7,, i

Similar documents
soturon.dvi

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Web Basic Web SAS-2 Web SAS-2 i

Web Web Web Web Web, i

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

1 1 tf-idf tf-idf i

i

29 jjencode JavaScript

, IT.,.,..,.. i

21 Key Exchange method for portable terminal with direct input by user

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i

25 Removal of the fricative sounds that occur in the electronic stethoscope

i


Wide Scanner TWAIN Source ユーザーズガイド

16_.....E...._.I.v2006

<95DB8C9288E397C389C88A E696E6462>

28 Horizontal angle correction using straight line detection in an equirectangular image

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents Ruck Thawonmas

.N..

3_23.dvi

,,,,., C Java,,.,,.,., ,,.,, i

untitled

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

Takens / / 1989/1/1 2009/9/ /1/1 2009/9/ /1/1 2009/9/30,,, i

28 TCG SURF Card recognition using SURF in TCG play video

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004


220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i


ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

,,.,,., II,,,.,,.,.,,,.,,,.,, II i

2 ( ) i

58 10

untitled


関西における地域銀行について

Table 1. Assumed performance of a water electrol ysis plant. Fig. 1. Structure of a proposed power generation system utilizing waste heat from factori

ユーザーズマニュアル

kut-paper-template.dvi

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

kut-paper-template.dvi

24 Depth scaling of binocular stereopsis by observer s own movements

P2P P2P Winny 3 P2P P2P 1 P2P, i

178 5 I 1 ( ) ( ) ( ) ( ) (1) ( 2 )

三税協力の実質化 : 住民税の所得税閲覧に関する国税連携の効果

生活設計レジメ

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)

I II III 28 29


SNS ( ) SNS(Social Networking Service) SNS SNS i

( )

,,.,.,,.,.,.,.,,.,..,,,, i



ÿþ

memo ii

Transcription:

23 Research of the authentication method on the two dimensional code 1145111 2012 2 13

7,, i

Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two dimensional code is widly used for goods management, advertising media, traceability, etc. In two dimensional code use with a personal digital assistant, the user who uses forms about 70 percent of personal digital assistant users. In the electronic ticket service, the two dimensional code is distributed to the user instead of the ticket. The two dimensional code in an electronic ticket service may be sniffing. In order to prevent tapping, when introducing an authentication server, it induces cost to introduction and management of a server. In this paper, Wd proposes the system which does authentication between a user terminal and a two dimensional code, and the information addition system to the two dimensional code were proposed at the time of the user authentication in a two dimensional code. As evaluation, we did comparison verification of a proposal system and the existing system. In the verification result, the proposal system realized authentication at low cost from the existing system. The kind of two dimensional code which can be used for the existing service has been extended. key words The two dimensional code, Low cost, Information addition ii

1 1 2 2 2.1................ 2 2.2 QR.................................. 3 2.2.1 QR........................... 4 2.2.2............................. 4 2.2.3............................... 5 2.2.4............................. 7 3 8 3.1..................... 8 3.2........................... 8 4 10 4.1........................ 10 4.1.1................................ 10 4.1.2............................... 10 4.1.3.......................... 11 4.1.4.................... 11 4.2....................... 12 4.2.1............................. 12 4.2.2........................... 14 iii

5 15 5.1............................. 15 5.2........................... 16 5.2.1 SQRC................................. 16 5.2.2........................... 16 5.2.3...................... 17 5.2.4.................... 18 6 20 21 22 iv

2.1................... 3 2.2 QR................................... 4 2.3 QR.............................. 7 3.1....................... 9 4.1............................ 11 4.2........................ 12 4.3......................... 13 4.4................................. 13 5.1.............................. 15 5.2 QR..................... 17 5.3.......................... 18 5.4............................ 19 v

2.1............................ 3 2.2......................... 6 vi

1 POS(Point of Sale(s) ) QR 7 [1] QR Web Web QR QR QR QR Web QR QR 1

2 QR 2.1 [2] PC Web Web PC PC 2

2.2 QR 2.1 2.1 7089 4296 2953 1817 2.2 QR QR 2 [3] QR 2.1 QR 2.1 360 30 QR 1 2 2 2 QR 3

2.2 QR 2.2 QR 2.2.1 QR QR QR 1 40 1 21 21 1 4 QR 2.2 2.2.2 3 7 7 5 4

2.2 QR 5 3 3 1:1:3:1:1 3 1 4 1 6 6 5 5 3 3 1 2.2.3 7 5

2.2 QR 2.2 L M Q H 7 15 25 30 6 3 3 6 2 6 12 18 BCH 2 1 15 2 8 7 2 3 5 BCH 10 1 1 Reed-Solomon L M Q H 4 2.2 6

2.2 QR 2.3 QR 2.2.4 QR BCH Reed-Solomon 30 QR 7

3 [4] 3.1 Web PC ID ID 3.1 Web 3.2 8

3.2 3.1 9

4 4.1 4.1.1 a a 4.1.2 10

4.1 4.1.3 4.1 1. x 2. a x y 3. x f(x) 4. y f(x) 5. 4.1 4.1.4 4.2 1. y f(x) 2. y z 3. z f(z) 4. f(x) f(z) 11

4.2 5. z 4.2 4.2 4.2.1 4.5 1. 2 n n 4.4 2 1 4 2bit 2 2 4bit 16 12

4.2 2. 2 3. 4. 1 0 5. 6. 4.3 4.4 13

4.2 4.2.2 1. 2. 3. 1 0 4. 2 14

5 3 SQRC 5.1 3 5.1 5.1 15

5.2 5.2 SQRC 5.2.1 SQRC SQRC QR [5] QR QR SQRC 5.2.2 QR QR 1 40 21 21 16

5.2 QR 1 4bit 144 144 QR 1 bit QR 1 10 QR 100 QR bit 21 5bit 10bit 16bit bit 1bit 0.63bit 5.2 QR 5.2.3 SQRC 1 10 QR 17

5.2 256bit SQRC 5.3 5.3 SQRC QR 512bit SQRC 256bit QR 5.2.4 SQRC 5.4 1bit 0.63bit QR QR 18

5.2 QR QR 5.4 19

6 QR 20

21

[1] NTT NTT No.43 QR http://www.nttdocomo.co.jp- /binary/pdf/info/news release/report/060331.pdf 2009/06/16. [2] http://www.fighters.co.jp/ticket/order/(2011/12/02) [3] JIS QR JIS 1999. [4] Japan Patent Kokai 2009-124311 2009. [5] SQRC 2 http://www.denso-wave.com/ja/adcd/product/qrcode/sqrc/ 2012/01/15 22