GB2459686A - Encrypted Barcode including Time Sensitive Token - Google Patents

Encrypted Barcode including Time Sensitive Token Download PDF

Info

Publication number
GB2459686A
GB2459686A GB0807883A GB0807883A GB2459686A GB 2459686 A GB2459686 A GB 2459686A GB 0807883 A GB0807883 A GB 0807883A GB 0807883 A GB0807883 A GB 0807883A GB 2459686 A GB2459686 A GB 2459686A
Authority
GB
United Kingdom
Prior art keywords
barcode
mobile communications
communications device
encryption
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0807883A
Other versions
GB0807883D0 (en
Inventor
Robert Culyer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trinity Mobile Ltd
Original Assignee
Trinity Mobile Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trinity Mobile Ltd filed Critical Trinity Mobile Ltd
Priority to GB0807883A priority Critical patent/GB2459686A/en
Publication of GB0807883D0 publication Critical patent/GB0807883D0/en
Priority to PCT/EP2009/055235 priority patent/WO2009133159A1/en
Priority to EP09738203A priority patent/EP2289027A1/en
Publication of GB2459686A publication Critical patent/GB2459686A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • G06K7/1095Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices the scanner comprising adaptations for scanning a record carrier that is displayed on a display-screen or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Abstract

An encryption system (100) generates barcode data (D) from a base value (N) and a time-sensitive token (T), the time-sensitive token (T) defining a period of validity of the base value (N). The barcode data (D) is encrypted with a secure key (K) to provide barcode (150). The barcode may be provided to a mobile communications device (160). A decryption system, encryption method, decryption method, mobile communications device and a mobile communications device are also claimed. The secure key preferably comprises a public key and a private key, the encryption system holding the private key and the decryption system holding the public key. The encryption module preferably creates a two dimensional barcode (150) that is animated and/or changes colour on the display screen of the mobile device.

Description

Secure Barcode System
Field of the Invention
The field of the invention relates to barcodes. The invention may be used to provide a secure barcode representation of many types of information, for example an aircraft boarding pass or an identity document.
Background of the Invention
Various systems are known for the creation of barcodes.
These may function in accordance with a wide range of national and international standards. A list of standards for one and two-dimensional barcodes is provided n prior art US patent 5,939,699.
Barcodes may be transmitted to mobile communications devices, such as mobile phones or personal digital assistants (PDA5) . One known application of a barcode displayed on a mobile communications device is in the field of airline boarding passes. An airline may send a barcode to a passenger's mobile phone. The passenger can then place the display of the phone in front of a scanner, to verify the validity of the boarding pass.
This process may be used to enable the passenger, for example, to enter the waiting area at the departure gate of an airport.
Another known application of barcodes is in the field of shopping. Barcodes are appended to many goods for sale.
However, barcodes may also be used to represent thscount coupons. US patent application US-A-2003230630 discloses a system whereby a mobile phone may display a barcode representation of a discount. After presentation of the discount to a point of sale terminal, one alternative
I
offered by US-A-2003230630 foresees the electronically generated barcode representation of the discount being automatically expired, using a timeout capability. See for example paragraphs 0097-0099, 0124-0126 or 0171-0175 of US-A-2003230630.
UK patent application GB-A-2,420,894 shows an animated barcode. The barcode is animated, so that it can be detected more reliably by a barcode reader.
Statement of Invention
In accordance with a first aspect of the present invention, there is provided an encryption system in accordance with claim 1.
In accordance with a second aspect of the present invention, there is provided a decryption system n accordance with claim 6.
In accordance with a third aspect of the present invention, there is provided a method of encryption in accordance with claim 10.
In accordance with a fourth aspect of the present invention, there is provided a method of decryption in accordance with claim 19.
In accordance with a fifth aspect of the present invention, there is provided a mobile communications device in accordance with claim 26.
In accordance with sixth and seventh aspects of the present invention, there are provided uses of a mobile communications device in accordance with claims 30 and 31.
The appended dependent claims provide details of further optional features of embodiments of the invention.
Brief Description of the Drawings
Figure 1 shows an encryption system for creating a secure barcode.
Figure 2 shows a decryption system for recovering a base value.
Figure 3 shows a method of encryption for creating a secure barcode.
Figure 4 shows a method of decryption for recoverThg a base value.
Figures 5a-5d show a mobile communications device, including examples of moving barcodes.
Figure 6 shows a mobile communications device in accordance with an embodiment of the invention.
Throughout the following detailed description, reference numerals are used for elements shown on the drawings.
Capital letters indicate the parameters that may be used in the methods, systems and device of the invention, e.g. N', D', K' and T' Description of Preferred Embodiments of the Invention Figure 1 shows an encryption system 100 for creatThg a secure barcode 150, in accordance with an embodiment of the invention.
First generator 110 generates a base value N. The base value N comprises data about at least one person and/or at least one item. For example, base value N may be a unique number, indicating a person and a financial transaction that the person has completed. An example of a financial transaction would be the purchase of a ticket.
Base value N does not need to be unique to one person and that person's transaction. For example, base value N might indicate a group of people, or a class of transactions.
In its simplest form, base value N may be an identifier, data about a transaction, or a string of alphanumeric characters such as a password.
Second generator 120 generates a time-sensitive token T based on time window information. The time window defines a period of validity of the base value N. The time window may therefore convey information to a decryption system about the period of time during which the decryption system should recognize the base value N as being valid.
The length of the time window may vary widely, depending on the application of the barcode 150. If the barcode represents an aircraft boarding pass, for example, the time window might be a period of several tens of minutes, or a few hours. If the barcode represents a pass for entry to a secure location, then the time window might be the length of a worker's shift. If the barcode represents a ticket for entry to a concert or sports event, for example, then it might be several hours. Such a time period would include the time for a stadium or hail to fill up, plus the duration of the event itself, and a period for participants or spectators to leave the venue.
A barcode representing a password might be valid for the duration of an employee's assignment, such as an IT project.
Barcode 150 might also represent a pass for entry to a vehicle or to an area of a travel facility.
Alternatively, barcode 150 might represent a ticket for travel or a coupon offering a discount in a purchase transaction.
Third generator 130 generates barcode data D from the base value N and the time-sensitive token T. Barcode data D is an efficient format for conveying a mixture of both the information contained in base value N, and information about a validity period.
Encryption module 140 encrypts the barcode data with a secure key K, thereby creating a barcode 150 from the barcode data. Secure key K may be created in several ways. Issuing server 190 shows an example of one source of a secure key K. The means chosen for providing secure key K depend on the degree of security required from the encryption system 100.
The encryption system may provide secure key K to a decryption system, which is shown in detail in figure 2, discussed below.
Secure key K may comprise a private key and a public key.
The private key may represent a higher level of security, or may contain more information, than the public key. In
this example:
(i) The private key would be used to encrypt the barcode data D, and may be retained in issuing server 190; and (ii) The public key would be provided to the decryption system.
However, the encryption system 100 may simply rely on a secure key that comprises just a private key. In this example, the private key would be used by encryption module 140, and would also be supplied to the decryption system.
Encryption module 140 may then provide barcode 150 to a mobile communications device 160. In the example of figure 1, encryption module 140 transmits barcode 150 to mobile communications device 160 via a wireless link 180.
Mobile communications device 160 may, for example, be a mobile phone, personal digital assistant, iphone', a Blackberry' TM or communication-enabled gaming system.
Barcode 150 can then be displayed on screen 170 of mobile communications device 160.
In an alternative arrangement, encryption module 140 may provide barcode 150 over a landline' connection to a fixed phone, desktop-or laptop personal computer. The fixed phone or personal computer may then hold the barcode 150 until such time as it is needed. At that point, it may then be uploaded to a mobile communications device. Barcode 150 may pass to the mobile communications device 160 by a Bluetooth link, a temporary wired connection, via an optical link, or by plugging the mobile communications device 160 into a cradle.
The encryption system may be arranged to create a barcode 150 that moves, and/or changes colour, on display screen of the mobile communications device 160. The movement of barcode 150 on display screen 170 may comprise one or more of: linear movement; shrinking; growing; rotating.
Time sensitive token T may serve to make copying of barcode 150 more difficult than with prior art systems.
One illustration of how this is possible is to consider the case where the time token T represents a time window in the range of 10-100 seconds, for example 30 seconds.
With this example, barcode 150 is only valid for 30 seconds.
If such a barcode is presented to a decryption system outside the 30 second time window for which it is valid, then the decryption system will assess it as being invalid. The decryption system may pass this assessment directly to the mobile communications device 160, or may communicate it to a user of mobile communications device 160. Encryption system 100 can be arranged to then generate a new barcode 150, with a new time window, when it has received and authenticated a request for re-issue from the mobile communications device 160.
Authentication might, for example, be achieved by checking the mobile phone number of the mobile communications device 160 that submits the request. The new barcode would then be made available only to the specific mobile communications device 160 to which the first barcode had been issued.
If a fraudulent attempt were made to copy the original barcode, for example by taking a picture of the barcode on the screen of the mobile communications device 160, or by forwarding it to another phone, this attempt would be likely to fail, due to the short validity period of the barcode. Only the mobile communications device 160 that is entitled to receive barcode 150 would be able to request that the encryption system 100 issue a new barcode.
A suitable mechanism for providing barcodes with only 30 second validity would be a mobile internet page or a Java session, both of which can employ a variety of authentication techniques.
Figure 1 shows a two-dimensional barcode 150. However, other forms of barcode may be generated. For example, a barcode using colours may be employed. This may allow more data to be included for a given image size, or may allow greater levels of security.
Figure 2 shows a decryption system 200 for recovering base value N, in accordance with an embodiment of the invention.
Barcode 250, mobile communications device 260, display screen 270 and wireless link 280 correspond to the similarly numbered elements of figure 1.
Decryption system 200 comprises receiver 205 for receiving barcode 250. Receiver 205 may be adapted to receive barcode 150 from a mobile communications device 260.
Decryption system 200 further comprises decryption module 215, for decrypting barcode 250 with secure key K, to provide barcode data D, and for dividing barcode data D into base value N and time-sensitive token I. Finally, decryption system 200 comprises validation module 225, for determining that the base value N is invalid, if the time-sensitive token I is invalid.
If the time-sensitive token I is valid, then validation module 225 may be adapted simply to accept base value N as valid. Alternatively, if the time-sensitive token I is valid, then validation module 225 may be adapted to perform at least one further validity check on base value N. Dotted line 290 shown on figure 2 represents the provision of secure key K to decryption system 200 from encryption system 100.
As explained in connection with figure 1, secure key K may comprise a private key and a public key. In this example, decryption system 200 would be adapted to receive the public key from encryption system 100, and to decrypt the barcode 250 with the public key.
In the example where the secure key comprises only a private key, decryption system 200 would be adapted to receive the private key from encryption system 100, and to decrypt barcode 250 with the private key.
In an alternative arrangement that is not shown on figure 2, the secure key K could be provided by an issuing server incorporated into decryption system 200. Secure key K would then be provided to the encryption system 100 from decryption system 200.
Decryption system 200 may be adapted to receive secure key K from encryption system 100, before receiving barcode 250, and then to not require further communication with any other device, other than the mobile communications device from which it receives barcode 150. The result is a decryption system 200 with a high degree of autonomy, which may provide a high degree of reliability.
This advantage can be understood by considering examples where barcode 250 represents a boarding pass, concert ticket or sports ticket. In such cases, there is great advantage in decryption system 200 not needing to establish contact with encryption system 100 whilst barcodes are being received by receiving module 205. If decryption system 200 were reliant on real-time' continuous or frequent communication with encryption system 100, then outage of the communication link to encryption system 100 might prevent decryption system 200 from working. In real-world' airport, concert or sports venues, queues of people would be likely to build up rapidly, with consequential negative effects on customer experience.
Figure 3 shows a flow chart for a method of encryption for creating a secure barcode, in accordance with an embodiment of the invention.
Step 310 comprises generating a base value N. Base value N may comprise data about at least one person and/or at least one item.
Step 320 comprises generating a time-sensitive token I from time window information. The time window information defines a period of validity of the base value N. Step 330 comprises generating barcode data D from the base value N and the time-sensitive token I. Step 340 comprises encrypting the barcode data D with a secure key K. Step 350 comprises creating a barcode 150 from the barcode data D. Barcode 150 may be transmitted to a mobile communications device 160. In addition, the barcode 150 created in step 350 may move, and/or change colour, on a display screen 170 of the mobile communications device 160. The movement of the barcode on the display screen 170 of the mobile communications device 160 may comprise at least one of: linear movement; shrinking; growing; and/or rotatThg.
Base value N may comprise data about at least one person and/or at least one item. Base value N may comprise data about at least one from the group of: a boarding pass for entry to an aircraft; a pass for entry to a vehicle, to an area of a travel facility, to a secure location, to a concert or to a sports event; a ticket for travel; or a coupon.
Secure key K may be provided to the decryption system 200 of figure 2.
Secure key K may comprise a private key and a public key.
In this case, step 340 comprises encrypting the barcode data D with the private key, and the public key is provided to the decryption system 200. In a simpler arrangement, secure key K only comprises the private key, which is used in step 340 and is transmitted to the decryption system 200.
Figure 4 shows a flow chart for a method of decryption for recovering a base value N, in accordance with an embodiment of the invention.
Step 405 comprises receiving a barcode 250. Step 405 may comprise receiving the barcode from a mobile communications device 260. If the barcode is received from a mobile communications device 260, then it may be read from a display 270 of the mobile communications device with a barcode reader. The barcode may be received via at least one of: an optical link; a temporary wired link; or a wireless radio link.
Step 415 comprises decrypting barcode 250 with secure key K, to provide barcode data D. Step 425 comprises dividing the barcode data D into base value N and time-sensitive token T. Step 435 comprises determining that the base value N is invalid, if the time-sensitive token T is invalid.
If the time-sensitive token T is valid, then the method may proceed to step 445. Step 445 comprises performing a further check on the validity of the barcode.
If the time sensitive token is invalid, then the method may proceed to step 455. Step 455 comprises discarding the barcode. However, step 455 may alternatively comprise informing the mobile communications device 260 or a user of the mobile communications device 260 that the barcode is not valid. As discussed in connection with figure 1, mobile communications device 260 may be adapted to then request a new barcode from encryption system 100.
Step 435 may comprise checking the time sensitive token I against a known valid token derived from a clock. Here a clock' may involve a time datum from a variety of sources.
Secure key K may comprise a private key and a public key.
In this case, step 415 comprises decrypting the barcode data D with the public key. The private key is retained by the encryption system 100. In the simpler case of the secure key comprising only a private key, step 415 comprises decrypting the barcode data D with the private key provided by encryption system 100.
Figures 5a-5d show a mobile communications device, including an example of a moving barcode.
Figure 5a shows a barcode reader 510. A mobile communications device 530 is also shown. In the view shown in figure 5a, mobile communications device 530 is being presented to a reading window 520 of barcode reader 510. Mobile communications device 530 may display a moving barcode on its display screen. Each of figures Sb-Sd shows one barcode that could be displayed on the screen of mobile communications device 530. In each of figures 5b-5d, the second and third images of the mobile communications device correspond to successively later snapshot' views of the same barcode.
The successive views of a mobile communications device in figure 5b show a barcode on the display of the mobile communications device that appears, to a viewer, to rotate.
The successive views of a mobile communications device in figure 5c show a barcode that appears, to a viewer, to grow.
The successive views of a mobile communications device in figure 5d show a barcode that appears, to a user, to move from left to right across the display of the mobile communications device.
Each of the three forms of movement shown on figures 5b- 5d may assist detection of the barcode by barcode reader 510, and hence decryption system 200.
In addition, some mobile communications networks may reduce the resolution or re-fresh rate of stationary images. Movement of barcode 150 may serve to ensure that the mobile communications network provides greater resolution and/or more frequent refreshes of the barcode image as it is transmitted through the mobile communications network, for example from encryption system 100 to mobile communications device 160.
Some mobile phones are arranged to save power, e.g. by switching off a back-light, when the image that they display has not changed for a given period of time. Such power saving approaches might render barcode 150 more difficult to detect, if it were stationary. Movement of the barcode may therefore enhance the visibility of barcode 150 for decryption system 200.
Figure 6 shows a mobile communications device 600 for displaying a secure barcode, in accordance with an embodiment of the invention.
Mobile communications device 600 comprises a receiver 610 for receiving an encrypted barcode, and a display 670 for displaying an encrypted barcode. The display may be of sufficient size to allow movement of the encrypted barcode as shown in figures Sb-Sd.
Mobile communications device 600 includes a transmitter 620. The mobile communications device 600 is adapted, after a first encrypted barcode 150 has been received by receiver 610, to receive a notification that the first encrypted barcode 150 is invalid as a consequence of a time token T component of the encrypted barcode 150 being invalid. Decryption system 200 may provide the notification.
The mobile communications device 600 is further adapted to transmit a request to receive a second encrypted barcode, as a replacement for the first encrypted barcode 150. The request for re-issue of the barcode was discussed in connection with figure 1 above.
Mobile communications device 600 may also comprise keypad 680, or may be adapted to receive commands through voice activation. The mobile communications device 600 may be adapted to receive the notification that a first encrypted barcode 150 is invalid by one or both of: (i) voice activation; and/or (ii) operation of a key by a user of the mobile communications device 600. The key is part of keypad 680.
Alternatively, the mobile communications device 600 may be adapted to receive the notification from a decryption system 200. This may follow presentation of the thsplay 670 of the mobile communications device 600 to the barcode reader of the decryption system 200.
Mobile communications device 600 may be adapted to receive the notification that a first encrypted barcode 150 is invalid from encryption system 100. This would prevent the user from attempting to present the invalid barcode 650 to a decryption system 200. This has the advantage of allowing the user of the mobile communications device 600 to immediately request a second barcode from the encryption system 100. If the user is queuing at an airport departure gate, sports or music venue, this would prevent unnecessary delays to other persons in the queue from vain attempts to present invalid barcodes to the decryption system 200.
The first encrypted barcode and the second encrypted barcode may be provided to mobile communications device 600 by a variety of methods. For example: (i) The barcodes could be delivered using Short Messaging Service (SMS) or Multi-media Messaging System (MMS) (ii) The barcode could be delivered to a web page. This would be in Wireless Application Protocol (WAP) for phone browsers of relatively low power. However, the barcode could be made available on a web page for the browsers of more powerful phones, such as an i-phone. The encryption system could use a single source, and perform automatic adaptation depending on the identity of the connecting browser. Most phones support one or both of these browser types.
(iii) The barcode could be delivered to a Java application, or another application environment such as Symbian' or Windows Mobile'TM. This would require the application to be downloaded to the phone.
A wide variety of mobile communications devices may be used to receive a barcode (150) created in accordance with the present invention, or to present such a barcode (250) to a decryption system. So the invention also comprises the use of a mobile communications device to receive a barcode (150) created by the encryption system (100) of the invention, or the encryption method of the invention. The invention further comprises the use of a mobile communications device either: (i) to present a barcode (250) to the decryption system (200) of any of claims 6 to 9; or (ii) to provide a barcode (250) as an input to the decryption method of any of claims 19 to 25; if the barcode (250) has been created by the encryption system (100) of any of claims 1 to 5, or the encryption method of any of claims 10-18.
GB0807883A 2008-05-01 2008-05-01 Encrypted Barcode including Time Sensitive Token Withdrawn GB2459686A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0807883A GB2459686A (en) 2008-05-01 2008-05-01 Encrypted Barcode including Time Sensitive Token
PCT/EP2009/055235 WO2009133159A1 (en) 2008-05-01 2009-04-29 Secure barcode system
EP09738203A EP2289027A1 (en) 2008-05-01 2009-04-29 Secure barcode system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0807883A GB2459686A (en) 2008-05-01 2008-05-01 Encrypted Barcode including Time Sensitive Token

Publications (2)

Publication Number Publication Date
GB0807883D0 GB0807883D0 (en) 2008-06-04
GB2459686A true GB2459686A (en) 2009-11-04

Family

ID=39522827

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0807883A Withdrawn GB2459686A (en) 2008-05-01 2008-05-01 Encrypted Barcode including Time Sensitive Token

Country Status (3)

Country Link
EP (1) EP2289027A1 (en)
GB (1) GB2459686A (en)
WO (1) WO2009133159A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2489247A (en) * 2011-03-21 2012-09-26 Big Box Software Ltd Method for secure communication of machine-readable encoded data
GB2491220A (en) * 2011-05-24 2012-11-28 Bob Beatty Displaying and selectively retrieving information encoded in a data matrix
EP2587421A1 (en) * 2011-10-31 2013-05-01 NCR Corporation Securely delivering and verifying a mobile boarding pass
EP2566208A3 (en) * 2011-08-31 2013-11-06 NCR Corporation Third-party content delivery via a unique mobile application address
WO2013184080A2 (en) * 2012-06-08 2013-12-12 Fi̇gen Yazilimevi̇ Ti̇caret Li̇mi̇ted Şi̇rketi̇ Employee attendance tracking system
EP2600281A3 (en) * 2011-11-30 2014-01-08 NCR Corporation Reading an optical code with authenticatable information
WO2014080214A1 (en) * 2012-11-23 2014-05-30 Pa Knowledge Limited A machine-readable tag and a reader and system for use with the tag
WO2014121909A3 (en) * 2013-02-11 2014-10-23 Fresenius Medical Care Deutschland Gmbh Device and method for generating and displaying graphic codes specific to medical apparatus and medical treatments
AT513805A3 (en) * 2013-01-11 2016-08-15 Xitrust Secure Tech Gmbh ID card, in particular electronic ID card
AT523530B1 (en) * 2020-05-06 2021-09-15 Tmia Gmbh Device for transforming a data record with a secret key

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030066883A1 (en) * 2001-10-10 2003-04-10 Yu Allen K. Electronic ticketing system and method
US20030131254A1 (en) * 2002-01-04 2003-07-10 Norbert Miller Method for preventing the falsification of access cards
US20030230630A1 (en) * 2001-12-20 2003-12-18 Whipple Larry Cale Using mobile electronic devices to transfer data through dynamically generated scannable barcode images
US20040123114A1 (en) * 2002-01-02 2004-06-24 Mcgowan Tim Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication
US20060144946A1 (en) * 2004-12-31 2006-07-06 Masayuki Kuriyama System and method for utilizing a highly secure two-dimensional matrix code on a mobile communications display
US7093130B1 (en) * 2000-01-24 2006-08-15 The Regents Of The University Of California System and method for delivering and examining digital tickets
EP1847974A1 (en) * 2005-02-10 2007-10-24 NTT DoCoMo INC. Information processing device, read terminal, non-public information read system, non-public information read method, information processing program, and non-public information read program

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2420894A (en) * 2004-12-03 2006-06-07 Trinity Mobile Ltd Animated barcodes for mobile phone displays

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7093130B1 (en) * 2000-01-24 2006-08-15 The Regents Of The University Of California System and method for delivering and examining digital tickets
US20030066883A1 (en) * 2001-10-10 2003-04-10 Yu Allen K. Electronic ticketing system and method
US20030230630A1 (en) * 2001-12-20 2003-12-18 Whipple Larry Cale Using mobile electronic devices to transfer data through dynamically generated scannable barcode images
US20040123114A1 (en) * 2002-01-02 2004-06-24 Mcgowan Tim Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication
US20030131254A1 (en) * 2002-01-04 2003-07-10 Norbert Miller Method for preventing the falsification of access cards
US20060144946A1 (en) * 2004-12-31 2006-07-06 Masayuki Kuriyama System and method for utilizing a highly secure two-dimensional matrix code on a mobile communications display
EP1847974A1 (en) * 2005-02-10 2007-10-24 NTT DoCoMo INC. Information processing device, read terminal, non-public information read system, non-public information read method, information processing program, and non-public information read program

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2489247A (en) * 2011-03-21 2012-09-26 Big Box Software Ltd Method for secure communication of machine-readable encoded data
GB2491220A (en) * 2011-05-24 2012-11-28 Bob Beatty Displaying and selectively retrieving information encoded in a data matrix
EP2566208A3 (en) * 2011-08-31 2013-11-06 NCR Corporation Third-party content delivery via a unique mobile application address
US9179306B2 (en) 2011-08-31 2015-11-03 Ncr Corporation Techniques for third-party content delivery via a unique mobile application address
CN103281179B (en) * 2011-10-31 2016-10-26 Ncr公司 The safe transmission of mobile boarding card and the system and method for checking
CN103281179A (en) * 2011-10-31 2013-09-04 Ncr公司 System and method of securely delivering and verifying a mobile boarding pass
EP2587421A1 (en) * 2011-10-31 2013-05-01 NCR Corporation Securely delivering and verifying a mobile boarding pass
EP2600281A3 (en) * 2011-11-30 2014-01-08 NCR Corporation Reading an optical code with authenticatable information
WO2013184080A2 (en) * 2012-06-08 2013-12-12 Fi̇gen Yazilimevi̇ Ti̇caret Li̇mi̇ted Şi̇rketi̇ Employee attendance tracking system
WO2013184080A3 (en) * 2012-06-08 2014-01-30 Fi̇gen Yazilimevi̇ Ti̇caret Li̇mi̇ted Şi̇rketi̇ Employee attendance tracking system
WO2014080214A1 (en) * 2012-11-23 2014-05-30 Pa Knowledge Limited A machine-readable tag and a reader and system for use with the tag
AT513805A3 (en) * 2013-01-11 2016-08-15 Xitrust Secure Tech Gmbh ID card, in particular electronic ID card
WO2014121909A3 (en) * 2013-02-11 2014-10-23 Fresenius Medical Care Deutschland Gmbh Device and method for generating and displaying graphic codes specific to medical apparatus and medical treatments
US10185834B2 (en) 2013-02-11 2019-01-22 Fresenius Medical Care Deutschland Gmbh Device and method for generating and displaying graphic codes specific for medical devices and medical treatment
AT523530B1 (en) * 2020-05-06 2021-09-15 Tmia Gmbh Device for transforming a data record with a secret key
AT523530A4 (en) * 2020-05-06 2021-09-15 Tmia Gmbh Device for transforming a data record with a secret key

Also Published As

Publication number Publication date
GB0807883D0 (en) 2008-06-04
EP2289027A1 (en) 2011-03-02
WO2009133159A1 (en) 2009-11-05

Similar Documents

Publication Publication Date Title
GB2459686A (en) Encrypted Barcode including Time Sensitive Token
ES2278979T3 (en) SECURE HANDLING OF DEPOSIT DATA OBJECTS.
EP3477568B1 (en) Customer identification verification process
CN104134142B (en) A kind of subway booking recognized based on Quick Response Code, ticket checking method
US20030093695A1 (en) Secure handling of stored-value data objects
CA2759036C (en) Improvements in or relating to the distribution and printing of travel documents
CA2943884C (en) Systems and methods for wireless authorization of transactions with mobile payment devices
EP2151795A1 (en) Secure electronic coupon delivery to mobile device
US8672221B2 (en) System and method of securely delivering and verifying a mobile boarding pass
KR100921353B1 (en) Apparatus and Method for authentication using mobilephone card
US20160309327A1 (en) System and method for providing a service to the user of a mobile terminal
US11321439B2 (en) Identity authentication system and method thereof
US10552618B2 (en) Method and apparatus for transmission of visually encoded data
NL1029388C2 (en) Access control and ticket therefor.
JP2004326241A (en) Data transmission server and data processing system
CA3002118A1 (en) Systems and methods for user specific data transmission with improved data protection
JP2022179713A (en) Authenticated device, authentication device, authentication request transmission method, authentication method, and program
US11750604B2 (en) Information providing system and information providing method
JP2023107950A (en) Apparatus, system, and application program
KR20230140776A (en) System for detecting false qr code
JP6214348B2 (en) Customer email address acquisition method and customer email address acquisition system

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)