HK1225822A1 - 用於編碼訪問至計算機資源的方法 - Google Patents

用於編碼訪問至計算機資源的方法

Info

Publication number
HK1225822A1
HK1225822A1 HK16113891A HK16113891A HK1225822A1 HK 1225822 A1 HK1225822 A1 HK 1225822A1 HK 16113891 A HK16113891 A HK 16113891A HK 16113891 A HK16113891 A HK 16113891A HK 1225822 A1 HK1225822 A1 HK 1225822A1
Authority
HK
Hong Kong
Prior art keywords
encoding
access
computer resource
resource
computer
Prior art date
Application number
HK16113891A
Other languages
English (en)
Inventor
Laurent Tonnelier
Ludovic Lebas
Original Assignee
Mobilead
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mobilead filed Critical Mobilead
Publication of HK1225822A1 publication Critical patent/HK1225822A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0225Avoiding frauds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1013Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Toxicology (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)
HK16113891A 2013-08-02 2016-12-06 用於編碼訪問至計算機資源的方法 HK1225822A1 (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1357709A FR3009409A1 (fr) 2013-08-02 2013-08-02 Procede de codage d'un acces a une ressource informatique

Publications (1)

Publication Number Publication Date
HK1225822A1 true HK1225822A1 (zh) 2017-09-15

Family

ID=49911613

Family Applications (1)

Application Number Title Priority Date Filing Date
HK16113891A HK1225822A1 (zh) 2013-08-02 2016-12-06 用於編碼訪問至計算機資源的方法

Country Status (6)

Country Link
US (1) US20160337358A1 (zh)
EP (1) EP3028204A1 (zh)
CN (1) CN105723373A (zh)
FR (1) FR3009409A1 (zh)
HK (1) HK1225822A1 (zh)
WO (1) WO2015015134A1 (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3147890A1 (en) 2015-09-28 2017-03-29 Mobilead Authenticity tag and methods of encoding and verification
ITUB20154026A1 (it) * 2015-09-30 2017-03-30 Arti Grafiche Julia S P A Metodo per la preparazione e la fruizione di contenuti multimediali tramite supporto informatizzato
FR3044794B1 (fr) * 2015-12-03 2018-11-30 Digital Packaging Procede de production et de personnalisation d'articles de grande consommation en vue de l'acces a des contenus personnalises
USD840413S1 (en) 2016-08-15 2019-02-12 Facebook, Inc. Display screen or portion thereof with digital visual codes graphical user interface
US10237277B2 (en) * 2016-08-15 2019-03-19 Facebook, Inc. Generating and utilizing digital visual codes to grant privileges via a networking system
US10516675B2 (en) * 2017-01-17 2019-12-24 Microsoft Technology Licensing, Llc Altering application security to support just-in-time access
CN107480572B (zh) * 2017-08-15 2020-06-23 北京安云世纪科技有限公司 一种利用通用服务识别编码数据的方法及系统
CN108537314A (zh) * 2018-03-27 2018-09-14 中国工商银行股份有限公司 基于二维码的产品营销系统及方法
US10958765B1 (en) * 2019-09-17 2021-03-23 Saudi Arabian Oil Company Augmented reality for end-to-end data center it infrastructure layout
US20220005576A1 (en) * 2020-07-03 2022-01-06 Vive Health LLC System and method for linking a product to product information

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001241083A1 (en) * 2000-03-09 2001-09-17 Takashi Kitagawa Information processing apparatus with optical data reader, servers, and electronic commerce method
WO2007026914A1 (en) * 2005-08-31 2007-03-08 Telefonaktiebolaget Lm Ericsson (Publ) An ims node, an information node, a user node, an access control system, a method for mediating between a user node and an information node, a method for communicating with an ims node
JP2007164449A (ja) * 2005-12-13 2007-06-28 Fujitsu Ltd 個人情報管理装置、個人情報管理装置を用いた個人情報提供方法、個人情報管理装置用プログラムおよび個人情報提供システム
FR2925731B1 (fr) * 2007-12-24 2010-10-22 Streamezzo Procede de decodage, terminal et programme d'ordinateur correspondants, procede de traduction, serveur et programme d'ordinateur correspondants
EP2509275A1 (en) * 2011-04-04 2012-10-10 Buntinx Method and system for authenticating entities by means of mobile terminals
US20130198078A1 (en) * 2012-01-18 2013-08-01 OneID Inc. Secure graphical code transactions

Also Published As

Publication number Publication date
CN105723373A (zh) 2016-06-29
US20160337358A1 (en) 2016-11-17
FR3009409A1 (fr) 2015-02-06
EP3028204A1 (fr) 2016-06-08
WO2015015134A1 (fr) 2015-02-05

Similar Documents

Publication Publication Date Title
HK1225822A1 (zh) 用於編碼訪問至計算機資源的方法
HK1223729A1 (zh) 針對聯網設備的數據管理
GB201609371D0 (en) Apparatus and method for managing access to a resource
GB2517212B (en) A Computer Generated Emulation of a subject
GB2505564B (en) Software development tool
EP2959365A4 (en) PEN FOR A DIGITIZATION SYSTEM
GB201317201D0 (en) A system for performing an operation within an elongated space
EP3005019A4 (en) INTERNAL ARCHITECTURE OF COMPUTER
GB201309985D0 (en) Rebuilding data of a storage system
GB2514428B (en) Enabling access to data
EP2891993A4 (en) METHOD FOR VIRTUALIZING EXTENSIVE DISTRIBUTED HETEROGENIC DATA
SG11201510258PA (en) Method for obtaining motion information
TWI561962B (en) Computer system
EP2989555A4 (en) Barcode access to electronic resources for complex system parts
GB201314375D0 (en) Performance metrics of a computer system
EP2998866A4 (en) INFORMATION MANAGEMENT PROCEDURE
EP3007365A4 (en) SECURE INFORMATION INTERACTION METHOD FOR TRANSFERRING ELECTRONIC RESOURCES
GB201315966D0 (en) Computer implemented method for searching resources via a web application
EP3076361A4 (en) FORECAST SYSTEM, PREDICTED PROCEDURE AND COMPUTER PROGRAM
GB201317203D0 (en) Computer program generation
SG11201506572XA (en) A method of, and a system for, analysing data relating to an individual
GB201308177D0 (en) A method for interacting with an augumented reality scene
GB2513669B (en) Enabling access to data
AU349263S (en) Case for a tablet computer
GB201310659D0 (en) A voice-controlled computer system