Surety is performing system maintenance this weekend. Electronic date stamps on new Prior Art Database disclosures may be delayed.
Browse Prior Art Database

Filtering mask to encrypt QR code

IP.com Disclosure Number: IPCOM000233898D
Publication Date: 2013-Dec-27
Document File: 3 page(s) / 41K

Publishing Venue

The IP.com Prior Art Database


Proposed is a system and method to decrypt QR code content applying another QR code acting as filtering mask so to manage informational decryption process through the same mean driving the information itself and consequently improve consumability.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 3

Filtering mask to encrypt QR code

Disclosed is a system and method to implement QR code encryption using a new technique based on the usage of filtering masks. The same technique could also be used to redirect the user to a specific personalized web page without any authentication. In the already existing related encryption mechanisms, a password is required as a private key to open the content of a QR Code; the usual encryption method are based on the exchange of a certificate to authenticate the user. In the method disclosed here, a filtering mask is instead used as private key. When the QR code is created, it will have added some wrong modules causing the QR code to be not usable. Together with the QR code a mask will be produced to be used to filter the wrong modules and this lets the users that have that mask to acquire the right QR code and then the information the QR code contains. The mask is used by the QR code reader of the users and to do this, the QR code reader is modified in order to filter the QR code. A user tries to read the QR code with a reader without the required mask will not be able to access the information of the QR code.

Examples of alternative addressed scenarios are reported below:

In a shopping portal, it would be very useful to have the QR code on the advertisement of an object that can be bought there. In this case the user should open the link of the QR Code, but will need to authenticate before doing any action. With this new method the user could own a special QR code mask that let him/her open the link directly logged into the proper profile. The mask could be created at request and download from the web site itself once connected as a user facility. In this case, the QR code should have an area that is ignored if the user has not the mask while it is processed if the user has one. That area is eventually filled with the credential information that are stored into the mask so that, when a user uses the QR code plus the mask, he is redirected directly to his own profile page while if he uses the QR code alone he is redirected to the shopping portal home page.

A big company could publish in form of encrypted QR code some information in the office, like computer tag (server x, server y), procedures to follow, room information and so on. This, in order to prevent a visitor to access company sensitive information. The company could then deliver to its employee the QR code ma...