Mobile Barcodes Explained - Aztecs in the Matrix

Mobile barcodes are on the verge of becoming a global phenomenon, but what exactly are they, what do they do, and for whom? We became familiar with the original, linear barcodes (or 1D), from our supermarket shopping in the 1980's (although the technology was patented in the 1950's). They comprise a series of vertical black lines and white spaces of variable width, representing numbers, which are read (or decoded) by a barcode reader to extract the information they bear.

However, as barcodes were used in an ever greater variety of environments beyond straightforward stock control, they became longer and longer as people tried to pack more information onto them. A new generation of barcodes was devised in the 1990's, usually referred to as 2D or matrix codes. They are formed by patterns of black and white squares arranged on a (usually) square grid and can encode thousands of alphanumeric and other characters in virtually any language. Immediately the size and capacity problem was solved, opening the way for applications that had never been considered. 

Another radical and exciting advancement in barcode reader technology allowed the camera in a mobile phone to act as a reader. Mobile phones can now be enabled to read a variety of 2D mobile barcodes. These include QR codes, Data Matrix, Cool-Data-Matrix, Aztec, Upcode, Trillcode, Quickmark, shotcode, mCode and Beetagg.

The vast majority of symbologies are in the public domain, which means they can be used by anyone without restriction and without payment of a fee or royalty. This public approach gives rise to internationally recognised standards, global interoperability, and creates an economy of scale.  This is a great boon for advertisers and consumers (both of whom are the mobile operators' customers) because only one software client is required to read any code.  For the operators, this translates to greater choice and more competitively priced equipment.

Unfortunately, some barcode developers have chosen the proprietary route, which means they keep control of their own codes, the information that is permitted to be encoded and charge a fee or royalty for their use. These issues and the lack of interoperability usually means that proprietary barcodes tend to be used in controlled, closed environments, rather than in open, public systems around the world.

The most common use of mobile barcodes is to request information or a service or content from a Web site. It might be details of a promotion, or a discount voucher via SMS or MMS, or to activate a download such as a ringtone, music track or game, or click to call an IVR or human agent, or buy a travel or concert ticket. The advertiser pays the set-up costs as well as its operator partner on a per-click, download, view, redeemed coupon, ticket sale or call, depending on the campaign.

The key is that mobile barcodes are a pull technology, a permission-based way for a consumer to engage with an advertiser or medium. This is a very important attribute since there is a great deal of consumer angst and regulatory concern about intrusivemobile marketing: mobile barcodes are a world away from pushing unsolicited spam via SMS or MMS. Big brands are understandably wary of engaging in any advertising activity that compromises their reputation by alienating their customers and have stayed away from these kinds of push campaigns.

The pull of mobile barcodes overcome these issues and offer a direct, accountable way of connecting with consumers. However, if mobile barcodes are to succeed as an advertising medium, a high level of back-office integration is necessary, which reinforces the importance of open standards for processes and interfaces. Operators will need to demonstrate to the world's biggest brands that the barcode scanning transactions are accurate, reliable and defendable because they are going to charge that brand for every click.

The precedent is there: Google has built a multi-billion dollar, online business on this per click or interaction model with its Google AdWord/AdSense, which provides advertisers with reliable, accountable records of their users' transaction history and an accurate invoice, plus timely and granular revenue share payments to other parts of the ecosystem. In mobile, unlike online, there is the additional challenge that these mechanisms have to work across carriers, across countries and across currencies.

So the stage is set. With 2D barcode scanning, advertisers have a reliable, permission-based mobile channel open to them. Consumers love them as an easy way of using mobile technology to engage with services and media they are interested in, as has been demonstrated in spades in Japan, where mobile barcodes are part of everyday life. This is because Japan is unusual in having a very dominant operator, NTT DoCoMo, which decided to endorse QR codes and ensured that all new handsets had QR code client software embedded in them. The rest is history, but this approach is not applicable to markets in most other countries, which typically have four or five operators competing against each other.

The challenge now is to ensure that any brand advertiser can run the same ad campaign in Singapore, London and Seattle instead of having to produce and run different campaigns in each country and for every operator. The inability to do this has been another big inhibitor to mobile advertising. Mobile barcodes have the potential to overcome these issues and become the mainstream, global phenomenon that they could and should be. However to attain this goal, the various parties that make up the ecosystem and the various warring factions within the mobile barcode industry need to come together and work on common standards* that will be to everyone's advantage.

Recent Entries

Heartland Tests End-to-End Encryption; Gets Good Reviews
In the first step of its move toward end-to-end encryption, Heartland Payment Systems (HPY) last week completed the first phase of its…
Mobile Barcodes Explained - Aztecs in the Matrix
Mobile barcodes are on the verge of becoming a global phenomenon, but what exactly are they, what do they do,…
How PA DSS Will Change the Application Business Forever
By David Taylor -- Most merchants and application vendors seriously underestimate both the scope and the force of the Payment Applications…
Tokenization and your store
New approach shapes how retailers secure private information and consumer confidence against data breachesWith stores located in various states and,…
Americans prefer online banking - ABA survey
For the first time, more US bank customers express a preference for managing their finances online compared to any other…
IKEA Execs Discuss Launch Of US Loyalty, Use Of Mobile Medium
Written by Amanda Ferrante   Tuesday, 15 September 2009 00:00Well known for its innovative approach customer relationship management, home furnishings retailer IKEA has…
First Data And RSA "Legitimize" Tokenization-Then What?
The conventional wisdom is that when large vendors enter a niche market, those vendors "legitimize" that market. But the announcement…
New driver license legislation proposed
Some believe that new proposed driver license legislation would help states better secure IDs while also protecting citizen privacy. Others…
Patients are keen on self-service healthcare
American are taking a shine to self-service healthcare.They may not be snatching the scalpel out of their doctor's hands and…
Touchscreen Technology Website
News from 3M on multi-touch and also launch of new "education" site touchtopics.com which is to explain all various touchscreen…
PCI Best Practice Supplement for Merchants
August 2009 release of best practice doc, PCI_skimming_prevention_form.pdf, directed at skimming attacks. Illustrates how exposed terminals in POS are targeted by…
Cloud Computing - Does Amazon fail PCI Compliance?
There's an ongoing debate about the ability of cloud computing services to meet enterprise regulatory compliance requirements, including the Payment…
End-to-End Tokenized Encryption
EPX now extends data protection to what I call the 'first inch" of a transaction, i.e., from the plastic to…
Guidelines - PCI DSS Wireless Guideline Supplement
Dcument purpose  - This document provides guidance and installation suggestions for testing and/or deploying 802.11 Wireless Local Area Networks (WLAN)…
Healthcare - Building Kiosks From Scratch
In an era of consumerism, physician group practices are looking for ways to improve customer service and gain loyalty. So…
Trends - Number of retail medical clinics shrinking
Projections that showed there would be 2,500 retail clinics operating by 2010 are coming up short as the industry has…
Wireless transactions and PCI DSS 1.2 Compliance
Article covering wireless transaction and protocols in context of PCI compliance. Amazing that 11% use WPA2. Gist of article is…
EMV Level 2 - Just what does it mean?
The purpose and goal of the EMV standard is to specify interoperability between EMV compliant IC cards and EMV compliant…
CUPPS: The Platform of the Future (Airline Kiosk)
CUPPS has been architected as the platform of the future, able to accommodate many things even beyond the agent-facing applications…
EMV takes aim at U.S.
Nice article on SecureIDnews covering EMV. by Andy Williams, Associate Editor, Avisian PublicationsLike a massive tidal wave, EMV continues to roll…



Related Ring Sites:
  GoKIS  |   ThinClient.org  |   keefner.com  |   Visi Kiosk site  |   KIOSK  |   Kis-kiosk.com  |
Resource Sites:
  Elo TouchSystems  |   Acire Inc.  |   Nextep  |   TIO Networks  |   Olea  |   Self-Service Networks  |   Meridian Kiosks  |   Provisio  |   Kioware  |
  Selling Machine Partners  |   Source Technologies  |   Seepoint  |   5Point  |   Nanonation  |   Netkey  |   KioskCom  |   Summit Research  |   NCR  |