InvestorsHub Logo

jonesieatl

10/14/08 7:01 PM

#149539 RE: 6piecekit #149538

MC2 breathes , wow.

I thought rigor mortis had set in.

Always funny how those who don't seem to actually do anything (NeoMedia, MC2) put out these blurbs talking about how they led the initiatives.

streetstylz

10/14/08 7:05 PM

#149540 RE: 6piecekit #149538

Nice find 6piecekit


(Page 7)

* 2D Barcodes can be used in a direct or indirect mode. The indirect mode enables new business models as it relies on a network server to resolve the identifier and can enrich the information associated to the end user in a secure manner.

* While the direct mode provides an easily deployable solution, there are potential security risks, and an indirect mode solution would provide a safe, secure and trusted environment.

* Under an indirect mode, regional and international interoperability is needed to ensure good customer experience. Ubiquitous service availability across networks is key to sustained market uptake.

* There is currently no standard for indirect mode and therefore there is a need for standardization of all the elements and actors of the indirect mode, including the authority entity.


Is NeoMedia considered the authority entity? They certainly have the patents covering the indirect mode.


Best,
Sean





Personalizit

10/14/08 7:20 PM

#149542 RE: 6piecekit #149538

Lots of good stuff in here(I put a few in this post):
http://www.gsmworld.com/documents/barcodes_2d.pdf
**Page 7:
"While the direct mode provides an easily deployable solution, there are potential security risks, and an indirect mode solution would provide a safe, secure and trusted environment"
**Page 14:
"7.1 Security
2D Barcodes are capable of storing direct content that the code reader application can
interpret locally, such as a URL or a phone number.
Although not yet in the mass market, the sensitivity of barcodes e.g. 2D Barcodes against
phishing or other attacks is already in the public 1 domain.
In order to avoid malevolent usage of the service and to increase the difficulty that intruders
face in hacking 2D barcodes, it is necessary to establish some kind of inherent security
within the 2D Barcode Data Structure. Therefore, only 2D Barcodes created by a known
server can guarantee the end user a secure environment.
2D Barcodes can also store a reference and always contact a trusted server to resolve the
reference. In this scenario the policing mechanisms and the content control can reside on the
trusted server side. The server would check the validity of the 2D Barcode as well as the
nature of the 2D Barcode and even possibly provide feedback to the end user prior to the
final content discovery.
Security plays a crucial role in the 2D Barcode ecosystem. The end user must feel safe when
scanning a 2D Barcode, having the guarantee of a trusted service behind the 2D barcode.
The end user will, in some cases incur a charge when invoking a 2D Barcode. Therefore a
trusted environment is needed in order to create this element of end user trust.
The above gains even more importance if any m-commerce / payment scenario is used,
since the user expects a secure service"
**Page 15:
"The GSMA recommends that the OMA takes into account the existing coding scheme logics
when defining the 2D Barcode data format, e.g. NFC 3. In addition, the OMA will investigate
all current alternative coding schemes for use with 2D Barcodes, and after such investigation
will make a decision and recommendation as to the preferred method."

**Page 18:
"The following list depicts the distinct attributes of the indirect mode where by a new business
model can flourish:
• Since there is a correlation between the size of the bar code and the amount of data
encoded, 2D Bar codes using aliases/identifiers (which are small in nature) enable
user scenarios where space is at a premium
• Enhanced security preventing misdirection to inappropriate or malicious contents
• Location: user / handset location – location based services e.g. in conjunction with
future GPS services
• The indirect mode provides a controlled end to end service scenario. Using these
control points CMP (code management platform) gives rise to the ability to cost defray
to the end user. Cost defraying may be performed at a granular level or using other
secure interactive scenarios
• Linkage to mobile user subscription profile (demographics , M-Commerce,
Authentication …)
• User data information collection / marketing
• Ease of combining the above information, tailored to advertising campaign / usage
scenario
• Support of language translation (international scenario).
The aforementioned points above highlight the ability for the indirect mode to:
• Support existing direct mode business
• Enable new 2D Bar code service scenarios
Enhance current business models and therefore provide additional revenue opportunities for
all parties value chain."
**Page 22:
"8.4 Use case examples
In order to show the future possibilities of the 2D Barcodes, two different use cases have
been selected. The two selected use cases show reasons for choosing the indirect mode,
being more comprehensive and providing more service opportunities.
-8.4.1 Payment use case
_8.4.2 Location – Profiling use case


"A salesman's motto: If you throw enough mud against the wall, some of it's bound to stick."

JPetroInc

10/14/08 10:27 PM

#149556 RE: 6piecekit #149538

Great coverage and shared posts on the MC2 initiatives. What will be interesting to see is how CTIA's white paper findings will square off with the GSMA/OMA white paper...

All the Best, JP