-dimensional code generation device 10 includes a self-authentication type two-dimensional code generation unit 3 that includes an information bit string and an RS bit string in which authentication information is embedded in the authentication information embedding unit 2. Generate a two-dimensional code.
- the two-dimensional code decoding unit 4 reads the self-authentication type two-dimensional code 200 to acquire an RS bit string, and then the error detection unit 5 uses the RS bit string to generate a bit string c ′. Is detected as an error.
- the two-dimensional code authentication unit 6 calculates the exclusive OR of the bit string l included in the RS bit string and the bit string c ′ detected as an error, and is embedded as authentication information.
- the bit string c ′ is obtained, and the bit string c ′ is decrypted by a method corresponding to encryption to obtain the bit string md.
- the two-dimensional code authentication unit 6 determines whether or not the decoded bit string md matches the bit string m included in the RS bit string, whereby the self-authentication type two-dimensional code 200. Authenticate.
- the self-authenticating two-dimensional code generation device 10 includes the bit string c obtained by encrypting the bit string m generated from a part of the RS code Ce and the part of the RS code Ce.
- the bit string c is obtained by obtaining an exclusive OR of the bit string l generated from different parts, and the bit string c is replaced with the bit string c, whereby the bit string c is embedded in the RS code Ce as authentication information.
- the two-dimensional code authenticating device 20 cannot detect the exclusive OR of the bit string c and the bit string l as an error, and can detect forgery of the two-dimensional code. .
- bit string c obtained by encrypting the bit string m is embedded in the RS code Ce as authentication information, forgery of the two-dimensional code can be more effectively prevented.
- the self-authentication type two-dimensional code generation device 10 has been described as generating the bit string c by encrypting the bit string m and calculating the exclusive OR of the bit string c and the bit string l.
- the present invention is not limited to this, and the exclusive OR of the bit string m and the bit string l may be calculated without encrypting the bit string m.
- the self-authentication type two-dimensional code generation device 10 generates the bit string mi by calculating the exclusive OR of the bit string mi obtained by dividing the bit string m into four and the bit string li in the authentication information embedding unit 2. Then, the self-authentication type two-dimensional code generation device 10 may embed the bit string m as authentication information in the RS code Ce by replacing the bit string li with the bit string mi in the authentication information embedding unit 2.
- the error detection unit 5 detects the bit string m 'as an error using the RS bit string.
- the two-dimensional code authentication device 20 obtains the bit string m ′ by calculating an exclusive OR of the bit string l included in the RS bit string and the bit string m ′ detected as an error in the two-dimensional code authentication unit 6.
- the self-authentication type two-dimensional code 200 may be authenticated by determining whether or not the acquired bit string m ′ matches the bit string m included in the RS bit string.
- the two-dimensional code 100 and the self-authenticating two-dimensional code are described as being composed of white cells and black cells.
- the present invention is not limited to this, and one or more colors of optical characteristics recognized as “0” by a general-purpose two-dimensional code reader and optical characteristics recognized as “1”. Any information can be applied as long as it expresses predetermined information using one or a plurality of colors. For example, a two-dimensional code with a logo in which a visible logo mark is superimposed on a two-dimensional code. Good.
- a cell having a predetermined brightness or higher (brightness recognized as “1” by a general-purpose two-dimensional code reader) is placed on a logo mark having a brightness lower than a predetermined brightness (brightness recognized as “0” by a general-purpose two-dimensional code reader).
- Predetermined information may be expressed by a superposition or a distribution pattern of a cell and a portion of the logo mark where the cell is not overlaid (see, for example, JP-A-2007-287004).
- “cell logo dots with a predetermined brightness or higher are superimposed on a portion of the logo mark that is lower than the predetermined brightness, while cell dots with a predetermined brightness or higher are overlapped with a portion of the logo mark that is lower than the predetermined brightness.
- the predetermined information is expressed by a distribution pattern of a cell dot and logo mark having a lightness or higher and a portion having a predetermined lightness or higher and a cell dot and a logo mark having a lightness less than the predetermined lightness.
- the QR code (registered trademark) is exemplified as the two-dimensional code.
- the two-dimensional code includes a data matrix, an aztec code, a code one, Other matrix type two-dimensional codes such as an array tag, a box graphic code, a maxi code, a pericode, a soft strip, a CP code, a Carla code, and an ultra code may be used.
- a stack type two-dimensional code in which one-dimensional barcodes such as PDF417, code 49, code 16k, and coder block are vertically stacked may be used.
- the program executed by the CPU of the self-authentication type two-dimensional code device 10 and the two-dimensional code authentication device 20 has been described as being stored in advance in a ROM or the like. Instead, the program for executing the above-described processing is applied to an existing general-purpose computer to function as the self-authenticating two-dimensional code device 10 and the two-dimensional code authentication device 20 according to the above-described embodiment. You may let them.
- the method of providing such a program is arbitrary.
- the program may be stored and distributed on a computer-readable recording medium (flexible disk, CD (Compact Disc) -ROM, DVD (Digital Versatile Disc) -ROM, etc.).
- the program may be stored in a storage on a network such as the Internet and provided by downloading it.
- the application program when the above processing is executed by sharing between the OS and the application program or by cooperation between the OS and the application program, only the application program may be stored in a recording medium or storage. It is also possible to superimpose a program on a carrier wave and distribute it via a network. For example, the program may be posted on a bulletin board (BBS: Bulletin Board System) on the network, and the program may be distributed via the network. Then, this program may be activated and executed in the same manner as other application programs under the control of the OS, so that the above processing can be executed.
- BSS Bulletin Board System
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Editing Of Facsimile Originals (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
- Image Processing (AREA)
- Error Detection And Correction (AREA)
Abstract
Description
所定の情報をセルの分布パターンによって表現する情報領域と、誤りを訂正するための訂正情報をセルの分布パターンによって表現する訂正領域と、を備える二次元コードを認証するための二次元コード認証装置であって、
前記訂正領域の一部が、該一部から生成された第1訂正ビット列と該訂正領域のうち該一部とは異なる部分から生成された第2訂正ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得する二次元コード読取手段と、
前記二次元コード読取手段によって取得した前記訂正情報を用いて、前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を誤りとして検出する誤り検出手段と、
前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出手段によって検出した誤りとの排他的論理和が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う二次元コード認証手段と、
を備えることを特徴とする。
前記二次元コード読取手段は、前記訂正領域の一部が、前記第1訂正ビット列と前記第2訂正ビット列を暗号化して得られた暗号ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得し、
前記二次元コード認証手段は、前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出手段によって検出した誤りとの排他的論理和を前記暗号化に対応する方式で復号化して復号ビット列が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う、
ものであってもよい。
請求項1に記載の二次元コード認証装置で認証可能な二次元コードを生成する二次元コード生成装置であって、
前記訂正領域から前記第1訂正ビット列と前記第2訂正ビット列とを取得する訂正ビット列取得手段と、
前記訂正ビット列取得手段によって取得した前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を算出する排他的論理和算出手段と、
前記訂正領域の一部を、前記排他的論理和算出手段によって算出した排他的論理和に置換することにより、前記第2訂正ビット列を認証情報として埋め込んだ前記二次元コードを生成する二次元コード生成手段と、
を備えることを特徴とする。
請求項2に記載の二次元コード認証装置で認証可能な二次元コードを生成する二次元コード生成装置であって、
前記訂正領域から前記第1訂正ビット列と前記第2訂正ビット列とを取得する訂正ビット列取得手段と、
前記訂正ビット列取得手段によって取得した前記第2訂正ビット列を暗号化して前記暗号ビット列を生成する暗号ビット列生成手段と、
前記訂正ビット列取得手段によって取得した前記第1訂正ビット列と前記暗号ビット列生成手段によって生成した前記暗号ビット列との排他的論理和を算出する排他的論理和算出手段と、
前記訂正領域の一部を、前記排他的論理和算出手段によって算出した排他的論理和に置換することにより、前記暗号ビット列を認証情報として埋め込んだ前記二次元コードを生成する二次元コード生成手段と、
を備えることを特徴とする。
前記暗号ビット列生成手段は、前記第2訂正ビット列を非対称暗号化方式で暗号化する、
ものであってもよい。
前記暗号ビット列生成手段は、前記第2訂正ビット列を楕円曲線暗号方式で暗号化する、
ものであってもよい。
所定の情報をセルの分布パターンによって表現する情報領域と、誤りを訂正するための訂正情報をセルの分布パターンによって表現する訂正領域と、を備える二次元コードを認証するための二次元コード認証方法であって、
前記訂正領域の一部が、該一部から生成された第1訂正ビット列と該訂正領域のうち該一部とは異なる部分から生成された第2訂正ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得する二次元コード読取ステップと、
前記二次元コード読取ステップによって取得した前記訂正情報を用いて、前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を誤りとして検出する誤り検出ステップと、
前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出ステップによって検出した誤りとの排他的論理和が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う二次元コード認証ステップと、
を備えることを特徴とする。
所定の情報をセルの分布パターンによって表現する情報領域と、誤りを訂正するための訂正情報をセルの分布パターンによって表現する訂正領域と、を備える二次元コードを認証するための二次元コード認証装置のコンピュータに、
前記訂正領域の一部が、該一部から生成された第1訂正ビット列と該訂正領域のうち該一部とは異なる部分から生成された第2訂正ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得する二次元コード読取手順と、
前記二次元コード読取手順によって取得した前記訂正情報を用いて、前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を誤りとして検出する誤り検出手順と、
前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出手順によって検出した誤りとの排他的論理和が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う二次元コード認証手順と、
を実行させる。
2 認証情報埋込部
3 自己認証型二次元コード生成部
4 二次元コードデコード部
5 誤り検出部
6 二次元コード認証部
10 自己認証型二次元コード生成装置
20 二次元コード認証装置
100 二次元コード
200 自己認証型二次元コード
Claims (8)
- 所定の情報をセルの分布パターンによって表現する情報領域と、誤りを訂正するための訂正情報をセルの分布パターンによって表現する訂正領域と、を備える二次元コードを認証するための二次元コード認証装置であって、
前記訂正領域の一部が、該一部から生成された第1訂正ビット列と該訂正領域のうち該一部とは異なる部分から生成された第2訂正ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得する二次元コード読取手段と、
前記二次元コード読取手段によって取得した前記訂正情報を用いて、前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を誤りとして検出する誤り検出手段と、
前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出手段によって検出した誤りとの排他的論理和が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う二次元コード認証手段と、
を備えることを特徴とする二次元コード認証装置。 - 前記二次元コード読取手段は、前記訂正領域の一部が、前記第1訂正ビット列と前記第2訂正ビット列を暗号化して得られた暗号ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得し、
前記二次元コード認証手段は、前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出手段によって検出した誤りとの排他的論理和を前記暗号化に対応する方式で復号化して復号ビット列が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う、
ことを特徴とする請求項1に記載の二次元コード認証装置。 - 請求項1に記載の二次元コード認証装置で認証可能な二次元コードを生成する二次元コード生成装置であって、
前記訂正領域から前記第1訂正ビット列と前記第2訂正ビット列とを取得する訂正ビット列取得手段と、
前記訂正ビット列取得手段によって取得した前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を算出する排他的論理和算出手段と、
前記訂正領域の一部を、前記排他的論理和算出手段によって算出した排他的論理和に置換することにより、前記第2訂正ビット列を認証情報として埋め込んだ前記二次元コードを生成する二次元コード生成手段と、
を備えることを特徴とする二次元コード生成装置。 - 請求項2に記載の二次元コード認証装置で認証可能な二次元コードを生成する二次元コード生成装置であって、
前記訂正領域から前記第1訂正ビット列と前記第2訂正ビット列とを取得する訂正ビット列取得手段と、
前記訂正ビット列取得手段によって取得した前記第2訂正ビット列を暗号化して前記暗号ビット列を生成する暗号ビット列生成手段と、
前記訂正ビット列取得手段によって取得した前記第1訂正ビット列と前記暗号ビット列生成手段によって生成した前記暗号ビット列との排他的論理和を算出する排他的論理和算出手段と、
前記訂正領域の一部を、前記排他的論理和算出手段によって算出した排他的論理和に置換することにより、前記暗号ビット列を認証情報として埋め込んだ前記二次元コードを生成する二次元コード生成手段と、
を備えることを特徴とする二次元コード生成装置。 - 前記暗号ビット列生成手段は、前記第2訂正ビット列を非対称暗号化方式で暗号化する、
ことを特徴とする請求項4に記載の二次元コード生成装置。 - 前記暗号ビット列生成手段は、前記第2訂正ビット列を楕円曲線暗号方式で暗号化する、
ことを特徴とする請求項5に記載の二次元コード生成装置。 - 所定の情報をセルの分布パターンによって表現する情報領域と、誤りを訂正するための訂正情報をセルの分布パターンによって表現する訂正領域と、を備える二次元コードを認証するための二次元コード認証方法であって、
前記訂正領域の一部が、該一部から生成された第1訂正ビット列と該訂正領域のうち該一部とは異なる部分から生成された第2訂正ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得する二次元コード読取ステップと、
前記二次元コード読取ステップによって取得した前記訂正情報を用いて、前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を誤りとして検出する誤り検出ステップと、
前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出ステップによって検出した誤りとの排他的論理和が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う二次元コード認証ステップと、
を備えることを特徴とする二次元コード認証方法。 - 所定の情報をセルの分布パターンによって表現する情報領域と、誤りを訂正するための訂正情報をセルの分布パターンによって表現する訂正領域と、を備える二次元コードを認証するための二次元コード認証装置のコンピュータに、
前記訂正領域の一部が、該一部から生成された第1訂正ビット列と該訂正領域のうち該一部とは異なる部分から生成された第2訂正ビット列との排他的論理和に置き換えられた前記二次元コードを読み取って、前記訂正情報を取得する二次元コード読取手順と、
前記二次元コード読取手順によって取得した前記訂正情報を用いて、前記第1訂正ビット列と前記第2訂正ビット列との排他的論理和を誤りとして検出する誤り検出手順と、
前記訂正情報に含まれる前記第1訂正ビット列と前記誤り検出手順によって検出した誤りとの排他的論理和が、該訂正情報に含まれる前記第2訂正ビット列と合致するか否か判別することにより、前記二次元コードの認証を行う二次元コード認証手順と、
を実行させるためのプログラム。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201280075238.XA CN104541283B (zh) | 2012-08-17 | 2012-08-17 | 二维码验证装置、二维码生成装置以及二维码验证方法 |
US13/984,221 US9436852B2 (en) | 2012-08-17 | 2012-08-17 | Two-dimensional code authenticating device, two-dimensional code generating device, two-dimensional code authenticating method, and program |
PCT/JP2012/070938 WO2014027424A1 (ja) | 2012-08-17 | 2012-08-17 | 二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム |
JP2014530431A JP5731071B2 (ja) | 2012-08-17 | 2012-08-17 | 二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム |
EP12884348.9A EP2765531B1 (en) | 2012-08-17 | 2012-08-17 | Two-dimensional code authentication device, two-dimensional code authentication method and program |
KR1020157003517A KR101996116B1 (ko) | 2012-08-17 | 2012-08-17 | 2차원 코드 인증장치, 2차원 코드 생성장치, 2차원 코드 인증방법 및 프로그램 |
HK15108895.2A HK1208551A1 (en) | 2012-08-17 | 2015-09-11 | Two-dimensional code authentication device, two-dimensional code generation device, two-dimensional code authentication method and program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2012/070938 WO2014027424A1 (ja) | 2012-08-17 | 2012-08-17 | 二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014027424A1 true WO2014027424A1 (ja) | 2014-02-20 |
Family
ID=50685486
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/070938 WO2014027424A1 (ja) | 2012-08-17 | 2012-08-17 | 二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム |
Country Status (7)
Country | Link |
---|---|
US (1) | US9436852B2 (ja) |
EP (1) | EP2765531B1 (ja) |
JP (1) | JP5731071B2 (ja) |
KR (1) | KR101996116B1 (ja) |
CN (1) | CN104541283B (ja) |
HK (1) | HK1208551A1 (ja) |
WO (1) | WO2014027424A1 (ja) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850999A (zh) * | 2015-04-20 | 2015-08-19 | 中国农业大学 | 基于云技术与亿级加密二维码的商品真伪鉴别方法及系统 |
JP2016006945A (ja) * | 2014-05-29 | 2016-01-14 | 健一 先名 | デジタル署名型2次元コード生成装置、及びデジタル署名型2次元コード認証装置 |
JP2017010135A (ja) * | 2015-06-17 | 2017-01-12 | 株式会社スカイスコープソリューションズ | 自律動体管理装置、自律動体管理システム、自律動体管理方法、及びプログラム |
CN107851173A (zh) * | 2015-03-30 | 2018-03-27 | 泰坦公司 | 带有动态环境数据系统、方法和装置的二维条形码 |
CN109190739A (zh) * | 2018-08-16 | 2019-01-11 | 北京奇虎科技有限公司 | 一种图形编码以及该图形编码的识别方法和装置 |
CN109190738A (zh) * | 2018-08-16 | 2019-01-11 | 北京奇虎科技有限公司 | 一种图形编码的生成、识别方法及装置 |
CN109325382A (zh) * | 2018-08-16 | 2019-02-12 | 北京奇虎科技有限公司 | 一种图形编码以及该图形编码的识别方法和装置 |
CN109344938A (zh) * | 2018-08-16 | 2019-02-15 | 北京奇虎科技有限公司 | 一种图形编码以及该图形编码的识别方法和装置 |
CN109344937A (zh) * | 2018-08-16 | 2019-02-15 | 北京奇虎科技有限公司 | 一种图形编码的生成、识别方法及装置 |
WO2020202454A1 (ja) | 2019-04-01 | 2020-10-08 | 佐鳥電機株式会社 | データ復元装置、データ管理サーバ、データ管理システム、データ復元方法、及びプログラム |
US11455483B2 (en) | 2015-03-30 | 2022-09-27 | Temptime Corporation | Two dimensional barcode with dynamic environmental data system, method, and apparatus |
US11734539B2 (en) | 2021-04-05 | 2023-08-22 | Temptime Corporation | Dynamic optical property windows in indicia with sensors |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2937820B1 (en) * | 2012-12-19 | 2021-07-28 | Denso Wave Incorporated | Method of producing an information code, information code and information code reader |
WO2015067725A1 (en) * | 2013-11-07 | 2015-05-14 | Scantrust Sa | Two dimensional barcode and method of authentication of such barcode |
JP6520616B2 (ja) | 2014-10-07 | 2019-05-29 | 株式会社デンソーウェーブ | 情報コードの生成方法、情報コードを生成するプログラム、及び情報コード生成装置 |
CN104917766B (zh) * | 2015-06-10 | 2018-01-05 | 飞天诚信科技股份有限公司 | 一种二维码安全认证方法 |
CN110688644B (zh) * | 2019-10-09 | 2021-07-20 | 重庆市筑智建信息技术有限公司 | 一种bim系统通过图形码实现登陆的方法及其系统 |
EP4102399A1 (en) | 2021-06-08 | 2022-12-14 | Université de Genève | Object authentication using digital blueprints and physical fingerprints |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07254037A (ja) * | 1994-03-14 | 1995-10-03 | Nippondenso Co Ltd | 二次元コード |
JP2006318328A (ja) | 2005-05-16 | 2006-11-24 | Hitachi Omron Terminal Solutions Corp | 航空機搭乗システムにおける搭乗券のセキュリティ管理 |
JP2007042054A (ja) * | 2005-06-27 | 2007-02-15 | Systec:Kk | 再コード化一次元/二次元コード、再コード化一次元/二次元コードシステム、再コード化一次元/二次元コード符号化装置、及び再コード化一次元/二次元コード復号装置 |
JP2007287004A (ja) | 2006-04-19 | 2007-11-01 | A T Communications Co Ltd | ロゴ付き二次元コード |
JP2008015642A (ja) | 2006-07-04 | 2008-01-24 | A T Communications Co Ltd | ロゴ付き二次元コード |
JP2008299422A (ja) * | 2007-05-29 | 2008-12-11 | Denso Wave Inc | 二次元コードの生成方法およびその読取装置 |
JP2009099091A (ja) * | 2007-10-19 | 2009-05-07 | Denso Wave Inc | 光学的情報読取装置および光学的情報読取システム |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5726435A (en) | 1994-03-14 | 1998-03-10 | Nippondenso Co., Ltd. | Optically readable two-dimensional code and method and apparatus using the same |
US7831519B2 (en) * | 2003-12-17 | 2010-11-09 | First Data Corporation | Methods and systems for electromagnetic initiation of secure transactions |
CN100428273C (zh) * | 2006-07-31 | 2008-10-22 | 华为技术有限公司 | 一种解码器及射频卡 |
EP2000950B1 (en) | 2007-05-29 | 2017-03-01 | Denso Wave Incorporated | Method for producing two-dimensional code and reader for reading the two-dimensional code |
US8532299B2 (en) | 2007-05-29 | 2013-09-10 | Denso Wave Incorporated | Method for producing two-dimensional code and reader for reading the two-dimensional code |
US8162222B2 (en) * | 2008-01-25 | 2012-04-24 | Intermec Ip Corp. | System and method for identifying erasures in a 2D symbol |
-
2012
- 2012-08-17 WO PCT/JP2012/070938 patent/WO2014027424A1/ja active Application Filing
- 2012-08-17 US US13/984,221 patent/US9436852B2/en active Active
- 2012-08-17 JP JP2014530431A patent/JP5731071B2/ja active Active
- 2012-08-17 KR KR1020157003517A patent/KR101996116B1/ko active IP Right Grant
- 2012-08-17 EP EP12884348.9A patent/EP2765531B1/en active Active
- 2012-08-17 CN CN201280075238.XA patent/CN104541283B/zh active Active
-
2015
- 2015-09-11 HK HK15108895.2A patent/HK1208551A1/xx not_active IP Right Cessation
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07254037A (ja) * | 1994-03-14 | 1995-10-03 | Nippondenso Co Ltd | 二次元コード |
JP2006318328A (ja) | 2005-05-16 | 2006-11-24 | Hitachi Omron Terminal Solutions Corp | 航空機搭乗システムにおける搭乗券のセキュリティ管理 |
JP2007042054A (ja) * | 2005-06-27 | 2007-02-15 | Systec:Kk | 再コード化一次元/二次元コード、再コード化一次元/二次元コードシステム、再コード化一次元/二次元コード符号化装置、及び再コード化一次元/二次元コード復号装置 |
JP2007287004A (ja) | 2006-04-19 | 2007-11-01 | A T Communications Co Ltd | ロゴ付き二次元コード |
JP2008015642A (ja) | 2006-07-04 | 2008-01-24 | A T Communications Co Ltd | ロゴ付き二次元コード |
JP2008299422A (ja) * | 2007-05-29 | 2008-12-11 | Denso Wave Inc | 二次元コードの生成方法およびその読取装置 |
JP2009099091A (ja) * | 2007-10-19 | 2009-05-07 | Denso Wave Inc | 光学的情報読取装置および光学的情報読取システム |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016006945A (ja) * | 2014-05-29 | 2016-01-14 | 健一 先名 | デジタル署名型2次元コード生成装置、及びデジタル署名型2次元コード認証装置 |
US11182579B2 (en) | 2015-03-30 | 2021-11-23 | Temptime Corporation | Two dimensional barcode with dynamic environmental data system, method, and apparatus |
CN107851173A (zh) * | 2015-03-30 | 2018-03-27 | 泰坦公司 | 带有动态环境数据系统、方法和装置的二维条形码 |
JP2018517199A (ja) * | 2015-03-30 | 2018-06-28 | テンプタイム コーポレーション | 動的環境データシステムを有する2次元バーコード、方法および装置 |
US11455483B2 (en) | 2015-03-30 | 2022-09-27 | Temptime Corporation | Two dimensional barcode with dynamic environmental data system, method, and apparatus |
CN104850999A (zh) * | 2015-04-20 | 2015-08-19 | 中国农业大学 | 基于云技术与亿级加密二维码的商品真伪鉴别方法及系统 |
JP2017010135A (ja) * | 2015-06-17 | 2017-01-12 | 株式会社スカイスコープソリューションズ | 自律動体管理装置、自律動体管理システム、自律動体管理方法、及びプログラム |
CN109190738A (zh) * | 2018-08-16 | 2019-01-11 | 北京奇虎科技有限公司 | 一种图形编码的生成、识别方法及装置 |
CN109344938A (zh) * | 2018-08-16 | 2019-02-15 | 北京奇虎科技有限公司 | 一种图形编码以及该图形编码的识别方法和装置 |
CN109344937A (zh) * | 2018-08-16 | 2019-02-15 | 北京奇虎科技有限公司 | 一种图形编码的生成、识别方法及装置 |
CN109325382A (zh) * | 2018-08-16 | 2019-02-12 | 北京奇虎科技有限公司 | 一种图形编码以及该图形编码的识别方法和装置 |
CN109190739A (zh) * | 2018-08-16 | 2019-01-11 | 北京奇虎科技有限公司 | 一种图形编码以及该图形编码的识别方法和装置 |
WO2020202454A1 (ja) | 2019-04-01 | 2020-10-08 | 佐鳥電機株式会社 | データ復元装置、データ管理サーバ、データ管理システム、データ復元方法、及びプログラム |
US11734539B2 (en) | 2021-04-05 | 2023-08-22 | Temptime Corporation | Dynamic optical property windows in indicia with sensors |
Also Published As
Publication number | Publication date |
---|---|
EP2765531B1 (en) | 2016-05-18 |
KR101996116B1 (ko) | 2019-07-03 |
CN104541283B (zh) | 2017-04-05 |
HK1208551A1 (en) | 2016-03-04 |
US9436852B2 (en) | 2016-09-06 |
JPWO2014027424A1 (ja) | 2016-07-25 |
US20150199545A1 (en) | 2015-07-16 |
JP5731071B2 (ja) | 2015-06-10 |
EP2765531A1 (en) | 2014-08-13 |
KR20150043317A (ko) | 2015-04-22 |
EP2765531A4 (en) | 2014-08-13 |
CN104541283A (zh) | 2015-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5731071B2 (ja) | 二次元コード認証装置、二次元コード生成装置、二次元コード認証方法、及びプログラム | |
US10853610B2 (en) | Combined two-dimensional code, electronic certificate carrier, and generation and reading apparatus and method | |
JP5869733B2 (ja) | 認証サーバ、認証システム、認証方法、及びプログラム | |
US9716711B2 (en) | High-value document authentication system and method | |
US8297510B1 (en) | Mathematical method of 2D barcode authentication and protection for embedded processing | |
RU2012113335A (ru) | Способ и устройство для защиты и аутентификации документов | |
JP6020089B2 (ja) | 不正検知システム | |
Dey et al. | Confidential encrypted data hiding and retrieval using qr authentication system | |
US20220230187A1 (en) | Authentication of packaged products | |
Wang et al. | 2D barcodes for visual cryptography | |
JP2022535764A (ja) | 認定されたテキスト文書 | |
CN104320253A (zh) | 一种基于cbs签名机制的二维码认证系统及方法 | |
Wellem et al. | Academic document authentication using elliptic curve digital signature algorithm and QR code | |
Melgar et al. | An alternative proposal of tracking products using digital signatures and QR codes | |
JP6031729B1 (ja) | Rfidタグコード生成装置およびその方法、認証装置およびその方法、ならびにプログラム | |
JP2008192111A (ja) | 誤り訂正機能を持つシンボルシステムにおいて機密性向上を導入する方法、システム及び製品 | |
CN113557529A (zh) | 混合二维条码阅读器 | |
CN106650870A (zh) | 用于接入的安全二维码生成方法 | |
EA046324B1 (ru) | Сертифицированный текстовый документ | |
JP5979432B2 (ja) | 二次元コードの生成方法 | |
CN113557530A (zh) | 混合二维条形码和混合二维条形码生成器 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2012884348 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20157003517 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2014530431 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13984221 Country of ref document: US |