Tag: QR Codes

Troubleshooting in-app QR-code scanning on your phone

Service Victoria contact-tracing QR code sign at Fairfield Primary School

The Service Victoria QR-code contact-tracing system was one of those app-based QR code setups that may not work properly if your phone’s QR code recognition subsystem isn’t working

A situation that happened with my Android phone recently was that the Services Victoria QR code app failed to recognise a check-in QR code even though it has normally been doing that before. I had to then resort to entering the venue-specific manual-entry code printed below the QR code on the signage to begin the check-in process for that area.

This problem can also happen with something like WhatsApp, Signal or something similar when you are attempting to bind a desktop or other secondary client device to your service’s account. This also extends to Wi-Fi Easy Connect setups that allow you to enrol your phone or another device in to a desired Wi-Fi network.

It can also happen with book+app setups used with interactive books, second-screen apps that are part of interactive-TV setups, or some app-driven coupon systems that are dependent on recognising QR codes for their functionality. Even setting up app-based multi-factor or password-free authentication is dependent on QR codes when you are provisioning that mobile-based authentication app with an online service.

In use cases like WhatsApp, there may not be any alternative like a human-readable code or an NFC tag to use as an alternative to scanning a QR code. This would then make the app or function useless for its intended purposes.

The situation described here is that a QR-code-dependent app that was previously recognising QR codes for that associated system fails to recognise them.

But how did I troubleshoot this problem further?

A lot of these apps that have QR-code scanning functionality are dependent on functionality within iOS or Android that works with the camera to recognise these codes and make them useful for software on your phone. This is to avoid the need for the software developer to reinvent the wheel when it comes to adding this functionality to their apps.

WhatsApp and Signal's relationship with their desktop clients

.. as can setting up Signal or Whatsapp to work with your regular computer or iPad

But if this fails, the apps that depend on this functionality don’t perform as expected when you attempt to scan a QR code with them. This is even though they have enabled the camera and are passing through the vision to the app’s “viewfinder” window. Of course you might think that the rear camera’s lens is dirty or scratched or you are attempting to scan a poor-quality reproduction of the code.

One way to troubleshoot this kind of situation is to scan this kind of code with a dedicated QR-code scan app that is part of your phone’s operating system. Most Android users would have this as part of the Quick Settings menu. Here, this app has the camera behave in a manner optimised for scanning barcodes and QR codes as if it is called upon by one of these QR-dependent apps.

On some platforms, the Camera app’s QR-code recognition function may behave differently due to it using different in-app software from what is part of your phone’s operating system. This is due to the camera software working on a “photography first” approach rather than a “barcode scanning first” approach.

If this app fails to recognise any QR code, you are dealing with a situation where the software processes associated with QR-code recognition crashing or hanging. This situation may happen with other software on your phone underperforming or behaving in an abnormal manner. Here, you may find that it is a good idea to fully restart your phone, which will effectively get everything to a known point.

In this case, you would have to shut down then restart your phone so as to cause it to fully restart. You should see your phone’s manufacturer or operating system logo appear on the screen as part of the restart process.

After the phone is restarted completely, attempt to scan any QR code with the above-mentioned dedicated QR-code scan app that is part of your phone’s operating system. Usually that will succeed after you have restarted your phone due to the necessary software processes being restarted.

You may have also had to deal with a software update for the QR-code recognition software as part of a software-quality or security update for your phone’s operating system. It is typically to rectify any bugs or security exploits in the affected software or simply to “tune up” the software for better performance.

If that succeeds, attempt to scan the QR code using the app you had problems with so you can identify whether that app is at fault or not. It is also a good idea to check for new versions of this app by visiting your mobile platform’s app store and checking for software updates.

The need for a software update for that app may be due to the app’s developers re-engineering it to take advantage of newer QR-code-recognition software libraries, and may also have to apply for any QR-code-dependent apps on your phone. It is although the revised software libraries are most likely written to support “legacy” application software but offer a “new way in” for newer apps.

In the case of your jurisdiction’s contact-tracing check-in app, you may have to do a Google image search for QR codes relating to that platform. Here, some of these images will represent a sharp-enough representation of a “production” QR code at a known place. Or a club or similar organisation may have set up and posted a “test” or “set-up” code to help members with the onboarding process for the contact-tracing check-in platform.

Conclusion

Your phone not working properly with QR codes may not be just a camera or lens problem but software associated with this functionality that simply had stalled or crashed. Here, you may find that you simply restart your phone to gain full functionality.

Wi-Fi EasyConnect and EasyMesh are now updated further

Articles

Linksys MR7350 Wi-Fi 6 Mesh Router press picture courtesy of Belkin

Wi-Fi EasyConnect to be upgraded to simplify Internet-of-things setup

Wi-Fi Alliance debuts improvements to Wi-Fi mesh and IoT device onboarding | Wi-Fi NOW

From the horse’s mouth

Wi-Fi Alliance

Wi-Fi Alliance® connects and expands home Wi-Fi® (Press Release)

My Comments

Improvements to EasyConnect

Most of us may think of Wi-Fi EasyConnect as simply scanning a QR code with your smartphone to get your smartphone on to a Wi-Fi network that you want to use. Or it could be about using a smartphine app to scan a QR code on a device you want to bring on board to your home network that your phone is connected to.

But this week the Wi-Fi Alliance have cemented in stone ways of using WI-Fi EasyConnect to bring devices on board to your network. You still have to use a “configurator” program which could be an app on your smartphone to bring devices, known as “enrollees” on board to that network or to join that network yourself.

A Wi-Fi EasyConnect setup can support multiple “configurator” programs which will cater to environments where different software has different capabilities. As well, the standard allows a “configurator” program to work with multiple networks, allowing for realities like an individual ESSID for each waveband or people who are responsible for multiple networks.

Telstra Smarty Modem Generation 2 modem router press picture courtesy of Telstra

.. and to even build out Wi-Fi EasyMesh distributed-wireless networks simply

Here, NFC “tap-and-go” pairing and Bluetooth LE pairing is part of the standard. As well, you can transcribe a PIN or passcode shown on the device or attached to a label on that device to enrol the device to your home network. For cloud-driven device platforms like Amazon Echo, the cloud platform downloads the device identifying details to your computing device to facilitate binding it to your Wi-Fi network.

Android users may be familiar with NFC-based device pairing when they set up some Bluetooth headsets with their phones or tablets. That is where you touch your Android smartphone or tablet to the headset to start the pairing and setup process.

But there currently isn’t support for showing a PIN or passcode on the configuration software for you to transcribe in to your device you are intending to bring on board your Wi-FI home network. Such a procedure could come in to its own with devices that have a keypad or keyboard as part of their control surface, examples being smart locks or TVs that have “many-button” remote controls.

For people who manage enterprise and building networks, Wi-FI EasyConnect is updated also to allow you to onboard devices to your WPA3-Enterprise Wi-Fi business network. Here the network would have to support EAP-TLS and implement X.509 digital certificates. It is to cater towards a reality where business owners and building managers want to bring “Internet-of-Everything” devices which don’t have a rich user interface on to these networks while keeping these networks secure.

For that matter, users of devices running Android 10 or newer versions stand to benefit from Wi-FI EasyConnect in some ways without the need for extra apps to be downloaded from the Google Play Store. Here, they can use their smartphone or tablet to scan a QR code that represents their target network’s Wi-Fi details to accede to that network. Or they can scan a QR code on a Wi-Fi-capable device they want to bring to the network they are using as long as this device supports Wi-Fi EasyConnect.

It is part of making sure that Wi-Fi EasyConnect works as part of the Wi-Fi WPA3 link-layer security specifications which will be required for a Wi-Fi 6 or Wi-Fi 6 wireless-network segment to operate to specification.

The support for Wi-Fi EasyConnect that needs to come about is to have other mobile and desktop operating systems support this standard in some capacity, preferably in a native form. This would have to include using Bluetooth as an alternative to QR codes as a method of sharing Wi-Fi network credentials from a mobile device to a laptop or tablet.

Improvements to EasyMesh

Wi-Fi EasyMesh distributed-wireless setups now support onboarding of new access points using Wi-Fi EasyConnect methods. This means that the same user interface that is needed to get a computer or IoT device on your home network applies to Wi-FI network-infrastructure devices compliant to this standard. It will also be part of making sure that a Wi-Fi EasyMesh network works to the current WPA3 security expectations.

This is in addition to each of the access points in an EasyMesh setup being able to share advanced metrics about how the network is performing as a whole. Here, it will come in to play with those Wi-Fi networks that are managed or supported by other entities like business Wi-Fi.

Conclusion

The revisions to the Wi-Fi EasyConnect and EasyMesh standards are more about simplifying the process to bring Internet-of-Things devices on board to your WPA3-compliant home or business network. It is also about simplifying the process to build out your EasyMesh-compliant distributed wireless network with multiple satellite repeater units.

But what needs to happen is for more software and hardware support for these standards in order that they become increasingly accepted within the marketplace.

Across-the-room data transfer–many questions need to be answered

Transfer data between two smartphones

Wirelessly transferring data between two devices in the same space

The industry has explored various methods for achieving point-to-point across-the-room data transfer and user discovery. This would avoid the need to use the Internet or a mobile phone network to share a file or invite another user to a game or social network. Similarly, it would be a way to exchange data with a device like a printer or an interactive advertising setup in order to benefit from what that device offered.

Methods that have been tried

The first of these was IrDA infra-red transfer working in a similar to how most TV remote controls work to allow you to change channels without getting off the couch. This was exploited by the legendary Palm Pilot PDA and some of the Nokia mobile phones as a way to “beam” one’s contact details to a friend or colleague with the same device.

Bluetooth pushed forward with the Object Push Profile and File Transfer Profile as methods for exchanging data across the room. This was typically useful for contact details, low-resolution photos or Weblinks and was exploited with the popular feature phones offered by the major phone manufacturers through the 2000s. This method was also exploited by the out-of-home advertising industry as a way to convey Weblinks or contact details from a suitably-equipped poster to suitably-equipped mobile phones set to be discoverable.

But Apple nipped this concept in the bud when they brought out the highly-popular iPhone. The concept has been kept alive for the regular-computer operating systems and for Android mobile applications but mobile users who want to exchange data would have to ask whether the recipient had an Android phone or not.

Bluetooth also implemented that concept with the 4.0 Low Energy Profile standard by using “beacons” as a location tool. But this would be dependent on application-specific software being written for the client devices.

Microsoft is even reinstigating the Bluetooth method to transfer files between two computers in the same room as part of the functionality introduced in the Windows 10 April Update. But I am not sure if this will be a truly cross-platform solution for Bluetooth as was achieved with the earlier Object Push Profile or File Transfer Profile protocols.

Apple tried out a method similar to Bluetooth Object Push Profile called AirDrop but this implemented Wi-Fi-based technology and could only work with the Apple ecosystem. It was associated with “cyberflashing” where lewd pictures were forced out to unsuspecting recipients and Apple implemented a “contacts only” function with contacts’ emails verified against their Apple ID email logins as a countermeasure against this activity.

QR Code used on a poster

QR codes like what’s used on this poster being used as a pointer to an online resource

The QR code which is a special machine-readable 2D barcode has the ability to convey contact details, Weblinks, Wi-Fi network parameters and other similar data to mobile phones. These can be printed on hard-copy media or shown on a screen and have a strong appeal with business / visiting cards, out-of-home advertising or even as a means for authenticating client devices with WhatsApp.

Facebook even tried implementing QR codes as a way to share a link to one’s Profile or Page on that social network. Here, it can be a secure method rather than hunting via email or phone number which was raised as a concern with the recent Facebook / Cambridge Analytica data-security saga,

The Android and Windows communities looked towards NFC “touch-and-go” technology where you touch your phones together or touch an NFC card or tag to transfer data. This has been exploited as a technique to instigate Bluetooth device pairing and implemented as a method of sharing contact data between Android and / or Windows devices. For a file transfer such as with contact details, the data itself is transferred using Bluetooth in the case of Android Beam or Wi-Fi Direct in the case of Samsung’s S Beam feature.

The Wi-Fi Alliance are even wanting to put up a Wi-Fi-based method called Wi-Fi Aware. Here, this would be used for data transfer and other things associated with the old Bluetooth Object Posh Profile.

This is implemented on a short-range device-to-device basis because users in the same room may not be connected to the same Wi-Fi Direct or Wi-Fi infrastructure network as each other. There is also the reality that a properly-configured Wi-Fi public-access network wouldn’t permit users to discover other users through that network and the fact that a typical Wi-Fi network can cover the whole of a building or a street.

But there could be the ability to enable data transfer and user discovery using Wi-Fi Aware but being able to use a Wi-Fi infrastructure network but allow the user to define particular restrictions. For example, it could be about limiting the scope of discovery to a particular access point because most of these access points may just cover a particular room. Using the access points as a “scoping” tool even if the host devices don’t connect to that network could make the concept work without jeopardising the Wi-Fi infrastructure network’s data security.

Applications

There are a series of key applications that justify the concept of “across-the-room” data transfer. Typically they either involve the transfer of a file between devices or to even transfer a session-specific reference string that augments local or online activity.

The common application here is for a user to share their own or a friend’s contact details with someone else as a vCard contact-detail file. Another common application is to share a link to a Web-hosted resource as a URL. But some users also use across-the-room data transfer to share photos and video material such as family snapshots.

In the same context, it could be about a dedicated device sending or receiving a file to or from a regular computer or mobile device as outlined below for advertising. But it can also mean having a printer, NAS storage or smart TV being a destination for a file such as a photo.

In the advertising and public-relations context, “across-the-room” data transfer has been seen as a way to transfer a URL for a marketer’s Website or a visual asset to an end-user’s phone or computer. For example, the QR code printed on a poster has become the way to link a user to a media-rich landing page with further explanation about what is advertised. Similarly some out-of-home advertising campaigns implemented the Bluetooth Object Push Profile standard as a way to push an image, video or Weblink to end-users’ mobile phones.

But “across-the-room” data transfer is also being used as a way for users in the same space to discover each other on a social network or to identify potential opponents in a local or online multiplayer game. I find this as a preferred method for discovering someone to add to a social network or similar platform I am a member of so that I can be sure that I am finding the right person on that platform and they are sure about it. Also, in the case of a local multiplayer game, the players would have to continue exchanging data relating to their moves using the local data link for the duration of their game.

Facebook even explored the idea of using QR codes as a way to allow one to invite another person whom they are chatting with to be their Facebook Friend or discover their Facebook Page. It is infact an approach they are going to have to rediscover because they are closing off the users’ ability to search for people on the social network by phone number or email thanks to the Cambridge Analytica scandal.

What does the typical scenario involve?

The users who are in the same area are talking with each other about something that one of them has to offer such as contact details or a photo. Or, in the context of advertising or other similar situations, there will be some prior knowledge that there is something to benefit from knowing more about the offer using an online experience.

One of the users will invoke the transfer process by, for example, sharing the resource or hunting for a potential game opponent using their device’s user interface. The other use will share a nickname or other identifier to look out for in the list that the initial user is presented.

Then the other user will confirm and complete the process, including verifying success of that transfer and agreeing that the contents are what they were expecting. In the case of adding another user to a social network or multiplayer game, they will let the instigating user know that they have been added to that network or game.

What does a successful across-the-room data transfer or user-discovery ecosystem need?

Firstly, it needs to be cross-platform in that each device that is part of a data transfer or user/device discovery effort can discover each other and transfer data without needing to be on the same platform or operating system.

Secondly, the process of instigating or receiving a data transfer needs to be simple enough to allow reliable data transfer. Yet end-users’ data privacy should not be compromised – users shouldn’t need to receive unwanted content.

The protection against unwanted discovery or data transfer should be assured through the use of time-limited or intent-based discovery along with the ability for users to whitelist friends whom they want to receive data from or be discovered by in the wireless-based context. Intent-based discovery could be to have the recipient device become undiscoverable once the recipient device confirms that they have received the sender’s data or, in the case of a local multiplayer game, the players have completed or resigned from the game.

Conclusion

The concept of “across-the-room” data transfer and user/device discovery needs to be maintained as a viable part of mobile computing whether for work or pleasure. Where operated properly, this would continue to assure users of their privacy and data sovereignty.

Wi-Fi introduces a new way to onboard new wireless-network devices

Articles

Draytek Vigor 2860N VDSL2 business VPN-endpoint router press image courtesy of Draytek UK

A QR code and a configuration app could be the way to get your Wi-FI network going or add a device to that network

From the horse’s mouth

Wi-Fi Alliance

Wi-Fi Easy Connect (Product Page)

My Comments

The Wi-Fi Alliance has released as part of its WPA3 update for wireless-networks security the Wi-Fi Easy Connect protocol for onboarding new devices to a Wi-Fi network segment. It will work with extant WPA2 network segments as well as newer WPA3-compliant segments which offers the chance for existing Wi-FI devices to support this technology. That is alongside the ability for device manufacturers and software / operating-system developers to meld it in to their existing products using new code.

It is intended for onboarding devices that have a limited user interface including onboarding Internet-capable “white goods” and “backbone” devices like fridges or heating / cooling equipment to your Wi-Fi network. It is currently being seen as an alternative to the push-button-based WPS configuration process for devices that don’t have much in the way of a user interface. For Android smartphone users, much of this process will be similar to using a printed QR code to “onboard” your smartphone to an existing Wi-Fi wireless network.

What is it about?

QR Code used on a poster

QR codes like what’s used on this poster will be part of configuring your Wi-Fi wireless network

The main goal with the Wi-Fi EasyConnect standard is to permit a device with a rich user interface like a laptop, tablet or smartphone running suitable configuration software to pass configuration information to other devices that have a limited user interface. This can be facilitated with an independent configuration app or function that is part of the device’s operating system. Or it could be to allow configuration through the access point using its Web-based management user interface or a management app supplied by the access point’s manufacturer.

In all cases, the software that looks after the configuration aspect is described as a configurator. Access points or client devices that want to be part of the network are described as “enrollee” devices.

Android main interactive lock screen

Smartphones will become part of your Wi-Fi network’s setup or device-onboarding process

It can be feasible for one device to assume the role of a configurator or enrollee. An obvious example would be a computing device like a laptop, tablet or smartphone being able to come onboard an existing Wi-Fi network then you using that same computing device to bring another device like a network-capable fridge on board. Or you could bring a Smart TV or set-top box on-board to your Wi-Fi network using Wi-Fi Easy Connect but it then has the ability to be a “set-up point” for smartphones or tablets who want to join your Wi-FI network.

There are different ways of “associating” the enrollee device with the configurator device but it is primarily about making both devices know that they are trusted by each other.

The main method would be to use a QR code.that is on a sticker or card associated with the device or shown on the device’s display if this display is of the bitmapped graphical kind or can connect to a TV or monitor. Then the configuration device would scan this QR code if it is equipped with a camera.

Another option that is put forward is to use a text string written on a card or shown on a display and this would be used for configuration devices not equipped with a camera. This kind of situation may come in to its own if you are running a configuration program from a regular computer that isn’t equipped with a functioning Webcam.

.. as will laptops, Ultrabooks like this Dell XPS 13 and tablets

The Device Provisioning Protocol standard that is what the Wi-Fi EasyConnect feature is based on supports the use of NFC “touch-and-go” or Bluetooth Low Energy wireless link as another way to interlink a configuration device and an enrollee device during the setup phase. Both these technologies could work well with smartphone-centric applications, wireless speakers, connected building-management technology and the like. But these haven’t been placed as part of the certification testing that Wi-Fi Alliance has for the EasyConnect standard.

Once the initial information is exchanged between the devices, both devices will establish a separate secure Wi-Fi link with each other. Then the configuration software on one of the devices will use this link to pass through the parameters necessary to allow the enrollee device to connect with the extant Wi-Fi network. The whole configuration data-exchange is secured using asymmetrical public-key cryptography with the public key obtained during the initial setup process. Then that device hunts for, discovers and connects to the newly-programmed network.

There is the ability to use this same setup with an access point to set it up to work with an extant network or to create a new network. The latter situation would most likely be based around accepting a machine-generated ESSID and password or allowing the user to enter an ESSID and/or password. On the other hand, the previously-connected Wi-Fi networks list that an operating system maintains could be a data source for configuring a Wi-Fi device to a particular extant network using EasyConnect.

From the FAQs that I had read on the Wi-Fi Alliance Website, the Wi-Fi EasyConnect protocol allows for a single configuration program to configure multiple enrollee devices at once. Here, it is to facilitate situations where you are onboarding many IoT devices at once or are creating a new Wi-Fi network with new credentials.

But it doesn’t support the ability to onboard a single Wi-Fi client device to two Wi-Fi networks at once like your main network and a hotspot / guest network. Instead you have to repeat the Wi-Fi EasyConnect procedure including scanning the QR code for each network you want a device to associate with. This is so you can have greater control over what networks your devices are to associate with, but it can be of concern if you have a separate Wi-Fi network segment with distinct ESSID (network name) linking to the same logical network such as when dealing with a dual-band network with separate network names for each band.

What needs to be done

Personally, I would like to see Wi-Fi EasyConnect configuration functionality baked in to desktop and mobile operating systems including Apple’s operating systems rather than be separate programs. This avoids the need to find, download and install separate EasyConnect apps from your platform’s app store or loading a computer or smartphone with too many apps. But it could encourage other software developers to build improved Wi-Fi EasyConnect configuration apps that may, perhaps, suit particular user needs like asset control in the business-computing context.

I would also encourage the idea of maintaining WPS-PBC push-button pairing as an alternative method to Wi-Fi EasyConnect for onboarding Wi-Fi devices. This is more so for those devices that have a limited or no user interface and the goal is to quickly onboard a device without a rich user interface like a printer to a Wi-Fi router or access point.

Similarly, the use of NFC or Bluetooth as a legitimate certification option for onboarding Wi-Fi devices has to be encouraged and underscored through the life of this standard. Here, I would prefer that smartphones or tablets equipped with NFC and / or Bluetooth be tested to be compliant with the NFC and Bluetooth aspects of this standard.

There also has to be the ability with Wi-Fi EasyConnect to onboard a Wi-Fi network device with a limited user interface to an enterprise-grade Wi-Fi network that uses individual usernames and passwords. This is important for “Internet-Of-Things” devices that will increasingly be part of these networks.

Conclusion

Wi-Fi EasyConnect leads to another way of onboarding a Wi-Fi network device or access point using another device equipped with a rich user interface and can apply across all small-network setups.

Blockchain, NFC and QR codes work together as a tamper-evident seal for food

Article

Blockchain ensures that your online baby food order is legit | CNet

Video – Click or tap to play

My Comments

On this Website, I have previously covered how certain technologies that work with our smartphones are being used to verify the authenticity and provenance of various foodstuffs and premium drinks.

It has been in the form of NFC-enabled bottle tops used on some premium liquor along with smartphone apps to determine if the drink was substituted along with the supplier being able to provide more information to the customer. In France, the QR code has been used as a way to allow consumers to identify the provenance of processed meat sold at the supermarket in response to the 2013 horsemeat scandal that affected the supply of processed beef and beef-based “heat-and-eat” foods in Europe.

The problem of food and beverage adulteration and contamination is rife in China and other parts of Asia but has happened around other parts of the world such as the abovementioned horsemeat crisis and there is a perpetual question for the US market regarding whether extra-virgin olive oil is really extra-virgin. It can extend to things like whether the produce is organic or, in the case of eggs or meat, whether these were free-range or not. This has led various technologists to explore the use of IT technologies to track the authenticity and provenance of what ends up in our fridges, pantries or liquor cabinets.

The latest effort is to use blockchain which is the “distributed ledger” technology that makes bitcoin, Ethereum and other cryptocurrencies tick. This time, it is used in conjunction with NFC, QR codes and mobile-platform native apps to create an electronic “passport” for each packaged unit of food or drink. This was put together by a Chinese-based startup who created this technology in response to a cat belonging to one of the founders needing to go to the vet after eating contaminated food that the founder had bought from an eBay-like online market based in China.

The initial setup has a tamper-evident seal wrapped around the tin or other packaging with this seal having an NFC element and a QR code printed on it. A smartphone app is used to scan the QR code and it uses the NFC element which fails once the seal is broken to verify that the seal is still intact. Once this data is read on the mobile device, the food item’s electronic “passport” then appears showing what was handled where in the production chain.

At the moment, the seal is like a hospital bracelet which is sturdy enough to be handled through the typical logistics processes but is fragile enough to break if the food container is opened. This could work with most packaged foodstuffs but food suppliers could then design this technology to work tightly with their particular kind of packaging.

The blockchain-driven “passport” could be used to identify which farm was used as the source of the produce concerned, with a human-readable reference regarding the agricultural techniques used i.e. organic or free-range techniques being used. In the case of processed meat and meat-based foods, the technology can be used to verify the kind and source of the meat used. This is important for religious or national cultures where certain meats are considered taboo like the Muslim and Jewish faiths with pig-based meats, British and Irish people with horsemeat or Australians with kangaroo meat.

Once the various packaging-technology firms improve and implement these technologies, it could facilitate how we can be sure that we aren’t being sold a “pig in a poke” when we buy food for ourselves or our pets.

Using QR codes and NFC to take tourist attractions further

Article

QR Code And NFC Talking Statues | 2D Code

My Comments

London is using QR codes and NFC tags that head to Web-based links as a way of enhancing the visitors’ experience with the well-known characters’ statues. Here, the links provide experiences like Sherlock Holmes talking to you or where you can experience the Bow Bells call associated with the Dick Whittington legend.

But this could be used for various goals like having interpretation boards that “read out” the text to you, show the text in another language or provide extra detail on the attraction. Sometimes you may be able to engage in multimedia content or have the device’s GPS navigate you to another point in a pre-defined tour as part of a tour app.

It just requires the use of QR codes which work with all mobile platforms or NFC “touch-and-go” tags that work with Android and Windows 8 / Windows Phone 8 platforms linking to micro-sites that “take the attraction” further. These would them make the smartphone or tablet become more relevant when you tour an area rather than just as toys.

Implementing NFC and QR code technology to track the provenance of musical instruments

Article

FinnCode introduces NFC tracking for musical instruments | NFC World

From the horse’s mouth

Re-Ad (FinnCode)

Re-Ad Info product page

My Comments

Previously, when the horse-meat crisis hit Europe where cheaper meat cuts and meat-based “heat and eat” foods were adulterated with horse meat or other substandard meats that weren’t reflected in the label, a group of French beef farmers, a French supermarket and others put QR codes to work to track the provenance of the meat they sell. This allowed one to use their smartphone to bring up on its screen the details about that tray of beef they were to buy.

Now FinnCode have worked with Giuletti Accordions to build up an NFC / QR-code labelling system for each of their currently-made accordions in order to make it easier for a musician or potential musician to track the provenance of that instrument. It also includes not just what has come about of the instrument on the factory floor but a way of knowing who previously owned that squeezebox along with the support for a “memoirs” file so musicians can record their gig experiences with that instrument.

It also includes a stolen-instruments register so it becomes easy to know if someone is trying to pass off an instrument that was pinched from its rightful owner. I would also see this as coming in to its own when dealing with insurance claims for those instruments that were damaged in transit or to assist with inventory systems that bands, orchestras and other ensembles may use for managing their instruments.

The same data, especially the diary functionality, can be used to justify the accordion’s resale value which I see as being important with those instruments that either were played by a well-known musician or used in a well-known recording. This is a way of assuring whether one is dealing with a collectable piece.

But there are plans in place to bring it across all newer instruments of all kinds. My question with this is if there are plans in place for a person to use this registration scheme with musical instruments they already own. If this is so, it could be useful to verify that a Stratocaster that someone who is selling was played by that rock god who they claim it was used by or that a Stradivarius was used by a famous violinist to perform in that monumental recording of that symphony.

Use QR codes to point someone to your Facebook Profile

Articles

Facebook Adding QR Codes To Android App, Directing Scanners To Users’ Profiles? – AllFacebook

Facebook Adds QR Codes To Android App | 2D Code

My Comments

You are at the party or favourite bar and you have started to chat with someone very well. But you mention that you are on Facebook and they say that they are also on that same social network. You ask if it is OK to “friend them” on Facebook and they agree.

The next thing you do is ask for their name to search for them in your Facebook mobile app. This can be very difficult in a noisy environment or if they have a name that has a particular spelling or is one of many common names. Pick, pick, pick, pick, pick – you have found that person and are sending a “Friend Request”to them.

Now Facebook have improved on this for the latest version of their Android mobile client by using the QR code to simplify the profile-sharing process. Here, you bring up “Friends” in the drop-down menu. Then you tap “Find Friends” which shows the “People You May Know” list. Touch the “QR Code” button on the top right of your display to show a QR code that represents a link to your Profile.

If you are adding your companion to your Friends list, you then tap “Scan Code” and point your Android phone’s camera at the QR code that your companion is showing on their Android phone’s screen using this same client. This takes you to their Timeline which would have any “public” posts that are on it as well as the option to add them as a Friend.

I don’t see this as a controversial feature for Facebook because you have to be pulling up your Facebook Profile’s QR code in the presence of your companion who then has to use their device running the client app to scan that code – you are not intending to “friend them” behind their back.

This function could be taken further for businesses who have Facebook Pages or people who use Facebook Pages as a way to maintain a sanitised “public” profile. As well, if a person maintains a Page for their business or blog along with their personal Profile, the QR code could lead the user to a screen with an option to go to the Page which you then “like” to follow or the Profile with an option to “subscribe” (see only public Posts and Photos) or “add Friend” (be seen as a Facebook Friend with standard privileges).

Similarly, other social networks like Twitter and LinkedIn could implement this technology to allow people to attract followers or connections. NFC technology can also be exploited to achieve the same functionality as these QR codes for “there-and-then” access to contact profiles.

Using a smartphone app and a QR code to determine the provenance of that beef in France

Article – French language

Flashez votre barquette de bœuf et retrouvez son origine

My Comments

The recent meat-substitution scandal in Europe where a significant quantity of processed beef and beef-based “heat-and-eat” products sold in that area were filled out with horsemeat has put the meat industry, especially the beef industry, on edge.

But how is the meat industry going to restore consumer confidence in the beef that they are going to purchase especially from the supermarket?

A group of organisations in France have put their heads together to provide a way of checking the provenance of that tray of beef. This involved a group of beef farmers in the Pyrenees, the Vignasse et Donney software developers and the Auchan supermarket chain. With this project, there would be a database that has information on the provenance of the retail packages of meat available for sale. As well, each tray of that meat has a QR code that represents the link to the database about the meat. This would be read by a platform smartphone that runs the “Boeuf Blond D’’Aquitaine” app that shows up information about the meat package whose QR code is scanned.

It could work in restoring the necessary consumer confidence in the meat but this concerns more the sausages, the “cut-up” beef like minced (ground) beef or stir-fry strips as well as the ready-meal products like bolognese, lasagne and moussaka. Here, a lot of this class of food is prepared by third parties and it could be feasible to “balloon” the beef product with pork, oodles of fat or offal or, at worst, horse. This is more so with cheaper versions of these products; and this scandal was primarily anchored around the mislabelling of the product at various points of the preparation process.

I would see the QR-code labelling program and the provenance database being more effective with the sausages and “cut-up” beef which was prepared through the known chain of production established by the partners such as “on-demand on-site” preparation of these cuts by Auchan for example. Similarly, the DNA could be worked out for the meat and meat products and represented in to a smartphone-readable label that can be used by customers to determine the origin of the meat they are to purchase.

QR Codes–a useful tool for promoting your organisation

What are QR Codes

QR code used in a newspaper to link to its mobile site

QR code used in a newspaper to link to its mobile site

A QR Codes is a two-dimensional monochrome barcode that is designed to house a long text string. This may represent contact details or Wi-Fi network parameters but is commonly used to provide a link to a Web-hosted resource. These barcodes may be printed on a newspaper, business card or flyer; or even shown on a Website; the latter method being used to show links to software for the Android platform.

Typically, a person who has a mobile phone equipped with a QR-code reader app can then just point the phone’s camera to the barcode and “take a picture” of that barcode. This then leads to the contact details being put in their contact list or the user being taken to the Web site or Web-hosted resource. This function has even been extended to supplying GPS coordinates to a device for navigation (think of geocaching) or, in the case of Android phones, supplying Wi-Fi service parameters to these phones as part of provisioning hotspot service.

QR Code used on a poster

A QR code as used on a poster to advertise this site

They are popular in Europe especially with cafes and restaurants but are slowing increasing in popularity in other countries. As well, some commentators have described the QR code as a way of providing a machine-readable hyperlink in the field. It is also worth having a look at various QR-code blogs like this one so you can know what the trend is about.

Infact, when I promote HomeNetworking01.info using posters or business cards, I make sure there is a QR code pointing to the site so that people can use their phones to head to the site.

Why QR codes for your organisation

One major benefit that QR codes have for your print-based campaigns is that you can insert a direct link to your Webpage or a resource on that Webpage. Your audience then can visit that resource without having to memorise a URL or transcribe the URL in to the phone using a small touchscreen keyboard or SMS-style with the phone keypad.

The QR code is better than using Bluetooth transmitters to provide content. This is because the user isn’t likely to be annoyed with “accept this” Bluetooth responses from these transmitters when they come in to range of the transmitters. As well, the user doesn’t have to remember how to enable or disable Bluetooth discovery mode on their device. As well you don’t need to make sure there is a transmitter at the advertisement and make sure there is power to the transmitter, which can make the QR code acceptable even for posters on that noticeboard or shop door.

It is also better than using any of the proposed “near-field communication” technology for linking to Web resources because you don’t need to buy and integrate near-field transmitters in your promotional materials for the technology to work.

Direct Link to deep Web resources

You may want to provide a sound clip, video or PDF file to your mobile users. As well, you may want to link the user to a particular Web page about a product or promotion. But mobile users may find these resources difficult to gain access to on your site because of being required to enter a long URL into that numeric or small alphabetic keypad.

The QR code can provide the direct link to your campaign page, PDF file or audiovisual resource in a manner that is ready to download “there and then”. If the resource is a YouTube video, you can provide the link to the video clip as it appears on YouTube and the site or local YouTube client can open when the QR code is scanned.

Appropriate for the Social Web

Here, the QR code can augment your Social Web campaign because most active Social-Web users tend to work their Facebook or Twitter presence more from their smartphones. This is especially as I have noticed a lot of small businesses promote their Facebook presence online through posters and flyers that have the “Like us on Facebook” slogan.

What a simplified way of doing this by pointing the latest ultra-cool iPhone to the QR code on the poster attached to the trendy cafe’s espresso machine or refrigerated display cabinet in order to “like” that cafe on Facebook. It certainly makes it certain that you are seen with that iPhone.

Reading QR Codes

Some mobile-phone carriers and manufacturers will supply a QR-code reader with their Internet-enabled camera phones. But iPhone, Android, Blackberry and Windows Phone 7 users can come across many free QR-code readers at their platform’s app store. One example that comes to mind is the free i-Nigma which started becoming available for the iOS platform but lately became available for the Android and Blackberry platform. There are others like Barcode Scanner for the Android platform, BeeTag for the Blackberry platform and ScanLife for most of the platforms.

A main difference that may sort the “sheep from the goats” as far as QR-code reader programs go is whether they can read a light-coloured QR code that is printed on a dark surface. Similarly, there may be differences in how well a difficult-to-read code like a double-sided sign that is backlit can be understood.

At the moment, most QR-code readers are pitched at handheld mobile phones for immediate viewing of the resources on these devices. But it could be feasible to provide “capture-store-sync” transfer of Web URLs or downloaded resources to desktop operating systems or tablet computers as a feature of a QR-code reader. This could then allow a person to view the Web site on their laptop computer using their favourite Web browser at a later time.  It would also be of importance with QR codes being used for presenting Wi-Fi network parameters to Android phones, where the same parameters can be passed up to a laptop and integrated in to the Wi-Fi networks list for that computer.

Preparing QR codes

There are many QR-code generator sites and programs, most of which are free to use. Typically these sites may allow you to provide a URL to a resource as the input text or prepare contact details. A good resource to start from is this blog’s list of the top 10 free QR-code generating sites. As well, i-Nigma also offer a free QR-code generating page as well as their QR-code reader. Yet another resource is the QReateBUZZ Webpage which I have used for the QR codes for promoting this site.

These codes can be yielded as a small, medium or large size. Here, you could use a small size code for business cards and flyers here you don’t have much room or just want a discreet code on the corner of the poster. You could then use the larger sizes if you want people to notice that there is a QR code in the signage’s artwork or need to be far from the artwork to scan it.

Most sites will yield high-resolution PNG or JPEG bitmaps but some may yield EPS Postscript files or PDFs that are vector-images of the QR codes. You typically will then copy-and-paste or import the mage in to your artwork. As well, a lot of the sites will generate a JPEG image that you copy from the site using Ctrl-C / Command-C and paste to your artwork using Ctrl-V / Command-V.

Of course, there are some desktop QR-code generator programs which will run on a regular computer but most of these are Windows-only and a lot of them are offered at “large-business” prices.

It is still good practice to work with dark-graphics-against-light codes because most QR-code readers cannot work effectively with light-graphics-against-dark at the moment. If you are setting a QR code on a dark background, you could use the dark graphic on a light background and have a distinct light-background margin around that barcode.

Conclusion

Once you explore the creation and use of QR codes as part of your online and offline marketing strategy especially where you have online resources