WO2008062179A2 - System and method for data acquisition and processing - Google Patents

System and method for data acquisition and processing Download PDF

Info

Publication number
WO2008062179A2
WO2008062179A2 PCT/GB2007/004446 GB2007004446W WO2008062179A2 WO 2008062179 A2 WO2008062179 A2 WO 2008062179A2 GB 2007004446 W GB2007004446 W GB 2007004446W WO 2008062179 A2 WO2008062179 A2 WO 2008062179A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
dataset
access
encoded
data
Prior art date
Application number
PCT/GB2007/004446
Other languages
French (fr)
Other versions
WO2008062179A3 (en
Inventor
Philip Wesby
Original Assignee
Philip Wesby
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philip Wesby filed Critical Philip Wesby
Priority to EP07824658A priority Critical patent/EP2100427A2/en
Priority to US12/516,150 priority patent/US20100052844A1/en
Publication of WO2008062179A2 publication Critical patent/WO2008062179A2/en
Publication of WO2008062179A3 publication Critical patent/WO2008062179A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • the current invention relates to a system and method for data acquisition and processing.
  • the invention relates to a system and method for capturing and or processing a stored or received encoded datagram or pixeiated image and or barcode in accordance with a pre-programmed profile for the purpose of generating a dataset.
  • the invention relates to a system and method for capturing and or processing stored or received datagram images using, a device such as a mobile phone or PDA or laptop or fixed line device in relation to stored or received data, such as a subscriber profile which comprises differential service access rights, for the purpose of iocally activating services.
  • a device such as a mobile phone or PDA or laptop or fixed line device in relation to stored or received data, such as a subscriber profile which comprises differential service access rights, for the purpose of iocally activating services.
  • the resulting dataset which is created from processing the received or captured datagram image in relation to the pre-programmed or received subscriber profile is then used to encode a local transmission from the processing device which is received locally to activate machinery such as a car park barrier or door or to provide an enabling key to permit service access.
  • the local encoded transmission may comprise a Bluetooth or Infra Red or WIMAX or wireless USB or WLAN transmission.
  • the current invention can be considered as key inventive extensions of this technology towards the use of the encoded datagram capturing or receiving device - the wireless or fixed line terminal - as a local service enabling terminal.
  • the use of this invention can be further extended to create differential programming algorithms for local short range wireless programming based upon the same captured or received datagram image where the said programming algorithms are computed in accordance with the user ID and specific service access privileges.
  • the mobile phone is becoming the essential primary and central communications device which is capable of capturing images using camera technology as well as receiving emails.
  • the increasing resolution of camera technology is also making the transmission of image data across the network more acceptable.
  • the mobile phone comprises several key technical components which are not successfully exploited to their full.
  • the hi-resolution digital camera may be able to capture photographs, but the average wireless subscriber is still unwilling to transmit these images to family and friends over the network because of the preconceived high costs of the data transmission.
  • these preconceived high costs are misconceptions but they represent a real barrier to the use of the network as an image or MMS data carrier, for which networks have been planned to high capacity for.
  • the same argument is relevant to GPRS data transmission in general which is also not fully exploited to its intended capacity.
  • This business case must also address the preconception of the cost of transmitting data through the use of a technology which delivers a highly profitable third party service so effectively that the third party will pay for the use of the mobile and fixed line data network.
  • credit cards comprise legislated authorisation and authentication protocols which the mobile phone may not replace. Nevertheless, if the mobile phone is considered as the primary device through which payment transactions may be effected, the existing payment protocols can be implemented and further enhanced by capabilities that the mobile phone already possesses and thereby reduce the need for a credit card.
  • the credit card itself makes use of a magnetic strip and a 4-digit PIN number for accessing funds or for effecting payments.
  • Clearly a technology which can improve the security of credit transaction payments by adding additional layers of security renders such systems less open to fraud.
  • the mobile phone offers improved authentication based upon the subscriber identity SIM and networked link to a remote subscriber profile held by the credit card company.
  • the mobile phone comprises the capability to add a subscriber-specific or employee-specific authentication, which itself may be used to grant access to the said services using a the mobile phone's capability to generate short range transmissions such as Bluetooth and in some instances IR etc. These local broadcast capabilities of the mobile phone are generally under- exploited.
  • This local transmission is used to communicate with a wireless device, such as a wireless transponder, associated with the datagram wherein the said wireless device responds with a specific encoded response (f*DKEY) which is further received by the camera device.
  • identification of a specific person or asset can be improved by determining that the datagram is associated with a specific person or asset who or which carries the associated authentic wireless response device wherein upon receipt of the correct sought response (f*DKEY) the camera device then grants access to associated local or remote services or if an incorrect response is received no access is granted and or an alarm is generated.
  • f*DKEY correct sought response
  • a camera device such as a mobile phone or PDA comprising a digital camera
  • the datagram is printed on the surface of a wireless transponder device which generates an encoded response (f*DKEY) in response to receiving a signal (DKEY) and wherein the encoded signal (DKEY) may be generated from a device which processes data captured from the datagram image in accordance with a predetermined subscriber profile or
  • This offers the possibility for multiple levels of security to validate and authenticate a consumer's rights to access a service or transaction.
  • a data acquisition device wherein the data may be encoded visual data such as a photograph or a graphic image, on a paper or film medium or on a screen, or it may be data transmitting outside the visual spectrum
  • the received data is decoded and displayed on a suitable computer terminal or PDA or data-input device and updated and wherein a subsequent datagram or encoded data dataset is then generated for printing or transmission
  • the invention proposes some ways to transform wireless devices such as mobile phones, PDAs and laptops as devices which can activate and access local services and or systems.
  • the invention teaches a way to gain access to local services by processing visual data in accordance with a stored or received dataset and to encode a Bluetooth or infra-red or wireless USB or WLAN transmission as a direct result of processing the said extracted visual data with the said dataset wherein the transmission is received by a device capable of enabling the service.
  • the invention addresses the requirement for a mobile phone or PDA needing to communicate over a telecommunications cellular network for service access by exploiting the capability of the mobile phone to process visual information and extract data from it to encode a local transmission which can operate equipment such as a car park barrier, effect a vending machine purchase, or unlock a door.
  • the same invention may be implemented in several alternative ways such as to provide multiple levels of security when applied to an ATM cash point machine such that data extracted from an on-screen datagram is used to encode a transmission which may generate an alternative datagram which when captured and processed generates an alternative dataset which subsequently encodes a local and or a cellular network data communication transmission.
  • the invention can be applied to authorise travel on public transport, to authenticate documents such as printed bank notes, to access and read and update patient records, and to access and read and update data-encoded images in general
  • the invention is also suitable for encoding and printing destination labels and also for tottery tickets based upon a data-encoded image where each ticket is separately encoded according to the lottery number contained therein.
  • FIG. 1 illustrates a schematic showing how local transaction-based services can be activated according to one embodiment of the invention.
  • FIG. 2 illustrates a schematic showing an alternative application of local processing of a data-encoded image.
  • FIG. 3 illustrates a schematic showing how additional services may be requested to update the service access profile.
  • a wireless device such as a PDA (102) comprising a digital camera captures a data-encoded image which contains data relating to a service activation.
  • the data-encoded image may be displayed upon the capturing device as shown.
  • the user may then activate a data extraction algorithm or this algorithm is activated automatically by the datagram acquisition process.
  • the data extraction algorithm extracts a dataset (D) from the data- encoded image.
  • the extracted dataset is then processed in accordance with a stored subscriber profile D N .
  • This subscriber profile may be pre-programmed into the handset and stored in a memory chip as firmware. Alternatively, this profile may be received over the air interface as an MMS or data message and stored in accordance with a service profile update received by the subscriber.
  • the subscriber profile may be requested in real time from a data centre connected with the cellular network.
  • the received and extracted data is processed in accordance with the subscriber's service access subscriber profile.
  • this access may relate to a range of services from 1 to IM where N is the number of services available.
  • an encoded dataset is generated f(D en c) which will be a function of the data D extracted from the image which is correlated with the number of available services from 1 to N and the subset of services S n to which the subscriber has rights of access.
  • the encoded dataset f(D ⁇ l ,c) is then used to encode and transmit a local Bluetooth broadcast.
  • This broadcast is then (5) received by a local receiver and (6) validated by a processing unit associated with the local receiver. If the processed received Bluetooth transmission comprises authentic service access data, the local processing unit associated with the local service then (7) activates the service.
  • the invention may be applied to provide building zone access to company personnel, and often inside buildings where network coverage is very poor or unavailable due to Faraday shielding effects.
  • Employees make use of their mobile phone as the primary device and the incorporation of the mobile phone as a local service activation device correspondingly enables data capture using the mobile phone, processing according to access rights and activation of building automated doors using a local service activation capability.
  • FIG.2 is shown an alternative application of the local processing of a data-encoded image.
  • a wireless device such as a mobile phone or laptop or PDA (203) as shown captures the data-encoded image (201) and it is processed using a stored decoding algorithm (1).
  • the decoded dataset from the data-encoded image is then (2) displayed on a screen (204).
  • a visible dataset (202) Associated with the data-encoded image is a visible dataset (202).
  • the displayed dataset (204) which has been decoded from the captured image is then compared (3) with the visible dataset (202) which may be located on a structure or device adjacent to the data-encoded image. If the extracted dataset corresponds (4a) to the displayed dataset (202) no action is taken. If the extracted dataset does not correspond (4b) to the displayed image, an alarm is generated and or the same or a different dataset is generated and stored and or transmitted to a remote data processing centre.
  • This application may be suitable for validating the authenticity of documents or tickets or licences or other important documents.
  • a similar process may be used to validate the authenticity of bank notes as they pass through a cash-dispensing system or the like.
  • FIG. 3 is shown a sequence of actions which enables a subscriber to update his or her service access profile.
  • Data is extracted (1) from the data-encoded image and determines that one or more services are associated with the data. This could be done by encoding a recognisable icon or code sequence which determines that specific subscriber- accessible or corporate employee accessible services are available.
  • the extracted data is then compared (2) with any pre-stored subscriber service- access profile, if one is actually available, and determines whether the subscriber does not have access to ay of the available services.
  • a screen display is generated (3) which gives the subscriber the option to request service access from a local or remote service centre.
  • the request for one or more additional services, currently not available according to the existing user service access profile, is then sent (4) to a local or remote service centre.
  • the service centre authenticates (5) the subscription profile and determines the access rights of the subscriber. This is further authenticated by exchanging (6) one or more messages between the subscriber and the service centre which validates that the true subscriber is requesting service access.
  • condition for service access is determined (7) based upon subscriber status or service tariff.
  • subscriber status or service tariff if the subscriber is requesting access to corporate services, then it is determined that the subscriber is a valid and current employee with the corporate. Alternatively, if the subscriber is requesting paid services, then the subscriber may be asked to confirm that he or she agrees to pay a particular tariff for access to the services.
  • the service centre then generates a dataset which represents a modification to the stored user service-access profile and either transmit this modification back to the subscriber to enable access to the sought one or more services, or a new total service access profile is sent to the subscriber to replace the existing service access profile.
  • the same method as described with reference to FIG. 3 may be used to cancel the complete service access profile in the instance that a request is made to access services by an unauthorised person requesting service access.
  • the invention is best implemented using a downloadable software application program such as a Java Applet which will modify the user interface and store and update and reference the stored user profile.
  • a digital photo captured by the phone camera is sent by MMS to an IP address or mobile phone number which is associated with a network element such as data processing centre which will receive and process the captured MMS image.
  • the digital image received by the network element will be processed for its data content and a dataset will be generated and compared to pre-stored datasets and data will be sent back to the mobile phone which sent the MMS.
  • the wireless device has a digital camera and can transmit data and or MMS messages.
  • the subscriber may have initially registered for the service capability (paying an opt-in fee) and will register an email address etc. Subscribers may then receive an invite to the service and only need REPLY to receive an application program such as a Java applet.
  • the Java applet self-loads and links to saved IP addresses or phone numbers in the phone's address book.
  • an employee may be given a mobile phone or PDA which already has on it specified user-profile service access privileges and links to a corporate email account.

Abstract

A system and method for data acquisition and processing is described which can form the basis of new and improved business and consumer services. Encoded datagram images are captured using a mobile phone or PDA or fixed line device and processed relative to a stored encoded profile such that the result of the processing can be used to access services remotely by way of a fixed or network connection and or be used to generate encoded local broadcast signals such as those sent by Bluetooth or Infra Red or WLAN or WIMAX or wireless USB and the like. In this way the capturing device becomes an intelligent service access gatekeeper such that data can be differentially extracted from visible images and used to generate encoded signals according to differential service access privileges which can be used for authenticating and granting building access, operating car park barriers, providing additional security for ATM cash point transactions, operating machinery in diverse applications and the like.

Description

SYSTEM AND METHOD FOR DATA ACQUISITION AND PROCESSING
DESCRIPTION
BACKGROUND OF THE INVENTION
The current invention relates to a system and method for data acquisition and processing. In particular, the invention relates to a system and method for capturing and or processing a stored or received encoded datagram or pixeiated image and or barcode in accordance with a pre-programmed profile for the purpose of generating a dataset.
More particularly, the invention relates to a system and method for capturing and or processing stored or received datagram images using, a device such as a mobile phone or PDA or laptop or fixed line device in relation to stored or received data, such as a subscriber profile which comprises differential service access rights, for the purpose of iocally activating services. The resulting dataset which is created from processing the received or captured datagram image in relation to the pre-programmed or received subscriber profile is then used to encode a local transmission from the processing device which is received locally to activate machinery such as a car park barrier or door or to provide an enabling key to permit service access. The local encoded transmission may comprise a Bluetooth or Infra Red or WIMAX or wireless USB or WLAN transmission.
This patent application extends the invention of an earlier patent application United Kingdom Patent Application 0619761.0 by the same applicant entitled System and Method for Data Acquisition and Processing having priority date October 6th 2006. In this patent application is taught the method of using datagrams and combining these with user profiles stored within the data capture device/such as a mobile phone or PDA, to create a range of differentiated services.
The current invention can be considered as key inventive extensions of this technology towards the use of the encoded datagram capturing or receiving device - the wireless or fixed line terminal - as a local service enabling terminal. The use of this invention can be further extended to create differential programming algorithms for local short range wireless programming based upon the same captured or received datagram image where the said programming algorithms are computed in accordance with the user ID and specific service access privileges.
Today, mobile network operators are seeking business solutions and technologies which exploit the untapped potential of the mobile phone or PDA or wireless laptop in order to render it as the intelligent device for desirable consumer and business oriented transaction services. The mobile phone is becoming the essential primary and central communications device which is capable of capturing images using camera technology as well as receiving emails. The increasing resolution of camera technology is also making the transmission of image data across the network more acceptable.
Nevertheless, many challenges are facing the mobile network operators as consumers seek data-rich and focussed information services and progressively view the mobile operators as managed high-capacity bit pipes offering multi- bearer (GSM, GPRS, 3G, WLAN, WIMAX et al) access networks. Even the search engine companies themselves are offering relatively few solutions which can be offered by way of the mobile phone to reduce churn and increase subscriber loyalty. Current initiatives merely involve directing adverts to Internet web surfers based upon their history of surfing. A business model based upon generally random wanderings through the internet faces many challenges.
The mobile phone comprises several key technical components which are not successfully exploited to their full. The hi-resolution digital camera may be able to capture photographs, but the average wireless subscriber is still unwilling to transmit these images to family and friends over the network because of the preconceived high costs of the data transmission. Often these preconceived high costs are misconceptions but they represent a real barrier to the use of the network as an image or MMS data carrier, for which networks have been planned to high capacity for. The same argument is relevant to GPRS data transmission in general which is also not fully exploited to its intended capacity. Clearly, there is a need for a technology and business case which maximises the use of networks for data transmission. This business case must also address the preconception of the cost of transmitting data through the use of a technology which delivers a highly profitable third party service so effectively that the third party will pay for the use of the mobile and fixed line data network. In the area of payment transactions, credit cards comprise legislated authorisation and authentication protocols which the mobile phone may not replace. Nevertheless, if the mobile phone is considered as the primary device through which payment transactions may be effected, the existing payment protocols can be implemented and further enhanced by capabilities that the mobile phone already possesses and thereby reduce the need for a credit card. The credit card itself makes use of a magnetic strip and a 4-digit PIN number for accessing funds or for effecting payments. Clearly a technology which can improve the security of credit transaction payments by adding additional layers of security renders such systems less open to fraud. In this context the mobile phone offers improved authentication based upon the subscriber identity SIM and networked link to a remote subscriber profile held by the credit card company.
In the area of transaction services which permit access to buildings and car parks through automated doors, the mobile phone comprises the capability to add a subscriber-specific or employee-specific authentication, which itself may be used to grant access to the said services using a the mobile phone's capability to generate short range transmissions such as Bluetooth and in some instances IR etc. These local broadcast capabilities of the mobile phone are generally under- exploited.
Further to the limitations of existing methods used for enhancing security and local service access and local data validation, and so far as is known, no optimum system and method for data acquisition and processing is presently available which is directed towards the specific needs of this problem area as outlined. OBJECTS OF THE INVENTION
Accordingly, It is an object of the present invention to provide an improved system and method for data acquisition and processing which serves to use a wireless or fixed line device to capture or receive or have pre-programmed in its memory specific encoded information, and process this information with a pre- stored or received user profile comprising certain attributes and generate a data set which can then be used to gain access to one or more services.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which makes use of a wireless or fixed line device to capture or receive visual information using an associated digital camera and process this information using a pre-stored or received user profile which comprises specific service access rights and then generate a dataset which can be used to gain access to one or more services and or control equipment.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing in which a communication device with wireless or fixed line network access can receive or can capture, by way of an associated camera, a data-containing image and can extract data from the said image according to a data extraction algorithm wherein the data extracted is determined by a pre-programmed or received data extraction user profile and wherein a dataset is generated which can be used to encode and transmit local wireless transmissions such as by Bluetooth, Infra Red, WLAN, WIMAX, and wireless USB and the like. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing in which a communication device can generate or receive a dataset which is capable of encoding a local transmission from the said communication device and thereby communicate with a local asset which has the capability of receiving and processing the encoded transmission for the purpose of activating a service from the said asset.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing wherein an encoded image containing data, or a datagram, is displayed to a camera device with processing function which has the capability to extract data from the image and process it using a pre-programmed dataset stored in its memory in order to compute a dataset key (DKEY) for the purpose of encoding a local transmission to be sent from the said camera device. This local transmission is used to communicate with a wireless device, such as a wireless transponder, associated with the datagram wherein the said wireless device responds with a specific encoded response (f*DKEY) which is further received by the camera device. In this way identification of a specific person or asset can be improved by determining that the datagram is associated with a specific person or asset who or which carries the associated authentic wireless response device wherein upon receipt of the correct sought response (f*DKEY) the camera device then grants access to associated local or remote services or if an incorrect response is received no access is granted and or an alarm is generated. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which makes use of capturing data from an encoded image, or datagram, using a camera device such as a mobile phone or PDA comprising a digital camera, wherein the datagram is printed on the surface of a wireless transponder device which generates an encoded response (f*DKEY) in response to receiving a signal (DKEY) and wherein the encoded signal (DKEY) may be generated from a device which processes data captured from the datagram image in accordance with a predetermined subscriber profile or access key. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which makes use of capturing data from an encoded image, or datagram, which may be black and white or in colour and or which may comprise a holographic image and or which may be an active light transmitting element comprising a filter and wherein the light transmitting element transmits electromagnetic energy in different parts of the electromagnetic spectrum such as in the infra red or ultraviolet ranges.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which makes use of capturing and processing data from an encoded image, or datagram, in relation to a stored dataset and thereby generate. short range encoded signals for access to local services such as obtaining products from vending machines, or to open car park barriers and to unlock doors and the like.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing wherein mobile phones and PDAs are adapted to become short range wireless programming devices having differential capability based upon the same captured or received datagram image where the programming algorithms generated are computed in accordance with the user ID and specific service access privileges.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to creating and developing innovative information based services which can be directly linked to retailers and finance credit organisations.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to creating and developing innovative information based services which converge through the mobile phone or PDA and thereby put the purchase transaction information into the hand of the mobile phone consumer subscriber desiring to make a purchase of a specific product.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to creating and developing innovative transaction based services which are based upon the use of the mobile phone digital camera and the capability of the mobile phone to encode and transmit short range signals.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to creating and developing innovative transaction based services such as for making withdrawals from ATM cash point machines which incorporate the capture and processing of datagram images and the subsequent transmission of a local signal by Bluetooth or infra red to enable the transaction to occur wherein the datagram may comprise an image generated on the screen of the ATM machine and which may be encoded according to specific data associated with the person making the cash transaction request. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to creating and developing innovative transaction based services in which a first datagram image generated on a screen of a transaction device is captured and processed to generate a dataset in the capturing device which may be used to encode a short range transmission which in turn is received by the said transaction device which subsequently generates a second datagram image based upon the received transmission which is then captured and processed. This offers the possibility for multiple levels of security to validate and authenticate a consumer's rights to access a service or transaction. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to creating and developing innovative transaction based services such as for making withdrawals from ATM cash point machines in which the consumer captures a first datagram image from a screen or from a printed image and uses specific data within the capturing device to encode and communicate a short range response, or to compute an access code which the consumer enters into the ATM machine, which in turn generates a second datagram image which is subsequently processed and used to authenticate and or authorise a cash withdrawal transaction. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to authenticating documents such as bank notes wherein the document or bank note may be printed with one or more encoded datagram images and wherein the subsequent capturing of the said one or more datagram images and extraction of data from them may be used to determine the authenticity of the document or banknote in relation to other information printed upon the document or bank note and or information stored upon a microchip associated with or contained upon or within the document or banknote.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to public transport payment applications whereby a traveller captures a datagram image displayed in a public transport vehicle using a mobile phone or PDA device and the processing of the data extracted from the datagram with preprogrammed data, or a user profile, generates a dataset which may encode a local Bluetooth transmission which is received by a device which confirms that the traveller has made a valid travel payment, or will be charged, or that it has been confirmed that the traveller possesses a valid season ticket for travel.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to a medical application where confidential patient information may be displayed at the foot of a patient's bed in a hospital such that encoded datagram images may be used to contain private personal data and only be capable of being read by a doctor holding the right equipment bearing the decoding algorithm. It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to a medical application in which the data acquisition device captures a data- encoded image or datagram and displays information on its own screen which may be modified by entering data from a keyboard or receiving data from another source, either by fixed line or wireless transmission, wherein a new datagram may be computed and either sent to a printer for printing and to be attached to and to update a patient's daily status report, or transmitted to a data centre for updating patients' records, or sent to a screen device associated with the patient's location.
It is a further object of one embodiment of the present invention to provide a system and method for data acquisition and processing which is highly suited to a general status report updating applications wherein encoded data is captured using a data acquisition device wherein the data may be encoded visual data such as a photograph or a graphic image, on a paper or film medium or on a screen, or it may be data transmitting outside the visual spectrum, wherein the received data is decoded and displayed on a suitable computer terminal or PDA or data-input device and updated and wherein a subsequent datagram or encoded data dataset is then generated for printing or transmission so that the information is now up to date.
Other objects and advantages of this invention will become apparent from the description to follow when read in conjunction with the accompanying drawings.
BRIEF SUMMARY OF THE INVENTION
Certain of the foregoing and related objects are readily-attained according to the present invention by the provision of a novel system and method for data acquisition and processing which can form the basis of new and exciting business and consumer services which involve the use of the mobile phone or PDA as a local transmitter which in response to capturing and processing visual data the device is enabled to generate a dataset to encode a local transmission for the purpose of activating transaction-based services.
In essence the invention proposes some ways to transform wireless devices such as mobile phones, PDAs and laptops as devices which can activate and access local services and or systems.
In particular the invention teaches a way to gain access to local services by processing visual data in accordance with a stored or received dataset and to encode a Bluetooth or infra-red or wireless USB or WLAN transmission as a direct result of processing the said extracted visual data with the said dataset wherein the transmission is received by a device capable of enabling the service.
The invention addresses the requirement for a mobile phone or PDA needing to communicate over a telecommunications cellular network for service access by exploiting the capability of the mobile phone to process visual information and extract data from it to encode a local transmission which can operate equipment such as a car park barrier, effect a vending machine purchase, or unlock a door. The same invention may be implemented in several alternative ways such as to provide multiple levels of security when applied to an ATM cash point machine such that data extracted from an on-screen datagram is used to encode a transmission which may generate an alternative datagram which when captured and processed generates an alternative dataset which subsequently encodes a local and or a cellular network data communication transmission.
In separate embodiments, the invention can be applied to authorise travel on public transport, to authenticate documents such as printed bank notes, to access and read and update patient records, and to access and read and update data-encoded images in general The invention is also suitable for encoding and printing destination labels and also for tottery tickets based upon a data-encoded image where each ticket is separately encoded according to the lottery number contained therein.
Other objects and features of the present invention will become apparent from the following detailed description considered in connection with the accompanying drawings, which disclose several key embodiments of the invention. It is to be understood, however, that the drawings are designed for the purpose of illustration only and that the particular applications are given by way of example only and do not limit the scope of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a schematic showing how local transaction-based services can be activated according to one embodiment of the invention. FIG. 2 illustrates a schematic showing an alternative application of local processing of a data-encoded image.
FIG. 3 illustrates a schematic showing how additional services may be requested to update the service access profile.
DESCRIPTION OF A PREFERRED EMBODIMENT
Reference will now be made in detail to some specific embodiments of the invention including the best modes contemplated by the inventor for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying drawings. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, it is intended to cover alternatives, modifications, and equivalents as defined by the appended claims. The following description makes full reference to the detailed features as outlined in the objects of the invention. Referring now in detail to the drawings and in particular FIG.l thereof, therein illustrated is a schematic of one example showing how locally based services may be activated according to the current invention.
A wireless device such as a PDA (102) comprising a digital camera captures a data-encoded image which contains data relating to a service activation. The data-encoded image may be displayed upon the capturing device as shown. The user may then activate a data extraction algorithm or this algorithm is activated automatically by the datagram acquisition process.
As indicated in the sequence of 7 actions, the following processes then occur. Firstly, (1) the data extraction algorithm extracts a dataset (D) from the data- encoded image.
Next, (2) the extracted dataset is then processed in accordance with a stored subscriber profile DN. This subscriber profile may be pre-programmed into the handset and stored in a memory chip as firmware. Alternatively, this profile may be received over the air interface as an MMS or data message and stored in accordance with a service profile update received by the subscriber.
As a further alternative, in an alternative embodiment where real time, up-to- date knowledge of a subscriber's current service access rights are needed such as in security applications, the subscriber profile may be requested in real time from a data centre connected with the cellular network. In each instance, the received and extracted data is processed in accordance with the subscriber's service access subscriber profile.
For example, this access may relate to a range of services from 1 to IM where N is the number of services available.
Next (3) an encoded dataset is generated f(Denc) which will be a function of the data D extracted from the image which is correlated with the number of available services from 1 to N and the subset of services Sn to which the subscriber has rights of access.
(4) The encoded dataset f(Dβl,c) is then used to encode and transmit a local Bluetooth broadcast. This broadcast is then (5) received by a local receiver and (6) validated by a processing unit associated with the local receiver. If the processed received Bluetooth transmission comprises authentic service access data, the local processing unit associated with the local service then (7) activates the service.
There are many applications which will benefit from this direct local service activation capability. In the car park barrier instance where a driver may wish to authenticate his identity to gain access to the car park, particularly in the rain and dark where cellular network coverage may be poor, local service activation enables the use of the mobile phone or PDA to activate a service without needing to necessarily make a connection with the cellular network. This solution is also rapid and does not necessarily require confirmation from a remote data centre.
In certain security applications, as mentioned earlier, such real time validation may be required.
In other instances, the invention may be applied to provide building zone access to company personnel, and often inside buildings where network coverage is very poor or unavailable due to Faraday shielding effects. Employees make use of their mobile phone as the primary device and the incorporation of the mobile phone as a local service activation device correspondingly enables data capture using the mobile phone, processing according to access rights and activation of building automated doors using a local service activation capability. Now with reference to FIG.2 is shown an alternative application of the local processing of a data-encoded image. A wireless device such as a mobile phone or laptop or PDA (203) as shown captures the data-encoded image (201) and it is processed using a stored decoding algorithm (1). The decoded dataset from the data-encoded image is then (2) displayed on a screen (204). Associated with the data-encoded image is a visible dataset (202). The displayed dataset (204) which has been decoded from the captured image is then compared (3) with the visible dataset (202) which may be located on a structure or device adjacent to the data-encoded image. If the extracted dataset corresponds (4a) to the displayed dataset (202) no action is taken. If the extracted dataset does not correspond (4b) to the displayed image, an alarm is generated and or the same or a different dataset is generated and stored and or transmitted to a remote data processing centre.
This application may be suitable for validating the authenticity of documents or tickets or licences or other important documents. A similar process may be used to validate the authenticity of bank notes as they pass through a cash-dispensing system or the like. Now with reference to FIG. 3 is shown a sequence of actions which enables a subscriber to update his or her service access profile.
First a PDA or mobile phone captures (301) a data-encoded image. Now with reference to the sequence of steps from 1 to 7, the following actions ensue.
Data is extracted (1) from the data-encoded image and determines that one or more services are associated with the data. This could be done by encoding a recognisable icon or code sequence which determines that specific subscriber- accessible or corporate employee accessible services are available.
The extracted data is then compared (2) with any pre-stored subscriber service- access profile, if one is actually available, and determines whether the subscriber does not have access to ay of the available services.
If it is determined that services exist to which the subscriber does not currently have access, a screen display is generated (3) which gives the subscriber the option to request service access from a local or remote service centre.
The request for one or more additional services, currently not available according to the existing user service access profile, is then sent (4) to a local or remote service centre.
The service centre authenticates (5) the subscription profile and determines the access rights of the subscriber. This is further authenticated by exchanging (6) one or more messages between the subscriber and the service centre which validates that the true subscriber is requesting service access.
Following validation, the condition for service access is determined (7) based upon subscriber status or service tariff. In other words, if the subscriber is requesting access to corporate services, then it is determined that the subscriber is a valid and current employee with the corporate. Alternatively, if the subscriber is requesting paid services, then the subscriber may be asked to confirm that he or she agrees to pay a particular tariff for access to the services.
The service centre then generates a dataset which represents a modification to the stored user service-access profile and either transmit this modification back to the subscriber to enable access to the sought one or more services, or a new total service access profile is sent to the subscriber to replace the existing service access profile. The same method as described with reference to FIG. 3 may be used to cancel the complete service access profile in the instance that a request is made to access services by an unauthorised person requesting service access.
This has particular application in the instance when the mobile phone or PDA in question is reported stolen, or when a person is no longer an employee of a particular company and access to corporate services are to be withdrawn.
It is important to consider the roll out or implementation of this invention in relation to the existing capabilities and functionality of mobile phones and PDAs. The invention is best implemented using a downloadable software application program such as a Java Applet which will modify the user interface and store and update and reference the stored user profile.
In this first phase, a digital photo captured by the phone camera is sent by MMS to an IP address or mobile phone number which is associated with a network element such as data processing centre which will receive and process the captured MMS image. The digital image received by the network element will be processed for its data content and a dataset will be generated and compared to pre-stored datasets and data will be sent back to the mobile phone which sent the MMS.
Sufficient redundancy exists within the encoded image that the entire datagram image can be reconstructed from a blurred or incomplete image. In this way, the success of the method and its use as a service-enabling technology is greatly extended and not dependent upon perfect in-focus capture of 100% of the encoded image for it to work. In particular, the design of the image encoding is chosen to address this issue of data extraction from blurred images. Different levels of processing to extract data from a blurred or incomplete image may be required dependent upon the application such as where the encoded image to be captured is large or small.
From the device perspective, there are many ways to implement the functionality of the invention upon existing mobile phones or PDAs or wireless-enabled laptops etc. The requirements are that the wireless device has a digital camera and can transmit data and or MMS messages.
From a consumer perspective, the subscriber may have initially registered for the service capability (paying an opt-in fee) and will register an email address etc. Subscribers may then receive an invite to the service and only need REPLY to receive an application program such as a Java applet. The Java applet self-loads and links to saved IP addresses or phone numbers in the phone's address book. From a business perspective, an employee may be given a mobile phone or PDA which already has on it specified user-profile service access privileges and links to a corporate email account.
It is anticipated that different service privileges may be associated with different IP addresses or destination fixed or mobile phone numbers. In this way the control of service access privileges may be distributed among different service companies.
While the present invention has been described herein with reference to particular embodiments thereof, a latitude of modification, various changes, and substitutions are intended in the present invention. In some instances, features of the invention can be employed without a corresponding use of other features, without departing from the scope of the invention as set forth. Therefore, many modifications may be made to adapt a particular configuration or method disclosed, without departing from the essential scope and spirit of the present invention. It is intended that the invention not be limited to the particular embodiments disclosed, but that the invention will include all embodiments and equivalents falling within the scope of the claims.

Claims

Claims:
1. A secure wireless service activation or control equipment access system comprising a user wireless data acquisition device (203) comprising a digital camera further comprising a pre-programmed decoding and/or encoding and/or formatting software and a user access profile for capturing encoded datagram images and making a dataset for encoding a local transmission according to said user access profile and processing said dataset in accordance with said stored user access profile (DN) characterised by: a wireless transponder device, physically associated with said encoded datagram images further containing data (D) relating to a service activation or control equipment access, wherein said wireless transponder device further comprising means for directly allowing said service activation or control equipment access, by exchanging one or a plurality of short range encoded signal messages between said user wireless data acquisition device (203) and said wireless transponder device, a remote server (302) associated with said wireless data acquisition device for managing the access rights of a user further comprising a database of the profile and access rights linked to each user wherein access is granted to said requested service or said control equipment is activated either following exchange of messages between the device (203) and the transponder or access is granted following exchange of messages between the device (203) and the remote server and subsequent exchange of messages between the device (203) and the transponder.
2. A secure wireless service activation or control equipment access system as disclosed in claim 1 wherein said user being a consumer or subscriber, or a company employee having access rights to said service activation or control equipment, wherein said user providing data to register for the service and downloading an application program or a Java applet, wherein said program or Java applet is self-loading and saving IP addresses and/or phone numbers in the memory of said wireless data acquisition device (203), or said user being an employee being given a pre-programmed wireless device such as a mobile phone or multimedia computer or PDA wherein said device contains a specified user-profile giving service access privileges according to the job function of said employee.
3. A secure wireless service activation or control equipment access system as disclosed in claim 1 wherein said wireless data acquisition device being a PDA or a mobile phone or a multimedia computer or a laptop, and said wireless transponder device transmission with said wireless data acquisition device (203) being via Bluetooth and/or Infra Red and/or WLAN and/or WIMAX and/or wireless USB, and/or a telecommunications cellular network transmission.
4. A secure wireless service activation or control equipment access system as disclosed in claim 1 wherein said datagram being printed on the surface of or nearby said wireless transponder device, or displayed on a screen and/or comprising redundancy for allowing said entire datagram to be reconstructed from a blurred or incomplete image.
5. A secure wireless service activation or control equipment access system as disclosed in claim 1 wherein said remote server (302) comprising a message transaction server (301) further comprising a data processing centre hosting said plurality of profiles of said plurality of subscribers wherein each of said subscriber having access to one of a plurality of network service activation, or control equipment access according to the profile of said user.
6. A secure wireless service activation or control equipment access system as disclosed in claim 1 wherein said service or control equipment being access to product information and/or operation of a car park barrier or effecting a vending machine purchase, or unlocking a door of a building or vehicle, or activation of an ATM cash point machine, or confirmation of travel payment for public transport or bus or train or plane, or a hospital patient record inspection system.
7. A secure wireless service activation or control equipment access system as disclosed in claim 6 wherein said service being a secure transaction for an ATM cash point machine comprising on the screen of said ATM cash point machine said encoded datagram image, or shown adjacent to the screen of the ATM cash point machine said encoded datagram image wherein for making withdrawal from said ATM cash point machine said user wireless data acquisition device (203) capturing and processing said encoded datagram image with said profile data and further transmitting new encoded data to said wireless transponder device by Bluetooth or infra red or other radio transmission for securely authenticating and allowing said user to execute said withdrawal and/or said authentication incorporating an access code entered by said user through the keypad of said ATM cash point machine and/or said authentication involving an exchange of messages between the said device (203) and the remote server and/or an exchange of user input data.
8. A secure wireless service activation or control equipment access system according to claim 5 wherein said encoded datagram image being printed and/or embossed and or perforated and or cut into the surface of tickets or licences or documents or credit cards or bank notes or security documents or product packaging.
9. A secure wireless service activation or control equipment access method comprising a user wireless data acquisition device (203) comprising a digital camera further comprising a pre-programmed decoding and/or encoding and/or formatting software and a user access profile comprising the steps of:
(1) capturing an encoded datagram image and computing a dataset for encoding a local transmission according to said user access profile, and
(2) processing said dataset in accordance with said stored user access profile (DN), said method being characterised by the steps of:
(3) generating an encoded dataset f(Denc) wherein said encoded dataset f(Denc) being a function of the data (D) extracted from said encoded datagram image correlated with the number of available services or control equipment access rights from 1 to N and the subset of services (Sn) said user having rights of access to, wherein
(4) encoding and transmitting said encoded dataset f(Denc) to a wireless transponder wherein said transmission being via Bluetooth and/or Infra Red and/or WLAN and/or WIMAX and/or wireless USB, and/or via a telecommunications cellular network.
10. A secure wireless service activation or control equipment access method according to claim 9 further comprising the steps of
(5) receiving said encoded dataset f(Denc) by said wireless transponder, and
(6) validating said encoded dataset f(Denc) by a processing unit associated with wireless transponder, comparing the encoded dataset f(Denc) with local decrypted data,
(7) granting and activating said service or equipment access when said encoded dataset f(Denc) comprising authenticated data.
11. A secure wireless service activation or control equipment access method according to claim 9 wherein said user profile being pre-programmed into said wireless data acquisition device (203) and stored in a memory chip as firmware, or said profile being received over the air interface as a multimedia message service (MMS) or data message or via a data packet stream and stored in accordance with a service profile update received by said user, or said user profile being requested in real time from a remote data centre.
12. A secure wireless service activation or control equipment access method comprising a user wireless data acquisition device (203) comprising a digital camera further comprising a pre-programmed decoding and/or encoding and/or formatting software and a user access profile comprising the steps of:
(1) capturing an encoded datagram image and computing a dataset for encoding a local transmission according to said user access profile, and
(2) processing said dataset in accordance with said stored user access profile (DN), said method being characterised by the steps of:
(3) generating an encoded dataset f(Denc) wherein said encoded dataset f(Denc) being a function of the data (D) extracted from said encoded datagram image correlated with the number of available services or control equipment access rights from 1 to N and the subset of services Sn said user having rights of access to,
(4) displaying a visible dataset (202) on said wireless data acquisition device screen (204) of said decoded dataset from said data encoded dataset f(Denc) associated with said data-encoded image.
13. A secure wireless service activation or control equipment access method according to claim 12 further comprising the steps of
(5) comparing said decoded displayed dataset (204) with said visible dataset (202) wherein said visible dataset (202) being located on a structure or device adjacent to said data-encoded image, and/or
(6) encoding and transmitting said decoded dataset (204) and said visible dataset (202) to a remote server (302) for authentication.
14. A secure wireless service activation or control equipment access method according to claim 13 further comprising the steps of
(7a) if said decoded dataset and said displayed dataset (202) do correspond with each other then no action is taken,
(7b) if said extracted dataset and said displayed dataset (202) do not correspond, generating an alarm, wherein said alarm being visible and/or audible and/or a message transmitted to a remote data processing centre wherein said message may be one or more of: an MMS message; a data message; a photograph of said user requesting activation of equipment or access to service taken from an associated camera device in the vicinity of the said datagram image.
15. A secure wireless service activation or control equipment access method according to claim 13 wherein said user being a consumer or subscriber or a company employee having corporate rights to said service activation or control equipment access according to job function, wherein said user providing data to register for the service and downloading an application program or a Java applet, wherein said program or Java applet is self-loading and saving IP addresses and/or phone numbers in the memory of said wireless data acquisition device (203), or said user being an employee being given a pre-programmed wireless device such as a mobile phone or multimedia computer or PDA wherein said device contains a specified user-profile giving service access privileges according to the job function of said employee.
16. A secure wireless service activation or control equipment access method according to claim 14 wherein said step (7b) further comprising the step of
(8) cancelling said user profile from said user profile database and or sending a transmission to the wireless data acquisition device (203) to deactivate the service.
17. A secure wireless service activation or control equipment access method according to claim 15 wherein said encoded datagram image being printed and/or embossed and or perforated and or cut into the surface of tickets or licences or documents or credit cards or bank notes or security documents or product packaging.
PCT/GB2007/004446 2006-11-23 2007-11-21 System and method for data acquisition and processing WO2008062179A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP07824658A EP2100427A2 (en) 2006-11-23 2007-11-21 System and method for data acquisition and processing
US12/516,150 US20100052844A1 (en) 2006-11-23 2007-11-21 System and method for data acquisition and processing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0623346.4 2006-11-23
GBGB0623346.4A GB0623346D0 (en) 2006-11-23 2006-11-23 System & method for data acquisition and processing

Publications (2)

Publication Number Publication Date
WO2008062179A2 true WO2008062179A2 (en) 2008-05-29
WO2008062179A3 WO2008062179A3 (en) 2008-07-31

Family

ID=37636363

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2007/004446 WO2008062179A2 (en) 2006-11-23 2007-11-21 System and method for data acquisition and processing

Country Status (4)

Country Link
US (1) US20100052844A1 (en)
EP (1) EP2100427A2 (en)
GB (1) GB0623346D0 (en)
WO (1) WO2008062179A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008135764A1 (en) * 2007-05-08 2008-11-13 Philip Wesby System and method for data acquisition and processing
WO2015135793A1 (en) 2014-03-12 2015-09-17 Thales Method of controlling access to a reserve zone with control of the validity of an access entitlement installed in the memory of a mobile terminal
CN115001992A (en) * 2022-05-16 2022-09-02 成都华迈通信技术有限公司 Gateway data acquisition method and system, readable storage medium and electronic equipment
CN115001992B (en) * 2022-05-16 2024-04-05 成都华迈通信技术有限公司 Barrier gate data acquisition method, system, readable storage medium and electronic equipment

Families Citing this family (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8094021B2 (en) * 2008-06-16 2012-01-10 Bank Of America Corporation Monetary package security during transport through cash supply chain
US7965184B1 (en) 2008-06-16 2011-06-21 Bank Of America Corporation Cash handling facility management
US9024722B2 (en) * 2008-06-16 2015-05-05 Bank Of America Corporation Remote identification equipped self-service monetary item handling device
US20100261465A1 (en) * 2009-04-14 2010-10-14 Rhoads Geoffrey B Methods and systems for cell phone interactions
US8805110B2 (en) 2008-08-19 2014-08-12 Digimarc Corporation Methods and systems for content processing
US8929877B2 (en) 2008-09-12 2015-01-06 Digimarc Corporation Methods and systems for content processing
US8210429B1 (en) 2008-10-31 2012-07-03 Bank Of America Corporation On demand transportation for cash handling device
JP2010142572A (en) * 2008-12-22 2010-07-01 Toshiba Tec Corp Commodity display position alert system and program
US8989705B1 (en) 2009-06-18 2015-03-24 Sprint Communications Company L.P. Secure placement of centralized media controller application in mobile access terminal
US9041511B2 (en) * 2011-05-03 2015-05-26 Verizon Patent And Licensing Inc. Facility management using mobile devices
US8712407B1 (en) 2012-04-05 2014-04-29 Sprint Communications Company L.P. Multiple secure elements in mobile electronic device with near field communication capability
US8504097B1 (en) * 2012-05-03 2013-08-06 Sprint Communications Company L.P. Alternative hardware and software configuration for near field communication
US8494576B1 (en) * 2012-05-03 2013-07-23 Sprint Communications Company L.P. Near field communication authentication and validation to access corporate data
US9027102B2 (en) 2012-05-11 2015-05-05 Sprint Communications Company L.P. Web server bypass of backend process on near field communications and secure element chips
US8862181B1 (en) 2012-05-29 2014-10-14 Sprint Communications Company L.P. Electronic purchase transaction trust infrastructure
US9282898B2 (en) 2012-06-25 2016-03-15 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US9066230B1 (en) 2012-06-27 2015-06-23 Sprint Communications Company L.P. Trusted policy and charging enforcement function
US8649770B1 (en) 2012-07-02 2014-02-11 Sprint Communications Company, L.P. Extended trusted security zone radio modem
US8667607B2 (en) 2012-07-24 2014-03-04 Sprint Communications Company L.P. Trusted security zone access to peripheral devices
US8863252B1 (en) 2012-07-25 2014-10-14 Sprint Communications Company L.P. Trusted access to third party applications systems and methods
US9183412B2 (en) 2012-08-10 2015-11-10 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US8954588B1 (en) 2012-08-25 2015-02-10 Sprint Communications Company L.P. Reservations in real-time brokering of digital content delivery
US9015068B1 (en) 2012-08-25 2015-04-21 Sprint Communications Company L.P. Framework for real-time brokering of digital content delivery
US9215180B1 (en) 2012-08-25 2015-12-15 Sprint Communications Company L.P. File retrieval in real-time brokering of digital content
US8752140B1 (en) 2012-09-11 2014-06-10 Sprint Communications Company L.P. System and methods for trusted internet domain networking
US9578664B1 (en) 2013-02-07 2017-02-21 Sprint Communications Company L.P. Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system
US9161227B1 (en) 2013-02-07 2015-10-13 Sprint Communications Company L.P. Trusted signaling in long term evolution (LTE) 4G wireless communication
US9104840B1 (en) 2013-03-05 2015-08-11 Sprint Communications Company L.P. Trusted security zone watermark
US8881977B1 (en) 2013-03-13 2014-11-11 Sprint Communications Company L.P. Point-of-sale and automated teller machine transactions using trusted mobile access device
US9613208B1 (en) 2013-03-13 2017-04-04 Sprint Communications Company L.P. Trusted security zone enhanced with trusted hardware drivers
US9049013B2 (en) 2013-03-14 2015-06-02 Sprint Communications Company L.P. Trusted security zone containers for the protection and confidentiality of trusted service manager data
US9049186B1 (en) 2013-03-14 2015-06-02 Sprint Communications Company L.P. Trusted security zone re-provisioning and re-use capability for refurbished mobile devices
US9374363B1 (en) 2013-03-15 2016-06-21 Sprint Communications Company L.P. Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device
US9021585B1 (en) 2013-03-15 2015-04-28 Sprint Communications Company L.P. JTAG fuse vulnerability determination and protection using a trusted execution environment
US8984592B1 (en) 2013-03-15 2015-03-17 Sprint Communications Company L.P. Enablement of a trusted security zone authentication for remote mobile device management systems and methods
US9191388B1 (en) 2013-03-15 2015-11-17 Sprint Communications Company L.P. Trusted security zone communication addressing on an electronic device
CN103226778A (en) * 2013-03-21 2013-07-31 刘婷 Electronic certificate acquiring and dispensing method, intelligent terminal and advisement player
US9324016B1 (en) 2013-04-04 2016-04-26 Sprint Communications Company L.P. Digest of biographical information for an electronic device with static and dynamic portions
US9171243B1 (en) 2013-04-04 2015-10-27 Sprint Communications Company L.P. System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device
US9454723B1 (en) 2013-04-04 2016-09-27 Sprint Communications Company L.P. Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device
US9838869B1 (en) 2013-04-10 2017-12-05 Sprint Communications Company L.P. Delivering digital content to a mobile device via a digital rights clearing house
US9443088B1 (en) 2013-04-15 2016-09-13 Sprint Communications Company L.P. Protection for multimedia files pre-downloaded to a mobile device
US9069952B1 (en) 2013-05-20 2015-06-30 Sprint Communications Company L.P. Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory
US9560519B1 (en) 2013-06-06 2017-01-31 Sprint Communications Company L.P. Mobile communication device profound identity brokering framework
US9183606B1 (en) 2013-07-10 2015-11-10 Sprint Communications Company L.P. Trusted processing location within a graphics processing unit
US9198041B2 (en) * 2013-08-05 2015-11-24 Nextek Power Systems, Inc. Method of and system for authenticating a user to operate an electrical device
US9208339B1 (en) 2013-08-12 2015-12-08 Sprint Communications Company L.P. Verifying Applications in Virtual Environments Using a Trusted Security Zone
US9185626B1 (en) 2013-10-29 2015-11-10 Sprint Communications Company L.P. Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning
US9191522B1 (en) 2013-11-08 2015-11-17 Sprint Communications Company L.P. Billing varied service based on tier
US9161325B1 (en) 2013-11-20 2015-10-13 Sprint Communications Company L.P. Subscriber identity module virtualization
US9118655B1 (en) 2014-01-24 2015-08-25 Sprint Communications Company L.P. Trusted display and transmission of digital ticket documentation
US9226145B1 (en) 2014-03-28 2015-12-29 Sprint Communications Company L.P. Verification of mobile device integrity during activation
US9230085B1 (en) 2014-07-29 2016-01-05 Sprint Communications Company L.P. Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services
US9779232B1 (en) 2015-01-14 2017-10-03 Sprint Communications Company L.P. Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
US9838868B1 (en) 2015-01-26 2017-12-05 Sprint Communications Company L.P. Mated universal serial bus (USB) wireless dongles configured with destination addresses
US9473945B1 (en) 2015-04-07 2016-10-18 Sprint Communications Company L.P. Infrastructure for secure short message transmission
US9819679B1 (en) 2015-09-14 2017-11-14 Sprint Communications Company L.P. Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers
US10282719B1 (en) 2015-11-12 2019-05-07 Sprint Communications Company L.P. Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit
CN105468283A (en) * 2015-11-18 2016-04-06 广州美渠信息科技有限公司 Picture transmission method of individual fly picture touch all-in-one machine
US9817992B1 (en) 2015-11-20 2017-11-14 Sprint Communications Company Lp. System and method for secure USIM wireless network access
CN105701873B (en) * 2016-03-18 2018-03-20 北京神器科技有限公司 A kind of Non-contact attendance recording method and attendance record system
US10217084B2 (en) 2017-05-18 2019-02-26 Bank Of America Corporation System for processing resource deposits
US10275972B2 (en) 2017-05-18 2019-04-30 Bank Of America Corporation System for generating and providing sealed containers of traceable resources
US10515518B2 (en) 2017-05-18 2019-12-24 Bank Of America Corporation System for providing on-demand resource delivery to resource dispensers
US10499249B1 (en) 2017-07-11 2019-12-03 Sprint Communications Company L.P. Data link layer trust signaling in communication network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2358991A (en) * 1999-09-14 2001-08-08 Motorola Inc Wireless RF peripheral interface for a cellular communication device
US20010032251A1 (en) * 1995-07-27 2001-10-18 Rhoads Geoffrey B. Paper-based control of computer systems

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8379908B2 (en) * 1995-07-27 2013-02-19 Digimarc Corporation Embedding and reading codes on objects
US6311214B1 (en) * 1995-07-27 2001-10-30 Digimarc Corporation Linking of computers based on optical sensing of digital data
US7305104B2 (en) * 2000-04-21 2007-12-04 Digimarc Corporation Authentication of identification documents using digital watermarks
US7076083B2 (en) * 2002-12-12 2006-07-11 Eastman Kodak Company Personnel access control system
US7069000B1 (en) * 2003-02-10 2006-06-27 Flarion Technologies, Inc. Security methods for use in a wireless communications system
US7528868B2 (en) * 2003-12-18 2009-05-05 Eastman Kodak Company Image metadata attachment
US7872669B2 (en) * 2004-01-22 2011-01-18 Massachusetts Institute Of Technology Photo-based mobile deixis system and related techniques
US7142107B2 (en) * 2004-05-27 2006-11-28 Lawrence Kates Wireless sensor unit
US7957372B2 (en) * 2004-07-22 2011-06-07 International Business Machines Corporation Automatically detecting distributed port scans in computer networks
US7639135B2 (en) * 2004-10-28 2009-12-29 Microstrain, Inc. Identifying substantially related objects in a wireless sensor network
US8022822B2 (en) * 2008-06-27 2011-09-20 Microsoft Corporation Data collection protocol for wireless sensor networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010032251A1 (en) * 1995-07-27 2001-10-18 Rhoads Geoffrey B. Paper-based control of computer systems
GB2358991A (en) * 1999-09-14 2001-08-08 Motorola Inc Wireless RF peripheral interface for a cellular communication device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008135764A1 (en) * 2007-05-08 2008-11-13 Philip Wesby System and method for data acquisition and processing
WO2015135793A1 (en) 2014-03-12 2015-09-17 Thales Method of controlling access to a reserve zone with control of the validity of an access entitlement installed in the memory of a mobile terminal
FR3018655A1 (en) * 2014-03-12 2015-09-18 Thales Sa METHOD FOR CONTROLLING ACCESS TO A RESERVED AREA WITH CONTROL OF THE VALIDITY OF A STOCKETED ACCESS TITLE IN THE MEMORY OF A MOBILE TERMINAL
US10491600B2 (en) 2014-03-12 2019-11-26 Thales Method of controlling access to a reserve zone with control of the validity of an access entitlement installed in the memory of a mobile terminal
CN115001992A (en) * 2022-05-16 2022-09-02 成都华迈通信技术有限公司 Gateway data acquisition method and system, readable storage medium and electronic equipment
CN115001992B (en) * 2022-05-16 2024-04-05 成都华迈通信技术有限公司 Barrier gate data acquisition method, system, readable storage medium and electronic equipment

Also Published As

Publication number Publication date
WO2008062179A3 (en) 2008-07-31
EP2100427A2 (en) 2009-09-16
US20100052844A1 (en) 2010-03-04
GB0623346D0 (en) 2007-01-03

Similar Documents

Publication Publication Date Title
US20100052844A1 (en) System and method for data acquisition and processing
US7708194B2 (en) Virtual wallet
US9516017B2 (en) System and device for consolidating SIM, personal token, and associated applications for electronic wallet transactions
US20140351596A1 (en) Method, system and apparatus for authenticating user identity
US20110089233A1 (en) Device and process for the authentication of authorizations or enablement of a person with the use of a mobile communication device
US7757943B2 (en) Combined payment/access-control instrument
US20130087612A1 (en) Method and devices for the production and use of an identification document that can be displayed on a mobile device.
US20110238579A1 (en) System and device for facilitating a secure transaction with a validated token
US20040019571A1 (en) Mobile communication device with electronic token repository and method
US20120130901A1 (en) System and method for consolidating identification and transaction functions on a communication device
US20110238580A1 (en) System and device for consolidating sim, personal token, and associated applications for secure transmission of sensitive data
WO2012125477A2 (en) System and device for facilitating a transaction by consolidating sim, personal token, and associated applications for electronic wallet transactions
US8874482B2 (en) Deposit permissions for specific non-account holders
CN104246805A (en) Electronic transaction method
US8635159B1 (en) Self-service terminal limited access personal identification number (“PIN”)
JP4371084B2 (en) ATM usage limit setting method, ATM usage limit setting device, and ATM usage limit setting program
CA2920718A1 (en) Portable verifiable credentials and methods thereof
JP2004206703A (en) Authentication system and authentication method using code, and service provision device
JP2002324219A (en) Card authentication system
KR20090000819A (en) System and method for finance transaction scene information and program recording medium
US20220353084A1 (en) Multifactor authentication through cryptography-enabled smart cards
JP2002215827A (en) Storage and utilization method of electoronic document
KR20040086026A (en) banking service system of using mobile terminal and method thereof
WO2001006747A1 (en) Method and system for identifying a juridical person
EP3588413A1 (en) Identification method with strong authentication for the enabling of a computer system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07824658

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 12516150

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007824658

Country of ref document: EP