Matrix code for encryption, storage, and transmission of data
First Claim
1. A method for utilizing a matrix code for encryption, storage, and transmission of data, the method comprising:
- generating a base matrix code with a first user data mask wherein the first user data mask including the first user data is in a data region in the base matrix code and the first user data is encrypted;
transmitting the base matrix to a first matrix code scanner, wherein the first matrix code scanner scans the first user data mask and the first user data is decrypted;
generating a second user data mask in the base matrix code using the decrypted first user data to create a combined matrix code including both the first user data mask and the second user data mask, wherein the second user data mask including the second user data is in the data region in the base matrix code and is separated from the first user data mask, and the second user data is encrypted; and
transmitting the combined matrix code to a second matrix code scanner, wherein the second matrix code scanner scans both the first user data mask and the second user data mask for further applications, and both the first user data and the second user data are decrypted.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer utilizes a matrix code to securely communicate information. To utilize the matrix code, the computer receives a scan of the matrix code, and identifies a first mask within a data region of the matrix code, wherein the first mask includes public user data, and identifies a second mask within the data region of the matrix code, wherein the second mask include private user data. The computer decodes the public user data and the private user data from the matrix code, and decrypts one or both of the public user data and the private user data. The computer also removes a distortion operation from the second mask, wherein removing the distortion operation includes reversing a transformation, rotation, skew, shear, reflection, or projection operation.
14 Citations
19 Claims
-
1. A method for utilizing a matrix code for encryption, storage, and transmission of data, the method comprising:
-
generating a base matrix code with a first user data mask wherein the first user data mask including the first user data is in a data region in the base matrix code and the first user data is encrypted; transmitting the base matrix to a first matrix code scanner, wherein the first matrix code scanner scans the first user data mask and the first user data is decrypted; generating a second user data mask in the base matrix code using the decrypted first user data to create a combined matrix code including both the first user data mask and the second user data mask, wherein the second user data mask including the second user data is in the data region in the base matrix code and is separated from the first user data mask, and the second user data is encrypted; and transmitting the combined matrix code to a second matrix code scanner, wherein the second matrix code scanner scans both the first user data mask and the second user data mask for further applications, and both the first user data and the second user data are decrypted. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for utilizing a matrix code for encryption, storage, and transmission of data, the computer program product comprising:
-
one or more computer-readable tangible storage devices and program instructions stored on at least one of the one or more storage devices, the program instructions comprising; program instructions to generate a base matrix code with a first user data mask wherein the first user data mask including the first user data is in a data region in the base matrix code and the first user data is encrypted program instructions to transmit the base matrix to a first matrix code scanner, wherein the first matrix code scanner scans the first user data mask and the first user data is decrypted; program instructions to generate a second user data mask in the base matrix code using the decrypted first user data to create a combined matrix code including both the first user data mask and the second user data mask, wherein the second user data mask including the second user data is in the data region in the base matrix code and is separated from the first user data mask, and the second user data is encrypted; and program instructions to transmit the combined matrix code to a second matrix code scanner, wherein the second matrix code scanner scans both the first user data mask and the second user data mask for further applications, and both the first user data and the second user data are decrypted. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A system for utilizing a matrix code for encryption, storage, and transmission of data, the system comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to generate a base matrix code with a first user data mask wherein the first user data mask including the first user data is in a data region in the base matrix code and the first user data is encrypted; program instructions to transmit the base matrix to a first matrix code scanner, wherein the first matrix code scanner scans the first user data mask and the first user data is decrypted; program instructions to generate a second user data mask in the base matrix code using the decrypted first user data to create a combined matrix code including both the first user data mask and the second user data mask, wherein the second user data mask including the second user data is in the data region in the base matrix code and is separated from the first user data mask, and the second user data is encrypted; and program instructions to transmit the combined matrix code to a second matrix code scanner, wherein the second matrix code scanner scans both the first user data mask and the second user data mask for further applications, and both the first user data and the second user data are decrypted. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification