Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

QR CODES

Technology and Applications
by

Neha Shaah

on 5 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of QR CODES

QRC ? Applications QR CODES
TECHNOLOGY Bus commutators pass
Education
Patients
Livestock management
Jewellery
Other applications Quick Response Codes
2D barcodes
When we scan a QR code->
we are virtually directed to a place
where more information about the
topic is stored.
Information can be:
a)URL
b)Video
c)Text
d)Image What do they look like?? For Bus Commutators Patients Attacks on qr codes Jewellery Education Livestock
management Other applications Bussiness cards
LPG cylinder management
Tickets
Grocery
Payment of bills
Discount coupons Resistant to distorted symbols Linking functionality of symbols 360 degree high speed reading Generator Anyone of us can make a QR code by following two simple steps
Generate QR code by entering data at any of the following websites
http://qrcode.kaywa.com/
www.qrstuff.com/
www.qurify.com/
Print the QR codes for others to scan and use. Efficient encoding of kanji and kana characters Properties Direct marking Application - which is available for free on following websites
www.i-nigma.com
http://www.upcode.mobi/
People having cell phones with
camera and an internet
connection, can take a
snapshot of the code and
find out what it says. The Reader BY-
Kalyani Upadhye
Neha Shaah Cummins College of Engineering for Women Micro QR : suitable for small data/ space and when efficient reading is required.
Contains only one finder pattern.

SQRC: Where personal information is involved, the demand for the protection of data encoded in QR Code is rapidly increasing SQRC is used.
QR CODES + Lock = SQRC

iQR :
QR code + [ lots of info ,print into less space, = iQR Code
Rectangular space ] Types Phishing and pharming :
The QR Code can be manipulated to redirect the user to a cloned website.
Attacking reader software :
Attacker can gain control over the entire Smartphone.
Social engineering attacks :
QR can direct the users to infected websites (threats of virus and being cheated).
Use antivirus !
Assure the URL before scanning!
Prevention Conclusion Intelligent marketing possible
Technology at hands
Cheap and secure
Easy to use
Infinite applications
Thank You !
Full transcript