Browse Prior Art Database

Method and System to Ensure Integrity and Trust of Two-Dimension Code

IP.com Disclosure Number: IPCOM000238370D
Publication Date: 2014-Aug-21
Document File: 2 page(s) / 113K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method is invented to ensure the integrity of the Two-Dimension Code, and also build a trust mechanism of the Two-Dimension Code with help of certificate, when user creates a Two-Dimension Code, it will have decode public key certificate information store in the Two-Dimension Code in plain text format, and it will have information signed with its private certificate. And for Two-Dimension Code scanner, it will get the encoded information, and get the public certificate from the Two-Dimension Code. User can decide whether he trusts this certificate to see whether he trusts the Two-Dimension Code. And as only the one generates Two-Dimension Code has the private certificate, the information encoded in Two-Dimension Code’s integrity can be ensured.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 47% of the total text.

Page 01 of 2

Method and System to Ensure Integrity and Trust of Two

Method and System to Ensure Integrity and Trust of Two-

Two-Dimension Code is very popular today, and it is widely used in many different domains including tickets, online transactions, advertising media and so on, and it is very easy to generate a Two-Dimension Code, then have a scanner to parse it to get encoded information, but as there is no control on the ones generate the code, and it is hard to ensure the integrity of the Two-Dimension Code, also there is no trust mechanism for the Two-Dimension Code.

The Two-Dimension Code can be easily modified by anyone to have other information and this information may cause kinds of damage or issues like a Two-Dimension Code has URL information and a browser scan it to browse the web site, the site can be changed to a site with virus and causes damage to the compute device. Or user scans an unknown source Two-Dimension code which may cause the same issue.

In this invention, a method is invented to ensure the integrity of the Two-Dimension Code, and also build a trust mechanism of the Two-Dimension Code with help of certificate, when user creates a Two-Dimension Code, it will have decode public key certificate information store in the Two-Dimension Code in plain text format, and it will have information signed with its private certificate. And for Two-Dimension Code scanner, it will get the encoded information, and get the public certificate from the Two-Dimension Code. User can decide whether he trusts this certificate to see whether he trusts the Two-Dimension Code. And as only the one generates Two-Dimension Code has the private certificate, the information encoded in Two-Dimension Code's integrity can be ensured.

If someone want to change the encrypted information and faked a new Two-Dimension code, it must have a new private key and new public key certificate, and user does not trust this new public key certificate (if he trusts this certificate, it means he knows who owns the certificate and who fakes the Two-Dimension Code, this is not what an attacker will do).

Prior Arts:

Security application method for two-dimension code and encoding/decoding system

https://www.google.com.hk/patents/CN103049777A?cl=en&dq=Integrity+of+Two-Dimension+Code&hl=zh-CN&sa=X&ei=XJVLU9TCE-WTiAf37YHADw&ved=0CHQQ 6AEwCA

The invention provides a security application method for a two-dimension code. The method comprises the following steps: obtaining data information; encoding the data information and generating plain code data; adding secrecy data to the plain code data; and encoding the plain code data together with the secrecy data, thereby obtaining the two-dimension code. The invention also provides an encoding system which comprises an encoding data obtaining module for obtaining the data information and a data encoding module for encoding the data information into the plain code data, adding the secrecy data to the plain code data and encoding t...