[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114139169A - Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices - Google Patents

Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices Download PDF

Info

Publication number
CN114139169A
CN114139169A CN202010920203.8A CN202010920203A CN114139169A CN 114139169 A CN114139169 A CN 114139169A CN 202010920203 A CN202010920203 A CN 202010920203A CN 114139169 A CN114139169 A CN 114139169A
Authority
CN
China
Prior art keywords
code
configuration
electronic device
dimensional code
electronic devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010920203.8A
Other languages
Chinese (zh)
Inventor
曹轩玮
李俊颉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitac Computer Kunshan Co Ltd
Getac Technology Corp
Original Assignee
Mitac Computer Kunshan Co Ltd
Getac Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitac Computer Kunshan Co Ltd, Getac Technology Corp filed Critical Mitac Computer Kunshan Co Ltd
Priority to CN202010920203.8A priority Critical patent/CN114139169A/en
Publication of CN114139169A publication Critical patent/CN114139169A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a two-dimension code encryption and decryption method and a method for sharing configuration information by a plurality of electronic devices, wherein the two-dimension code encryption method is executed in the electronic devices and comprises the following steps: firstly, a configuration file collector obtains a configuration list of the electronic device, and a configuration file generator converts the configuration list into an original instruction according to a configuration definition; then, the original instruction is coded into a coding instruction through a coding engine according to the key and the certificate, and the coding instruction is coded into at least one QR code through a QR code coder; the configuration definition is used to describe the format and/or parsing rule adopted by the original command, and the configuration definition, the key and the certificate are shared with other electronic devices belonging to the same group as the electronic device, so that the generated QR code can be used for targeted information transfer. Therefore, the QR code of the invention can realize targeted information transmission.

Description

Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices
[ technical field ] A method for producing a semiconductor device
The invention relates to the field of two-dimensional codes, in particular to a two-dimensional code encryption and decryption method and a method for sharing configuration information by a plurality of electronic devices.
[ background of the invention ]
Two-dimensional codes are widely used for information transmission, for example, a mobile phone with a camera can read implicit information by scanning the two-dimensional codes only after a two-dimensional code reader is built in or downloaded. However, in order to improve the readability, the hidden information of the two-dimensional code is not encrypted, so that the two-dimensional code cannot be used for targeted information transfer, for example, when the configuration information of an electronic device only needs to be shared by a plurality of electronic devices in the same group, the two-dimensional code cannot be scanned and accessed by anyone.
[ summary of the invention ]
In order to solve the above technical problem, a first embodiment of the present invention provides a two-dimensional code encryption method, executed in an electronic device, including the steps of: firstly, a configuration file collector obtains a configuration list of the electronic device, and a configuration file generator converts the configuration list into an original instruction according to a configuration definition; then, the original instruction is encoded into an encoding instruction through the encoding engine according to the key and the certificate, and the encoding instruction is encoded into at least one QR code through the QR code encoder.
A second embodiment of the present invention provides a two-dimensional code decryption method, executed in an electronic device, including the steps of: firstly, obtaining at least one QR code through an image acquisition device, and decoding the at least one QR code into a coding instruction through a QR code decoder; then, the decoding engine decodes the encoded command into an original command according to the key and the certificate, and the configuration file parser restores the original command into a configuration list according to the configuration definition.
A third embodiment of the present invention provides a method for sharing configuration information among a plurality of electronic devices, including the steps of: firstly, a first electronic device in the electronic devices obtains a configuration list of the first electronic device through a configuration file collector, and converts the configuration list into an original instruction according to a configuration definition through a configuration file generator; then, the first electronic device encodes the original command into an encoded command according to the key and the certificate through the encoding engine, encodes the encoded command into at least one QR code through the QR code encoder, and then issues the at least one QR code to a second electronic device of the electronic devices.
For a better understanding of the features and technical content of the present invention, reference should be made to the following detailed description and accompanying drawings, which are provided for purposes of illustration and description only and are not intended to limit the invention.
[ description of the drawings ]
Fig. 1 is a flowchart illustrating steps of a two-dimensional code encryption method according to a first embodiment of the present invention.
Fig. 2 is a flowchart illustrating steps of a two-dimensional code decryption method according to a second embodiment of the present invention.
Fig. 3 is a diagram illustrating a plurality of electronic devices sharing configuration information according to a third embodiment of the invention.
[ detailed description ] embodiments
The following is a description of embodiments of the present invention with reference to specific embodiments, and those skilled in the art will understand the advantages and effects of the present invention from the contents provided in the present specification. The invention is capable of other and different embodiments and its several details are capable of modification and various other changes, which can be made in various details within the specification and without departing from the spirit and scope of the invention. The drawings of the present invention are for illustrative purposes only and are not intended to be drawn to scale. The following embodiments will further explain the related art of the present invention in detail, but the contents are not provided to limit the scope of the present invention.
Referring to fig. 1 and fig. 3, fig. 1 is a flowchart illustrating a two-dimensional code encryption method according to a first embodiment of the invention, and fig. 3 is a schematic diagram illustrating a plurality of electronic devices sharing configuration information according to a third embodiment of the invention. It should be noted that the two-dimensional code encryption method of fig. 1 can be executed in the electronic device 10 of fig. 3, and for convenience of understanding, the electronic device 10 of fig. 3 uses functional blocks to show the flow of executing the two-dimensional code encryption method of fig. 1. As shown in fig. 3, the electronic device 10 may be a portable computer, but the invention is not limited thereto, and it includes a profile collector 102, a profile generator 103, an encoding engine 104 and a QR code encoder 105.
The configuration profile collector 102, the configuration profile generator 103, the encoding engine 104 and the QR code encoder 105 may be implemented by pure hardware circuits or by hardware circuits with firmware or software. In summary, the present invention is not limited to the specific implementation of the electronic device 10, and the electronic device 10 can start to execute the two-dimensional code encryption method of fig. 1 in response to a User Interface (UI) 101, but the present invention is not limited to the specific implementation of the User Interface 101. In addition, as shown in fig. 1, in step S110, the electronic device 10 obtains the configuration list of the electronic device 10 through the configuration file collector 102, and in step S120, the configuration list is converted into the original command according to the configuration definition 30 through the configuration file generator 103.
For example, the configuration list may be parameter configuration information of the camera, including configuration information of what aperture, shutter speed, sensitivity, white balance, and the like are. Therefore, when the parameter configuration information of the camera needs to be shared, the electronic device 10 can obtain the parameter configuration information of the camera through the profile collector 102. Specifically, the profile collector 102 can obtain the current parameter configuration information of the camera, i.e. the configuration list of the electronic device 10, through an Application Programming Interface (API) or by reading the profile.
The configuration definition 30 is used to describe the format and/or parsing rules that the original instruction takes, e.g., the original instruction may be written in XML, JSON, or other special format. In summary, the content of the configuration definition 30, i.e. the format and/or parsing rule adopted by the original command, is determined by the user of the electronic device 10, and the configuration definition 30 is shared with other electronic devices belonging to the same group as the electronic device 10, so that the other electronic devices in different groups cannot restore the original command to the configuration list of the electronic device 10 or restore the original command to a meaningless content because they do not enjoy the configuration definition 30.
In one embodiment, the content of the configuration definition 30 can be determined according to the content agreed among users belonging to the same group. In one embodiment, the contents of the configuration definition 30 can be obtained based on a common database accessible only to the same group. In one embodiment, the content of the configuration definition 30 can be delivered to the recipients by the publishers in the users in a manner that only the same group can access. In one embodiment, the publisher can design or determine different configuration definitions 30 for different groups so that different groups each share the group-specific configuration definition 30. In one embodiment, the publisher may be a particular user that does not belong to each group; or may be a single or multiple users belonging to a particular group. In one embodiment, each group can own a respective single or multiple publishers for sharing of the configuration definition 30.
Next, in step S130, the electronic device 10 encodes the original command into an encoded command according to the key and the certificate 40 through the encoding engine 104, and encodes the encoded command into at least one QR code through the QR code encoder 105 in step S140. Similarly, the key and certificate 40 will also be shared with other electronic devices belonging to the same group as the electronic device 10, so that other electronic devices in different groups will not be able to decode the encoding instruction back to the original instruction or decode meaningless content because they do not share the key and certificate 40. In one embodiment, the sharing of the key and credential 40 can be shared to users and other electronic devices belonging to the same group in the same manner as the sharing of the configuration definition 30.
As shown in fig. 3, the configuration definition 30, the key and the certificate 40 are shared with the electronic device 20 belonging to the same group as the electronic device 10, so that the electronic device 20 can decrypt the QR code issued by the electronic device 10 according to the configuration definition 30, the key and the certificate 40. Therefore, compared with the prior art, the QR code generated by the embodiment of the invention can be used for targeted information transmission. It should be noted that the electronic devices 10 and 20 may be categorized into the same group by installing the same camera application software, but the invention is not limited thereto.
In addition, the present invention does not limit the specific implementation of the electronic device 10 issuing the QR code. The present invention also does not limit the specific implementation of the configuration definition 30, the key and the certificate 40 shared with the electronic device 20. In one implementation, the configuration definition 30, the key and the certificate 40 adopted by the electronic device 10 can be issued to the electronic devices 20 in the same group through another QR code. In other words, the information implied by the QR code is the configuration definition 30, the key and the certificate 40, so the electronic device 20 can first obtain the configuration definition 30, the key and the certificate 40 shared with the electronic device 10 by scanning the QR code, but the invention is not limited thereto.
Generally, the QR code only supports plain text encoding, but some parameter configuration information is implemented by binary code, so the encoding engine 104 of fig. 3 may further include a converter (not shown) for converting the binary code into plain text format. In addition, compared to the prior art, when the length of the encoding command exceeds the length of the string supported by one QR code, the QR code encoder 105 of fig. 3 encodes a plurality of QR codes, but the schematic diagram of fig. 3 is only an example in which the QR code encoder 105 encodes one QR code for easy understanding.
In contrast, referring to fig. 2 and fig. 3, fig. 2 is a flowchart illustrating a two-dimensional code decryption method according to a second embodiment of the present invention. That is to say, the two-dimensional code decryption method of fig. 2 can be executed in the electronic device 20 of fig. 3, and for convenience of understanding, the electronic device 20 of fig. 3 uses functional blocks to represent a flow of executing the two-dimensional code decryption method of fig. 2. As shown in fig. 3, the electronic device 20 may also be a portable computer, but the invention is not limited thereto, and it includes an image capturing device 202, a QR code decoder 203, a decoding engine 204, and a profile parser 205.
The image capturing device 202, the QR code decoder 203, the decoding engine 204, and the profile parser 205 may be implemented by hardware circuits, or implemented by hardware circuits with firmware or software. In summary, the present invention is not limited to the specific implementation of the electronic device 20, and the electronic device 20 may start to execute the two-dimensional code decryption method of fig. 2 in response to the user interface 201, but the present invention is not limited to the specific implementation of the user interface 201. As shown in fig. 2, in step S210, the electronic device 20 obtains at least one QR code through the image capturing device 202, and in step S220, decodes the at least one QR code into the encoding command through the QR code decoder 203.
Next, in step S230, the electronic device 20 decodes the encoded command into the original command according to the key and the certificate 40 through the decoding engine 204, and restores the original command into the configuration list according to the configuration definition 30 through the configuration file parser 205 in step S240. In addition, compared to the configuration file collector 102 of the electronic device 10, the electronic device 20 further includes a configuration file dispatcher 206 for deploying the configuration list restored by the original instruction, i.e. the configuration list of the electronic device 10, through an API or other means.
Similarly, the decoding engine 204 of fig. 3 may further include a converter (not shown) for converting the plain text format into a binary code, and the image capturing device 202 may obtain more than one QR code when the length of the encoded command exceeds the length of a string supported by the QR code. Since the details are the same as those of the two-dimensional code encryption method, further description is omitted here.
In summary, embodiments of the present invention provide a two-dimensional code encryption method, a two-dimensional code decryption method, and a method for sharing configuration information among a plurality of electronic devices. The two-dimensional code encryption method may be that after the configuration information of the first electronic device is obtained, the configuration information is converted according to the configuration definition, then the converted configuration information is encrypted according to the key and the certificate, and then the encrypted information is encoded into at least one QR code. The configuration definition is used for describing a format and/or a parsing rule adopted by the converted configuration information, and the configuration definition, the key and the certificate are shared with a second electronic device belonging to the same group as the first electronic device, so that other electronic devices in different groups cannot decrypt at least one QR code issued by the first electronic device back to the configuration information of the first electronic device or decrypt and restore meaningless content because the other electronic devices do not share the configuration definition, the key and the certificate. Therefore, compared with the prior art, the QR code generated by the embodiment of the invention can be used for targeted information transfer.
The invention can carry out mass arrangement without network connection, can automatically pick up the set content from the system, and can arrange to other electronic devices by setting one electronic device. Moreover, the QR code generated by the invention is specially coded, and the QR code cannot be decoded or meaningless contents are decoded even if other people in an unspecific group scan the QR code. In addition, the invention can be quickly applied to various situations through modular design, and the deployment is finished in a simple, convenient and quick way under the condition that a large amount of same configuration lists need to be deployed among the electronic devices.
The above-mentioned embodiments are only preferred embodiments of the present invention, and not intended to limit the scope of the claims of the present invention, so that all equivalent technical changes made by using the contents of the specification and the drawings are included in the scope of the claims of the present invention.

Claims (20)

1. A two-dimension code encryption method is executed in an electronic device, and is characterized by comprising the following steps:
obtaining a configuration list of the electronic device through a configuration file collector, and converting the configuration list into an original instruction according to a configuration definition through a configuration file generator;
the original instruction is encoded into an encoding instruction by an encoding engine according to the key and the certificate, and the encoding instruction is encoded into at least one QR code by a QR code encoder.
2. The two-dimensional code encryption method of claim 1, wherein the electronic device is responsive to a user interface to initiate execution of the two-dimensional code encryption method.
3. The two-dimensional code encryption method as claimed in claim 1, wherein the configuration file collector can obtain the configuration list of the electronic device by using an application program interface or by reading a configuration file.
4. The two-dimensional code encryption method of claim 1, wherein the configuration definition is used to describe a format and/or parsing rule adopted by the original instruction.
5. The two-dimensional code encryption method according to claim 4, wherein the format and/or the parsing rule adopted by the original command is determined by a user of the electronic device, and the configuration definition is shared with other electronic devices belonging to the same group as the electronic device.
6. The two-dimensional code encryption method according to claim 5, wherein the key and the certificate are also shared with the other electronic devices belonging to the same group as the electronic device.
7. The two-dimensional code encryption method as claimed in claim 1, wherein the coding engine further comprises a converter for converting binary code into plain text format.
8. The two-dimensional code encryption method according to claim 1, wherein the at least one QR code encoded by the QR code encoder is a plurality of QR codes when the length of the encoded command exceeds the length of a string supported by a QR code.
9. A two-dimensional code decryption method is executed in an electronic device, and is characterized by comprising the following steps:
obtaining at least one QR code through an image acquisition device, and decoding the at least one QR code into a coding instruction through a QR code decoder;
the encoding instruction is decoded into an original instruction by a decoding engine according to the key and the certificate, and the original instruction is restored into a configuration list by a configuration file parser according to a configuration definition.
10. The two-dimensional code decryption method of claim 9, wherein the electronic device is responsive to a user interface to initiate execution of the two-dimensional code decryption method.
11. The method for decrypting two-dimensional code according to claim 9, wherein the configuration definition is used to describe a format and/or parsing rule adopted by the original command, and the configuration definition is shared among other electronic devices belonging to the same group as the electronic device.
12. The two-dimensional code decryption method of claim 9, wherein the decoding engine further comprises a converter for converting the plain text format into binary code.
13. The method for decrypting two-dimensional code according to claim 9, wherein the at least one QR code obtained by the image capturing device is a plurality of QR codes when the length of the coded command exceeds the length of a string supported by one QR code.
14. A method for sharing configuration information among a plurality of electronic devices, the method comprising:
a first electronic device of the electronic devices obtains a configuration list of the first electronic device through a configuration file collector, and converts the configuration list into an original instruction according to a configuration definition through a configuration file generator;
the first electronic device encodes the original command into an encoded command through an encoding engine according to the key and the certificate, encodes the encoded command into at least one QR code through a QR code encoder, and then issues the at least one QR code to a second electronic device of the electronic devices.
15. The method of claim 14, wherein the method further comprises:
the second electronic device obtains the at least one QR code through an image acquisition device and decodes the at least one QR code into the coding instruction through a QR code decoder;
the second electronic device decodes the encoded command into the original command according to the key and the certificate through a decoding engine, restores the original command into the configuration list according to the configuration definition through a configuration file parser, and deploys the configuration list through a configuration file dispatcher.
16. The method of claim 15, wherein the configuration definition is used to describe a format and/or parsing rule adopted by the original command.
17. The method as claimed in claim 15, wherein the format and/or the parsing rule adopted by the original command is determined by a user of the first electronic device, and the configuration definition is shared among the electronic devices.
18. The method as claimed in claim 17, wherein the key and the certificate are shared among the electronic devices.
19. The method as claimed in claim 15, wherein the encoding engine and the decoding engine have a converter built therein for converting binary codes into plain text format or converting plain text format into binary codes.
20. The method as claimed in claim 15, wherein when the length of the encoded command exceeds a string length supported by a QR code, the at least one QR code encoded by the QR code encoder is a plurality of QR codes, and the image capturing device obtains the QR codes.
CN202010920203.8A 2020-09-04 2020-09-04 Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices Pending CN114139169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010920203.8A CN114139169A (en) 2020-09-04 2020-09-04 Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010920203.8A CN114139169A (en) 2020-09-04 2020-09-04 Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices

Publications (1)

Publication Number Publication Date
CN114139169A true CN114139169A (en) 2022-03-04

Family

ID=80438685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010920203.8A Pending CN114139169A (en) 2020-09-04 2020-09-04 Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices

Country Status (1)

Country Link
CN (1) CN114139169A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11842033B1 (en) 2022-08-29 2023-12-12 Getac Technology Corporation Method for sharing console variable setting of application and system with plurality of electronic devices

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835457A (en) * 2005-03-16 2006-09-20 索尼株式会社 Communication system, communication apparatus and method, recording medium, and program
CN104202745A (en) * 2014-09-16 2014-12-10 腾讯科技(深圳)有限公司 Wireless network configuration information sharing method, terminal and communication system
CN107087009A (en) * 2017-06-15 2017-08-22 深圳市海曼科技有限公司 A kind of realization method and system of collaborative share
CN108199932A (en) * 2017-12-26 2018-06-22 美的集团股份有限公司 Control method, server and the computer readable storage medium of home appliance
CN110650070A (en) * 2018-06-26 2020-01-03 九阳股份有限公司 Household appliance network configuration method and WiFi module
CN110691397A (en) * 2018-07-05 2020-01-14 腾讯科技(深圳)有限公司 WIFI sharing method, WIFI connection device and computer-readable storage medium
CN111130765A (en) * 2019-11-25 2020-05-08 广东科徕尼智能科技有限公司 Two-dimensional code sharing method and device for intelligent device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835457A (en) * 2005-03-16 2006-09-20 索尼株式会社 Communication system, communication apparatus and method, recording medium, and program
CN104202745A (en) * 2014-09-16 2014-12-10 腾讯科技(深圳)有限公司 Wireless network configuration information sharing method, terminal and communication system
CN107087009A (en) * 2017-06-15 2017-08-22 深圳市海曼科技有限公司 A kind of realization method and system of collaborative share
CN108199932A (en) * 2017-12-26 2018-06-22 美的集团股份有限公司 Control method, server and the computer readable storage medium of home appliance
CN110650070A (en) * 2018-06-26 2020-01-03 九阳股份有限公司 Household appliance network configuration method and WiFi module
CN110691397A (en) * 2018-07-05 2020-01-14 腾讯科技(深圳)有限公司 WIFI sharing method, WIFI connection device and computer-readable storage medium
CN111130765A (en) * 2019-11-25 2020-05-08 广东科徕尼智能科技有限公司 Two-dimensional code sharing method and device for intelligent device and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11842033B1 (en) 2022-08-29 2023-12-12 Getac Technology Corporation Method for sharing console variable setting of application and system with plurality of electronic devices
EP4332760A1 (en) * 2022-08-29 2024-03-06 Getac Technology Corporation Method for sharing console variable setting of application and system with plurality of electronic devices
US12086390B2 (en) 2022-08-29 2024-09-10 Getac Technology Corporation Method for sharing a console variable setting of an application and the electronic device and system

Similar Documents

Publication Publication Date Title
CN102724668A (en) Method and system for sharing WIFI (wireless fidelity) network information on basis of two-dimensional code graphs
CN102056099B (en) By using hand-written data to reproduce the apparatus and method of hand-written message
CN1929383B (en) Image processing method, image processing apparatus
CN103218740A (en) Trading system, method and device using two-dimension codes
CN102045440B (en) Apparatus and method for transmitting handwritten message including time information
CN106027608B (en) A kind of picture upload method, client and server
CN111191255A (en) Information encryption processing method, server, terminal, device and storage medium
CN114139169A (en) Two-dimensional code encryption and decryption method and method for sharing configuration information by multiple electronic devices
JPH11331618A (en) Image processing unit, image data distribution device, image data distribution system, image data distribution method and storage medium
CN111242259B (en) Intelligent anti-counterfeiting code encoding and decoding method and system
CN116341582A (en) Electronic traffic data management method and system based on two-dimension code
US8290287B2 (en) Method for displaying encoded image data
Omerasevic et al. An implementation of secure key exchange by using QR codes
JP2009252153A5 (en)
CN106649437A (en) Bar code scanning method and system
CN108734149B (en) Text data scanning method and device
CN105279728B (en) Pretreated intelligent mobile terminal image latent writing method is encrypted based on secret information
CN110197245B (en) Double-code two-dimensional code and cross-platform interaction method thereof
CN112363791A (en) Screen recording method and device, storage medium and terminal equipment
CN101453538A (en) Switching system for electronic document fax
Duda et al. Image-like 2d barcodes using generalizations of the Kuznetsov–Tsybakov problem
CN107798373B (en) Two-dimensional code anti-copying method and system
KR20080025969A (en) Apparatus and method for transmission and reception of binary data inshort message system
CN111178010B (en) Method and system for displaying digital signature, data editing method and terminal
Zhao et al. A QR code secret hiding scheme against contrast analysis attack for the internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination