Generating a QR code

ABSTRACT

The present disclosure provides a method and system for generating a QR code by receiving an inputted document; pre-processing the inputted document so as to obtain desired content; encrypting the desired content; and generating one or more QR codes based on the encrypted desired content.

RELATED APPLICATION

This application claims priority from Chinese Patent Application NumberCN201410520353.4 filed on Sep. 28, 2014 entitled “METHOD AND SYSTEM FORGENERATING TWO-DIMENSIONAL CODE” the content and teachings of which isherein incorporated by reference in its entirety.

FIELD

Embodiments of the present disclosure relate to the field of informationsharing.

BACKGROUND

Typically offline data sharing means may use QR technology.Traditionally, QR technology may always neglects security, withouttaking into account the issue of preventing unauthorized reading,thereby having a risk of disadvantageously divulging the sharedinformation, which is disadvantageous for driving information sharing.Besides, the type of information that may be shared is also verylimited. For example, in the existing method of sharing data through aQR code, the input that may be accepted is usually limited to the textcontent, thereby limiting the type of shared information.

SUMMARY

Embodiment of the present disclosure provide a system, a computerprogram product and a method of generating a QR code by receiving aninput document; pre-processing the inputted document to obtain desiredcontent; encrypting the desired content; and generating one or more QRcodes based on the encrypted desired content.

BRIEF DESCRIPTION OF THE DRAWINGS

The objectives, features, and advantages of the present disclosure willbecome more apparent through a more detailed description of theexemplary embodiments of the present disclosure with reference to theaccompanying drawings, wherein same reference numerals generallyrepresent same components in the exemplary embodiments of the presentdisclosure.

FIG. 1 illustrates a block diagram of an exemplary computersystem/server 12 adapted to implement the embodiments of the presentdisclosure;

FIG. 2 illustrates a flowchart of a method 200 for generating QR codeaccording to the exemplary embodiments of the present disclosure;

FIG. 3 shows an exemplary flowchart of pre-processing the inputteddocument according to an embodiment of the present disclosure;

FIG. 4 shows a schematic diagram of encrypting with a non-symmetricalkey according to the exemplary embodiments of the present invention;

FIG. 5 shows a schematic block diagram of a system 500 for generating aQR code according to the exemplary embodiments of the present invention.

DETAILED DESCRIPTION

Some preferable embodiments may be described in more detail withreference to the accompanying drawings, in which the preferableembodiments of the present disclosure have been illustrated. However,the present disclosure may be implemented in various manners, and thusshould not be construed to be limited to the embodiments disclosedherein. On the contrary, these embodiments are provided for the thoroughand complete understanding of the present disclosure, and may completelyconvey the scope of the present disclosure to those skilled in the art.

As wearable and mobile devices become increasingly popular, methods forretrieving/accessing/sharing information gradually lead to advancedresearch. Traditionally, information sharing may be performed usingnetworks, for example, by transmitting an email or sharing fileson-line. However, where wearable and mobile devices may be involved, andbecause these may generally not by online, in all likelihood it maybecome inconvenient to implement data sharing between these devices orbetween these devices and traditional devices in an online manner.

Embodiments of the present disclosure provide a system, a computerprogram product and a method of generating a QR code. In one embodimentan input may be a received document. A further embodiment may includepre-processing an inputted document to obtain a desired content. Afurther embodiment may include encrypting a desired content. A furtherembodiment may include generating one or more QR codes based on anencrypted desired content.

In an alternative embodiment of the present disclosure, pre-processingan inputted document to obtain a desired content may include extractinga desired textual content from a document as a desired content. In analternative embodiment of the present disclosure, pre-processing aninputted document to obtain desired content may include extracting adesired textual content from a document. Yet a further embodiment mayinclude compressing a desired textual content to obtain a desiredcontent. In an alternative embodiment of the present disclosure, adesired textual content may include an abstract of a document.

In an alternative embodiment of the present disclosure, encryption mayinclude one or more of setting a password, a symmetrical encryption, anon-symmetrical encryption, a Question & Answer (Q&A) type encryption.In a further embodiment, when encryption may be a non-symmetricalencryption, a desired content may be encrypted with a public key of akey pair, while a private key of the key pair may be shared between oneor more predetermined entities.

In an alternative embodiment of the present disclosure, a format of aninputted document may include one of the following: a word format, a pdfformat, an excel format, and a textual format.

In an alternative embodiment of the present disclosure, a generated oneor more QR codes may include at least a part of a desired content, and alink that may be directed to the rest part of the desired content. In analternative embodiment of the present disclosure, attributes of the QRcode may include color or area.

According to a second aspect of the present invention, there may beprovided a system of generating a QR code. A further embodiment mayinclude a receiving unit configured to receive an input document. Afurther embodiment may include a pre-processing unit configured topre-process an input document to obtain a desired content. A furtherembodiment may include an encrypting unit configured to encrypt adesired content. A further embodiment may include a generating unitconfigured to generate one or more QR codes based on an encrypteddesired content.

In an alternative embodiment of the present disclosure, thepre-processing unit may include an extracting unit and may be configuredto extract a desired textual content from a document as the desiredcontent. In an alternative embodiment of the present disclosure, apre-processing unit may include an extracting unit that may beconfigured to extract a desired textual content from a document. Yet afurther embodiment may include compressing unit that may be configuredto compress a desired textual content to obtain a desired content. In analternative embodiment of the present disclosure, a desired textualcontent may include an abstract of a document.

In an alternative embodiment of the present disclosure, the encryptionmay include one or more of setting a password, a symmetrical encryption,a non-symmetrical encryption, a Q&A type encryption. In a furtherembodiment, when an encryption may be a non-symmetrical encryption, adesired content may be encrypted with a public key of a key pair, whilea private key of the key pair may be shared between predetermined one ormore entities.

In an alternative embodiment of the present disclosure, a format of aninput document may include one of the following: a word format, a pdfformat, an excel format, and a textual format. In an alternativeembodiment of the present disclosure, a generated one or more QR codemay include at least a part of a desired content, and a link that may bedirected to the rest part of a desired content. In an alternativeembodiment of the present disclosure, attributes of a QR code mayinclude color or area.

According to the embodiments of the present disclosure, diversity ofsharing information and convenience of sharing manners may besignificantly enhanced, and unauthorized reading of the shared contentmay be prevented to a large extent. Additionally, the embodimentsaccording to the present disclosure may also reduce cost for sharingfiles and enhance overall efficiency.

Referring now to FIG. 1, in which an exemplary computer system/server12, which is applicable to implement the embodiments of the presentdisclosure, is shown. Computer system/server 12 is only illustrative andmay not intend to suggest any limitation as to the scope of use orfunctionality of embodiments of the disclosure described herein.

As shown in FIG. 1, computer system/server 12 is shown in the form of ageneral-purpose computing device. The components of computersystem/server 12 include, but are not limited to, one or more processorsor processing units 16, a system memory 28, and a bus 18 that couplesvarious system components including system memory 28 to processor 16.

Bus 18 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. By way of example, and not limitation,such architectures include Industry Standard Architecture (ISA) bus,Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, VideoElectronics Standards Association (VESA) local bus, and PeripheralComponent Interconnect (PCI) bus.

System memory 28 can include computer system readable media in the formof volatile memory, such as random access memory (RAM) 30 and/or cachememory 32. Computer system/server 12 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia.

Program/utility 40, having a set (at least one) of program modules 42,may be stored in memory 28 by way of example, and not limitation, aswell as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, may include an implementation of a networkingenvironment. Program modules 42 generally carry out the functions and/ormethodologies of embodiments of the invention as described herein.

Computer system/server 12 may also communicate with one or more externaldevices 14 such as a keyboard, a pointing device, a display 24, etc. Oneor more devices that enable a user to interact with computersystem/server 12; and/or any devices (e.g., network card, modem, etc.)that enable computer system/server 12 to communicate with one or moreother computing devices. Such communication can occur via input/output(I/O) interfaces 22. Further, computer system/server 12 can communicatewith one or more networks such as a local area network (LAN), a generalwide area network (WAN), and/or a public network (e.g., the Internet)via network adapter 20. As depicted, network adapter 20 communicateswith the other components of computer system/server 12 via bus 18. Itshould be understood that although not shown, other hardware and/orsoftware components could be used in conjunction with computersystem/server 12. Examples, include, but are not limited to: microcode,device drivers, redundant processing units, external disk drive arrays,RAID systems, tape drives, and data archival storage systems, etc.

In some embodiments, computer system/server 12 typically includes avariety of computer system readable media, and such media may be anyavailable media that is accessible by computer system/server 12, and itincludes both volatile and non-volatile media, removable andnon-removable media. In some other embodiment, by way of example only,storage system 34 may be provided for reading from and writing to anon-removable, non-volatile magnetic media (not shown and typicallycalled a “hard drive”). In some other alternative embodiments, althoughnot shown, a magnetic disk drive for reading from and writing to aremovable, non-volatile magnetic disk (e.g., a “floppy disk”), and anoptical disk drive for reading from or writing to a removable,non-volatile optical disk such as a CD-ROM, DVD-ROM or other opticalmedia can be provided. In such embodiments, each may be connected to bus18 by one or more data media interfaces. In certain embodiments, as willbe further depicted and described below, memory 28 may include at leastone program product having a set (e.g., at least one) of program modulesthat are configured to carry out the functions of embodiments of theinvention.

Now, refer to FIG. 2, which illustrates a flowchart of a method 200 forgenerating a QR according to an exemplary embodiment of the presentdisclosure. According to the method 200, in step S201, inputted documentis first received. Next, the method 200 proceeds to step S202 topre-process the inputted document so as to obtain the desired content.In one embodiment, the term “document” here may not only include adocument of a textual format, but also may comprise a document of a wordformat, a document of a pdf format, a document of an Excel format, orany other type of document in the prior art, and the present disclosureis not limited in this aspect.

Referring now to FIG. 3, which shows an exemplary flow diagram forpre-processing the inputted document. As shown in FIG. 3, first, thedesired textual content (step S301) may be first extracted from theinputted document. Next, after the desired text content is extracted,the desired text content may also be compressed (step S302) so as to usethe compressed content as the desired content for subsequent processing,thereby further reducing the size of the shared data.

In one embodiment, considering cost associated with sharing data, allinputted document contents may not be directly shared, but may beselected therefrom. In a further embodiment, because inputted documentsof a word or a pdf format may always include a variety of formatinformation that are not necessary for data sharing, it may alwaysoccupy a relatively large storage space. In a further embodiment, adesired inputted content may be, for example, an abstract portionalready existing in the inputted document, or a content of thedesignated part; or text content extracted using any of text extractiontools in the prior art; or an abstract or brief introduction generatedby using any abstract generating tool in the prior art based on thecontent of the document. In another embodiment, extracted text contentmay be directly used as the desired content of step S202, i.e., notgoing through step S302 of FIG. 3. Those skilled in the art wouldappreciate that compression of the text content may be performed throughany of compression tools or compression algorithms (e.g., 7Zip) in theprior art, and the present disclosure is not limited in this aspect.

In the case of comprising a compressing step S302, as illustrated inFIG. 3, sometimes (e.g., in a compression testing adopting filecompression software) the compression rate may reach 86%, such thatfinally, the size of the text that that can be finally shared mayincrease to 7 times (in a particular scenario or even more), savingcost. In one embodiment, during implementation, a head may be added tothe compressed content so as to indicate the compression setting asfollows (but not limited to the following content):

Field Description Compression setting Algorithm type (e.g., 7Zip), usedcompression parameter, etc. Compressed content Compressed content in theprevious step

Return back to the description of FIG. 2, the method 200 proceeds tostep S203 to encrypt the desired content. In one embodiment, in order toenhance security of sharing data, encryption may be performed usingencryption approaches in any prior art. In a further embodiment, theseencryption approaches include, but may not limited to one or more of:setting a password, a symmetrical key encryption, a non-symmetrical keyencryption, and a Q&A type encryption. In a further embodiment, settinga password and a symmetrical key encryption are relatively simpleencryption approaches. In a further embodiment, it may be desired thatthe sender of a shared content and a receiver obtaining the content mayshare in advance a password/key, and a sender may encrypt a desiredcontent, while a receiver may decrypt using a shared password/key. In afurther embodiment, the Q&A type encryption may be based on a fact thata sender and a receiver understand a particular answer to a particularquestion. In a further embodiment, if a sender and a receiver have aprivate relationship (for example, father and son) so as to understandprivate information, a sender may set a particular question (e.g., “whatis my nickname?”) and answer (e.g., “Xiaoming”) based thereupon, withouta need of additionally sharing a key with a receiver.

In a further embodiment, besides, a non-symmetrical key encryption(e.g., a RSA algorithm) may be another encryption approach that may beapplied flexibly. In a further embodiment, in this approach, each role(e.g., corporation, group, team or user) may have its own public-privatekey pair.

Referring now to FIG. 4, which shows a schematic diagram of encryptingwith a non-symmetrical key according to the exemplary embodiments of thepresent disclosure. As shown in FIG. 4, the respective public keys andprivate keys of a sender, a receiver and all other entity (not shown inFIG. 4) may be saved in the key server, wherein the public key isavailable for any entity to access. When the sender desires to sharecontent with the receiver, sender may (1) access a key server to obtaina public key of a given receiver; (2) encrypt the content desired to beshared with the public key. Correspondingly, after a receiver obtainsthe encrypted content, receiver may use receiver's own existing privatekey to decrypt the content.

In some embodiments, considering further security, a public key and aprivate key may be periodically updated, which may likely cause that theprivate key in the hand of the receiver might not be the latest one. Ina further embodiment, in this case, a receiver may obtain a latestprivate key from a key server so as to decrypt content. In a furtherembodiment, if a key used by the receiver upon encryption may not thelatest due to various reasons, receiver may be unable to decrypt contentwith the latest obtained private key receiver. In a further embodiment,receiver may try one or more private keys previously (expired) saved byreceiver one by one, rather than directly discarding content afterdecryption fails using the latest private key. In a further embodiment,update of a private key may be performed through various manners, e.g.,a key server may be implemented by periodically pushing or onlinepushing latest private keys to various entities, or autonomouslyextracting by various entities, and the present disclosure is notlimited in this aspect.

In a further embodiment, additionally, when a single sender mayrequire/want to share same content with a plurality of receivers (notshown in FIG. 4), it may obtain a public key of each receiver from a keyserver respectively, and individually encrypt the shared content foreach receiver using each public key. In an alternate embodiment, asender may set a virtual set for a plurality of receivers, and create apublic-private key pair for a virtual set (which likewise may be storedin the key server). In a further embodiment, in this way, a sender mayonly need one encryption. In a further embodiment, all given receiversin the virtual set may also only need to obtain the private keys createdby the virtual set through various possible manners (not limited in thepresent disclosure), i.e., decrypting received content on their own. Ina further embodiment, in a non-symmetrical encrypting approach, a publickey of a key pair may be used to encrypt desired content, while aprivate key of a key pair is shared between predetermined one or moreentities.

In one embodiment, during implementation, a header may be added to theencrypted content to indicate the settings for encryption as follows(but not limited the following content):

Field Description Encryption setting Algorithm type Encryption methodssuch as non-symmetrical encryption, Q&A type encryption, no encryption,etc. Encryption In case of non-symmetrical information encryption, itmay include: role ID of the reader, expiration date and time of the key,etc. Encrypted content Encrypted content of the previous steps

Return back to the description of FIG. 2, method 200 the subsequentlyproceeds to step S204, generating one or more QR codes based on theencrypted desired content. In one embodiment, attributes of the “QRcode” here may involve area, or color, i.e., the “QR code” may be acolored QR code or a QR code expanded on an area of the traditional QRcode. In one embodiment, during implementation, generation of the QRcode may be implemented by virtue of some common tools (e.g., thesoftware development kit SDK) in the prior art. In a further embodiment,because the QR code may only store data of limited size, differentpolicies may be employed when the size of the content desired to beshared may be relatively large. In an example embodiment, for desiredcontent with a relatively large size, it may be implemented bygenerating a colored large-size QR code such as PM code.

In a further embodiment for a desired content with a larger size, thefollowing one or more policies may be considered (but not limitedthereto):

-   (1) Generating a plurality of QR codes for a single desired content.    In a further embodiment, during implementation, encrypted desired    content may be divided into a plurality of pieces in step S203 and    stored in a plurality of QR codes. In further embodiment, a checksum    or like manner may be employed to ensure error free of partition of    the desired content and corresponding combination.-   (2) Having the generated one or more QR codes include at least a    part (preferably a first part) of the desired content, and a link    may be directed to the rest part of the desired content. Method 200    ends.

In one embodiment, it may be seen that the information that may beshared by the method of generating QR code according to the embodimentsof the present disclosure may not limited to the content in textualformat, but may be extended to a plurality of types of documents, whichmay be more convenient for a user. In a further embodiment,additionally, size of a processed object may be further reduced througha pre-processing step, thereby saving cost. In a further embodiment, interms of security, the method for generating QR code according to theembodiments of the present disclosure may protect security of the sharedcontent by introducing a plurality of encryption approaches, while aflexible policy of the step of generating QR code may further breakthrough the limit of the capacity of the QR code per se, such that thecontent with a larger size may be shared.

In an additional embodiment, it needs to be mentioned that the QR codeobtained through the method 200 may be distributed in various manners(online or offline), for example, a common manner is shooting orscanning.

In a further embodiment, in application, an entity obtaining the QR codein various manners may read the content within the QR code, decrypt thecontent, and optionally decompress the content so as to view thecontent, thereby achieving the technical effect of sharing informationbetween various entities.

Next, with reference to FIG. 5, a schematic block diagram of a system500 for generating QR code according to the exemplary embodiments of thepresent disclosure may be further described.

As shown in the figure, the system 500 comprises receiving unit 501configured to receive the inputted document; pre-processing unit 502configured to pre-process the inputted document so as to obtain thedesired content; encryption unit 503 configured to encrypt the desiredcontent; and generating unit 504 configured to generate one or more QRcodes based on the encrypted desired content. In one embodiment, asingle QR unit 505 may replace each of these individual units and QRunit 505 may perform the tasks associated with each of the abovementioned units in a given order so as to achieve the end resultdesired.

In an optional embodiment of the present disclosure, the system 500 mayfurther include an extracting unit configured to extract the desiredtext content as the desired content from the document (not shown).

In a further optional embodiment, system 500 may further includeextracting unit 5021 configured to extract the desired text content fromthe document. In a further optional embodiment, system 500 may furtherinclude compression unit 5022 configured to compress the desired textualcontent to obtain the desired content.

In an optional embodiment, a desired text content includes an abstractof a document. In an optional embodiment, encryption may include settingone or more of password, a symmetrical encryption, a non-symmetricalencryption, and a Q&A type encryption. In a specific embodiment, whenencryption is a non-symmetrical encryption, desired content may beencrypted with a public key of a key pair, while the private key of thekey pair may be shared between one or more entities.

In an optional embodiment, format of an inputted document includes oneof the following: a word format, a pdf format, an excel format, and atext format.

In an optional embodiment, generated one or more QR codes may include atleast a part of desired content, and may further include a link that maybe directed to the rest part of the desired content.

In an optional embodiment, attributes of the QR code may include coloror area.

The present disclosure may be a system, method and/or computer programproduct. The computer program product may include a computer readablestorage medium, on which computer readable program instructions areloaded for enabling the processor to implement various aspect of thepresent invention.

The computer readable storage medium can be a tangible device that mayretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present disclosure are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of thedisclosure. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present disclosure. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

The descriptions of the various embodiments of the present disclosurehave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

What is claimed is:
 1. A method for securely sharing documents betweenone or more mobile or wearable devices comprising: receiving, from adocument sender, an input document; pre-processing the input document toobtain a desired content, wherein the pre-processing includes extractingtext from the input document and compressing the extracted text toobtain the desired content; receiving a first password from the documentsender; encrypting the desired content using the first password;calculating a checksum for the encrypted desired content; generatingmultiple Quick Response (QR) codes for the encrypted desired content,each QR response code generated based on a corresponding portion of theencrypted desired content; receiving a second password from an intendeddocument recipient; comparing the first password to the second password;and decrypting the encrypted desired content using the second passwordin response to the first password matching the second password.
 2. Themethod according to claim 1, wherein the desired content includes anabstract of the document.
 3. The method according to claim 1, whereinthe encryption comprises at least one from the group of: setting apassword type encryption, a symmetrical encryption, a non-symmetricalencryption, and a Question & Answer type encryption.
 4. The methodaccording to claim 1, wherein format of the document includes one fromthe group of: a word format, a pdf format, an excel format, a textformat.
 5. The method according to claim 1, wherein the generated one ormore QR codes include at least a part of the desired content, and a linkdirected to a remaining part of the desired content.
 6. The methodaccording to claim 1, wherein attributes of the QR code include color orarea.
 7. The method of claim 1 further comprising: determining a size ofthe encrypted desired content; and, in response to the size of theencrypted desired content checksum exceeding a threshold, dividing theencrypted desired content into multiple portions.
 8. A system forsecurely sharing documents between one or more mobile or wearabledevices, comprising: a Quick Response (QR) unit enabled to generate QRcodes; and computer-executable program logic encoded in memory of one ormore computers enabled to manage the QR unit, wherein thecomputer-executable program logic is configured for the execution of:receiving, from a document sender, an input document; pre-processing theinput document to obtain a desired content, wherein the pre-processingincludes extracting text from the input document and compressing theextracted text to obtain the desired content; receiving a first passwordfrom the document sender; encrypting the desired content using the firstpassword; calculating a checksum for the encrypted desired content;generating multiple Quick Response (QR) codes for the encrypted desiredcontent, each QR response code generated based on a correspondingportion of the encrypted desired content; receiving a second passwordfrom an intended document recipient; comparing the first password to thesecond password; and decrypting the encrypted desired content using thesecond password in response to the first password matching the secondpassword.
 9. The system of claim 8, wherein the desired content includesan abstract of the document.
 10. The system of claim 8, wherein theencryption comprises at least one from the group of: setting a passwordtype encryption, a symmetrical encryption, a non-symmetrical encryption,and a Question & Answer type encryption.
 11. The system of claim 8,wherein format of the document includes one from the group of: a wordformat, a pdf format, an excel format, a text format.
 12. The system ofclaim 8, wherein the generated one or more QR codes include at least apart of the desired content, and a link directed to a remaining part ofthe desired content.
 13. The system of claim 8, wherein attributes ofthe QR code include color or area.
 14. The system of claim 8, whereinthe computer-executable program logic is further configured for theexecution of: determining a size of the encrypted desired content; and,if the size of the encrypted desired content exceeds a threshold,dividing the encrypted desired content into multiple portions.
 15. Acomputer program product for securely sharing documents between one ormore mobile or wearable devices the computer program product comprising:a non-transitory computer readable medium encoded withcomputer-executable code, the code configured to enable the executionof: receiving, from a document sender, an input document; pre-processingthe input document to obtain a desired content, wherein thepre-processing includes extracting text from the input document andcompressing the extracted text to obtain the desired content; receivinga first password from the document sender; encrypting the desiredcontent using the first password; calculating a checksum for theencrypted desired content; generating multiple Quick Response (QR) codesfor the encrypted desired content, each QR code generated based on acorresponding portion of the encrypted desired content; receiving asecond password from an intended document recipient; comparing the firstpassword to the second password; and decrypting the encrypted desiredcontent using the second password in response to the first passwordmatching the second password.
 16. The computer program product of claim15, the code further configured to enable the execution of determining asize of the encrypted desired content; and, in response to the size ofthe encrypted desired content exceeding a threshold, dividing theencrypted desired content into multiple portions.