• Title/Summary/Keyword: QR-Code URL

Search Result 12, Processing Time 0.032 seconds

A study on non­storage data recording system and non­storage data providing method by smart QR code (스마트한 QR코드에 의한 비저장식 데이터 기록 시스템 및 비저장식 데이터 제공방법에 관한 연구)

  • Oh, Eun-Yeol
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.14-20
    • /
    • 2019
  • The purpose of this paper is to present a smart QR code recording system and a method of non­storage data delivery that transforms the original data into a form of URL information by encrypting it and encoding the URL information into a QR code so that the QR code can be written and decrypted in a medium without storing the original data. The method of the study was presented by the prior art study and the literature research. Analysis results show that the system is built on the online administration server. The data input signal matching secret code is stored in DB, the QR code generation command converts input data from the password DB to the password information combined into the subordinate locator of the admin server's domain name, URL code. Therefore, the smart QR method of data management (recording and providing) indicates that there are no limitations in the ease and space of use or obstacles to capacity use.

A Study of QR-Code Security Method for Smart Phone (스마트폰에서의 QR-Code 보안기법에 대한 연구)

  • Byeon, Jin-Young;Ahn, Yo-Han;Lee, Jae-Woong;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.699-700
    • /
    • 2011
  • This paper shows the way to prevent the leaking of private information due to malicious codes or connections of invalid URL in QR-Codes, which is used in the present smart-phone. It is difficult to filter out the connections directly with decoding the QR-Codes, so before connecting, we construct servers which compare results of decoding the QR-Codes to a valid URL. The server notifies warning to Smart-phone users if the results were uncertain URLs which did not registered in the server. This paper would help the Smart-phone users to protect their privacy.

  • PDF

Cloud-based malware QR Code detection system (클라우드 기반 악성 QR Code 탐지 시스템)

  • Kim, Dae-Woon;Jo, Young-Tae;Kim, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1227-1233
    • /
    • 2021
  • QR Code has been used in various forms such as simple business cards and URLs. Recently, the influence of Corona 19 Fundemik has led to the use of QR Codes to track travel routes through visits and entry / exit records, and QR Code usage has skyrocketed. In this way, most people have come to use it in the masses and are constantly under threat. In the case of QR Code, you do not know what you are doing until you execute it. Therefore, if you undoubtedly execute a QR Code with a malicious URL inserted, you will be directly exposed to security threats. Therefore, this paper provides a cloud-based malware QR Code detection system that can make a normal connection only when there is no abnormality after determining whether it is a malicious QR Code when scanning the QR Code.

A Study of Security Weaknesses of QR Codes and Its Countermeasures (QR 코드의 보안 취약점과 대응 방안 연구)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.83-89
    • /
    • 2012
  • Recently, due to widespread use of smartphones, the number of applications of the QR code is increased rapidly. QR codes, a kind of 2-dimensional barcode, is used to encode information such as simple URLs or namecards, especially for corporates' advertisement. Users can get some information easily by taking picture of the target QR code, however, fake or altered QR codes can cause serious problems, e.g., URL hijacking or infringement of private information because no one can identify the buried information in the QR code by his naked eye. In this paper, I summarize threats to the QR code and present how to tackle these threats.

Design and Implementation of μ-Webpage based on QR Code (QR 코드 기반 마이크로 웹페이지 설계 및 구현)

  • Ha, Sunju;Eun, Seongbae;So, SeonSub;Yun, Young-Sun;Jung, Jinman
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.239-246
    • /
    • 2015
  • QR(Quick Response) Code has been developed to provide greater storage capacity and more functionality compared to 1D bar codes. With the emergence of increasingly mobile devices equipped with cameras such as smart-phones and tablets, QR codes have become very popular and more important in mobile businesses. Typically, most QR codes are used as a URL link for redirecting users to webpages. However, the URL based QR codes are required to be connected over the internet and to be run a server. This can incur unnecessary traffics in the Internet. Furthermore, it is not suitable for the country lagging behind others in its network infrastructure. In this paper, we propose a server-less ${\mu}$-webpage to provide mobile web services and be optimized for the capabilities and limitations of QR Code. We have implemented the ${\mu}$-webpage in Android, and the results showed that the proposed mechanism can provide web-services without requiring extra servers or incurring mobile traffic data compared to the URL-based QR Codes.

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.

An Effective Detection of Print Image Forgeries Based on Modeling of Color Matrix : An Application to QR Code (컬러 매트릭스 모델링에 의한 영상 인쇄물 위변조 검출 기법 : QR코드에의 적용)

  • Choi, Do-young;Kim, Jin-soo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.431-442
    • /
    • 2018
  • 2-dimensional barcode, QR code has been used for containing various information such as image, video, map, and business cards. Currently, a smartphone is used as a QR code scanner, displaying the code and converting it to a standard URL for a website. However, QR codes are not very common in encrypted application and so have a few applications. This paper proposes a new color-code, which integrates the conventional QR code and color design, and can be effectively used in some product certification system. The proposed method exploits the fact that genuine code is produced by CMYK color model, but the counterfeit is captured by RGB color model and during this process, color information of the code is changed. This paper introduces the color matrix model to measure the distortion between genuine code and counterfeit code. By investigating the statistical characteristics of color matrix, an effective detection of print image forgeries are designed. Various experiments with color codes show that the proposed system can be effectively used in product certification systems.

Counterplan of the XSS Attack to QR Code (QR 코드의 XSS 공격에 대한 대응방안)

  • Bahn, Kee-Bong;Jung, Jae-Wook;Won, Dong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.102-104
    • /
    • 2011
  • 최근 스마트폰 사용자가 빠른 속도로 늘어나면서 'QR(Quick Response)코드가 새로운 마케팅 및 정보의 전달 수단으로 크게 각광받고 있다. 또한, QR코드는 인터넷 주소(URL), 사진 및 동영상 정보, 지도 정보, 명함 정보 등을 제공하는 매우 효율적인 수단으로 작용하고 있다. 하지만 스마트폰으로 무심코 인식한 QR 코드로 인해 악성코드에 감염될 가능성이 높아 사용자 주의가 필요하다. 로그인된 웹 사이트에서 QR 코드를 읽어 웹 브라우저로 접근할 때 XSS(Cross Site Scripting)을 통해 해당 웹사이트의 로그인 정보를 획득하거나 게시판 회원정보와 같은 데이터를 수정할 수도 있기 때문이다. 이에 본 논문에서는 QR 코드의 XSS 공격에 대한 대응방안을 상세히 기술하여 QR 코드를 사용하는 유저들에게 도움이 되고자 한다.

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

A study about production process management that use QR Codes (QR코드를 활용한 생산 공정관리 적용방법 연구)

  • Kim, jung-cheol;Moon, il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.448-450
    • /
    • 2013
  • QR codes, a kind of 2-dimensional barcode, is used to encode information such as simple URLs or namecards. QR codes can store much more information than a just barcode can do. Now QR code is very popular service in our ordinary life. These days many companies has used QR codes in the way of home-page link, especially a production explanation, the material instruction of model houses, the services in a library and on-line events, etc. This paper is going to make a study about how to establish a production process management on the basis of QR codes, addedly, about strong points of QR codes and the examples of using it.

  • PDF