GB2413206A - Encrypting two-dimensional bar codes on articles - Google Patents
Encrypting two-dimensional bar codes on articles Download PDFInfo
- Publication number
- GB2413206A GB2413206A GB0408473A GB0408473A GB2413206A GB 2413206 A GB2413206 A GB 2413206A GB 0408473 A GB0408473 A GB 0408473A GB 0408473 A GB0408473 A GB 0408473A GB 2413206 A GB2413206 A GB 2413206A
- Authority
- GB
- United Kingdom
- Prior art keywords
- bar code
- article
- dimensional bar
- data
- encrypting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
A method of securely marking an article (which may be e.g. a drugs container or postal package) with identification information about its contents, comprises placing on the article a printed two-dimensional bar code in which the data represented by the bar code is securely encrypted. By using a two-dimensional bar code, all the information about the article can be contained within the bar code itself obviating the need to link the reader to a database; by encrypting the information, security is assured as decryption is required (using the known encryption algorithm) to make sense of the data.
Description
24 1 3206 - 1 Secure Article Identification The present invention relates
to method and apparatus for marking an article in such a manner that it can only be identified by authorized personnel.
It is sometimes desirable to provide an article with secure identification with regard to its contents. An example of this is medicinal drugs, where ready recognition lo of the drug can lead to misuse or theft. Another example is containers and postal packages while they are in transit.
Hitherto, it has been known to mark an article with a bar code. A conventional bar code can contain a code which of itself is meaningless but which can be linked into a database to provide information on the article. Such a bar code can of course only be used in conjunction with a computer storing the database and in some instances a computer is not available.
It has also been proposed previously to use a two- dimensional bar code in which much more information appertaining to the article can be contained within the bar code itself, obviating the need to link into a database.
There has been developed a standard for two dimensional bar codes (EDF417) which is currently in use in a wide variety of applications, including logistics & transportation, retailing, healthcare, government, identification, and manufacturing. However, the disadvantage in this case is that the information is not secure and can be accessed by any person with a suitable and commercially available two- dimensional bar code reader.
According to a first aspect of the present invention, there is provided a method of marking an article which comprises placing on the article a printed two-dimensional - 2 bar code, characterized in that the data represented by the bar code is securely encrypted.
According to a second aspect of the invention, there is provided a twodimensional bar code reader comprising means for optically reading a bar code, means for analysing the optical signal to reproduce the data represented by the bar code, means for deciphering the data represented by the bar code using a predetermined encryption algorithm and means lo for displaying the deciphered data.
The invention proposes adding secure encryption, which is itself known, to two-dimensional bar codes to allow large amounts of information relating to an article to be passed securely to an end user without the end user having the need to access a separate database.
The invention will now be described further, by way of example, with reference to the accompanying drawings, in which: Figure 1 is a flow chart of the logic steps followed in creating a secure two-dimensional bar code, and Figure 2 is a flow chart of the logic steps followed to read a two-dimensional bar code.
All the hardware needed to implement the invention, both in creating the two-dimensional bar codes and reading them, is conventional and currently available. For this reason, it is not believed necessary to describe it in great detail.
In particular, to create secure two-dimensional bar codes, one can use a conventional personal computer operating under any suitable operating system, such as Windows, Mac, Linux or Unix and connected to a suitable graphics printer. The computer will include means for entering data relating to the article. Such data can either - 3 be entered manually, using a keyboard or imported from another program, such as a word processing, database or spreadsheet program. The computer must also be capable of running an encryption program to encrypt data in accordance with a secure encryption algorithm.
The nature of the algorithm used for data encryption is not fundamental to the present invention and the necessary level of security will be dictated by the sensitivity of the lo encrypted data. As programs for secure encryption of data are well known and used for example in conducting financial transactions on the Internet, it is not believed necessary to describe them and the complex mathematical procedures which they employ within the present context.
To read the bar code, a conventional two-dimensional bar code reader can be modified to implement the invention.
Conventional bar code readers have means for optically reading a bar code, means for analysing the optical signal to reproduce the data represented by the bar code, and means for displaying the deciphered data. To implement the invention, the data represented by the bar code must first be deciphered using the same encryption algorithm as used when the bar code was created before it is sent to the display or the printer.
The flow charts in the drawings further explain the logical steps performed in the creation and reading of two- dimensional bar codes in accordance with the invention.
Fig. 1 relates to the creation of a secure two-dimensional bar code and commences in block 10 where data relating to the article is entered in the manner previously described into a computer. In block 12, the entered data is encoded in accordance with the chosen algorithm and in block 14 the encoded data is passed on to the two-dimensional bar code printing program where it is converted into a PDF417 two dimensional bar code and printed onto a label which is affixed to the article.
In the bar code reader, the first step 20 (see Fig. 2) is to read the encrypted bar code affixed to the article. If a conventional PDF417 bar code reader were used to do this, the resulting displayed data would be meaningless to the reader. However, in a reader modified to implement the present invention, the data is decrypted in block 22 using lo the known encryption algorithm to recover the original data and it is this that is passed on to block 24 for display or printing.
It can thus be seen that by combining encryption with two-dimensional bar codes, the invention allows significant quantities of data to accompany an article, without impairing security, while obviating the need for the bar code reader to be connected to a database. - 5
Claims (2)
1. A method of marking an article which comprises placing on the article a printed two-dimensional bar code, characterized in that the data represented by the bar code is securely encrypted.
2. A two-dimensional bar code reader comprising means for optically reading a bar code, means for analysing the lo optical signal to reproduce the data represented by the bar code, means for deciphering the data represented by the bar code using a predetermined encryption algorithm and means for displaying the deciphered data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0408473A GB2413206A (en) | 2004-04-16 | 2004-04-16 | Encrypting two-dimensional bar codes on articles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0408473A GB2413206A (en) | 2004-04-16 | 2004-04-16 | Encrypting two-dimensional bar codes on articles |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0408473D0 GB0408473D0 (en) | 2004-05-19 |
GB2413206A true GB2413206A (en) | 2005-10-19 |
Family
ID=32320919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0408473A Withdrawn GB2413206A (en) | 2004-04-16 | 2004-04-16 | Encrypting two-dimensional bar codes on articles |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2413206A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2489247A (en) * | 2011-03-21 | 2012-09-26 | Big Box Software Ltd | Method for secure communication of machine-readable encoded data |
ITRM20130049A1 (en) * | 2013-01-29 | 2014-07-30 | Lorenzo Bosio | LABEL FOR THE UNIQUE IDENTIFICATION OF SMART OBJECTS OF THE INTERNET OF THINGS, RELATED METHODS AND SYSTEM FOR THE USE OF THE IDENTITY OF THE SURE THINGS THROUGH THE USE OF THESE SMART OBJECTS |
CN106874780A (en) * | 2015-12-10 | 2017-06-20 | 顺丰科技有限公司 | Mailing information encrypts allocator and server apparatus |
EP2628131A4 (en) * | 2010-10-12 | 2018-01-17 | Hewlett-Packard Development Company, L.P. | A system for generating an incrementally completed security mark |
EP2628132A4 (en) * | 2010-10-12 | 2018-01-17 | Hewlett-Packard Development Company, L.P. | A system for generating an incrementally completed 2d security mark |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5742685A (en) * | 1995-10-11 | 1998-04-21 | Pitney Bowes Inc. | Method for verifying an identification card and recording verification of same |
US5866888A (en) * | 1990-11-20 | 1999-02-02 | Symbol Technologies, Inc. | Traveler security and luggage control system |
US20030118191A1 (en) * | 2001-12-21 | 2003-06-26 | Huayan Wang | Mail Security method and system |
-
2004
- 2004-04-16 GB GB0408473A patent/GB2413206A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5866888A (en) * | 1990-11-20 | 1999-02-02 | Symbol Technologies, Inc. | Traveler security and luggage control system |
US5742685A (en) * | 1995-10-11 | 1998-04-21 | Pitney Bowes Inc. | Method for verifying an identification card and recording verification of same |
US20030118191A1 (en) * | 2001-12-21 | 2003-06-26 | Huayan Wang | Mail Security method and system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2628131A4 (en) * | 2010-10-12 | 2018-01-17 | Hewlett-Packard Development Company, L.P. | A system for generating an incrementally completed security mark |
EP2628132A4 (en) * | 2010-10-12 | 2018-01-17 | Hewlett-Packard Development Company, L.P. | A system for generating an incrementally completed 2d security mark |
GB2489247A (en) * | 2011-03-21 | 2012-09-26 | Big Box Software Ltd | Method for secure communication of machine-readable encoded data |
ITRM20130049A1 (en) * | 2013-01-29 | 2014-07-30 | Lorenzo Bosio | LABEL FOR THE UNIQUE IDENTIFICATION OF SMART OBJECTS OF THE INTERNET OF THINGS, RELATED METHODS AND SYSTEM FOR THE USE OF THE IDENTITY OF THE SURE THINGS THROUGH THE USE OF THESE SMART OBJECTS |
CN106874780A (en) * | 2015-12-10 | 2017-06-20 | 顺丰科技有限公司 | Mailing information encrypts allocator and server apparatus |
Also Published As
Publication number | Publication date |
---|---|
GB0408473D0 (en) | 2004-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8543411B2 (en) | Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale | |
ES2221710T3 (en) | VERIFICATION OF AUTHENTICITY OF ARTICLES USING RANDOM NUMBERS. | |
US7815117B2 (en) | Method and apparatus for counterfeiting protection | |
US7757952B2 (en) | Method and apparatus for counterfeiting protection | |
US9652769B1 (en) | Methods, apparatus and systems for securely storing and/or accessing payment information or other sensitive information based on tokens | |
JP2004094510A (en) | False display preventing method in merchandise circulation and alternation preventing function added label writing device used for the same | |
US5505494B1 (en) | System for producing a personal id card | |
US20190367239A1 (en) | Authentication of packaged products | |
US7881469B2 (en) | Crypto-wireless-tag | |
JP5260795B2 (en) | Product distribution management method via the Internet | |
US20050061878A1 (en) | Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method | |
CN103646331B (en) | Wine anti-counterfeit source tracing method based on enciphered bar code mark | |
US20070152032A1 (en) | Method and apparatus for counterfeiting protection | |
US20030221108A1 (en) | Method for tamperproof marking of products | |
JP2017174456A (en) | Monitor for portable article | |
US20070200335A1 (en) | Method and apparatus for counterfeiting protection | |
CN101944259A (en) | The control method of receipt printing device, receipt printing device and program | |
GB2413206A (en) | Encrypting two-dimensional bar codes on articles | |
CN1776721A (en) | General anticounterfeiting method and system | |
US10977534B1 (en) | Compositions, systems, and methods for unique identifiers embedded in machine verifiable marks having error correction features | |
US9076188B2 (en) | Method and system for shipment authentication | |
US20220391884A1 (en) | Method and System for Transferring a Product | |
JP2005525895A (en) | Product tampering prevention identification method | |
CN109948760B (en) | Information presentation method and device based on two-dimensional code | |
CN112036525B (en) | Method, device, equipment and storage medium for preventing abandoned medical edge tool from being stolen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |