EP3028204A1 - Method for encoding an access to a computer resource - Google Patents
Method for encoding an access to a computer resourceInfo
- Publication number
- EP3028204A1 EP3028204A1 EP14759039.2A EP14759039A EP3028204A1 EP 3028204 A1 EP3028204 A1 EP 3028204A1 EP 14759039 A EP14759039 A EP 14759039A EP 3028204 A1 EP3028204 A1 EP 3028204A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- information
- access
- code
- conditional
- validity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012545 processing Methods 0.000 claims description 12
- 238000004458 analytical method Methods 0.000 claims description 7
- 230000009471 action Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 2
- 230000002123 temporal effect Effects 0.000 claims description 2
- 238000004519 manufacturing process Methods 0.000 description 10
- 239000000243 solution Substances 0.000 description 7
- 239000000758 substrate Substances 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000003068 static effect Effects 0.000 description 5
- 238000011282 treatment Methods 0.000 description 4
- 230000000295 complement effect Effects 0.000 description 3
- 230000001143 conditioned effect Effects 0.000 description 2
- 235000014510 cooky Nutrition 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 239000012086 standard solution Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10297—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3274—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0225—Avoiding frauds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1013—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Definitions
- the present invention relates to the field of information processing and more particularly to access to a computer resource from coded information, for example an optical code of the QR Code type, or a code radio reading type NFC or RFID, or a steganographic marking such a watermark or audio tagging.
- coded information for example an optical code of the QR Code type, or a code radio reading type NFC or RFID, or a steganographic marking such a watermark or audio tagging.
- the coupon code has at least one encrypted URL and a unique coupon ID encrypted.
- a scanner reads the coupon ID and accesses a verification server via the URL.
- the verification server decrypts the unique encrypted coupon identifier and determines whether the decrypted unique coupon identifier is a valid coupon identifier
- the server sends the transaction code (QR-C) to the first terminal,
- US patent application US20120323665 discloses a computer readable code for verifying a coupon.
- the method of exploiting this code consists in receiving from a coupon verification terminal via a mobile telephone network a verification data packet on the basis of at least one additional verification information and a verification code. a coupon.
- European Patent EP2509275 discloses a system for authenticating an entity.
- the users (A, B) are provided with sets of authentication codes (3-5), each set comprising at least one secret (3), a private key by QR code (4) and a public key QR code. corresponding (5), the private and public key QR codes being QR-codes generated from respectively a first string (1) comprising a URL of a server authentication system (10) and a PKI private key and a second string (2) including the same URL and a PKI public key match.
- an action definition procedure is performed, wherein the first user is requested to enter a secret (3) of the same set of authentication codes (3-). 5). If a control gives a positive result, the first user can define a set of actions to be performed upon receipt of the second string (2) belonging to the same set of authentication codes on the authentication server system ( 10).
- US Patent Application 20130041734 discloses a coupon exchange method accessible from a mobile phone.
- the method generally includes a method by which a URL is electronically transferred to a mobile phone device for the purpose of allowing conditional access to coupons, premiums or discounts.
- US Pat. No. 8245932 discloses a method for reading at least one barcode carried by a substrate, the method comprising: a) producing, automatically, when a barcode is presented to a reading system of bar code, at least one authentication information element linked to an intrinsic physical characteristic of the substrate and independent of the data contained in the barcode, and b) to allow the reading of the barcode only in the case of authentication positive of the substrate, or the reading of the barcode whatever the result of the authentication of the substrate and in the case of a negative authentication of the substrate preventing access to only part of the data contained in the bar code and / or data that can be associated with bar code, stored on a data medium separate from the substrate.
- patent EP2509275 implements a "classical" QR code, the decoding of which leads to the opening of a session with a computer resource installed on a server, and performing a PKI type authentication from the parameters contained in the sequence decoded by the QR Code reader.
- the registration of a user results in a pair of QR Code, corresponding to the public key and the private key.
- the code will still be valid, and will still allow access to the computing resource realizing
- the QR Code having a
- the invention relates, according to its most general meaning, to a method of coding an access to a coded computer resource according to a first type of coding corresponding to the access path and to the identification of said computer resource, and able to be decoded by a reader characterized in that:
- said physical representation further comprises a conditional validity information coded according to a second coding type, corresponding to a condition of validity of the access to said computing resource,
- conditional validity information being able to be decoded by an application installed on an element of the network including the reader of the physical representation, one or more gateways and the server that hosts said computing resource.
- the invention relates to a method of coding an access to a computer resource, consisting in including in a physical representation of the code a first coded information according to a first type of coding corresponding to the access path and the identification of the code.
- said computer resource said first information being able to be decoded by the reader
- said physical representation further comprises a conditional information coded according to a second type coding, corresponding to a condition of validity of the access to said computing resource, said information conditional being able to be decoded by an application installed on a network element including the reader of the physical representation, one or more gateways and the server that hosts said computing resource.
- said access is coded according to a code semantically representative of an application domain.
- conditional information is temporal information corresponding to at least one period of validity of the access to said computing resource.
- said conditional information is geographical information corresponding to geolocation information compared to location information determined by the reader.
- said conditional information activates a request for at least one additional datum and the comparison between a datum associated with said conditional information.
- said conditional information activates a request for at least one additional datum and the comparison between a datum associated with said conditional information, in a predetermined response period.
- the computing resource for decoding said conditional information comprises a grammar of an application domain.
- said conditional information activates a request for at least one additional piece of data and the comparing a data item associated with said conditional information, based on the result of another request.
- said conditional information is processed on the reader, and not on the server.
- said conditional information is processed on a gateway, and not on the server.
- said code is decoded by a reader transmitting said first piece of information to the network, when said reader does not have a computing resource for decoding said conditional information and in that said first piece of information is not transmitted to the server corresponding to the access path only in the case where the conditional information is validated by at least one of the elements of the network having a computing resource for decoding said conditional information.
- said reader comprises an application for decoding the conditional information for performing a local processing commanding a local interface as a function of the result of the analysis of said conditional information.
- said reader comprises an application for decoding the conditional information to perform local processing controlling a remote action according to the result of the analysis of said conditional information.
- the computing resource for decoding said conditional information includes at least one database for recording exceptions to the validity condition.
- the invention also relates to a hardware medium comprising a physical representation integrating the code of a first coded information according to a first type of coding corresponding to the access path and to the identification of said computing resource, said first information being able to be decoded by the reader characterized in that:
- said physical representation further comprises a conditional validity information coded according to a second coding type, corresponding to a condition of validity of the access to said computing resource,
- conditional validity information being able to be decoded by an application installed on a network element including the reader of the physical representation, one or more gateways and the server hosting said computing resource.
- Figure 1 shows a schematic view of the treatments performed according to the state of the art
- FIG. 2 represents a schematic view of the treatments carried out according to a first variant of the invention
- FIG. 3 represents a schematic view of the treatments carried out according to a second variant of the invention.
- FIG. 4 represents a schematic view of the information flows exchanged between the components of the network, from the programming to the manufacture of the physical supports;
- FIG. 5 represents a schematic view of the information flows exchanged between the components of the network, from the physical supports to the management of their properties.
- FIG. 6 represents a schematic view of the production and operating process of the codes in accordance with the invention.
- FIG. 1 represents a schematic view of the processes carried out to exploit a QR Code, which corresponds to one of the nonlimiting examples of physical representation exploited by the invention.
- This code is characterized by a two-dimensional matrix printed on a support, with a standardized structure to allow its recognition by applications installed and executed on any device having an optical sensor, for example a tablet or a cell phone.
- This application is installed on the equipment, and activated by the user.
- the application When an image is placed in front of the sensor, the application carries out a first operation (2) of capturing the image to record it in the RAM of the equipment.
- the next step (3) is to analyze this information to check if it is a pattern that conforms to the specifications of a QR Code, and failing to repeat the acquisition.
- a decoding step (4) is performed to record the alphanumeric sequence corresponding to the analyzed QR Code (1).
- the next step (5) is to check whether this alphanumeric sequence corresponds to a URL type computer address.
- step (6) the application proceeds to a step (6) of opening an Internet browser-type application, and access to the remote resource corresponding to the decoded address during the first time. step (4).
- the QR code exploitation application goes to sleep and the server (7) executes the processing corresponding to the decoded address, for example to send an HTML file to the browser of the user's equipment.
- FIG. 2 represents the treatments carried out for the implementation of the invention according to a first variant.
- the equipment (tablet, telephone, 7) exploits according to this variant a "standard” application for QR Code processing.
- the difference lies in the fact that the URL is not that of the destination server, but that of a resolution server (8) corresponding to the decoded sequence.
- This resolution server (8) executes an application specific to the invention, consisting of decoding the second piece of information contained in the sequence transmitted to the resolution server (8) and determining whether the validity condition is checked or not. Only if the condition of validity formulated in the second information is verified, the server resolution (8) transmits to the browser the link to a remote server (7) whose address corresponds to a first information.
- step (9) generates an alternative link, for example to a server (11) providing a message declaring the invalid code.
- This server can be common to all invalid codes generated by an entity. This reduces the processing load of the main server, which will be solicited for valid codes, all other expired or invalid codes compared to the second information being processed by the second server (12).
- FIG. 3 represents a variant embodiment in which the equipment is not installed on a standard application for QR Code reading, but an application specific to the invention.
- the decoding of the second information is performed not on a remote server, but locally by the specific application installed on the reading device. If the second information is verified, the application opens the browser by a step (6) and transmits the address of the remote computing resource (7) corresponding to the first information.
- the application opens the browser by a step (6) and transmits the address of a local or remote computer resource (11) providing a message invalid, this server can be common to all expired or invalid codes of the same code producers.
- the address of this IT resource will be URI.
- the address of this computing resource will be of type URL for example.
- the path to the remote computing resource (7) can be calculated to be specific to each product on which is affixed a QR Code. It is constituted by a combination of the product identifier, for example its global trade item number (GTIN), or for a book an International Standard book number (ISBN), and characteristic descriptors such as the date of manufacture, or the expiry date.
- GTIN global trade item number
- ISBN International Standard book number
- First example of implementation concerns the production of physical media whose operating time is limited in time. These are for example QR Codes associated with a marketing campaign, allowing a consumer to access an online commercial offer from the acquisition of data from a QR Code with his mobile phone.
- a database comprising all the properties of each of the codes, an identifier, the validity start date and the validity end date, the destination URL during the validity period, and the date of validity. 'Destination URL beyond the validity period.
- a record is then extracted from the database for each of said codes. For each recording, these different properties are coded.
- the encryption of the obtained digital form is then associated with a prefix corresponding to the protocol and the address of the operating server, to form a URL per code.
- Each URL is then used to register in a physical medium, for example an optical reading code such as a QR Code.
- the user proceeds to read a code affixed to a physical medium, for example a package, with a mobile terminal, his mobile phone for example.
- the mobile includes a generic QR code reading application that provides the URL address stored in the acquired code.
- the player launches the internet browser that connects to the operating server specified in the code.
- This operating server decrypts and decodes the communicated parameter to retrieve the validity period information and the destination URL during the validity period and the destination URL outside the period validity.
- the operating server verifies the validity condition based on its clock and the decrypted and decoded information, and controls the transmission to one of the two destination URLs based on the result of this check.
- the operator of the marketing campaign retains an ability to depart from the validity rules.
- the operating server proceeds as in the general case to a code analysis, to extract the validity information and the destination URLs.
- the validity information is verified not only with respect to the static information entered in the code, local data, but also dynamic information calculated according to the information recorded in the derogatory basis and the decrypted and decoded information.
- the dynamic information will be for example a URL modified by a processing function of the decrypted and decoded URL, and information derived from the derogatory basis.
- an authorized user is able to access the static information entered in the code, local data.
- the authorized user proceeds to read a code affixed to a physical medium, for example a package, with a mobile terminal, his mobile phone for example.
- the mobile includes a specific application for reading the QR Code which provides the URL stored in the acquired code.
- the local application has a key capable of decrypting, and a grammar capable of decoding the conditional code parameter of the URL.
- the contextual parameters include the clock and the geographical position, but also the language (s) of the mobile, the signature of the browser ("User Agent”) ...
- the local application directly presents the information on the user's terminal without requiring a remote connection.
- an authorized user is able to access additional information available on a dedicated and secure site.
- the authorized user proceeds to read a code affixed to a physical medium, for example a package, with a mobile terminal, his mobile phone for example.
- the mobile includes a specific QR Code decoding application that provides the URL address stored in the acquired code.
- the local application has a key, or means to obtain a key, able to proceed with decryption, and a grammar, or means to obtain the grammar, able to decode the conditional code parameter the URL.
- the application uses this information to connect to another than the operating server specified in the URL. This new destination allows the authorized user to obtain additional information not included in the local code, which is missing from the original operating document, only available on a dedicated and secure site.
- Linked codes According to an alternative embodiment, an authorized user is able to access additional information.
- the authorized user proceeds to read a code affixed to a physical medium, for example a package, with a mobile terminal, his mobile phone for example.
- the mobile includes a specific application for reading the QR Code which provides the URL stored in the acquired code.
- the local application obtains a key capable of decrypting the conditional code as a parameter of the URL, by reading another code present on the physical medium.
- reading a second QR Code will make it possible to decrypt, locally, the first QR Code present on the physical medium.
- the validation of the code requires the input of additional information, which may be included in the original code support.
- This additional information can be constituted by a second code whose reading is possible with a tilt of the support different from that allowing the reading of the original code.
- an embodiment implementing a holographic printing or a lenticular network composed of a main code and a secondary code, to allow from the same zone of the substrate, to transmit to the reader successively the main code and the secondary code.
- An implementation variant concerns the production of physical media whose access to information is conditioned by complementary information.
- These include secure QR Codes, allowing a user to access private content from the combination of acquiring data from a QR Code with their mobile phone and entering information. complementary.
- a database comprising all the properties of each of the codes: an identifier and, for example, the value expected at the user's input, its type, its length and a label, or a reference wording, associate.
- a record is then extracted from the database for each of said codes. For each recording, these different properties are coded.
- the encryption of the digital form obtained by associating the various coded properties is then associated with a prefix corresponding to the protocol and the address of the operating server, to form a URL per code.
- the user proceeds to read a code affixed to a physical medium, for example a bank statement, with a mobile terminal, his mobile phone for example.
- a code affixed to a physical medium for example a bank statement
- a mobile terminal his mobile phone for example.
- the mobile includes a generic QR code reading application that provides the URL address stored in the acquired code.
- the player launches the internet browser that connects to the operating server specified in the code.
- This operating server decrypts and decodes the communicated parameter: the resultant of value expected at the input of the user, its type, its length and the associated label.
- the operating server is a mobile web page for the mobile user. This page has the label inviting to enter the field, according to the typing and length rules defined previously. The user will enter this field in the form that will be returned to the operating server.
- the authorized user is able to access the static information entered in the code, local data.
- the authorized user proceeds to read a code affixed to a physical medium, for example a bank statement, with a mobile terminal, his mobile phone for example.
- a code affixed to a physical medium for example a bank statement
- the mobile includes a specific application for reading the QR Code which provides the URL stored in the acquired code.
- the local application has a key capable of decrypting, and a grammar capable of decoding the conditional code parameter of the URL.
- the local application directly presents the information on the terminal of the user without requiring immediate remote connection.
- the local application has a mobile interface for the mobile user.
- This interface has the label inviting to enter the field, according to the typing and length rules defined previously. The user will enter this field in the form.
- Limited access number Another example of implementation relates to the production of a set of physical media whose access to information is limited by a number of accesses.
- QR Codes allowing a user to access a resource one time, or a limited number of times, with his mobile phone.
- a main database is created comprising all the properties of each of the codes, an identifier, a maximum number of accesses, the destination URL for a valid condition, and the alternative destination URL.
- a record is then extracted from the database for each of said codes. For each recording, these different properties are coded.
- the encryption of the obtained digital form is then associated with a prefix corresponding to the protocol and the address of the operating server, to form a URL per code.
- Each URL is then used to register in a physical medium, for example an optical reading code such as a QR Code.
- new records are created in a temporary database, or a memory space on the server.
- the user proceeds to read a code affixed to a physical medium with a mobile terminal, his mobile phone for example.
- the mobile includes a generic QR code reading application that provides the URL address stored in the acquired code.
- the operating server proceeds as in the general case to a code analysis, to extract the validity information and the destination URLs.
- the validity information is checked not only in relation to the static information entered in the code, local data, but also according to the information stored in the temporary database.
- Another example of implementation relates to the production of a set of physical media whose access to information is conditioned by the combination, or arrangement, of different media.
- QR Codes allowing a user to access private content from the acquisition of the respective data of a set of QR Code, through a selection or in sequence, with his phone mobile.
- a database comprising all the properties of each of the codes, among others: a code identifier, a duration, the ordered list of identifiers of the associated codes.
- a record is then extracted from the database for each of said codes. For each recording, these different properties are coded.
- Each URL is then used to register in a physical medium, for example an optical reading code such as a QR Code.
- the user proceeds to read a code affixed to a physical medium with a mobile terminal, his mobile phone for example.
- the mobile includes a generic QR code reading application that provides the URL address stored in the acquired code.
- the operating server proceeds as in the general case to a resolution of the code, to extract, among other things: a code identifier, a duration, the ordered list, or not, identifiers of the associated codes.
- the server registers and dates this record, in a temporary database, or in a dedicated memory space, or through a client cookie.
- the user is able to access the static information entered in the code, local data, through the reading of a code sequence, ordered or not.
- the mobile includes a specific application for reading the QR code able to locally process the method detailed in the previous embodiment. Production and exploitation process of the codes
- Figure 6 shows a schematic view of the process of producing and operating the codes according to the invention.
- a server (20) has a database constituted for each record:
- one or more remote resource addresses that may be associated with a code according to the invention, corresponding to the address of the resource associated with the product on which the representation will be affixed. physical code. This is the address of the computing resource to which the user's browser will access if the validity condition determined from the second information is verified.
- one or more validity criteria corresponding to the second information comprising one or more of the following information:
- an identifier for example the GTIN or ISBN identifier of the corresponding product
- a criterion for selecting an address from among a series of registered addresses corresponding to the first information is a criterion for selecting an address from among a series of registered addresses corresponding to the first information.
- a second piece of equipment (21) (it can be the same server as 20) extracts the aforementioned records and encodes them to provide a URL type sequence.
- This sequence can be optionally coded and / or encrypted. It is then coded by a step (22) according to a first coding to create a representation physical, for example according to a coding to produce a file for generating a QR Code or an NFC code.
- This physical representation (1) can be exploited in the usual way by a device (25) executing either a standard application or an application dedicated to decryption and / or decoding according to the invention.
- the result of the processing opens access to a computer resource (26) whose address has been decrypted by the application.
- an intermediate server (27) provides address conversion, based on a short address and a physical address, based on a look-up table transmitted in step (22).
- the server (28) is queried to determine if a change has occurred in the manufacturing steps of the physical representations.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Finance (AREA)
- General Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Toxicology (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Electromagnetism (AREA)
- Marketing (AREA)
- Economics (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1357709A FR3009409A1 (en) | 2013-08-02 | 2013-08-02 | METHOD FOR ENCODING ACCESS TO A COMPUTER RESOURCE |
PCT/FR2014/052016 WO2015015134A1 (en) | 2013-08-02 | 2014-08-01 | Method for encoding an access to a computer resource |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3028204A1 true EP3028204A1 (en) | 2016-06-08 |
Family
ID=49911613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14759039.2A Withdrawn EP3028204A1 (en) | 2013-08-02 | 2014-08-01 | Method for encoding an access to a computer resource |
Country Status (6)
Country | Link |
---|---|
US (1) | US20160337358A1 (en) |
EP (1) | EP3028204A1 (en) |
CN (1) | CN105723373A (en) |
FR (1) | FR3009409A1 (en) |
HK (1) | HK1225822A1 (en) |
WO (1) | WO2015015134A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3147890A1 (en) | 2015-09-28 | 2017-03-29 | Mobilead | Authenticity tag and methods of encoding and verification |
ITUB20154026A1 (en) * | 2015-09-30 | 2017-03-30 | Arti Grafiche Julia S P A | METHOD FOR THE PREPARATION AND FRUITION OF MULTIMEDIA CONTENT THROUGH COMPUTERIZED SUPPORT |
FR3044794B1 (en) * | 2015-12-03 | 2018-11-30 | Digital Packaging | PROCESS FOR PRODUCING AND CUSTOMIZING CONSUMER CONSUMER ITEMS FOR ACCESS TO CUSTOMIZED CONTENT |
US10237277B2 (en) * | 2016-08-15 | 2019-03-19 | Facebook, Inc. | Generating and utilizing digital visual codes to grant privileges via a networking system |
USD840413S1 (en) | 2016-08-15 | 2019-02-12 | Facebook, Inc. | Display screen or portion thereof with digital visual codes graphical user interface |
US10516675B2 (en) * | 2017-01-17 | 2019-12-24 | Microsoft Technology Licensing, Llc | Altering application security to support just-in-time access |
CN107480572B (en) * | 2017-08-15 | 2020-06-23 | 北京安云世纪科技有限公司 | Method and system for identifying coded data by using general service |
CN108537314A (en) * | 2018-03-27 | 2018-09-14 | 中国工商银行股份有限公司 | Product marketing system and method based on Quick Response Code |
US10958765B1 (en) * | 2019-09-17 | 2021-03-23 | Saudi Arabian Oil Company | Augmented reality for end-to-end data center it infrastructure layout |
US20220005576A1 (en) * | 2020-07-03 | 2022-01-06 | Vive Health LLC | System and method for linking a product to product information |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100741998B1 (en) * | 2000-03-09 | 2007-07-23 | 다카시 기타가와 | Portable information processing apparatus, license registration check server, electronic commerce offer server, sever for navigation, electronic commerce method using the same, and navigation method |
EP1920392A4 (en) * | 2005-08-31 | 2014-08-06 | Ericsson Telefon Ab L M | An ims node, an information node, a user node, an access control system, a method for mediating between a user node and an information node, a method for communicating with an ims node |
JP2007164449A (en) * | 2005-12-13 | 2007-06-28 | Fujitsu Ltd | Personal information management device, personal information providing method using personal information management device, program for personal information management device and personal information providing system |
FR2925731B1 (en) * | 2007-12-24 | 2010-10-22 | Streamezzo | CORRESPONDING DECODING METHOD, TERMINAL AND COMPUTER PROGRAM, TRANSLATION METHOD, SERVER AND CORRESPONDING COMPUTER PROGRAM |
EP2509275A1 (en) * | 2011-04-04 | 2012-10-10 | Buntinx | Method and system for authenticating entities by means of mobile terminals |
US20130198078A1 (en) * | 2012-01-18 | 2013-08-01 | OneID Inc. | Secure graphical code transactions |
-
2013
- 2013-08-02 FR FR1357709A patent/FR3009409A1/en active Pending
-
2014
- 2014-08-01 CN CN201480051308.7A patent/CN105723373A/en active Pending
- 2014-08-01 US US14/909,236 patent/US20160337358A1/en not_active Abandoned
- 2014-08-01 EP EP14759039.2A patent/EP3028204A1/en not_active Withdrawn
- 2014-08-01 WO PCT/FR2014/052016 patent/WO2015015134A1/en active Application Filing
-
2016
- 2016-12-06 HK HK16113891A patent/HK1225822A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
CN105723373A (en) | 2016-06-29 |
US20160337358A1 (en) | 2016-11-17 |
HK1225822A1 (en) | 2017-09-15 |
FR3009409A1 (en) | 2015-02-06 |
WO2015015134A1 (en) | 2015-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3028204A1 (en) | Method for encoding an access to a computer resource | |
US11611553B2 (en) | Online identity verification platform and process | |
US9800408B2 (en) | Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof | |
CN105763635B (en) | Information processing method, system and server | |
CN102184501A (en) | Electronic coupon system of mobile terminal | |
FR2972830A1 (en) | SYSTEM FOR CONTROLLING VALIDATION OF TRANSPORT TITLES | |
EP2987124B1 (en) | Method and system for improving the security of electronic transactions | |
EP2652900B1 (en) | Method for authenticating a user of a terminal with respect to a service provider | |
CN102819801A (en) | Fake-verifying system and method for anti-fake device | |
EP4222616A1 (en) | Terminal, device for customising service requests and methods enabling a customised service | |
FR2867650A1 (en) | User`s eligibility identifying method for telecommunication applications, involves sending response confirming or invalidating authenticity of barcode based on presence or absence of barcode in database and displaying response on terminal | |
Erlangga et al. | Increasing Secret Data Hiding Capacity in QR Code Using Subcells | |
WO2009083527A1 (en) | Method and system for authenticating individuals on the basis of biometric data | |
WO2005024682A1 (en) | Communication system for traceability monitoring | |
EP1406425B1 (en) | Method for producing a multimedia isolating identifier by an access provider | |
EP3391265A1 (en) | Method for generating a challenge word, electronic device, set value peripheral, and system implementing said method | |
WO2023099418A1 (en) | Method for processing a transaction involving the use of a public identifier, device, system and computer programs corresponding thereto | |
EP4099249A1 (en) | Method and device for transmitting an identifier of a user during an electronic payment made by the user | |
FR3036827A1 (en) | DEVICE AND METHOD FOR SECURING ACCESS TO A MERCHANT SITE | |
WO2009004249A1 (en) | Method and system for authenticating an object furnished with a data processing device, corresponding communication terminal and computer programs | |
EP2254275A1 (en) | Method of encryption of particular parts of a document for privileged users access | |
EP3405918A1 (en) | Method for performing a bank transfer | |
FR2814622A1 (en) | Message exchange payment transactions having coupons forming transaction client agreement with server receiving validation and multiple validations carried out with transaction passwords. | |
FR3003978A1 (en) | METHOD FOR MANAGING CONFIDENTIAL DATA, ASSOCIATED SYSTEM AND COMPUTER PROGRAM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20160201 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1225822 Country of ref document: HK |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: MOBILEAD |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20190301 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1225822 Country of ref document: HK |