WO2020217262A1 - Système et procédé de génération de code qr sécurisé - Google Patents

Système et procédé de génération de code qr sécurisé Download PDF

Info

Publication number
WO2020217262A1
WO2020217262A1 PCT/IN2020/050386 IN2020050386W WO2020217262A1 WO 2020217262 A1 WO2020217262 A1 WO 2020217262A1 IN 2020050386 W IN2020050386 W IN 2020050386W WO 2020217262 A1 WO2020217262 A1 WO 2020217262A1
Authority
WO
WIPO (PCT)
Prior art keywords
code
secure
data
input data
receiving
Prior art date
Application number
PCT/IN2020/050386
Other languages
English (en)
Inventor
Pragnyat LALWANI
Sandeep Khurana
Original Assignee
Seshaasai Business Forms Pvt. Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seshaasai Business Forms Pvt. Ltd filed Critical Seshaasai Business Forms Pvt. Ltd
Publication of WO2020217262A1 publication Critical patent/WO2020217262A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device

Definitions

  • the field of invention generally relates to QR codes. More specifically, it relates to a secure QR code that requires specific reading components and cannot be read by a standard QR reading device.
  • QR codes Since the arrival of QR code reading applications for smartphones, QR codes have been adopted in innumerable commercial and non-commercial uses. In particular, QR codes have become indispensable in online transactions, virtual bills, e-commerce, identity-based applications, and the like. In such applications, the QR code is used to store information such as product details, transaction id, movie tickets, user details, account details, etc.
  • a QR code can be read by any standard QR converter or by any standard QR reading software application. Hence, the information stored in the QR code can be obtained with ease. This poses a security risk in case sensitive information or private information is stored in the QR code. In turn, this security risk can lead to a probable misuse of important documents or data, by way of correlation between data available in human readable form and encrypted data available in the QR. Thus, current readable QR codes pose a big security threat on the issue of confidentiality of important information.
  • the principle object of this invention is to disclose a secure QR code which is protected against unauthorized reading or scanning.
  • a further object of the invention is to provide a method for generation of a secure QR code which cannot be read by any standard QR reading device or software.
  • a further object of the invention is to provide a method for extraction of input data from a secure QR code which cannot be read by any standard QR reading device or software.
  • Another object of the invention is to provide a method for generation of a secure QR code which can be read or verified only by the corresponding secure code reading software.
  • Another object of the invention is to provide a system to generate a secure QR code which can be read or verified only by the corresponding secure code reading system.
  • Another object of the invention is to provide a system to extract input data from a secure QR code which can be read or verified only by the corresponding secure code reading system.
  • Yet another object of the invention is to generate a secure QR code wherein a QR code comprised is configured to be read only by custom-made hardware modules.
  • the present invention discloses a system and method for generation of a secure QR code.
  • the disclosed secure QR code comprises a plurality of security features, wherein the security features are for the protection of transaction data against unauthorized reading/scanning/access.
  • the secure QR code is configured to be read by a customized hardware module for maintaining the security of the data stored in the QR code.
  • the method for generating the secure QR code comprises encrypting an input data by using an encryption algorithm. Subsequently, the encrypted data is encoded. Thereafter, a secret XOR key is used to perform an XOR process on the encoded data.
  • a secure QR code can be generated after the XOR process such that the secure QR code cannot be read by any standard QR code reading module or software.
  • the system and method also disclose the reading and deciphering of the secure QR code.
  • the system and method for generating the secure QR code comprises performing an XOR demasking process on the secure QR code by using a secret XOR key. Subsequently, the demasked XORed data is decoded. Thereafter, the decoded data is decrypted by using a decryption algorithm to extract the stored data. Thus, the data comprised within the secure QR code can be read after the decryption process.
  • FIG. 1 depicts/illustrates a system for generation of a secure QR code.
  • FIG. 1 depicts/illustrates a system for extraction of data from a secure QR code.
  • FIG. 1 depicts/illustrates an exemplary embodiment of a system for generation of a secure QR code.
  • FIG. 1 depicts/illustrates an exemplary embodiment of a system for generation of a secure QR code.
  • FIG. 1 depicts/illustrates an exemplary embodiment of a system for extraction of data from a secure QR code by using an image capturing device.
  • FIG. 1 depicts/illustrates an exemplary embodiment of a system for extraction of data from a secure QR code by using an image capturing device embedded in the system.
  • FIG. 1 depicts/illustrates an exemplary embodiment of a system for extraction of data from a secure QR code.
  • FIG. 1 illustrates a method for generation of a secure QR code.
  • FIG. 1 illustrates a method extraction of data from a secure QR code.
  • the present invention discloses a system and method for generation of a secure QR code.
  • the disclosed secure QR code comprises a plurality of security features, wherein the security features are for the protection of transaction data against unauthorized reading/scanning/access.
  • the secure QR code is configured to be read by a customized hardware module for maintaining the security of the data stored in the QR code.
  • the method for generating the secure QR code comprises encrypting an input data by using an encryption algorithm. Subsequently, the encrypted data is encoded. Thereafter, a secret XOR key is used to perform an XOR process on the encoded data.
  • a secure QR code can be generated after the XOR process such that the secure QR code cannot be read by any standard QR code reading module or software.
  • FIG. 1 depicts/illustrates a generation system 100 for generation of a secure QR code, in accordance with an embodiment.
  • the generation system 100 receives an input data 102 and processes the data 102 by using a QR code generator 104 to generate a secure QR code 114.
  • the data 102 may comprise information related to a user including their private information as well as details of their financial information.
  • the data 102 may comprise one or more of their name, age, date of birth, account details, etc.
  • the data 102 may vary as per the application of the system 100 in various industries.
  • the secure QR code 114 may be generated by the QR code generator 104 such that the secure QR code 114 is not readable by any standard QR code converter or reading software.
  • the QR code generator 104 comprises several modules to complete the generation of the secure QR code 114.
  • the QR code generator 104 comprises an input device 106 for receiving one or more inputs to be transformed into a QR code.
  • the QR code generator 104 further comprises an encrypting module 108 for encrypting the received inputs.
  • an encoding module 110 processes the encrypted data to generate an encoded data.
  • the XOR module 112 is used to mask the encoded data by using a secret XOR key.
  • the XORed data is used to generate the secure QR code 114.
  • the XORed data can be printed in one or more fonts including a customized Sesh QR font to generate the secure QR code 114.
  • different codes can be made specific to different environments comprising the disclosed system, by using a unique key or technique to create QR code families based on requirements of the environments or the application of the disclosed system and method.
  • one or more sets of codes can be generated for different applications or users.
  • one or more hardware modules comprising the QR code generator 104 and/or the QR code converter 202 may be configured for the same code and/or a different code. Multiple schema/patterns of codes.
  • QR code generators 104 and QR code converters 202 can be created such that the codes and/or the QR code generators 104 and QR code converters 202 are not inter-operable with each other.
  • a first QR code generator 104 and a first QR code converter 202 may be present in a first environment comprising customer A, and a second QR code generator 104 and a second QR code converter 202 may be present in a second environment comprising customer B.
  • customer A has received a secure QR code 114 generated by the first QR code generator 104
  • the secure QR code 114 cannot be read by the second QR code converter 202.
  • a secure QR code 114 generated for customer B by the second QR code generator 104 cannot be read by the first QR code converter 202.
  • the disclosed system can be made unique to each environment, depending on the requirements of the environment.
  • multiple sets or groups of code can be generated for the environments comprising unique QR code generators 104 and QR code converter 202, depending on the requirements of the environment.
  • Figure 2 depicts/illustrates a reading system 200 for extraction of data from a secure QR code, in accordance with an embodiment.
  • the reading system 200 receives a secure QR code 114 and processes the secure QR code 114 by using a QR code converter 202 to extract an input data 102.
  • the secure QR code 114 may have been generated by the QR code generator 104 such that the secure QR code 114 is not readable by any standard QR code converter or reading software. Hence, the QR code converter 202 is required to decipher the data comprised within the secure QR code 114.
  • the QR code converter 202 comprises several modules to read the secure QR code 114.
  • the QR code converter 202 comprises an input device 204 for receiving the secure QR code 114.
  • the secure QR code 114 pattern is extracted from the received data.
  • the secure QR code 144 is processed to generate a secure QR pattern byte array.
  • an XOR module 206 is used to demask the secure QR code 114 by using a secret XOR key.
  • the QR code converter 202 further comprises a decoding module 208 to demask the XORed secure QR code 114 to generate a decoded data.
  • a decrypting module 210 is used for decrypting the decoded secure QR code 114 to extract the data 102.
  • the secure QR code 114 can only be generated by the QR code generator 104. Further, the secure QR code 114 can only be deciphered by the QR code converter 202. Any standard QR code generator or converter in the art cannot generate or interpret the secure QR code 114 as the data after creation or interpretation requires certain keys and processes that cannot be achieved by a standard QR code generator or reading software.
  • the cryptographic algorithm used for the encryption of the data 102 and decryption of the secure QR cod e 114 may be a symmetric key algorithm in which same cryptographic keys are used for both encryption of data 102 and decryption of secure QR code 114.
  • one or more different demasking processes can be used on the secure QR code 114.
  • the demasking process corresponds to the masking process used in the generation of the secure QR code 114.
  • different masking-demasking processes can be made specific to different environment by using a unique key or technique to create varieties of QR code families based on one or more requirements of the environment.
  • FIG 3A depicts/illustrates an exemplary embodiment of a generation system 300 for generation of a secure QR code 114, in accordance with an embodiment.
  • information on a document 302 needs to be converted into a secure QR code 114 such that it cannot be read by standard QR code converters.
  • the generation system 300 comprises the QR code generator 104 which can receive inputs and conv99ert them into secure QR codes 114, as explained above.
  • the QR code generator 104 may capture an image of the document 302 by using an image capturing device 304.
  • the image capturing device 304 may comprise a camera, as is commonly used in the art.
  • Figure 3B depicts/ illustrates an exemplary embodiment of a system 310 for generation of a secure QR code 114.
  • the QR code generator 104 may receive a virtual input data 102 through one or more communication modules (not shown in figure).
  • the QR code generator 104 directly converts the received data 102 into the secure QR code 114 by using the modules explained in the QR code generator 104 depicted in figure 1.
  • the QR code generator 104 may display one or more data to be converted into a secure QR code 114, which may be further chosen or confirmed via an input from a user of the QR code generator 104.
  • the QR code generator 104 may be comprised in a single hardware device.
  • the encryption module 108 may be part of one hardware device while another hardware device comprises the encoding module 110 and the XOR module 112. In this case, the encryption module 108 may communicate with the other hardware device to complete the generation of the secure QR code 114.
  • the secure QR code generator 104 can be used in a variety of applications.
  • the inputs to the QR code generator 104 can be digital inputs or physical inputs, and the outputs of the QR code generator 104 can be digital outputs or physical outputs.
  • the physical inputs may be documents or displays comprising the input data 102, and the physical outputs may be printed outputs, when used in combination with a printing device that is part of the same system or an external device.
  • the secure QR code 114 can be generated digitally for digital applications, wherein the input data 102 is a digital data, and the secure QR code is generated in the form of a digital output.
  • the virtual application can be a mobile application such as a banking application or an e-commerce application, among others.
  • the secure QR code 114 can be generated and printed on confidential documents that require strong security measures, wherein the input data 102 is a physical printed input or a digital input, and the secure QR code can be generated in the form of a digital confirmation that can be shared virtually with the customer or printed on a confidential document to be shared with the customer.
  • the physical printed input can be a confidential document, and the secure QR code 114 can be printed on the same.
  • the secure QR code 114 can be generated during a transaction of a customer in a commercial establishment, wherein the input data 102 is a physical printed input, and the secure QR code 114 can be generated in the form of a digital transaction confirmation that can be shared virtually with the customer or printed on a bill to be shared with the customer.
  • a secure QR code 114 needs to be deciphered in order to extract data 102 comprised in the secure QR code 114. Since the secure QR code 114 cannot be read by standard QR code converters, the disclosed system comprises a QR code converter 202 which can receive secure QR codes 114 and extract the data encrypted in the secure QR codes 114.
  • Figures 4A-4C depict various exemplary embodiments of the QR code converter 202, according to different embodiments arising from various applications or environments wherein the disclosed system may be used.
  • FIG. 4A depicts/illustrates an exemplary embodiment of a reading system 400 for extraction of data from a secure QR code 114 printed on a document 402 by using an image capturing device 404, in accordance with an embodiment.
  • the image capturing device 404 and the QR code converter 202 may be located in different hardware modules.
  • the image capturing device 404 captures an image of the secure QR code 114 present on the document 402, and subsequently shares the image of the secure QR code 114 with the QR code converter 202.
  • the image capturing device 404 may comprise a camera 406, as is commonly used in the art.
  • the image capturing device 404 may be a smartphone, a webcam, a laptop, or a camera, among other devices which comprise a camera.
  • the document 402 may be a paper, a certificate, a book, a brochure, a screen, or a digital display, among others.
  • Figure 4B depicts/illustrates an exemplary embodiment of a system 410 for extraction of data from a secure QR code 114 by using an image capturing device 412 embedded in the secure QR code converter 202.
  • the image capturing device 412 and the QR code converter 202 may be comprised in a single hardware device.
  • the image capturing device 412 captures an image of the secure QR code 114 present on the document 402.
  • Figure 4C depicts/illustrates an exemplary embodiment of a system 414 for extraction of data from a secure QR code 114.
  • the QR code converter 202 may receive a virtual input data comprising the secure QR code 114 through one or more communication modules present in the QR code converter 202 (not shown in figure).
  • the QR code converter 202 may receive the virtual input data from a third-party device or an external source.
  • the QR code converter 202 extracts the data 102 from the received secure QR code 114 by using the modules explained in the QR code converter 202 of figure 2.
  • one or more modules of the QR code generator 104 and/or QR code converter 202 may be located, embedded, or coded within one or more devices such as a computer, a laptop, an embedded chip, a Printed Circuit Board, a mobile application, a hand-held device, a wearable device, and a dongle, among others.
  • the QR code generator 104 and/or QR code converter 202 can be implemented in the form of the devices mentioned above.
  • the QR code converter 202 may display the secure QR code 114, which may be further chosen or confirmed via an input from a user of the QR code converter 202.
  • the QR code generator 104 and the QR code converter 202 may be comprised in a single device.
  • the QR code generator 104 and the QR code converter 202 may be comprised in two separate devices.
  • the two separate devices may be present at the same location to achieve both generation and reading of the secure QR code 114.
  • the two separate devices may be present at two different locations such that the QR code generation occurs in one location and the QR code reading occurs in another location for improved security, as per the requirements of the particular application of the disclosed systems.
  • an image of a document comprising the secure QR code 114 is captured and the image of the secure QR code 114 is directly shared with the QR code converter 202, which may be located in a hardware module. Subsequently, the QR code converter 202 deciphers the secure QR code 114 to extract the data 102.
  • FIG. 5 illustrates a method 500 for generation of a secure QR code, in accordance with an embodiment.
  • input data which is to be converted into a secure QR code is received from a user.
  • the received data is encrypted by using an encryption algorithm.
  • the encryption algorithm may be a symmetric key algorithm in a preferred embodiment, as depicted at step 504.
  • the encrypted data is encoded such that its size is reduced and it can comply with any software or hardware module, as depicted at step 506.
  • the data is processed with a secret XOR key such that the secure QR code becomes unreadable, as depicted at step 508.
  • the secure QR code is printed, as depicted at step 510.
  • Figure 6 illustrates a method for extraction of data from a secure QR code.
  • a secure QR code which is to be interpreted into readable data is captured, collected or received.
  • the method 600 extracts one or more byte arrays from the system received secure QR code pattern.
  • the arrays are processed with a secret XOR key to demask the arrays such that the secure QR code becomes readable, as depicted at step 604.
  • the data is decoded, as depicted at step 606.
  • the collected data is decrypted by using a decryption algorithm and decryption key, as depicted at step 608.
  • the readable data is extracted from the decrypted data, as depicted at step 610.
  • the data 102 comprises information related to an account number of a customer, passbook details, customer ID, customer name and the like.
  • the advantages of the current invention include the prevention of any unauthorized access to the private or confidential data of a user. Therefore, the disclosed system and method prevents duplication and/or misuse of the confidential data. Since the secure QR codes can only be read by a customized hardware module, the system prevents unauthorized access to the confidential data by using generic QR code converters.
  • the implementation of the disclosed secure QR code system and method in a financial industry such as the banking industry can set a new standard in data security. The usage of the secure QR code can result in reduced data protection and corresponding data security costs, as well as a minimization of data security compliance costs, which will further benefit the banking industry and customers.
  • Applications of the current invention include banking, secure documents and certificates, implementation of the disclosed security features in confidential publications and for transmission/exchange of data through secure QR codes between authorized parties. Further, the current application can also be used in various other industries that use a secure QR code, such as pharmaceuticals, manufacturing industries, retail, e-commerce, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Electromagnetism (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un système et un procédé de génération d'un code QR sécurisé (114). Le code QR sécurisé (114) décrit protège des données confidentielles contre une lecture non autorisée. Le code QR sécurisé (114) est configuré pour être généré par un générateur de code QR personnalisé (104) et est lu par un convertisseur de code QR personnalisé (202) pour assurer la sécurité des données stockées dans le code QR. Le procédé de génération du code QR sécurisé (114) comprend le chiffrement d'une donnée d'entrée (102) à l'aide d'un algorithme de chiffrement. Ensuite, les données chiffrées sont codées, et une clé XOR secrète est utilisée pour effectuer un traitement de masquage XOR sur les données codées. Un code QR sécurisé (114) peut être imprimé après le processus XOR de telle sorte que le code QR sécurisé ne peut pas être lu par n'importe quel module ou logiciel de lecture de code QR standard.
PCT/IN2020/050386 2019-04-25 2020-04-27 Système et procédé de génération de code qr sécurisé WO2020217262A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201921016544 2019-04-25
IN201921016544 2019-04-25

Publications (1)

Publication Number Publication Date
WO2020217262A1 true WO2020217262A1 (fr) 2020-10-29

Family

ID=72941577

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2020/050386 WO2020217262A1 (fr) 2019-04-25 2020-04-27 Système et procédé de génération de code qr sécurisé

Country Status (1)

Country Link
WO (1) WO2020217262A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140105402A1 (en) * 2010-12-06 2014-04-17 Gelareh TABAN Data protection using key translation
US20140299669A1 (en) * 2011-08-16 2014-10-09 Mobilead Optical-reading code preparation device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140105402A1 (en) * 2010-12-06 2014-04-17 Gelareh TABAN Data protection using key translation
US20140299669A1 (en) * 2011-08-16 2014-10-09 Mobilead Optical-reading code preparation device

Similar Documents

Publication Publication Date Title
CN101295343B (zh) 二维码多重加密防伪印刷方法
CN107077670B (zh) 传输和处理交易消息的方法和装置、计算机可读存储介质
CN101377837A (zh) 电子支票二维码凭证的生成及验证方法
CN104322003B (zh) 借助实时加密进行的密码认证和识别方法
CN103198344A (zh) 税控安全二维码编码、解码处理方法
JP6489464B2 (ja) 光学コード、情報伝達方法、及び認証方法
CN104992119B (zh) 一种敏感信息防窃取的安全传输方法及系统
CN104463016B (zh) 一种适用于ic卡及二维码的数据安全存储方法
US20140245019A1 (en) Apparatus for generating privacy-protecting document authentication information and method of performing privacy-protecting document authentication using the same
US9065635B2 (en) Information processing apparatus, IC chip, and information processing method
EP2910042B1 (fr) Transfert d'informations sécurisé par l'intermédiaire de codes à barres
US10552618B2 (en) Method and apparatus for transmission of visually encoded data
TW201419208A (zh) 基於視覺密碼學的圖像傳遞系統及相關的電腦程式產品
KR20100031354A (ko) Otp를 이용한 태그 보안 처리 방법
CN105577361A (zh) 一种信息处理方法及其装置
WO2020217262A1 (fr) Système et procédé de génération de code qr sécurisé
CN107682156A (zh) 一种基于sm9算法的加密通信方法及装置
Swain et al. A quick review of network security and steganography
CN107689867B (zh) 一种在开放环境下的密钥保护方法和系统
Simkin et al. Ubic: Bridging the gap between digital cryptography and the physical world
CN113347003A (zh) 一种输入式动态密码器装置及方法
KR20210045823A (ko) 문서 정보 보안 장치 및 방법
WO2019116396A1 (fr) Système et procédé de génération et de lecture d'un code qr associé
CN1889420B (zh) 一种实现加密的方法
CN214376474U (zh) 一种具备可信数字身份核验能力的桌面扫码盒

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20794200

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20794200

Country of ref document: EP

Kind code of ref document: A1