EP1508121A1 - Methode zum fälschungssicheren kennzeichnen von produkten - Google Patents
Methode zum fälschungssicheren kennzeichnen von produktenInfo
- Publication number
- EP1508121A1 EP1508121A1 EP03725130A EP03725130A EP1508121A1 EP 1508121 A1 EP1508121 A1 EP 1508121A1 EP 03725130 A EP03725130 A EP 03725130A EP 03725130 A EP03725130 A EP 03725130A EP 1508121 A1 EP1508121 A1 EP 1508121A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- code
- product
- packaging
- identifier
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 239000003814 drug Substances 0.000 claims abstract description 17
- 239000011159 matrix material Substances 0.000 claims description 38
- 238000004806 packaging method and process Methods 0.000 claims description 38
- 229940079593 drug Drugs 0.000 claims description 12
- 239000002537 cosmetic Substances 0.000 claims description 9
- 239000002775 capsule Substances 0.000 claims description 8
- 238000002372 labelling Methods 0.000 claims description 7
- 230000036541 health Effects 0.000 claims description 5
- 238000004519 manufacturing process Methods 0.000 claims description 5
- 239000000825 pharmaceutical preparation Substances 0.000 claims description 5
- 229940127557 pharmaceutical product Drugs 0.000 claims description 5
- 239000008280 blood Substances 0.000 claims description 4
- 210000004369 blood Anatomy 0.000 claims description 4
- 239000007937 lozenge Substances 0.000 claims description 4
- 239000003826 tablet Substances 0.000 claims description 4
- 241000533950 Leucojum Species 0.000 claims description 3
- 229940126601 medicinal product Drugs 0.000 claims description 2
- 239000003708 ampul Substances 0.000 claims 3
- 239000011505 plaster Substances 0.000 claims 2
- 239000000047 product Substances 0.000 description 43
- 230000006870 function Effects 0.000 description 14
- 238000004458 analytical method Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- MTHSVFCYNBDYFN-UHFFFAOYSA-N diethylene glycol Chemical compound OCCOCCO MTHSVFCYNBDYFN-UHFFFAOYSA-N 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 239000003962 counterfeit drug Substances 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- RZVAJINKPMORJF-UHFFFAOYSA-N Acetaminophen Chemical compound CC(=O)NC1=CC=C(O)C=C1 RZVAJINKPMORJF-UHFFFAOYSA-N 0.000 description 1
- 235000006679 Mentha X verticillata Nutrition 0.000 description 1
- 235000002899 Mentha suaveolens Nutrition 0.000 description 1
- 235000001636 Mentha x rotundifolia Nutrition 0.000 description 1
- 230000002528 anti-freeze Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000013065 commercial product Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000012067 mathematical method Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 229960005489 paracetamol Drugs 0.000 description 1
- 230000000144 pharmacologic effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 239000006188 syrup Substances 0.000 description 1
- 235000020357 syrup Nutrition 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000004809 thin layer chromatography Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H20/00—ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
- G16H20/10—ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/40—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for data related to laboratory analysis, e.g. patient specimen analysis
Definitions
- Counterfeiting is a longstanding problem. Counterfeit medicines, in particular, which are of poor quality in terms of purity and / or composition compared to the original products, endanger the safety of patients. According to the World Health Organization (WHO), 771 cases of counterfeit medicines were reported by April 1999, with 40% of 325 cases analyzed and the nature or quality of the active components contained, and 59% containing no active components. For example, the placing on the market and later taking paracetamol syrup, which was associated with the
- the WHO recommends an organoleptic examination of the packaging and content of the product, followed by either simple analytical methods such as thin-layer chromatography or a complete analysis by the responsible regulatory authorities (WHO publication ⁇ WHO / EDM / QSM / 99.1, pages 1 - 5 and 33 - 37).
- Medicines are also labeled for traceability during the distribution route from the manufacturer to the retailer and on to the consumer or patient, for example in order to provide specific access to certain batches of the product in the event of product recalls.
- the labeling is. applied to the product in the form of plain text and, in the case of medication or cosmetics, contains a batch number, the expiry date and a unique article name, for example the pharmaceutical central number (PZN) for medicinal products. If necessary, the sales unit is also with the date of manufacture and an individual serial number.
- PZN pharmaceutical central number
- the sales unit is also with the date of manufacture and an individual serial number.
- all or part of this information is also machine-readable in the form of a one or two-dimensional code.
- German laid-open specification DE 100 19 72 A1 describes a method for product security, the product being provided with a first encrypted identification and the associated packaging with a second encrypted identification, the second identification being dependent on the encrypted content of the first identification and thus conclusions on the relationship between packaging and product.
- European patent EP 360 225 B1 describes a device for applying value stamps to postal items, the value stamp containing an encrypted message in the form of a two-dimensional code, and the code being encrypted by means of a public key using an asymmetrical encryption method, which enables the validity of the postage payment to be checked ,
- the object of the present invention is to provide a method with which the authenticity of products, in particular medicaments, can be checked in a simple and inexpensive manner.
- the present invention accordingly relates to a method for identifying a product, wherein 1. the product is labeled with at least one originality component consisting of at least one individual identifier in unencrypted form (A) and at least one individual identifier in encrypted form (B),
- the unencrypted identifier (A) contains at least one individual identification number and optionally one or more further features,
- the encrypted identifier (B) is generated from the content of the unencrypted identifier (A), and
- the originality component is in plain text or in machine-readable form.
- the originality component can be converted into a machine-readable code for practical handling and automatic control.
- the originality of the product can be deduced by decrypting the encrypted identifier.
- Product in the sense of the present invention means a commercial product in any form, for example a pharmaceutical product or a cosmetic, preferably blood preserves, blisters, ampoules, vials, syringes, tablets, capsules, capsules, lozenges, plasters, tubes, inhalers, squirt bottles, and / or packaging or outer packaging or packaging combination thereof.
- the tamper-evident feature can contain 1 to 1000 characters, preferably the non-encrypted individual identifier (A) contains 5 to 30 characters and the encrypted individual identifier (B) 30 to 300 characters.
- Article number preferably a PZN, an EAN (European Article Number), UPC (Universal Product Code), NDC (National Drug Code) or NHRIC (National Health Related Item Code), and / or
- the individual identification number is formed from the article number, preferably the PZN, the batch name and a consecutive number within the batch.
- the originality components can be machine-readable or in plain text.
- the originality components can consist of any characters, preferably of letters, numbers, special characters and / or patterns, particularly preferably the originality components are numerical or alphanumeric.
- the originality components are preferably displayed in a machine-readable manner, particularly preferably as a two-dimensional code.
- the originality components can also be attached to the product in a magnetic strip or stored in a chip.
- a code can be black and white, black on white or white on black, or colored or multicolored.
- a code can be affixed to the product by printing or labeling the product using any type of printer, for example an ink jet printer, laser printer, laser marker, matrix printer, dot matrix printer or
- a machine-readable code can be read with a commercially available scanner, for example with a laser scanner or a CCD camera, for example the Imageteam® 440 device from WelchAllyn®, Domstetten, Germany.
- a one-dimensional code is, for example, Code 39, Extended Code 39 or Code 128.
- Two-dimensional codes are, for example, 3D barcode, 3-DI, ArrayTag, Aztec Code, Small Aztec Code, Codablock, Code 1, Code 16K, Code 49, CP Code, Data Glyphs, Data Matrix Code, Datastrip Code, Dot Code A, hueCode, MaxiCode, MiniCode, PDF417, Micro PDF417, QR Code, SmartCode, Snowflake Code, SuperCode, Ultracode (company brochure from Barcodat “2D code primer, systematization and reading devices ", Barcodat GmbH, Domstetten, Germany, March 1998).
- Preferred is the Data Matrix Code (Code ECC 200, International Symbology Specification - Data Matrix; ANSI / AIM BC11-1997, May 8, 1997, published by AIM International Inc., Reston, USA).
- the Data Matrix Code is a two-dimensional machine-readable symbol code that can be used to store 1 to 3116 numeric or 2335 alphanumeric characters or 1556 bytes of binary information.
- the Data Matrix Code consists of 4 essential components: a fixed boundary, a broken boundary, a data storage area and a "QuietZone".
- the fixed limit allows the decoder to calculate the orientation of the data matrix code.
- the broken boundary allows the decoder to determine the number of columns and rows or the matrix density.
- the data storage area contains the binary information that was encoded during the creation of the data matrix code.
- the "quiet zone” is an unprinted zone which surrounds the data matrix and whose color differs from that of the fixed border. If the fixed border has a dark color, for example black, the "quiet zone” is light, preferably white.
- Each encoded character within the data matrix is represented by an 8-bit binary code.
- the character “M” is, for example, "01001101", in which "1” is preferably a dark zone within the data matrix, and "0" is a light zone.
- the data matrix code has the advantage over the barcode that it offers a higher storage space and increased readability due to the error correction procedure (ECC), which means that less demands are made on the printer and the space requirements.
- ECC error correction procedure
- An asymmetrical method is used for encryption, in which the individual identifier (A) is encrypted with the secret part (e) of the key. Data encrypted with the secret part of the key can only be decrypted with the public part (d) of the key. It can therefore be concluded that encrypted data that can be decrypted with the public part of the key (d) was encrypted with the secret part of the key (e). Since the secret part of the key is not accessible to the public, the author or producer of the data and thus of the product can be proven beyond any doubt.
- Asymmetric encryption methods are, for example, the method according to Rivest, Shamir and Adleman (RSA method), McEliece, EIGamal, LUC or Diffie Hellman.
- the RSA method for generating the keys and encryption is preferred, as described, for example, in US Pat. No. 4,405,829.
- this method also defines the publicly accessible module (s), which is necessary for the encryption and decryption of the data.
- the level of encryption is based on the length of the key used.
- a key with a length greater than or equal to 1024 bits is preferably used, corresponding to an RSA module of at least 309 decimal digits.
- the public part of the key (d) and the module (s) are made available to the buyer and / or dealer of the product identified according to the invention,
- this part of the key can be stored on a publicly accessible data server or on the Internet, or can be attached to the product.
- the method enables the buyer and / or dealer to determine the manufacturer of the product without a doubt as long as the secret part of the key (s) is not published.
- the originality components are read and the encrypted individual identifier (B) is decrypted with the public part of the key. If the identifier obtained after decrypting the encrypted part (B) corresponds to the identifier in unencrypted form (A), this means that firstly the encrypted part (B) was generated with the secret part of the key, and therefore secondly the source or the manufacturer of the product has generated the encrypted part (B), and therefore thirdly the source or the manufacturer of the product has been identified as the owner of the secret part of the key.
- Counterfeit products can be detected with the method according to the invention: corresponds to the individual identifier which is obtained after decrypting the encrypted identifier (B) using the mean public key (d) and the module (s), the individual identifier which is contained in the unencrypted identifier (A ) is included, the individual identifier was generated by the owner of the secret key (s).
- the individual identifier is used only once. Identical copies of the product can therefore be identified by comparing the individual identification number with previously used individual identification numbers that have been registered by the wholesaler, dealer or customer or published by the manufacturer. Series copies can be easily identified at wholesale through series recognition.
- the product and / or the packaging or outer packaging is labeled with at least one originality component consisting of at least one individual identifier in unencrypted form (A) and at least one individual identifier in encrypted form (B), 2. the unencrypted form (A) of Product identifier additionally included as part of the message to be encrypted in the outer packaging, which carries its own identifier (identifier of the outer packaging), and where
- the originality of the outer packaging and the individual products contained therein are characterized in that the decoded message must also contain the originality component of the product in addition to the identifier of the outer packaging, and
- the identifier of the outer packaging is generated independently of the product identifier.
- the difficulty with counterfeiting is that the product identifier has to be falsified as well. Otherwise, a serial counterfeit can already be seen in a single pack.
- the method according to the invention is suitable as protection against forgery of the expiry date.
- Many consumables such as pharmaceuticals, cosmetics or food, have an expiration or expiry date.
- third parties manipulate the shelf life / expiry date with fraudulent intent.
- the method includes the following elements and process steps: 1.
- the expiry or expiry date is part of the unencrypted form (A) of the product identifier and is encrypted with a private key of an asynchronous encryption method;
- the result of the encryption (encrypted message) and the unencrypted expiry or expiry date is applied to the sales package.
- the encrypted message is preferably applied in a machine-readable manner using a one- or two-dimensional code such as the DataMatrix code or by means of other electronically readable methods such as magnetic strips, memory chips, transponders or by means of biocoded methods;
- the consumer or the dealer has the option of checking the originality of the expiry or expiry date, the decoder decoding the encrypted message with the associated public key and receiving the original expiry date or expiry date in the decoded message, provided that this is not encrypted with it applied durability-or
- the private key can only be determined by third parties using extremely time-consuming computing methods. With correspondingly long keys, the computing time is longer than the shelf life / expiry time. In this way, manipulation by third parties can be ruled out, provided the private key is kept safe and the encrypted message is always part of the product.
- Examples 1 to 7 demonstrate the principle according to the invention with a reduced amount of data, the message to be encrypted being a letter.
- Examples 8 and 9 show an embodiment of the method according to the invention, the message to be encrypted being approximately 47 ASCII characters and the key length being a few hundred bits.
- Example 1 Principle of generating the private and public key using
- the Euler PHI function applies, which specifies the number of all integers to n integral numbers that are smaller than n:
- d is relatively prime to PHI (n).
- e and d are the keys, n the so-called module or modulo.
- the program runs on 80x86 PCs with Microsoft 32bit Windows (NT / 2000 / XP / 95B / 98 / ME). It was written in Microsoft Visual Basic 6.0.
- ClientHeight . 10620
- ClientLeft 45
- ClientTop 330
- txt concatenated text txt untranslated ascii.Text + "/" + txt mixed text
- the message to be encrypted is the letter "A", which, as a decimal number according to the ASCII code, is the number 65 or corresponds binary to the number sequence 0100 0001.
- the message is encrypted with the private part of the key.
- the encrypted message is 241 in decimal notation and 1111 0001 as a binary number.
- Example 4
- Example 3 The encrypted message generated in Example 3 in unencrypted and encrypted and in each case in binary form became a data matrix in accordance with the rules in "AIM International Symbology Specification Data Matrix, Annexe M" using the cloud printing system m600 (controller item no .: 620100) Code generated and displayed: unencrypted encrypted decimal: 65 241 binary: 0100 0001 1111 0001
- the data matrix code shown was created using a data matrix code printer, e.g. Cloud m600 printing system / printhead art. 620300, printed on medication packaging.
- a data matrix code printer e.g. Cloud m600 printing system / printhead art. 620300, printed on medication packaging.
- the unencrypted message was also printed on the packaging in decimal and binary notation.
- Read the information contained in the data matrix code can be obtained from stationary retailers .
- Code readers for example commercially available products from Pharma Controll Electronic GmbH, type: camera data matrix control system, can be read out.
- a check for serial counterfeiting is carried out by comparison with already known identification numbers.
- the information contained in the data matrix code is read out, for example, using hand-held readers such as Welch Allyn Inc., type: 0 4410HD-131 CK.
- the public key and the module are offered on the Internet by the manufacturer of the product (e.g. the drug).
- the decrypted message therefore corresponds to decimal 65 or binary 0100 0001.
- the decrypted information is compared with the unencrypted information to determine the originality. .0
- Example 2 The program described in Example 2 was used for decryption and verification.
- the unencrypted elements of the message and the encrypted message are shown in two separate data matrix code symbols.
- the example was carried out analogously to Examples 1 to 6.
- the private and public key were generated with the module size of 1024 bit according to the example.
- the message to be encrypted was an individual identification number consisting of LOT number. (40A020), EXP (10.2003), PZN (-0587985) and individual identification (00000001).
- Data Matrix Code ECC200 encrypted with the private key in Data Matrix Code ECC200, whereby the unencrypted message was mapped in Data Matrix Code - Symbol 1 (corresponding to a symbol size of 24x24 Data Matrix modules) and the encrypted message was mapped in Data Matrix Code - Symbol 2 (correspondingly a symbol size of 52 x 52 data matrix modules)
- a blister containing a drug was identified.
- Identification number consisted of PZN, LOT (batch number) and an individual serial number.
- the encryption method was the RSA method.
- FIGS 1 to 3 show the method according to the invention according to Example 8.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Medicinal Chemistry (AREA)
- Epidemiology (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Chemical & Material Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Medicinal Preparation (AREA)
- Storage Device Security (AREA)
- Details Of Rigid Or Semi-Rigid Containers (AREA)
- Medical Preparation Storing Or Oral Administration Devices (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10222569 | 2002-05-17 | ||
DE10222569A DE10222569A1 (de) | 2002-05-17 | 2002-05-17 | Methode zum fälschungssicheren Kennzeichen von Produkten |
PCT/EP2003/004591 WO2003098543A1 (de) | 2002-05-17 | 2003-05-02 | Methode zum fälschungssicheren kennzeichnen von produkten |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1508121A1 true EP1508121A1 (de) | 2005-02-23 |
Family
ID=29414012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03725130A Withdrawn EP1508121A1 (de) | 2002-05-17 | 2003-05-02 | Methode zum fälschungssicheren kennzeichnen von produkten |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1508121A1 (es) |
JP (1) | JP2005525895A (es) |
AU (1) | AU2003227703A1 (es) |
CA (1) | CA2486683A1 (es) |
DE (1) | DE10222569A1 (es) |
IL (1) | IL165215A0 (es) |
MX (1) | MXPA04011359A (es) |
WO (1) | WO2003098543A1 (es) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004006943A1 (de) * | 2004-02-12 | 2005-09-01 | Koenig & Bauer Ag | Einrichtung zur Registerkorrektur von Druckplatten |
JP2007164290A (ja) * | 2005-12-09 | 2007-06-28 | Dainippon Printing Co Ltd | 判定システム、生成装置、判定装置及び判定方法等 |
DE102007036212A1 (de) * | 2007-08-02 | 2009-02-05 | Giesecke & Devrient Gmbh | Identitätsbasierte Produktsicherung |
ATE537513T1 (de) * | 2008-10-08 | 2011-12-15 | Hartmann Paul Ag | Medizinisches produkt |
DE102009015327A1 (de) * | 2009-03-20 | 2010-09-23 | Technische Universität Ilmenau | Verfahren zur individualisierten optischen Kennzeichnung von Bauteilen |
DE102010048137A1 (de) * | 2010-03-26 | 2011-09-29 | Dietrich Heinicke | Produktsicherungssystem, Produktsicherungsverfahren und Verwendung derartiger Produktsicherungssysteme und Produktsicherungsverfahren |
IT1401912B1 (it) * | 2010-08-11 | 2013-08-28 | Pittia | Sistema per verificare l'autenticita' di articoli |
DE102018128054A1 (de) | 2018-11-09 | 2020-05-14 | Karl Otto Braun Gmbh & Co. Kg. | Bandagenaufdruck |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4949381A (en) * | 1988-09-19 | 1990-08-14 | Pitney Bowes Inc. | Electronic indicia in bit-mapped form |
US6904525B1 (en) * | 1997-07-01 | 2005-06-07 | Pitney Bowes Inc. | Method for preventing counterfeiting of articles of manufacture |
US6069955A (en) * | 1998-04-14 | 2000-05-30 | International Business Machines Corporation | System for protection of goods against counterfeiting |
GB2342743B (en) * | 1998-10-17 | 2003-05-14 | Nicholas Paul Elliot | Verification method |
DE10019721A1 (de) * | 1999-08-25 | 2001-03-01 | Giesecke & Devrient Gmbh | Verfahren zur Produktsicherung |
-
2002
- 2002-05-17 DE DE10222569A patent/DE10222569A1/de not_active Withdrawn
-
2003
- 2003-05-02 MX MXPA04011359A patent/MXPA04011359A/es unknown
- 2003-05-02 AU AU2003227703A patent/AU2003227703A1/en not_active Abandoned
- 2003-05-02 WO PCT/EP2003/004591 patent/WO2003098543A1/de not_active Application Discontinuation
- 2003-05-02 JP JP2004505968A patent/JP2005525895A/ja not_active Abandoned
- 2003-05-02 IL IL16521503A patent/IL165215A0/xx unknown
- 2003-05-02 EP EP03725130A patent/EP1508121A1/de not_active Withdrawn
- 2003-05-02 CA CA002486683A patent/CA2486683A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO03098543A1 * |
Also Published As
Publication number | Publication date |
---|---|
CA2486683A1 (en) | 2003-11-27 |
JP2005525895A (ja) | 2005-09-02 |
DE10222569A1 (de) | 2003-12-04 |
IL165215A0 (en) | 2005-12-18 |
AU2003227703A1 (en) | 2003-12-02 |
MXPA04011359A (es) | 2005-08-15 |
WO2003098543A1 (de) | 2003-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030221108A1 (en) | Method for tamperproof marking of products | |
JP4850710B2 (ja) | 貼換え可能なラベルを利用する薬管理用システム及び方法 | |
US20200279632A1 (en) | Integrated device and system for drug dispensing | |
KR20050039704A (ko) | 바코드 정보를 생산 중인 제품에 부착하는 방법 및 장치 | |
WO2003098543A1 (de) | Methode zum fälschungssicheren kennzeichnen von produkten | |
EP2068268A1 (de) | Codierung von pharmazeutischen Behältnissen durch Zufallsstrukturen | |
EP1953683A2 (en) | Virtual code window | |
US20220142862A1 (en) | Drug security systems and methods | |
DE102012213970A1 (de) | Barrierefreie Verpackung für Waren, insbesondere für Medikamente | |
JP2005525895A5 (es) | ||
EP2534059B1 (en) | Package provided with a traceability and originality verification code, its production method and method for tracing it | |
US6542256B1 (en) | Medicine envelope preparation system | |
DE102008008231A1 (de) | System zur individualisierten Kennzeichnung von Serienprodukten | |
DE202008001813U1 (de) | System zur individualisierten Kennzeichnung von Serienprodukten | |
DE202015004121U1 (de) | Fälschungssicherheit für Medikamente | |
EP3782096B1 (de) | Ortsunabhängige einnahmekontrolle | |
GB2413206A (en) | Encrypting two-dimensional bar codes on articles | |
JP7052133B1 (ja) | 商品容器の外装シート | |
De la Varga Rodríguez | NanoLuxe: a market analysis, pricing policy and regulatory affairs for an anti-counterfeit company based on nanotechnology | |
DE202018005460U1 (de) | Sicherheitscode für Tabletten | |
Suliman | A two-dimensional triangular medical coding system for storing and reporting medical information. | |
Riley | The Complete German Commission E Monographs: Therapeutics Guide to Herbal Medicines | |
Karteek et al. | Quick Response (QR) Codes In Dentistry: A Review | |
PL25640S2 (pl) | Etykieta recepturowa | |
CN111445985A (zh) | 一种麻醉药品一针一码的管理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20041217 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
DAX | Request for extension of the european patent (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SANOFI-AVENTIS DEUTSCHLAND GMBH |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20061006 |