QR Code with Encryption

QR Code with Encryption

More than self-service a
new concept in the experience
of inviting and receiving

More than self-service a new concept in the invite and receive experience

Optimize service via QR Code, with total security and ensuring a better experience.

QR Code with Encryption

The Quick Responsive Code is a two-dimensional bar code that can store different types and volumes of information. Encrypted QR Codes use algorithms to protect information, being safer and protected from fraud.

In access control, the use of encrypted QR Code brings more security since a QR Code reader,
without the interpretation of the software it would not get the user’s credential number. It’s possible
provide tickets with QR Code for access at turnstiles and doors, dispensing with the use of the
credential in proximity card format.

The QR Code solution is fully integrated into the software which, in addition to enabling the use of the QR Code with encryption, also offers the dynamic QR Code technology, allowing the development of applications to perform access with the QR Code*.

The dynamic QR Code was developed to vary information such as date and time to prevent fraud, or enable the dissemination of a QR Code print without compromising the security of the environment. During access, in addition to access information and verification of user credentials, the access control system also checks the generation date of that QR Code to verify that it is within the valid period.

QR Code with Encryption + Invenzi Access Control

Integrated with Invenzi Solution

Invenzi access control integrates with simple QR Code solutions, without encryption, for small projects; it is possible to automatically print a ticket with the visitor’s credential when releasing the visit, for example;

For more complex solutions, it is possible to use the encrypted QR Code, with the possibility of using the dynamic QR Code technology which, in addition to encrypting the information, makes the solution check the QR Code generation date.

*Contact us to find out how to implement this technology in your applications.