WO2022027096A1 - System and method for persistent contactless check-in - Google Patents
System and method for persistent contactless check-in Download PDFInfo
- Publication number
- WO2022027096A1 WO2022027096A1 PCT/AU2021/050847 AU2021050847W WO2022027096A1 WO 2022027096 A1 WO2022027096 A1 WO 2022027096A1 AU 2021050847 W AU2021050847 W AU 2021050847W WO 2022027096 A1 WO2022027096 A1 WO 2022027096A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user device
- unique
- tag
- application server
- cookie
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 230000002085 persistent effect Effects 0.000 title claims abstract description 14
- 235000014510 cooky Nutrition 0.000 claims abstract description 76
- 238000004891 communication Methods 0.000 claims description 7
- 238000012546 transfer Methods 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 description 7
- 239000000284 extract Substances 0.000 description 4
- 238000009877 rendering Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 208000025721 COVID-19 Diseases 0.000 description 2
- 241000220225 Malus Species 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- 208000035473 Communicable disease Diseases 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 235000021016 apples Nutrition 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 208000015181 infectious disease Diseases 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
- G06K7/10376—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications the interrogation device being adapted for being moveable
- G06K7/10386—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications the interrogation device being adapted for being moveable the interrogation device being of the portable or hand-handheld type, e.g. incorporated in ubiquitous hand-held devices such as PDA or mobile phone, or in the form of a portable dedicated RFID reader
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Social work or social welfare, e.g. community support activities or counselling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the present application relates to systems and methods for checking in, i.e., recording a person's physical presence at a physical location, e.g., at a venue such as a workplace, a club, a restaurant, a cinema, a shop, a gallery, a museum or a stadium.
- a venue such as a workplace, a club, a restaurant, a cinema, a shop, a gallery, a museum or a stadium.
- a method for persistent contactless check-in by a user device including (automatically): a. the user device detecting, by non-contact communication (NCC), a NCC tag at a venue (or other physical place or location), wherein the NCC tag includes a uniform resource locator (URL), wherein the URL conforms to the Hypertext Transfer Protocol (HTTP) and includes: i. a domain that defines a server domain in the Internet, ii. a hostname in the server domain that defines a remote server address, and iii. text representing a tag identifier (ID) that identifies the NCC tag and the venue; b. the user device receiving, from the NCC tag, the URL; c.
- NCC non-contact communication
- URL uniform resource locator
- HTTP Hypertext Transfer Protocol
- the user device determining whether a cookie associated with the domain is stored on the user device; d. the user device identifying, if there is a stored cookie, a unique identifier (ID) stored in local storage of the user device (either in the stored cookie, or as data/values in the local storage of the user device associated with the cookie or the domain); e. the user device sending at least one HTTP request (including using a cryptographic protocol) to an application server based on the remote server address, wherein the HTTP request includes: i. the tag ID, and ii. the encrypted data/values containing the unique ID, if the cookie and unique ID are stored on the user device; f.
- ID unique identifier
- the user device receiving at least one HTTP response (including using the cryptographic protocol), the HTTP response including, from the application server: i. an acknowledgement of safe receipt of the tag ID (indicating that the venue has previously been registered in the system) if the HTTP request did include the unique ID, or ii. a newly generated unique ID (e.g., in a newly generated cookie), if the HTTP request did not include the unique ID; and g.
- the user device receiving a newly generated cookie with a domain attribute including the domain, and storing the cookie on the user device for use when a further NCC tag is detected with a domain in the domain attribute of the cookie, and storing the new unique ID in the cookie or as data/values in the local storage of the user device (thus the user device records that this user device has been registered in the system, and this registration can be referred to as "persistent").
- the application server if the tag ID matches any one of the predefined tag IDs (thus indicating that the tag has previously been registered in the system), and if the unique ID — if there is one — matches any one of the registered unique IDs (indicating that the user device has previously been registered in the system), the application server recording an event in an event log in the database and/or generating an acknowledgement of safe receipt of the tag ID for the HTTP response.
- the method includes, if the application server determines that the HTTP request does not include the unique ID: a. the application server (automatically) sending a user input form to the user device (in an HTTP response); b. the application server receiving a completed user input form from the user device; and c. the application server (automatically) generating the unique ID for this user device using the completed user input form (such that the unique ID is unique and anonymous in the system) for sending to the user device in the HTTP response for storing in the user device.
- Disclosed herein is a system for persistent contactless check-in by a user device, the system including the user device and an application server, wherein the user device and the application server are configured to execute the method disclosed herein.
- Disclosed herein is machine readable executable code configured to execute the methods above.
- Figure 1 is a flow diagram of a method
- Figure 2 is an architecture diagram a system configured to execute the method.
- Described herein is a method 100 for persistent contactless check-in by a user device, and a corresponding system 200 configured to execute (i.e., perform) the method.
- the method includes (on a user-device side of the system, also referred to as the client side): a. the user device detecting, by non-contact communication (NCC) of a NCC tag — including by near field communication (NFC) with a NFC tag or by optical scanning of a Quick Response (QR) code on a QRtag — a at a venue (or other physical place or location), wherein the NCC tag includes and defines a uniform resource locator (URL), wherein the URL conforms to the Hypertext Transfer Protocol (HTTP) and includes: i. a domain (e.g., "example.com”) that defines a server domain in the Internet, ii.
- NCC non-contact communication
- NFC near field communication
- QR Quick Response
- URL uniform resource locator
- HTTP Hypertext Transfer Protocol
- a hostname in the server domain (e.g., "www.example.com") that defines a remote server address, and iii. text representing atag identifier (ID) (e.g., "tagl”) that identifies the NCC tag and the venue;
- the user device receiving, from the NCC tag, the URL;
- the user device determining whether a cookie associated with the domain is stored (i.e., present) on the user device (thus indicating that this user device has been previously registered in the system); d.
- the user device identifying, if there is a stored cookie, a unique identifier (ID) stored in local storage of the user device (either in the stored cookie, or as data/values in the local storage of the user device); e. the user device sending at least one HTTP request (including using a cryptographic protocol as described hereinafter, e.g., TLS/SSL) to an application server based on the remote server address, wherein the HTTP request includes: i. the tag ID (e.g., in the request line of the HTTP request), and ii. the encrypted data/values containing the unique ID (e.g. in the cookie), if the cookie is stored on the user device; f.
- a cryptographic protocol as described hereinafter, e.g., TLS/SSL
- the user device receiving at least one HTTP response (including using the cryptographic protocol as described hereinafter), the HTTP response including, from the application server: i. an acknowledgement of safe receipt of the tag ID (indicating that the venue has previously been registered in the system) if the HTTP request did include the unique ID, or ii. the unique ID (e.g., in a newly generated cookie), if the HTTP request did not include the unique ID; and g.
- the user device receiving a newly generated (new) cookie with a domain attribute including the domain, and storing the cookie on the user device for use when a further NCC tag is detected with a domain in the domain attribute of the cookie, and storing the new unique ID in the cookie or as data/values in the local storage of the user device (thus the user device records that this user device has been registered in the system, and this registration can be referred to as "persistent").
- the HTTP request does not include the cookie or unique ID.
- the method can include: a. the user device receiving, from the application server, a user input form (e.g., a user registration form, which can accord to an HTTP format sent as at least one HTTP response to the user device); b. the user device rendering and displaying the user input form on a user interface of the user device; c.
- a user input form e.g., a user registration form, which can accord to an HTTP format sent as at least one HTTP response to the user device
- the user device rendering and displaying the user input form on a user interface of the user device; c.
- a completed user input form i.e., user input data, e.g., including a user's name and telephone number, entered into the user input form, which are used to generated the user passport
- the user device validating the user input for all input fields (of the user input form) according validation rules in the user input form, e.g., using Javascript validation rules for text-input fields of the user input form, e.g., requiring a telephone number field to receive only numbers — this is referred to as "client-side validation"
- client-side validation e. the user device sending, to the application server, the completed user input form (i.e., the user input data).
- the completed user input form i.e., the user input data
- the cookie and unique ID e.g., in the cookie
- the cookie and unique ID are subsequently sent back to the user device in an HTTP response.
- the unique ID may be referred to as a "device ID" because it is substantially unique in the system, i.e., a unique identifier for the device, and because an encrypted copy of the unique ID is stored on the device.
- the unique ID is encrypted except in the application server, i.e., the unique ID is generated then encrypted by the application server (which stores encryption keys used for the encryption in the application server, or at least securely accessible from), and remains encrypted when it is sent in the HTTP response, when it is stored in the user device, and when it is sent with the HTTP request.
- the application server creates the cookie the first time by encrypting an auto generated random universal unique ID (the unique ID), e.g., a UUID as described hereinafter.
- the application server add the encrypted unique ID to the cookie, and then the application server signs the cookie (by creating a HMAC of the stored cookie, and base64 encoding it).
- the signed cookie is then set in the response header and sent back to a HTTP client in the user device.
- the encrypted unique ID may be sent in the cookie, or as encrypted data/values in a message body of the HTTP response.
- the HTTP client (and thus the user device) then stores the cookie locally, and stores the encrypted unique ID locally (including if it sent in the HTTP response message body as encrypted data/values).
- the method includes: a. the application server receiving the tag ID and the unique ID (if there is one) of the at least one HTTP request from the user device; b. the application server determining whether the tag ID in the HTTP request matches any of a plurality of predefined tag IDs in the database (i.e., the tag ID is valid and registered); c. if there is a valid unique ID in the HTTP request, the application server: i. decrypting the unique ID using the encryption keys, and ii. determining whether the unique ID in the HTTP request matches any of a plurality of registered unique IDs in the database (i.e., the unique ID is valid and registered); and d.
- the application server if the tag ID does match any one of the predefined tag IDs (thus indicating that the tag has previously been registered in the system), and if the unique ID — if there is one — matches any one of the registered unique IDs (indicating that the user device has previously been registered in the system), the application server recording an event in an event log in the database (and generating an acknowledgement of safe receipt of the tag ID for the HTTP response); or e. otherwise (if the tag ID or the unique ID is not registered or otherwise invalid), the application server generating and sending an invalid-request message for the HTTP response (or simply continuing with the method as if no unique ID had been received).
- the method includes the application server validating the encrypted data containing the unique ID (which can be the signed cookie) to ensure no tampering of the encrypted unique ID/cookie has occurred, and then the application server decrypting the data/values (e.g., within the cookie) to retrieve the unique ID, before determining if the unique ID matches any of the registered IDs in the database.
- the application server validating the encrypted data containing the unique ID (which can be the signed cookie) to ensure no tampering of the encrypted unique ID/cookie has occurred, and then the application server decrypting the data/values (e.g., within the cookie) to retrieve the unique ID, before determining if the unique ID matches any of the registered IDs in the database.
- the method includes: a. the application server determining whether the HTTP request included the valid unique ID; and b. if the HTTP request does not include the unique ID: i. the application server sending the user input form ("user registration form") to the user device (in at least one HTTP response), ii. the application server receiving the completed user input form from the user device, and iii. the application server generating the unique ID for this user device using the completed user input form, such that the unique ID is unique and anonymous in the system, for sending to the user device in the HTTP response for storing in the (persistent) cookie or the local storage of the HTTP client / user device.
- the application server determining whether the HTTP request included the valid unique ID; and b. if the HTTP request does not include the unique ID: i. the application server sending the user input form ("user registration form") to the user device (in at least one HTTP response), ii. the application server receiving the completed user input form from the user device, and iii. the application server generating the unique ID for this user device using
- the method includes the application server validating the completed user input form, and only generating the unique ID for this user device using the completed user input form if the completed user input form is determined to be valid.
- the method includes the application server validating fields of the completed user input form according validation rules in the application server, e.g., using the same validation rules as in the user input form described hereinbefore — this is referred to as "server-side validation". If the serverside validation detects an error, the method includes the application server sending an HTTP response back to the user device with data indicating the error, and the user device rendering and displaying the error and again rendering and displaying the user input form on the user interface of the user device (to again generate the completed user input form, i.e., repeating the earlier step).
- the method includes the application server storing a user-device entry (referred to as a new user passport entry) in the database based on the completed user input form, wherein the user-device entry includes the unique ID.
- the application server generates a random code to form the unique ID (e.g., UUID) and stores it together with the user input form data in the database as the new user passport entry.
- the unique ID will be the lookup value for this user passport data.
- the method includes the application server storing a check-in entry in the database with: the tag ID and the unique ID, by storing, in the database, timestamp data representing the time and date of the step of the user device detecting the NCC tag (which may be referred to as an "NCC event").
- NCC event may be recorded by the NCC system based on a machine-readable clock in the user device.
- the time and date of the NCC event may be may be generated by the user device when generating the HTTP request.
- the user device sends the time and date with the HTTP request to the application server for recordal in a log of NCC event logs (the time and date is stored as timestamp data in the database with reference to the unique ID and the tag ID as described hereinafter).
- the timestamp data are generated using Coordinated Universal Time (i.e., "UTC" by the application server and the time and date are not provided by the user device.
- UTC Coordinated Universal Time
- the NFC tags are commercially available NFC tags or QRtags configured to store one URL.
- the scheme, the domain, the server address and the tag ID are combined in the one URL according the HTTP standard.
- the scheme of the URL can be "HTTP".
- the URL can include an indicator of the cryptographic protocol ("S" in "HTTPS"), and the cryptographic protocol can be Transport Layer Security (TLS) or Secure Sockets Layer (SSL).
- the method can include the user device and the application server using the cryptographic protocol to send and receive the HTTP requests and responses described herein.
- the HTTP request conforms to the communications protocol defined by the scheme, e.g., HTTP, including the cryptographic protocol.
- the response conforms to the same communications protocol, e.g., HTTP.
- the URL includes the text representing the tag ID (e.g., "tagl”) that identifies the NCC tag (and the venue): the tag ID text is included in the path and/or filename, and HTTP components appended to the path, of the URL — i.e., elements of the URL beyond the hostname and the domain.
- the tag ID may be "tagl”
- the path may be "/tagl” .
- the encrypted unique ID in the user device's storage, in the HTTP request and in the HTTP response is the only reference or link to the user passport stored in the database: accordingly, use of a system-unique device ID (e.g., a UUID) avoid storage and transmission of identifiable details (e.g., in the browser cookie), which may be easily accessible in plain text.
- a system-unique device ID e.g., a UUID
- identifiable details e.g., in the browser cookie
- the user device includes an NFC system or QR code reader (which are referred to here as “NCC systems”) and the HTTP client.
- NCC systems NFC systems
- HTTP client HTTP client
- the NFC system of the user device can be a commercially available component that detects NFC tags when placed in close range (defined by the NFC standards).
- the QR code reader of the user device can be a commercially available component, e.g., of a camera module, that detects QR codes when placed in optical range.
- the method includes the user device, and specifically the NCC system, automatically activating the HTTP client with the URL when the NCC system detects the NFC tag with the URL.
- the automatic activation of the HTTP client by the NCC system may require confirmation by the user, e.g., authenticating via a passcode or biometric challenge (e.g., the user interface may display a prompt "Open 'domain' in Safari" requiring the user input confirmation to activate the HTTP client).
- the native NFC system may operate with fewer user-required inputs than the QR code reader, so using the NFC tag as the NCC tag may be preferable: for example, the user device may be natively configured to activate the NFC system with fewer or more convenient user inputs than to activate the QR code reader.
- the user device includes an HTTP client (referred to as a "Web browser") configured to access cookies (including the cookie), i.e., a Web browser with cookies enabled.
- the user device is configured to automatically activate or open the HTTP client with the URL when the NCC system detects the URL in the NCC tag.
- the HTTP client is configured to automatically generate and send the HTTP request when it is activated with the URL.
- the HTTP client may be based on a commercially available component, e.g., Apple's Safari or Google's Chrome.
- the HTTP client includes a cryptographic module configured to execute the steps described herein of establishing and using the encrypted session with the application server for the HTTP requests and responses in accordance with the cryptographic protocol (TLS, SSL).
- TLS cryptographic protocol
- the HTTP client is configured to determine a time and date of the request being generated and send this with the HTTP request as the time and date of the NCC event (e.g., using the "Date" header field). Alternatively, the HTTP client does not provide the time and date (when the time and date are not provided by the user device).
- the user device includes a network connection to support the Internet protocol.
- the user device typically includes a wireless data connection for the network connection, e.g., via Wi-Fi and/or a mobile protocol (4G/5G).
- the user device is a small manually portable device that can be hand held.
- An exemplary user device can be a smart phone or watch, e.g., having Apples iOS or Google's Android operating systems.
- the method includes the HTTP client determining whether the cookie is stored in the user device in association with the domain of the URL.
- the HTTP client performs the user-interface steps of the user device described hereinbefore, including: receiving, from the application server, the user input form (sent as an HTTP response to the HTTP client); rendering and displaying the user input form on the user interface (e.g., a touchscreen); generating, based on the user input, the completed user input form (i.e., collecting the user input data); and sending, to the application server, the completed user input form (i.e., the user input data), via an HTTP request.
- the cookie stores the unique ID.
- the herein-described system and method can store the unique ID in the local storage of the user device, specifically in local storage of the HTTP client, with a link or pointer or reference to the domain or the cookie such that the unique ID is sent automatically with the HTTP request (or in a subsequent HTTP request to the same server as the original HTTP request).
- the user device in this case is configured to include the encrypted unique ID in the HTTP request, e.g., in the message body of the request.
- the unique ID is generated for the user device by the system (by the application server) such that each user device that is registered with the system should have a unique and anonymous unique ID.
- the unique ID is the only information used to identify the user device by the method described herein, and the unique ID is only associated with other identity details of the user device (referred to as the "user passport", e.g., including telephone number, user's name) in the database of the application server.
- the unique ID is used as lookup reference for the user passport in the database.
- the unique ID is generated using an algorithm that ensures each unique ID is substantially unique in the system.
- the unique ID may be a universally unique identifier (UUID) or globally unique identifier (GUID), e.g., a 128-bit number, generated by the application server, e.g., 4e49a70b-54a5- 473e-9f95-a367ca2a80c6.
- the UUID may be generated using a commercially available component.
- the cookie may be referred to as a "state object".
- the cookie includes a domain attribute which includes and/or defines the domain that leads to the application server.
- the cookie is transmitted from the HTTP client to the application server only when the HTTP client makes the HTTP request and the server address is within the domain of the domain attribute of the cookie.
- the system includes the application server.
- the application server is based on a commercially available component that is configured by machine readable executable code to process the received HTTP requests and return the responses.
- the method includes the application server performing the following steps by executing the executable code: a. extracting the tag ID from the URL; b. extracting the unique ID (e.g., UUID) from the encrypted cookie or encrypted data/values if the cookie and encrypted unique ID are in the HTTP request (including determining if the cookie and/or the encrypted unique ID are in the HTTP request, which is indicative of the user device having been registered with the system); c.
- UUID unique ID
- the system may include a web server based on a commercially available component that can process the HTTP requests and responses.
- the webserver may be referred to as a component of the application server.
- the webserver may be configured by at least a portion of the executable code to perform one or more of the hereinbefore described steps executed by the application server by executing the executable code.
- the method can includes the web server extracting the tag ID from the path and/or filename, and extracting the unique ID (e.g., UUID) from the cookie or encrypted data/values, and sending the unique ID and the corresponding tag ID to the application server using a protocol that is not an HTTP request, e.g., using a low-level Transmission Control Protocol (TCP) between web server and the application server, and data in transmission between the web server and the application server can be encrypted, using with the RSA (Rivest- Shamir-Adleman) algorithm.
- TCP Transmission Control Protocol
- RSA Rastert- Shamir-Adleman
- UserPassport table a table of the User Passport Details
- NFCLog table a table of NCC event logs
- IntemallDMap table a table of internal ID mapping
- Organisation table a table of Organisation Details
- OrganisationLocation table a table of Locations referencing to an Organisation
- the application server extracts the tag ID from the HTTP request by reading the text representing the tag ID (e.g., "tagl") venue in the URL.
- the tag ID e.g., "tagl”
- the system includes the user device and the application server.
- the system includes a plurality of user devices, each one with the hereinbefore described components of the user device.
- the system includes a plurality of NCC tags, each including a URL configured with the same format as the one NCC tag hereinbefore described, but the plurality of URLs include mutually different URLs.
- the plurality of URLs can include mutually the same scheme (e.g., HTTP/S), the same domain (e.g., "example.com") and the same hostname (e.g., "www”), but a plurality of mutually different tag IDs (e.g., "tagl", "tag2", ... "tagN").
- the database can be configured to include the plurality of tag IDs associated with respective venues.
- the plurality of NCC tags may include two or more NCC tags with mutually the same tag ID, both associated in the database with one venue, e.g., for a large venue with multiple entrances, or to provide spare NCC tags to the one venue.
- the method includes programming the NCC tag with the URL, i.e., writing the URL into the NCC tag.
- the NCC tag is based on a writeable and readable blank NCC tag. Tag IDs are generated automatically by the application server when respective new organisation locations are created
- the system includes machine readable executable code executed by the system, and the machine readable executable code when executed causes the system to perform the following sub-processes: a. a sub-process for registering the new log or showing the user input form; and b. a sub-process for creating the new User Passport from the completed user input form.
- the sub-process executed by the application server for registering the new log or showing the user input form includes: a. Extract tag ID from URL and assign to TagID; b. Query database (DB) for existing record of business location using TagID and assign to LocationRecord; c. If LocationRecord is empty then: i. Throw error for location not found; d. Extract signed cookie from request and assign to SignedCookie; e. If SignedCookie is found then: i. Parse and decode SignedCookie with Secret Key and return value to Cookie Value, ii. If CookieValue is invalid:
- Throw error for insert fail and viii. Send response back to user device and show success page; f. else g. Send response back to user device and show user input form.
- the sub-process executed by the application server for creating the new User Passport from the completed user input includes: a. Extract tag ID from URL and assign to TagID; b. Query DB for existing record of business location using TagID and assign result to LocationRecord; c. If LocationRecord is empty then: i. Throw error for location not found; d. Validate user input form values and assign errors to Errors; e . If Errors is not empty then: i. Send response back to user device with Errors; f. Generate new random unique ID (e.g. UUID) and assign to DevicelD; g. Insert new DB User Passport record with user input values and DevicelD; h.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Databases & Information Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- General Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Maintenance And Management Of Digital Transmission (AREA)
- Liquid Crystal Substances (AREA)
- Communication Control (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021319948A AU2021319948A1 (en) | 2020-08-04 | 2021-08-04 | System and method for persistent contactless check-in |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2020902724 | 2020-08-04 | ||
AU2020902724A AU2020902724A0 (en) | 2020-08-04 | System and method for persistent contactless check-in |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022027096A1 true WO2022027096A1 (en) | 2022-02-10 |
Family
ID=80119067
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2021/050847 WO2022027096A1 (en) | 2020-08-04 | 2021-08-04 | System and method for persistent contactless check-in |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2021319948A1 (en) |
WO (1) | WO2022027096A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130059603A1 (en) * | 2011-09-07 | 2013-03-07 | Mathieu Guenec | Method and system for accessing places |
US20130166917A1 (en) * | 2011-12-23 | 2013-06-27 | Ebay, Inc. | Authenticated checkin via passive nfc |
US20130214901A1 (en) * | 2010-12-02 | 2013-08-22 | Viscount Systems Inc. | System, station and method for mustering |
WO2014055666A1 (en) * | 2012-10-02 | 2014-04-10 | Archuleta Michael | System and method for providing mobile websites |
US20190080058A1 (en) * | 2014-08-22 | 2019-03-14 | John K. Thomas | Verification system for secure transmission in a distributed processing network |
-
2021
- 2021-08-04 WO PCT/AU2021/050847 patent/WO2022027096A1/en active Application Filing
- 2021-08-04 AU AU2021319948A patent/AU2021319948A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130214901A1 (en) * | 2010-12-02 | 2013-08-22 | Viscount Systems Inc. | System, station and method for mustering |
US20130059603A1 (en) * | 2011-09-07 | 2013-03-07 | Mathieu Guenec | Method and system for accessing places |
US20130166917A1 (en) * | 2011-12-23 | 2013-06-27 | Ebay, Inc. | Authenticated checkin via passive nfc |
WO2014055666A1 (en) * | 2012-10-02 | 2014-04-10 | Archuleta Michael | System and method for providing mobile websites |
US20190080058A1 (en) * | 2014-08-22 | 2019-03-14 | John K. Thomas | Verification system for secure transmission in a distributed processing network |
Non-Patent Citations (1)
Title |
---|
SWIPEDON, 13 September 2021 (2021-09-13), Retrieved from the Internet <URL:https://web.archive.org/web/20200508112544/https://www.swipedon.com> [retrieved on 20200508] * |
Also Published As
Publication number | Publication date |
---|---|
AU2021319948A1 (en) | 2023-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1968093B (en) | Offline methods for authentication in a client/server authentication system | |
US20170245148A1 (en) | Wireless security and network system employing short range magnetic induction communication of encoded identifiers | |
US20160337358A1 (en) | Method for encoding an access to a computer resource | |
JP5138920B2 (en) | Visit confirmation information processing system | |
US10341323B1 (en) | Automated method for on demand multifactor authentication | |
US8566957B2 (en) | Authentication system | |
US20200366669A1 (en) | Systems and methods for activating an authentication token within a communication platform | |
US20140101772A1 (en) | Input method, input apparatus, and input program | |
CN111770072B (en) | Method and device for accessing function page through single sign-on | |
US8800014B2 (en) | Authentication method | |
US9654431B1 (en) | Automated email account verification | |
JP2017107440A (en) | Server device and electronic ticket system | |
WO2012110897A2 (en) | Verifying the location of a mobile communication device | |
JPWO2015198874A1 (en) | Drug history information management device and method, registration terminal device and method, and program | |
JP2008123335A (en) | Service providing system by server and service providing method | |
US20190268323A1 (en) | On demand multifactor authentication | |
WO2022027096A1 (en) | System and method for persistent contactless check-in | |
EP3400695A1 (en) | System, method and apparatus for data transmission | |
US10764283B1 (en) | Monitoring to trigger on demand multifactor authentication | |
KR20220066215A (en) | Visit history registration method using smartphone | |
CN102946397A (en) | User authentication method and user authentication system | |
JP6025118B2 (en) | Electronic coupon usage method and electronic coupon usage system | |
CN113742702A (en) | Method, system, equipment and storage medium for safety access based on enterprise WeChat | |
KR101466675B1 (en) | Location based two channel user authentication assistive apparatus and method | |
KR102153793B1 (en) | Method and system for providing automatic inquiry service of user id |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21852718 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021319948 Country of ref document: AU Date of ref document: 20210804 Kind code of ref document: A |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03/07/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21852718 Country of ref document: EP Kind code of ref document: A1 |