AU2016334876A1 - Method and system for accessing data using a symbol - Google Patents

Method and system for accessing data using a symbol Download PDF

Info

Publication number
AU2016334876A1
AU2016334876A1 AU2016334876A AU2016334876A AU2016334876A1 AU 2016334876 A1 AU2016334876 A1 AU 2016334876A1 AU 2016334876 A AU2016334876 A AU 2016334876A AU 2016334876 A AU2016334876 A AU 2016334876A AU 2016334876 A1 AU2016334876 A1 AU 2016334876A1
Authority
AU
Australia
Prior art keywords
symbol
code
user
data
paths
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2016334876A
Inventor
Barry Johan Jansink
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2015904063A external-priority patent/AU2015904063A0/en
Application filed by Individual filed Critical Individual
Publication of AU2016334876A1 publication Critical patent/AU2016334876A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/98Detection or correction of errors, e.g. by rescanning the pattern or by human intervention; Evaluation of the quality of the acquired patterns
    • G06V10/993Evaluation of the quality of the acquired pattern
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A system of accessing data represented by a symbol or sign (2) after image capture of the symbol and to be displayed on a device, said system including a device (12) having image capturing means for capturing and storing said symbol (2), said symbol (2) having a code (35) identifying the symbol, server means (16) in communication with said device (12) for receiving said code (35), database means (32) in communication with said server means (16) and storing a plurality of codes representing a plurality of symbols, wherein said server means (16) determines if the code (35) is valid, and if valid, sends a message to said device (12) with data associated with said code (35) for display on the device (12).

Description

Field of the Invention
This invention relates to a method and system of enabling access to real-time data from a symbol or sign. More particularly the invention relates to a method and system for enabling the display on a device of real-time data by capturing information from the symbol or sign using the device. The invention also relates to a method of encoding a symbol or sign that displays data on a device after image capture of the symbol or sign.
Background of the Invention
To facilitate easy and quick identification of products, barcodes have been used as a convenient way to convey information about products, particularly about inventory and at point of sale scanning. Barcodes in particular are intended to relay specific information about an item to a device, such as a scanner, or computer storage facility for end use by a system or by a user.
In more recent times quick response codes or QR codes have been used in advertising, information sharing networks and in social media where such codes are made available in public, for example on posters, flyers, printed publications or websites. A QR code is essentially a matrix bar code or a two-dimensional bar code. Each QR code has three squares at its periphery to position and align it with an image capture device when read. A set of characters is formed using mathematics and this forms a website IP address. End users can capture such codes with an image capture device, such as on a mobile phone, in order to access more information about that product.
A particular problem with bar codes is that they only identify or distinguish one product from another without giving further information about the product, for example where it is made, how it was produced or what it consists of. QR codes have to some extent overcome this problem by enabling users to capture a QR code with a device camera which can then access a website through a browser on the device that can give much further detailed information about the product for the user, with the information being displayed on the device.
However QR codes have recently been used for malicious activity and malicious transactions whereby misuse or corruption of a code is processed by a device camera and can direct the user to a malicious website to obtain confidential information about the user or to download malicious software onto the device itself. As an example, malicious QR codes can be in the form of a sticker which is placed over a legitimate QR code with the malicious QR code effectively representing a scam advertisement and has no affiliation with the original QR code representing a product of a company. Other occurrences have been where a specific QR code has been placed on a consumer product and has directed a user to an adult website or some other
WO 2017/059479
PCT/AU2016/000343 malicious website simply because that site had no longer been used by the product manufacturer and was subsequently sold on to another content provider. In such situations where the users are caught in this manner, the original manufacturer may have to recall all of the products affected in the market or to make an arrangement with the new owner of the website. There is no security with QR codes and it is relatively easy, without the user kno wing, of receiving a virus on a smartphone which can then be forwarded on to a website or to the user’s bank account.
Generally only one-third of the QR code needs to be showing in order to be read by an image capturing device, which is another disadvantage.
The present invention seeks to overcome one or more of the above disadvantages by providing a method and system of retrieving real-time date about a product or service in a secure environment where’the user can capture the symbol or image and securely access further information or data associated with the symbol or image.
Summary of the Invention
According to a first aspect of the invention, there is provided a system of accessing data represented by a symbol after image capture of the symbol and to be displayed on a device, said system including:
a device having image capturing means for capturing and storing said symbol, said symbol having a code identifying the symbol;
server means in communication with said device for receiving said code, database means in communication with said server means and storing a plurality of codes representing a plurality of symbols;
wherein said server means determines if the code is valid, and if valid, sends a message to said device with data associated with said code for display on the device.
The system may further include a second database to verify that the code identified as being valid is not fraudulent or blacklisted. The server means can generate a new symbol upon request and/or payment for use by a user. The system may further include a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user. The system may further include a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
According to a second aspect of the invention, there is provided a method of accessing data represented by a symbol, including the steps of:
capturing and storing the symbol using an image capturing means of a device, said symbol having a code identifying the symbol;
WO 2017/059479
PCT/AU2016/000343 sending said code to a server means;
said server means ascertaining if said code is valid by communicating with a database storing a plurality of codes representing a plurality of symbols; and sending a message to said device from said server means with data associated with said code for display on the device if said code is valid.
The method may further include verifying through a second database that the code identified as being valid is not fraudulent or blacklisted. It may further include generating a new symbol upon request and/or payment for use by a user. The method may further include providing a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user. It may further include providing a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
According to a third aspect of the invention, there is provided a method of encoding a symbol that displays data on a device after image capture of the symbol, the method including:
providing an outer path; providing an inner path;
providing one or more further paths located between the outer and inner paths, said one or more paths including at least one encryption path, preferably two encryption paths, and at least one data path;
encrypting a code unique to the symbol and encrypting data contained in any one of the data paths;
wherein the data to be displayed is encrypted and said data is displayed on the device after verification of said symbol.
The data can be in the form of links for the user to access and can encompass video, audio, graphics or text or any combination of these. The outer path can be circular and said one or more paths are rings concentric around the inner path. The one or more paths may have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit. The rings are preferably divided into a plurality of sectors. The data is preferably displayed over the captured symbol.
According to a fourth aspect of the invention, there is provided a computerreadable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a device to:
WO 2017/059479
PCT/AU2016/000343 access a unique code associated with the symbol;
transmit the code to a web server for further processing and verification;
receive data or information represented by the code; and display the data or information to the user of the device.
According to a fifth aspect of the invention, there is provided a computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a server means to:
receive a unique code associated with the symbol from a device;
check that it is a valid code by comparing the received code to a list of valid codes stored in a database;
send a message to said device with data or information associated with the symbol for the user to access.
The server may be directed to check that the code is not fraudulent using a further database.
According to a sixth aspect of the invention, there is provided a symbol or sign for displaying encrypted data on a device after image capture of the symbol by an image capture device, the symbol including:
an outer path and an inner path for aligning the image capture device; further paths located between the inner and outer paths, said further paths being encryption paths or data paths, said further paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit;
said symbol providing information represented by said symbol to be displayed on said device to a user after verification of the symbol or sign.
The symbol or sign may further including indication means for assisting in the correct detection of the number of further paths in the symbol or sign. Each of the further paths can be divided into a number of sectors. The symbol or sign may further include one or more markers to assist with perspective correction when an image of symbol or sign is scanned or captured.
Brief Description of the Drawings
A preferred embodiment of the invention will hereinafter be described, by way of example only, with reference to the drawings in which:
WO 2017/059479
PCT/AU2016/000343
Figure 1 is a schematic diagram showing an example of an encoded symbol or image, termed a QL code.
Figure 1A is a schematic diagram showing a further example of an encoded symbol or image;
Figure IB is a schematic diagram of a further embodiment of an encoded symbol or image showing sectors across paths located between an inner path and an outer path;
Figure 2 is a schematic diagram showing the capturing of a symbol or image by a device;
Figure 3 is a block diagram showing access to a web server over the internet through the device;
Figure 4 is a detailed block diagram of the process involved in checking the authenticity of the symbol or image and providing extra information abouhthat symbol or image to the user;
Figure 5 is a block diagram showing information sent over the internet to the device to display a message;
Figure 6 is a screen capture shot of a company console used by a company that owns one or more symbols or images;
Figure 7 is a screen capture shot of a user console displaying properties about the symbol or image used by the user; and
Figure 8 shows a list of Application Program Interfaces that can be used to create or purchase bulk QLcodes.
Detailed Description of the Preferred Embodiment
Referring to Figures 1, 1A and IB, there is displayed a symbol or graphical image 2 which is unique and specific to represent a product or service or other information about the owner or the owner’s business related to the symbol or image 2. The image 2 is referred to as a QLcode. The user or company that owns the symbol or image 2 can maintain data about any product or service to which the symbol relates and they can be presented to the viewer when the viewer captures the symbol using a capture device such as on a mobile phone, headset or tablet. Many such symbols can be created using this process with each symbol or image being unique and they can each iink back to its own data content. The data content can take any form such as text, graphic, video or audio. This data content can be viewed through the above mentioned devices or even a personal computer and the content can be overlaid on the symbol at the time of viewing.
The symbol or QLcode 2 has a unique ID or code which contains validation, CRC and encrypted data. The symbol 2 has an outer ring or outer, preferably continuous, path 4 which is relatively thick (compared to the inner rings), an inner perimeter or inner, preferably continuous,
WO 2017/059479
PCT/AU2016/000343 path 6 which is in the shape of a key hole, both ring 4 and perimeter 6 being used to enable an image capture device to properly align with the symbol. There are a number of other paths or rings 8, 10 and 11 located between the paths 4 and 6. Outer ring 4 and inner path 6 can both contain marker means in the form of four (or more) equidistant markers 7 embedded within the outer part of the inner path 6 and within the inner part of the outer ring 4. These markers 7 assist with perspective correction when an image of the QL code 2 is scanned or captured. The markers 7 can be located anywhere in the inner path 6 or outer path 4, including on either inner or outer portions/edges of paths 4 and 6. The markers 7 may or may not be included depending on the intended use of the QL code 2. On the inside of the right leg 9 of the keyhole-shaped path 6 is an indication means 5 in the form of fingers or projections (shown in white). The indication means 5 assists in the correct detection of the number of rings within the QL code 2. In this case, as depicted in Figure 1A, there are three rings 8, 10 and 11 indicated by the three white fingers. The indication means 5 can be located anywhere in the path 6 or against the inner or outer edges of the path 6. In between the outer ring 4 and inner path 6 there are a number o f rings that can range in number between 3 and 18. The rings are generally incomplete and made up of a combination of a first set of segments in the form of visible arcs (dark such as arc 21 in Figure IB), which signifies a bit value of 1, and a second set of segments in the form of empty arcs (white or not shown such as arc or space 23 in Figure IB) that signify a bit value of zero. In the example of Figures 1 and 1A there are three intermediate rings 8, 10 and 11 that are shown. These rings contain both the data content and the security bit values required in order to securely retrieve the corresponding data from the server.
Each of the rings 8, 10 and 11 for example are divided into equally sized sectors, typically 16 sectors such as sector 27 at the lower left side of image 2, sector 25 at the top of image 2 and sector 29 at the lower right side of image 2. These sectors are pie shaped, fanning out radially from the centre 31 of the inner keyhole, surrounded by path 6. The space 33 taken up by the lower part of the keyhole, surrounded by path 6, is not included in these sectors, that is, the number of degrees in a circle minus 54 degrees for the lower part 33 of the keyhole is divided evenly into typically 16 sectors, starting from sector 27 and going around the centre 31 to sector
29. Any number of sectors may be used as long as the resolution of the darker bit values of 1 can be distinguished satisfactorily by an image capture device. The rings between the outer ring 4 and the inner keyhole path 6 are evenly spaced so as to optimise the readability for the scanning device. The number of data rings multiplied by the number of sectors gives an approximation as to the maximum number of codes possible for any given combination.
WO 2017/059479
PCT/AU2016/000343
The data represented by the arcs, either zero or one, does not display the actual data values. Instead, the data is encrypted through a number of techniques in order to minimise the risk of data being retrieved that does not belong to that particular QLcode, captured through the image capture device, such as the camera of a mobile phone. The outer ring 4, the keyhole inner path 6 and the data rings (such as 8, 10 and 11) of the symbol 2 may be made any colour, or combination or colours. This is possible as long as the background of the symbol or code, where there is no data, is of a sufficient contrasting ratio to the colour of the outer ring 4, the keyhole path 6 and each of the data rings.
Each QLcode 2 is generated at a server, such as web server 16. The first ring, closest to the inner ring 8 (or any other designated ring), has information stored therein together with bits from other data rings. It determines which ring or rings has location data and what data is stored in the encrypted ring or rings. In another ring, encryption could start at a point in the ring which has data represented by information in some or all of the other rings. An operation, such as an Exclusive-OR (XOR) operation, can be performed with location in the grid that matches the number of rings and sectors and then XOR all of these together. In order to obtain the original data, another XOR operation is performed on this. Such an operation of encryption is the SHA or Secure flash Algorithm function.
Many codes like this can be stored securely at a web server and purchased for use by individuals or companies. Users can maintain, edit or delete codes through a management console, to be described with reference to Figures 6 and 7. The codes can be printed and then displayed either on a support or on packaging for access by the public.
Referring to Figures 2 and 3 there is shown the symbol 2 which can be displayed in public, for example on a product, billboard, website or printed publication which is captured by a data capture device 12, such as a mobile phone, tablet, headset or PC. The device 12 captures the image through image capture means 13 which is then processed by the image processing means 15 in the device 12. An application or app 17 that is stored on the device 12 scans the symbol or QLcode 2 through the image camera means 13 and passes the detected unique identification code 35 associated with the symbol 2, through a communications module and browser 19 to a web server 16 as shown in Figure 4. The scanning of the code 35 or symbol 2 by the app 17 is performed in a clockwise fashion, starting at the first bit on the lower left of the innermost ring 8. The scan proceeds clockwise and when it reaches the end of the first ring 8 it then moves onto the next ring and so on, moving outwards until the last bit on the outermost ring is read. These scanned bits determine the unique ID code 35. Thus the unique ID code (for example XYZ) 35 is transmitted to the web server 16 over the internet 14 along with the
WO 2017/059479
PCT/AU2016/000343 identification of device 12, its type, its location and any user preferences. If more than one code or symbol is detected then the user is prompted to select a specific code or symbol in which to capture. This is displayed on the display means of the device 12. The device 12 accesses webserver 16 via an encrypted https connection in order to retrieve a message that corresponds to the unique ID code 35 which has been captured in the image 2.
Referring to Figure 4, the data including the unique ID 35 of the scanned symbol is sent to web server 16 and is received by a gate keeper application program 18 which runs on web server 16. This validates or invalidates the received unique ID and confirms the device ID, type, location and user preferences.
At step 22 a decision is made as to whether the QLcode or ID is valid. If it is valid then the process passes to step 28 where a look up program 20 of the web server 16 is activated, forwarding on the ID type, location and user preferences. If at decision 22 the ID is not valid then a message is prepared and loaded at step 24 with a QLcode Error Reporting Page. The Reporting Page at step 24 can also be used to report a damaged, broken or invalid QLcode. At step 26 the error message is sent back to the device 12 over the internet 14.
On receipt of the ID code, as well as the other data at step 30, the look up program 20 checks the ID against an ID database 32 to see if that specific ID is stored in the database 32.
If, at decision box 34, it is determined that the code ID does exist and is matched, then the process moves to another decision box 36. If the code ID does not exist then the process moves to step 38 where a message is loaded and returned to the user device 12 over the internet 14 with a QLcode Error Reporting Page. At step 36 a determination is made as to whether the QLcode ID has expired. If it has, then at step 40 a message is loaded and returned to the user to explain that the QLcode ID has expired in a QLcode Expired Reporting Page. If the QLcode ID has not expired then at step 42 this ID is checked against a further database which includes a known list of IDs that are fraudulent. It is compared using the fraudulent or blacklist database 44. At step 46 if the QLcode has been blacklisted or is fraudulent then at step 48 a message is loaded and returned to the user at their user device 12 with the message detailing the fraudulent QLcode and explaining that this code cannot be used. If, from decision 46, it is determined that the ID code is not fraudulent and is available for use then at step 50 a message is prepared and sent to the user to explain that the QLcode is valid. Included in this message would be a setting that suggests the optimal use for the intended message for the specific device type.
Any message that is passed from the gate keeper program 18 to the user device 12 is displayed according to the presentation settings that are returned in the message, taking into account any device user preferences. The message can include but is not limited to links to text,
WO 2017/059479
PCT/AU2016/000343 pictures, audio and video data and this represents the data that the company or individual owner of the QLcode wishes to supply to the user to be overlaid over the original capture of the code on the user device 12. The user then has access to the data provided using links displayed on the device 12.
Seen in Figure 5 is a continuation of the block diagrams of Fi gure 4 in which a message is delivered to the user device 12 over the internet 14 from the gate keeper program 18 of web server 16.
The system also includes a company console which will be describe with reference to Figure 6 and a user console which will be described with reference to Figure 7.
A management console allows an owner to maintain message attributes, such as message content, expiry date and time, the intended audience and any redirection of URLs. The management consoles are divided into a company console and a user console. The console that is presented is determined by the URL that the user attempts to access. If the user is logging in as a company, then the company console is presented otherwise if the user is logging in as an individual then the user console is presented. Logging on to either console requires that a user provide a valid username and password. Each console has its own section of web pages on the particular QLcode website on web server 16
Referring to Figure 6 there is shown a screen 52 of a company console for use by an authorised person of the particular company. The company console allows an authorised user to maintain existing QLcodes for that particular company. The user may also be authorised to create new QLcodes for the company or purchase new codes. In box 54 there is shown the company name and a search can be conducted for a particular code by entering text in box 56. A group code may be listed in the drop down box 58 and an actual image of the code shown in box 60. The QLcode group feature, via box 58, allows QLcodes to be grouped together according to a particular function, for example license, signage. Creation of new QLcodes is formed by clicking on button 62, where for example they are bought from an app running on a secure server, such as server 16, that generates each unique code having its own unique ID. Existing QLcodes can be edited by clicking on button 64. The value of a code returned from a search, in other words its identification, is shown in box 68. The details about that particular code is shown in box 70, for example its type, when it was created, by which company and by which user and when that code is due to expire. The creation, scanning and deactivation history log of a particular code is shown in box 72. To exit the company console a user clicks on exit button 74. Details on what data a user capturing the QLcode has access to, may also be shown on screen 52.
WO 2017/059479
PCT/AU2016/000343
Codes can be deactivated on screen 52 by pressing the deactivate button 66. Deactivation does not remove the code entirely from the database as it can he used to redirect a scanning device, such as mobile phone 12, to a web page or URL nominated by the particular company.
Referring to Figure 7 there is shown a screen 80 of a user console which enables a user to purchase QLcodes and edit any existing or current QLcodes. At box 82 the user name is shown while in box 84 a list of the user’s QLcodes is shown, of which any one of those can be clicked on to show an image of that code in window 86. The user has an option to purchase a further QLcode, from a web server for example, by clicking on the button 88 and an arbitrary number or list of characters in a string is created to identify the QLcode. There are a number of options that allow the user to design how the return value will be presented, that is when another user captures the image of the newly created code, what information will actually be displayed to that user. In a first option a user can submit text by clicking on button 91 and entering text in box 94. The entered text will then be displayed or overlaid over the QLcode when it is scanned or captured by a device 12 by an image capture means of that device. The text options allow it to be scrolled up, down, left or right or no scrolling through a selection box 97. A second option or in addition to the first option is a link option by clicking on button 93. A link option sends the specified link value back to the device 12 to overlay the QLcode with the content from the link.
A third option, in addition to the first two options or one of those options, is a playlist option at button 95 which allows the user to set up a number of links, played one after the other at the same time, or randomly over the top of the QLcode captured. The links may be selected from window 99 while a new playlist can be added by clicking on button 101 or removed by clicking on button 103. The playlist options generally shown at 92 also include an option to control how they are displayed, for example one after the other, or by fading in or out and for what length of time. A preview pane 98 displays a selected option that is played from the playlist, link or text.
A ratings option window enables a user to define who is able to see the resulting output. For example the general public, Facebook friends only or whether the app can be seen by people that are not yet of legal age. Thus in box 100 there is a series of boxes that can be checked to control the ratings options. Button 102 enables a user to save the changes made by editing a QLcode or the creation of a new one. Exit button 104 enables the user to exit from the user control screen 80.
Shown in Figure 8 is a list 110 of application program interfaces or APIs for QLcodes. A number of such APIs are available that can be used by larger scale account users to maintain their QLcode records in a QLcode database such as database 32. These APIs allow for QLcodes
WO 2017/059479
PCT/AU2016/000343 and QLcode groups to be added, changed or deactivated in bulk. A list of the APIs that are available is shown in Figure 8 for QLcodes and QLcode groups.
WO 2017/059479
PCT/AU2016/000343

Claims (23)

  1. CLAIMS:
    1. A system of accessing data represented by a symbol after image capture of the symbol and to be displayed on a device, said system including:
    a device having image capturing means for capturing and storing said symbol, said symbol having a code identifying the symbol;
    server means in communication with said device for receiving said code, database means in communication with said server means and storing a plurality of codes representing a plurality of symbols;
    wherein said server means determines if the code is valid, and if valid, sends a message to said device with data associated with said code for display on the device.
  2. 2. A system according to claim 1 further including a second database to verify that the code identified as being valid is not fraudulent or blacklisted.
  3. 3. A system according to claim 1 or claim 2 wherein said server means generates a new symbol upon request and/or payment for use by a user.
  4. 4. A system according to any one of the previous claims further including a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user.
  5. 5. A system according to any one of the previous claims further including a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
  6. 6. A method of accessing data represented by a symbol, including the steps of: capturing and storing the symbol using an image capturing means of a device, said symbol having a code identifying the symbol;
    sending said code to a server means;
    said server means ascertaining if said code is valid by communicating with a database storing a plurality of codes representing a plurality of symbols; and sending a message to said device from said server means with data associated with said code for display on the device if said code is valid.
    WO 2017/059479
    PCT/AU2016/000343
  7. 7. A method according to claim 6 further including verifying through a second database that the code identified as being valid is not fraudulent or blacklisted.
  8. 8. A method according to claim 6 or claim 7 further including generating a new symbol upon request and/or payment for use by a user.
  9. 9. A method according to any one of claims 6 to 8 further including providing a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user.
  10. 10. A method according to any one of claims 6 to 9 further including providing a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
  11. 11. A method of encoding a symbol that displays data on a device after image capture of the symbol, the method including:
    providing an outer path; providing an inner path;
    providing one or more further paths located between the outer and inner paths, said one or more paths including at least one encryption path, preferably two encryption paths, and at least one data path;
    encrypting a code unique to the symbol and encrypting data contained in any one of the data paths;
    wherein the data to be displayed is encrypted and said data is displayed on the device after verification of said symbol.
  12. 12. A method according to claim 11 wherein the data is in the form of links for the user to access and can encompass video, audio, graphics or text or any combination of these.
  13. 13. A method according to any one of claim 11 or 12 wherein said outer path is circular and said one or more paths are rings concentric around the inner path.
    WO 2017/059479
    PCT/AU2016/000343
  14. 14. A method according to claim 13 wherein the one or more paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit.
  15. 15. A method according to claim 14 wherein the rings are divided into a plurality of sectors.
  16. 16. A method according to any one of claims 11 to 15 wherein the data is displayed over the captured symbol.
  17. 17. A computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a device to:
    access a unique code associated with the symbol;
    transmit the code to a web server for further processing and verification; receive data or information represented by the code; and display the data or information to the user of the device.
  18. 18. A computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a server means to:
    receive a unique code associated with the symbol from a device;
    check that it is a valid code by comparing the received code to a list of valid codes stored in a database;
    send a message to said device with data or information associated with the symbol for the user to access.
  19. 19. A computer-readable medium according to claim 18 further including checking that the code is not fraudulent using a further database.
  20. 20. A symbol or sign for displaying encrypted data on a device after image capture of the symbol by an image capture device, the symbol including:
    an outer path and an inner path for aligning the image capture device;
    WO 2017/059479
    PCT/AU2016/000343 further paths located between the inner and outer paths, said further paths being encryption paths or data paths, said further paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a
    5 binary digit;
    said symbol providing information represented by said symbol to be displayed on said device to a user after verification of the symbol or sign.
  21. 21. A symbol or sign according to claim 20 further including indication means for 10 assisting in the correct detection of the number of further paths in the symbol or sign.
  22. 22. A symbol or sign according to claim 20 or claim 21 wherein each of the further paths are divided into a number of sectors.
    15 23. A symbol or sign according to any one of claims 20 to 22 further including one or more markers to assist with perspective correction when an image of symbol or sign is scanned or captured.
    WO 2017/059479
    PCT/AU2016/000343
    FIG, 2
    Substitute Sheet (Rule 26) RO/AU
    PCT/AU2016/000343
    WO 2017/059479 $3
    FlG, Ιβ
    Substitute Sheet (Rule 26) RO/AU
    WO 2017/059479
    3/ 6
    PCT/AU2016/000343
    PIG, 3
    Substitute Sheet (Rule 26) RO/AU
    WO 2017/059479
    PCT/AU2016/000343
    FI&. 4
    Substitute Sheet (Rule 26) RO/AU
    WO 2017/059479
    PCT/AU2016/000343
    I/O
    QLcodes
    QLcodeAddCodes
    QLcodeChangeCodes
    QLcodeDeleteCodes
    QLcodeListCodes
    QLcodeGetCodelmage
    Used to bulk purchase QLcodes
    Used to bulk modify QLcodes
    Used to bulk DE_ACTIVATE QLcodes
    Returns a list of QLcodes
    Returns the selected QLcode image files
    QLcodeGetCodeHistory Returns the history for the selected QLcodes
    QLcode Groups
    QLcodeAddGroups
    QLcodeListGroups
    Used to bulk create QLcode Groups Returns a list of QLcode Groups
    F/G, 2
    Substitute Sheet (Rule 26) RO/AU
    WO 2017/059479
    PCT/AU2016/000343
    Details
    Type: licence
    Created: 01/01/2014 at ,2:23:05 by VicRoads user Joe Blogs Expires: 31/12/2016
    Exit zs '7o
  23. 23 Princes Highway Dandenong 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 48 Ring St Preston 12/011/2014 48 Ring St Preston 12/011/2014 46 Ring Si Preston 12/0,,/2014 46 Ring St Preston 12/011/2014 48 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring Si Preston 12/011/2014 46 Ring St Preston 12/011/2014 46 Ring St Preston 12/011/2014
    17/02/2015 23:34 by VicPr Λ i 14:23 by VicPol 13:23 by VicPol 12:23 by VicPol ,
    12:17 by VicPol
    11:27 by Wot 1,25 by VicPol 11:23 by VicPol 11:12 by VicPol 1023 by VicPol 09:23 by VicPol 08:23 by VicPol 0723 by VicPol 06:23 by VicPol
    9|
    User Console
    User John Smith
    Your QLCodes ions
    O fad '[Paste or Dfopl
    Preview i
    012345θ7δθΑΒΟθε?01234567δ
    OFA34B67192F16373000273E
    2346ACO184688C17332E5FE1
    387A563B3272C2335D203ESF (
    0 Unk
    O Ray Usl
    Soterg | None [Paste or Drcpj lo| ;Good Day | N<w Ptsyfet1
    Web Page: ww.cddcNsd.com Λ Web Page: ww.thoughttaithedr5y.com ; t Audio. soundwave.wma Audio: gccdmOminqvietnam.mpS ; Rcture: 17O273.jpfl Rcture: sinieyFace.gif Video: MyTrip.mp4 v
    Remove . j I 7?
    j fromPtaySst i ι
    Change how often [onealterthg. by [Fading tn
    FIG. 7
    Substitute Sheet (Rule 26) RO/AU
AU2016334876A 2015-10-06 2016-10-06 Method and system for accessing data using a symbol Abandoned AU2016334876A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AU2015904063 2015-10-06
AU2015904063A AU2015904063A0 (en) 2015-10-06 Method and system for accessing data using a symbol
PCT/AU2016/000343 WO2017059479A1 (en) 2015-10-06 2016-10-06 Method and system for accessing data using a symbol

Publications (1)

Publication Number Publication Date
AU2016334876A1 true AU2016334876A1 (en) 2018-05-24

Family

ID=58487154

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2016334876A Abandoned AU2016334876A1 (en) 2015-10-06 2016-10-06 Method and system for accessing data using a symbol

Country Status (2)

Country Link
AU (1) AU2016334876A1 (en)
WO (1) WO2017059479A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752137B2 (en) * 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
US20130191250A1 (en) * 2012-01-23 2013-07-25 Augme Technologies, Inc. System and method for augmented reality using multi-modal sensory recognition from artifacts of interest
US8935777B2 (en) * 2012-02-17 2015-01-13 Ebay Inc. Login using QR code
WO2015067725A1 (en) * 2013-11-07 2015-05-14 Scantrust Sa Two dimensional barcode and method of authentication of such barcode

Also Published As

Publication number Publication date
WO2017059479A1 (en) 2017-04-13

Similar Documents

Publication Publication Date Title
US11356479B2 (en) Systems and methods for takedown of counterfeit websites
US20220391926A1 (en) Blockchain-based product authentication system
US10614277B2 (en) System for communication from a user to the publisher of a scannable label
US9213930B2 (en) Secure barcodes
CN103282925B (en) The system and method for privacy of user is protected in the multimedia upload to internet website
US20190286680A1 (en) Interactive barcodes
US20140223329A1 (en) Enhancing public opinion gathering and dissemination
US20110258040A1 (en) System and method for providing feedback for targeted communications
US20110231397A1 (en) Method and system for compiling a unique sample code for a digital sample
US20120123920A1 (en) User Authentication System and Method Thereof
US20120300087A1 (en) System and method for receiving and publishing product interest
US8335491B1 (en) Mobilux system utilizing camera-equipped cellular telephones for anti-counterfeit authentication
CN102047281A (en) CAPTCHA advertising
US20160261609A1 (en) System and a method for intelligent verification management
CN105051727B (en) Information system based on coding
CN111245838B (en) Method for protecting key information by anti-crawler
US20210157895A1 (en) Information processing method, information display method, non-transitory computer readable storage medium, terminal and server
US20220342962A1 (en) System and Methods For Protecting, Monitoring, and Reporting Use Of Content
JP2009282759A (en) Ticket information generation device, ticket information generation method, ticket information generation processing program, and ticket information generation system
US20160225004A1 (en) Token verification
US20190164201A1 (en) Trustworthy review system and method for legitimizing a review
Speed et al. Mobile Security: How to secure, privatize and recover your devices
AU2016334876A1 (en) Method and system for accessing data using a symbol
JP6886197B2 (en) Customer service management system, customer service management system management server, and customer service management method
Parker et al. Addressing the accountability gap: gambling advertising and social media platform responsibilities

Legal Events

Date Code Title Description
NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO REQUEST EXAMINATION HAS BEEN EXTENDED TO 10 NOV 2020

MK4 Application lapsed section 142(2)(d) - no continuation fee paid for the application