New! View global litigation for patent families

WO2017059479A1 - Method and system for accessing data using a symbol - Google Patents

Method and system for accessing data using a symbol

Info

Publication number
WO2017059479A1
WO2017059479A1 PCT/AU2016/000343 AU2016000343W WO2017059479A1 WO 2017059479 A1 WO2017059479 A1 WO 2017059479A1 AU 2016000343 W AU2016000343 W AU 2016000343W WO 2017059479 A1 WO2017059479 A1 WO 2017059479A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
symbol
code
device
user
data
Prior art date
Application number
PCT/AU2016/000343
Other languages
French (fr)
Inventor
Barry Johan JANSINK
Original Assignee
Jansink Barry Johan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/03Detection or correction of errors, e.g. by rescanning the pattern
    • G06K9/036Evaluation of quality of acquired pattern
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00496Recognising patterns in signals and combinations thereof

Abstract

A system of accessing data represented by a symbol or sign (2) after image capture of the symbol and to be displayed on a device, said system including a device (12) having image capturing means for capturing and storing said symbol (2), said symbol (2) having a code (35) identifying the symbol, server means (16) in communication with said device (12) for receiving said code (35), database means (32) in communication with said server means (16) and storing a plurality of codes representing a plurality of symbols, wherein said server means (16) determines if the code (35) is valid, and if valid, sends a message to said device (12) with data associated with said code (35) for display on the device (12).

Description

METHOD AND SYSTEM FOR ACCESSING DATA USING A SYMBOL

Field of the Invention

This invention relates to a method and system of enabling access to real-time data from a symbol or sign. More particularly the invention relates to a method and system for enabling the display on a device of real-time data by capturing information from the symbol or sign using the device. The invention also relates to a method of encoding a symbol or sign that displays data on a device after image capture of the symbol or sign.

Background of the Invention

To facilitate easy and quick identification of products, barcodes have been used as a convenient way to convey information about products, particularly about inventory and at point of sale scanning. Barcodes in particular are intended to relay specific information about an item to a device, such as a scanner, or computer storage facility for end use by a system or by a user.

In more recent times quick response codes or QR codes have been used in advertising, information sharing networks and in social media where such codes are made available in public, for example on posters, flyers, printed publications or websites. A QR code is essentially a matrix bar code or a two-dimensional bar code. Each QR code has three squares at its periphery to position and align it with an image capture device when read. A set of characters is formed using mathematics and this forms a website IP address. End users can capture such codes with an image capture device, such as on a mobile phone, in order to access more information about that product.

A particular problem with bar codes is that they only identify or distinguish one product from another without giving further information about the product, for example where it is made, how it was produced or what it consists of. QR codes have to some extent overcome this problem by enabling users to capture a QR code with a device camera which can then access a website through a browser on the device that can give much further detailed information about the product for the user, with the information being displayed on the device.

However QR codes have recently been used for malicious activity and malicious transactions whereby misuse or corruption of a code is processed by a device camera and can direct the user to a malicious website to obtain confidential information about the user or to download malicious software onto the device itself. As an example, malicious QR codes can be in the form of a sticker which is placed over a legitimate QR code with the malicious QR code effectively representing a scam advertisement and has no affiliation with the original QR code representing a product of a company. Other occurrences have been where a specific QR code has been placed on a consumer product and has directed a user to an adult website or some other malicious website simply because that site had no longer been used by the product manufacturer and was subsequently sold on to another content provider. In such situations where the users are caught in this manner, the original manufacturer may have to recall all of the products affected in the market or to make an arrangement with the new owner of the website. There is no security with QR codes and it is relatively easy, without the user knowing, of receiving a virus on a smartphone which can then be forwarded on to a website or to the user's bank account.

Generally only one-third of the QR code needs to be showing in order to be read by an image capturing device, which is another disadvantage.

The present invention seeks to overcome one or more of the above disadvantages by providing a method and system of retrieving real-time date about a product or service in a secure environment where the user can capture the symbol or image and securely access further information or data associated with the symbol or image.

Summary of the Invention

According to a first aspect of the invention, there is provided a system of accessing data represented by a symbol after image capture of the symbol and to be displayed on a device, said system including:

a device having image capturing means for capturing and storing said symbol, said symbol having a code identifying the symbol;

server means in communication with said device for receiving said code, database means in communication with said server means and storing a plurality of codes representing a plurality of symbols;

wherein said server means determines if the code is valid, and if valid, sends a message to said device with data associated with said code for display on the device.

The system may further include a second database to verify that the code identified as being valid is not fraudulent or blacklisted. The server means can generate a new symbol upon request and/or payment for use by a user. The system may iurther include a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user. The system may further include a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.

According to a second aspect of the invention, there is provided a method of accessing data represented by a symbol, including the steps of:

capturing and storing the symbol using an image capturing means of a device, said symbol having a code identifying the symbol; sending said code to a server means;

said server means ascertaining if said code is valid by communicating with a database storing a plurality of codes representing a plurality of symbols; and

sending a message to said device from said server means with data associated with said code for display on the device if said code is valid.

The method may further include verifying through a second database that the code identified as being valid is not fraudulent or blacklisted. It may further include generating a new symbol upon request and/or payment for use by a user. The method may further include providing a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user. It may further include providing a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.

According to a third aspect of the invention, there is provided a method of encoding a symbol that displays data on a device after image capture of the symbol, the method including:

providing an outer path;

providing an inner path;

providing one or more further paths located between the outer and inner paths, said one or more paths including at least one encryption path, preferably two encryption paths, and at least one data path;

encrypting a code unique to the symbol and encrypting data contained in any one of the data paths;

wherein the data to be displayed is encrypted and said data is displayed on the device after verification of said symbol.

The data can be in the form of links for the user to access and can encompass video, audio, graphics or text or any combination of these. The outer path can be circular and said one or more paths are rings concentric around the inner path. The one or more paths may have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit. The rings are preferably divided into a plurality of sectors. The data is preferably displayed over the captured symbol.

According to a fourth aspect of the invention, there is provided a computer- readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a device to: access a unique code associated with the symbol;

transmit the code to a web server for further processing and verification;

receive data or information represented by the code; and

display the data or information to the user of the device.

According to a fifth aspect of the invention, there is provided a computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a server means to:

receive a unique code associated with the symbol from a device;

check that it is a valid code by comparing the received code to a list of valid codes stored in a database;

send a message to said device with data or information associated with the symbol for the user to access.

The server may be directed to check that the code is not fraudulent using a further database.

According to a sixth aspect of the invention, there is provided a symbol or sign for displaying encrypted data on a device after image capture of the symbol by an image capture device, the symbol including:

an outer path and an inner path for aligning the image capture device;

further paths located between the inner and outer paths, said further paths being encryption paths or data paths, said further paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit;

said symbol providing information represented by said symbol to be displayed on said device to a user after verification of the symbol or sign.

The symbol or sign may further including indication means for assisting in the correct detection of the number of further paths in the symbol or sign. Each of the further paths can be divided into a number of sectors. The symbol or sign may further include one or more markers to assist with perspective correction when an image of symbol or sign is scanned or captured.

Brief Description of the Drawings

A preferred embodiment of the invention will hereinafter be described, by way of example only, with reference to the drawings in which: Figure 1 is a schematic diagram showing an example of an encoded symbol or image, termed a QL code.

Figure 1Λ is a schematic diagram showing a further example of an encoded symbol or image;

Figure IB is a schematic diagram of a further embodiment of an encoded symbol or image showing sectors across paths located between an inner path and an outer path;

Figure 2 is a schematic diagram showing the capturing of a symbol or image by a device; Figure 3 is a block diagram showing access to a web server over the internet through the device;

Figure 4 is a detailed block diagram of the process involved in checking the authenticity of the symbol or image and providing extra information aboutfthat symbol or image to the user;

Figure 5 is a block diagram showing information sent over the internet to the device to display a message;

Figure 6 is a screen capture shot of a company console used by a company that owns one or more symbols or images;

Figure 7 is a screen capture shot of a user console displaying properties about the symbol or image used by the user; and

Figure 8 shows a list of Application Program Interfaces that can be used to create or purchase bulk QLcodes.

Detailed Description of the Preferred Embodiment

Referring to Figures 1, 1 A and IB, there is displayed a symbol or graphical image 2 which is unique and specific to represent a product or service or other information about the owner or the owner's business related to the symbol or image 2. The image 2 is referred to as a QLcode. The user or company that owns the symbol or image 2 can maintain data about any product or service to which the symbol relates and they can be presented to the viewer when the viewer captures the symbol using a capture device such as on a mobile phone, headset or tablet. Many such symbols can be created using this process with each symbol or image being unique and they can each linlc back to its own data content. The data content can take any form such as text, graphic, video or audio. This data content can be viewed through the above mentioned devices or even a personal computer and the content can be overlaid on the symbol at the time of viewing.

The symbol or QLcode 2 has a unique ID or code which contains validation, CRC and encrypted data. The symbol 2 has an outer ring or outer, preferably continuous, path 4 which is relatively thick (compared to the inner rings), an inner perimeter or inner, preferably continuous, path 6 which is in the shape of a key hole, both ring 4 and perimeter 6 being used to enable an image capture device to properly align with the symbol. There are a number of other paths or rings 8, 10 and 1 1 located between the paths 4 and 6. Outer ring 4 and inner path 6 can both contain marker means in the form of four (or more) equidistant markers 7 embedded within the outer part of the inner path 6 and within the inner part of the outer ring 4. These markers 7 assist with perspective correction when an image of the QL code 2 is scanned or captured. The markers 7 can be located anywhere in the inner path 6 or outer path 4, including on either inner or outer portions/edges of paths 4 and 6. The markers 7 may or may not be included depending on the intended use of the QL code 2. On the inside of the right leg 9 of the keyhole-shaped path 6 is an indication means 5 in the form of fingers or projections (shown in white). The indication means 5 assists in the correct detection of the number of rings within the QL code 2. In this case, as depicted in Figure 1A, there are three rings 8, 10 and 1 1 indicated by the three white fingers. The indication means 5 can be located anywhere in the path 6 or against the inner or outer edges of the path 6. In between the outer ring 4 and inner path 6 there are a number of rings that can range in number between 3 and 18. The rings are generally incomplete and made up of a combination of a first set of segments in the form of visible arcs (dark such as arc 21 in Figure 1 B), which signifies a bit value of 1 , and a second set of segments in the form of empty arcs (white or not shown such as arc or space 23 in Figure IB) that signify a bit value of zero. In the example of Figures 1 and 1 A there are three intermediate rings 8, 10 and 1 1 that are shown. These rings contain both the data content and the security bit values required in order to securely retrieve the corresponding data from the server.

Each of the rings 8, 10 and 11 for example are divided into equally sized sectors, typically 16 sectors such as sector 27 at the lower left side of image 2, sector 25 at the top of image 2 and sector 29 at the lower right side of image 2. These sectors are pie shaped, fanning out radially from the centre 31 of the inner keyhole, surrounded by path 6. The space 33 taken up by the lower part of the keyhole, surrounded by path 6, is not included in these sectors, that is, the number of degrees in a circle minus 54 degrees for the lower part 33 of the keyhole is divided evenly into typically 16 sectors, starting from sector 27 and going around the centre 31 to sector 29. Any number of sectors may be used as long as the resolution of the darker bit values of 1 can be distinguished satisfactorily by an image capture device. The rings between the outer ring 4 and the inner keyhole path 6 are evenly spaced so as to optimise the readability for the scanning device. The number of data rings multiplied by the number of sectors gives an approximation as to the maximum number of codes possible for any given combination. The data represented by the arcs, either zero or one, does not display the actual data values. Instead, the data is encrypted through a number of techniques in order to minimise the risk of data being retrieved that does not belong to that particular QLcode, captured through the image capture device, such as the camera of a mobile phone. The outer ring 4, the keyhole inner path 6 and the data rings (such as 8, 10 and 11) of the symbol 2 may be made any colour, or combination or colours. This is possible as long as the background of the symbol or code, where there is no data, is of a sufficient contrasting ratio to the colour of the outer ring 4, the keyhole path 6 and each of the data rings.

Each QLcode 2 is generated at a server, such as web server 16. The first ring, closest to the inner ring 8 (or any other designated ring), has information stored therein together with bits from other data rings. It determines which ring or rings has location data and what data is stored in the encrypted ring or rings. In another ring, encryption could start at a point in the ring which has data represented by information in some or all of the other rings. An operation, such as an Exclusive-OR (XOR) operation, can be performed with location in the grid that matches the number of rings and sectors and then XOR all of these together. In order to obtain the original data, another XOR operation is performed on this. Such an operation of encryption is the SHA or Secure Hash Algorithm function.

Many codes like this can be stored securely at a web server and purchased for use by individuals or companies. Users can maintain, edit or delete codes through a management console, to be described with reference to Figures 6 and 7. The codes can be printed and then displayed either on a support or on packaging for access by the public.

Referring to Figures 2 and 3 there is shown the symbol 2 which can be displayed in public, for example on a product, billboard, website or printed publication which is captured by a data capture device 12, such as a mobile phone, tablet, headset or PC. The device 12 captures the image through image capture means 13 which is then processed by the image processing means 15 in the device 12. An application or app 17 that is stored on the device 12 scans the symbol or QLcode 2 through the image camera means 13 and passes the detected unique identification code 35 associated with the symbol 2, through a communications module and browser 19 to a web server 16 as shown in Figure 4. The scanning of the code 35 or symbol 2 by the app 17 is performed in a clockwise fashion, starting at the first bit on the lower left of the innermost ring 8. The scan proceeds clockwise and when it reaches the end of the first ring 8 it then moves onto the next ring and so on, moving outwards until the last bit on the outermost ring is read. These scanned bits determine the unique ID code 35. Thus the unique ID code (for example XYZ) 35 is transmitted to the web server 16 over the internet 14 along with the identification of device 12, its type, its location and any user preferences. If more than one code or symbol is detected then the user is prompted to select a specific code or symbol in which to capture. This is displayed on the display means of the device 12. The device 12 accesses webserver 16 via an encrypted https connection in order to retrieve a message that corresponds to the unique ID code 35 which has been captured in the image 2.

Referring to Figure 4, the data including the unique ID 35 of the scanned symbol is sent to web server 16 and is received by a gate keeper application program 18 which runs on web server 16. This validates or invalidates the received unique ID and confirms the device ID, type, location and user preferences.

At step 22 a decision is made as to whether the QLcode or ID is valid. If it is valid then the process passes to step 28 where a look up program 20 of the web server 16 is activated, forwarding on the ID type, location and user preferences. If at decision 22 the ID is not valid then a message is prepared and loaded at step 24 with a QLcode Error Reporting Page. The Reporting Page at step 24 can also be used to report a damaged, broken or invalid QLcode. At step 26 the error message is sent back to the device 12 over the internet 14.

On receipt of the ID code, as well as the other data at step 30, the look up program 20 checks the ID against an ID database 32 to see if that specific ID is stored in the database 32. If, at decision box 34, it is determined that the code ID does exist and is matched, then the process moves to another decision box 36. If the code ID does not exist then the process moves to step 38 where a message is loaded and returned to the user device 12 over the internet 14 with a QLcode Error Reporting Page. At step 36 a determination is made as to whether the QLcode ID has expired. If it has, then at step 40 a message is loaded and returned to the user to explain that the QLcode ID has expired in a QLcode Expired Reporting Page. If the QLcode ID has not expired then at step 42 this ID is checked against a further database which includes a known list of IDs that are fraudulent. It is compared using the fraudulent or blacklist database 44. At step 46 if the QLcode has been blacklisted or is fraudulent then at step 48 a message is loaded and returned to the user at their user device 12 with the message detailing the fraudulent QLcode and explaining that this code cannot be used. If, from decision 46, it is determined that the ID code is not fraudulent and is available for use then at step 50 a message is prepared and sent to the user to explain that the QLcode is valid. Included in this message would be a setting that suggests the optimal use for the intended message for the specific device type.

Any message that is passed from the gate keeper program 18 to the user device 12 is displayed according to the presentation settings that are returned in the message, taking into account any device user preferences. The message can include but is not limited to links to text, pictures, audio and video data and this represents the data that the company or individual owner of the QLcode wishes to supply to the user to be overlaid over the original capture of the code on the user device 12. The user then has access to the data provided using links displayed on the device 12.

Seen in Figure 5 is a continuation of the block diagrams of Figure 4 in which a message is delivered to the user device 12 over the internet 14 from the gate keeper program 18 of web server 16.

The system also includes a company console which will be describe with reference to Figure 6 and a user console which will be described with reference to Figure 7.

A management console allows an owner to maintain message attributes, such as message content, expiry date and time, the intended audience and any redirection of URLs. The management consoles are divided into a company console and a user console. The console that is presented is determined by the IJRL that the user attempts to access. If the user is logging in as a company, then the company console is presented otherwise if the user is logging in as an individual then the user console is presented. Logging on to either console requires that a user provide a valid usernamc and password. Each console has its own section of web pages on the particular QLcode website on web server 16

Referring to Figure 6 there is shown a screen 52 of a company console for use by an authorised person of the particular company. The company console allows an authorised user to maintain existing QLcodes for that particular company. The user may also be authorised to create new QLcodes for the company or purchase new codes. In box 54 there is shown the company name and a search can be conducted for a particular code by entering text in box 56. A group code may be listed in the drop down box 58 and an actual image of the code shown in box 60. The QLcode group feature, via box 58, allows QLcodes to be grouped together according to a particular function, for example license, signage. Creation of new QLcodes is formed by clicking on button 62, where for example they are bought from an app running on a secure server, such as server 16, that generates each unique code having its own unique ID. Existing QLcodes can be edited by clicking on button 64. The value of a code returned from a search, in other words its identification, is shown in box 68. The details about that particular code is shown in box 70, for example its type, when it was created, by which company and by which user and when that code is due to expire. The creation, scanning and deactivation history log of a particular code is shown in box 72. To exit the company console a user clicks on exit button 74. Details on what data a user capturing the QLcode has access to, may also be shown on screen 52. Codes can be deactivated on screen 52 by pressing the deactivate button 66. Deactivation does not remove the code entirely from the database as it can be used to redirect a scanning device, such as mobile phone 12, to a web page or URL nominated by the particular company.

Referring to Figure 7 there is shown a screen 80 of a user console which enables a user to purchase QLcodes and edit any existing or current QLcodes. At box 82 the user name is shown while in box 84 a list of the user's QLcodes is shown, of which any one of those can be clicked on to show an image of that code in window 86. The user has an option to purchase a further QLcode, from a web server for example, by clicking on the button 88 and an arbitrary number or list of characters in a string is created to identify the QLcode. There are a number of options that allow the user to design how the return value will be presented, that is when another user captures the image of the newly created code, what information will actually be displayed to that user. In a first option a user can submit text by clicking on button 91 and entering text in box 94. The entered text will then be displayed or overlaid over the QLcode when it is scanned or captured by a device 12 by an image capture means of that device. The text options allow it to be scrolled up, down, left or right or no scrolling through a selection box 97. A second option or in addition to the first option is a link option by clicking on button 93. A link option sends the specified link value back to the device 12 to overlay the QLcode with the content from the link. A third option, in addition to the first two options or one of those options, is a playlist option at button 95 which allows the user to set up a number of links, played one after the other at the same time, or randomly over the top of the QLcode captured. The links may be selected from window 99 while a new playlist can be added by clicking on button 101 or removed by clicking on button 103. The playlist options generally shown at 92 also include an option to control how they are displayed, for example one after the other, or by fading in or out and for what length of time. A preview pane 98 displays a selected option that is played from the playlist, link or text.

A ratings option window enables a user to define who is able to see the resulting output.

For example the general public, Facebook friends only or whether the app can be seen by people that are not yet of legal age. Thus in box 100 there is a series of boxes that can be checked to control the ratings options. Button 102 enables a user to save the changes made by editing a QLcode or the creation of a new one. Exit button 104 enables the user to exit from the user control screen 80.

Shown in Figure 8 is a list 1 10 of application program interfaces or APIs for QLcodes. A number of such APIs are available that can be used by larger scale account users to maintain their QLcode records in a QLcode database such as database 32. These APIs allow for QLcodes and QLcode groups to be added, changed or deactivated in bulk. A list of the APIs that are available is shown in Figure 8 for QLcodes and QLcode groups.

Claims

CLAIMS:
1. A system of accessing data represented by a symbol after image capture of the symbol and to be displayed on a device, said system including:
a device having image capturing means for capturing and storing said symbol, said symbol having a code identifying the symbol;
server means in communication with said device for receiving said code, database means in communication with said server means and storing a plurality of codes representing a plurality of symbols;
wherein said server means determines if the code is valid, and if valid, sends a message to said device with data associated with said code for display on the device.
2. A system according to claim 1 further including a second database to verify that the code identified as being valid is not fraudulent or blacklisted.
3. A system according to claim 1 or claim 2 wherein said server means generates a new symbol upon request and/or payment for use by a user.
4. A system according to any one of the previous claims further including a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user.
5. A system according to any one of the previous claims further including a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
6. A method of accessing data represented by a symbol, including the steps of: capturing and storing the symbol using an image capturing means of a device, said symbol having a code identifying the symbol;
sending said code to a server means;
said server means ascertaining if said code is valid by communicating with a database storing a plurality of codes representing a plurality of symbols; and
sending a message to said device from said server means with data associated with said code for display on the device if said code is valid.
7. A method according to claim 6 further including verifying through a second database that the code identified as being valid is not fraudulent or blacklisted.
8. A method according to claim 6 or claim 7 further including generating a new symbol upon request and/or payment for use by a user.
9. A method according to any one of claims 6 to 8 further including providing a user console accessible by an authorised user to enable purchase of a symbol and/or modification to an existing symbol owned by the user.
10. A method according to any one of claims 6 to 9 further including providing a company console accessible by an authorised user of the company to enable purchase of a symbol and/or modification to an existing symbol owned by the company.
1 1. A method of encoding a symbol that displays data on a device after image capture of the symbol, the method including:
providing an outer path;
providing an inner path;
providing one or more further paths located between the outer and inner paths, said one or more paths including at least one encryption path, preferably two encryption paths, and at least one data path;
encrypting a code unique to the symbol and encrypting data contained in any one of the data paths;
wherein the data to be displayed is encrypted and said data is displayed on the device after verification of said symbol.
12. A method according to claim 1 1 wherein the data is in the form of links for the user to access and can encompass video, audio, graphics or text or any combination of these.
13. A method according to any one of claim 1 1 or 12 wherein said outer path is circular and said one or more paths are rings concentric around the inner path.
14. A method according to claim 13 wherein the one or more paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set
representing another value of a binary digit.
15. A method according to claim 14 wherein the rings are divided into a plurality of sectors.
16. A method according to any one of claims 1 1 to 15 wherein the data is displayed over the captured symbol.
17. A computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a device to:
access a unique code associated with the symbol;
transmit the code to a web server for further processing and verification;
receive data or information represented by the code; and
display the data or information to the user of the device.
18. A computer-readable medium comprising computer-executable instructions that, when executed on a processor, in a method of accessing data represented by a symbol, directs a server means to:
receive a unique code associated with the symbol from a device;
check that it is a valid code by comparing the received code to a list of valid codes stored in a database;
send a message to said device with data or information associated with the symbol for the user to access.
19. A computer-readable medium according to claim 18 further including checking that the code is not fraudulent using a further database.
20. A symbol or sign for displaying encrypted data on a device after image capture of the symbol by an image capture device, the symbol including:
an outer path and an inner path for aligning the image capture device; further paths located between the inner and outer paths, said further paths being encryption paths or data paths, said further paths have a first set of segments, in the form of arcs with each arc in said first set representing one value of a binary digit and a second set of segments in the form of arcs with each arc in said second set representing another value of a binary digit;
said symbol providing information represented by said symbol to be displayed on said device to a user after verification of the symbol or sign.
21. A symbol or sign according to claim 20 further including indication means for assisting in the correct detection of the number of further paths in the symbol or sign.
22. A symbol or sign according to claim 20 or claim 21 wherein each of the further paths are divided into a number of sectors.
23. A symbol or sign according to any one of claims 20 to 22 further including one or more markers to assist with perspective correction when an image of symbol or sign is scanned or captured.
PCT/AU2016/000343 2015-10-06 2016-10-06 Method and system for accessing data using a symbol WO2017059479A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2015904063 2015-10-06
AU2015904063 2015-10-06

Publications (1)

Publication Number Publication Date
WO2017059479A1 true true WO2017059479A1 (en) 2017-04-13

Family

ID=58487154

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2016/000343 WO2017059479A1 (en) 2015-10-06 2016-10-06 Method and system for accessing data using a symbol

Country Status (1)

Country Link
WO (1) WO2017059479A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752137B2 (en) * 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
US20130191250A1 (en) * 2012-01-23 2013-07-25 Augme Technologies, Inc. System and method for augmented reality using multi-modal sensory recognition from artifacts of interest
US8935777B2 (en) * 2012-02-17 2015-01-13 Ebay Inc. Login using QR code
WO2015067725A1 (en) * 2013-11-07 2015-05-14 Scantrust Sa Two dimensional barcode and method of authentication of such barcode

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752137B2 (en) * 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
US20130191250A1 (en) * 2012-01-23 2013-07-25 Augme Technologies, Inc. System and method for augmented reality using multi-modal sensory recognition from artifacts of interest
US8935777B2 (en) * 2012-02-17 2015-01-13 Ebay Inc. Login using QR code
WO2015067725A1 (en) * 2013-11-07 2015-05-14 Scantrust Sa Two dimensional barcode and method of authentication of such barcode

Similar Documents

Publication Publication Date Title
US20090144308A1 (en) Phishing redirect for consumer education: fraud detection
US20050097054A1 (en) Authentication and tracking system
US20130198521A1 (en) Secure File Drawer and Safe
US7263205B2 (en) System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities
US20040260618A1 (en) Home shopping system
US20120205436A1 (en) System for enhanced barcode decoding and image recognition and method therefor
US20050283609A1 (en) Authenticating images identified by a software application
US20030187798A1 (en) Digital watermarking methods, programs and apparatus
US7624916B2 (en) Remote access system and method
US7765481B2 (en) Indicating website reputations during an electronic commerce transaction
US7562304B2 (en) Indicating website reputations during website manipulation of user information
US20080011841A1 (en) System and Method of Detecting Product Code Duplication and Product Diversion
US20080114709A1 (en) System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface
US20110277024A1 (en) Locally stored phishing countermeasure
US7822620B2 (en) Determining website reputations using automatic testing
US20070028111A1 (en) Methods and apparatus for authentication of content delivery and playback applications
US20080201401A1 (en) Secure server authentication and browsing
US20130043302A1 (en) Social media platforms
US20070192615A1 (en) Online data encryption and decryption
US20060253580A1 (en) Website reputation product architecture
US20130228615A1 (en) Systems and methods for scanning a user environment and evaluating data of interest
US20060253584A1 (en) Reputation of an entity associated with a content item
US8566726B2 (en) Indicating website reputations based on website handling of personal information
US20120199647A1 (en) Method and apparatus for managing user devices and contents by using quick response codes
US7614546B2 (en) Method and system for deterring product counterfeiting, diversion and piracy

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16852889

Country of ref document: EP

Kind code of ref document: A1