WO2023001381A1 - Procédé et dispositif d'accès à une ressource de la toile - Google Patents
Procédé et dispositif d'accès à une ressource de la toile Download PDFInfo
- Publication number
- WO2023001381A1 WO2023001381A1 PCT/EP2021/070695 EP2021070695W WO2023001381A1 WO 2023001381 A1 WO2023001381 A1 WO 2023001381A1 EP 2021070695 W EP2021070695 W EP 2021070695W WO 2023001381 A1 WO2023001381 A1 WO 2023001381A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- information
- graphic code
- graphic
- access
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000002093 peripheral effect Effects 0.000 claims description 21
- 230000005540 biological transmission Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 7
- 230000000903 blocking effect Effects 0.000 claims description 3
- 230000003190 augmentative effect Effects 0.000 description 33
- 230000008569 process Effects 0.000 description 10
- 230000008901 benefit Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 230000007123 defense Effects 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000005764 inhibitory process Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/20—Input arrangements for video game devices
- A63F13/21—Input arrangements for video game devices characterised by their sensors, purposes or types
- A63F13/213—Input arrangements for video game devices characterised by their sensors, purposes or types comprising photodetecting means, e.g. cameras, photodiodes or infrared cells
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/40—Processing input control signals of video game devices, e.g. signals generated by the player or derived from the environment
- A63F13/42—Processing input control signals of video game devices, e.g. signals generated by the player or derived from the environment by mapping the input signals into game commands, e.g. mapping the displacement of a stylus on a touch screen to the steering angle of a virtual vehicle
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/60—Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
- G06K19/14—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10712—Fixed beam scanning
- G06K7/10722—Photodetector array or CCD scanning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1434—Barcodes with supplemental or add-on codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1439—Methods for optical code recognition including a method step for retrieval of the optical code
- G06K7/1443—Methods for optical code recognition including a method step for retrieval of the optical code locating of the code in an image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
Definitions
- the present invention relates to a method and a device for accessing a web resource.
- One of the methods generally used to simplify the transmission of information to a third party is the use of a graphic code that this third party can scan in order to obtain the information.
- the most commonly used standardized systems for these purposes are barcodes, for example using one of the formats UPC-A (acronym for Universal Product Code), UPC-E, EAN-8 (acronym for European Article Numbering for Universal Article Numbering), EAN-13, Code 39, Code 93, Code 128, ITF (acronym for Interleaved 2 of 5 for Interleaved Two of Five), Codabar, MSI (acronym for Micro-Star International, Co ), RSS-14 (acronym for Really Simple Syndication for very simple syndication), QR (acronym for Quick Response for rapid response) Code, all these formats corresponding to registered trademarks.
- Barcodes are ideal for graphically encoding complex information, which is difficult for the third party to whom the information is transmitted to remember (for example, a long URL, acronym for "Uniform Resource Locator", for uniform resource locator, commonly called “web address”).
- This address is used to designate a resource present on the web by a sequence of ASCII characters (acronym of American Standard Code for Information Interchange for standardized American code for the exchange of information).
- the resources can be varied, for example web page, video, sound, image, animation, email address...
- barcodes are also used to identify the instance of an entity that is intended to be unique (such as the entrance fee to a private place, a numbered seat in a concert, a nominative discount coupon, .. .).
- a consumer After buying a concert ticket online, a consumer is given a printable ticket displaying a barcode. This barcode is then scanned by the attendant at the entrance to the place where the event is taking place.
- Botnet is an umbrella term for a group of programmable devices that are infected and controlled by a remote hacker. Botnets are usually created by a hacker or a small group of hackers who use malware to infect a large number of devices.
- the present invention aims to remedy all or part of these drawbacks.
- the present invention relates to a method for accessing a web resource, which comprises:
- step of decoding in a captured image of the graphic code, at least a second part of code produced according to a second coding protocol different from the first coding protocol, this second part of code representing, in combination with the first part code, access to a web resource,
- a step for receiving a resource access token if this information matches information stored in memory, a step for receiving a resource access token.
- the graphic code allows access to a web resource with a public standardized code and a proprietary code.
- any communicating device equipped with an image sensor and a standardized visible code reader for example a QR code (registered trademark)
- QR code registered trademark
- any communicating device equipped with an image sensor and a standardized visible code reader for example a QR code (registered trademark)
- QR code registered trademark
- a "QR code” English form of "QR code” (QR being the acronym for "Quick Response” for quick response)
- QR being the acronym for "Quick Response” for quick response
- the QR code allows quick decoding.
- the present invention allows the publisher of the graphic code to be scanned to give a third party, supplier of a good or service, the possibility of communicating to a beneficiary the certificate of ownership of a good or service to be claimed. Once issued and displayed (or printed), this graphic code guarantees the issuer that this good or service will only be claimed once and only by the legitimate beneficiary.
- the method comprises:
- the method comprises a step of transmitting at least one image captured by the user's terminal to a web page identified by the first code part, the correspondence verification step being performed with the server hosting said page.
- the second part of code includes a checksum and the method also includes a step of checking the check code of the second part of code.
- the step of decoding, in a captured image of the graphic code, the first part of code represents an access to a download site of a second application
- the step of decoding, in a captured image of the graphic code, of the second part of code is produced by implementing the second application.
- the correspondence verification step comprises a joint transmission step of information decoded in the first part of the graphic code and of information decoded in the second part of the graphic code.
- the first part of graphic code comprises rectangular cells, the color of each rectangular cell representing information and the second part of graphic code comprises triangular cells, the color of each triangular cell representing information. Thanks to these arrangements, the two code parts are easily discriminated during the reading and decoding steps.
- the method that is the subject of the invention further comprises a step of locating, in a captured image of the graphic code, a peripheral geometry surrounding the first and the second part of the graphic code.
- the combined code comprising the two parts of the graphic code is easily identified and the reframing, in angles, in perspective deformation and in position, is faster and more reliable, which avoids faults in reading the code.
- the first part of graphic code represents an access to information of availability to said resource.
- a user equipped with an intelliphone in English “smartphone” can, without having to download the second application, check that the graphic code does indeed correspond to an available product or service. Transactions, such as exchange or sale, relating to the graphic code are therefore secured by the easy verification of the actual availability of the product or service corresponding to this graphic code.
- the first graphic code part and the second graphic code part have no correlation with each other, neither of these graphic code parts being derived from the other.
- the second graphics code portion surrounds the first graphics code portion.
- the first graphical code portion is unique and represents a uniform resource locator (URL).
- URL uniform resource locator
- the first part of the graphical code identifies a single instance of a good or service made available through the graphical code.
- the method which is the subject of the invention comprises a step of joint transmission of information decoded in the first part of the graphic code and of information decoded in the second part of the graphic code and, in the event of correspondence of this information with information kept in memory, a step of receiving a token for access to the resource. Thanks to these provisions, a secure token having the same structure can be issued for a set of product or service providers.
- the method that is the subject of the invention comprises, in the event of no correspondence of the decoded information with information stored in memory, a step of temporarily blocking the joint transmission of information and/or the delivery access token.
- the present invention relates to a device for accessing a web resource, which comprises:
- the present invention relates to a graphic code for carrying out the steps of the method which is the subject of the invention, which comprises:
- this first part of code representing an access to a web page
- this second part of code representing, in combination with the first part of code, an access to a web resource.
- the second code portion surrounds the first code portion. In embodiments, at least a portion is masked by finger-removable opaque ink.
- the present invention relates to an identity document comprising a graphic code which is the subject of the invention.
- the present invention relates to a bank card comprising a graphic code which is the subject of the invention.
- the present invention relates to a document for access to a site comprising a graphic code which is the subject of the invention.
- the present invention relates to an electronic signature document comprising a graphic code which is the subject of the invention.
- FIG.1 schematically represents, in the form of a flowchart, the steps of a first particular embodiment of the method that is the subject of the invention
- FIG.2 represents a first example of combined code
- FIG.3 represents an example of a message represented by a standardized code
- FIG.4 represents a device that is the subject of the invention
- FIG.5 represents, in the form of a flowchart, the steps of a second particular embodiment of the method that is the subject of the invention.
- FIG.6 represents, in the form of a flowchart, the steps of a variant of the second particular embodiment of the method that is the subject of the invention.
- FIG.7 represents a card carrying a combined code and other information
- FIG.8 represents two cards carrying combined codes and other information
- FIG.9 represents a second example of combined code
- FIG.10 represents, in the form of a flowchart, the steps of a third embodiment of the method that is the subject of the invention.
- FIG.11 represents, in the form of a flowchart, the steps of a fourth embodiment of the method that is the subject of the invention.
- FIG. 10 A first embodiment of the method 10 for accessing a resource of the web object of the invention is observed in FIG. This method 10 comprises:
- the terminal accesses an information page kept by the server 46, which describes the availability of the good or service concerned by the standardized code and proposes the installation of the second application making it possible to validate the acquisition of a good or service,
- the terminal performs a download of the second application, from the information page.
- the description of the availability of the good or service facilitates the transfer or exchange of combined codes between users, in particular when one of the codes, typically the increased code, is masked, for example by an opaque ink removable on the finger.
- one of the codes typically the increased code
- the buyer can check the validity of the card by the availability status of the good or service, by directly scanning this card with his communicating terminal fitted with the standardized code reader. .
- the server hosting this page makes a call to a database identifying the goods and services in order to check the availability of the good or service associated with the standardized code 26,
- this combined code comprising a second part of code produced according to a second coding protocol, this second part of code representing, together with the first part of code, access to a web resource for at least one virtual game and
- the present invention thus implements a double graphic code to be scanned.
- This graphic coding system makes it possible to decode and verify an identifier or digital signature representing a good or a service in order to dispose of it.
- the double graphic code 20, or combined code is made up of three concentric levels of information, as illustrated in figure 2:
- the periphery 24 is a geometric shape recognizable thanks to the significant contrast of its edges compared to the support 22 of the code 20.
- a standardized graphic code 26 for example placed in the center of the code 20 and
- the codes, normalized 26 and augmented 28, surrounded by the peripheral shape 24 have no correlation with each other, neither of these codes 26 and 28 being derived from the other.
- the generation and association of codes 26 and 28 are purely random or quasi-random and are carried out when the double code 20 is transmitted.
- a user can use a communicating terminal capable of reading standardized bar codes and equipped an image sensor to scan them, that is to say capture at least one image.
- the terminal is a mobile telephone.
- the device detects the standardized code 26 initially, with a first application. Once decoded, this standardized code 26 reveals the internet address of a page dedicated and unique to the property to be acquired, the standardized codes thus being unique.
- the message 30 represented by the standardized code 26 comprises two parts:
- - prefix 32 the domain name with its protocol to which the user must be redirected (in the example shown: "http://tsl.gg/").
- the prefix is also used to identify the context in which the good exists (a legal entity, an organization, a company, a game, an application, a theme, a series, etc...); It is preferable that it be as short as possible (and therefore to favor a concise domain name) in order to leave more characters at the suffix 34 and
- the user implements a device 40 which comprises a communicating terminal 50 and servers 46, 47 and 48 accessible on the Internet.
- the user has the terminal 50 comprising an image sensor 41, a controller 42, a means of communication 43 and an application memory 44.
- the terminal 50 is typically an Intelliphone (“smartphone”).
- the image sensor 41 is configured to capture a clear image of a combined code 49 materialized, for example printed, on a support.
- the means of communication 43 allows the terminal to access the web ("web") 45, to which are linked:
- a server 46 for displaying the product or service associated with the standardized code and for downloading applications
- databases cited in the present application may be chains of blocks (“blockchains”) or more conventional databases.
- the means of communication 43 is, for example, a mobile telephone network or an internet decoder ("box"), an electronic box made available by the internet access provider, and connecting the user's telecommunications equipment to networks, including the Internet.
- the application memory 44 contains basic applications, such as a first application for reading standardized codes 26, in particular bar codes in one dimension, in two dimensions or QR codes.
- the application memory 44 is also configured to keep, after downloading by the communication means 43 from the server 46, a second application for reading standardized code 26 and augmented code 28.
- the controller 42 is configured to operate the first and the second application to the images captured successively by the image sensor 41.
- FIG. 5 describes steps of a particular embodiment of the method 60 which is the subject of the invention.
- the user uses his communicating terminal 50 to capture an image of the combined code.
- the second application searches, in the stream of captured images, for a standardized code 26.
- the standardized code 26 is decoded during a step 64.
- the number of reading attempts is limited for each user terminal, for example by recognizing its IP address (acronym for Internet Protocol, for internet protocol).
- IP address an IP address
- obtaining a standardized code by this method remains possible.
- the pirate obtains the information that the good or the service is available. However, he cannot acquire it because this standardized code is not sufficient to carry out this acquisition.
- the standardized code 26, or the augmented code 28 or both can optionally be protected by an opaque scratch-off ink.
- the undamaged presence of this opaque ink on the support ensures, to the user who holds this support, the availability of the good or service by a visual verification not involving a mechanical or digital process.
- the image processing module supplied by the image sensor 41 of the terminal 50 searches, during a step 65, for the geometric shape of the periphery 24 of the code 20.
- this periphery 24 in black on a white background, has a square outer geometric shape and an octagonal inner geometric shape.
- step 65 the module detects the peripheral form 24 of code 20 thanks to:
- an augmented code detection module 28 searches for the presence of the augmented code 28 in the double code 20, during a step 67.
- This module continues to read the image stream provided by the image sensor and searches for the graphic elements that allow recognition of the augmented code 28.
- This augmented code 28 preferably consists of a set of symbols having a detectable geometric shape.
- the symbols of augmented code 28 are isosceles right triangles.
- the isosceles right-angled triangle is a preferred geometric shape because:
- the combination of the symbols of the augmented code 28 and their active or inactive state constitute a binary code whose numerical range is dependent on the number of symbols.
- the active states are associated with the binary digit “1” and the inactive states with the binary digit “0”.
- the numerical range is thus equal to two powers n, n being the number of symbols in the augmented code 28. It is noted that, if a symbol can take three states, for example black, white and gray, this numerical range is three powers not.
- the augmented code 28 comprises 70 symbols which can take two states, which corresponds to approximately 1.18 trillion combinations.
- the symbols must be large enough and contrasted enough to be distinctly visible by a low quality image sensor, without autofocus and at a relatively long distance, for example within arm's reach.
- the printed surface of the combined code 20 actually depends on the size of the symbols and their number.
- the second application requests validation of the combined code from the server 47, during a step 70.
- One of these codes can optionally be used to display a graphic representation (in two dimensions or in three dimensions, or in augmented reality) of the good or service concerned, on the screen of the device scanning it.
- this representation is a game character or an object usable in a game.
- an availability verification request request is addressed to the server 47.
- This request represents the two normalized 26 and augmented 28 codes read, for example by including them in full.
- the server 47 verifies that the two codes sent correspond to the codes of a good or a service to be distributed, and, if so, returns a token (in English “ token”) temporary acquisition, during a step 72.
- a token in English “ token”
- the period of validity of this token is preferably very short, for example a few seconds.
- the two normalized 26 and augmented 28 codes do not correspond to the codes of a good or a service to be distributed, it may be a case of a fraudulent request attempt.
- the delivery of the token representing the good or service is blocked from the first erroneous attempt, during a step 74, and this for a long period, for example 24 hours.
- the IP address of the terminal which has just sent the request is also banned for the same period.
- requesting the disposal of the good or service can only be done by providing, during a step 73, with the request addressed to the server for distribution of this good or service, the temporary acquisition token valid for the short duration following its issuance.
- the good or service distribution server determines that the token is invalid, the good or service is blocked and the IP address of the user terminal is banned for a long period, for example 24 hours, during step 74.
- this distribution server determines that the token has expired, the distribution server indicates this to the second application on the user terminal and this second application offers the user to rescan the double code 20.
- the distribution server determines that the token is valid, the good or the service is associated with the user account identified on the terminal having scanned the double code 20, during a step 75.
- the double code 20 is therefore "consumed", the good or service in question is traced in the database as being henceforth acquired by a user, therefore unavailable for future acquisition.
- the augmented code allows access to the availability information of the good or service
- the normalized code completes the augmented code to obtain the validation of the acquisition.
- the search for the periphery is omitted.
- FIG. 7 An example of a card 80 bearing a combined code 81 is observed in FIG. 7.
- This card also comprises a number 83, a representation 84 of a game character, a name 85 of a game character, a multipoint code 82 and values of attributes 86.
- summoning a character with a card bearing the combination code 81 proceeds as follows.
- each player must summon creatures, accessorize the creatures already summoned or interrupt the actions of his opponent.
- These creatures, accessories or interruptions are represented by cards, each benefiting from a unique increased double code. Thanks to a communicating terminal equipped with an image sensor, the player whose turn it is scans the cards they wish to summon.
- the adversary may be present, in the same room as the player in question, their respective communicating terminals being connected together via a network protocol (for example Bluetooth, local network).
- the opponent can also be remote and connected via the Internet through a game server.
- the player can only invoke the cards which he owns, ie which he has previously scanned by associating them with his player account.
- the combined code 81 uniquely identifies a creature represented by the representation 84, and therefore determines its characteristics in memory (summoning cost represented by the number 83, i.e. the amount of energy required to summon it and, based on 86 attribute values, attack power, ability to carry heavy accessories, and defense).
- the game can thus accept, refuse and therefore react accordingly to an invocation triggered by a player.
- the character is displayed on the screen of the player concerned, but also on that of his opponent even if distant.
- Detection of the combination code 81 allows the game application to represent the augmented reality character in the state in which it is supposed to be in the game.
- the application is able to recognize a character already invoked during a game, and to display it in a state consistent with what it has undergone. For example, if the character died in combat, the recognition of its code makes it possible to display this character lying down and inanimate. In fact, a player cannot summon a card that has already been summoned.
- Accessorization by combination of codes is illustrated in FIG. 8. In FIG. 8, we find the card 80 represented in FIG. 7 superimposed with a card 90 except for its lower part representing a combined code 91, the accessory name 95 and the codes of attributes 96.
- the player can accessorize his creatures in order to change their characteristics (e.g. increase in attack power, defense capacity, ability to carry heavy accessories) represented by attribute codes 96.
- Matching an accessory to a creature is done by placing the accessory card 90 under the creature's 80 card with the two combined codes 81 and 91 still visible.
- the proximity of an augmented double code with another augmented code is detected by the second application and the image sensor. This proximity makes it possible to associate these two combined codes 81 and 91.
- This principle is not limited to two codes. The player can accumulate accessories, within the limits of the rules of the game and the range capacity of the creature.
- Figure 8 shows that a combination of an accessory with a creature is done vertically.
- the application detects the proximity of the two combined codes 81 and 91.
- the creature extends its capacities to “6” in attack, “0” in range and “5” in defense.
- the opposing player although distant, has the assurance of knowing that the cards played (in the real world) by his opponent are legitimate with regard to the rules. (numerical) dictated by the game. This reduces the possibilities of cheating while the distance between the players makes them vulnerable to this problem.
- a combined code 100 comprising, in the center, a standardized code, typically a QR code 101 and, on the periphery, a graphic code 105.
- the code 101 is located inside a zone delimited by the dashed line 102.
- the graphic code 105 is in a zone between the dashed line 102 and the dashed line 107.
- dashed lines 102 and 107 are not printed with the combined code 100 and are only used for need this description.
- the standardized code 101 comprises square cells 104 which can take on two values, once printed: black or white. These two values correspond to a bit (binary unit) of data (message or complementary code, for example error detection or correction).
- Code 101 also includes search patterns ("finder pattern" in English) 103 allowing an image processing software to determine the orientation, the geometric deformation due to the perspective and the position of the code 101 in a captured image (“scan”) of the code and of its environment.
- the graphic code 105 comprises geometric cells 106, here triangular, which can take on two values, once printed: black or white, to represent a bit of data. It is noted that the geometric cells 106 are distributed according to a rotational symmetry of 90°. The triangular geometric cells thus have a right angle and a hypotenuse always parallel to the side of line 107 closest to this hypothenuse. Thus, the reading of the binary values represented in the cells 106 is facilitated.
- the margin between the central QR code 101 and the peripheral code 105 is sufficient to avoid any confusion for the application which performs the interpretation of the image capture, for example this spacing, or margin, is at least two elementary cells of the QR code 101.
- the standardized code 101 in the center of the combined code 100, represents a URL.
- the peripheral code 105 for example represented in the form of triangles, represents a string of characters whose symbols are defined according to the number of desired combinations. For example, a set of six binary values (“bits”) corresponds to one of 64 different characters.
- the code consists of a certain number of symbols (The number of symbols is defined according to the maximum size of the desired character string and the surface available on the support)
- a checksum for example an error detection and/or correction code (for example a cyclic redundancy check, or " CRC”).
- CRC cyclic redundancy check
- the decoding process can follow two different logics: from the center to the periphery, as shown in figure 10, or from the periphery to the center, as shown in figure 11.
- the user's terminal captures an image of the standardized central code 101, step 111.
- the “camera” application of an intelliphone (“ smartphone” in English) is able to find, step 112, and read, step 113, the QR code 101 which is in the center of the combined code 100.
- This central QR code 101 represents the URL of a web page representing an object (digital or physical) in a unique way, to which the user is redirected.
- This web page is hosted on a server accessing data identifying this product and containing the object's metadata.
- the user's terminal accesses this page.
- This web page displays public and useful information for identifying the object, for example the commercial name of the object, its reference, its description, its serial number and a descriptive photo, step 115.
- calls to action are proposed to the user, for example the acquisition of the right of ownership of the object, allow to signify having found the object declared lost.
- Some of these actions may involve a high level of security requiring a full image capture of the combined code, for example to obtain ownership of the object.
- the user is asked to capture an image of the combined code again to acquire the right of ownership.
- the scanner used to acquire and interpret the combined code is embedded in the web page. This scanner is used, during a step 117, to simultaneously decode the QR Code and the peripheral code.
- the user is asked for authorization to access the camera of his terminal, with this authorization, the video stream from the camera is displayed on the web page, a computer program analyzes this video stream image by image , the user points the camera at the combined code and the computer program searches for a QR code in this video stream.
- the image is straightened to compensate for geometric distortions of the image, for example due to the tilt and orientation of the camera relative to the code, then converted into a bit matrix in order to be decoded. If a QR code is found and corresponds to the QR code concerned by the previous steps, step 118, the scanner extends the decoding beyond the geometric surface taken up by the QR Code in order to detect the peripheral code there.
- the QR code found does not match the QR code initially read, a message is displayed asking the user to scan the originally scanned code.
- the two codes 101 and 105 are transmitted to the server which accesses the data enabling the products to be identified.
- this transfer of information is done in a secure manner via an SSL/TLS tunnel.
- the server compares these two codes 101 and 105 with the pairs of codes that it keeps in the database:
- both codes 101 and 105 correspond to a single database record, then the object is authorized to proceed to the next step in its associated process flow (for example, issuance of the right of ownership),
- a step 119 of the method aims to simplify the reading of this image in order to more easily detect the geometric symbols , for example triangles, representing the peripheral code.
- the dimensions of the QR code make it possible to determine the location and the dimensions of each geometric symbol constituting the peripheral code.
- the “finder pattern” of the QR code also makes it possible to determine its orientation.
- Each symbol is simplified through a matrix of modules each representing a binary value.
- a triangle symbol corresponds to a matrix made up of sixteen cells, seven module cells at its base, then five, then three, and one cell at its top, as shown below:
- each symbol position is analyzed.
- We try to determine the presence or not of a geometric symbol by analyzing the binary value in each of the cells in the surface of the symbol. If a zone intended to contain a symbol is covered with more than 50% of positive cells, for example white (therefore 8 out of 16 modules in the example above) it represents a positive binary value within the peripheral code. Determining the positive or negative binary value of a cell is carried out by comparison with a predetermined brightness limit value (for example the average brightness on the QR-code).
- This operation is preferential because the analysis of the image is not binary. This operation solves problems of contrast, flash of light, brightness, distortion, which can alter the reading.
- Each geometric zone for example triangular, is thus read. Then, the N data symbols thus obtained are converted into text.
- the remaining symbols are analyzed to calculate the checksum.
- step 120 if the number corresponding to this checksum stored in the code is equal to the number of the checksum calculated from the captured image, it is considered that the decoding is valid.
- An erroneous checksum can result from code tampering, physical alteration of the medium, or an environmental defect during reading.
- the choice of the algorithm is determined by the number of symbols that can be used to store the numerical result of the calculation and its ability to avoid collisions that can lead to false positives.
- step 120 If the result of step 120 is positive, during a step 121, the pair of messages represented by the pair of codes 101 and 105 is compared with the pairs of messages stored in the memory of the server.
- the server assigns a service, a right (for example a right of access or an identification of a document such as a piece of identity or a means of payment) or an object to the user.
- a right for example a right of access or an identification of a document such as a piece of identity or a means of payment
- the checksum of the peripheral code 105 is used to validate that the code 105 is read in the correct orientation.
- the peripheral code 105 is captured.
- the content of the peripheral code 105 is read.
- step 133 it is determined whether the checksum is incorrect, that is to say whether the result of the calculation according to the formula for generating this checksum corresponds to the sum read in the peripheral code 105 If not, during a step 134, a 90° rotation of the code is applied and the search is restarted. Code 105 is considered invalid, step 135, if none of the four orientations gives the expected equality of checksums.
- the QR Code may contain information that we agree to make public and is read by a large number of terminals. It is therefore not recommended to include sensitive data.
- peripheral code makes it possible to create a unique owner code.
- Proprietary code requires educating the audience as to how it works. It cannot, by definition, be scanned and interpreted natively by computer devices on the market, unlike the QR code.
- a combined code that is the subject of the invention, for example comprising a QR Code and a proprietary code, has many advantages:
- this combined code ensures maximum security, by storing public data in a standard QR code (URL + object identifier), and private data in a proprietary code,
- QR code is read natively, it only contains public data. Therefore, the URL contained in the QR code does not contain sensitive data, it can be shared without risk, -
- the peripheral proprietary code is only read, scanned and decoded in a secure and partitioned environment,
- a private key must never appear in a URL because the latter can be logged on the client side as well as on the server side, as well as being used by trackers in browsers,
- the combined code can be decoded directly within a browser using a web camera ("webcam"), which avoids having to download a specific application which can hinder the adoption of a standard implementing this combined code,
- the first part of the code can be read with a simple intelliphone (“smartphone” in English) camera, which redirects the user to a web application allowing him to decipher the second part if he wishes to acquire the right of ownership,
- the present invention applies in particular: to identity documents, such as digital passports and identity documents, to bank cards, to cards or badges for access to a site, to access to a digital certificate, in particular certificate or private key or a public key of an asymmetric code, for example of the PKI (public-key infrastructure) type, for access to bank accounts, for access to immaterial assets, in particular "intangible assets” or “digital assets” or Non-fungible tokens (NFT).
- identity documents such as digital passports and identity documents
- bank cards to cards or badges for access to a site
- a digital certificate in particular certificate or private key or a public key of an asymmetric code, for example of the PKI (public-key infrastructure) type
- PKI public-key infrastructure
- immaterial assets in particular "intangible assets” or “digital assets” or Non-fungible tokens (NFT).
- NFT Non-fungible tokens
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/291,448 US20240211709A1 (en) | 2021-07-23 | 2021-07-23 | Method and device for accessing a web resource |
EP21749159.6A EP4374545A1 (fr) | 2021-07-23 | 2021-07-23 | Procédé et dispositif d'accès à une ressource de la toile |
PCT/EP2021/070695 WO2023001381A1 (fr) | 2021-07-23 | 2021-07-23 | Procédé et dispositif d'accès à une ressource de la toile |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2021/070695 WO2023001381A1 (fr) | 2021-07-23 | 2021-07-23 | Procédé et dispositif d'accès à une ressource de la toile |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023001381A1 true WO2023001381A1 (fr) | 2023-01-26 |
Family
ID=77168238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2021/070695 WO2023001381A1 (fr) | 2021-07-23 | 2021-07-23 | Procédé et dispositif d'accès à une ressource de la toile |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240211709A1 (fr) |
EP (1) | EP4374545A1 (fr) |
WO (1) | WO2023001381A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014059439A1 (fr) * | 2012-10-12 | 2014-04-17 | Document Security Systems, Inc. | Système et procédé d'analyse et d'authentification au moyen d'un dispositif intelligent |
WO2014091252A1 (fr) * | 2012-12-14 | 2014-06-19 | Omarco Network Solutions Limited | Perfectionnements se rapportant à l'authentification d'identifiant |
US20180197053A1 (en) * | 2013-11-07 | 2018-07-12 | Scantrust Sa | Two dimensional barcode and method of authentication of such barcode |
EP3686761A1 (fr) * | 2019-01-25 | 2020-07-29 | MSP - Media Services Partners | Élément de marquage sécurisé et procédés d'encodage et d'authentification dudit élément de marquage |
FR3106426A1 (fr) * | 2020-01-21 | 2021-07-23 | Moonify Sas | Procédé et dispositif d’accès à une ressource de la toile |
-
2021
- 2021-07-23 US US18/291,448 patent/US20240211709A1/en active Pending
- 2021-07-23 WO PCT/EP2021/070695 patent/WO2023001381A1/fr active Application Filing
- 2021-07-23 EP EP21749159.6A patent/EP4374545A1/fr active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014059439A1 (fr) * | 2012-10-12 | 2014-04-17 | Document Security Systems, Inc. | Système et procédé d'analyse et d'authentification au moyen d'un dispositif intelligent |
WO2014091252A1 (fr) * | 2012-12-14 | 2014-06-19 | Omarco Network Solutions Limited | Perfectionnements se rapportant à l'authentification d'identifiant |
US20180197053A1 (en) * | 2013-11-07 | 2018-07-12 | Scantrust Sa | Two dimensional barcode and method of authentication of such barcode |
EP3686761A1 (fr) * | 2019-01-25 | 2020-07-29 | MSP - Media Services Partners | Élément de marquage sécurisé et procédés d'encodage et d'authentification dudit élément de marquage |
FR3106426A1 (fr) * | 2020-01-21 | 2021-07-23 | Moonify Sas | Procédé et dispositif d’accès à une ressource de la toile |
Non-Patent Citations (1)
Title |
---|
JENNIFER GOULA: "QR code used by BitInstant on their new prepaid debit card", 1 January 2012 (2012-01-01), XP055899414, Retrieved from the Internet <URL:https://www.qrcodepress.com/qr-code-used-by-bitinstant-on-their-new-prepaid-debit-card/8511993/> [retrieved on 20220309] * |
Also Published As
Publication number | Publication date |
---|---|
EP4374545A1 (fr) | 2024-05-29 |
US20240211709A1 (en) | 2024-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11611553B2 (en) | Online identity verification platform and process | |
JP7051859B2 (ja) | 光検出を用いたネットワーク対応アカウント作成のための方法及びシステム | |
Ali et al. | Consumer-facing technology fraud: Economics, attack methods and potential solutions | |
JP6986548B2 (ja) | アンチリプレイ認証のシステムおよび方法 | |
EP0810506B1 (fr) | Procédé et dispositif d'identification sécurisée entre deux terminaux | |
CN116420148A (zh) | 在检测到指示机器可读代码的欺诈性捕获的状况时启动设备安全设置 | |
EP2567502A2 (fr) | Procede d'authentification d'un utilisateur requerant une transaction avec un fournisseur de service | |
CN101316169A (zh) | 基于互联网第三方生物特征验证的网络身份验证方法 | |
WO2013021107A9 (fr) | Procede, serveur et systeme d'authentification d'une personne | |
FR3092414A1 (fr) | Procédé d’authentification, serveur et dispositif électronique d’identité | |
FR3082023A1 (fr) | Une application logicielle et un serveur informatique pour authentifier l’identite d’un createur de contenu numerique et l’integrite du contenu du createur publie | |
WO2015015134A1 (fr) | Procédé de codage d'un accès a une ressource informatique | |
EP3552129A1 (fr) | Procédé d'enregistrement d'un contenu multimédia, procédé de détection d'une marque au sein d'un contenu multimédia, dispositifs et programme d'ordinateurs correspondants | |
EP3742699A1 (fr) | Procédé d'authentification forte d'un individu | |
FR3045187A1 (fr) | Procede de transmission d'une information numerique | |
EP3686761B1 (fr) | Élément de marquage sécurisé et procédés d'encodage et d'authentification dudit élément de marquage | |
FR3106426A1 (fr) | Procédé et dispositif d’accès à une ressource de la toile | |
WO2023001381A1 (fr) | Procédé et dispositif d'accès à une ressource de la toile | |
FR2819323A1 (fr) | Procede d'acces a un systeme securise | |
WO2016135419A1 (fr) | Procede de transaction sans support physique d'un identifiant de securite et sans jeton, securise par le decouplage structurel des identifiants personnels et de services | |
KR20220081980A (ko) | 정보 처리 시스템, 정보 처리 방법, 프로그램, 유저 인터페이스 | |
FR3037424A1 (fr) | Procede de detection d'un terminal frauduleux par un cryptogramme, dispositif et programme correspondants | |
EP3032450B1 (fr) | Procédé de contrôle d'une authenticité d'un terminal de paiement et terminal ainsi sécurisé | |
Malkin | Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging | |
Padma et al. | Analysis of Blockchain QR Code Encryption to Enhance Bank Data Security and Privacy and its Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21749159 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021749159 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2021749159 Country of ref document: EP Effective date: 20240223 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112024001411 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112024001411 Country of ref document: BR Kind code of ref document: A2 Effective date: 20240123 |