US Pat. No. 9,948,624

KEY DOWNLOADING METHOD, MANAGEMENT METHOD, DOWNLOADING MANAGEMENT METHOD, DEVICE AND SYSTEM

FUJIAN LANDI COMMERCIAL E...

1. A key downloading method, comprising:generating a random number Rnd1 and sending a hardware sequence number SN and the first random number Rnd1 to a key server by a POS terminal;
receiving a second random number Rnd2, a first cipher text C1, and a key server working certificate KSWCRT sent by the key server, via the POS terminal, wherein the first cipher text C1 is generated by encrypting the Rnd1 by using a private key PrKS corresponding to a public key PuKS included in a key server working certificate KSWCRT, via the key server;
verifying the validity of the key server working certificate KSWCRT by using a key server root certificate KSRCRT, and if the key server working certificate KSWCRT is valid, extracting a public key PuKS from KSWCRT, and decrypting the first ciphertext C1 by using PuKS to obtain a third random random number Rnd1?, via the POS terminal;
judging if the first random number Rnd1 and the third random number Rnd1? are consistent, and if so, encrypting the second random number Rnd2 by using a terminal authentication public key TKP_Pu to generate a third cipher text C2?, and sending C2? to the key server, via the POS terminal;
receiving a key cipher text Ctmk sent by the key server via the POS terminal, wherein the key cipher text Ctmk is generated by encrypting tbea terminal master key TMK by using the terminal authentication public key TKP_Pu corresponding to the hardware sequence number SN, via the key server;
decrypting the key cipher text Ctmk by using a terminal authentication private key TKP_Pr to obtain a terminal master key TMK, and storing the TMK in a security control module, via the POS terminal, wherein the terminal master key TMK enables secure bank card transactions to occur at the POS terminal.

US Pat. No. 9,705,672

KEY MANAGEMENT METHOD AND SYSTEM

FUJIAN LANDI COMMERCIAL E...

1. A key management method, comprising:
calling a first hardware and security module to generate a public key Pu and a private key Pr, storing the private key Pr
in the first hardware and security module and sending the public key Pu to a security module of the POS terminal, using a
Material Tracking and Management (MTMS) system;

calling the first hardware and security module using the MTMS system and calling a second hardware and security module using
a KMS system to respectively combine MTMS access components and KMS access components into a protective key PK and a MAC key
MAK in the respective first and second hardware and security modules and store the protective key PK and the MAC key MAK in
the respective first hardware and security module and the second hardware and security module;

using an operating terminal to generate a transmission key TK and store the transmission key in the security module of the
POS terminal, wherein the transmission key TK consists of a transmission encryption key TEK and an authentication key AUK;

encrypting the transmission key TK using the public key Pu to generate a first transmission key cipher text Ctk_Pu in the
security module of the POS terminal using the POS terminal;

sending the first transmission key cipher text Ctk_Pu and a terminal sequence number SN to the MTMS system through the operating
terminal using the POS terminal;

storing the received terminal sequence number SN and the corresponding first transmission key cipher text Ctk_Pu in an SN-Key_MTMS
database using the MTMS system;

calling the first hardware and security module to decrypt the first transmission key cipher text Ctk_Pu using the private
key Pr to obtain the transmission key TK, encrypting the transmission key TK using the protective key PK and calculating a
MAC value using the MAC key MAK to generate a second transmission key cipher text Ctk_Pk using the MTMS system;

sending the terminal sequence number SN and the second transmission key cipher text Ctk_Pk to the KMS system using the MTMS
system;

storing the terminal sequence number SN and the second transmission key cipher text Ctk_Pk sent from the MTMS system in an
SN-TK_KMS database using the KMS system;

sending the terminal sequence number SN and a downloading master key application to the KMS system using the POS terminal;
inquiring about the second transmission key cipher text Ctk_Pk corresponding to the terminal sequence number SN using the
KMS system after receiving the terminal sequence number SN and the downloading master key application sent by the POS terminal;

calling the second hardware and security module to verify the MAC validity of the inquired-about second transmission key cipher
text Ctk_Pk using the MAC key MAK, and if the verification is passed, decrypting the second transmission key cipher text Ctk_Pk
using the protective key PK to obtain the transmission key TK, and storing the transmission key TK in the second hardware
and security module, using the KMS system;

calling the second hardware and security module to perform bidirectional authentication using an authentication key AUK and
the POS terminal by the KMS system after obtaining the transmission key TK, and if the authentication is passed, calling the
second hardware and security module to encrypt the terminal master key TMK using the transmission decryption key TEK to generate
a master key cipher text Ctmk, and sending the master key cipher text Ctmk to the POS terminal, using the KMS system;

decrypting the master key cipher text Ctmk using the transmission encryption key TEK to obtain the terminal master key TMK
and storing the terminal master key TMK in the security module of the POS terminal, using the POS terminal after receiving
the master key cipher text Ctmk sent by the KSM system.

US Pat. No. 9,806,889

KEY DOWNLOADING METHOD, MANAGEMENT METHOD, DOWNLOADING MANAGEMENT METHOD, DEVICE AND SYSTEM

Fujian LANDI Commercial E...

1. A key downloading method, comprising:
sending a device sequence number DS N and a device identity authentication request to an RKS server via a device terminal;
receiving a working certificate public key RKS_WCRT_PK sent by the RKS server, via the device terminal;
verifying if a digital signature of RKS_WCRT_PK is valid by using a root public key certificate RKS_RCRT, and if so, encrypting
a divergence factor by using RKS_WCRT_PK to obtain a divergence factor cipher text, and sending the divergence factor cipher
text to the RKS server, via the device terminal;

receiving a cipher text AT_TK1 sent by the RKS server via the device terminal, wherein the cipher text AT_TK1 is obtained through encrypting the authentication token AT and a first transmission key component TK1 by a secondary device identity authentication key DIK2; the DIK2 is generated by calling the secondary device identity authentication key generating function according to the device sequence
number DSN and a primary device identity authentication key DIK1;

decrypting the cipher text AT_TK1 by using DIK2 to obtain clear texts AT and TK1, via the device terminal;

generating a third random number as a second transmission key component TK2, performing XOR on TK1 and TK2 to obtain a transmission key TK, calculating SHA256 verification value of TK to obtain TK_SHA2, via the device terminal;

encrypting AT, TK2, and TK_SHA2 by using RKS_WCRT_PK to obtain the cipher text AT_TK2_TK_SHA2, and sending the cipher text AT_TK2_TK_SHA2 to the RKS server, via the device terminal;

receiving a key cipher text sent by the RKS server via the device terminal, wherein the key cipher text is obtained through
encrypting the key to be downloaded by TK;

decrypting the key cipher text by using TK to obtain a key clear text, storing the key in a security module, via the device
terminal; and

judging if the key downloading is complete, and if complete, clearing AT, TK and RKS_WCRT_PK, via the device terminal.

US Pat. No. 9,647,845

KEY DOWNLOADING METHOD, MANAGEMENT METHOD, DOWNLOADING MANAGEMENT METHOD, DEVICE AND SYSTEM

Fujian LANDI Commercial E...

1. A key downloading method, comprising:
sending a device sequence number DSN and a device identity authentication request to a remote key system (RKS) server via
a device terminal;

receiving a working certificate public key RKS_WCRT_PK and a cipher text AT_TK1 sent by the RKS server, via the device terminal,
wherein the AT_TK1 cipher text is obtained by encrypting an authentication token AT and a first transmission key component
TK1 by using a device identity authentication pubic key DIK_PK;

verifying if a digital signature of RKS_WCRT_PK is valid by using a root public key certificate RKS_RCRT, and if valid, decrypting
the AT_TK1 cipher text by using a device identity authentication private key DIK_SK to obtain clear texts AT and TK1, via
the device terminal, wherein DIK_PK and DIK_SK form a non-symmetric key pair;

generating a third random number as a second transmission key component TK2, performing XOR on TK1 and TK2 to obtain a transmission
key TK, calculating SHA256 verification value of TK to obtain TK_SHA2, via the device terminal;

encrypting AT, TK2, and TK_SHA2 by using RKS_WCRT_PK to obtain a cipher text AT_TK2_TK_SHA2 and sending the cipher text AT_TK2_TK_SHA2
to the RKS server, via the device terminal;

receiving a key cipher text sent by the RKS server via the device terminal, wherein the key cipher text is obtained through
encrypting the key to be downloaded by TK;

decrypting the key cipher text by using TK to obtain a key clear text, storing the key in a security module, via the device
terminal; and

judging if the key downloading is complete, and if complete, clearing AT, TK, and RKS_WCRT_PK, via the device terminal.

US Pat. No. 10,716,082

BLUETOOTH AUTOMATIC CONNECTION METHOD, AND MASTER DEVICE, SLAVE DEVICE, AND SYSTEM

Fujian LANDI Commercial E...

1. A Bluetooth automatic connection method, comprising the following steps:enabling, by a first device, a Bluetooth function, to obtain Bluetooth device names in a communication range;
determining, one by one, whether the Bluetooth device names in the communication range contain a specific character, and if any Bluetooth device name contains the specific character, determining a Bluetooth device corresponding to the Bluetooth device name as a candidate Bluetooth device;
connecting, by the first device, to a first server, wherein the first server stores validly registered Bluetooth device information; according to the validly registered Bluetooth device information and names of candidate Bluetooth devices, determining whether there is a validly registered Bluetooth device in the candidate Bluetooth devices; and
if it is determined that there are validly registered Bluetooth devices in the candidate Bluetooth devices, the validly registered Bluetooth devices are ranked according to the strength of Bluetooth signals, connecting, by the first device, to the validly registered Bluetooth device having a strongest Bluetooth signal in the communication range.

US Pat. No. 10,108,835

METHOD AND SYSTEM FOR DECODING TWO-DIMENSIONAL CODE USING WEIGHTED AVERAGE GRAY-SCALE ALGORITHM

FUJIAN LANDI COMMERCIAL E...

1. A method for decoding two-dimensional code using weighted average gray-scale algorithm, characterized by comprising:segmenting a received two-dimensional code image into bit regions each containing one bit data;
presetting a shifting threshold, and shifting four original boundary lines of the bit region outwards by a distance of the shifting threshold to obtain four preset boundary lines;
calculating an average gray-scale value of the bit region using the weighted average algorithm by taking an overlapping area between pixels inside the four preset boundary lines and the bit region as a weight;
binarizing the two-dimensional code image according to the average gray-scale value of the bit region; and
decoding the binarized two-dimensional code image;
wherein a solution of calculating the overlapping area between pixels inside the four preset boundary lines and the bit region includes:
finding all the pixels inside the four preset boundary lines;
selecting one selected point from the pixel and recording coordinates of the selected point and a position relationships between the selected point boundary lines of the pixels;
calculating distances from the selected point to the four original boundary lines of the bit region and their position relationships;
calculating a length and a width of the overlapping area between the pixels and the bit region; and
calculating the overlapping area between the pixels and the bit region.

US Pat. No. 10,102,408

QUICK RESPONSE CODE FEATURE DETECTION METHOD AND SYSTEM

FUJIAN LANDI COMMERCIAL E...

1. A quick response (QR) code feature detection method, characterized by comprising:presetting a threshold of the number of rows, and dividing a received QR code image into a multi-row image of rows of pixels whose number is the same as the threshold of the number of rows;
calculating an average grayscale value of each column of pixels in the multi-row image to form row data;
binarizing the row data;
counting the number of consecutive “1” and the number of consecutive “0” in the binarized row data to form row proportions;
presetting a row proportion threshold, and extracting a rectangle image corresponding to a row proportion whose similarity to a preset proportion is smaller than the row proportion threshold from the row proportions;
presetting a width threshold, and binarizing the rectangle image and a region formed by extending the rectangle image by the width threshold upwardly and downwardly respectively;
searching for column line segments meeting the preset proportion on a middle column of the rectangle image;
translating a diagonal line of a square image containing the rectangle image and the column line segments in upward and downward directions respectively;
searching for and recording black-white demarcation points on the edge of the square image on the translated diagonal line; and
connecting the black-white demarcation points to form a position detection pattern of the QR code;
wherein the threshold of the number of rows is greater than 1, and less than or equal to the number of rows of pixels corresponding to the position detection pattern of the QR code.

US Pat. No. 10,095,903

BLOCK DECODING METHOD AND SYSTEM FOR TWO-DIMENSIONAL CODE

FUJIAN LANDI COMMERCIAL E...

1. A block decoding method for a two-dimensional code, characterized by comprising:storing a received two-dimensional code image in an image data backup register;
binarizing the received two-dimensional code image based on a gray-scale value of a pixel;
searching for a boundary line of the two-dimensional code image based on a position detection pattern;
searching for a version number and a correction pattern of the two-dimensional code image;
segmenting the two-dimensional code image into regions based on the boundary line of the two-dimensional code image, a straight line where a boundary line of the position detection pattern is located and a straight line where a boundary line of the correction pattern is located;
calculating the number of bits in each of the regions based on the position detection pattern, the correction pattern and the version number;
segmenting each of the regions into bit regions each of which corresponds to one bit data, based on deformation amount of the position detection pattern and deformation amount of the correction pattern;
re-acquiring the received two-dimensional code image stored in the image data backup register;
calculating an average gray-scale value of all the pixels in the bit region as a gray-scale value of the bit region;
calculating a gray-scale threshold of each of the bit regions based on the gray-scale value of the bit region using the Otsu method;
binarizing the bit region based on the gray-scale threshold so as to obtain a binarized two-dimensional code image; and
decoding the binarized two-dimensional code image.

US Pat. No. 10,659,220

METHOD AND SYSTEM FOR ENCRYPTING AND DECRYPTING TWO-DIMENSIONAL CODE MASK

FUJIAN LANDI COMMERCIAL E...

1. A method for encrypting and decrypting two-dimensional code mask, characterized by comprising:generating a target two-dimensional code containing a function pattern and an identification, an initial mask pattern and a key by a two-dimensional code generating device;
sending the identification and the key to a server by the two-dimensional code generating device;
receiving and storing the identification and the key by the server;
encrypting the initial mask pattern by the two-dimensional code generating device using the key and then embedding the target two-dimensional code into the encrypted mask pattern so as to acquire an encrypted two-dimensional code;
acquiring and decoding the encrypted two-dimensional code by a two-dimensional code decoding device so as to acquire the function pattern and the identification of the two-dimensional code;
sending the identification to the server by the two-dimensional code decoding device;
receiving the identification by the server;
sending the key to the two-dimensional code decoding device by the server according to the identification;
receiving by the two-dimensional code decoding device the key sent by the server;
generating the initial mask pattern by the two-dimensional code decoding device according to the function pattern and the identification; and
decrypting the encrypted two-dimensional code by the two-dimensional code decoding device according to the key and the initial mask pattern so as to acquire the target two-dimensional code;
wherein, the initial mask pattern is consistent with the target two-dimensional code in size, areas of the mask pattern corresponding to the function patterns of the target two-dimensional code are set to be of a light color, and the function patterns of the target two-dimensional code comprise a position detection pattern, a position detection pattern separator, a positioning pattern, a correction pattern, an auxiliary correction pattern and an identification pattern,
“encrypting the initial mask pattern by the two-dimensional code generating device using the key” specifically comprises:
sequentially skipping the areas of the mask pattern corresponding to the function patterns of the target two-dimension code, extracting bit data of the initial mask pattern to form initial data strings, and recording the position and the number of the skipped areas;
encrypting the initial data strings using the key to acquire the encrypted data strings; and
sequentially splicing the encrypted data strings and the function areas together to form the encrypted mask pattern according to the position and the number of skipped areas.

US Pat. No. 10,528,781

DETECTION METHOD AND SYSTEM FOR CHARACTERISTIC PATTERNS OF HAN XIN CODES

FUJIAN LANDI COMMERCIAL E...

1. A detection method for the characteristic patterns of Han Xin codes, characterized by comprising the following steps:binarizing a received two-dimensional code image;
scanning the two-dimensional code image line-by-line and column-by-column so as to search out the four vertexes of a Han Xin code region;
connecting every two vertexes of the four vertexes so as to form the four boundaries and two diagonal lines of the Han Xin code region;
searching out four characteristic line segments starting from the vertexes and having the continuous binarization values 1, 0, 1, 0, 1 from the two diagonal lines and also searching out the end points of the characteristic line segments;
calculating the boundaries and the data bit width of position detection patterns of the Han Xin code according to the start points and the end points of the characteristic line segments.

US Pat. No. 10,438,038

DECODING METHOD AND SYSTEM FOR QR CODE WITH ONE DAMAGED POSITION DETECTION PATTERN

FUJIAN LANDI COMMERCIAL E...

1. A decoding system for a QR code with one damaged position detection pattern, comprising a binarization module, a first searching module, a recording module, a judgment module, a second searching module, a determination module, a grid partition module and a decoding module, wherein,the binarization module is used for binarizing a received image containing a QR code pattern;
the first searching module is used for searching the received image containing the QR code pattern for position detection patterns;
the recording module is used for recording linear equations of the boundaries of the two position detection patterns and the vertex coordinates of the two position detection patterns and calculating the data bit width of the QR code pattern;
the judgment module is used for judging whether the two position detection patterns are in an adjacent positional relation or a diagonal positional relation according to the geometrical relation between the boundaries and the vertexes of the two position detection patterns;
the second searching module is used for searching out a location pattern between the two position detection patterns with the positional relation determined according to the positional relation of the two position detection patterns and a position characteristic and a black and white pattern characteristic of the location pattern;
the determination module is used for determining the region where the QR code pattern is located according to the two position detection patterns and the location pattern;
the grid partition module is used for partitioning the region where the QR code pattern is located with grids according to the positional relation of the two position detection patterns, the location pattern and the data bit width of the QR code pattern; and
the decoding module is used for decoding the QR code pattern partitioned with grids.

US Pat. No. 10,438,043

METHOD AND SYSTEM FOR IDENTIFYING FINGERPRINT

FUJIAN LANDI COMMERCIAL E...

1. A method for identifying fingerprint, comprising:S1: adjusting a camera to focus the camera on a lens;
S2: capturing continuously by the camera preview fingerprint images formed by a finger pressing the lens, and sending a fingerprint image to an image processing module; and
S3: processing the fingerprint image by the image processing module so as to authenticate the fingerprint;
wherein, step S2 specifically comprises:
S20: determining by the camera whether a brightness component value Y is smaller than a preset value, according to the YUV format;
executing S23 of capturing the fingerprint image by the camera and sending the fingerprint image to the image processing module, if the brightness component value Y is smaller than the preset value;
otherwise, executing S24 of capturing continuously by the camera the preview fingerprint images formed by the finger pressing the lens, and returning to the execution of S20.

US Pat. No. 10,354,111

PRIMARY LOCALIZATION METHOD AND SYSTEM FOR QR CODES

FUJIAN LANDI COMMERCIAL E...

1. A primary localization method for QR codes, characterized by comprising the following steps:S1, binarizing the pixel points of a received image containing a QR code;
S2, partitioning the received image containing the QR code into at least one mesh region including m*n pixel points;
S3, recording the number of black pixel points in each mesh region, assigning the value 1 to the mesh region if the number of the black pixel points in the mesh region is greater than 0, otherwise, assigning the value 0 to the mesh region;
S4, marking the image containing the QR code as a non-object region after values are assigned to the mesh regions;
S5, scanning the non-object region from top to bottom line-by-line as well as from left to right column by column, marking the union of the mesh regions continuously with the value 1 for the first time in each line and the mesh regions continuously with the value 1 for the first time in each column as an object region, and marking the union of other regions as a non-object region;
S6, recoding the number of mesh regions and the number of pixel points in the length direction of the object region, the number of mesh regions and the number of pixel points in the width direction of the object region and the number of mesh regions with the value 1 in the object region, and judging whether the object region is the QR code region or not;
if the object region is not the QR code region, returning to step S5 to perform corresponding operation again;
if the object region is the QR code region, outputting the line numbers and the column numbers of the pixel points corresponding to the boundaries of the object region.

US Pat. No. 10,625,954

DEVICE AND METHOD FOR GRABBING AND STORING TWO-DIMENSIONAL CODE CARD

FUJIAN LANDI COMMERCIAL E...

1. A two-dimensional code card grabbing and storage device, characterized by comprisinga horizontal base plate;
first side plates and second side plates sequentially disposed on a front side and a rear side of the horizontal base plate separately in the horizontal direction and perpendicularly fixed to an upper surface of the horizontal base plate, the first side plates being lower than the second side plates;
two first baffles extending inwards are oppositely and perpendicularly disposed on outer sides of the two first side plates; and
two second baffles extending inwards are oppositely and perpendicularly disposed on inner sides of the two second side plates;
a first guide plate used for storing tested two-dimensional code cards is obliquely disposed upward between the two first side plates; and
a second guide plate used for storing to-be-tested two-dimensional code cards is obliquely disposed upward between the two second side plates;
wherein the two-dimensional code card grabbing and storage device further comprises a grabbing plate used for grabbing the to-be-tested two-dimensional code cards, a nano micro-suction material adheres to one side of the grabbing plate, and the other side of the grabbing plate is fixedly connected with a mechanical claw controlled by a mechanical claw driving mechanism; the mechanical claw is disposed beside the second side plates, and the distance between the two first baffles and the distance between the two second baffles are greater than the width of the grabbing plate and smaller than the width of the two-dimensional code cards.

US Pat. No. 10,678,720

METHOD AND SYSTEM FOR PROVIDING SOLUTION TO ADB PORT OCCUPANCY

FUJIAN LANDI COMMERCIAL E...

1. A method for providing a solution to Android Debug Bridge ADB port occupancy, comprising: associating a vendor ID and a product ID of an ADB device with a preset interface number; adding functional compound information to attribute information of the ADB device, wherein the functional compound information includes the vendor ID and the product ID of the ADB device and the corresponding interface number; setting descriptor information of the ADB device as preset descriptor information if the vendor ID and the product ID of the ADB device are consistent with a preset vendor ID and a preset product ID; adding the preset vendor ID, the preset product ID and a corresponding interface number to an ADB driver information file of a PC device; modifying a communication port number into a preset port number in an ADB communication program of the PC device; connecting the ADB device to the PC device; installing a corresponding ADB driver by the PC device according to the ADB driver information file corresponding to the vendor ID and the product ID if it is determined by the PC device that the vendor ID and the product ID of the ADB device and the corresponding interface number are consistent with the preset vendor ID, the preset product ID and the corresponding interface number and that the descriptor information of the ADB device is the preset descriptor information; and setting the communication port number between the PC device and the ADB device as the preset port number.

US Pat. No. 10,447,309

RS ERROR CORRECTION DECODING METHOD

FUJIAN LANDI COMMERCIAL E...

1. A Reed-Solomon (RS) error correction decoding method, characterized in that,when encoding at a sending terminal, code words of information data are represented by K1, code words of redundant codes are represented by Tn, the order of primitive polynomial P(x) is m, a generator polynomial in GF(2m) is G(x), and an error correction code is represented by (c, k, t), wherein c is the total length of the information data and the redundant code, k is the length of the information data, and t is the length of the redundant code, then the code word polynomial Q(x) is represented as

root of the m-order primitive polynomial P(x) is primitive field element in GF(2m), and the primitive field element is represented by ?, thus the generator polynomial G(x) is represented as

a lookup table f(?j) is established for different power exponents of ?, wherein the value of j is selected from all the integers ranging from 0 to 2m?1, with a total number of 2m;
the generator polynomial G(x) is expanded to obtain a polynomial with respect to x, wherein the coefficients of the generator polynomial G(x) are the addition or subtraction of the power exponents of ?;
numerical values of the different power exponents of ? are found out through the lookup table f(?j) and the coefficients of the generator polynomial G(x) are calculated;
it is assumed that the code words Tn of the redundant codes are all 0, then a code word polynomial
is obtained;the code word polynomial Q(x) is divided by the generator polynomial G(x) to obtain a remainder polynomial

the coefficients Ti of R(x) are the addition or subtraction of the power exponents of ?;
numerical values of the power exponents of ? are found out through the lookup table f(?j), and the coefficients of the remainder polynomial R(x) are calculated, namely, the code words Tn of the redundant codes;
wherein the error correction decoding process includes:
assuming that s is the maximum number of error correction bits of the receiving terminal, let t=2s+1;
dividing the code word polynomial Q(x) by the generator polynomial G(x) to obtain the remainder polynomial R(x),

calculating the coefficients of the remainder polynomial R(x), thus obtaining the code words Tn of 2s+1 redundant codes, n=1, 2, . . . , 2s+1;
sending, by the sending terminal, information data and 2s+1 redundant codes to the receiving terminal;
receiving, by the receiving terminal, the information data and 2s+1 redundant codes;
obtaining, by the receiving terminal, the code word polynomial Q(x) according to the received information data and 2s+1 redundant codes, and the code word polynomial Q(x) being represented as:

calculating, by the receiving terminal, 2s+1 correctors Si, wherein Si=Q(?j), i=1, 2, . . . , 2s+1;
calculating a location of an error information code and a correction value using correctors S1 to S2s, if not all of the correctors Si are equal to 0;
adding the correction value to the code word at the location of the error information code received by the receiving terminal to obtain an error-corrected code word;
assigning the value of the error-corrected code word to the code word at the location of the error information code;
recalculating S2s+1=Q(?2s+1), wherein if S2s+1=0, the error correction is successful.