GB2413206A - Encrypting two-dimensional bar codes on articles - Google Patents

Encrypting two-dimensional bar codes on articles Download PDF

Info

Publication number
GB2413206A
GB2413206A GB0408473A GB0408473A GB2413206A GB 2413206 A GB2413206 A GB 2413206A GB 0408473 A GB0408473 A GB 0408473A GB 0408473 A GB0408473 A GB 0408473A GB 2413206 A GB2413206 A GB 2413206A
Authority
GB
United Kingdom
Prior art keywords
bar code
article
dimensional bar
data
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0408473A
Other versions
GB0408473D0 (en
Inventor
Peter Martin Domaradzki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0408473A priority Critical patent/GB2413206A/en
Publication of GB0408473D0 publication Critical patent/GB0408473D0/en
Publication of GB2413206A publication Critical patent/GB2413206A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A method of securely marking an article (which may be e.g. a drugs container or postal package) with identification information about its contents, comprises placing on the article a printed two-dimensional bar code in which the data represented by the bar code is securely encrypted. By using a two-dimensional bar code, all the information about the article can be contained within the bar code itself obviating the need to link the reader to a database; by encrypting the information, security is assured as decryption is required (using the known encryption algorithm) to make sense of the data.

Description

24 1 3206 - 1 Secure Article Identification The present invention relates
to method and apparatus for marking an article in such a manner that it can only be identified by authorized personnel.
It is sometimes desirable to provide an article with secure identification with regard to its contents. An example of this is medicinal drugs, where ready recognition lo of the drug can lead to misuse or theft. Another example is containers and postal packages while they are in transit.
Hitherto, it has been known to mark an article with a bar code. A conventional bar code can contain a code which of itself is meaningless but which can be linked into a database to provide information on the article. Such a bar code can of course only be used in conjunction with a computer storing the database and in some instances a computer is not available.
It has also been proposed previously to use a two- dimensional bar code in which much more information appertaining to the article can be contained within the bar code itself, obviating the need to link into a database.
There has been developed a standard for two dimensional bar codes (EDF417) which is currently in use in a wide variety of applications, including logistics & transportation, retailing, healthcare, government, identification, and manufacturing. However, the disadvantage in this case is that the information is not secure and can be accessed by any person with a suitable and commercially available two- dimensional bar code reader.
According to a first aspect of the present invention, there is provided a method of marking an article which comprises placing on the article a printed two-dimensional - 2 bar code, characterized in that the data represented by the bar code is securely encrypted.
According to a second aspect of the invention, there is provided a twodimensional bar code reader comprising means for optically reading a bar code, means for analysing the optical signal to reproduce the data represented by the bar code, means for deciphering the data represented by the bar code using a predetermined encryption algorithm and means lo for displaying the deciphered data.
The invention proposes adding secure encryption, which is itself known, to two-dimensional bar codes to allow large amounts of information relating to an article to be passed securely to an end user without the end user having the need to access a separate database.
The invention will now be described further, by way of example, with reference to the accompanying drawings, in which: Figure 1 is a flow chart of the logic steps followed in creating a secure two-dimensional bar code, and Figure 2 is a flow chart of the logic steps followed to read a two-dimensional bar code.
All the hardware needed to implement the invention, both in creating the two-dimensional bar codes and reading them, is conventional and currently available. For this reason, it is not believed necessary to describe it in great detail.
In particular, to create secure two-dimensional bar codes, one can use a conventional personal computer operating under any suitable operating system, such as Windows, Mac, Linux or Unix and connected to a suitable graphics printer. The computer will include means for entering data relating to the article. Such data can either - 3 be entered manually, using a keyboard or imported from another program, such as a word processing, database or spreadsheet program. The computer must also be capable of running an encryption program to encrypt data in accordance with a secure encryption algorithm.
The nature of the algorithm used for data encryption is not fundamental to the present invention and the necessary level of security will be dictated by the sensitivity of the lo encrypted data. As programs for secure encryption of data are well known and used for example in conducting financial transactions on the Internet, it is not believed necessary to describe them and the complex mathematical procedures which they employ within the present context.
To read the bar code, a conventional two-dimensional bar code reader can be modified to implement the invention.
Conventional bar code readers have means for optically reading a bar code, means for analysing the optical signal to reproduce the data represented by the bar code, and means for displaying the deciphered data. To implement the invention, the data represented by the bar code must first be deciphered using the same encryption algorithm as used when the bar code was created before it is sent to the display or the printer.
The flow charts in the drawings further explain the logical steps performed in the creation and reading of two- dimensional bar codes in accordance with the invention.
Fig. 1 relates to the creation of a secure two-dimensional bar code and commences in block 10 where data relating to the article is entered in the manner previously described into a computer. In block 12, the entered data is encoded in accordance with the chosen algorithm and in block 14 the encoded data is passed on to the two-dimensional bar code printing program where it is converted into a PDF417 two dimensional bar code and printed onto a label which is affixed to the article.
In the bar code reader, the first step 20 (see Fig. 2) is to read the encrypted bar code affixed to the article. If a conventional PDF417 bar code reader were used to do this, the resulting displayed data would be meaningless to the reader. However, in a reader modified to implement the present invention, the data is decrypted in block 22 using lo the known encryption algorithm to recover the original data and it is this that is passed on to block 24 for display or printing.
It can thus be seen that by combining encryption with two-dimensional bar codes, the invention allows significant quantities of data to accompany an article, without impairing security, while obviating the need for the bar code reader to be connected to a database. - 5

Claims (2)

1. A method of marking an article which comprises placing on the article a printed two-dimensional bar code, characterized in that the data represented by the bar code is securely encrypted.
2. A two-dimensional bar code reader comprising means for optically reading a bar code, means for analysing the lo optical signal to reproduce the data represented by the bar code, means for deciphering the data represented by the bar code using a predetermined encryption algorithm and means for displaying the deciphered data.
GB0408473A 2004-04-16 2004-04-16 Encrypting two-dimensional bar codes on articles Withdrawn GB2413206A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0408473A GB2413206A (en) 2004-04-16 2004-04-16 Encrypting two-dimensional bar codes on articles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0408473A GB2413206A (en) 2004-04-16 2004-04-16 Encrypting two-dimensional bar codes on articles

Publications (2)

Publication Number Publication Date
GB0408473D0 GB0408473D0 (en) 2004-05-19
GB2413206A true GB2413206A (en) 2005-10-19

Family

ID=32320919

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0408473A Withdrawn GB2413206A (en) 2004-04-16 2004-04-16 Encrypting two-dimensional bar codes on articles

Country Status (1)

Country Link
GB (1) GB2413206A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2489247A (en) * 2011-03-21 2012-09-26 Big Box Software Ltd Method for secure communication of machine-readable encoded data
ITRM20130049A1 (en) * 2013-01-29 2014-07-30 Lorenzo Bosio LABEL FOR THE UNIQUE IDENTIFICATION OF SMART OBJECTS OF THE INTERNET OF THINGS, RELATED METHODS AND SYSTEM FOR THE USE OF THE IDENTITY OF THE SURE THINGS THROUGH THE USE OF THESE SMART OBJECTS
CN106874780A (en) * 2015-12-10 2017-06-20 顺丰科技有限公司 Mailing information encrypts allocator and server apparatus
EP2628131A4 (en) * 2010-10-12 2018-01-17 Hewlett-Packard Development Company, L.P. A system for generating an incrementally completed security mark
EP2628132A4 (en) * 2010-10-12 2018-01-17 Hewlett-Packard Development Company, L.P. A system for generating an incrementally completed 2d security mark

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742685A (en) * 1995-10-11 1998-04-21 Pitney Bowes Inc. Method for verifying an identification card and recording verification of same
US5866888A (en) * 1990-11-20 1999-02-02 Symbol Technologies, Inc. Traveler security and luggage control system
US20030118191A1 (en) * 2001-12-21 2003-06-26 Huayan Wang Mail Security method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5866888A (en) * 1990-11-20 1999-02-02 Symbol Technologies, Inc. Traveler security and luggage control system
US5742685A (en) * 1995-10-11 1998-04-21 Pitney Bowes Inc. Method for verifying an identification card and recording verification of same
US20030118191A1 (en) * 2001-12-21 2003-06-26 Huayan Wang Mail Security method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2628131A4 (en) * 2010-10-12 2018-01-17 Hewlett-Packard Development Company, L.P. A system for generating an incrementally completed security mark
EP2628132A4 (en) * 2010-10-12 2018-01-17 Hewlett-Packard Development Company, L.P. A system for generating an incrementally completed 2d security mark
GB2489247A (en) * 2011-03-21 2012-09-26 Big Box Software Ltd Method for secure communication of machine-readable encoded data
ITRM20130049A1 (en) * 2013-01-29 2014-07-30 Lorenzo Bosio LABEL FOR THE UNIQUE IDENTIFICATION OF SMART OBJECTS OF THE INTERNET OF THINGS, RELATED METHODS AND SYSTEM FOR THE USE OF THE IDENTITY OF THE SURE THINGS THROUGH THE USE OF THESE SMART OBJECTS
CN106874780A (en) * 2015-12-10 2017-06-20 顺丰科技有限公司 Mailing information encrypts allocator and server apparatus

Also Published As

Publication number Publication date
GB0408473D0 (en) 2004-05-19

Similar Documents

Publication Publication Date Title
US8543411B2 (en) Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale
ES2221710T3 (en) VERIFICATION OF AUTHENTICITY OF ARTICLES USING RANDOM NUMBERS.
US7815117B2 (en) Method and apparatus for counterfeiting protection
US7757952B2 (en) Method and apparatus for counterfeiting protection
US9652769B1 (en) Methods, apparatus and systems for securely storing and/or accessing payment information or other sensitive information based on tokens
JP2004094510A (en) False display preventing method in merchandise circulation and alternation preventing function added label writing device used for the same
US5505494B1 (en) System for producing a personal id card
US20190367239A1 (en) Authentication of packaged products
US7881469B2 (en) Crypto-wireless-tag
JP5260795B2 (en) Product distribution management method via the Internet
US20050061878A1 (en) Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
CN103646331B (en) Wine anti-counterfeit source tracing method based on enciphered bar code mark
US20070152032A1 (en) Method and apparatus for counterfeiting protection
US20030221108A1 (en) Method for tamperproof marking of products
JP2017174456A (en) Monitor for portable article
US20070200335A1 (en) Method and apparatus for counterfeiting protection
CN101944259A (en) The control method of receipt printing device, receipt printing device and program
GB2413206A (en) Encrypting two-dimensional bar codes on articles
CN1776721A (en) General anticounterfeiting method and system
US10977534B1 (en) Compositions, systems, and methods for unique identifiers embedded in machine verifiable marks having error correction features
US9076188B2 (en) Method and system for shipment authentication
US20220391884A1 (en) Method and System for Transferring a Product
JP2005525895A (en) Product tampering prevention identification method
CN109948760B (en) Information presentation method and device based on two-dimensional code
CN112036525B (en) Method, device, equipment and storage medium for preventing abandoned medical edge tool from being stolen

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)