Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

QR code-based user secret information hiding method

A secret information, QR code technology, applied in the field of information security, can solve the problems of no QR code providing security protection, no distinction between user privacy information, user privacy information leakage, etc., to reduce computational complexity, low computational overhead, and protect users Privacy Effects

Active Publication Date: 2019-11-29
XIAN UNIV OF POSTS & TELECOMM
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the content of QR code is completely transparent, it is only used as a coding method. Therefore, research in the industry mostly regards it as a data carrier, and does not provide security protection on the coding mechanism of QR code.
In the application of QR code, it is mostly used to store the back-end database link to facilitate people's access, but the direct exposure of the network link of the back-end database is likely to cause potential risks such as unnecessary privacy information leakage of users, which may attract the attention of intruders
However, as a data carrier, QR code does not distinguish between user privacy information and general information. Today, when QR codes are widely used, information security issues such as QR code information privacy and security are important issues we face.
[0004] To sum up, the problems existing in the existing technology are: the QR code is completely transparent without any security mechanism protection, and the direct exposure of the network link of the back-end database has caused potential risks, which may attract the attention of intruders
And since QR code scanners are mainly low-power mobile devices, the computational complexity of the scheme should not be high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • QR code-based user secret information hiding method
  • QR code-based user secret information hiding method
  • QR code-based user secret information hiding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] Aiming at the problems existing in the prior art, the present invention provides a method for hiding user secret information based on a QR code and an information data processing terminal. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0031] Such as figure 1 As shown, the QR code-based user secret information hiding method provided by the embodiment of the present invention includes the following steps:

[0032] S101: Generating a position sequence, the user uses a key and a pseudo-random number generator to generate a position sequence for information hidin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information safety, and discloses a QR code-based user secret information hiding method. The method comprises the following steps that: firstly, generating a position sequence, and generating the position sequence for information hiding by a user by using a secret key and a pseudo random number generator; and then encoding the secret information needing to be hidden by the user and then hiding the secret information into the encoding process of the QR code by using the position sequence. The hidden QR code can be normally scanned to read the cover information, so that the attention of an attacker is not easily attracted. Finally, the user can recover the secret information in the hidden QR code by using the secret key. According to the method, the privacy information of the user is hidden by utilizing the QR code, the pseudo random number generator and the information hiding property, and only the user with the secret key can read the hidden information. The hiding and recovering algorithm is low in calculation complexity, can be used on low-power equipment, and is wide in application scene.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for hiding user secret information based on a QR code. Background technique [0002] Currently, the closest existing technology: a QR code is a two-dimensional code or matrix barcode that stores data information and is designed to be read by a smartphone. QR stands for Quick Response, which means that the code content should be quickly decoded at a very fast speed. The QR code consists of black modules arranged in a square pattern on a white background. The encoded information can be text, URL or other data. QR codes are designed to allow their content to be decoded at high speed. Therefore, its large capacity and fast decoding speed make the popularity of QR codes grow rapidly all over the world. Nowadays, the built-in cameras of mobile phones generally have the function of recognizing QR codes. [0003] Generally speaking, in order to protect the priv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/06G06F21/60G06F21/62
CPCG06K19/06028G06K19/06037G06K19/06046G06F21/6245G06F21/602
Inventor 赵庆兰杨舜同郑东张应辉赖成喆郭瑞秦宝东
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products