0% found this document useful (0 votes)
65 views

Identity and Access - QR Code Scan

A QR code is a type of two-dimensional barcode that can be used to encode information for quick access. Scanning a QR code triggers a chain reaction where the code is read by a software or mobile device and validated against a database. This allows the scanner to access linked credentials and details about the person or item associated with that code. QR codes come in different versions that can vary in size and application, from confirming event attendance to asset tracking to payment systems. They have become popular for identification and access because the encryption and decryption process is fast and ubiquitous mobile QR readers exist.

Uploaded by

Kishan Panpaliya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Identity and Access - QR Code Scan

A QR code is a type of two-dimensional barcode that can be used to encode information for quick access. Scanning a QR code triggers a chain reaction where the code is read by a software or mobile device and validated against a database. This allows the scanner to access linked credentials and details about the person or item associated with that code. QR codes come in different versions that can vary in size and application, from confirming event attendance to asset tracking to payment systems. They have become popular for identification and access because the encryption and decryption process is fast and ubiquitous mobile QR readers exist.

Uploaded by

Kishan Panpaliya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Identity and Access - QR Code Scan

Walk into a restaurant, attend a part at a local event or just go for some recreational
activity like a VIP party and chances are that you would have seen a strange new
gadget flock the registration tables. A nifty little technology by the name of QR
codes have become the preferred means of confirming and delegating individuals
for events and organized processions.
Gone are the days of spending countless hours in lines just to register and fill in
one’s status for an event, the new way to go is by QR codes. So what exactly is a
QR code and what makes one code unique when compared to the rest. In this video,
we will uncover some ideas as to the mechanism by which QR codes function and
how they are used for identification and access purposes.
Slide 1-WHAT IS A QR CODE?
Similar to how barcodes are used to produce unique tags for products of all types,
shapes and sizes, a QR code works similar, having a two dimensional bar code that
can be used to encode and provide easy access to information. It stands for ‘Quick
Response’ code and refers to the fastidious nature in which individuals can simply
tap or scan a reader to gain access while providing the scanner with details about the
person simultaneously.
Most QR codes are virtually linked with a database of records and information that
is used to confirm the validity of the scanned sequence of digits. A two-dimensional
bar code that is widely used to encode and provide such services.
Slide 2-SCANNING A QR CODE
Scanning a QR code is easier than one can imagine. Sliding the QR code against a
reader will cause the information pertaining to the QR code to be read by a software
or a mobile device that has the reader. This triggers a chain reaction of information
transfers that ultimately lands the system into a registry table where the information
has to be validated.
The QR reader can also be a virtual machine that takes information from the
sequence and then relates it to a link specified in a database which then leads to a
complete list of credentials and other information regarding the person. This virtual
link is then set off and users can access information, knowing full well that there is
no danger of malware of phishing attacks. The softwares that are used for reading
are ubiquitous in nature and can be used on almost any mobile device. Some of the
popular QR code scanners include i-Nigma, QR Droid, Bar-Code and Quick Scan.
Slide 3-SCANNING A QR CODE
Ever wondered how a QR code scanner can perform the required functions in just a
simple wave. To understand how a QR code scanner works, we need to understand
how it is generated and what kind of changes it undergoes once it is converted.
A QR code first reads the information that has to be converted and then creates a
virtual encrypted link that is formatted to produce a sequence of patterns)in black
and white). The code is then printed in the form of either a link or a printable image
that can be scanned by QR readers. Now if you were using the QR code generator
as a means to confirm entry tickets for people attending an event, a unique id would
be generated for each of the generated QR codes which would then be linked with
the information that is stored on a private encrypted server.
This then leads to the final step-decryption. Users can scan the codes which are only
shared with certain individuals. If the QR code contains information for marketing
events that can be shared with others, then it is publicly shared and proliferated.
During the stage of decryption, the scanner reads the byte sized information on the
code and then generates a link or a digital paper copy of the link that is attached to
the code.
Users finally use this link and are able to access information. Decryption of the QR
codes can be conducted through a number of images that belong to several sizes.
Version 1 for example generates a 21x21 sized image while Version 3 generates an
image of size 29x29. Version 25 and Version 40 are the largest that are used for
decryption, each of size 117x117 respectively.
Slide 4-VERSIONS OF QR CODE
Different versions of QR code exist that can pertain to the different applications that
they may have. Some of the more common applications include payment systems,
maintenance systems, customer care technologies, asset tracking, identification
systems and data sharing centers.
QR codes haven’t just become popular because of the ubiquitous nature of their
codes or the fact that they can carried on mobile devices, but because the encryption
and decryption step takes little to no time. An average generator can process
mammoth amounts of data and have it converted to suitable codes. Another
important version of a QR code is used in security tags and fobs where a unique
sequence of code is generated every time it is struck against a reader. This ensures
that only certain fobs can be used for entering certain rooms or information.

You might also like