AU2016334876A1 - Method and system for accessing data using a symbol - Google Patents
Method and system for accessing data using a symbol Download PDFInfo
- Publication number
- AU2016334876A1 AU2016334876A1 AU2016334876A AU2016334876A AU2016334876A1 AU 2016334876 A1 AU2016334876 A1 AU 2016334876A1 AU 2016334876 A AU2016334876 A AU 2016334876A AU 2016334876 A AU2016334876 A AU 2016334876A AU 2016334876 A1 AU2016334876 A1 AU 2016334876A1
- Authority
- AU
- Australia
- Prior art keywords
- symbol
- code
- user
- data
- paths
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/98—Detection or correction of errors, e.g. by rescanning the pattern or by human intervention; Evaluation of the quality of the acquired patterns
- G06V10/993—Evaluation of the quality of the acquired pattern
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
Landscapes
- Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A system of accessing data represented by a symbol or sign (2) after image capture of the symbol and to be displayed on a device, said system including a device (12) having image capturing means for capturing and storing said symbol (2), said symbol (2) having a code (35) identifying the symbol, server means (16) in communication with said device (12) for receiving said code (35), database means (32) in communication with said server means (16) and storing a plurality of codes representing a plurality of symbols, wherein said server means (16) determines if the code (35) is valid, and if valid, sends a message to said device (12) with data associated with said code (35) for display on the device (12).
Description
Field of the Invention
This invention relates to a method and system of enabling access to real-time data from a symbol or sign. More particularly the invention relates to a method and system for enabling the display on a device of real-time data by capturing information from the symbol or sign using the device. The invention also relates to a method of encoding a symbol or sign that displays data on a device after image capture of the symbol or sign.
Background of the Invention
To facilitate easy and quick identification of products, barcodes have been used as a convenient way to convey information about products, particularly about inventory and at point of sale scanning. Barcodes in particular are intended to relay specific information about an item to a device, such as a scanner, or computer storage facility for end use by a system or by a user.
In more recent times quick response codes or QR codes have been used in advertising, information sharing networks and in social media where such codes are made available in public, for example on posters, flyers, printed publications or websites. A QR code is essentially a matrix bar code or a two-dimensional bar code. Each QR code has three squares at its periphery to position and align it with an image capture device when read. A set of characters is formed using mathematics and this forms a website IP address. End users can capture such codes with an image capture device, such as on a mobile phone, in order to access more information about that product.
A particular problem with bar codes is that they only identify or distinguish one product from another without giving further information about the product, for example where it is made, how it was produced or what it consists of. QR codes have to some extent overcome this problem by enabling users to capture a QR code with a device camera which can then access a website through a browser on the device that can give much further detailed information about the product for the user, with the information being displayed on the device.
However QR codes have recently been used for malicious activity and malicious transactions whereby misuse or corruption of a code is processed by a device camera and can direct the user to a malicious website to obtain confidential information about the user or to download malicious software onto the device itself. As an example, malicious QR codes can be in the form of a sticker which is placed over a legitimate QR code with the malicious QR code effectively representing a scam advertisement and has no affiliation with the original QR code representing a product of a company. Other occurrences have been where a specific QR code has been placed on a consumer product and has directed a user to an adult website or some other
WO 2017/059479
PCT/AU2016/000343 malicious website simply because that site had no longer been used by the product manufacturer and was subsequently sold on to another content provider. In such situations where the users are caught in this manner, the original manufacturer may have to recall all of the products affected in the market or to make an arrangement with the new owner of the website. There is no security with QR codes and it is relatively easy, without the user kno wing, of receiving a virus on a smartphone which can then be forwarded on to a website or to the user’s bank account.
Generally only one-third of the QR code needs to be showing in order to be read by an image capturing device, which is another disadvantage.
The present invention seeks to overcome one or more of the above disadvantages by providing a method and system of retrieving real-time date about a product or service in a secure environment where’the user can capture the symbol or image and securely access further information or data associated with the symbol or image.
Summary of the Invention
According to a first aspect of the invention, there is provided a system of accessing data represented by a symbol after image capture of the symbol and to be displayed on a device, said system including:
a device having image capturing means for capturing and storing said symbol, said symbol having a code identifying the symbol;
server means in communication with said device for receiving said code, database means in communication with said server means and storing a plurality of codes representing a plurality of symbols;
wherein said server means determines if the code is valid, and if valid, sends a message to said device with data associated with said code for display on the device.
The system may further include a second database to verify that the code identified as being valid is not fraudulent or blacklisted. The server means can generate a new symbol upon request and/or payment for use by a user. The system may further include a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user. The system may further include a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
According to a second aspect of the invention, there is provided a method of accessing data represented by a symbol, including the steps of:
capturing and storing the symbol using an image capturing means of a device, said symbol having a code identifying the symbol;
WO 2017/059479
PCT/AU2016/000343 sending said code to a server means;
said server means ascertaining if said code is valid by communicating with a database storing a plurality of codes representing a plurality of symbols; and sending a message to said device from said server means with data associated with said code for display on the device if said code is valid.
The method may further include verifying through a second database that the code identified as being valid is not fraudulent or blacklisted. It may further include generating a new symbol upon request and/or payment for use by a user. The method may further include providing a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user. It may further include providing a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
According to a third aspect of the invention, there is provided a method of encoding a symbol that displays data on a device after image capture of the symbol, the method including:
providing an outer path; providing an inner path;
providing one or more further paths located between the outer and inner paths, said one or more paths including at least one encryption path, preferably two encryption paths, and at least one data path;
encrypting a code unique to the symbol and encrypting data contained in any one of the data paths;
wherein the data to be displayed is encrypted and said data is displayed on the device after verification of said symbol.
The data can be in the form of links for the user to access and can encompass video, audio, graphics or text or any combination of these. The outer path can be circular and said one or more paths are rings concentric around the inner path. The one or more paths may have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit. The rings are preferably divided into a plurality of sectors. The data is preferably displayed over the captured symbol.
According to a fourth aspect of the invention, there is provided a computerreadable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a device to:
WO 2017/059479
PCT/AU2016/000343 access a unique code associated with the symbol;
transmit the code to a web server for further processing and verification;
receive data or information represented by the code; and display the data or information to the user of the device.
According to a fifth aspect of the invention, there is provided a computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a server means to:
receive a unique code associated with the symbol from a device;
check that it is a valid code by comparing the received code to a list of valid codes stored in a database;
send a message to said device with data or information associated with the symbol for the user to access.
The server may be directed to check that the code is not fraudulent using a further database.
According to a sixth aspect of the invention, there is provided a symbol or sign for displaying encrypted data on a device after image capture of the symbol by an image capture device, the symbol including:
an outer path and an inner path for aligning the image capture device; further paths located between the inner and outer paths, said further paths being encryption paths or data paths, said further paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit;
said symbol providing information represented by said symbol to be displayed on said device to a user after verification of the symbol or sign.
The symbol or sign may further including indication means for assisting in the correct detection of the number of further paths in the symbol or sign. Each of the further paths can be divided into a number of sectors. The symbol or sign may further include one or more markers to assist with perspective correction when an image of symbol or sign is scanned or captured.
Brief Description of the Drawings
A preferred embodiment of the invention will hereinafter be described, by way of example only, with reference to the drawings in which:
WO 2017/059479
PCT/AU2016/000343
Figure 1 is a schematic diagram showing an example of an encoded symbol or image, termed a QL code.
Figure 1A is a schematic diagram showing a further example of an encoded symbol or image;
Figure IB is a schematic diagram of a further embodiment of an encoded symbol or image showing sectors across paths located between an inner path and an outer path;
Figure 2 is a schematic diagram showing the capturing of a symbol or image by a device;
Figure 3 is a block diagram showing access to a web server over the internet through the device;
Figure 4 is a detailed block diagram of the process involved in checking the authenticity of the symbol or image and providing extra information abouhthat symbol or image to the user;
Figure 5 is a block diagram showing information sent over the internet to the device to display a message;
Figure 6 is a screen capture shot of a company console used by a company that owns one or more symbols or images;
Figure 7 is a screen capture shot of a user console displaying properties about the symbol or image used by the user; and
Figure 8 shows a list of Application Program Interfaces that can be used to create or purchase bulk QLcodes.
Detailed Description of the Preferred Embodiment
Referring to Figures 1, 1A and IB, there is displayed a symbol or graphical image 2 which is unique and specific to represent a product or service or other information about the owner or the owner’s business related to the symbol or image 2. The image 2 is referred to as a QLcode. The user or company that owns the symbol or image 2 can maintain data about any product or service to which the symbol relates and they can be presented to the viewer when the viewer captures the symbol using a capture device such as on a mobile phone, headset or tablet. Many such symbols can be created using this process with each symbol or image being unique and they can each iink back to its own data content. The data content can take any form such as text, graphic, video or audio. This data content can be viewed through the above mentioned devices or even a personal computer and the content can be overlaid on the symbol at the time of viewing.
The symbol or QLcode 2 has a unique ID or code which contains validation, CRC and encrypted data. The symbol 2 has an outer ring or outer, preferably continuous, path 4 which is relatively thick (compared to the inner rings), an inner perimeter or inner, preferably continuous,
WO 2017/059479
PCT/AU2016/000343 path 6 which is in the shape of a key hole, both ring 4 and perimeter 6 being used to enable an image capture device to properly align with the symbol. There are a number of other paths or rings 8, 10 and 11 located between the paths 4 and 6. Outer ring 4 and inner path 6 can both contain marker means in the form of four (or more) equidistant markers 7 embedded within the outer part of the inner path 6 and within the inner part of the outer ring 4. These markers 7 assist with perspective correction when an image of the QL code 2 is scanned or captured. The markers 7 can be located anywhere in the inner path 6 or outer path 4, including on either inner or outer portions/edges of paths 4 and 6. The markers 7 may or may not be included depending on the intended use of the QL code 2. On the inside of the right leg 9 of the keyhole-shaped path 6 is an indication means 5 in the form of fingers or projections (shown in white). The indication means 5 assists in the correct detection of the number of rings within the QL code 2. In this case, as depicted in Figure 1A, there are three rings 8, 10 and 11 indicated by the three white fingers. The indication means 5 can be located anywhere in the path 6 or against the inner or outer edges of the path 6. In between the outer ring 4 and inner path 6 there are a number o f rings that can range in number between 3 and 18. The rings are generally incomplete and made up of a combination of a first set of segments in the form of visible arcs (dark such as arc 21 in Figure IB), which signifies a bit value of 1, and a second set of segments in the form of empty arcs (white or not shown such as arc or space 23 in Figure IB) that signify a bit value of zero. In the example of Figures 1 and 1A there are three intermediate rings 8, 10 and 11 that are shown. These rings contain both the data content and the security bit values required in order to securely retrieve the corresponding data from the server.
Each of the rings 8, 10 and 11 for example are divided into equally sized sectors, typically 16 sectors such as sector 27 at the lower left side of image 2, sector 25 at the top of image 2 and sector 29 at the lower right side of image 2. These sectors are pie shaped, fanning out radially from the centre 31 of the inner keyhole, surrounded by path 6. The space 33 taken up by the lower part of the keyhole, surrounded by path 6, is not included in these sectors, that is, the number of degrees in a circle minus 54 degrees for the lower part 33 of the keyhole is divided evenly into typically 16 sectors, starting from sector 27 and going around the centre 31 to sector
29. Any number of sectors may be used as long as the resolution of the darker bit values of 1 can be distinguished satisfactorily by an image capture device. The rings between the outer ring 4 and the inner keyhole path 6 are evenly spaced so as to optimise the readability for the scanning device. The number of data rings multiplied by the number of sectors gives an approximation as to the maximum number of codes possible for any given combination.
WO 2017/059479
PCT/AU2016/000343
The data represented by the arcs, either zero or one, does not display the actual data values. Instead, the data is encrypted through a number of techniques in order to minimise the risk of data being retrieved that does not belong to that particular QLcode, captured through the image capture device, such as the camera of a mobile phone. The outer ring 4, the keyhole inner path 6 and the data rings (such as 8, 10 and 11) of the symbol 2 may be made any colour, or combination or colours. This is possible as long as the background of the symbol or code, where there is no data, is of a sufficient contrasting ratio to the colour of the outer ring 4, the keyhole path 6 and each of the data rings.
Each QLcode 2 is generated at a server, such as web server 16. The first ring, closest to the inner ring 8 (or any other designated ring), has information stored therein together with bits from other data rings. It determines which ring or rings has location data and what data is stored in the encrypted ring or rings. In another ring, encryption could start at a point in the ring which has data represented by information in some or all of the other rings. An operation, such as an Exclusive-OR (XOR) operation, can be performed with location in the grid that matches the number of rings and sectors and then XOR all of these together. In order to obtain the original data, another XOR operation is performed on this. Such an operation of encryption is the SHA or Secure flash Algorithm function.
Many codes like this can be stored securely at a web server and purchased for use by individuals or companies. Users can maintain, edit or delete codes through a management console, to be described with reference to Figures 6 and 7. The codes can be printed and then displayed either on a support or on packaging for access by the public.
Referring to Figures 2 and 3 there is shown the symbol 2 which can be displayed in public, for example on a product, billboard, website or printed publication which is captured by a data capture device 12, such as a mobile phone, tablet, headset or PC. The device 12 captures the image through image capture means 13 which is then processed by the image processing means 15 in the device 12. An application or app 17 that is stored on the device 12 scans the symbol or QLcode 2 through the image camera means 13 and passes the detected unique identification code 35 associated with the symbol 2, through a communications module and browser 19 to a web server 16 as shown in Figure 4. The scanning of the code 35 or symbol 2 by the app 17 is performed in a clockwise fashion, starting at the first bit on the lower left of the innermost ring 8. The scan proceeds clockwise and when it reaches the end of the first ring 8 it then moves onto the next ring and so on, moving outwards until the last bit on the outermost ring is read. These scanned bits determine the unique ID code 35. Thus the unique ID code (for example XYZ) 35 is transmitted to the web server 16 over the internet 14 along with the
WO 2017/059479
PCT/AU2016/000343 identification of device 12, its type, its location and any user preferences. If more than one code or symbol is detected then the user is prompted to select a specific code or symbol in which to capture. This is displayed on the display means of the device 12. The device 12 accesses webserver 16 via an encrypted https connection in order to retrieve a message that corresponds to the unique ID code 35 which has been captured in the image 2.
Referring to Figure 4, the data including the unique ID 35 of the scanned symbol is sent to web server 16 and is received by a gate keeper application program 18 which runs on web server 16. This validates or invalidates the received unique ID and confirms the device ID, type, location and user preferences.
At step 22 a decision is made as to whether the QLcode or ID is valid. If it is valid then the process passes to step 28 where a look up program 20 of the web server 16 is activated, forwarding on the ID type, location and user preferences. If at decision 22 the ID is not valid then a message is prepared and loaded at step 24 with a QLcode Error Reporting Page. The Reporting Page at step 24 can also be used to report a damaged, broken or invalid QLcode. At step 26 the error message is sent back to the device 12 over the internet 14.
On receipt of the ID code, as well as the other data at step 30, the look up program 20 checks the ID against an ID database 32 to see if that specific ID is stored in the database 32.
If, at decision box 34, it is determined that the code ID does exist and is matched, then the process moves to another decision box 36. If the code ID does not exist then the process moves to step 38 where a message is loaded and returned to the user device 12 over the internet 14 with a QLcode Error Reporting Page. At step 36 a determination is made as to whether the QLcode ID has expired. If it has, then at step 40 a message is loaded and returned to the user to explain that the QLcode ID has expired in a QLcode Expired Reporting Page. If the QLcode ID has not expired then at step 42 this ID is checked against a further database which includes a known list of IDs that are fraudulent. It is compared using the fraudulent or blacklist database 44. At step 46 if the QLcode has been blacklisted or is fraudulent then at step 48 a message is loaded and returned to the user at their user device 12 with the message detailing the fraudulent QLcode and explaining that this code cannot be used. If, from decision 46, it is determined that the ID code is not fraudulent and is available for use then at step 50 a message is prepared and sent to the user to explain that the QLcode is valid. Included in this message would be a setting that suggests the optimal use for the intended message for the specific device type.
Any message that is passed from the gate keeper program 18 to the user device 12 is displayed according to the presentation settings that are returned in the message, taking into account any device user preferences. The message can include but is not limited to links to text,
WO 2017/059479
PCT/AU2016/000343 pictures, audio and video data and this represents the data that the company or individual owner of the QLcode wishes to supply to the user to be overlaid over the original capture of the code on the user device 12. The user then has access to the data provided using links displayed on the device 12.
Seen in Figure 5 is a continuation of the block diagrams of Fi gure 4 in which a message is delivered to the user device 12 over the internet 14 from the gate keeper program 18 of web server 16.
The system also includes a company console which will be describe with reference to Figure 6 and a user console which will be described with reference to Figure 7.
A management console allows an owner to maintain message attributes, such as message content, expiry date and time, the intended audience and any redirection of URLs. The management consoles are divided into a company console and a user console. The console that is presented is determined by the URL that the user attempts to access. If the user is logging in as a company, then the company console is presented otherwise if the user is logging in as an individual then the user console is presented. Logging on to either console requires that a user provide a valid username and password. Each console has its own section of web pages on the particular QLcode website on web server 16
Referring to Figure 6 there is shown a screen 52 of a company console for use by an authorised person of the particular company. The company console allows an authorised user to maintain existing QLcodes for that particular company. The user may also be authorised to create new QLcodes for the company or purchase new codes. In box 54 there is shown the company name and a search can be conducted for a particular code by entering text in box 56. A group code may be listed in the drop down box 58 and an actual image of the code shown in box 60. The QLcode group feature, via box 58, allows QLcodes to be grouped together according to a particular function, for example license, signage. Creation of new QLcodes is formed by clicking on button 62, where for example they are bought from an app running on a secure server, such as server 16, that generates each unique code having its own unique ID. Existing QLcodes can be edited by clicking on button 64. The value of a code returned from a search, in other words its identification, is shown in box 68. The details about that particular code is shown in box 70, for example its type, when it was created, by which company and by which user and when that code is due to expire. The creation, scanning and deactivation history log of a particular code is shown in box 72. To exit the company console a user clicks on exit button 74. Details on what data a user capturing the QLcode has access to, may also be shown on screen 52.
WO 2017/059479
PCT/AU2016/000343
Codes can be deactivated on screen 52 by pressing the deactivate button 66. Deactivation does not remove the code entirely from the database as it can he used to redirect a scanning device, such as mobile phone 12, to a web page or URL nominated by the particular company.
Referring to Figure 7 there is shown a screen 80 of a user console which enables a user to purchase QLcodes and edit any existing or current QLcodes. At box 82 the user name is shown while in box 84 a list of the user’s QLcodes is shown, of which any one of those can be clicked on to show an image of that code in window 86. The user has an option to purchase a further QLcode, from a web server for example, by clicking on the button 88 and an arbitrary number or list of characters in a string is created to identify the QLcode. There are a number of options that allow the user to design how the return value will be presented, that is when another user captures the image of the newly created code, what information will actually be displayed to that user. In a first option a user can submit text by clicking on button 91 and entering text in box 94. The entered text will then be displayed or overlaid over the QLcode when it is scanned or captured by a device 12 by an image capture means of that device. The text options allow it to be scrolled up, down, left or right or no scrolling through a selection box 97. A second option or in addition to the first option is a link option by clicking on button 93. A link option sends the specified link value back to the device 12 to overlay the QLcode with the content from the link.
A third option, in addition to the first two options or one of those options, is a playlist option at button 95 which allows the user to set up a number of links, played one after the other at the same time, or randomly over the top of the QLcode captured. The links may be selected from window 99 while a new playlist can be added by clicking on button 101 or removed by clicking on button 103. The playlist options generally shown at 92 also include an option to control how they are displayed, for example one after the other, or by fading in or out and for what length of time. A preview pane 98 displays a selected option that is played from the playlist, link or text.
A ratings option window enables a user to define who is able to see the resulting output. For example the general public, Facebook friends only or whether the app can be seen by people that are not yet of legal age. Thus in box 100 there is a series of boxes that can be checked to control the ratings options. Button 102 enables a user to save the changes made by editing a QLcode or the creation of a new one. Exit button 104 enables the user to exit from the user control screen 80.
Shown in Figure 8 is a list 110 of application program interfaces or APIs for QLcodes. A number of such APIs are available that can be used by larger scale account users to maintain their QLcode records in a QLcode database such as database 32. These APIs allow for QLcodes
WO 2017/059479
PCT/AU2016/000343 and QLcode groups to be added, changed or deactivated in bulk. A list of the APIs that are available is shown in Figure 8 for QLcodes and QLcode groups.
WO 2017/059479
PCT/AU2016/000343
Claims (23)
- CLAIMS:1. A system of accessing data represented by a symbol after image capture of the symbol and to be displayed on a device, said system including:a device having image capturing means for capturing and storing said symbol, said symbol having a code identifying the symbol;server means in communication with said device for receiving said code, database means in communication with said server means and storing a plurality of codes representing a plurality of symbols;wherein said server means determines if the code is valid, and if valid, sends a message to said device with data associated with said code for display on the device.
- 2. A system according to claim 1 further including a second database to verify that the code identified as being valid is not fraudulent or blacklisted.
- 3. A system according to claim 1 or claim 2 wherein said server means generates a new symbol upon request and/or payment for use by a user.
- 4. A system according to any one of the previous claims further including a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user.
- 5. A system according to any one of the previous claims further including a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
- 6. A method of accessing data represented by a symbol, including the steps of: capturing and storing the symbol using an image capturing means of a device, said symbol having a code identifying the symbol;sending said code to a server means;said server means ascertaining if said code is valid by communicating with a database storing a plurality of codes representing a plurality of symbols; and sending a message to said device from said server means with data associated with said code for display on the device if said code is valid.WO 2017/059479PCT/AU2016/000343
- 7. A method according to claim 6 further including verifying through a second database that the code identified as being valid is not fraudulent or blacklisted.
- 8. A method according to claim 6 or claim 7 further including generating a new symbol upon request and/or payment for use by a user.
- 9. A method according to any one of claims 6 to 8 further including providing a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user.
- 10. A method according to any one of claims 6 to 9 further including providing a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
- 11. A method of encoding a symbol that displays data on a device after image capture of the symbol, the method including:providing an outer path; providing an inner path;providing one or more further paths located between the outer and inner paths, said one or more paths including at least one encryption path, preferably two encryption paths, and at least one data path;encrypting a code unique to the symbol and encrypting data contained in any one of the data paths;wherein the data to be displayed is encrypted and said data is displayed on the device after verification of said symbol.
- 12. A method according to claim 11 wherein the data is in the form of links for the user to access and can encompass video, audio, graphics or text or any combination of these.
- 13. A method according to any one of claim 11 or 12 wherein said outer path is circular and said one or more paths are rings concentric around the inner path.WO 2017/059479PCT/AU2016/000343
- 14. A method according to claim 13 wherein the one or more paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit.
- 15. A method according to claim 14 wherein the rings are divided into a plurality of sectors.
- 16. A method according to any one of claims 11 to 15 wherein the data is displayed over the captured symbol.
- 17. A computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a device to:access a unique code associated with the symbol;transmit the code to a web server for further processing and verification; receive data or information represented by the code; and display the data or information to the user of the device.
- 18. A computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a server means to:receive a unique code associated with the symbol from a device;check that it is a valid code by comparing the received code to a list of valid codes stored in a database;send a message to said device with data or information associated with the symbol for the user to access.
- 19. A computer-readable medium according to claim 18 further including checking that the code is not fraudulent using a further database.
- 20. A symbol or sign for displaying encrypted data on a device after image capture of the symbol by an image capture device, the symbol including:an outer path and an inner path for aligning the image capture device;WO 2017/059479PCT/AU2016/000343 further paths located between the inner and outer paths, said further paths being encryption paths or data paths, said further paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a5 binary digit;said symbol providing information represented by said symbol to be displayed on said device to a user after verification of the symbol or sign.
- 21. A symbol or sign according to claim 20 further including indication means for 10 assisting in the correct detection of the number of further paths in the symbol or sign.
- 22. A symbol or sign according to claim 20 or claim 21 wherein each of the further paths are divided into a number of sectors.15 23. A symbol or sign according to any one of claims 20 to 22 further including one or more markers to assist with perspective correction when an image of symbol or sign is scanned or captured.WO 2017/059479PCT/AU2016/000343FIG, 2Substitute Sheet (Rule 26) RO/AUPCT/AU2016/000343WO 2017/059479 $3FlG, ΙβSubstitute Sheet (Rule 26) RO/AUWO 2017/0594793/ 6PCT/AU2016/000343PIG, 3Substitute Sheet (Rule 26) RO/AUWO 2017/059479PCT/AU2016/000343FI&. 4Substitute Sheet (Rule 26) RO/AUWO 2017/059479PCT/AU2016/000343I/OQLcodesQLcodeAddCodesQLcodeChangeCodesQLcodeDeleteCodesQLcodeListCodesQLcodeGetCodelmageUsed to bulk purchase QLcodesUsed to bulk modify QLcodesUsed to bulk DE_ACTIVATE QLcodesReturns a list of QLcodesReturns the selected QLcode image filesQLcodeGetCodeHistory Returns the history for the selected QLcodesQLcode GroupsQLcodeAddGroupsQLcodeListGroupsUsed to bulk create QLcode Groups Returns a list of QLcode GroupsF/G, 2Substitute Sheet (Rule 26) RO/AUWO 2017/059479PCT/AU2016/000343DetailsType: licenceCreated: 01/01/2014 at ,2:23:05 by VicRoads user Joe Blogs Expires: 31/12/2016Exit zs '7o
- 23 Princes Highway Dandenong 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 48 Ring St Preston 12/011/2014 48 Ring St Preston 12/011/2014 46 Ring Si Preston 12/0,,/2014 46 Ring St Preston 12/011/2014 48 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring Si Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/201417/02/2015 23:34 by VicPr Λ i 14:23 by VicPol 13:23 by VicPol 12:23 by VicPol ,12:17 by VicPol11:27 by Wot 1,25 by VicPol 11:23 by VicPol 11:12 by VicPol 1023 by VicPol 09:23 by VicPol 08:23 by VicPol 0723 by VicPol 06:23 by VicPol9|User ConsoleUser John SmithYour QLCodes ionsO fad '[Paste or DfoplPreview i012345θ7δθΑΒΟθε?01234567δOFA34B67192F16373000273E2346ACO184688C17332E5FE1387A563B3272C2335D203ESF (0 UnkO Ray UslSoterg | None [Paste or Drcpj lo| ;Good Day | N<w Ptsyfet1
Web Page: ww.cddcNsd.com Λ Web Page: ww.thoughttaithedr5y.com ; t Audio. soundwave.wma Audio: gccdmOminqvietnam.mpS ; Rcture: 17O273.jpfl Rcture: sinieyFace.gif Video: MyTrip.mp4 v Remove . j I 7?j fromPtaySst i ιChange how often [onealterthg. by [Fading tnFIG. 7Substitute Sheet (Rule 26) RO/AU
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2015904063 | 2015-10-06 | ||
AU2015904063A AU2015904063A0 (en) | 2015-10-06 | Method and system for accessing data using a symbol | |
PCT/AU2016/000343 WO2017059479A1 (en) | 2015-10-06 | 2016-10-06 | Method and system for accessing data using a symbol |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2016334876A1 true AU2016334876A1 (en) | 2018-05-24 |
Family
ID=58487154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2016334876A Abandoned AU2016334876A1 (en) | 2015-10-06 | 2016-10-06 | Method and system for accessing data using a symbol |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2016334876A1 (en) |
WO (1) | WO2017059479A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7752137B2 (en) * | 2003-11-03 | 2010-07-06 | Meyers Printing Company | Authentication and tracking system |
US20130191250A1 (en) * | 2012-01-23 | 2013-07-25 | Augme Technologies, Inc. | System and method for augmented reality using multi-modal sensory recognition from artifacts of interest |
US8935777B2 (en) * | 2012-02-17 | 2015-01-13 | Ebay Inc. | Login using QR code |
WO2015067725A1 (en) * | 2013-11-07 | 2015-05-14 | Scantrust Sa | Two dimensional barcode and method of authentication of such barcode |
-
2016
- 2016-10-06 AU AU2016334876A patent/AU2016334876A1/en not_active Abandoned
- 2016-10-06 WO PCT/AU2016/000343 patent/WO2017059479A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2017059479A1 (en) | 2017-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11356479B2 (en) | Systems and methods for takedown of counterfeit websites | |
US20220391926A1 (en) | Blockchain-based product authentication system | |
US10614277B2 (en) | System for communication from a user to the publisher of a scannable label | |
US9213930B2 (en) | Secure barcodes | |
CN103282925B (en) | The system and method for privacy of user is protected in the multimedia upload to internet website | |
US20190286680A1 (en) | Interactive barcodes | |
US20140223329A1 (en) | Enhancing public opinion gathering and dissemination | |
US20110258040A1 (en) | System and method for providing feedback for targeted communications | |
US20110231397A1 (en) | Method and system for compiling a unique sample code for a digital sample | |
US20120123920A1 (en) | User Authentication System and Method Thereof | |
US20120300087A1 (en) | System and method for receiving and publishing product interest | |
US8335491B1 (en) | Mobilux system utilizing camera-equipped cellular telephones for anti-counterfeit authentication | |
CN102047281A (en) | CAPTCHA advertising | |
US20160261609A1 (en) | System and a method for intelligent verification management | |
CN105051727B (en) | Information system based on coding | |
CN111245838B (en) | Method for protecting key information by anti-crawler | |
US20210157895A1 (en) | Information processing method, information display method, non-transitory computer readable storage medium, terminal and server | |
US20220342962A1 (en) | System and Methods For Protecting, Monitoring, and Reporting Use Of Content | |
JP2009282759A (en) | Ticket information generation device, ticket information generation method, ticket information generation processing program, and ticket information generation system | |
US20160225004A1 (en) | Token verification | |
US20190164201A1 (en) | Trustworthy review system and method for legitimizing a review | |
Speed et al. | Mobile Security: How to secure, privatize and recover your devices | |
AU2016334876A1 (en) | Method and system for accessing data using a symbol | |
JP6886197B2 (en) | Customer service management system, customer service management system management server, and customer service management method | |
Parker et al. | Addressing the accountability gap: gambling advertising and social media platform responsibilities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NB | Applications allowed - extensions of time section 223(2) |
Free format text: THE TIME IN WHICH TO REQUEST EXAMINATION HAS BEEN EXTENDED TO 10 NOV 2020 |
|
MK4 | Application lapsed section 142(2)(d) - no continuation fee paid for the application |