Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of QR CODES
TECHNOLOGY Bus commutators pass
Other applications Quick Response Codes
When we scan a QR code->
we are virtually directed to a place
where more information about the
topic is stored.
Information can be:
d)Image What do they look like?? For Bus Commutators Patients Attacks on qr codes Jewellery Education Livestock
management Other applications Bussiness cards
LPG cylinder management
Payment of bills
Discount coupons Resistant to distorted symbols Linking functionality of symbols 360 degree high speed reading Generator Anyone of us can make a QR code by following two simple steps
Generate QR code by entering data at any of the following websites
Print the QR codes for others to scan and use. Efficient encoding of kanji and kana characters Properties Direct marking Application - which is available for free on following websites
People having cell phones with
camera and an internet
connection, can take a
snapshot of the code and
find out what it says. The Reader BY-
Neha Shaah Cummins College of Engineering for Women Micro QR : suitable for small data/ space and when efficient reading is required.
Contains only one finder pattern.
SQRC: Where personal information is involved, the demand for the protection of data encoded in QR Code is rapidly increasing SQRC is used.
QR CODES + Lock = SQRC
QR code + [ lots of info ,print into less space, = iQR Code
Rectangular space ] Types Phishing and pharming :
The QR Code can be manipulated to redirect the user to a cloned website.
Attacking reader software :
Attacker can gain control over the entire Smartphone.
Social engineering attacks :
QR can direct the users to infected websites (threats of virus and being cheated).
Use antivirus !
Assure the URL before scanning!
Prevention Conclusion Intelligent marketing possible
Technology at hands
Cheap and secure
Easy to use
Thank You !