Figure 3 (IMAGE)
Caption
Schematic diagram two-level security platform. When the QR code that appears as a reflection image is scanned with a smart phone, the first password is distributed to the user. This password information provides the voltage value that is translated to the user. This voltage value is applied to the device a secondary password in the form of a hologram is provided to the user.
Credit
POSTECH
Usage Restrictions
None
License
Licensed content