WO2023200860A1 - Secure data delivery system - Google Patents

Secure data delivery system Download PDF

Info

Publication number
WO2023200860A1
WO2023200860A1 PCT/US2023/018322 US2023018322W WO2023200860A1 WO 2023200860 A1 WO2023200860 A1 WO 2023200860A1 US 2023018322 W US2023018322 W US 2023018322W WO 2023200860 A1 WO2023200860 A1 WO 2023200860A1
Authority
WO
WIPO (PCT)
Prior art keywords
scannable
data
code
bar code
user
Prior art date
Application number
PCT/US2023/018322
Other languages
French (fr)
Inventor
Thomas W. Heeter
Original Assignee
Heeter Thomas W
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/718,588 external-priority patent/US11954704B2/en
Application filed by Heeter Thomas W filed Critical Heeter Thomas W
Publication of WO2023200860A1 publication Critical patent/WO2023200860A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/485End-user interface for client configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/85Assembly of content; Generation of multimedia applications
    • H04N21/858Linking data to content, e.g. by linking an URL to a video object, by creating a hotspot

Definitions

  • the present invention relates to the use of machine-readable codes for the implementing of a secure data delivery system.
  • Scannable codes specifically 2D bar codes
  • 2D bar codes have shown wide commercial acceptance from the period of 2011 forward.
  • the widest use depicted enables such codes to be scanned by a mobile device such as a smart-phone or tablet computer (iPad, Android table, or Microsoft tablet), which are then linked to an informational website, which is displayed on the given mobile device.
  • RFID systems such as Google Wallet, and low cost “wireless” slide systems, such as Square have had the greatest market acceptance, there has also been some adoption of using 2D bar codes for making payments with mobile devices.
  • the various embodiments described herein expand the field of 2D bar code authentication to embodiments outside the areas of linked URL pages, and mobile payments; specifically, using scannable codes to authenticate brands or logos.
  • US 8,484,448 issued July 9, 2013 and based on US application number 12/590940 filed November 17, 2009 is incorporated herein by reference.
  • bar code information is scanned and characteristics about the scanned code are compared to characteristics about other codes stored in a database for the specific time period in question in order to verify the identity of the buyer for a given time period.
  • US 8,483,448 further provides that the identity step can include a database point of scan identity confirmation by digital image of the presumptive user of the system, wherein the specific embodiment disclosed was for the purpose of making a payment.
  • a decal or sticker with a 2D scannable code to a blank “credit/debit” card, driver’s license, or other ID card which contains an image, which links the image and identity data to a 2D scannable code; specifically, a multiple-payment- option charge card comprising a rectangular card carrying a multiplicity of differing two-dimensional data matrix codes in the form of decals, stamps or stickers, each data matrix code encrypting a buyer's charge or debit card information, or electronically linkable to the buyer's charge or debit card information, the charge or debit card information being different for each code carried by the card.
  • another embodiment provides for randomly generating a new 2D bar code containing a proxy identity of the payee, preferably, for each transaction, so that the payee’s true identity is protected and is only displayed through the proxy as depicted in the scannable 2D bar code.
  • an authentication method is disclosed that provides for a retail merchant displaying an image of a previously created logo simultaneously with a 2D scannable code, with the 2D scannable code including an embedded numeric geo-code corresponding to a precision GPS coordinate for that business, such that a consumer can travel to said merchant, and effect an automated “check-in” through a single scan of the 2D scannable code without manually entering additional user data or selecting from possible alternative check-in locations wherein the specific embodiment disclosed scans and decodes the numeric geo-code, compares the decoded result to the calculated GPS co-ordinates, and effects a “check-in” based on a match.
  • another embodiment provides for an alternative “check-in” in lieu of using a numerical geodesic code, wherein a mobile communication device is provided having computer function, a GPS function, an image scanning function and an image decoding function such that a consumer can travel to said merchant, and effect a “check-in” through a single scan of the 2D scannable code, then selecting from possible alternative check-in locations based on address location, wherein the specific embodiment disclosed the user scanning the scannable 2D bar code from which the smart-phone’ s GPS function determines the location, and then compares result to the estimated GPS co-ordinates based on address, and thereby effects a “check-in” based on matching criteria.
  • another embodiment provides for an alternative “check-in” based on a predetermined or pre-specified geo-coordinate range
  • a mobile communication device having computer function, a GPS function, an image scanning function and an image decoding function, wherein the specific embodiment disclosed the user scanning the scannable 2D bar code from which the smart-phone’s GPS function determines the location, and then compares result to the calculated GPS co-ordinates, as well as, the expected result from the related business identity information, and if the calculated location is determined to be within the predetermined geo-coordinate range launches a software application, else the software application is restricted from launching.
  • an alternative embodiment provides for automatically populating certain of the required fields during the “check-in” function, wherein a transaction application software pertaining to the business identity responds to a positive comparison between the captured GPS location information and the GPS location information in the computer memory, wherein a mobile communication device is provided having computer function, a GPS function, and an access function for accessing a computer memory containing business identity information stored in association with GPS location information for a business, appends required data to the business identity data.
  • an alternative embodiment provides for applying an image of a bar code or other scannable image for each item being purchased from an invoice or receipt, wherein the specific embodiment disclosed is for conducting an electronic payment.
  • an alternative embodiment provides for displaying a 2D scannable code on a bank check or deposit slip, wherein the specific embodiment disclosed is for making a bank or other financial deposit.
  • an alternative embodiment provides for a method for giving directions such that a recipient of a scannable 2D bar code “travel token” scans the bar code with the scanning function of the mobile communication device, decodes an encoded geographic location with the decoding function of the mobile communication device, and then maps the geographic location with the mapping function of the mobile communications device.
  • an alternative embodiment provides for applying a scannable 2D bar code to an item of item of paper currency, which enables for periodic consumer electronic queries concerning the item of paper currency, through scanning data from the 2D bar code, which encodes a unique serial number.
  • an alternative embodiment provides for applying a scannable 2D bar code to a document as a method of validating a signature on a document.
  • the method employs a user’s smart-phone or other mobile device having a GPS function.
  • the method comprises capturing the geodesic code for the location of the smart-phone, identifying information such as the person’ s name, and document identification information, and then transmits the information to a printer which then prints out as a scannable 2D bar code encoding the information, on the document itself or a label, decal or sticker, that is then attached to the document in such as way as to independently attest to the time and a place of the person’s signature.
  • the scannable 2D bar code is also recorded in computer memory associated with the signatory for the document and is electronically accessible to the signatory upon a scanned query being received from a third party.
  • an alternative embodiment provides for applying a scannable 2D bar code to an electronic device as a method switching an electronic device to an opposite state in response to authentication, wherein the specific embodiments disclosed are for actuating a electro-mechanical lock and arming/disarming an alarm system.
  • the method is carried out by transmitting a unique 2D, RF or magnetic code to a reader operatively coupled to an electronic device.
  • the codes is read and authenticated in a computer memory device operatively associated with the reader.
  • an alternative embodiment provides a method for programming an interactive electronic device in a native language, wherein the specific embodiments disclosed are a programmable television remote, an internet service provider’s router, and electronic appliances.
  • the method comprises displaying a scannable 2D bar code on the interactive electronic device.
  • the scannable 2D bar code encodes instructions for linking to a language database for programming the interactive electronic device in a selected language.
  • the bar code is scanned with a mobile communication device and communication is established between the language database and the interactive electronic device.
  • a programming language is then selected from a list of default languages presented in response to geodesic information transmitted from the mobile communication device or encoded in the scanned 2D bar code.
  • an alternative embodiment provides for scanning a scannable 2D bar code to motor vehicle tag having a 2D bar code affixed thereon, which enables for periodic electronic queries concerning the vehicle and the vehicle owner, or encoding a scannable link to a database containing such information.
  • an embodiment provides for a two- dimensional bar code having a portion of the bar code in an ink that is a different color than the remainder of the bar code to indicate bar code subject matter according to a standardized convention.
  • One embodiment of the invention provides an article of manufacture comprising a computer memory device, a protective covering, and a label.
  • the computer memory device contains computer readable data and an electronic lock to prevent access to the data without an electronic key for the lock.
  • the protective covering is resistant to electrostatic discharge and I or EMP attack and envelopes the computer memory device.
  • the label displays a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering.
  • a computer data delivery method comprises providing a computer memory device containing computer readable data and an electronic lock to prevent access to the data without an electronic key for the electronic lock; enveloping the computer memory device in a protective covering resistant to electrostatic discharge and EMP attack; labeling the covering and/or the computer memory device with a scannable bar code that produces the electronic key for unlocking the lock; and delivering the computer memory device with label and protective covering to a requestor of the data.
  • Another embodiment of the invention provides a computerized data delivery method.
  • encrypted data and bar code data is received in a first user computer or television.
  • a bar code image produced from the bar code data is displayed on a user interface display device associated with the first user computer or television.
  • the bar code image is scanned using a scan function of a second user computer having a barcode conversion function to produce converted bar code data.
  • the converted bar code data is received in the first user computer or television and the encrypted data is decrypted responsively to said receipt.
  • the encrypted data can be kept secure against all but the intended recipient.
  • Figure 1 depicts a standard logo.
  • Figure 2 depicts a visible logo integrated with a 2D scannable code.
  • Figure 3 depicts a manufactured coffee cup with a scannable logo.
  • Figure 4 is a visible logo with a depiction of an “invisible scannable code” layer added.
  • Figure 5 depicts the bounce flash feature for the invisible ink embodiment.
  • FIGS 6A and 6B depict the currency embodiment of the invention.
  • Figure 7 depicts the electronic device embodiment of the invention.
  • Figure 8 depicts the remote control embodiment of the invention.
  • Figure 9 depicts the motorized vehicle embodiment of the invention.
  • Figure 10 depicts a manufactured item for consumer assembly embodiment.
  • Figure 11 depicts how the visual cipher works.
  • Figure 12 is a flow chart illustrating a bar code based invoice payment method.
  • Figure 13 illustrates an invoice that can be used in the method of Figure 12.
  • Figure 14 illustrates a bar code based bank deposit method.
  • Figure 15 illustrates a deposit slip that can be used in the method of 14.
  • Figure 16 illustrates a bar code based check payment method.
  • Figure 17 illustrates a check that can be used in the method of Figure 16.
  • Figure 18 illustrates application of a bar code to a human appendage.
  • Figure 19 illustrates reading a bar code applied as in Figure 18.
  • Figure 20 illustrates a method for conducting bar code based patient management using the bar code applied and read as in Figures 18 and 19.
  • Figure 21 illustrates a label that can be used in a method for bar code based document mailing.
  • Figure 22 illustrates a method for processing mail carrying a label as in Figure 21.
  • Figure 23 illustrates a method for receiving mail carrying a label as in Figure 21 .
  • Figure 24 illustrates a method for preparing and processing a mail label using a form label as in Figure 25.
  • Figure 25 illustrates a form mailing label
  • Figure 26 illustrates a form mailing label with postage.
  • Figure 27 illustrates a computerized display useful in a method of bar code based accounting.
  • Figure 28 illustrates a method for carrying out bar code based accounting.
  • Figure 29 illustrates a method for carrying out a bar code based payment method.
  • Figure 30 illustrates a receipt that can be prepared using the method of Figure 29 ⁇
  • Figure 31 illustrates a method for carrying out a bar code based anonymous payment.
  • Figure 32 illustrates a currency for use in the method of Figure 31.
  • Figure 33 illustrates a front side of a gift card having a bar code.
  • Figure 34 illustrates a reverse side of the gift card of Figure 33.
  • Figure 35 illustrates a bar code based private payment method that can use card of Figs. 33 and 34.
  • Figure 36 illustrates a bar code based electronic shopping method.
  • Figure 37 illustrates a color based bar code hierarchy.
  • Figure 38 illustrates a portion of the hierarchy of Figure 37 in greater detail.
  • Figure 39 illustrates scanning a bar code as in Figure 38.
  • Figure 40 illustrates a color based bar code hierarchy method.
  • Figure 41 illustrates a bar code based door entry method.
  • Figure 42 illustrates a vehicle license plate useful in bar code based registration method.
  • Figure 43 illustrates a vehicle license plate having an attached bar code label.
  • Figure 44 illustrates a bar code based registration validation method for vehicles.
  • Figure 45 illustrates a bar code based remote control method.
  • Figure 46 illustrates devices that can be used in the remote control method of Figure 45.
  • Figure 47 illustrates an identification card that can be verified in a bar code based validation method.
  • Figure 48 illustrates a signature that can be verified in a bar code based verification method.
  • Figure 49 illustrates a creation method for providing verifiable bar code based signature and cards.
  • Figure 50 illustrates a bar code based verification process for cards or signatures.
  • Figure 51 illustrates a young bar code for use in a bar code based temporal security method.
  • Figure 52 illustrates a middle aged bar code for use in a bar code based temporal security method.
  • Figure 53 illustrates an old aged bar code for use in a bar code based temporal security method.
  • Figure 54 illustrates a method for secure data delivery according to an embodiment of the invention.
  • Figure 55 illustrates a method for mailing a computer memory device within a protective covering.
  • Figure 56 illustrates a method for installing the components of a streaming video player into a TV or computer monitor playback device.
  • Figure 57 illustrates a QR Code or other scannable code 5605 being displayed on the screen for scanning by the user to begin the process of configuring the Recorder I Playback Device.
  • Figure 58 illustrates a QR code being displayed on the screen for user login.
  • Figure 59 illustrates a series of QR codes being displayed on the screen for user selection of a service provider.
  • Figure 60 illustrates a series of QR codes being displayed on the screen for user selection of a movie download.
  • Figure 61 illustrates a movie menu being displayed on the screen for user selection of movie download.
  • Figure 1 depicts a standard logo design.
  • One embodiment describes a generic embodiment of the invention which can most aptly be described as a generic “brand authentication” method.
  • a 2D scannable code image is appended or otherwise merged into a logo or brand image to create a “scannable logo”, and recorded into a database.
  • Figure 2 depicts a visible logo integrated with a 2D scannable code.
  • the 2D scannable code image or portion of the image is generated according a standardized 2D bar code generating software format and both the logo/brand image and 2D scannable image bar code are printed together directly onto a personal object.
  • the 2D scannable image plus the brand or logo image is first printed onto a label, sticker or decal, which is then applied to a personal object.
  • the scannable logo image is etched into a manufactured product or molded into a manufactured product.
  • the scannable logo is visually displayed from an electronic display monitor. Zxing, among other companies, https://code.google.eom/p/zxing has developed a source code library for generating 2D bar codes that can be modified and be adapted to a wide range 2D bar code configurations.
  • a trusted registrar such as a bank, quasi-govemment agency, or non-profit organization
  • manufacturer would assume the stewardship of maintaining the database of 2D bar codes and corresponding logo or brand databases.
  • Packaging materials and shipping containers for products logo/brand+2D bar code would also contain the same 2D bar code or an otherwise corresponding logo/brand+2D bar code such that the manufactured product is matched to the shipping documents, sales receipts, invoice, etc.
  • different types of user/validators customs agents, shippers, retailers, consumers, the database registrar, manufacturer
  • Earlier embodiments of merging an image with a 2D matrix data code e.g. 2D bar code
  • the manufacturer having downloaded the mobile software application which can determine the user’s location through the smart-phone’s GPS function, would scan the logo/brand+2D (hereafter “scannable logo”) bar code at the manufacturing site. This would append the logo image to the generated scannable 2D bar code, time of scan, to a database that contains registration information for the brand or logo, the information about the business, and the manufacturing location to confirm it is a recognized manufacturing location.
  • the GPS information would be stored as a numerical string to form a numerical geodesic code as described in Luger to form a unique manufacturing geo-code entry.
  • US 14/206628 I described how the authentication process works as a “check-in” method.
  • the user can travels to a local coffee shop, where the coffee shop merchant displays their logo at the front door of their retail shop which is comprised of 1. Their business graphical logo, image, or brand, plus 2. a 2D scannable bar code in which the merchant personally (or a trusted registrar) has caused to be previously embedded a scannable code which contains: the merchant’s identify information, and a numerical geodesic code as described in Luger.
  • the consumer user scans the merchant’s displayed 2D bar code containing the merchant-specific geodesic code.
  • the scan of the 2D bar code causes the user’s mobile device to capture the user’s location for purposes of an automated “check-in” to the software which is connected to a social media app such as “Facebook” or “Linkedln” for the benefit of consumers.
  • Figure 3 depicts a manufactured coffee cup with a scannable logo.
  • the mobile device software creates open fields for entry of say: 1. a local government agency database linking the logo+2D bar code to the owner information, which in turn linked to say the city’s local health department and the city’s business permit department to be sure that the given location is cleared by the health department and has paid for the business permits; 2. the manufacturing companies database to be sure that the registered mark belongs to a properly authorized franchisee, and is not a “knockoff’ store pirating the corporate identity at an undisclosed location such as a counter-fit “McDonalds”; 3.
  • the shipping company database to enable a scan at the point of shipping, and periodically to the point of destination to the final destination; 5. the customs agency responsible for tracking incoming manufactured items; 6. the wholesale company responsible for storing the items prior to shipping to the distributor or retail location; 7. the retail location responsible for the using the manufactured item in connection with services provided to consumers; 8. the software company responsible for printing the receipt or invoice, includes a scannable code matched to the manufactured products UPC or SKU.
  • the scan containing the geodesic code (a de-facto geo-phone number) will yield exactly one unique business location, links to multiple government agencies and corporations to validate the unique brand-business geo-location can be considered a highly reliable nexus.
  • the method can be practiced where the logo and 2D bar codes were both displayed using human visible images, in the preferred embodiment, the logo/ brand image and consumer 2D bar codes are visually displayed using light waves in the human visible range, whereas for government agencies, the corporate team, and/or the trusted registrar the scannable codes would be “displayed” using invisible 2D bar codes that can only be machine read by the mobile device with appropriate optical sensors, and software. The consumer 2D bar codes would most likely be visible.
  • Patents US 6,221,270 titled Pigment Particles for Invisible Marking Applications, US 5,138,913 titled Security Document and Method Using Invisible Coded Marks, and 6,174,400 titled Near Infrared Florescent Security Transfer Printing and Marking Ribbons describe in depth the process for producing scan-ready markings which fluoresce in various substrate layers representing the preferred embodiment here. It should be understood, that by using different substrates that fluoresce on different wavelengths, different interested parties will each have a 2D scannable code that is only visible to their mobile scanning device, which is the preferred method of practicing this embodiment.
  • Figure 4 is a visible logo with a depiction of an “invisible scannable code” layer added.
  • a strongly desired enhancement employs a software selectable “bounce flash” such that mobile device is configured to emit an invisible light flash just prior to and during the image capture “scan” function such that the invisible substrates reflect their brightest practical illumination.
  • Figure 5 depicts the bounce flash feature for the invisible ink embodiment.
  • the advantage here is that the 2D scannable codes can be captured under all light conditions independent of the actual natural light conditions, by using an infrared substrate combined with a “flash” attached or embedded into the smart-phone camera either as a replacement or in addition to the current flash used on mobile devices. Where the security concerns are high, the specific “flash” frequency would be kept secret and possibly changed periodically.
  • a preferred security feature in this embodiment would provide that the 2D scannable code would be valid only for a specific time period, either predetermined at the time of the creation of the logo/brand and embedded in the 2D scannable code itself or maintained and selectable through the software in the device which can be “time stamped” at the time of each scan.
  • the manufacturer of the handset can have an invisible scannable code to collect metrics on the handset scan errors, facilitate firmware updates and the like.
  • the merchant also can have a unique embedded scannable code (albeit on a visible light frequency) so as to facilitate a positive consumer shopping/buying experience.
  • Multiple substrates with multiple “invisible bar codes” are an obvious adaptation of this embodiment.
  • a preferred feature of this embodiment would utilize a bar code image cipher (hashing the image) in combination with bit data channel encryption (128-2048 bits) across a high speed connection such as 3G, 4G, Wi-Max, or Wi-Fi.
  • FIG. 11 depicts how the visual cipher works.
  • the trusted registrar can generate an “open” non-cyphered 2D bar code that can be read by any standard 2D bar code reading software, and then move the sub-squares in an arbitrary pattern such that they were not readable except by virtue of the trusted registrar’s software to move the sub-squares back into the “readable” alignment for the various “end users”.
  • the information for brand authentication can be contained in a ID bar code, 3d bar code, or any other type of image that when scanned would yield a numeric data string, and all embodiments herein are not intended to be limited to only scannable 2D bar code images.
  • 3D bar codes imagine a “Rubik’s Cube” where the sub-squares are rotated with software from “readable” positions to “non-readable” positions by operation of the software before the 3D bar code image is rendered (either printed or virtually). The steps are reversed by the software to make the 3D bar code image readable — much the same as making each side of a Rubik’s Cube appear solid.
  • a preferred feature of the “check-in” embodiment feature as described in my provisional patent application 61/852,108 on pages 25-30 would include a “shopping cart”. (See Endnote 1) As noted in patent application US 14/206628, the scan of the 2D bar code connected to the merchant and specific merchant location would convert the user’s smart-phone into a “digital shopping cart” that is digitally displayed on the smart-phone or tablet phone, and integrated into the physical shopping experience custom tailored to the type of merchant or business visited.
  • the consumer user can then receive merchant generated “favors” such as: loyalty discounts, promotions, product information, web site information, advertising, etc.
  • merchant generated “favors” such as: loyalty discounts, promotions, product information, web site information, advertising, etc.
  • This embodiment (with embedded geodesic codes) connects the consumer user to one unique merchant identity and thus enables the content such as loyalty discounts, promotions, and shopping enhancements to be tailored to one specific consumer upon check-in.
  • Preferred features in this embodiment would include: 1. An automated system to “handshake” with incoming consumer’s smart-phone triggered by the “check-in” scan, if a first time store visitor, which can either through Wi-Fi, Bluetooth, ultrasonic listening through the smart-phone’s microphone, or even infra-red. 2.
  • an opt-in popup is “triggered” so that the user elects (or declines) to participate and electronically connect to the given merchant, this would enable the process of going from “checkin” to the shopping experience in a seamless manner.
  • Database retention of the consumer user’ s profile, shopping experience preferences, visits, loyalty points, and the like.
  • Integrated scanning of Universal Product Codes typically ID scannable codes) to enable consumers to gain information about products.
  • In-store shopping/browsing app either written in native code or written to support mobile interaction using the HTML5 methodology.
  • the “check-in” causes the coffee shop “menu” to appear in the mobile device’s browser window and enables the user to select the type of coffee he or she wishes, and any other treats. Since this user frequents this coffee shop, a 10% loyalty bonus is given as a scannable coupon, which the user downloads, and displays to the barista at the point of sale terminal who scans it with her scanning device as part of the point of sale payment process.
  • Automated help and informational screens would “pop up” and enable real time and/or contextual help should the user have questions or concerns about a particular product or service. This can include video chat with a product or store representative, either locally or remotely.
  • the brand/logo authentication facilitates a comprehensive “manufacturer to merchant inventory control system”. This feature is depicted by considering accounting and inventory control side of the coffee shop merchant example, where the bottom side of the coffee cup contains a 2D bar code that, when scanned by the merchant (or consumer if self-checkout is permitted), notifies the coffee cup manufacturer or vendor that the one inventory item (e.g. the cup) has been sold or otherwise used.
  • the embodiment herein adds the feature of a brand registry that includes a “check-in” at the cup manufacturing facility which creates a database table with a date and geo-origin of manufacture entry, with updated entries, logged by re-scan at various checkpoints as the manufactured cup is boxed and shipped to ultimately reach the specific retail location.
  • a “check-in” at the cup manufacturing facility which creates a database table with a date and geo-origin of manufacture entry, with updated entries, logged by re-scan at various checkpoints as the manufactured cup is boxed and shipped to ultimately reach the specific retail location.
  • the cup has a 2D bar code on the bottom of the cup, a matched 2D bar code on the packing materials, and even matching the shipping documents.
  • the manufacturer scans the 2D bar codes to log the items out for shipping, and the shipping company scans the matching codes upon receipt and re-delivery to a wholesale company, who follows the same procedure, U.S.
  • Customs (or other government’s customs) scans the shipping docs, and can scan the packaging down the specific cups on a test basis to confirm the quantity and authenticity of the shipment.
  • the wholesale company delivers to the regional distributor, who in turn delivers the cups to the specific retail store.
  • a store manager can then scan the bottom of the cup and view the “pedigree” of the shipment, thereby confirming the date, time, and location of each step from the manufacturer of origin to his retail shop. Law enforcement personnel can scan the cup bottoms, and compare the shipping pedigree to the trusted brand/logo registrar records to confirm the logo/branded item’s manufacturing origin for reasonableness.
  • this embodiment or the other embodiments herein can include bar codes that rapidly fade (minutes or hours) to prevent reusing the same cups at a later time.
  • a preferred feature further included in this embodiment would link the inventory control 2D scannable code to a database that includes printing the unique logo/brand+2D manufacturer of origin scannable code on the check out receipt as described in PPA 61/852, 108 on pages 13-15. See Endnote 2.
  • this feature would enable the consumer to automatically record and categorize the type of expense, based on predetermined criteria such that the 2D bar code contains a suggested expense type considering whether a given expense is for business or personal consumption, in the form of an appendable drop down list or pop-up input box.
  • the embodiment here goes further in that a scan of the 2D bar code can enable the consumer to trace the items pedigree from manufacturer of origin to the retail store to ensure the logo+2D bar code seemed reasonable. Moreover, in case of adulteration of a manufactured item, the consumer can trace an item’s movements. Additionally, counter-fit items can be rather quickly spotted as the “pedigree” wouldn’t match the actual events or can be non-existent.
  • the “check-in” embodiment includes an “integrated payment method” as described in PCT/US2011/00855 wherein the consumer scans a label stick or even the bottom of the cup itself containing a 2D bar code to pay for the coffee (which contains the merchant identity information with or without the geodesic code), enters the amount (or the amount is embedded in the 2D bar code), and the consumer’s bank “pushes” the money to the merchant’s account.
  • Variations of this embodiment feature which can enhance systems of internal control for the merchant, can include printing the 2D bar code on the register receipt which is then scanned by the consumer as described in PPA 61/852,108 on pages 15-17 (See Endnote 4) and the consumer’s bank once again “pushes” the money to the merchant’s account, or printing the 2D bar code on an invoice which is then scanned by the consumer as described in PPA 61/852,108 on pages 1-3 (See Endnote 5) and “pushed” the same way, or even paying the merchant with a check as described in PPA 61/852,108 pages 6-8, wherein consumer’s personal information, account information, and bank information are contained on a preprinted check (See Endnote 6).
  • the merchant prints their own information on the check (preventing transaction re-use), the consumer confirms the transaction information such as check number and payment amount on their mobile device display, and the consumer’s bank once again “pushes” the money.
  • a key advantage of this type of integrated payment feature is that “out of area” transactions can be more closely scrutinized, and consumer buying trends can be tracked with great precision.
  • the merchant can, in advance, cause a 2D bar code to be sent to the user for the purposes of navigating in the first instance to the merchant’s location.
  • This embodiment contemplates the merchant sending the 2D bar code to the user and the user taking a “digital snapshot” of the 2D bar code previously sent by the merchant, which would contain the numeric geodesic code, the software would determine user’s current location through currently used GPS methodology, then resolving the scanned geodesic code containing the merchant’ s corresponding geo-location information, generate exact tum-by-tum directions to the merchant’ s location.
  • the 2D bar code can either be sent via postcard with an attached label, sticker, temporary tattoo, or can be sent electronically to the user’s email and then scanned by the user’s smart-phone from an electronic screen display on a desktop, laptop, or tablet computer. While a “virtual” 2D bar code can be sent to the user’ s mobile device directly, and scanned virtually, or even the raw geodesic code number emailed or texted to the user so that it can be entered manually, or populated from a linked database, neither would be the preferred embodiment as depicted herein.
  • a “post card” embodiment is depicted by the example of the merchant desires to send out a post card mailing to the user’s home address which, in addition to the advertising content, contains a scannable 2D bar code printed on the card, or a label, or sticker that includes the merchant’s name, address, and a corresponding geodesic code. Assuming the consumer user wishes to visit the merchant’ s store, he or she scans the 2D bar code that contains the merchant’s contact information, including the geodesic code.
  • the user then obtains turn-by- tum directions to the merchant’s store.
  • the merchant’s contact information (which includes the geodesic code) can be stored in the user’s phone “directory” as a numeric string prior to traveling to the merchant’s store.
  • the geodesic code can be simply appended to the existing “directory”, a more eloquent solution is to have a “geo-directory” such that the directory contains merchant’s in a specified geographic area, which changes depending on the user’s location (most likely embodied with a region code as described in Luger).
  • Such a directory can be pre-populated with merchant’s contact/geo-contact information linked to the specified geo-numeric region code or it can be embodied such that merchants are populated when scanned or a combination of both.
  • sufficient consumer identification information is embedded in the 2D bar code so that when scanned, the merchant receives metric data identifying when the consumer viewed the post card.
  • This embodiment can include having the consumer’s device register the consumer’s geo-location when the code is scanned, but this step can also be eliminated to protect consumer privacy.
  • the 2 nd “post card” embodiment would provide that when the scannable 2D bar code (containing the geodesic code) is scanned in proximity to the local post office or postal box just prior to depositing in the postal box, wherein the merchant’ s smart-phone contains software that is linked to the post office database, and follows the delivery processing from the starting post office or deposit into the box to where the item is initially deposited through to the ending post office — where the posted item is notated as “out for delivery” to the consumer recipient.
  • the scannable 2D bar code containing the geodesic code
  • Another preferred feature of this embodiment would once again use the “check-in” feature described above, wherein the post office patron scans the post office’s 2D USPS merchant code, which then triggers the post office shopping experience to occur on the patron’s smart-phone.
  • additional preferred features can include: 1. An automated pop up to enable the user to purchase stamps at an Automated Postal Center (or similar kiosk) and pay for the stamps using their smart-phone. 2. An integrated media pouch to enable the merchant to send micro digital media such and SDS card with the post card in instances where digital delivery can replace physical pages. 3. Step by step directions to help the postal patron deposit the package in such a way to facilitate tracking as described herein.
  • the embedded scannable 2D bar code itself functions as an onsite printed postage stamp which contains a unique serial numbered sequence, a stamp denomination (or exemption flag if the value is perpetual), and a point of origin geodesic code.
  • This 2D bar-coded “stamp” enables anonymous tracking of the item based on the stamp’s unique serial number alone which facilitates specific tracking while keeping the specific identity of the sender and receiver anonymous to preserve privacy.
  • the package carrier would have to have scanning software on a tablet or other mobile device to be able to scan the item at each sorting/and handling point.
  • Such an embodiment can be implemented by the postal or other common carrier in such a way as to enable anonymous “lookup” of the postcard/letter/or packages tracking by the unique serial number.
  • This embodiment is similar to that practiced by the U.S. Postal Service currently, wherein scannable codes are used, except that in the later case the scan is not linked to a calculated geospatial location, but rather the 2D bar code is linked to a “facility” address recorded in an address table.
  • the advantage of the embodiment presented here is that a GPS calculated location makes it easy to adapt “ad-hoc” mail processing facilities with the user of simple smart-phones or tablet mobile devices, and eliminates frequent updating and facility locations, open, close or change.
  • the scannable 2D bar code can omit the origination geodesic code such that the “location” was calculated using GPS methods at each point of scan, but generating a physical stamp at the origin location better facilitates the “inventory tracking” process as described above for the coffee cup.
  • a preferred embodiment feature (where privacy was less critical) would (in addition to the unique serial number and point of origin geodesic code) include a unique identifier in the 2D scannable code containing the recipient’s geodesic code corresponding to their physical address (with or without additional addressee information embedded therein).
  • the “delivery” function can be automated such that when the delivery person physically arrives at the recipient’s location, the software in the smartphone, or mobile table device records a delivery.
  • a recipient can require the delivery person to also “check-in” by scanning a 2D bar code at the residential location (as would be done where they check-in at a merchant location) where additional delivery verification is desired.
  • a “hospital” embodiment is depicted to illustrate the utility of the invention in an institutional setting where the resident population needs to be more closely monitored. While all the features of the previous preferred embodiments would likely be incorporated into this embodiment, where this embodiment is distinguishable is that here an additional step is added to the “check-in”. Specifically, the hospital (or other institution) provides to the patient, visitor, or employee an adhesive sticker, label, or temporary tattoo which contains an image of a scannable 2D bar code that is then applied to a person’s appendage or a personal object.
  • this embodiment is “. . .a method of human identification comprising the steps of providing identity information for a human in an electronic database, providing identifying information for a plurality of marks in an electronic database, each mark being associated with the indentifying information for one person in a validating way for a specific time, and providing a means for transferring marks which convey the indentifying information to a scanner onto their person or a personal object.”
  • the hospital maintains the visitor identity database, obtained at check-in and entered manually or captured when the person performed a “check-in”, as was done in the coffee shop.
  • the hospital then prints out the decal or sticker (or more preferably an adhesive dermal patch), which is then applied to the person for use during the time in which the person is at the hospital (See Endnote 15).
  • This embodiment differs from US 8,483,448 in that it adds the geodesic code information to the mark, such that when scans either by the user’s smart-phone or tablet computer or by a smart-phone or tablet computer under the control of the hospital or other institution, the device reports back the users location in addition to the other information.
  • a preferred feature of this embodiment provides that the dermal patch would change color upon removal from the patient to prevent accidental removal or tampering.
  • the changing color security feature would make the dermal patch suitable for medication control as an additional function in that dispensation of patient medications would require scanning the patch each time to validate the person’s identity within the facility.
  • Another preferred feature is that when the person left a specified geographic area as pre-defined within the geodesic code software functions, the code would not function or register when scanned, such that any internal codes used within the scannable codes cannot be decoded outside the geographic area in the event that such codes were scanned by devices outside the control of the hospital.
  • this embodiment utilizes a bar code image cipher (hashing the image) in combination with bit data channel encryption (128-2048 bits) across a high speed connection such as 3G, 4G, Wi-Max, or Wi-Fi, the relatively low bandwidth requirements of this check-in method would permit using a “reverse hash” with or without image cipher across SMS band (with or without band encryption) to scan and send the scanned geo-numeric information in remote rural areas or in case of a broad failure of other available high speed internet channels.
  • the requisite geo-numeric information can be contained in a ID bar code, 3d bar code, or any other type of image that when scanned yields a numeric data string, and all embodiments herein are not intended to be limited to only scannable 2D bar code images.
  • the scannable images can be comprised of light frequencies within human optical ranges, outside human optical ranges or a combination of both.
  • preferred features in this embodiment include a “patient management cart” where all services received by the patient would be linked to the specific bar code “patient token”, and would include the integrated inventory management, receipt tracking and integrated payment methods.
  • an “anonymous payment” embodiment is depicted to illustrate the utility of the invention to facilitate anonymous payments (See Endnote 8).
  • the embedded scannable 2D bar code functions as an onsite printed postage stamp which contains a unique serial numbered sequence, a stamp denomination (or exemption flag if the value is perpetual), and a point of origin geodesic code.
  • this embodiment functions the same for bearer stamps, money, or gift cards (another bearer payment method).
  • the money or gift card contains a unique serial numbered sequence, a denomination, and a point of origin geodesic code.
  • the intent of this method is not to facilitate real time tracking, but rather “check point” tracking when the stamp, money or gift card comes into control of a bank teller or ATM, merchant that does bill validation, automated vending machine or the like.
  • the merchant, ATM, or other checkpoint relies on the authentication of the physical specimen (money, stamp or gift card) rather than requiring the person to self identify. Though a merchant who is suspicious of a stamp, bill or gift card can require additional identification, it is not the preferred method.
  • the 2D bar coded bill, stamp, or gift card enables anonymous tracking of the item based on the item’s unique serial number alone which facilitates specific tracking while keeping the specific identity of the parties anonymous to preserve privacy.
  • the merchant, ATM, teller, or other trusted handler would have to have scanning software on the ATM, desktop with scanning wand, tablet or other mobile device to be able to scan the item at each handling point.
  • Such an embodiment can be implemented by the treasury department, gift card issuer, or postal service to facilitate anonymous “lookup” of the item to rule our forgeries (e.g. duplicates, or out of the correct sequence, etc).
  • the advantage to this embodiment is that is enables voluminous, yet quasi-anonymous metrics of ATM use, stamp purchases, gift card use, and the like, connected to the calculated geospatial location.
  • the scannable 2D bar code can omit the origination geodesic code such that the “location” is calculated using GPS methods at each end-point scan, but retaining a physical origin location better facilitates the “inventory tracking” process as described above for the coffee cup.
  • the geodesic codes can be scanned, to ensure that all actually arrived at its correct destination.
  • the embodiment presented offers a more reliable method of currency control because software for scanning currency, gift cards or stamps can be developed for both treasury agencies and the consumers to facilitate comonitoring of currency, with levels of access being provided as appropriate, since scanning the bar code can will yield a single unique data string.
  • a metric available to the public would be to a bill’s movement history to give the recipient reassurance that the bill in question is “in circulation” as depicted by the website “www.whereisgeorge.com”.
  • “inventory” management of the distribution of bills is facilitated, and monitored in the same fashion as described in the coffee cup example embodiment.
  • a preferred feature of this embodiment would be to facilitate remote deposits through automated optical validation of bills the same way that checks can be scanned and deposited by banks currently.
  • Figure 6 depicts the currency embodiment of the invention.
  • the embodiment presented in this application depicts currency authentication prior to circulation, whereby an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a physical specimen of the currency or stamp to create a “scannable currency”, which contains encoded identity data for the currency or stamp, encoded visual identification characteristics for the currency or stamp denomination, and encoded GPS data corresponding to government printing office location for a printed item.
  • the image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information is decoded with the image decoding function.
  • the GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information matching the address coordinates or geocoordinates of a treasury facility, correspondent banking facility, wholesale facility, distribution facility or retail banking location. If the decoded information is a geo- proximal match, an authentication application is launched in the computer function of the mobile communication device.
  • the authentication application has certain required fields, which include time and date that the mobile device scans the scannable currency to effect authentication, which are automatically populated each time the authentication application is launched.
  • a tracing log is displayed on the mobile device tracing items transit history from the manufacturing or assembly location thru to the retail bank which ultimately receives the cash.
  • a “bank deposit” embodiment is depicted to illustrate the utility of the invention to make a deposit at a financial institution (See Endnote 9).
  • the deposit ticket is comprised of a reusable “card” that has a 2D scannable code printed on the card itself, or a label, sticker or decal applied to the card containing a scannable 2D bar code. Contained within the 2D scannable bar code is the customer’s bank account number, the bank’s routing number.
  • a geodesic code that covers the user’s home territory such as city, county or state such that deposits made outside the user’s home area can be more closely monitored and under certain adverse conditions prevented.
  • cash with a 2D bar code can be deposited through application of this method such that the user scanned the bill’s 2D bar code, then the deposit card 2D bar code, to affect a remote cash deposit through the user’s smart-phone.
  • the geodesic code feature on both the deposit card and bills ensure improved internal control as more fully discussed in the forth embodiment above.
  • a “signature validation” embodiment is depicted to illustrate the utility of the invention to validate document execution (See Endnote 10).
  • a user has been previously validated in such a way as to be linked to their smart-phone or other mobile device.
  • the user’s smartphone or other mobile device captures the geodesic code, identifying information such as the person’s name, device identification information, and then transmits said information to a printer which then prints out as a scannable 2D bar code on the document itself or a label, decal or sticker, that is then attached to the document in such as way as to independently attest to the time and a place of the person’ s signature.
  • the person can also produce a scannable 2D embedded code in for or a graphics file such as JPG or PNG that can be scanned in an electronic document the same as from a paper document.
  • Such preferred features of this embodiment would include a trusted 3d party validating party such as a bank, government agency or the like to verify the person’s identity, image, signature and the like, and include such information in a database that is accessible by the application either directly or through a proxy identity known only to the validator and the validatee.
  • Photo images would be encrypted and scrambled by cipher prior to electronic transmission ideally.
  • the embodiment includes one or more user validation steps to ensure they were indenting to affect a signature on a given document, and if used in conjunction with a notary, the notary would likewise have one or more validation steps to effect the attest function.
  • the app kept a log accessible to the user at least by date order, along with one or more other indexing methods to recall specific documents executed. Persons performing notary services would have similar but separate index logs, but for all persons who received attest services. Email can be used to confirm the process. The steps herein would not preclude independent verification of a government issued ID as a validation step. As I further describe in patent application US 14/206628, in seventh embodiment and the embodiments which follows describe a “check-in” embodiment connected a hardware device or other appliance.
  • a “home security embodiment” where a user gains access to enter a home by scanning a 2D bar code displayed either electronically or on a sticker, label, decal or the like near the entrance to the home, which contains a unique code and/or identity information, and/or instructions for the device that when scanned cause the home system to disarm, record the device’s hardware profile information, such and SIM ID or chip ID etc to authenticate the device, and calculate the time/date of the scan so as to keep an access log. (See Endnote 11).
  • This embodiment facilitates a low cost method of generating an access key, such as in a hotel environment where there is high occupant turnover and a desire to generate new “keys”.
  • the entrance contains a scanner that scans the personal object containing the 2D bar code or it can be a downloadable app, that is linked in such a way that when in proximity to the access point, the user’s mobile device sends a proprietary electronic signal to a network, that in turn electronically unlocks the door.
  • the preferred embodiment employs a geodesic code in a similar fashion to the hospital embodiment such that the user’s “key” software would only function when proximate to the linked geodesic code, with said code ideally being independently validated by the user’s device.
  • This embodiment is not limited to disarming the access or security system, but would likewise arm such a system.
  • This embodiment is not limited to home access, but is also be well suited to an secure entry system for automobiles or other mobile devices such that the “key” can be sent electronically.
  • guest access can be granted and restricted at a very low per user cost.
  • an “electronic remote control/setup” embodiment is depicted to illustrate the utility of the invention to serve as an electronic remote control platform (See Endnote 12).
  • the user scans a 2D scannable code displayed from an appliance such as a television, mobile ISP device, automobile, desktop software, or other configurable device. Contained in the 2D scannable code is the “setup” information for the device, plus as geodesic code that is linked to a database to provide the correct custom language for the device.
  • scanning the 2D scannable code would identify the model number, and the user would then download the a virtual remote control interface correctly configured for his particular television using the predominant language of his geographic location by default.
  • a validation step would preferably be included to ensure that the default based on geography was the desired language configuration.
  • the software would ensure that any connectable DVD or other types of “player” interfaces would play in the correct language based on the remote preferences.
  • Another example illustrating this embodiment is illustrated by the example of remote ISP login, where the user scans a scannable 2D bar code containing access information about the ISP, including ideally the correct language for the user interface based on the geodesic code.
  • a preferred feature in this embodiment would include a hardware identification feature so that the scanned 2D bar code would include information about the device such that any driver updates, patches, security updates ,etc can be downloaded and applied based on the devices self reporting.
  • additional validation step can include hardware polling to verify the device hardware is in fact as reported; however, hardware polling is much slower which makes the scanned reporting the preferred approach in most instances.
  • Some additional features can include Bluetooth, infrared connectivity to enable close proximity communications.
  • the 2D bar codes as in other embodiments herein can be either displayed electronically or by label, sticker or decal. User manuals in digital form would be a preferred feature of this embodiment.
  • a “vehicle identification and management system” embodiment is depicted to illustrate the utility of the invention to serve facilitate the social management of vehicles (See Endnote 13).
  • a 2D bar code is used that contains vehicle identification information plus a geodesic code, such that the device can be tracked from start-point to end-point with 100% accuracy.
  • a preferred feature of this embodiment would include the feature that scanning the 2D bar code calculate the specific start point geodesic code at the trip beginning, and stop point geodesic code at the end of the trip such exact mileage is calculated.
  • scanning the 2D bar code would facilitate efficient tracking, mileage accounting, and such for taxis and other commercial vehicles without the need to buy expensive “meters” like in a taxi. Further uses would include insurance tracking, support for road taxes based on actual travel.
  • this embodiment would be combined with the methods described in US application number 14/079402, the disclosure of which is incorporated by reference herein, such that the scan would include an integrated payment method or any one of the payment embodiments described in this application.
  • Figure 7 depicts an electronic device embodiment of the invention.
  • the embodiment presented in this application depicts electronic device authentication prior to public use/circulation, whereby the manufactured item or assembled item is a electronic network packet switching, routing device, or other internet service provider modem device, whereby an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, encoded electronic device model characteristics, and encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item.
  • this embodiment includes an encoded specific time period, only during which the image comprising the scannable logo can be displayed from a manufactured or assembled item, in such as way that it can be scanned for the first time by a mobile device.
  • the image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, encoded electronic device model characteristics, and the encoded GPS location information is decoded with the image decoding function.
  • the GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device.
  • the authentication application has certain required fields, which include time and date that the mobile device scans the scannable logo to effect authentication, which are automatically populated each time the authentication application is launched. Additionally, when the authentication application is initially launched at the manufacturing facility, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, electronic device model characteristics, and decoded GPS data are successfully matched against a registry database for validity, an inventory control log is created and/or incremented. Further, native programming language “firmware” is downloaded in response to successful initial authentication based on the decoded model number characteristics. User guides, software and other collateral materials to the electronic device are electronically linked, and a corresponding scannable logo can be applied to collateral materials prior to shipping the electronic device.
  • the scannable logo is affixed both to the chassis of the electronic device, and displayed through a visual display when the electronic device is activated.
  • a tracing log is created as the electronic device is shipped from the manufacturing facility to the ultimate retailer, who sells the item to the consumer.
  • the consumer can also scan the scannable logo, and the electronic device is “automatically registered” by capturing the consumer’s geo-location information through the mobile computing devices GPS function along with other consumer identification data.
  • Figure 8 depicts the remote control embodiment of the invention.
  • the embodiment presented in this application describes the interactive process for the remote appliance control from the point of manufacture to the point of distribution to the retail consumer, whereby the electronically deliverable content is a software application that functions as a electronic appliance remote control, whereby an image of a 2D bar code or other scannable image which yields a data string is presented together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, encoded electronic device model characteristics, and encoded GPS data corresponding to a distribution region location for a digitally deliverable content.
  • the image is scanned with the image scanning function of the mobile communication device and the logo brand owner identity data, the visually identifying characteristics of the scannable logo, encoded electronic device model characteristics, and the encoded GPS location information is decoded with the image decoding function.
  • the GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. Based on the decoded GPS information, as compared to the most probable languages of the region, corresponding instructions are displayed in the most probable written language associated with the given geo-location area and subject to use validation are saved on the user’s local device.
  • the authentication application when the authentication application is initially launched at the consumer’s home, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, electronic device model characteristics, and decoded GPS data are successfully matched against a manufacturer’s registry database for validity, the “remote control” is automatically registered to that device for a certain model appliance, and a manufacturer’ s control log is created and/or incremented. Further, native programming language “firmware” is downloaded in response to successful consumer authentication based on the decoded model number characteristics. User guides, software and other collateral materials to the electronic device are electronically linked, and a corresponding scannable logo can be applied to collateral materials prior to shipping the electronic device.
  • the scannable logo is affixed both to the chassis of the electronic device, and displayed through a visual display when the electronic device is activated.
  • the consumer can also scan the scannable logo, and the electronic device is “automatically registered” by capturing the consumer’s geo-location information through the mobile computing devices GPS function along with other consumer identification data.
  • the logo identity data would include a serial number for the electronic device so connected to the virtual “remote control”.
  • Figure 9 depicts the motorized vehicle embodiment of the invention.
  • the embodiment presented currently in this application relates to the authentication steps with respect to motor vehicles which occur between the manufacture, and delivery to the consumer, whereby the manufactured item is a motor vehicle or premanufactured home, whereby an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, encoded Vehicle Identification Number and other model characteristics, and encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item.
  • this embodiment includes an encoded specific time period, only during which the image comprising the scannable logo can be displayed from a manufactured or assembled item, in such as way that it can be scanned for the first time by a mobile device.
  • the image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, encoded electronic device model characteristics, and the encoded GPS location information is decoded with the image decoding function.
  • the GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device.
  • the authentication application has certain required fields, which include time and date that the mobile device scans the scannable logo to effect authentication, which are automatically populated each time the authentication application is launched. Additionally, when the authentication application is initially launched at the manufacturing facility, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, decoded Vehicle Identification Number, other model characteristics, and decoded GPS data are successfully matched against a registry database for validity, and simultaneously an inventory control log is created and/or incremented. User guides, software and other collateral materials to the electronic device are electronically linked, and a corresponding scannable logo can be applied to collateral materials prior to shipping the electronic device.
  • the scannable logo is affixed both to the chassis of the vehicle, and displayed through a visual display in the vehicle’s instrument cluster when the vehicle is activated.
  • a tracing log is created as the electronic device is shipped from the manufacturing facility to the ultimate retailer, who sells the item to the consumer.
  • the consumer can also scan the scannable logo, and the vehicle can be electronically registered” by capturing the consumer’s geo-location information through the mobile computing devices GPS function along with other consumer identification data, which is forwarded to a state’s vehicle registration department for e-registering in real time.
  • Figure 10 depicts a manufactured item for consumer assembly embodiment.
  • a manufactured item is sold in “kit” form and assembled at the consumer’s home address
  • an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, and encoded GPS data corresponding to manufacturing location for the components to be assembled.
  • the manufactured components have a tracing log that can be viewed by scanning the scannable logos for each component or if a small item like screws, the contained.
  • the image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information is decoded with the image decoding function.
  • the GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information matching the address coordinates or geocoordinates of a consumer’s address to activate the warranty for the item. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device.
  • the authentication application has certain required fields, which include time and date that the mobile device scans the scannable logo to effect authentication, which are automatically populated each time the authentication application is launched.
  • a tracing log for each sub-component is displayed on the mobile device tracing items transit history from the manufacturing thru to the assembly location, with the retail location of pickup being one entry.
  • the embodiment in this application expands the use of this system to create an index electronically linked to a trusted registrar where multiple “layers” are users for different types of user access. For example, a red mark might indicate a government agency, a white mark a manufacturer, etc.
  • an electronic devices with component chassis a mobile device case, a rectangular “credit” card or debit card, an electronic disc or flash drive, an article of clothing, a wrist band, a component of an automobile, a component of an airplane, a component of a piece of military hardware, a sheet of letter paper, a receipt, a newspaper, magazine, a credit card protective sleeve, a dermal patch, a postage stamp, currency, a human appendage, a cup, bottle, or other container; or an electronic display such as on a CRT monitor, television, ECD, or other mobile display that virtually displays a brand or logo either alone or as part of a virtually depicted tangible property.
  • the scannable logo is etched into metal wherein the electrosaltwater is used.
  • a smooth flat piece of metal with the desired surface area sufficient to display a scannable logo is obtained, and a scannable design is applied to a plastic non-conductive material with an adhesive backing suitable to adhere flatly on the metal, but which will be laser etchable once applied.
  • a small opening is left on the flat metal piece suitable to touch an electro-conductive cathode lead.
  • the area behind the lead should be sealed with an plastic non-conductive material sufficient to keep the metal watertight.
  • the design is then etched into the previously applied plastic, and then inspected to ensure the design is correct.
  • the lead is connected to a electric current, and the etched plastic metal combination is lowered into a saltwater solution, and an anode is passed into the water to cause in electrolysis effect, thereby etching the metal.
  • the plastic-metal assemblage is removed from the saltwater solution and dipped in a non-saltwater solution to halt the residual electrolysis.
  • the plastic-metal assemblage is removed from the water, and the laser-etched plastic adhesive is removed, exposing the electro-etched scannable logo design.
  • an invisible marking ink can be applied to the plastic -metal assemblage prior to removing the laser-etched plastic adhesive to improve the reliability of the scan.
  • an electro-etched metal scannable logo design is inset into a plastic mold in such a way that the inset remains visible after the molding process is complete. The molding process is completed, and once removed the etched metal remains as a scannable logo.
  • the data communication channel for the data transmissions is encrypted.
  • a preferred feature of this embodiment would utilize a bar code image cipher (hashing the image) in combination with bit data channel encryption (128-2048 bits) across a high speed connection such as 3G, 4G, Wi-Max, or Wi-Fi, but the embodiments herein can be adapted to lower bandwidth by one skilled in the art.
  • the embodiments are depicted where both the logo and corresponding scannable code(s) are visible, it is preferred that for all embodiments except for consumer point of view access, the 2D scannable codes are presented at frequencies above or below human visible light so as: 1. Not to affect the aesthetics of an any logo design, and 2.
  • the logo and one or more scannable 2D bar codes and be visually displayed in layers for scanning. Further, it preferred that the visual display incorporate a cipher to prevent unauthorized decoded without a key.
  • the data packages sent across the computer networks should be encrypted in addition to encrypting the communication channels themselves.
  • a trusted registrar which can be a mobile device manufacture, the company that develops the software applications for authentication, decryption, encryption, and data transmission, or the scannable logos, or a government agency like the U.S. Customs, the US Patent Office, or even the manufacturer of the a personal item, wherein the trusted registrar safeguards the data described in the embodiment such as the logo data, business identity data, and specified or predetermined time data.
  • the trusted registrar causes other participants (manufacturer, consumer, distributor, shipper, software developer, etc) to subscribe to the scannable logo system, wherein some but not all aspects of the authentication, tracing logs or registry is viewable as would be appropriate to security concerns and their needed level of access.
  • a government trademark registry may have a time period that expires with the payment of trademark fees.
  • a city government may have a period limited by the timing of business permit fees, a consumer can limit timing with a warranty period, a merchant with the expiration of a reasonable time in a store, a manufacturer can limit a time to enable an item to be added to the master inventory list, a distributor can limit time to when a shipment is expected, and so forth.
  • the “specified” or “pre-determined” time period is intended to be a flexible specification albeit essential element of practicing the invention.
  • a mobile device launches an application for purchasing a manufactured item, assembled item, or electronically deliverable item, a scannable 2D bar code is presented on an invoice, receipt or functionally equivalent electronic display for an for a manufactured item, assembled item, or electronically deliverable item, whereby an image of a 2D bar code or other scannable image which yields a data string is presented in response a validated authentication of a manufactured, assembled item, or electronically deliverable item providing for a buyer’s mobile communication device with a camera function for scanning or capturing an image of the seller bar code and a keypad for entering a payment amount is provided.
  • a remote electronic payment center for maintaining a buyer’s account and making electronic payments from the buyer’s account is provided.
  • a wireless communication system for transmitting data, including data representative of the seller bar code image, and the payment amount, to the remote electronic payment center, is provided.
  • Applications are present on the mobile communication device and at the remote payment center to enable data transmission of the data over the wireless communication system from the buyer’s mobile communication device to the remote electronic payment center using a send command and to authorize the remote electronic payment center to electronically transfer funds from a buyer’s account associated with the buyer’s mobile communication device to the seller’ s account.
  • the image of the seller bar code is scanned or captured from the invoice or sales receipt with the camera function of the buyer’s mobile communication device and processed with the mobile communication device application to form a wirelessly transmittable seller data file.
  • the seller data file is wirelessly transmitted from the mobile communication device to the electronic payment center.
  • the payment data representative of a payment amount is wirelessly transmitted from the smart-phone to the electronic payment center.
  • the buyer’s account is electronically debited by the payment amount.
  • the seller’s account is electronically credited by the payment amount, and data representative of the crediting of the seller’s account is electronically transmitted to the seller.
  • a payment method with the scannable logo is presented on an inventory item, and directly scanned by the consumer to make a purchase.
  • the method employs a seller bar code encoding information solely to enable electronic payment to a seller’ s account.
  • the seller’ s account belongs to an intended recipient of the electronic payment.
  • a buyer’s mobile communication device with a camera function for scanning or capturing an image of the seller bar code and a keypad for entering a payment amount is also employed.
  • a remote electronic payment center for maintaining a buyer’s account and making electronic payments from the buyer’s account is provided.
  • a wireless communication system for transmitting data, including data representative of the seller bar code image, and the payment amount, to the remote electronic payment center is also used.
  • a applications are present on the mobile communication device and at the remote payment center to enable data transmission of the data over the wireless communication system from the buyer’s mobile communication device to the remote electronic payment center using a send command and to authorize the remote electronic payment center to electronically transfer funds from a buyer’s account associated with the buyer’s mobile communication device to the seller’ s account.
  • An image of the seller bar code is provided at a point of sale for goods or services. The image of the seller bar code is scanned or captured with the camera function of the buyer’s mobile communication device. The image is processed with the mobile communication device application to form a wirelessly transmittable seller data file. The seller data file is wirelessly transmitted from the mobile communication device to the electronic payment center.
  • a payment data file representative of a payment amount is wirelessly transmitted from the smart-phone to the electronic payment center.
  • the buyer’s account is electronically debited by the payment amount and the seller’s account is electronically credited by the payment amount.
  • Data representative of the crediting of the seller’ s account is transmitted to the seller.
  • An image of a bar code encoding identifying information for each item being purchased is presented on a manufactured item. Each image is scanned with the camera function of the mobile communication device. The identifying information for each item is saved in a computer memory device in association with the buyer’s communication device.
  • First Time User Download/Setup Assume that a person wants to travel from Miami, FL to Atlanta, GA, and decides to call a hired car to transport service such as Uber, Lyft, a limo company, or cab, and after requested the ride, the user receives a text that the ride is on the way. Once in the car, the new embodiment is presented.
  • a hired car such as Uber, Lyft, a limo company, or cab
  • the user sees a tablet computer (or functionally equivalent) displaying inside the vehicle, with coupons for products and services (separately or integrated into ads) scrolling across the screen which contain a 2D bar code that can be scanned by the users phone, and alternatively a mobile phone number to receive the coupon for the product or service.
  • a dialog box pops-up with the mobile number pre-filled in so it can be confirmed.
  • a text is sent to the user’s mobile device linked to the entered phone number, and a link is also sent to invite the user to download a coupon app.
  • the user then can download the app, so that the next time they will experience the coupon app user experience.
  • the app allows for the registration of multiple devices linked to a common phone number.
  • the app also allows for the driver or the hired car to “check-in” and the driver and tablet are then paired in such a way that if someone removes the tablet from the proximity of the driver, the data on the tablet is wiped to ensure security.
  • the app allows for the functionality to send the coupons to email, or multiple devices simultaneously.
  • the app collects and stores quasi-public personal data which includes but is not necessarily limited to: user name, email address, zip code, state, device type, and thereafter creates a 2D bar code containing this information or a link to this information which can be entered by another device by scanning the coupon app user’s mobile device.
  • the last name is “starred” out to like a password to protect the coupon app user’s visual privacy so even the driver doesn’t have the last name.
  • All information is stored in a database linked to the user’s device with minimal information being retained either on the user’s device or the hired car’ s tablet device.
  • the coupon app includes a user opt-in privacy policy.
  • the coupon app will have the feature to text me with follow-up’s periodically inviting me to download and install the app.
  • the coupon app can occur either through a recognized site such as Google play, or iTunes store or it could be a direct link download. If I stop the installation process mid-stream, the app asks me if I want to try later, and then will prompt me.
  • the coupon app also includes (once installed) an automated handshake with the hired car tablet as a mobile WiFi hotspot so during any future visit the rider can use the hired car’s WiFi, in lieu of an “login page” as is currently done in the industry.
  • the user opens the app, and is able to search for the nearest vehicle for hire within says a 5,10, 20 or 50 mile radius for transportation with the views of available rides sorted in ways that include soonest ETA, and lowest ride cost.
  • the app captures the user’s starting point the GPS calculated location or alternatively based on the “check-in” scanned location process as described in this application if there are many businesses or addresses resolving to a common way point.
  • the user’s selected destination has been previously input either by the user when requesting the ride or by the driver or by the corporate staff, and when the vehicle heads out, the ETA to the destination is displayed in the user hired car app.
  • the user can scan the 2D bar codes like before to capture coupons, but the process is automated in that the coupons are sent according to the user’s preset preferences.
  • One of the preference options is to “clip” the coupons and put them into an electronic folder automatically by category for use by the user.
  • One additional feature would be to display on the hired car’s tablet screen the content of the user’s phone to improve the visual experience, in a similar fashion to have Google ChromeCast device displays on a television screen from an Android OS device.
  • This display would present games, video viewing, maps, and specialty search sites like TripAdvisor and the like to make the user experience. All this would work when in proximity.
  • One additional included feature in the user’s app would be a folder to contain and display the 2D bar code boarding passes for the airplane as a JPG so the user could display this instantly to airline personnel and TSA check-in even when no WiFi was available later.
  • the user app would allow the feature of in- app purchases incorporating the 2D scanning processes described previously or other common methods such as NFC or mag-stripe scan.
  • a hardware device that incorporates an automated button such as those which are commercially available that can be plugged into to the 3.5mm jack of the phone as a power source, and then can be programmed to perform 1 or more functions by pressing the plugged in device, which functions to register a programmable single key press in such a way that a single press or the device “button” causes the hired car app to scan/capture a 2D barcode, but returning an instruction to scan when the key is pressed, so that the smartphone’s interface would not have to be unlocked or otherwise open before performing this single function.
  • a unique address would be embedded in the hardware to match to the phone so it could not be spoofed easily.
  • This invention embodies improvements to adapt the earlier specification(s)/embodiment(s) to deliver data in a highly secure manner. Specifically, this embodiment is intended to protect underlying data against EMP attack and/or electronic eavesdropping through the internet, by isolating and separating the underlying data access and the process of validating the identity of the data recipient.
  • One embodiment of the invention provides an article of manufacture comprising a computer memory device, a protective covering, and a label.
  • the computer memory device containing computer readable data and an electronic lock to prevent access to the data without an electronic key for the lock.
  • the protective covering is resistant to electrostatic discharge and EMP attack and envelopes the computer memory device.
  • the label displays a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering.
  • the label is on the computer memory device and includes a removable covering that must be removed to scan the scannable bar code.
  • the data is encrypted.
  • a computer data delivery method comprises providing a computer memory device containing computer readable data and an electronic lock to prevent access to the data without an electronic key for the electronic lock; enveloping the computer memory device in a protective covering resistant to electrostatic discharge and EMP attack; labeling the covering and/or the computer memory device with a scannable bar code that produces the electronic key for unlocking the lock; and delivering the computer memory device with label and protective covering to a requestor of the data.
  • the scannable bar code is transmitted to a computer of the requestor.
  • the bar code image is scanned using a scan function of a requestor computer having a barcode conversion function to produce converted bar code data which yields the proper unlock code.
  • the computer is then disconnected from the internet.
  • the computer memory device is inserted into the computer.
  • the data on the computer memory device is read.
  • the computer memory device is then removed from the computer, any requestor -viewable data from the device remaining on the computer is erased, and the computer is reconnected to the internet.
  • a read receipt can be transmitted to a predetermined location as well as geolocation data.
  • the data is encrypted and the method further comprises decrypting the data.
  • a media mailer is send which contains three (3) pouches that hold a portable data storage device such as a flash drive, SD card, or functionally similar with the key requirement being that the data drive is not connected to an electronic network capable of accessing directly or indirectly the content of the data device.
  • a portable data storage device such as a flash drive, SD card, or functionally similar with the key requirement being that the data drive is not connected to an electronic network capable of accessing directly or indirectly the content of the data device.
  • the method relies on the label on the device to deliver a "control key” such that the media content can only be “unlocked” by reading the 2D bar code key on the media itself, and entering the code into a "network isolated” media player that unlocks and plays the media content, with or without returning a "return receipt” to confirm the location where the data file was received.
  • the sleeves of the mailer would preferably employ an electrostatic resistant material to resist electrostatic discharge and /or EMP attack, and prior to shipping, all data devices would be stored in a manner resistant to electrostatic discharge and /or EMP attack.
  • the data would preferably be encrypted, but the local software program used to read the data storage device or stream pathway would preferably disconnect from the internet just prior to decrypting the data so that at no time was the decrypted data accessible to the internet or similar networks.
  • the bar code image is scanned using a scan function of a requestor computer having a barcode conversion function to produce converted bar code data which yields the proper unlock code.
  • the geo-confirmation of data receipt would be performed at some time after the data was read, when the reading device was reconnected to the internet or ideally by using a separate device to validate the confirmation of the data receipt from the process of reading the data.
  • the data to be delivered should be maintained at various global co-locations within an internet isolated network (intranet) so that data could be transferred to deliverable devices and either mailed or messengered to the recipients address in under 24 hours.
  • the data device itself might employ a "covering" such as a scratch off or slide cover so that the recipient of the data would then scratch off or slide open a cover to reveal the scannable code underneath.
  • Another embodiment of the invention provides a computerized data delivery method.
  • encrypted data and bar code data is received in a first user computer.
  • a bar code image produced from the bar code data is displayed on a user interface display device associated with the first user computer, or a television.
  • the bar code image is scanned using a scan function of a second user computer having a barcode conversion function to produce converted bar code data.
  • the converted bar code data is received in the first user computer and the encrypted data is decrypted responsively to said receipt.
  • internet communications in the first computer are disabled, and images produced from the decrypted data are displayed on the user interface display device associated with the first user computer.
  • images produced from the decrypted data are displayed on a user interface device associated with the second user computer, the second user computer is preferably a wireless mobile device, and the barcode conversion function is an app.
  • the app is preferably downloaded onto the wireless mobile device prior to receiving the encrypted data and bar code data in the first user computer.
  • the app can further provide for executing a payment function from the wireless mobile device prior to decrypting the encrypted data such as where the images form a movie.
  • Step 1 an encrypted UHF, VHF, cable television, or data stream is broadcast or transmitted which includes a scannable unlock bar code.
  • This embodiment is presented as an alternative to scanning the unlock bar code from a label.
  • the scannable bar code is displayed on a television, computer monitor or tablet device as depicted in Step 2.
  • a person who wishes to view the encrypted data scans the displayed bar code with the scanning feature of their smart-phone or tablet device as shown in Step 3.
  • the bar code is authenticated, and can be used to process a payment (say where the video data is rented or purchased), confirm the user's identity, and validate geo-information for purposes or copyright enforcement.
  • This authentication and verification step is performed through apps residing on the users smartphone, tablet or functionally equivalent mobile device.
  • the user's mobile device is network isolated while the payload data (video, audio, or text data) is decrypted and displayed as depicted in Step 5. While the best practice is to network isolate the device before decryption, this embodiment contemplates no encryption/decryption if the data is less confidential.
  • the payload data is decrypted, and displayed on the television or monitor as shown in Step 7.
  • the decrypted payload can displayed on the same or a different mobile device, as shown in Step 7A, but in such case, a greater security risk is presented with the network enabled for playback unless the data is transmitted via USB or other hardwire cable.
  • the decoding step is not being performed on a separate device from the smart-phone or tablet, it would be handled by software in the mobile device, and the decrypted payload then be displayed for viewing directly on the mobile device. This variation makes sense when a television show will be "moved” from being viewed on a television or monitor to be viewed (even in the middle of the viewing) to a mobile device for continued viewing, by rescanning the barcode for "resume” playback on the mobile device.
  • the decoder/player device could employ a data port such as a USB port to allow a flash drive or SD card to be plugged in, and a bar code displayed from the television or monitor so as to unlock the data to be viewed.
  • a data port such as a USB port to allow a flash drive or SD card to be plugged in, and a bar code displayed from the television or monitor so as to unlock the data to be viewed.
  • the validation of the displaying device is handled by "proxy" in that the validating device is connected to the displaying device through the process of scanning the validation bar code from the displaying device.
  • An advantage of this embodiment is that any video playback device can be used at any location since the network isolates during decryption and playback, ensuring the content delivered remains private.
  • the smart-phone communicates with one or more remote networks to validate the user, confirm geo-information, process payments.
  • the software to decrypt the signal payload or data stream resides on a separate device from the smart-phone or tablet used to communicate with the remote networks. Ideally, only one network, television tower, or other data pathway is used to transmit to the playback/decoder device and point to point encryption is used between the receiving device and the transmitter.
  • This embodiment contemplates bypassing Steps 2 and 3 by having the decoder/playback device directly communicate with the mobile device to wirelessly transmit the unlock code as a data string, and have it decoded as a background process by software in the mobile device.
  • This approach while functional, lacks the air-gapped nature of physically scanning the displayed bar code by a physically separate device.
  • the data or video to be stored locally would be stored in a virtual drive in such a way that the entered code would decrypt an entire virtual drive for playback.
  • the mobile app link in the second computer could be embedded in the bar code such that the mobile device is automatically connected when scanned and/or the app downloaded before decoding, separate player/decoder could push the mobile app software to the phone/tablet.
  • the last approach has the advantage of cutting out the google app store but adds the wrinkle of setting permissions on the mobile device to accept a non-google / apple vetted app
  • Hie encrypted data sent to the first computer or television is preferably presumed to be sent through a trusted "closed" network, whereas, the data sent and received by the second computer is assumed to be sent across a public access network such as the internet.
  • Embodiment 1 provides for an article of manufacture, comprising a computer memory device, with a label that " . . . displays a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering.
  • a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering.
  • Embodiment 1 preferably incorporates the functionality that "The [mailable] protective covering is resistant to electrostatic discharge and EMP attack and envelopes the computer memory device.”
  • Embodiment 1 preferably includes the functionality with the mailable protective covering wherein ". . . the 2D bar code that contains the merchant’s contact information.” P28
  • Embodiment 1 preferably incorporates the functionality with the mailable protective covering wherein ". . . the embedded scannable 2D bar code itself functions as an onsite printed postage stamp which contains a unique serial numbered sequence, a stamp denomination (or exemption flag if the value is perpetual), and a point of origin geodesic code.”
  • Embodiment 1 preferentially incorporates the functionality within the attached label's scannable code on the computer memory device, depicting a payment method for an electronically deliverable item, and providing for ". . .a buyer’s mobile communication device with a camera function for scanning or capturing an image of the seller bar code and a keypad for entering a payment amount is provided.”
  • the stored data may include any type of data that can be stored on a computer memory device, such as video data, financial data, images, or marketing data.
  • the scannable code on the protective mailer improves security by allowing for authentication geo-validation of both the sender and recipient.
  • the sender and receiver can additionally be identity authenticated as part scanning the label on the computer memory device transported with in the protective envelope.
  • the scannable code on the protective mailer can be either be printed directly on the mailer containing the computer memory device or printed onto a label that is then put on the protective mailer.
  • the protective sleeve in the protective mailer incorporates EMP protective material and XRAY protective material for additional security when posting sensitive data materials within the protective sleeve.
  • the computer memory device label incorporates the functionality such that scanning the label reveals a data string that decrypts the data stored on the computer memory device.
  • the computer memory device label incorporates the functionality such that scanning the label authenticates the data stored on the computer memory device.
  • the computer memory device label incorporates the functionality such that scanning the label validates the data stored on the computer memory device.
  • Software applications are included on a computer device which includes an optical scanner, with the functionality to optically scan and decode the scannable label, unlock the computer memory device, and then read the underlying unlocked data.
  • the second computer incorporates an optical scanner and software capable of scanning, and then decrypting or otherwise decoding the scannable label attached to the computer memory device, and then reading the underlying data that has been decrypted or otherwise decoded.
  • a scannable code could be etched into the metal or plastic case of the computer memory device to serve the same function as the label.
  • the second computer is a mobile device such as a smartphone, tablet or a remote control device with optical scanning capability.
  • the second computer must be capable of reading the computer memory device, but both read-write capability is preferred.
  • the scannable labels may employ color frequencies not visible to the human eye.
  • a label printer, computer, and appropriate software is employed to collect the identity information of the sender and/or receiver; and thereafter, generate an adhesive label (or labels) to be applied to the protective mailer, which then contains affixed scannable codes containing the sender and receiver information with respect to this embodiment.
  • the scannable codes preferably will contain the sender's and receiver's address, name, and location information reduced to a data string or geodesic code.
  • the scannable code images could be printed directly on the protective mailer envelope.
  • the adhesive scannable labels are printed on adhesive sheets suitable for removal and application to both the protective mailer envelope and the computer memory device.
  • Embodiment 1 preferably includes the functionality of the mailable protective covering with respect to tracking delivery service routing wherein: "This 2D bar-coded “stamp” enables anonymous tracking of the item based on the stamp’s unique serial number alone which facilitates specific tracking while keeping the specific identity of the sender and receiver anonymous to preserve privacy.”
  • the sender, receiver, and delivery service personnel can employ a mobile device with optical scanning ability, which is combined with software to decode and decrypt the scannable codes on the protective envelope, and from the scannable codes determine the name and stated locations of the sender and receiver of the protective envelope to track the shipping progress.
  • the geo-locate feature is activated in the delivery service employee's scanning device computer to record the current location of the protective mailer envelope, and the location information along with an anonymous, unique identifier is uploaded to a database for mail tracking purposes, which in turn is indexed to the name and address information of the sender and recipient in a separate database.
  • Fig 55 just prior to inserting the computer memory device into protective mailer's sleeve, the protective mailer envelope is depicted.
  • the scannable label is attached to the computer memory device prior to its insertion into the protective sleeve, which also incorporates scannable labels.
  • the user scans a 2D scannable code displayed from an appliance such as a television, mobile ISP device, automobile, desktop software, or other configurable device. Contained in the 2D scannable code is the “setup” information for the device, plus as geodesic code that is linked to a database to provide the correct custom language for the device. For example, in the case of the television, scanning the 2D scannable code would identify the model number, and the user would then download the virtual remote control interface correctly configured for his particular television using the predominant language of his geographic location by default. A validation step would preferably be included to ensure that the default based on geography was the desired language configuration.
  • the software would ensure that any connectable DVD or other types of “player” interfaces would play in the correct language based on the remote preferences.
  • Some advantages to this embodiment are that multiple remotes can be generated for guests, family members etc., as needed that are custom configured to the personal preferences of the user and the specific settings of the device.
  • Another example illustrating this embodiment is illustrated by the example of remote ISP login, where the user scans a scannable 2D bar code containing access information about the ISP, including ideally the correct language for the user interface based on the geodesic code.
  • a preferred feature in this embodiment would include a hardware identification feature so that the scanned 2D bar code would include information about the device such that any driver updates, patches, security updates, etc., can be downloaded and applied based on the devices self-reporting.
  • additional validation step can include hardware polling to verify the device hardware is in fact as reported; however, hardware polling is much slower which makes the scanned reporting the preferred approach in most instances.
  • Some additional features can include Bluetooth, infrared connectivity to enable close proximity communications.
  • the 2D bar codes as in other embodiments herein can be either displayed electronically or by label, sticker or decal. User manuals in digital form would be a preferred feature of this embodiment.”
  • Another embodiment of the invention provides a computerized data delivery method.
  • encrypted data and bar code data is received in a first user computer.
  • a bar code image produced from the bar code data is displayed on a user interface display device associated with the first user computer, or a television.
  • the bar code image is scanned using a scan function of a second user computer having a barcode conversion function to produce converted bar code data.
  • the converted bar code data is received in the first user computer and the encrypted data is decrypted responsively to said receipt.
  • internet communications in the first computer are disabled, and images produced from the decrypted data are displayed on the user interface display device associated with the first user computer.
  • images produced from the decrypted data are displayed on a user interface device associated with the second user computer, the second user computer is preferably a wireless mobile device, and the barcode conversion function is an app.
  • the app is preferably downloaded onto the wireless mobile device prior to receiving the encrypted data and bar code data in the first user computer.
  • the app can further provide for executing a payment function from the wireless mobile device prior to decrypting the encrypted data such as where the images form a movie.
  • Step 1 an encrypted UHF, VHF, cable television, or data stream is broadcast or transmitted which includes a scannable unlock bar code.
  • This embodiment is presented as an alternative to scanning the unlock bar code from a label.
  • the scannable bar code is displayed on a television, computer monitor or tablet device as depicted in Step 2.
  • a person who wishes to view the encrypted data scans the displayed bar code with the scanning feature of their smart-phone or tablet device as shown in Step 3.
  • the bar code is authenticated, and can be used to process a payment (say where the video data is rented or purchased), confirm the user's identity, and validate geo-information for purposes or copyright enforcement.
  • This authentication and verification step is performed through apps residing on the user’s smartphone, tablet or functionally equivalent mobile device.
  • the user's mobile device is network isolated while the payload data (video, audio, or text data) is decrypted and displayed as depicted in Step 5. While the best practice is to network isolate the device before decryption, this embodiment contemplates no encryption/decryption if the data is less confidential.
  • the payload data is decrypted, and displayed on the television or monitor as shown in Step 7.
  • the decrypted payload can displayed on the same or a different mobile device, as shown in Step 7A, but in such case, a greater security risk is presented with the network enabled for playback unless the data is transmitted via USB or other hardwire cable.
  • the decoding step is not being performed on a separate device from the smart-phone or tablet, it would be handled by software in the mobile device, and the decrypted payload then be displayed for viewing directly on the mobile device. This variation makes sense when a television show will be "moved” from being viewed on a television or monitor to be viewed (even in the middle of the viewing) to a mobile device for continued viewing, by rescanning the barcode for "resume” playback on the mobile device.
  • the decoder/player device could employ a data port such as a USB port to allow a flash drive or SD card to be plugged in, and a bar code displayed from the television or monitor so as to unlock the data to be viewed.
  • a data port such as a USB port to allow a flash drive or SD card to be plugged in, and a bar code displayed from the television or monitor so as to unlock the data to be viewed.
  • the validation of the displaying device is handled by "proxy" in that the validating device is connected to the displaying device through the process of scanning the validation bar code from the displaying device.
  • An advantage of this embodiment is that any video playback device can be used at any location since the network isolates during decryption and playback, ensuring the content delivered remains private.
  • the smart-phone communicates with one or more remote networks to validate the user, confirm geo-information, process payments.
  • the software to decrypt the signal payload or data stream resides on a separate device from the smart-phone or tablet used to communicate with the remote networks.
  • a separate device from the smart-phone or tablet used to communicate with the remote networks.
  • only one network, television tower, or other data pathway is used to transmit to the playback/decoder device and point to point encryption is used between the receiving device and the Transmitter.
  • the data or video to be stored locally would be stored in a virtual drive in such a way that the entered code would decrypt an entire virtual drive for playback.
  • the mobile app link in the second computer could be embedded in the bar code such that the mobile device is automatically connected when scanned and/or the app downloaded before decoding, separate player/decoder could push the mobile app software to the phone/tablet.
  • the last approach has the advantage of cutting out the google app store but adds the wrinkle of setting permissions on the mobile device to accept a non-google I apple vetted app
  • the encrypted data sent to the first computer or television is preferably presumed to be sent through a trusted "closed" network, whereas, the data sent and received by the second computer is assumed to be sent across a public access network such as the internet.”
  • a dongle 5601 containing the components of a streaming video player as depicted in FIG 54 and described more fully in EMBODIMENT 2 is inserted into the TV or computer monitor playback device 5603, and the playback/recording device is activated into setup or configuration mode.
  • a QR Code or other scannable code 5605 is displayed on the screen as shown in FIG 57.
  • the displayed-on-screen scannable (QR Code) is generated by firmware of the Playback (Recorder) device or alternatively by the users Smartphone device 5607, which employs a software application that transmits the scannable code via WiFi or Bluetooth to be then displayed on the screen.
  • the user scans the QR Code to begin the process of configuring the Recorder / Playback Device.
  • the Playback device is disconnected from the internet prior to scanning the QR Code (or manually entering password data) so that any password data cannot be hacked as the devices are functionally "air gapped" at this point from the internet, except for the local intranet connection between the playback TV (or computer monitor) and the Playback (Recorder) device.
  • the user can manually enter information: either on the user's smartphone (which is mirrored to the Playback I Recording device while in Configuration / Setup Mode) or through the use of the remote control device 5609 which is redundantly connected to the Playback / Recording device as a preference.
  • scanning an optical code such as a QR code
  • entering data is a preferable redundant feature to accommodate all types of users.
  • the Recorder / Playback device is a standalone dongle, but alternatively, the Recorder / Playback device could be built-in to the TV or Computer Monitor or even a tablet.
  • STEP 1- Smartphone VPN Setup-Configuration Tether Connection Established Once the user’s information and password is entered or more preferably, decoded by a scan of the QR Code, applications in the users smartphone cause the smartphone to open the smartphones "tethered" feature to create a secured Wi-Fi VPN connection between the Recording / Playback Device and the user's smartphone (and remote control) to facilitate secure internet service for purposes of downloading firmware updates to the Playback / Recording device, adding specific new Streaming Service Channels (such as Hulu, Netflix and the like), and even downloading specific video content for storage on a SSD card in the Remote Control or the user's Smartphone.
  • specific new Streaming Service Channels such as Hulu, Netflix and the like
  • FIG 57 depicts the Playback I Recording device as mirrored with the user’s smartphone in configuration mode (preferred).
  • the embodiment could employ any functionally equivalent mobile device such as a tablet, although a smartphone is depicted.
  • applications in the user's smartphone when in "intranet" mode, during setup-configuration, automatically embed the phone's tether login credentials (Wi-Fi Name & Password) into the scannable QR code so that when scanned, the phone automatically decodes a data string (with login credentials) and then creates the secure VPN tether.
  • the connection employs encryption.
  • dropdowns would be provided to allow the user to search for a locally available Wi-Fi network.
  • STEP 2 Login to user's Smartphone OS provider: Next, while still in configuration- setup mode, the user logs into the smartphone email accounts and profile that will be common for their accounts to be used for their Playback- Recording device and currently in use by their smartphone device.
  • a user's bank account or debit card information can be accessed and or saved by scanning the scannable QR code.
  • the necessary device account information is stored in an encrypted file stored locally on the device and only decoded while the device is in "intranet” mode (disconnected from the internet).
  • Data strings such as the user's city, state, country, and zip code are preferably embedded into the scannable (QR) code), decoded and then migrated from the profile files in the user's smartphone to the user's Playback / Recorder device account profile when the displayed scannable code is scanned. These files are then stored on the Record-Playback device for later reference and validation.
  • This login process is depicted in FIG 58 in like fashion to the process of creating the secure VPN tether connection.
  • STEP 3-User Selects Streaming Video Channels on Recording-Playback Device As depicted in FIG 59, while in configuration-setup mode, the user selects the desired Video Streaming Channels, with scannable codes being displayed in association with the graphical "icon badges" used by each Video Channel provider. Alternatively, the icon badges themselves could function as the scannable codes as depicted in detail in my earlier issued patent, but the user must be aware of this feature/capability to use it.
  • the scannable (QR) codes contain embedded data string information for configuring the Streaming Video Channel(s) according to the user's preferences, or default settings where appropriate.
  • the user's devices are disconnected from the internet when sensitive data is decoded / encoded to configuration file or when data is to be manually entered by the user, so that encrypted payloads with configuration data files are only decrypted or modified when the devices are in an "intranet" state.
  • the file is saved in a read only state (preferably encrypted) and the connection to the internet can be reestablished.
  • the user can switch back to "run" mode so that the Playback / Record device is no longer mirrored to the user’s smartphone, and with the configuration files saved as encrypted read only format, there is reduced chance of data theft.
  • the user may select a local Wi-Fi / ISP provider at this point.
  • STEP 4-User Downloads a specific Video (with record feature shown).
  • the user may select and download a specific video through the Playback- Recording device, which is in turn connected to the remote control 5611 for the Playback-Recording device via Wi-Fi, Bluetooth or functional equivalent.
  • a data storage device (SSD card) 5613 is inserted into the remote control and the video or data is downloaded to the data storage device.
  • the video content that is ultra-high definition such as 4K or 8K format so as to eliminate buffering which may occur when streaming ultra-high definition content on a relatively slow internet connection speed.
  • playback is handled through the "intranet” Wi-Fi or Bluetooth connection, and not necessarily reliant on inconsistent internet performance as with pure streaming.
  • a hybrid approach may be adopted, where the data storage (SSD card) functions as a large data buffer, but this would lack the functionality of being able to remove the data storage device (SSD card) and share the recorded/downloaded video with family and friends. While mirrored configuration is shown, this embodiment feature may be practiced with just the remote control device controlling the Playback-Recording Device or the user's smartphone itself may be configured as a remote control device with software apps on the user's smartphone. Playback of a recorded video is accomplished by inserting a previously recorded data storage disk into the remotecontrol slot to read the disk.
  • Embodiment 3 depicts video streaming channels and download video content to a data storage device, the embodiment contemplates streaming audio channels and downloading audio content as functionally equivalent.
  • This embodiment provides for a Quick Response Video Delivery System (QRVDS) employing three systemic core parts: 1. a “Viewing Device” such as a TV, computer monitor or tablet, preferably connected to a separate or integrated streaming service provider hardware device. 2. A video playback device, known henceforth as a "Streaming Sendee Provider Type 1 Device or "SSPD Type 1", which employs a power source, CPU, mass storage, software applications to connect the SSPD Type 1 to Viewing Devices, Smartphones, remote controls for recording and/or playback as embodied herein. 3. A remote control connected via radio frequency to the SSPD Type 1 Device.
  • QRVDS Quick Response Video Delivery System
  • the “Remote Control” device contains a slot or slide out tray to playback the video content, music content or data files, which in turn is connected to a Viewing Device such as a television, computer monitor, tablet, smartwatch, or smartphone, or functionally equivalent, with the Remote Control allowing for the insertion of a Scannable Playback Token, as shown in Fig 61.
  • a Scannable Playback Token (or SPT) is preferably a round or rectangular weighted thin plastic strata, with an affixed decal containing a scannable "key” code, which when scanned yields a data string that contains a URL or functionally equivalent reference to a video file.
  • Said Remote Control employs a camera plus software applications to capture the scannable code image from the SPT and decode the digital string contained therein, and to then playback the referenced video file or files.
  • the User/Viewer’s Smartphone could be used as the “remote control” device, with mobile software application(s) residing on the user’s (or more precisely “User / Viewer”) Smartphone to perform comparable functions, with said Smartphone applications engaging the user’s Smartphone camera function, along with additional Smartphone software functions to capture and decode scannable QR code data from the “label” on the SPT itself.
  • this embodiment does not employ data storage functionality, but rather the “token” preferably employs unique size and/or shapes such that the remote control device requires the proper size and/or shaped “token” to actuate the remote control device for playback (or recording) functionality.
  • This unique size and shape feature would preferably also be adapted to the previous embodiment where an SSD memory storage card (or functional equivalent is used for playback and/or recording data.
  • the SSPD Type 1 device calls software the-functions such as: a. "Scan to Play", b. "Scan to Configure” and if needed the c. "Scan for Help” functions, and software applications within the “Scan to Play App” residing in the SSPD Type 1 or the User I Viewer’ s Smartphone can be called or downloaded as needed to play configure and optimize video playback for a video Viewing Device. Additional functions, such as "Scan to Pay” can be called to pay for a video upon delivery to a specific location. The first two functions (a and b) are used to stream or otherwise play a video and also to setup the initial hardware and user configurations with respect to the Video Device (or devices) of the User/Viewer.
  • the SSPD Type 1 preferably is also connects to separate "Scan to Play" Smartphone Application (called “Scan to Play App”) which allows the User I Viewer to watch video content directly from their Smartphone as alternative to viewing on a traditional television or monitor, have their Smartphone serve as remote control device, and have their Smartphone provide a secure “tether” connection for configuration.
  • the user’s smartphone may also function to store encrypted backups of key data on from the SSPD Type 1 device in case of device failure.
  • the "Scan to Pay” allows the User I Viewer to make a payment either from a Viewing Device or through the Scan to Play App on their Smartphone for purchasing a selected data file.
  • the "Scan to Configure” function may be called for many types of integrations such as when the User I Viewer wishes to add additional Viewing Devices, Viewing Locations, or Wi-Fi connections to allow for the highest quality video content viewing across multiple locations and multiple Viewing Devices, with a configuration file log being saved by the software applications either on the SSPD Type 1 device or the user's SmartPhone.
  • streamed video content is viewed through the connection between the SSPD Type 1 itself, and a Viewing Device which employs optimized graphics hardware.
  • the SSPD Type 1 embodiment may include a separate graphical process unit (such as from an NVIDIA GPU) with the HDMI connectivity to connect the SSPD Type 1 directly to a computer monitor.
  • suitable playback functionality though a Wi-Fi based "mirror" function, by calling the mirror function on the user's Smartphone within the Scan to Play App, and then integrating the video playback feature of the Smartphone with the Viewing Device.
  • This configuration is preferably, then saved in a “configuration settings file” within SSPD Type 1 device.
  • the “configuration setting file” could be saved through the User / Viewer's Scan to Play App in their Smartphone.
  • a direct HDMI port could be added as a permanent hardware component to the SSPD Type 1 device.
  • the "Scan to Pay" function data (such as payment card data) preferably is stored within the Scan to Play App which preferably resides locally in the SSPD Type 1 device or alternatively on secure local drive partition of the User / Viewer's Smartphone in an encrypted file to be called by the Scan to Play App.
  • the SSPD Type 1 preferably permits a mirror connection to the user's Smartphone for alternative viewing or engaging the "Scan for Help" function, or alternatively viewing for one of the other SSPD Types.
  • authentication of the User / Viewer can be completed by displaying a scannable “key” code on a Viewing Devices (or alternatively on the User's Smartwatch or Tablet when using the "Scan to Play” function, scanning a “Help QR Code”, “Scan to Configure” or other revealed scannable “key” code when using the "Scan to Configure” or “Scan for Help” functions.
  • the device powers up to this function when plugged into a Viewing Device and powers off when removed.
  • the SSPD Type 1 device employs a first computer plus software capable of reading “Meta-Data” associated with videos being viewed on a Video Playback Device, such that when a specific video is “selected” by a User/Viewer on the SSPD Type 1 device, from the User/Viewer’ s selection, a scannable code (such as a QR Code or the like) is created employing creates a “linked-list” database reference expressed a URL reference or functional equivalent. Thereafter, the SSPD Type 1 device is connected to a printer suitable to print scannable labels contained scannable codes which reference the selected videos.
  • a scannable code such as a QR Code or the like
  • the first computer preferably employs software capable of generating a scannable code with an encrypted scannable label, and said label then being applied to the Scannable Playback Token in such a way that when the label when scanned by a second computer with appropriate software, yields the underlying video file’s data string reference, and is unlocked or otherwise decrypted by the second computer.
  • the video file is downloaded or “streamed” to the second computer device, also being an SSPD Type 1 device connected to a video playback device and to the remote control.
  • the SPT employs unique size and shape features, so that functionality functions of “selecting” a video to be sent or “playback” is activated only when the properly sized “token” is inserted into the remote control.
  • the first SSPD Type 1 device is connected to a remote computer facility connected to a computer, printer, and mailing facility such that when the User/Viewer selects a video file for “sending”, a label contain a scannable code is generated that is associated with that specific video.
  • a remote computer facility would be provided by a Streaming Service Provider ("SSP"), such as Roku, Plex, or the like.
  • SSP Streaming Service Provider
  • the SSP prints the labels, affixes them to the SPTs, and mails them to a selected recipient using an appropriate mailer, as identified in previous embodiments and as depicted in Fig 55, with the associated mailing labels preferably being employed to mail the Scannable Playback Token(s), containing the linked video file(s) scannable code(s).
  • a User/Viewer wishes to select and send to his home for private viewing a historically relevant movie such as PT109, which depicts the early navy career of President John F. Kennedy, and “selects” the movie to reduce the internet data string reference (video file with corresponding meta data) to an encrypted QR Code.
  • additional discrete references are included as additional data string references to the meta-data where information about the movie such as actors, year released, and the like or even a “movie trailer” data string could be included in the referenced data string or data strings to be encoded.
  • a scannable code is printed into a label, and then applied to a scannable playback token.
  • a Scannable Playback Token (ormultiple tokens) is/are mailed to the desired “Viewer/User” using a secure mailer as depicted in previous embodiments.
  • the label-link contained in the Scannable Playback Token additionally includes a “secure key” unlocking and employing End-to-End encryption to ensure a secure data channel delivery.
  • the second computer (for decoding the scannable codes) incorporates an optical scanner and software capable of scanning, and then decrypting or otherwise decoding the scannable label attached to the computer memory device, and then reading the underlying data string that has been decrypted or otherwise decoded.
  • a scannable code could be etched into the metal or plastic case of the scannable playback token to serve the same function as the label.
  • the second computer is a mobile remote control connected to the SSPD Type 1 device, but alternatively a smartphone, tablet or a remote control device with optical scanning capability could be used.
  • the scannable labels may employ color frequencies not visible to the human eye.
  • the Remote Control itself preferably employs a private radio transceiver to perform Input / Output (I/O) functions for purposes of User I Viewer I Device identification, establishing secure communication networks, storing data in a secure manner, with the scannable playback token functioning as a type of “hardware” key, and functioning as a component within the SSPD Type 1 device embodiment or other embodiments.
  • I/O Input / Output
  • This embodiment is distinguished from the previous embodiment where the user may select and download a specific videos through the SSPD Type 1 device, which is in turn connected to the remote control for the Playback-Recording device via Wi-Fi, Bluetooth or functional equivalent.
  • a data storage device SSD card
  • the video or data is downloaded to the data storage device.
  • the User/Viewer could select the video to create a QR Code link for viewing by others, though this would not be considered preferred for best privacy practices.
  • this embodiment depicts playback using the remote control for insertion of the Scannable Playback Token (SPT) or SSD media (with an attached QR Code label); however, it should be considered as functionally equivalent to insert the SPT into an integrated player/viewer system in a motorized vehicle, into a slot I tray in a "tablet" computer, into a slot I tray on the SmartTV itself, into a slot / tray on the SSPD Type 1 device itself, or the like.
  • SPT Scannable Playback Token
  • SSD media with an attached QR Code label
  • an engraving or holographic image preferably is included to ensure the scannable code is authentic.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

A "scannable logo" image contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, an encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item, plus additional embodiment dependent data. The image is scanned with the image scanning function of a mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information are decoded with a decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device and compared to the decoded GPS location information. If the decoded information is a geo- proximal match, an authentication application is launched in the computer function of the mobile communication device.

Description

DESCRIPTION
SECURE DATA DELIVERY SYSTEM
Technical Field
The present invention relates to the use of machine-readable codes for the implementing of a secure data delivery system.
Background Art
Scannable codes, specifically 2D bar codes, have shown wide commercial acceptance from the period of 2011 forward. The widest use depicted enables such codes to be scanned by a mobile device such as a smart-phone or tablet computer (iPad, Android table, or Microsoft tablet), which are then linked to an informational website, which is displayed on the given mobile device. Though RFID systems such as Google Wallet, and low cost “wireless” slide systems, such as Square have had the greatest market acceptance, there has also been some adoption of using 2D bar codes for making payments with mobile devices. The various embodiments described herein expand the field of 2D bar code authentication to embodiments outside the areas of linked URL pages, and mobile payments; specifically, using scannable codes to authenticate brands or logos.
The disclosure of my earlier patent, US 5,878,155, issued March 2, 1999 is incorporated herein by reference. In US 5,878,155, a payment method is described wherein an embodiment incorporates the use of scannable codes to authenticate a party, specifically the application of invisible, indelible marks for purposes of identification in order to conducting monetary and credit transactions in a secure manner.
The disclosure of my earlier patent, US 8,484,448, issued July 9, 2013 and based on US application number 12/590940 filed November 17, 2009 is incorporated herein by reference. In US 8,484,448, bar code information is scanned and characteristics about the scanned code are compared to characteristics about other codes stored in a database for the specific time period in question in order to verify the identity of the buyer for a given time period. US 8,483,448 further provides that the identity step can include a database point of scan identity confirmation by digital image of the presumptive user of the system, wherein the specific embodiment disclosed was for the purpose of making a payment.
In my application number US 13/509041 filed May 10, 2012 titled ELECTRONIC SALES METHOD”, which is a continuation in part, and claims the benefit of PCT application number PCT/US2011/02986, with a priority date of November 17, 2009, the disclosure of which is incorporated herein by reference, an authentication method is disclosed that employs temporary tattoos, decals, or labels in a series, which are scanned by a smart-phone to authenticate a person’ s identity, and wherein a specific embodiment disclosed was for the purpose of making a payment.
In my application number US 13/509041, there is further provided an embodiment for attaching a decal or sticker with a 2D scannable code to a blank “credit/debit” card, driver’s license, or other ID card which contains an image, which links the image and identity data to a 2D scannable code; specifically, a multiple-payment- option charge card comprising a rectangular card carrying a multiplicity of differing two-dimensional data matrix codes in the form of decals, stamps or stickers, each data matrix code encrypting a buyer's charge or debit card information, or electronically linkable to the buyer's charge or debit card information, the charge or debit card information being different for each code carried by the card.
In my application number application number US 14/079402, filed November 13, 2013 titled METHODS FOR CONDUCTING ELECTRONIC PAYMENT TRANSACTIONS WITH SCANNABLE CODES”, which claims the benefit of PCT patent application number PCT/US2011/00855 filed May 13, 2011, presents a method that is carried out by providing an image of the bar code at a point of sale for goods or services, capturing an image of the bar code, or reading it, with the camera function of a smart-phone, processing the image with the smart-phone application to form a wirelessly transmittable data file, wirelessly transmitting the data file, and wherein a specific embodiment disclosed is an authentication procedure wherein the merchant’s identity is specifically contained in a scannable code in such as way that it serves as a functional replacement to the conventional “payment by check” system, with the 2D bar code containing embedded critical data (such as payor, account information, and amount) in place of alpha-numeric printed matter as currently done though the check system.
In my application number US 14/079402, another embodiment provides for randomly generating a new 2D bar code containing a proxy identity of the payee, preferably, for each transaction, so that the payee’s true identity is protected and is only displayed through the proxy as depicted in the scannable 2D bar code.
In my application number US 14/079402, another embodiment provides for a security feature wherein the user of the smart-phone who wishes to use the disclosed payment app software maintains a “self identity” scannable 2D bar code on a separate card or personal object, which when scanned by their own smart-phone enables access to the payment app, so that if the mobile device is lost, others would be prevented from using the mobile app. In my patent application number US 14/206628 filed March 12, 2014 titled “METHODS FOR ELECTRONIC CHECK-IN USING SCANNABLE CODES”, the disclosure of which is incorporated herein by reference, an authentication method is disclosed that provides for a retail merchant displaying an image of a previously created logo simultaneously with a 2D scannable code, with the 2D scannable code including an embedded numeric geo-code corresponding to a precision GPS coordinate for that business, such that a consumer can travel to said merchant, and effect an automated “check-in” through a single scan of the 2D scannable code without manually entering additional user data or selecting from possible alternative check-in locations wherein the specific embodiment disclosed scans and decodes the numeric geo-code, compares the decoded result to the calculated GPS co-ordinates, and effects a “check-in” based on a match.
In my application number US 14/206628, another embodiment provides for an alternative “check-in” in lieu of using a numerical geodesic code, wherein a mobile communication device is provided having computer function, a GPS function, an image scanning function and an image decoding function such that a consumer can travel to said merchant, and effect a “check-in” through a single scan of the 2D scannable code, then selecting from possible alternative check-in locations based on address location, wherein the specific embodiment disclosed the user scanning the scannable 2D bar code from which the smart-phone’ s GPS function determines the location, and then compares result to the estimated GPS co-ordinates based on address, and thereby effects a “check-in” based on matching criteria.
In my application number US 14/206628, another embodiment provides for an alternative “check-in” based on a predetermined or pre-specified geo-coordinate range wherein a mobile communication device is provided having computer function, a GPS function, an image scanning function and an image decoding function, wherein the specific embodiment disclosed the user scanning the scannable 2D bar code from which the smart-phone’s GPS function determines the location, and then compares result to the calculated GPS co-ordinates, as well as, the expected result from the related business identity information, and if the calculated location is determined to be within the predetermined geo-coordinate range launches a software application, else the software application is restricted from launching.
In my application number US 14/206628, an alternative embodiment provides for automatically populating certain of the required fields during the “check-in” function, wherein a transaction application software pertaining to the business identity responds to a positive comparison between the captured GPS location information and the GPS location information in the computer memory, wherein a mobile communication device is provided having computer function, a GPS function, and an access function for accessing a computer memory containing business identity information stored in association with GPS location information for a business, appends required data to the business identity data.
In my application number US 14/206628, an alternative embodiment provides for applying an image of a bar code or other scannable image on the manufactured item itself for each item being purchased is presented, wherein the specific embodiment disclosed is for conducting an electronic payment.
In my application number US 14/206628, an alternative embodiment provides for applying an image of a bar code or other scannable image for each item being purchased from an invoice or receipt, wherein the specific embodiment disclosed is for conducting an electronic payment. In my application number US 14/206628, an alternative embodiment provides for displaying a 2D scannable code on a bank check or deposit slip, wherein the specific embodiment disclosed is for making a bank or other financial deposit.
In my application number US 14/206628, an alternative embodiment provides for a method for giving directions such that a recipient of a scannable 2D bar code “travel token” scans the bar code with the scanning function of the mobile communication device, decodes an encoded geographic location with the decoding function of the mobile communication device, and then maps the geographic location with the mapping function of the mobile communications device.
In my application number US 14/206628, an alternative embodiment provides for a method for human identification in a manner comparable to that set forth in my patent application US 13/509041, but with the addition of geographical validation elements.
In my application number US 14/206628, an alternative embodiment provides for applying a scannable 2D bar code to an item of item of paper currency, which enables for periodic consumer electronic queries concerning the item of paper currency, through scanning data from the 2D bar code, which encodes a unique serial number.
In my application number US 14/206628, an alternative embodiment provides for applying a scannable 2D bar code to a document as a method of validating a signature on a document. The method employs a user’s smart-phone or other mobile device having a GPS function. The method comprises capturing the geodesic code for the location of the smart-phone, identifying information such as the person’ s name, and document identification information, and then transmits the information to a printer which then prints out as a scannable 2D bar code encoding the information, on the document itself or a label, decal or sticker, that is then attached to the document in such as way as to independently attest to the time and a place of the person’s signature. The scannable 2D bar code is also recorded in computer memory associated with the signatory for the document and is electronically accessible to the signatory upon a scanned query being received from a third party.
In my application number US 14/206628, an alternative embodiment provides for applying a scannable 2D bar code to an electronic device as a method switching an electronic device to an opposite state in response to authentication, wherein the specific embodiments disclosed are for actuating a electro-mechanical lock and arming/disarming an alarm system. The method is carried out by transmitting a unique 2D, RF or magnetic code to a reader operatively coupled to an electronic device. The codes is read and authenticated in a computer memory device operatively associated with the reader.
In my application number US 14/206628, an alternative embodiment provides a method for programming an interactive electronic device in a native language, wherein the specific embodiments disclosed are a programmable television remote, an internet service provider’s router, and electronic appliances. The method comprises displaying a scannable 2D bar code on the interactive electronic device. The scannable 2D bar code encodes instructions for linking to a language database for programming the interactive electronic device in a selected language. The bar code is scanned with a mobile communication device and communication is established between the language database and the interactive electronic device. A programming language is then selected from a list of default languages presented in response to geodesic information transmitted from the mobile communication device or encoded in the scanned 2D bar code.
In my application number US 14/206628, an alternative embodiment provides for scanning a scannable 2D bar code to motor vehicle tag having a 2D bar code affixed thereon, which enables for periodic electronic queries concerning the vehicle and the vehicle owner, or encoding a scannable link to a database containing such information.
In my application number US 14/206628, an embodiment provides for a two- dimensional bar code having a portion of the bar code in an ink that is a different color than the remainder of the bar code to indicate bar code subject matter according to a standardized convention.
Reference is made to US Patent number US 8,198,980, Luger, titled Numeric Geodesic locator, wherein the invention is described as embodying “an input method for receiving from a user a numeric code representing a geographic destination and in a format limited solely to digits, where said format represents said geographic destination”. Specifically, such a method lends itself to representation in the form of a scannable code that yields a data string (e.g. a numeric string which in turn represents a geodesic coordinate).
Disclosure of Invention
One embodiment of the invention provides an article of manufacture comprising a computer memory device, a protective covering, and a label. The computer memory device contains computer readable data and an electronic lock to prevent access to the data without an electronic key for the lock. The protective covering is resistant to electrostatic discharge and I or EMP attack and envelopes the computer memory device. The label displays a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering.
The above-described article can be used for data delivery. A computer data delivery method comprises providing a computer memory device containing computer readable data and an electronic lock to prevent access to the data without an electronic key for the electronic lock; enveloping the computer memory device in a protective covering resistant to electrostatic discharge and EMP attack; labeling the covering and/or the computer memory device with a scannable bar code that produces the electronic key for unlocking the lock; and delivering the computer memory device with label and protective covering to a requestor of the data.
Where the recipient has been provided with a bar code reader to produce the electronic key, the data is protected against conversion and destruction.
Another embodiment of the invention provides a computerized data delivery method. According to the method, encrypted data and bar code data is received in a first user computer or television. A bar code image produced from the bar code data is displayed on a user interface display device associated with the first user computer or television. The bar code image is scanned using a scan function of a second user computer having a barcode conversion function to produce converted bar code data. The converted bar code data is received in the first user computer or television and the encrypted data is decrypted responsively to said receipt.
Where the second user computer is a mobile device in previous receipt of an app to convert the bar code data, the encrypted data can be kept secure against all but the intended recipient.
Brief Description of Drawings
The present invention may be better understood, and its numerous features and advantages made apparent to those skilled in the art by referencing the accompanying drawing.
Figure 1 depicts a standard logo.
Figure 2 depicts a visible logo integrated with a 2D scannable code.
Figure 3 depicts a manufactured coffee cup with a scannable logo.
Figure 4 is a visible logo with a depiction of an “invisible scannable code” layer added.
Figure 5 depicts the bounce flash feature for the invisible ink embodiment.
Figures 6A and 6B depict the currency embodiment of the invention.
Figure 7 depicts the electronic device embodiment of the invention.
Figure 8 depicts the remote control embodiment of the invention.
Figure 9 depicts the motorized vehicle embodiment of the invention.
Figure 10 depicts a manufactured item for consumer assembly embodiment. Figure 11 depicts how the visual cipher works.
Figure 12 is a flow chart illustrating a bar code based invoice payment method.
Figure 13 illustrates an invoice that can be used in the method of Figure 12.
Figure 14 illustrates a bar code based bank deposit method.
Figure 15 illustrates a deposit slip that can be used in the method of 14.
Figure 16 illustrates a bar code based check payment method.
Figure 17 illustrates a check that can be used in the method of Figure 16.
Figure 18 illustrates application of a bar code to a human appendage.
Figure 19 illustrates reading a bar code applied as in Figure 18.
Figure 20 illustrates a method for conducting bar code based patient management using the bar code applied and read as in Figures 18 and 19.
Figure 21 illustrates a label that can be used in a method for bar code based document mailing.
Figure 22 illustrates a method for processing mail carrying a label as in Figure 21.
Figure 23 illustrates a method for receiving mail carrying a label as in Figure 21 .
Figure 24 illustrates a method for preparing and processing a mail label using a form label as in Figure 25.
Figure 25 illustrates a form mailing label.
Figure 26 illustrates a form mailing label with postage.
Figure 27 illustrates a computerized display useful in a method of bar code based accounting.
Figure 28 illustrates a method for carrying out bar code based accounting. Figure 29 illustrates a method for carrying out a bar code based payment method.
Figure 30 illustrates a receipt that can be prepared using the method of Figure 29±
Figure 31 illustrates a method for carrying out a bar code based anonymous payment.
Figure 32 illustrates a currency for use in the method of Figure 31.
Figure 33 illustrates a front side of a gift card having a bar code.
Figure 34 illustrates a reverse side of the gift card of Figure 33.
Figure 35 illustrates a bar code based private payment method that can use card of Figs. 33 and 34.
Figure 36 illustrates a bar code based electronic shopping method.
Figure 37 illustrates a color based bar code hierarchy.
Figure 38 illustrates a portion of the hierarchy of Figure 37 in greater detail.
Figure 39 illustrates scanning a bar code as in Figure 38.
Figure 40 illustrates a color based bar code hierarchy method.
Figure 41 illustrates a bar code based door entry method.
Figure 42 illustrates a vehicle license plate useful in bar code based registration method.
Figure 43 illustrates a vehicle license plate having an attached bar code label.
Figure 44 illustrates a bar code based registration validation method for vehicles.
Figure 45 illustrates a bar code based remote control method.
Figure 46 illustrates devices that can be used in the remote control method of Figure 45. Figure 47 illustrates an identification card that can be verified in a bar code based validation method.
Figure 48 illustrates a signature that can be verified in a bar code based verification method.
Figure 49 illustrates a creation method for providing verifiable bar code based signature and cards.
Figure 50 illustrates a bar code based verification process for cards or signatures.
Figure 51 illustrates a young bar code for use in a bar code based temporal security method.
Figure 52 illustrates a middle aged bar code for use in a bar code based temporal security method.
Figure 53 illustrates an old aged bar code for use in a bar code based temporal security method.
Figure 54 illustrates a method for secure data delivery according to an embodiment of the invention.
Figure 55 illustrates a method for mailing a computer memory device within a protective covering.
Figure 56 illustrates a method for installing the components of a streaming video player into a TV or computer monitor playback device.
Figure 57 illustrates a QR Code or other scannable code 5605 being displayed on the screen for scanning by the user to begin the process of configuring the Recorder I Playback Device.
Figure 58 illustrates a QR code being displayed on the screen for user login.
Figure 59 illustrates a series of QR codes being displayed on the screen for user selection of a service provider. Figure 60 illustrates a series of QR codes being displayed on the screen for user selection of a movie download.
Figure 61 illustrates a movie menu being displayed on the screen for user selection of movie download.
Best Mode for Carrying out the Invention
Although the present invention is susceptible to different embodiments, it is to be understood that the present disclosure is to be considered as an exemplification of the principles of the invention and is not intended to limit the invention to the embodiments illustrated. For example, even though the preferred embodiments contemplated and depicted herein employ networked, GPS-enabled mobile electronic devices (e.g. smart-phones or tablets) with a camera function, the methods described herein can be accomplished using a computer with a scanning function and a hard-wired computer network.
Figure 1 depicts a standard logo design. One embodiment describes a generic embodiment of the invention which can most aptly be described as a generic “brand authentication” method. A 2D scannable code image is appended or otherwise merged into a logo or brand image to create a “scannable logo”, and recorded into a database. Figure 2 depicts a visible logo integrated with a 2D scannable code. The 2D scannable code image or portion of the image is generated according a standardized 2D bar code generating software format and both the logo/brand image and 2D scannable image bar code are printed together directly onto a personal object. In another embodiment, the 2D scannable image plus the brand or logo image (scannable logo) is first printed onto a label, sticker or decal, which is then applied to a personal object. In another embodiment, the scannable logo image is etched into a manufactured product or molded into a manufactured product. In yet another embodiment, the scannable logo is visually displayed from an electronic display monitor. Zxing, among other companies, https://code.google.eom/p/zxing has developed a source code library for generating 2D bar codes that can be modified and be adapted to a wide range 2D bar code configurations. As embodied, a trusted registrar (such as a bank, quasi-govemment agency, or non-profit organization) or manufacturer would assume the stewardship of maintaining the database of 2D bar codes and corresponding logo or brand databases. Packaging materials and shipping containers for products logo/brand+2D bar code would also contain the same 2D bar code or an otherwise corresponding logo/brand+2D bar code such that the manufactured product is matched to the shipping documents, sales receipts, invoice, etc. As embodied herein, different types of user/validators (customs agents, shippers, retailers, consumers, the database registrar, manufacturer) would have different features of the brand authentication software or even different software versions depending on authentication access or the specific validation step(s) to be performed. Earlier embodiments of merging an image with a 2D matrix data code (e.g. 2D bar code) are described in my patent applications.
For example, in one embodiment presented in this application the manufacturer, having downloaded the mobile software application which can determine the user’s location through the smart-phone’s GPS function, would scan the logo/brand+2D (hereafter “scannable logo”) bar code at the manufacturing site. This would append the logo image to the generated scannable 2D bar code, time of scan, to a database that contains registration information for the brand or logo, the information about the business, and the manufacturing location to confirm it is a recognized manufacturing location. In the preferred embodiment, the GPS information would be stored as a numerical string to form a numerical geodesic code as described in Luger to form a unique manufacturing geo-code entry. Previously, in my patent application US 14/206628, I described how the authentication process works as a “check-in” method. In that embodiment, the user can travels to a local coffee shop, where the coffee shop merchant displays their logo at the front door of their retail shop which is comprised of 1. Their business graphical logo, image, or brand, plus 2. a 2D scannable bar code in which the merchant personally (or a trusted registrar) has caused to be previously embedded a scannable code which contains: the merchant’s identify information, and a numerical geodesic code as described in Luger. When the consumer user arrives at the coffee shop, the consumer user scans the merchant’s displayed 2D bar code containing the merchant-specific geodesic code. The scan of the 2D bar code causes the user’s mobile device to capture the user’s location for purposes of an automated “check-in” to the software which is connected to a social media app such as “Facebook” or “Linkedln” for the benefit of consumers. Figure 3 depicts a manufactured coffee cup with a scannable logo.
However, the current brand authentication embodiment expands this functionality to perform brand authentication from the point of manufacture forward. Once the logo+2D bar code is scanned at the manufacturer’s location, the mobile device software creates open fields for entry of say: 1. a local government agency database linking the logo+2D bar code to the owner information, which in turn linked to say the city’s local health department and the city’s business permit department to be sure that the given location is cleared by the health department and has paid for the business permits; 2. the manufacturing companies database to be sure that the registered mark belongs to a properly authorized franchisee, and is not a “knockoff’ store pirating the corporate identity at an undisclosed location such as a counter-fit “McDonalds”; 3. a trusted logo/brand registry similar to that of the trademark database maintained by the USPTO to be sure that the presented brand is in fact a registered brand. 4. the shipping company database to enable a scan at the point of shipping, and periodically to the point of destination to the final destination; 5. the customs agency responsible for tracking incoming manufactured items; 6. the wholesale company responsible for storing the items prior to shipping to the distributor or retail location; 7. the retail location responsible for the using the manufactured item in connection with services provided to consumers; 8. the software company responsible for printing the receipt or invoice, includes a scannable code matched to the manufactured products UPC or SKU.
Because the scan containing the geodesic code (a de-facto geo-phone number) will yield exactly one unique business location, links to multiple government agencies and corporations to validate the unique brand-business geo-location can be considered a highly reliable nexus. Although the method can be practiced where the logo and 2D bar codes were both displayed using human visible images, in the preferred embodiment, the logo/ brand image and consumer 2D bar codes are visually displayed using light waves in the human visible range, whereas for government agencies, the corporate team, and/or the trusted registrar the scannable codes would be “displayed” using invisible 2D bar codes that can only be machine read by the mobile device with appropriate optical sensors, and software. The consumer 2D bar codes would most likely be visible. In my patent US 5,878,155, 1 describe with particularity one embodiment of the invisible ink marking method which employs using “INVISIBLE SKIN MARKING INK #743 from Sirchie Finger Print Laboratories. Herein, invisible ink would be printed onto a white space area at or near the visually displayed logo or brand. In another visual presentation, the 2D bar code is presented in the infrared frequencies at or near the visually displayed logo, or even superimposed over the logo in functional “layers”. Patents US 6,221,270 titled Pigment Particles for Invisible Marking Applications, US 5,138,913 titled Security Document and Method Using Invisible Coded Marks, and 6,174,400 titled Near Infrared Florescent Security Transfer Printing and Marking Ribbons describe in depth the process for producing scan-ready markings which fluoresce in various substrate layers representing the preferred embodiment here. It should be understood, that by using different substrates that fluoresce on different wavelengths, different interested parties will each have a 2D scannable code that is only visible to their mobile scanning device, which is the preferred method of practicing this embodiment. Figure 4 is a visible logo with a depiction of an “invisible scannable code” layer added. Although this embodiment can be practiced in such a way that the mobile device scans using natural light conditions, a strongly desired enhancement employs a software selectable “bounce flash” such that mobile device is configured to emit an invisible light flash just prior to and during the image capture “scan” function such that the invisible substrates reflect their brightest practical illumination. Figure 5 depicts the bounce flash feature for the invisible ink embodiment.
The advantage here is that the 2D scannable codes can be captured under all light conditions independent of the actual natural light conditions, by using an infrared substrate combined with a “flash” attached or embedded into the smart-phone camera either as a replacement or in addition to the current flash used on mobile devices. Where the security concerns are high, the specific “flash” frequency would be kept secret and possibly changed periodically. A preferred security feature in this embodiment would provide that the 2D scannable code would be valid only for a specific time period, either predetermined at the time of the creation of the logo/brand and embedded in the 2D scannable code itself or maintained and selectable through the software in the device which can be “time stamped” at the time of each scan. For example, suppose the registered trademark expired or was otherwise invalid due to non-payment of fees based on a stated expiration period, a scan of the invisible mark by an authorized agent would reveal this anomaly. Likewise, for the expiration of the businesses business license, alcohol license or health permit would be revealed by such a scan. A trusted registrar or franchisor may wish to have a logo expiration period such that if a franchise payment was not timely paid, a logo scan (with the underlying applicable invisible 2D bar code) would reveal this event. Even the software developer for a business specific mobile app may wish to have a specific invisible scannable code frequency to tightly integrate their app with their client’s business needs to ensure the mobile device’s software is updated or with automated error reporting where a scan error occurs. The manufacturer of the handset (Samsung, LG, SONY and the like) can have an invisible scannable code to collect metrics on the handset scan errors, facilitate firmware updates and the like. The merchant also can have a unique embedded scannable code (albeit on a visible light frequency) so as to facilitate a positive consumer shopping/buying experience. Multiple substrates with multiple “invisible bar codes” are an obvious adaptation of this embodiment. A preferred feature of this embodiment would utilize a bar code image cipher (hashing the image) in combination with bit data channel encryption (128-2048 bits) across a high speed connection such as 3G, 4G, Wi-Max, or Wi-Fi. An example of preferred embodiment of ciphering the 2D bar code image would entail having the mobile device software scan a 2D bar code electronically indexed to a trusted registrar with an master index of all invisible scannable codes contained within a given logo/brand and the appropriate decryption matrix. Figure 11 depicts how the visual cipher works. With the 2D bar code in mind containing 64 squares x 64 squares, the trusted registrar can generate an “open” non-cyphered 2D bar code that can be read by any standard 2D bar code reading software, and then move the sub-squares in an arbitrary pattern such that they were not readable except by virtue of the trusted registrar’s software to move the sub-squares back into the “readable” alignment for the various “end users”. While the methods described are depicted with 2D bar code embodiments, the information for brand authentication can be contained in a ID bar code, 3d bar code, or any other type of image that when scanned would yield a numeric data string, and all embodiments herein are not intended to be limited to only scannable 2D bar code images. For example, with the 3D bar codes, imagine a “Rubik’s Cube” where the sub-squares are rotated with software from “readable” positions to “non-readable” positions by operation of the software before the 3D bar code image is rendered (either printed or virtually). The steps are reversed by the software to make the 3D bar code image readable — much the same as making each side of a Rubik’s Cube appear solid. Though not presented here, other encryption strategies would reasonably be employed as part of practicing this embodiment, but are preferred to be kept as trade secrets rather than publicly disclosed. A preferred feature of the “check-in” embodiment feature as described in my provisional patent application 61/852,108 on pages 25-30 would include a “shopping cart”. (See Endnote 1) As noted in patent application US 14/206628, the scan of the 2D bar code connected to the merchant and specific merchant location would convert the user’s smart-phone into a “digital shopping cart” that is digitally displayed on the smart-phone or tablet phone, and integrated into the physical shopping experience custom tailored to the type of merchant or business visited. Once the merchant’s unique 2D brand/logo scannable code is scanned, the consumer user can then receive merchant generated “favors” such as: loyalty discounts, promotions, product information, web site information, advertising, etc. This embodiment (with embedded geodesic codes) connects the consumer user to one unique merchant identity and thus enables the content such as loyalty discounts, promotions, and shopping enhancements to be tailored to one specific consumer upon check-in. Preferred features in this embodiment would include: 1. An automated system to “handshake” with incoming consumer’s smart-phone triggered by the “check-in” scan, if a first time store visitor, which can either through Wi-Fi, Bluetooth, ultrasonic listening through the smart-phone’s microphone, or even infra-red. 2. Once the handshake is cued, an opt-in popup is “triggered” so that the user elects (or declines) to participate and electronically connect to the given merchant, this would enable the process of going from “checkin” to the shopping experience in a seamless manner. 3. Database retention of the consumer user’ s profile, shopping experience preferences, visits, loyalty points, and the like. 4. Integrated scanning of Universal Product Codes (typically ID scannable codes) to enable consumers to gain information about products. 5. In-store shopping/browsing app either written in native code or written to support mobile interaction using the HTML5 methodology. 6. Ability to select items and add to virtual shopping cart while simultaneously adding to a physical shopping cart, such that when an item is added to a physical shopping cart it is also electronically noted on the virtual shopping cart. 7. Ability to instantly download coupons, or other promotional bonuses such as free songs, photos, etc. during the shopping experience. In the case of the coffee shop example, the “check-in” causes the coffee shop “menu” to appear in the mobile device’s browser window and enables the user to select the type of coffee he or she wishes, and any other treats. Since this user frequents this coffee shop, a 10% loyalty bonus is given as a scannable coupon, which the user downloads, and displays to the barista at the point of sale terminal who scans it with her scanning device as part of the point of sale payment process. 8. Automated help and informational screens would “pop up” and enable real time and/or contextual help should the user have questions or concerns about a particular product or service. This can include video chat with a product or store representative, either locally or remotely.
As I previously noted in US 14/206628, the brand/logo authentication facilitates a comprehensive “manufacturer to merchant inventory control system”. This feature is depicted by considering accounting and inventory control side of the coffee shop merchant example, where the bottom side of the coffee cup contains a 2D bar code that, when scanned by the merchant (or consumer if self-checkout is permitted), notifies the coffee cup manufacturer or vendor that the one inventory item (e.g. the cup) has been sold or otherwise used. However, the embodiment herein adds the feature of a brand registry that includes a “check-in” at the cup manufacturing facility which creates a database table with a date and geo-origin of manufacture entry, with updated entries, logged by re-scan at various checkpoints as the manufactured cup is boxed and shipped to ultimately reach the specific retail location. In this instance, say the cup is shipped from China. The cup has a 2D bar code on the bottom of the cup, a matched 2D bar code on the packing materials, and even matching the shipping documents. The manufacturer scans the 2D bar codes to log the items out for shipping, and the shipping company scans the matching codes upon receipt and re-delivery to a wholesale company, who follows the same procedure, U.S. Customs (or other government’s customs) scans the shipping docs, and can scan the packaging down the specific cups on a test basis to confirm the quantity and authenticity of the shipment. The wholesale company delivers to the regional distributor, who in turn delivers the cups to the specific retail store. A store manager, can then scan the bottom of the cup and view the “pedigree” of the shipment, thereby confirming the date, time, and location of each step from the manufacturer of origin to his retail shop. Law enforcement personnel can scan the cup bottoms, and compare the shipping pedigree to the trusted brand/logo registrar records to confirm the logo/branded item’s manufacturing origin for reasonableness. As I also describe in patent application US 14/206628, this embodiment or the other embodiments herein can include bar codes that rapidly fade (minutes or hours) to prevent reusing the same cups at a later time.
As I describe in patent application US 14/206628, a preferred feature further included in this embodiment would link the inventory control 2D scannable code to a database that includes printing the unique logo/brand+2D manufacturer of origin scannable code on the check out receipt as described in PPA 61/852, 108 on pages 13-15. See Endnote 2. As described in patent application US 14/206628 this feature would enable the consumer to automatically record and categorize the type of expense, based on predetermined criteria such that the 2D bar code contains a suggested expense type considering whether a given expense is for business or personal consumption, in the form of an appendable drop down list or pop-up input box. However, the embodiment here goes further in that a scan of the 2D bar code can enable the consumer to trace the items pedigree from manufacturer of origin to the retail store to ensure the logo+2D bar code seemed reasonable. Moreover, in case of adulteration of a manufactured item, the consumer can trace an item’s movements. Additionally, counter-fit items can be rather quickly spotted as the “pedigree” wouldn’t match the actual events or can be non-existent.
As I describe in patent application US 14/206628, the “check-in” embodiment includes an “integrated payment method” as described in PCT/US2011/00855 wherein the consumer scans a label stick or even the bottom of the cup itself containing a 2D bar code to pay for the coffee (which contains the merchant identity information with or without the geodesic code), enters the amount (or the amount is embedded in the 2D bar code), and the consumer’s bank “pushes” the money to the merchant’s account. Variations of this embodiment feature, which can enhance systems of internal control for the merchant, can include printing the 2D bar code on the register receipt which is then scanned by the consumer as described in PPA 61/852,108 on pages 15-17 (See Endnote 4) and the consumer’s bank once again “pushes” the money to the merchant’s account, or printing the 2D bar code on an invoice which is then scanned by the consumer as described in PPA 61/852,108 on pages 1-3 (See Endnote 5) and “pushed” the same way, or even paying the merchant with a check as described in PPA 61/852,108 pages 6-8, wherein consumer’s personal information, account information, and bank information are contained on a preprinted check (See Endnote 6). As part of the feature to accept a check payment, the merchant prints their own information on the check (preventing transaction re-use), the consumer confirms the transaction information such as check number and payment amount on their mobile device display, and the consumer’s bank once again “pushes” the money. A key advantage of this type of integrated payment feature (with inclusion of geodesic code) is that “out of area” transactions can be more closely scrutinized, and consumer buying trends can be tracked with great precision.
As I describe in patent application US 14/206628, in an alternative embodiment depicting “turn by turn directions”, the merchant can, in advance, cause a 2D bar code to be sent to the user for the purposes of navigating in the first instance to the merchant’s location. This embodiment contemplates the merchant sending the 2D bar code to the user and the user taking a “digital snapshot” of the 2D bar code previously sent by the merchant, which would contain the numeric geodesic code, the software would determine user’s current location through currently used GPS methodology, then resolving the scanned geodesic code containing the merchant’ s corresponding geo-location information, generate exact tum-by-tum directions to the merchant’ s location. The 2D bar code can either be sent via postcard with an attached label, sticker, temporary tattoo, or can be sent electronically to the user’s email and then scanned by the user’s smart-phone from an electronic screen display on a desktop, laptop, or tablet computer. While a “virtual” 2D bar code can be sent to the user’ s mobile device directly, and scanned virtually, or even the raw geodesic code number emailed or texted to the user so that it can be entered manually, or populated from a linked database, neither would be the preferred embodiment as depicted herein.
As I describe in patent application US 14/206628, in a second embodiment (as described in PPA 61/852,108 on pages 10-13, (see Endnote 7), a “post card” embodiment is depicted by the example of the merchant desires to send out a post card mailing to the user’s home address which, in addition to the advertising content, contains a scannable 2D bar code printed on the card, or a label, or sticker that includes the merchant’s name, address, and a corresponding geodesic code. Assuming the consumer user wishes to visit the merchant’ s store, he or she scans the 2D bar code that contains the merchant’s contact information, including the geodesic code. As in the generic example above, the user then obtains turn-by- tum directions to the merchant’s store. But in this case, the merchant’s contact information (which includes the geodesic code) can be stored in the user’s phone “directory” as a numeric string prior to traveling to the merchant’s store. Though the geodesic code can be simply appended to the existing “directory”, a more eloquent solution is to have a “geo-directory” such that the directory contains merchant’s in a specified geographic area, which changes depending on the user’s location (most likely embodied with a region code as described in Luger). Such a directory can be pre-populated with merchant’s contact/geo-contact information linked to the specified geo-numeric region code or it can be embodied such that merchants are populated when scanned or a combination of both. In the preferred embodiment, sufficient consumer identification information is embedded in the 2D bar code so that when scanned, the merchant receives metric data identifying when the consumer viewed the post card. This embodiment can include having the consumer’s device register the consumer’s geo-location when the code is scanned, but this step can also be eliminated to protect consumer privacy.
As I further describe in patent application US 14/206628, the 2nd “post card” embodiment would provide that when the scannable 2D bar code (containing the geodesic code) is scanned in proximity to the local post office or postal box just prior to depositing in the postal box, wherein the merchant’ s smart-phone contains software that is linked to the post office database, and follows the delivery processing from the starting post office or deposit into the box to where the item is initially deposited through to the ending post office — where the posted item is notated as “out for delivery” to the consumer recipient. Another preferred feature of this embodiment would once again use the “check-in” feature described above, wherein the post office patron scans the post office’s 2D USPS merchant code, which then triggers the post office shopping experience to occur on the patron’s smart-phone. Once the check-in occurred, additional preferred features can include: 1. An automated pop up to enable the user to purchase stamps at an Automated Postal Center (or similar kiosk) and pay for the stamps using their smart-phone. 2. An integrated media pouch to enable the merchant to send micro digital media such and SDS card with the post card in instances where digital delivery can replace physical pages. 3. Step by step directions to help the postal patron deposit the package in such a way to facilitate tracking as described herein.
As I further describe in patent application US 14/206628, in an alternative of the preferred 2nd “post card” embodiment, the embedded scannable 2D bar code itself functions as an onsite printed postage stamp which contains a unique serial numbered sequence, a stamp denomination (or exemption flag if the value is perpetual), and a point of origin geodesic code. This 2D bar-coded “stamp” enables anonymous tracking of the item based on the stamp’s unique serial number alone which facilitates specific tracking while keeping the specific identity of the sender and receiver anonymous to preserve privacy. In this embodiment, the package carrier, would have to have scanning software on a tablet or other mobile device to be able to scan the item at each sorting/and handling point. Such an embodiment can be implemented by the postal or other common carrier in such a way as to enable anonymous “lookup” of the postcard/letter/or packages tracking by the unique serial number. This embodiment is similar to that practiced by the U.S. Postal Service currently, wherein scannable codes are used, except that in the later case the scan is not linked to a calculated geospatial location, but rather the 2D bar code is linked to a “facility” address recorded in an address table. The advantage of the embodiment presented here is that a GPS calculated location makes it easy to adapt “ad-hoc” mail processing facilities with the user of simple smart-phones or tablet mobile devices, and eliminates frequent updating and facility locations, open, close or change. Though not considered a preferred embodiment, the scannable 2D bar code can omit the origination geodesic code such that the “location” was calculated using GPS methods at each point of scan, but generating a physical stamp at the origin location better facilitates the “inventory tracking” process as described above for the coffee cup. A preferred embodiment feature (where privacy was less critical) would (in addition to the unique serial number and point of origin geodesic code) include a unique identifier in the 2D scannable code containing the recipient’s geodesic code corresponding to their physical address (with or without additional addressee information embedded therein). With this embodiment, the “delivery” function can be automated such that when the delivery person physically arrives at the recipient’s location, the software in the smartphone, or mobile table device records a delivery. Though not considered a preferred embodiment, a recipient can require the delivery person to also “check-in” by scanning a 2D bar code at the residential location (as would be done where they check-in at a merchant location) where additional delivery verification is desired.
As I further describe in patent application US 14/206628, in a third embodiment (as described in PPA 61/852,108 on pages 10-13, see Endnote 7), a “hospital” embodiment is depicted to illustrate the utility of the invention in an institutional setting where the resident population needs to be more closely monitored. While all the features of the previous preferred embodiments would likely be incorporated into this embodiment, where this embodiment is distinguishable is that here an additional step is added to the “check-in”. Specifically, the hospital (or other institution) provides to the patient, visitor, or employee an adhesive sticker, label, or temporary tattoo which contains an image of a scannable 2D bar code that is then applied to a person’s appendage or a personal object. Like the method of human identification described in Heeter US 8,483,448, the disclosure of which is incorporated by reference herein, this embodiment is “. . .a method of human identification comprising the steps of providing identity information for a human in an electronic database, providing identifying information for a plurality of marks in an electronic database, each mark being associated with the indentifying information for one person in a validating way for a specific time, and providing a means for transferring marks which convey the indentifying information to a scanner onto their person or a personal object.”
The hospital maintains the visitor identity database, obtained at check-in and entered manually or captured when the person performed a “check-in”, as was done in the coffee shop. The hospital then prints out the decal or sticker (or more preferably an adhesive dermal patch), which is then applied to the person for use during the time in which the person is at the hospital (See Endnote 15). This embodiment differs from US 8,483,448 in that it adds the geodesic code information to the mark, such that when scans either by the user’s smart-phone or tablet computer or by a smart-phone or tablet computer under the control of the hospital or other institution, the device reports back the users location in addition to the other information. A preferred feature of this embodiment provides that the dermal patch would change color upon removal from the patient to prevent accidental removal or tampering. The changing color security feature would make the dermal patch suitable for medication control as an additional function in that dispensation of patient medications would require scanning the patch each time to validate the person’s identity within the facility. Another preferred feature is that when the person left a specified geographic area as pre-defined within the geodesic code software functions, the code would not function or register when scanned, such that any internal codes used within the scannable codes cannot be decoded outside the geographic area in the event that such codes were scanned by devices outside the control of the hospital. Like in the generic embodiment, this embodiment utilizes a bar code image cipher (hashing the image) in combination with bit data channel encryption (128-2048 bits) across a high speed connection such as 3G, 4G, Wi-Max, or Wi-Fi, the relatively low bandwidth requirements of this check-in method would permit using a “reverse hash” with or without image cipher across SMS band (with or without band encryption) to scan and send the scanned geo-numeric information in remote rural areas or in case of a broad failure of other available high speed internet channels. While the methods described are depicted with 2D bar code embodiments, the requisite geo-numeric information can be contained in a ID bar code, 3d bar code, or any other type of image that when scanned yields a numeric data string, and all embodiments herein are not intended to be limited to only scannable 2D bar code images. Moreover, though depicted using visible scannable images, the scannable images can be comprised of light frequencies within human optical ranges, outside human optical ranges or a combination of both. Like in the merchant example above, preferred features in this embodiment include a “patient management cart” where all services received by the patient would be linked to the specific bar code “patient token”, and would include the integrated inventory management, receipt tracking and integrated payment methods.
As I further describe in patent application US 14/206628, in a fourth embodiment and as described in PPA 61/852,108 on pages 17-25, an “anonymous payment” embodiment is depicted to illustrate the utility of the invention to facilitate anonymous payments (See Endnote 8). As previously described above where the embedded scannable 2D bar code functions as an onsite printed postage stamp which contains a unique serial numbered sequence, a stamp denomination (or exemption flag if the value is perpetual), and a point of origin geodesic code. However, this embodiment functions the same for bearer stamps, money, or gift cards (another bearer payment method). As with stamps, the money or gift card contains a unique serial numbered sequence, a denomination, and a point of origin geodesic code. The intent of this method is not to facilitate real time tracking, but rather “check point” tracking when the stamp, money or gift card comes into control of a bank teller or ATM, merchant that does bill validation, automated vending machine or the like. The merchant, ATM, or other checkpoint relies on the authentication of the physical specimen (money, stamp or gift card) rather than requiring the person to self identify. Though a merchant who is suspicious of a stamp, bill or gift card can require additional identification, it is not the preferred method. The 2D bar coded bill, stamp, or gift card enables anonymous tracking of the item based on the item’s unique serial number alone which facilitates specific tracking while keeping the specific identity of the parties anonymous to preserve privacy. In this embodiment, the merchant, ATM, teller, or other trusted handler would have to have scanning software on the ATM, desktop with scanning wand, tablet or other mobile device to be able to scan the item at each handling point. Such an embodiment can be implemented by the treasury department, gift card issuer, or postal service to facilitate anonymous “lookup” of the item to rule our forgeries (e.g. duplicates, or out of the correct sequence, etc). The advantage to this embodiment is that is enables voluminous, yet quasi-anonymous metrics of ATM use, stamp purchases, gift card use, and the like, connected to the calculated geospatial location. Though not considered the preferred embodiment, the scannable 2D bar code can omit the origination geodesic code such that the “location” is calculated using GPS methods at each end-point scan, but retaining a physical origin location better facilitates the “inventory tracking” process as described above for the coffee cup. In this case, when money is delivered to the bank, the geodesic codes can be scanned, to ensure that all actually arrived at its correct destination. The embodiment presented offers a more reliable method of currency control because software for scanning currency, gift cards or stamps can be developed for both treasury agencies and the consumers to facilitate comonitoring of currency, with levels of access being provided as appropriate, since scanning the bar code can will yield a single unique data string. One example of a metric available to the public would be to a bill’s movement history to give the recipient reassurance that the bill in question is “in circulation” as depicted by the website “www.whereisgeorge.com”. Likewise, “inventory” management of the distribution of bills is facilitated, and monitored in the same fashion as described in the coffee cup example embodiment. A preferred feature of this embodiment would be to facilitate remote deposits through automated optical validation of bills the same way that checks can be scanned and deposited by banks currently.
Figure 6 depicts the currency embodiment of the invention. The embodiment presented in this application depicts currency authentication prior to circulation, whereby an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a physical specimen of the currency or stamp to create a “scannable currency”, which contains encoded identity data for the currency or stamp, encoded visual identification characteristics for the currency or stamp denomination, and encoded GPS data corresponding to government printing office location for a printed item. The image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information is decoded with the image decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information matching the address coordinates or geocoordinates of a treasury facility, correspondent banking facility, wholesale facility, distribution facility or retail banking location. If the decoded information is a geo- proximal match, an authentication application is launched in the computer function of the mobile communication device. The authentication application has certain required fields, which include time and date that the mobile device scans the scannable currency to effect authentication, which are automatically populated each time the authentication application is launched. Additionally, when the authentication application is launched subsequent to the initial launch at the government printing facility and if the decoded identity data for the logo paper currency or stamps, decoded visual identification characteristics for the currency or stamp denominations, and decoded GPS data are successfully matched against a registry database for validity, then a tracing log is displayed on the mobile device tracing items transit history from the manufacturing or assembly location thru to the retail bank which ultimately receives the cash.
As I further describe in patent application US 14/206628, in a fifth embodiment (as described in PPA 61/852,108 on pages 4-6, a “bank deposit” embodiment is depicted to illustrate the utility of the invention to make a deposit at a financial institution (See Endnote 9). In this embodiment, the deposit ticket is comprised of a reusable “card” that has a 2D scannable code printed on the card itself, or a label, sticker or decal applied to the card containing a scannable 2D bar code. Contained within the 2D scannable bar code is the customer’s bank account number, the bank’s routing number. As a preferred feature of this embodiment, a geodesic code that covers the user’s home territory, such as city, county or state such that deposits made outside the user’s home area can be more closely monitored and under certain adverse conditions prevented. Additionally within this embodiment, cash with a 2D bar code, can be deposited through application of this method such that the user scanned the bill’s 2D bar code, then the deposit card 2D bar code, to affect a remote cash deposit through the user’s smart-phone. The geodesic code feature on both the deposit card and bills ensure improved internal control as more fully discussed in the forth embodiment above. As I further describe in patent application US 14/206628, in a sixth embodiment as described in PPA 61/852,108 on pages 34-36, a “signature validation” embodiment is depicted to illustrate the utility of the invention to validate document execution (See Endnote 10). In this embodiment, a user’s identity has been previously validated in such a way as to be linked to their smart-phone or other mobile device. When wishing to effect a signature validation on a document, the user’s smartphone or other mobile device, captures the geodesic code, identifying information such as the person’s name, device identification information, and then transmits said information to a printer which then prints out as a scannable 2D bar code on the document itself or a label, decal or sticker, that is then attached to the document in such as way as to independently attest to the time and a place of the person’ s signature. In this embodiment, the person can also produce a scannable 2D embedded code in for or a graphics file such as JPG or PNG that can be scanned in an electronic document the same as from a paper document. Such preferred features of this embodiment would include a trusted 3d party validating party such as a bank, government agency or the like to verify the person’s identity, image, signature and the like, and include such information in a database that is accessible by the application either directly or through a proxy identity known only to the validator and the validatee. Photo images would be encrypted and scrambled by cipher prior to electronic transmission ideally. Ideally, the embodiment includes one or more user validation steps to ensure they were indenting to affect a signature on a given document, and if used in conjunction with a notary, the notary would likewise have one or more validation steps to effect the attest function. Finally, it would preferred that the app kept a log accessible to the user at least by date order, along with one or more other indexing methods to recall specific documents executed. Persons performing notary services would have similar but separate index logs, but for all persons who received attest services. Email can be used to confirm the process. The steps herein would not preclude independent verification of a government issued ID as a validation step. As I further describe in patent application US 14/206628, in seventh embodiment and the embodiments which follows describe a “check-in” embodiment connected a hardware device or other appliance. In this embodiment as described in PPA 61/852,108 on pages 30-32 depicts a “home security embodiment” where a user gains access to enter a home by scanning a 2D bar code displayed either electronically or on a sticker, label, decal or the like near the entrance to the home, which contains a unique code and/or identity information, and/or instructions for the device that when scanned cause the home system to disarm, record the device’s hardware profile information, such and SIM ID or chip ID etc to authenticate the device, and calculate the time/date of the scan so as to keep an access log. (See Endnote 11). This embodiment facilitates a low cost method of generating an access key, such as in a hotel environment where there is high occupant turnover and a desire to generate new “keys”. In this embodiment, it can operate either in such a way that the entrance contains a scanner that scans the personal object containing the 2D bar code or it can be a downloadable app, that is linked in such a way that when in proximity to the access point, the user’s mobile device sends a proprietary electronic signal to a network, that in turn electronically unlocks the door. In this embodiment, the preferred embodiment employs a geodesic code in a similar fashion to the hospital embodiment such that the user’s “key” software would only function when proximate to the linked geodesic code, with said code ideally being independently validated by the user’s device. This embodiment is not limited to disarming the access or security system, but would likewise arm such a system. This embodiment is not limited to home access, but is also be well suited to an secure entry system for automobiles or other mobile devices such that the “key” can be sent electronically. In this embodiment, guest access can be granted and restricted at a very low per user cost.
As I further describe in patent application US 14/206628, in the eighth embodiment as described in PPA 61/852,108 on pages 33-34, an “electronic remote control/setup” embodiment is depicted to illustrate the utility of the invention to serve as an electronic remote control platform (See Endnote 12). In this embodiment, the user scans a 2D scannable code displayed from an appliance such as a television, mobile ISP device, automobile, desktop software, or other configurable device. Contained in the 2D scannable code is the “setup” information for the device, plus as geodesic code that is linked to a database to provide the correct custom language for the device. For example, in the case of the television, scanning the 2D scannable code would identify the model number, and the user would then download the a virtual remote control interface correctly configured for his particular television using the predominant language of his geographic location by default. A validation step would preferably be included to ensure that the default based on geography was the desired language configuration. Ideally, the software would ensure that any connectable DVD or other types of “player” interfaces would play in the correct language based on the remote preferences. Some advantages to this embodiment are that multiple remotes can be generated for guests, family members etc as needed that are custom configured to the personal preferences of the user and the specific settings of the device. Another example illustrating this embodiment is illustrated by the example of remote ISP login, where the user scans a scannable 2D bar code containing access information about the ISP, including ideally the correct language for the user interface based on the geodesic code. A preferred feature in this embodiment would include a hardware identification feature so that the scanned 2D bar code would include information about the device such that any driver updates, patches, security updates ,etc can be downloaded and applied based on the devices self reporting. And additional validation step can include hardware polling to verify the device hardware is in fact as reported; however, hardware polling is much slower which makes the scanned reporting the preferred approach in most instances. Some additional features can include Bluetooth, infrared connectivity to enable close proximity communications. The 2D bar codes as in other embodiments herein can be either displayed electronically or by label, sticker or decal. User manuals in digital form would be a preferred feature of this embodiment. As I further describe in patent application US 14/206628, in the ninth embodiment as described in PPA 61/852,108 on pages 32-33, a “vehicle identification and management system” embodiment is depicted to illustrate the utility of the invention to serve facilitate the social management of vehicles (See Endnote 13). In this embodiment, in place of an alpha-numeric license tag, a 2D bar code is used that contains vehicle identification information plus a geodesic code, such that the device can be tracked from start-point to end-point with 100% accuracy. A preferred feature of this embodiment would include the feature that scanning the 2D bar code calculate the specific start point geodesic code at the trip beginning, and stop point geodesic code at the end of the trip such exact mileage is calculated. Using this embodiment would facilitate efficient tracking, mileage accounting, and such for taxis and other commercial vehicles without the need to buy expensive “meters” like in a taxi. Further uses would include insurance tracking, support for road taxes based on actual travel. Preferably, this embodiment would be combined with the methods described in US application number 14/079402, the disclosure of which is incorporated by reference herein, such that the scan would include an integrated payment method or any one of the payment embodiments described in this application.
Figure 7 depicts an electronic device embodiment of the invention. The embodiment presented in this application depicts electronic device authentication prior to public use/circulation, whereby the manufactured item or assembled item is a electronic network packet switching, routing device, or other internet service provider modem device, whereby an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, encoded electronic device model characteristics, and encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item. Preferably, this embodiment includes an encoded specific time period, only during which the image comprising the scannable logo can be displayed from a manufactured or assembled item, in such as way that it can be scanned for the first time by a mobile device. The image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, encoded electronic device model characteristics, and the encoded GPS location information is decoded with the image decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device. The authentication application has certain required fields, which include time and date that the mobile device scans the scannable logo to effect authentication, which are automatically populated each time the authentication application is launched. Additionally, when the authentication application is initially launched at the manufacturing facility, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, electronic device model characteristics, and decoded GPS data are successfully matched against a registry database for validity, an inventory control log is created and/or incremented. Further, native programming language “firmware” is downloaded in response to successful initial authentication based on the decoded model number characteristics. User guides, software and other collateral materials to the electronic device are electronically linked, and a corresponding scannable logo can be applied to collateral materials prior to shipping the electronic device. Preferably, the scannable logo is affixed both to the chassis of the electronic device, and displayed through a visual display when the electronic device is activated. As with other embodiments, a tracing log is created as the electronic device is shipped from the manufacturing facility to the ultimate retailer, who sells the item to the consumer. The consumer, can also scan the scannable logo, and the electronic device is “automatically registered” by capturing the consumer’s geo-location information through the mobile computing devices GPS function along with other consumer identification data.
Figure 8 depicts the remote control embodiment of the invention. The embodiment presented in this application describes the interactive process for the remote appliance control from the point of manufacture to the point of distribution to the retail consumer, whereby the electronically deliverable content is a software application that functions as a electronic appliance remote control, whereby an image of a 2D bar code or other scannable image which yields a data string is presented together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, encoded electronic device model characteristics, and encoded GPS data corresponding to a distribution region location for a digitally deliverable content. The image is scanned with the image scanning function of the mobile communication device and the logo brand owner identity data, the visually identifying characteristics of the scannable logo, encoded electronic device model characteristics, and the encoded GPS location information is decoded with the image decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. Based on the decoded GPS information, as compared to the most probable languages of the region, corresponding instructions are displayed in the most probable written language associated with the given geo-location area and subject to use validation are saved on the user’s local device. Additionally, when the authentication application is initially launched at the consumer’s home, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, electronic device model characteristics, and decoded GPS data are successfully matched against a manufacturer’s registry database for validity, the “remote control” is automatically registered to that device for a certain model appliance, and a manufacturer’ s control log is created and/or incremented. Further, native programming language “firmware” is downloaded in response to successful consumer authentication based on the decoded model number characteristics. User guides, software and other collateral materials to the electronic device are electronically linked, and a corresponding scannable logo can be applied to collateral materials prior to shipping the electronic device. Preferably, the scannable logo is affixed both to the chassis of the electronic device, and displayed through a visual display when the electronic device is activated. The consumer, can also scan the scannable logo, and the electronic device is “automatically registered” by capturing the consumer’s geo-location information through the mobile computing devices GPS function along with other consumer identification data. Preferably, the logo identity data would include a serial number for the electronic device so connected to the virtual “remote control”.
Figure 9 depicts the motorized vehicle embodiment of the invention. Tn the embodiment presented currently in this application relates to the authentication steps with respect to motor vehicles which occur between the manufacture, and delivery to the consumer, whereby the manufactured item is a motor vehicle or premanufactured home, whereby an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, encoded Vehicle Identification Number and other model characteristics, and encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item. Preferably, this embodiment includes an encoded specific time period, only during which the image comprising the scannable logo can be displayed from a manufactured or assembled item, in such as way that it can be scanned for the first time by a mobile device. The image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, encoded electronic device model characteristics, and the encoded GPS location information is decoded with the image decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device. The authentication application has certain required fields, which include time and date that the mobile device scans the scannable logo to effect authentication, which are automatically populated each time the authentication application is launched. Additionally, when the authentication application is initially launched at the manufacturing facility, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, decoded Vehicle Identification Number, other model characteristics, and decoded GPS data are successfully matched against a registry database for validity, and simultaneously an inventory control log is created and/or incremented. User guides, software and other collateral materials to the electronic device are electronically linked, and a corresponding scannable logo can be applied to collateral materials prior to shipping the electronic device. Preferably, the scannable logo is affixed both to the chassis of the vehicle, and displayed through a visual display in the vehicle’s instrument cluster when the vehicle is activated. As with other embodiments, a tracing log is created as the electronic device is shipped from the manufacturing facility to the ultimate retailer, who sells the item to the consumer. The consumer, can also scan the scannable logo, and the vehicle can be electronically registered” by capturing the consumer’s geo-location information through the mobile computing devices GPS function along with other consumer identification data, which is forwarded to a state’s vehicle registration department for e-registering in real time.
Figure 10 depicts a manufactured item for consumer assembly embodiment. In another embodiment depicting in this application authentication where a manufactured item is sold in “kit” form and assembled at the consumer’s home address, an image of a 2D bar code or other scannable image, which yields a data string is presented, together with a business logo brand image to create a “scannable logo”, which contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, and encoded GPS data corresponding to manufacturing location for the components to be assembled. As set for the in another embodiment, the manufactured components have a tracing log that can be viewed by scanning the scannable logos for each component or if a small item like screws, the contained. The image is scanned with the image scanning function of the mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information is decoded with the image decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information matching the address coordinates or geocoordinates of a consumer’s address to activate the warranty for the item. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device. The authentication application has certain required fields, which include time and date that the mobile device scans the scannable logo to effect authentication, which are automatically populated each time the authentication application is launched. Additionally, when the authentication application is launched, subsequent to the initial launch at the manufacturing facility, and if the decoded identity data for the logo brand owner, decoded visual identification characteristics for the logo brand, and decoded GPS data are successfully matched against a registry database for validity, then a tracing log for each sub-component is displayed on the mobile device tracing items transit history from the manufacturing thru to the assembly location, with the retail location of pickup being one entry.
As I further describe in patent application US 14/206628, in tenth embodiment/feature common to the preferred embodiments herein would provide a method as described in PPA 61/852,108 on pages 29-30 such that the bar codes can be recognized visually by type (See Endnote 14). This can include the use of color, such as a green dot on the otherwise black and white 2D bar code, but can also include a logo or icon design such that 2D bar codes that would provide information can contain a scripted “i”, and 2D bar codes for money can contain a currency symbol. Further, this method can include a blended image + 2D bar code that provides a pictorial representation (e.g. thumbnail), but the image also contains embedded scannable codes.
The embodiment in this application expands the use of this system to create an index electronically linked to a trusted registrar where multiple “layers” are users for different types of user access. For example, a red mark might indicate a government agency, a white mark a manufacturer, etc.
Though the personal property embodiments depicted are representative, other possible embodiments of the methods described herein would include an electronic devices with component chassis, a mobile device case, a rectangular “credit” card or debit card, an electronic disc or flash drive, an article of clothing, a wrist band, a component of an automobile, a component of an airplane, a component of a piece of military hardware, a sheet of letter paper, a receipt, a newspaper, magazine, a credit card protective sleeve, a dermal patch, a postage stamp, currency, a human appendage, a cup, bottle, or other container; or an electronic display such as on a CRT monitor, television, ECD, or other mobile display that virtually displays a brand or logo either alone or as part of a virtually depicted tangible property.
In another embodiment, the scannable logo is etched into metal wherein the electrosaltwater is used. A smooth flat piece of metal with the desired surface area sufficient to display a scannable logo is obtained, and a scannable design is applied to a plastic non-conductive material with an adhesive backing suitable to adhere flatly on the metal, but which will be laser etchable once applied. A small opening is left on the flat metal piece suitable to touch an electro-conductive cathode lead. The area behind the lead should be sealed with an plastic non-conductive material sufficient to keep the metal watertight. The design is then etched into the previously applied plastic, and then inspected to ensure the design is correct. The lead is connected to a electric current, and the etched plastic metal combination is lowered into a saltwater solution, and an anode is passed into the water to cause in electrolysis effect, thereby etching the metal. The plastic-metal assemblage is removed from the saltwater solution and dipped in a non-saltwater solution to halt the residual electrolysis. The plastic-metal assemblage is removed from the water, and the laser-etched plastic adhesive is removed, exposing the electro-etched scannable logo design. As a preferred feature, an invisible marking ink can be applied to the plastic -metal assemblage prior to removing the laser-etched plastic adhesive to improve the reliability of the scan.
In another embodiment, an electro-etched metal scannable logo design is inset into a plastic mold in such a way that the inset remains visible after the molding process is complete. The molding process is completed, and once removed the etched metal remains as a scannable logo.
Common to preferred embodiments in this application is the use of encryption. The data communication channel for the data transmissions is encrypted. A preferred feature of this embodiment would utilize a bar code image cipher (hashing the image) in combination with bit data channel encryption (128-2048 bits) across a high speed connection such as 3G, 4G, Wi-Max, or Wi-Fi, but the embodiments herein can be adapted to lower bandwidth by one skilled in the art. Additionally, while the embodiments are depicted where both the logo and corresponding scannable code(s) are visible, it is preferred that for all embodiments except for consumer point of view access, the 2D scannable codes are presented at frequencies above or below human visible light so as: 1. Not to affect the aesthetics of an any logo design, and 2. Not be visual to a viewer without the assistance of a camera capable of capturing such frequencies. The logo and one or more scannable 2D bar codes and be visually displayed in layers for scanning. Further, it preferred that the visual display incorporate a cipher to prevent unauthorized decoded without a key. Finally, the data packages sent across the computer networks should be encrypted in addition to encrypting the communication channels themselves.
Common to preferred embodiments in this application is a trusted registrar, which can be a mobile device manufacture, the company that develops the software applications for authentication, decryption, encryption, and data transmission, or the scannable logos, or a government agency like the U.S. Customs, the US Patent Office, or even the manufacturer of the a personal item, wherein the trusted registrar safeguards the data described in the embodiment such as the logo data, business identity data, and specified or predetermined time data. The trusted registrar causes other participants (manufacturer, consumer, distributor, shipper, software developer, etc) to subscribe to the scannable logo system, wherein some but not all aspects of the authentication, tracing logs or registry is viewable as would be appropriate to security concerns and their needed level of access.
Common to preferred embodiments is the feature of pre-determined or specified time. However, it should be noted that many different specifications are contemplated with respect to time period selection. For example, a government trademark registry may have a time period that expires with the payment of trademark fees. A city government may have a period limited by the timing of business permit fees, a consumer can limit timing with a warranty period, a merchant with the expiration of a reasonable time in a store, a manufacturer can limit a time to enable an item to be added to the master inventory list, a distributor can limit time to when a shipment is expected, and so forth. Thus, the “specified” or “pre-determined” time period is intended to be a flexible specification albeit essential element of practicing the invention.
As I further describe in patent application US 14/206628, is another embodiment depicting a payment method; wherein, a mobile device launches an application for purchasing a manufactured item, assembled item, or electronically deliverable item, a scannable 2D bar code is presented on an invoice, receipt or functionally equivalent electronic display for an for a manufactured item, assembled item, or electronically deliverable item, whereby an image of a 2D bar code or other scannable image which yields a data string is presented in response a validated authentication of a manufactured, assembled item, or electronically deliverable item providing for a buyer’s mobile communication device with a camera function for scanning or capturing an image of the seller bar code and a keypad for entering a payment amount is provided. A remote electronic payment center for maintaining a buyer’s account and making electronic payments from the buyer’s account is provided. A wireless communication system for transmitting data, including data representative of the seller bar code image, and the payment amount, to the remote electronic payment center, is provided. Applications are present on the mobile communication device and at the remote payment center to enable data transmission of the data over the wireless communication system from the buyer’s mobile communication device to the remote electronic payment center using a send command and to authorize the remote electronic payment center to electronically transfer funds from a buyer’s account associated with the buyer’s mobile communication device to the seller’ s account. The image of the seller bar code is scanned or captured from the invoice or sales receipt with the camera function of the buyer’s mobile communication device and processed with the mobile communication device application to form a wirelessly transmittable seller data file. The seller data file is wirelessly transmitted from the mobile communication device to the electronic payment center. The payment data representative of a payment amount is wirelessly transmitted from the smart-phone to the electronic payment center. The buyer’s account is electronically debited by the payment amount. The seller’s account is electronically credited by the payment amount, and data representative of the crediting of the seller’s account is electronically transmitted to the seller.
As I further describe in patent application US 14/206628, is another embodiment depicting a payment method with the scannable logo is presented on an inventory item, and directly scanned by the consumer to make a purchase. The method employs a seller bar code encoding information solely to enable electronic payment to a seller’ s account. The seller’ s account belongs to an intended recipient of the electronic payment. A buyer’s mobile communication device with a camera function for scanning or capturing an image of the seller bar code and a keypad for entering a payment amount is also employed. A remote electronic payment center for maintaining a buyer’s account and making electronic payments from the buyer’s account is provided. A wireless communication system for transmitting data, including data representative of the seller bar code image, and the payment amount, to the remote electronic payment center is also used. A applications are present on the mobile communication device and at the remote payment center to enable data transmission of the data over the wireless communication system from the buyer’s mobile communication device to the remote electronic payment center using a send command and to authorize the remote electronic payment center to electronically transfer funds from a buyer’s account associated with the buyer’s mobile communication device to the seller’ s account. An image of the seller bar code is provided at a point of sale for goods or services. The image of the seller bar code is scanned or captured with the camera function of the buyer’s mobile communication device. The image is processed with the mobile communication device application to form a wirelessly transmittable seller data file. The seller data file is wirelessly transmitted from the mobile communication device to the electronic payment center. A payment data file representative of a payment amount is wirelessly transmitted from the smart-phone to the electronic payment center. The buyer’s account is electronically debited by the payment amount and the seller’s account is electronically credited by the payment amount. Data representative of the crediting of the seller’ s account is transmitted to the seller. An image of a bar code encoding identifying information for each item being purchased is presented on a manufactured item. Each image is scanned with the camera function of the mobile communication device. The identifying information for each item is saved in a computer memory device in association with the buyer’s communication device.
Hired-Car App Embodiment
Incorporating the processes and embodiments previously described in this patent application, a further embodiment is presented for an automated check-in and rider experience mobile device application comprised of two portions: 1. The first time user download/setup and the 2. existing user app experience.
First Time User Download/Setup: Assume that a person wants to travel from Miami, FL to Atlanta, GA, and decides to call a hired car to transport service such as Uber, Lyft, a limo company, or cab, and after requested the ride, the user receives a text that the ride is on the way. Once in the car, the new embodiment is presented.
1. The user sees a tablet computer (or functionally equivalent) displaying inside the vehicle, with coupons for products and services (separately or integrated into ads) scrolling across the screen which contain a 2D bar code that can be scanned by the users phone, and alternatively a mobile phone number to receive the coupon for the product or service.
2. Once the correct number of digits is entered, a dialog box pops-up with the mobile number pre-filled in so it can be confirmed.
3. Once confirmed, a text is sent to the user’s mobile device linked to the entered phone number, and a link is also sent to invite the user to download a coupon app. The user then can download the app, so that the next time they will experience the coupon app user experience. The app allows for the registration of multiple devices linked to a common phone number. The app also allows for the driver or the hired car to “check-in” and the driver and tablet are then paired in such a way that if someone removes the tablet from the proximity of the driver, the data on the tablet is wiped to ensure security. The app allows for the functionality to send the coupons to email, or multiple devices simultaneously. The app collects and stores quasi-public personal data which includes but is not necessarily limited to: user name, email address, zip code, state, device type, and thereafter creates a 2D bar code containing this information or a link to this information which can be entered by another device by scanning the coupon app user’s mobile device. The last name is “starred” out to like a password to protect the coupon app user’s visual privacy so even the driver doesn’t have the last name. All information is stored in a database linked to the user’s device with minimal information being retained either on the user’s device or the hired car’ s tablet device. The coupon app includes a user opt-in privacy policy. The coupon app, will have the feature to text me with follow-up’s periodically inviting me to download and install the app. Downloading or installing the app can occur either through a recognized site such as Google play, or iTunes store or it could be a direct link download. If I stop the installation process mid-stream, the app asks me if I want to try later, and then will prompt me. The coupon app also includes (once installed) an automated handshake with the hired car tablet as a mobile WiFi hotspot so during any future visit the rider can use the hired car’s WiFi, in lieu of an “login page” as is currently done in the industry. This includes functionality like in Google Chrome such that what is displayed on the user’s phone can be displayed on the tablet for improved optics and user experience. So long as in close proximity, this feature will work.
Existing User App Experience: Assume that a person has downloaded and installed the hired car app in a manner consistent with the process flow above, and wished to take the same trip but using the installed app this time
1. The user opens the app, and is able to search for the nearest vehicle for hire within says a 5,10, 20 or 50 mile radius for transportation with the views of available rides sorted in ways that include soonest ETA, and lowest ride cost.
2. The app captures the user’s starting point the GPS calculated location or alternatively based on the “check-in” scanned location process as described in this application if there are many businesses or addresses resolving to a common way point.
3. As before, when the user gets into the hired car, there is a mounted tablet device available for viewing with coupons/ads scrolling in a loop on the device.
4. When the user’s device is near the hired car tablet, there is an “autohandshake” that allows the user’s device to automatically notify the user of the Wi-Fi hotspot available, and the driver is notified of the passenger proximity. To use the Wi-Fi, the user scans the 2D bar code presented on the table screen, which presents my login credentials without typing. This is a better practice than fully automatic connection like when the user is in proximity to their home WiFi network.
5. The user’s selected destination has been previously input either by the user when requesting the ride or by the driver or by the corporate staff, and when the vehicle heads out, the ETA to the destination is displayed in the user hired car app. The user can scan the 2D bar codes like before to capture coupons, but the process is automated in that the coupons are sent according to the user’s preset preferences. One of the preference options is to “clip” the coupons and put them into an electronic folder automatically by category for use by the user. One additional feature would be to display on the hired car’s tablet screen the content of the user’s phone to improve the visual experience, in a similar fashion to have Google ChromeCast device displays on a television screen from an Android OS device. This display would present games, video viewing, maps, and specialty search sites like TripAdvisor and the like to make the user experience. All this would work when in proximity. One additional included feature in the user’s app would be a folder to contain and display the 2D bar code boarding passes for the airplane as a JPG so the user could display this instantly to airline personnel and TSA check-in even when no WiFi was available later. The user app would allow the feature of in- app purchases incorporating the 2D scanning processes described previously or other common methods such as NFC or mag-stripe scan. As a automation step, it would be a best practice to incorporate a hardware device that incorporates an automated button such as those which are commercially available that can be plugged into to the 3.5mm jack of the phone as a power source, and then can be programmed to perform 1 or more functions by pressing the plugged in device, which functions to register a programmable single key press in such a way that a single press or the device “button” causes the hired car app to scan/capture a 2D barcode, but returning an instruction to scan when the key is pressed, so that the smartphone’s interface would not have to be unlocked or otherwise open before performing this single function. Ideally, a unique address would be embedded in the hardware to match to the phone so it could not be spoofed easily. SECURE DATA DELIVERY SYSTEM
BACKGROUND OF IMPROVMENT: This invention embodies improvements to adapt the earlier specification(s)/embodiment(s) to deliver data in a highly secure manner. Specifically, this embodiment is intended to protect underlying data against EMP attack and/or electronic eavesdropping through the internet, by isolating and separating the underlying data access and the process of validating the identity of the data recipient.
EMBODIMENT 1.
One embodiment of the invention provides an article of manufacture comprising a computer memory device, a protective covering, and a label. The computer memory device containing computer readable data and an electronic lock to prevent access to the data without an electronic key for the lock. The protective covering is resistant to electrostatic discharge and EMP attack and envelopes the computer memory device. The label displays a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering. In a preferred embodiment, the label is on the computer memory device and includes a removable covering that must be removed to scan the scannable bar code. In another preferred embodiment, the data is encrypted.
The above described article can be used for data delivery. A computer data delivery method comprises providing a computer memory device containing computer readable data and an electronic lock to prevent access to the data without an electronic key for the electronic lock; enveloping the computer memory device in a protective covering resistant to electrostatic discharge and EMP attack; labeling the covering and/or the computer memory device with a scannable bar code that produces the electronic key for unlocking the lock; and delivering the computer memory device with label and protective covering to a requestor of the data. In a preferred embodiment, the scannable bar code is transmitted to a computer of the requestor. The bar code image is scanned using a scan function of a requestor computer having a barcode conversion function to produce converted bar code data which yields the proper unlock code. The computer is then disconnected from the internet. The computer memory device is inserted into the computer. The data on the computer memory device is read. Preferably, the computer memory device is then removed from the computer, any requestor -viewable data from the device remaining on the computer is erased, and the computer is reconnected to the internet. Once reconnected, a read receipt can be transmitted to a predetermined location as well as geolocation data. Preferably, the data is encrypted and the method further comprises decrypting the data.
DETAILED DESCRIPTION: As previously described in Title 5: BAR CODE BASED DOCUMENT MAILING METHOD, and depicted in Fig 21, a media mailer is send which contains three (3) pouches that hold a portable data storage device such as a flash drive, SD card, or functionally similar with the key requirement being that the data drive is not connected to an electronic network capable of accessing directly or indirectly the content of the data device. Rather, the method relies on the label on the device to deliver a "control key" such that the media content can only be "unlocked" by reading the 2D bar code key on the media itself, and entering the code into a "network isolated" media player that unlocks and plays the media content, with or without returning a "return receipt" to confirm the location where the data file was received.
In this embodiment, the sleeves of the mailer would preferably employ an electrostatic resistant material to resist electrostatic discharge and /or EMP attack, and prior to shipping, all data devices would be stored in a manner resistant to electrostatic discharge and /or EMP attack. The data would preferably be encrypted, but the local software program used to read the data storage device or stream pathway would preferably disconnect from the internet just prior to decrypting the data so that at no time was the decrypted data accessible to the internet or similar networks. The bar code image is scanned using a scan function of a requestor computer having a barcode conversion function to produce converted bar code data which yields the proper unlock code. Preferably, the geo-confirmation of data receipt would be performed at some time after the data was read, when the reading device was reconnected to the internet or ideally by using a separate device to validate the confirmation of the data receipt from the process of reading the data. To reduce transit time, the data to be delivered should be maintained at various global co-locations within an internet isolated network (intranet) so that data could be transferred to deliverable devices and either mailed or messengered to the recipients address in under 24 hours. Additionally, the data device itself might employ a "covering" such as a scratch off or slide cover so that the recipient of the data would then scratch off or slide open a cover to reveal the scannable code underneath.
EMBODIMENT 2.
Another embodiment of the invention provides a computerized data delivery method. According to the method, encrypted data and bar code data is received in a first user computer. A bar code image produced from the bar code data is displayed on a user interface display device associated with the first user computer, or a television. The bar code image is scanned using a scan function of a second user computer having a barcode conversion function to produce converted bar code data. The converted bar code data is received in the first user computer and the encrypted data is decrypted responsively to said receipt.
Preferably, prior to decrypting the encrypted data, internet communications in the first computer are disabled, and images produced from the decrypted data are displayed on the user interface display device associated with the first user computer. In an alternative embodiment, images produced from the decrypted data are displayed on a user interface device associated with the second user computer, the second user computer is preferably a wireless mobile device, and the barcode conversion function is an app.
The app is preferably downloaded onto the wireless mobile device prior to receiving the encrypted data and bar code data in the first user computer. The app can further provide for executing a payment function from the wireless mobile device prior to decrypting the encrypted data such as where the images form a movie.
DETAILED DESCRIPTION: As previously described in Title 14: BAR CODE BASED REMOTE CONTROL SYSTEM, and depicted in Fig 8, a bar code is "displayed" from a television or computer monitor. Now, with reference to Figure 54, as shown in Step 1, an encrypted UHF, VHF, cable television, or data stream is broadcast or transmitted which includes a scannable unlock bar code. This embodiment is presented as an alternative to scanning the unlock bar code from a label. The scannable bar code is displayed on a television, computer monitor or tablet device as depicted in Step 2. A person who wishes to view the encrypted data scans the displayed bar code with the scanning feature of their smart-phone or tablet device as shown in Step 3. During Step 4, the bar code is authenticated, and can be used to process a payment (say where the video data is rented or purchased), confirm the user's identity, and validate geo-information for purposes or copyright enforcement. This authentication and verification step is performed through apps residing on the users smartphone, tablet or functionally equivalent mobile device. After all authentication steps are complete, the user's mobile device is network isolated while the payload data (video, audio, or text data) is decrypted and displayed as depicted in Step 5. While the best practice is to network isolate the device before decryption, this embodiment contemplates no encryption/decryption if the data is less confidential. In Step 6, the payload data is decrypted, and displayed on the television or monitor as shown in Step 7. Where a second or alternative display is desired, the decrypted payload can displayed on the same or a different mobile device, as shown in Step 7A, but in such case, a greater security risk is presented with the network enabled for playback unless the data is transmitted via USB or other hardwire cable. Where the decoding step is not being performed on a separate device from the smart-phone or tablet, it would be handled by software in the mobile device, and the decrypted payload then be displayed for viewing directly on the mobile device. This variation makes sense when a television show will be "moved" from being viewed on a television or monitor to be viewed (even in the middle of the viewing) to a mobile device for continued viewing, by rescanning the barcode for "resume" playback on the mobile device. As discussed earlier, where the data needs to be more secure, the decoder/player device could employ a data port such as a USB port to allow a flash drive or SD card to be plugged in, and a bar code displayed from the television or monitor so as to unlock the data to be viewed.
***y2 _
In this embodiment, the validation of the displaying device is handled by "proxy" in that the validating device is connected to the displaying device through the process of scanning the validation bar code from the displaying device.
*** Y2 f
An advantage of this embodiment is that any video playback device can be used at any location since the network isolates during decryption and playback, ensuring the content delivered remains private.
The smart-phone communicates with one or more remote networks to validate the user, confirm geo-information, process payments.
In the typical embodiment depicted in Fig 54, the software to decrypt the signal payload or data stream resides on a separate device from the smart-phone or tablet used to communicate with the remote networks. Ideally, only one network, television tower, or other data pathway is used to transmit to the playback/decoder device and point to point encryption is used between the receiving device and the transmitter.
In this embodiment, it is preferred to download the full datastream into a temporary storage device before decryption and playback for maximum playback performance and security, but it is contemplated that data could be decrypted "on the fly" from the live data stream as part of the embodiment.
***y2 2
This embodiment contemplates bypassing Steps 2 and 3 by having the decoder/playback device directly communicate with the mobile device to wirelessly transmit the unlock code as a data string, and have it decoded as a background process by software in the mobile device. This approach, while functional, lacks the air-gapped nature of physically scanning the displayed bar code by a physically separate device.
As a best practice, the data or video to be stored locally would be stored in a virtual drive in such a way that the entered code would decrypt an entire virtual drive for playback.
*** y2 3
The mobile app link in the second computer could be embedded in the bar code such that the mobile device is automatically connected when scanned and/or the app downloaded before decoding, separate player/decoder could push the mobile app software to the phone/tablet. The last approach has the advantage of cutting out the google app store but adds the wrinkle of setting permissions on the mobile device to accept a non-google / apple vetted app
Hie encrypted data sent to the first computer or television is preferably presumed to be sent through a trusted "closed" network, whereas, the data sent and received by the second computer is assumed to be sent across a public access network such as the internet.
V2.4
EMBODIMENT lA ver 1.1
ROLL-UP OF FUNCTIONALITY DESCRIBED IN PRIOR APPLICATIONS
As stated previously in patent application US19/0416, Embodiment 1 provides for an article of manufacture, comprising a computer memory device, with a label that " . . . displays a scannable bar code that produces the electronic key for unlocking the lock on the computer memory device or the protective covering. " P54
As stated previously in patent application US19/0416, Embodiment 1 preferably incorporates the functionality that "The [mailable] protective covering is resistant to electrostatic discharge and EMP attack and envelopes the computer memory device." p54
As stated previously in patent application US19/0416, Embodiment 1 preferably includes the functionality with the mailable protective covering wherein ". . . the 2D bar code that contains the merchant’s contact information." P28
As stated previously in patent application US19/0416, Embodiment 1 preferably incorporates the functionality with the mailable protective covering wherein ". . . the embedded scannable 2D bar code itself functions as an onsite printed postage stamp which contains a unique serial numbered sequence, a stamp denomination (or exemption flag if the value is perpetual), and a point of origin geodesic code." p29 As stated previously in patent application US 19/0416, Embodiment 1 preferentially incorporates the functionality within the attached label's scannable code on the computer memory device, depicting a payment method for an electronically deliverable item, and providing for ". . .a buyer’s mobile communication device with a camera function for scanning or capturing an image of the seller bar code and a keypad for entering a payment amount is provided." p51
CIP NEW MATERIAL
In Embodiment 1, the stored data may include any type of data that can be stored on a computer memory device, such as video data, financial data, images, or marketing data.
Preferably, the scannable code on the protective mailer improves security by allowing for authentication geo-validation of both the sender and recipient.
Optionally, the sender and receiver can additionally be identity authenticated as part scanning the label on the computer memory device transported with in the protective envelope.
At the sender's discretion, the scannable code on the protective mailer can be either be printed directly on the mailer containing the computer memory device or printed onto a label that is then put on the protective mailer.
Preferably, the protective sleeve in the protective mailer incorporates EMP protective material and XRAY protective material for additional security when posting sensitive data materials within the protective sleeve.
Preferably, the computer memory device label incorporates the functionality such that scanning the label reveals a data string that decrypts the data stored on the computer memory device. Preferably, the computer memory device label incorporates the functionality such that scanning the label authenticates the data stored on the computer memory device.
Preferably, the computer memory device label incorporates the functionality such that scanning the label validates the data stored on the computer memory device.
Software applications are included on a computer device which includes an optical scanner, with the functionality to optically scan and decode the scannable label, unlock the computer memory device, and then read the underlying unlocked data.
1.2 ADDITIONAL NEW MATERIAL
All parent and sibling patent applications are incorporated in total whenever referenced herein.
This embodiment employs:
A printer suitable to print scannable labels, and a first computer with software cable of generating a scannable code with an encrypted scannable label, and said label is applied to the computer memory device in such a way that when the label is scanned by a second computer with appropriate software, the underlying data stored on the computer memory device is unlocked or otherwise decrypted by the second computer.
The second computer incorporates an optical scanner and software capable of scanning, and then decrypting or otherwise decoding the scannable label attached to the computer memory device, and then reading the underlying data that has been decrypted or otherwise decoded. Alternatively, a scannable code could be etched into the metal or plastic case of the computer memory device to serve the same function as the label. Preferably, the second computer is a mobile device such as a smartphone, tablet or a remote control device with optical scanning capability. The second computer must be capable of reading the computer memory device, but both read-write capability is preferred. The scannable labels may employ color frequencies not visible to the human eye.
With respect to the protective mailer envelope which incorporates the scannable codes, a label printer, computer, and appropriate software is employed to collect the identity information of the sender and/or receiver; and thereafter, generate an adhesive label (or labels) to be applied to the protective mailer, which then contains affixed scannable codes containing the sender and receiver information with respect to this embodiment. The scannable codes preferably will contain the sender's and receiver's address, name, and location information reduced to a data string or geodesic code. Alternatively, the scannable code images could be printed directly on the protective mailer envelope. Preferably, the adhesive scannable labels are printed on adhesive sheets suitable for removal and application to both the protective mailer envelope and the computer memory device.
As stated previously in patent application US19/0416, Embodiment 1 preferably includes the functionality of the mailable protective covering with respect to tracking delivery service routing wherein: "This 2D bar-coded “stamp” enables anonymous tracking of the item based on the stamp’s unique serial number alone which facilitates specific tracking while keeping the specific identity of the sender and receiver anonymous to preserve privacy." Once the labels containing the scannable codes are applied to the protective mailer envelope, the sender, receiver, and delivery service personnel can employ a mobile device with optical scanning ability, which is combined with software to decode and decrypt the scannable codes on the protective envelope, and from the scannable codes determine the name and stated locations of the sender and receiver of the protective envelope to track the shipping progress. When a scannable code on the protective mailer envelope is scanned, the geo-locate feature is activated in the delivery service employee's scanning device computer to record the current location of the protective mailer envelope, and the location information along with an anonymous, unique identifier is uploaded to a database for mail tracking purposes, which in turn is indexed to the name and address information of the sender and recipient in a separate database.
In Fig 55, just prior to inserting the computer memory device into protective mailer's sleeve, the protective mailer envelope is depicted. The scannable label is attached to the computer memory device prior to its insertion into the protective sleeve, which also incorporates scannable labels.
BACKGROUND FOR FIGURES 56-60
With reference to Figures 56-60, as stated previously in patent application US US 16/385,650 which references US 14/206628 (described originally in PPA 61/852,108 on pages 34-34: ". . . an “electronic remote control/setup” embodiment is depicted to illustrate the utility of the invention to serve as an electronic remotecontrol platform.
In this embodiment, the user scans a 2D scannable code displayed from an appliance such as a television, mobile ISP device, automobile, desktop software, or other configurable device. Contained in the 2D scannable code is the “setup” information for the device, plus as geodesic code that is linked to a database to provide the correct custom language for the device. For example, in the case of the television, scanning the 2D scannable code would identify the model number, and the user would then download the virtual remote control interface correctly configured for his particular television using the predominant language of his geographic location by default. A validation step would preferably be included to ensure that the default based on geography was the desired language configuration. Ideally, the software would ensure that any connectable DVD or other types of “player” interfaces would play in the correct language based on the remote preferences. Some advantages to this embodiment are that multiple remotes can be generated for guests, family members etc., as needed that are custom configured to the personal preferences of the user and the specific settings of the device. Another example illustrating this embodiment is illustrated by the example of remote ISP login, where the user scans a scannable 2D bar code containing access information about the ISP, including ideally the correct language for the user interface based on the geodesic code. A preferred feature in this embodiment would include a hardware identification feature so that the scanned 2D bar code would include information about the device such that any driver updates, patches, security updates, etc., can be downloaded and applied based on the devices self-reporting. And additional validation step can include hardware polling to verify the device hardware is in fact as reported; however, hardware polling is much slower which makes the scanned reporting the preferred approach in most instances. Some additional features can include Bluetooth, infrared connectivity to enable close proximity communications. The 2D bar codes as in other embodiments herein can be either displayed electronically or by label, sticker or decal. User manuals in digital form would be a preferred feature of this embodiment."
As stated previously in patent application US 16/385,650 and depicted in FIG 54) which is described in EMBODIMENT 2 on pp 60 - 70 as: "Another embodiment of the invention provides a computerized data delivery method. According to the method, encrypted data and bar code data is received in a first user computer. A bar code image produced from the bar code data is displayed on a user interface display device associated with the first user computer, or a television. The bar code image is scanned using a scan function of a second user computer having a barcode conversion function to produce converted bar code data. The converted bar code data is received in the first user computer and the encrypted data is decrypted responsively to said receipt. Preferably, prior to decrypting the encrypted data, internet communications in the first computer are disabled, and images produced from the decrypted data are displayed on the user interface display device associated with the first user computer. In an alternative embodiment, images produced from the decrypted data are displayed on a user interface device associated with the second user computer, the second user computer is preferably a wireless mobile device, and the barcode conversion function is an app.
The app is preferably downloaded onto the wireless mobile device prior to receiving the encrypted data and bar code data in the first user computer. The app can further provide for executing a payment function from the wireless mobile device prior to decrypting the encrypted data such as where the images form a movie.
DETAILED DESCRIPTION: As previously described in Title 14: BAR CODE BASED REMOTE CONTROL SYSTEM, and depicted in Fig 8, a bar code is "displayed" from a television or computer monitor. Now, with reference to Figure 54, as shown in Step 1, an encrypted UHF, VHF, cable television, or data stream is broadcast or transmitted which includes a scannable unlock bar code. This embodiment is presented as an alternative to scanning the unlock bar code from a label. The scannable bar code is displayed on a television, computer monitor or tablet device as depicted in Step 2. A person who wishes to view the encrypted data scans the displayed bar code with the scanning feature of their smart-phone or tablet device as shown in Step 3. During Step 4, the bar code is authenticated, and can be used to process a payment (say where the video data is rented or purchased), confirm the user's identity, and validate geo-information for purposes or copyright enforcement. This authentication and verification step is performed through apps residing on the user’s smartphone, tablet or functionally equivalent mobile device. After all authentication steps are complete, the user's mobile device is network isolated while the payload data (video, audio, or text data) is decrypted and displayed as depicted in Step 5. While the best practice is to network isolate the device before decryption, this embodiment contemplates no encryption/decryption if the data is less confidential. In Step 6, the payload data is decrypted, and displayed on the television or monitor as shown in Step 7. Where a second or alternative display is desired, the decrypted payload can displayed on the same or a different mobile device, as shown in Step 7A, but in such case, a greater security risk is presented with the network enabled for playback unless the data is transmitted via USB or other hardwire cable. Where the decoding step is not being performed on a separate device from the smart-phone or tablet, it would be handled by software in the mobile device, and the decrypted payload then be displayed for viewing directly on the mobile device. This variation makes sense when a television show will be "moved" from being viewed on a television or monitor to be viewed (even in the middle of the viewing) to a mobile device for continued viewing, by rescanning the barcode for "resume" playback on the mobile device. As discussed earlier, where the data needs to be more secure, the decoder/player device could employ a data port such as a USB port to allow a flash drive or SD card to be plugged in, and a bar code displayed from the television or monitor so as to unlock the data to be viewed.
In these embodiments, the validation of the displaying device is handled by "proxy" in that the validating device is connected to the displaying device through the process of scanning the validation bar code from the displaying device.
An advantage of this embodiment is that any video playback device can be used at any location since the network isolates during decryption and playback, ensuring the content delivered remains private. The smart-phone communicates with one or more remote networks to validate the user, confirm geo-information, process payments.
In the typical embodiment depicted in Fig 54, the software to decrypt the signal payload or data stream resides on a separate device from the smart-phone or tablet used to communicate with the remote networks. Ideally, only one network, television tower, or other data pathway is used to transmit to the playback/decoder device and point to point encryption is used between the receiving device and the Transmitter. In this embodiment, it is preferred to download the full datastream into a temporary storage device before decryption and playback for maximum playback performance and security, but it is contemplated that data could be decrypted "on the fly" from the live data stream as part of the embodiment.
As a best practice, the data or video to be stored locally would be stored in a virtual drive in such a way that the entered code would decrypt an entire virtual drive for playback.
The mobile app link in the second computer could be embedded in the bar code such that the mobile device is automatically connected when scanned and/or the app downloaded before decoding, separate player/decoder could push the mobile app software to the phone/tablet. The last approach has the advantage of cutting out the google app store but adds the wrinkle of setting permissions on the mobile device to accept a non-google I apple vetted app The encrypted data sent to the first computer or television is preferably presumed to be sent through a trusted "closed" network, whereas, the data sent and received by the second computer is assumed to be sent across a public access network such as the internet."
DETAILED DESCRIPTION OF FIGURES 56-60
Starting with FIG 56, a dongle 5601 containing the components of a streaming video player as depicted in FIG 54 and described more fully in EMBODIMENT 2 is inserted into the TV or computer monitor playback device 5603, and the playback/recording device is activated into setup or configuration mode. A QR Code or other scannable code 5605 is displayed on the screen as shown in FIG 57. The displayed-on-screen scannable (QR Code) is generated by firmware of the Playback (Recorder) device or alternatively by the users Smartphone device 5607, which employs a software application that transmits the scannable code via WiFi or Bluetooth to be then displayed on the screen. The user scans the QR Code to begin the process of configuring the Recorder / Playback Device. Preferably, the Playback device is disconnected from the internet prior to scanning the QR Code (or manually entering password data) so that any password data cannot be hacked as the devices are functionally "air gapped" at this point from the internet, except for the local intranet connection between the playback TV (or computer monitor) and the Playback (Recorder) device. The user can manually enter information: either on the user's smartphone (which is mirrored to the Playback I Recording device while in Configuration / Setup Mode) or through the use of the remote control device 5609 which is redundantly connected to the Playback / Recording device as a preference. Though scanning an optical code (such as a QR code) is preferrable, entering data is a preferable redundant feature to accommodate all types of users. Thus, manual password entry is a redundant feature. Preferably, the Recorder / Playback device is a standalone dongle, but alternatively, the Recorder / Playback device could be built-in to the TV or Computer Monitor or even a tablet. STEP 1- Smartphone VPN Setup-Configuration Tether Connection Established: Once the user’s information and password is entered or more preferably, decoded by a scan of the QR Code, applications in the users smartphone cause the smartphone to open the smartphones "tethered" feature to create a secured Wi-Fi VPN connection between the Recording / Playback Device and the user's smartphone (and remote control) to facilitate secure internet service for purposes of downloading firmware updates to the Playback / Recording device, adding specific new Streaming Service Channels (such as Hulu, Netflix and the like), and even downloading specific video content for storage on a SSD card in the Remote Control or the user's Smartphone. This approach is preferred to connecting under the varying conditions of home, office or public Wi-Fi (ISP) service, as these may or may not have acceptable security measures in place when the user is inputting sensitive information such as account login data. FIG 57 depicts the Playback I Recording device as mirrored with the user’s smartphone in configuration mode (preferred). The embodiment could employ any functionally equivalent mobile device such as a tablet, although a smartphone is depicted. Preferably, when in "intranet" mode, during setup-configuration, applications in the user's smartphone automatically embed the phone's tether login credentials (Wi-Fi Name & Password) into the scannable QR code so that when scanned, the phone automatically decodes a data string (with login credentials) and then creates the secure VPN tether. Preferably, the connection employs encryption. As a redundant feature, dropdowns would be provided to allow the user to search for a locally available Wi-Fi network.
STEP 2— Login to user's Smartphone OS provider: Next, while still in configuration- setup mode, the user logs into the smartphone email accounts and profile that will be common for their accounts to be used for their Playback- Recording device and currently in use by their smartphone device. As discussed in earlier patent applications, a user's bank account or debit card information can be accessed and or saved by scanning the scannable QR code. Preferably, the necessary device account information is stored in an encrypted file stored locally on the device and only decoded while the device is in "intranet" mode (disconnected from the internet). Data strings such as the user's city, state, country, and zip code are preferably embedded into the scannable (QR) code), decoded and then migrated from the profile files in the user's smartphone to the user's Playback / Recorder device account profile when the displayed scannable code is scanned. These files are then stored on the Record-Playback device for later reference and validation. This login process is depicted in FIG 58 in like fashion to the process of creating the secure VPN tether connection.
STEP 3-User Selects Streaming Video Channels on Recording-Playback Device: As depicted in FIG 59, while in configuration-setup mode, the user selects the desired Video Streaming Channels, with scannable codes being displayed in association with the graphical "icon badges" used by each Video Channel provider. Alternatively, the icon badges themselves could function as the scannable codes as depicted in detail in my earlier issued patent, but the user must be aware of this feature/capability to use it. The scannable (QR) codes contain embedded data string information for configuring the Streaming Video Channel(s) according to the user's preferences, or default settings where appropriate. As in STEP 1 & 2, the user's devices are disconnected from the internet when sensitive data is decoded / encoded to configuration file or when data is to be manually entered by the user, so that encrypted payloads with configuration data files are only decrypted or modified when the devices are in an "intranet" state. Once the configuration is complete, the file is saved in a read only state (preferably encrypted) and the connection to the internet can be reestablished. Once the user has finished adding or editing the desired Video Streaming Channels, they can switch back to "run" mode so that the Playback / Record device is no longer mirrored to the user’s smartphone, and with the configuration files saved as encrypted read only format, there is reduced chance of data theft. Optionally, the user may select a local Wi-Fi / ISP provider at this point.
STEP 4-User Downloads a specific Video (with record feature shown). As depicted in FIG 60, the user may select and download a specific video through the Playback- Recording device, which is in turn connected to the remote control 5611 for the Playback-Recording device via Wi-Fi, Bluetooth or functional equivalent. As shown, a data storage device (SSD card) 5613 is inserted into the remote control and the video or data is downloaded to the data storage device. This is preferred with the video content that is ultra-high definition such as 4K or 8K format so as to eliminate buffering which may occur when streaming ultra-high definition content on a relatively slow internet connection speed. Preferably, playback is handled through the "intranet" Wi-Fi or Bluetooth connection, and not necessarily reliant on inconsistent internet performance as with pure streaming. A hybrid approach may be adopted, where the data storage (SSD card) functions as a large data buffer, but this would lack the functionality of being able to remove the data storage device (SSD card) and share the recorded/downloaded video with family and friends. While mirrored configuration is shown, this embodiment feature may be practiced with just the remote control device controlling the Playback-Recording Device or the user's smartphone itself may be configured as a remote control device with software apps on the user's smartphone. Playback of a recorded video is accomplished by inserting a previously recorded data storage disk into the remotecontrol slot to read the disk. Preferably, software on the user's smartphone and/or Playback-Recording device paired with a label printer allows printing of labels to identify and encrypt the video recording, as depicted in my earlier patent application(s) referenced herein. Though Embodiment 3 depicts video streaming channels and download video content to a data storage device, the embodiment contemplates streaming audio channels and downloading audio content as functionally equivalent.
Incorporation within the embodiments herein of multi-factor authentication such as geo-validation, a scannable label, and validation specific time frame, are not intended to be an exhaustive list of all multi-factor authentications one skilled in the art might use, but are illustrative. For example, data delivery could be restricted to a specific EIN or other unique hardware identifier on a specific device, a specific retinal scan, a specific facial recognition, a specific zip code, specific country, specific state, or other unique physical address, and might even include the requirement of having a physical token for authentication if level of security required it. That said, geo-validation, scannable labels, and allowing the data to be unlocked and viewed during a specific time periods are practical, cost effective and should be considered best practice methods for one skilled in the art to effect data delivery authentication for most use case scenarios.
HEEPACC6DW0 NEW EMBODIMENT
All parent and sibling patent applications are incorporated in total whenever and wherever referenced herein.
This embodiment provides for a Quick Response Video Delivery System (QRVDS) employing three systemic core parts: 1. a “Viewing Device” such as a TV, computer monitor or tablet, preferably connected to a separate or integrated streaming service provider hardware device. 2. A video playback device, known henceforth as a "Streaming Sendee Provider Type 1 Device or "SSPD Type 1", which employs a power source, CPU, mass storage, software applications to connect the SSPD Type 1 to Viewing Devices, Smartphones, remote controls for recording and/or playback as embodied herein. 3. A remote control connected via radio frequency to the SSPD Type 1 Device. As shown in Fig 61, the “Remote Control” device contains a slot or slide out tray to playback the video content, music content or data files, which in turn is connected to a Viewing Device such as a television, computer monitor, tablet, smartwatch, or smartphone, or functionally equivalent, with the Remote Control allowing for the insertion of a Scannable Playback Token, as shown in Fig 61. A Scannable Playback Token (or SPT) is preferably a round or rectangular weighted thin plastic strata, with an affixed decal containing a scannable "key" code, which when scanned yields a data string that contains a URL or functionally equivalent reference to a video file. Said Remote Control employs a camera plus software applications to capture the scannable code image from the SPT and decode the digital string contained therein, and to then playback the referenced video file or files. Alternatively to using the Remote Control, the User/Viewer’s Smartphone, though not preferable, could be used as the “remote control” device, with mobile software application(s) residing on the user’s (or more precisely “User / Viewer”) Smartphone to perform comparable functions, with said Smartphone applications engaging the user’s Smartphone camera function, along with additional Smartphone software functions to capture and decode scannable QR code data from the “label” on the SPT itself. Though discussed in previous embodiments, this embodiment does not employ data storage functionality, but rather the “token” preferably employs unique size and/or shapes such that the remote control device requires the proper size and/or shaped “token” to actuate the remote control device for playback (or recording) functionality. This unique size and shape feature would preferably also be adapted to the previous embodiment where an SSD memory storage card (or functional equivalent is used for playback and/or recording data.
The SSPD Type 1 device calls software the-functions such as: a. "Scan to Play", b. "Scan to Configure” and if needed the c. "Scan for Help" functions, and software applications within the “Scan to Play App” residing in the SSPD Type 1 or the User I Viewer’ s Smartphone can be called or downloaded as needed to play configure and optimize video playback for a video Viewing Device. Additional functions, such as "Scan to Pay" can be called to pay for a video upon delivery to a specific location. The first two functions (a and b) are used to stream or otherwise play a video and also to setup the initial hardware and user configurations with respect to the Video Device (or devices) of the User/Viewer. Function c is called if the user gets "stuck" during the configuration process by allowing the user to call the "Scan for Help" function, which engages an integrated help delivery system during configuration. Once "un-stuck", the User / Viewer is returned the "Scan to Configure" function and continues configuration from the original point of difficulty. The SSPD Type 1 preferably is also connects to separate "Scan to Play" Smartphone Application (called "Scan to Play App") which allows the User I Viewer to watch video content directly from their Smartphone as alternative to viewing on a traditional television or monitor, have their Smartphone serve as remote control device, and have their Smartphone provide a secure “tether” connection for configuration. The user’s smartphone may also function to store encrypted backups of key data on from the SSPD Type 1 device in case of device failure. The "Scan to Pay" allows the User I Viewer to make a payment either from a Viewing Device or through the Scan to Play App on their Smartphone for purchasing a selected data file. The "Scan to Configure" function may be called for many types of integrations such as when the User I Viewer wishes to add additional Viewing Devices, Viewing Locations, or Wi-Fi connections to allow for the highest quality video content viewing across multiple locations and multiple Viewing Devices, with a configuration file log being saved by the software applications either on the SSPD Type 1 device or the user's SmartPhone. Additional hardware, and locations are managed in the "Scan to Configure" function through "scanning" a Scannable “key” Code as the input method rather that typing on a keyboard or keypad to the extent practical. The use of both the Smartphone and SSPD 1 provides for devices themselves to independently act as “two factor” authenticators in that devices the User / Viewer has with them can be used to independently validate a User / Viewer having already been authenticated. As a preferred security feature, all internet connections are made through the User / Viewer’s Smartphone should be limited to RF transceiver communications such as Bluetooth and Wi-Fi during decryption of sensitive information such as passwords and the like. In this embodiment, streamed video content is viewed through the connection between the SSPD Type 1 itself, and a Viewing Device which employs optimized graphics hardware. Alternatively, the SSPD Type 1 embodiment may include a separate graphical process unit (such as from an NVIDIA GPU) with the HDMI connectivity to connect the SSPD Type 1 directly to a computer monitor. Alternatively, suitable playback functionality though a Wi-Fi based "mirror" function, by calling the mirror function on the user's Smartphone within the Scan to Play App, and then integrating the video playback feature of the Smartphone with the Viewing Device. This configuration is preferably, then saved in a “configuration settings file” within SSPD Type 1 device. Alternatively, the “configuration setting file” could be saved through the User / Viewer's Scan to Play App in their Smartphone. For direct monitor playback, a direct HDMI port could be added as a permanent hardware component to the SSPD Type 1 device.
The "Scan to Pay" function data (such as payment card data) preferably is stored within the Scan to Play App which preferably resides locally in the SSPD Type 1 device or alternatively on secure local drive partition of the User / Viewer's Smartphone in an encrypted file to be called by the Scan to Play App. As a fail-over measure, the SSPD Type 1 preferably permits a mirror connection to the user's Smartphone for alternative viewing or engaging the "Scan for Help" function, or alternatively viewing for one of the other SSPD Types. During the "Scan to Configure" or "Scan to Play" functions, authentication of the User / Viewer can be completed by displaying a scannable “key” code on a Viewing Devices (or alternatively on the User's Smartwatch or Tablet when using the "Scan to Play" function, scanning a “Help QR Code”, “Scan to Configure” or other revealed scannable “key” code when using the "Scan to Configure" or "Scan for Help" functions. When using the "Scan to Play" function with this embodiment, it is preferable that the device powers up to this function when plugged into a Viewing Device and powers off when removed.
The functionalities of “Scan to Pay”, “Scan to Play are discussed in my previous patent applications.
SELECTING A VIDEO FOR DELIVERY
Preferably, the SSPD Type 1 device employs a first computer plus software capable of reading “Meta-Data” associated with videos being viewed on a Video Playback Device, such that when a specific video is “selected” by a User/Viewer on the SSPD Type 1 device, from the User/Viewer’ s selection, a scannable code (such as a QR Code or the like) is created employing creates a “linked-list” database reference expressed a URL reference or functional equivalent. Thereafter, the SSPD Type 1 device is connected to a printer suitable to print scannable labels contained scannable codes which reference the selected videos. The first computer preferably employs software capable of generating a scannable code with an encrypted scannable label, and said label then being applied to the Scannable Playback Token in such a way that when the label when scanned by a second computer with appropriate software, yields the underlying video file’s data string reference, and is unlocked or otherwise decrypted by the second computer. The video file is downloaded or “streamed” to the second computer device, also being an SSPD Type 1 device connected to a video playback device and to the remote control. Preferably, the SPT employs unique size and shape features, so that functionality functions of “selecting” a video to be sent or “playback” is activated only when the properly sized “token” is inserted into the remote control.
Alternatively, the first SSPD Type 1 device is connected to a remote computer facility connected to a computer, printer, and mailing facility such that when the User/Viewer selects a video file for “sending”, a label contain a scannable code is generated that is associated with that specific video. Typically, such a remote computer facility would be provided by a Streaming Service Provider ("SSP"), such as Roku, Plex, or the like. Once the desired video file is selected the SSP prints the labels, affixes them to the SPTs, and mails them to a selected recipient using an appropriate mailer, as identified in previous embodiments and as depicted in Fig 55, with the associated mailing labels preferably being employed to mail the Scannable Playback Token(s), containing the linked video file(s) scannable code(s).
As shown on Fig 61 , suppose a User/Viewer wishes to select and send to his home for private viewing a historically relevant movie such as PT109, which depicts the early navy career of President John F. Kennedy, and “selects” the movie to reduce the internet data string reference (video file with corresponding meta data) to an encrypted QR Code. Preferably, additional discrete references are included as additional data string references to the meta-data where information about the movie such as actors, year released, and the like or even a “movie trailer” data string could be included in the referenced data string or data strings to be encoded. A scannable code is printed into a label, and then applied to a scannable playback token. A Scannable Playback Token (ormultiple tokens) is/are mailed to the desired “Viewer/User” using a secure mailer as depicted in previous embodiments. Preferably, the label-link contained in the Scannable Playback Token additionally includes a “secure key” unlocking and employing End-to-End encryption to ensure a secure data channel delivery.
Preferably, the second computer (for decoding the scannable codes) incorporates an optical scanner and software capable of scanning, and then decrypting or otherwise decoding the scannable label attached to the computer memory device, and then reading the underlying data string that has been decrypted or otherwise decoded. Alternatively, a scannable code could be etched into the metal or plastic case of the scannable playback token to serve the same function as the label. Preferably, the second computer is a mobile remote control connected to the SSPD Type 1 device, but alternatively a smartphone, tablet or a remote control device with optical scanning capability could be used. The scannable labels may employ color frequencies not visible to the human eye.
In all embodiments, the Remote Control itself preferably employs a private radio transceiver to perform Input / Output (I/O) functions for purposes of User I Viewer I Device identification, establishing secure communication networks, storing data in a secure manner, with the scannable playback token functioning as a type of “hardware” key, and functioning as a component within the SSPD Type 1 device embodiment or other embodiments. This embodiment is distinguished from the previous embodiment where the user may select and download a specific videos through the SSPD Type 1 device, which is in turn connected to the remote control for the Playback-Recording device via Wi-Fi, Bluetooth or functional equivalent. In the previous embodiment, as shown in Fig 60, a data storage device (SSD card) is inserted into the remote control and the video or data is downloaded to the data storage device.
In an alternative embodiment, the User/Viewer could select the video to create a QR Code link for viewing by others, though this would not be considered preferred for best privacy practices. Though this embodiment depicts playback using the remote control for insertion of the Scannable Playback Token (SPT) or SSD media (with an attached QR Code label); however, it should be considered as functionally equivalent to insert the SPT into an integrated player/viewer system in a motorized vehicle, into a slot I tray in a "tablet" computer, into a slot I tray on the SmartTV itself, into a slot / tray on the SSPD Type 1 device itself, or the like.
As additional security measure, on the reverse side of the Scannable Playback Token, an engraving or holographic image preferably is included to ensure the scannable code is authentic.

Claims

Claims
1. A computer data delivery method comprising providing a computer video image playback device that accepts a computer memory device that causes a scannable QR code to be displayed on a screen associated with the computer video image playback device, providing a mobile communication device that scans the QR code and establishes a radio communication link with the computer video image playback device, receiving data on the computer video image playback device, and displaying images on the screen responsively to the data received.
2. A method as in claim 1 where the data received is from the internet, the computer memory device, or the mobile communication device.
3. A method as in claim 2 further comprising displaying video images on the computer video image playback device received from the internet, the computer memory device, or the mobile communication device.
4. A method as in claim 3 wherein the radio communications link employs short range radio signals selected from intranet and Bluetooth.
5. A method as in claim 4 wherein login credentials are embedded into the scannable QR code so that when scanned the mobile communication device automatically decodes the login credentials and creates a secure VPN tether with the video image playback device.
6. A method as in claim 1 further comprising providing a remote control device for controlling the computer video image playback device, said remote control device having electronic data receiving, transmitting and storage capabilities, receiving electronic data in the remote control device, and transmitting data received from the remote control to the computer video image playback device and displaying images on the screen responsive to the images transmitted.
7. A system comprising a viewing device, a video playback device connected to the viewing device to cause the viewing device to playback video, a remote control device connected via radio frequency to the video playback device, to control the video playback device, said remote control device having a scanning function, a scannable token sized for insertion into the remote control device, which when scanned yields actuates predetermined functions in the remote control device.
8. A system as in claim 7 wherein the video playback device includes a power source, CPU, mass data storage, and software applications to connect the video playback device to the Viewing Device and remote control.
9. A system as in claim 8 wherein the scannable playback token comprises a flat plastic substrate having a scannable image on one side.
10. A system as in claim 9 wherein the scannable playback token has a shape which, when inserted into the remote control device, actuates predetermined functions in the remote control device.
11. A system as in claim 10 wherein the functions include accessing a URL or functionally equivalent reference to a video file.
12. A system as in claim 10 wherein the shape is other than rectilinear.
13. A system as in claim 9 further comprising a printer for printing the scannable image on a label substrate.
14. A system as in claim 12 wherein the label comprises an encrypted QR code and the remote control device includes an optical scanner to read the encrypted QR code and software to descript the encrypted QR code.
15. A method comprising scanning a QR code with a device capable of performing such scan to produce encrypted data, electronically processing the encrypted data with a digital computer to produce a data string reference to a video file, radio transmitting the data string reference to a video playback device having access to the world-wide web, accessing the video file on the world wide web, and playing the video on a video viewing device electronically connected to the video playback device.
16. A method as in claim 15 wherein the QR code is scanned with a remote control device which is radio linked to the video playback device.
17. A method as in claim 16 wherein the QR code is carried on a scannable token.
18. A method as in claim 17 further comprising inserting the scannable token into a slot formed in the remote control device, said slot being configured to accept only scannable tokens of predetermined size and shape.
19. A method as in claim 18 further comprising displaying a menu on the video viewing device in response to the scannable token being accepted by the remote control device.
5
PCT/US2023/018322 2022-04-12 2023-04-12 Secure data delivery system WO2023200860A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17/718,588 US11954704B2 (en) 2009-11-17 2022-04-12 Secure data delivery system
US17/718,588 2022-04-12

Publications (1)

Publication Number Publication Date
WO2023200860A1 true WO2023200860A1 (en) 2023-10-19

Family

ID=88330200

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2023/018322 WO2023200860A1 (en) 2022-04-12 2023-04-12 Secure data delivery system

Country Status (1)

Country Link
WO (1) WO2023200860A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070234215A1 (en) * 2006-03-31 2007-10-04 Ricoh Company, Ltd. User interface for creating and using media keys
US20140380362A1 (en) * 2013-06-20 2014-12-25 Microsoft Corporation Paired Devices
US20180336729A1 (en) * 2017-05-19 2018-11-22 Ptc Inc. Displaying content in an augmented reality system
US20200168253A1 (en) * 2017-05-09 2020-05-28 Visa International Service Association Video matrix barcode system
US20200367056A1 (en) * 2018-01-05 2020-11-19 Xirgo Technologies, Llc Secured pairing of video capture device and mobile device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070234215A1 (en) * 2006-03-31 2007-10-04 Ricoh Company, Ltd. User interface for creating and using media keys
US20140380362A1 (en) * 2013-06-20 2014-12-25 Microsoft Corporation Paired Devices
US20200168253A1 (en) * 2017-05-09 2020-05-28 Visa International Service Association Video matrix barcode system
US20180336729A1 (en) * 2017-05-19 2018-11-22 Ptc Inc. Displaying content in an augmented reality system
US20200367056A1 (en) * 2018-01-05 2020-11-19 Xirgo Technologies, Llc Secured pairing of video capture device and mobile device

Similar Documents

Publication Publication Date Title
US11301576B2 (en) Secure data delivery system
US10262334B2 (en) Electronic brand authentication method using scannable codes
US11727437B2 (en) Secure data delivery system
US11049094B2 (en) Methods and arrangements for device to device communication
US8977234B2 (en) Using low-cost tags to facilitate mobile transactions
KR101145534B1 (en) Methods and systems for controlling computers or linking to internet resources from physical and electronic objects
US9830588B2 (en) Methods and arrangements for smartphone payments
US20140258110A1 (en) Methods and arrangements for smartphone payments and transactions
US11954704B2 (en) Secure data delivery system
US20170169422A1 (en) Digital Token System for Physical Medium Digitalization and Physical Store Optimization
US20140244514A1 (en) Methods and arrangements for smartphone payments and transactions
CN105190659A (en) Methods and arrangements for smartphone payments and transactions
US9489662B2 (en) Apparatus and method for storing electronic receipts on a unified card or smartphone
MX2012013840A (en) Method and devices for creating and using an identification document that can be displayed on a mobile device.
KR100960232B1 (en) Methods and systems for controlling computers or linking to internet resources from physical and electronic objects
US8905304B1 (en) System and method for processing certified or registered mail
EP3533014A2 (en) Method and system for automatically receiving and/or transmitting information relating to transactions
CN102279961A (en) Remote purchasing device and using method thereof
US20240029105A1 (en) Secure data delivery system
WO2023200860A1 (en) Secure data delivery system
WO2023183636A1 (en) Secure data delivery system
WO2014128636A1 (en) Method and system for video payments
US20220222652A1 (en) Electronic sales method
WO2015152970A1 (en) System and method for processing certified or registered mail

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23788900

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)