WO2015131163A1 - Method, system, and apparatus for creating an enhancing - Google Patents

Method, system, and apparatus for creating an enhancing Download PDF

Info

Publication number
WO2015131163A1
WO2015131163A1 PCT/US2015/018200 US2015018200W WO2015131163A1 WO 2015131163 A1 WO2015131163 A1 WO 2015131163A1 US 2015018200 W US2015018200 W US 2015018200W WO 2015131163 A1 WO2015131163 A1 WO 2015131163A1
Authority
WO
WIPO (PCT)
Prior art keywords
symbology
recognized
encodation
encoded
additional
Prior art date
Application number
PCT/US2015/018200
Other languages
French (fr)
Inventor
Ronald Barenburg
Original Assignee
1 D Protect, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 1 D Protect, Inc. filed Critical 1 D Protect, Inc.
Publication of WO2015131163A1 publication Critical patent/WO2015131163A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding

Definitions

  • the present invention relates to a method, system, and apparatus for constructing enhanced composite symbology features. More particularly, the present invention relates to a method, system and apparatus for constructing enhanced composite symbology features into globally recognized symbologies for improved data sharing and protection from counterfeiting. Further, the present invention relates broadly to the construction, enhancing and inclusion of methods to expand the abilities of, but not limit the functions of ID linear bar codes of the various symbologies and to provide anti-counterfeiting protection for products.
  • Machine readable bar codes have become ubiquitous in the world of commerce and are necessary for the identification of products in the marketplace. These machine readable codes link the information encoded therein to fully operable database lines that coincide with other data such as, but not limited to, price and quantity.
  • ID bar code symbologies such as GS1-128, UPC- A and EAN-13 are indispensible in rapidly identifying product for inventory control and at Point of Sale (POS).
  • POS Point of Sale
  • 2D bar codes such as: DataMatrix, PDF417 and QR codes serve to compress much more data in a smaller footprint, but require expensive camera based scanner/readers and associated operational systems for those scanner/readers to read and decode said data at high speed.
  • 2D bar codes because of their data compression inside the code itself, can contain more relevant product information such as, but not limited to; identifier, lot number, expiration date and a unique sequential or random serial number, in a machine readable format. This can provide for a supply chain traceability, and a more secure method of identifying units of products while providing significantly more data than ID bar codes, while, because of their ability to accept serial numbers, provide a measure of counterfeit protection.
  • bar codes have accelerated the flow of products and information throughout the global business community. Coupled with the improvements in data accuracy that accompanies the adoption of bar code technology over keyboard data entry, bar code systems are now critical elements in conducting business in the global economy.
  • optically encoded indicia such as bar codes are known in the art.
  • Bar codes carry information encoded into bars and spaces of various widths, arranged in predetermined patterns.
  • the bars and spaces are made up of unit elements called modules having defined dimensions (height/width).
  • a module has a specified height and width which is accepted in the industry and used to plan printer, scanner, label, and packaging dimensions. Width is usually called the horizontal dimension of the module.
  • bar code modules are usually crossed by the scanning beam typically along its horizontal dimension, but many bar codes may be scanned omni-directionally.
  • the relative size of a bar coded label is determined by the type of coding used, as are the actual sizes of the label's individual bars and spaces.
  • the size of the bar code is also directly proportional to the amount of information that is stored in that bar code. Conversely, the amount of information is constrained by the defined dimension limitations on the bar code. In sum, bar codes are scanned via a bar code scanning system, and the encoded information gets extracted and decoded by the system's processing means.
  • Bar code reading can be accomplished by scanning across the bar code with a laser scanner, a wand, a charged coupled device (CCD), or some other solid-state imaging device (SSI). Bar code reading systems are known in the art and have been disclosed, for example, in U.S. Pat. Nos. 4,251,798; 4,360,798; 4,369,361; 4,387,297; 4,409,470 and 4,460,120, the entire contents of each which are incorporated fully by reference. [001 1 J The newest symboiogies include options to encode multiple languages within the same symbol, and can even allow (through deliberate redundancies) reconstruction of data if the symbol is damaged. There are over one hundred (100) defined and known bar code symboiogies. Unfortunately, only a handful of these symboiogies are in current use, and fewer still are widely known and used internationally.
  • CCD charged coupled device
  • SSI solid-state imaging device
  • a number of different one-dimensional bar code symboiogies (alternatively called or referred to as ID-encodation schemes or ID symboiogies) exist. These symboiogies include, but are not necessarily limited to: UPC-A, UPC-E, EAN-8, EAN-13 and UCC/EAN-128 and/or other common-type and known ID bar codes as defined by the representative governing councils, and standards defining organizations. This may also include applicable Application Identifiers, UCC Coupon Value Codes and HIBC UCC/EAN-128 Secondary Input Data formats encoded in UCC/EAN-128, among others known in the ID bar code symbology field.
  • the Uniform Code Council, Inc. (UCC) and EAN International are voluntary standards organizations that together manage the EAN/UCC system.
  • the Automatic Identification Manufacturers Association (AIM) and AIDC are also standards defining organizations that set global standards for multiple facets of technology.
  • ID bar codes due to their low information density storage capacity and defined dimensions, can carry only a limited amount of information, on the order of ten to twenty letters or digits assigned under relative standards to general-level type information.
  • This general-level type information is usually an index to a particular file listing or a general database where general- level information (country code, manufacture's name, type of product, UCC identification, etc.) is stored regarding a manufacturer or type of product.
  • bar codes By using bar codes as a "pointer" to an accessible database field, machine- readable bar codes have the ability to quickly and accurately identify product and other previously-entered coded information, for example sales coupons relating to a particularly item.
  • bar codes as "dumb” vehicles for information have the limitation of being held to a space requirement that puts a ceiling (maximum) on the amount of information that can be contained in the bar code.
  • a conventional bar code symbol is a ' one- dimensional ' (ID) symbol, in that the bars and the spaces extend only in a single direction and 'two-dimensional" (2D) bar codes have been proposed with various concerns noted below with bars, spaces, lines that extend in two directions.
  • UPC-A bar codes Unfortunately 2-D bar code use (and 2D symbology use) in the retail sector is limited by the requirements dictated by the Uniform Code Council (UCC) standard symbology for retail, UPC-A bar codes.
  • the UPC-A standard had a 12 digit, numeric only identifier that breaks down the classification of a product to for items, namely: (1) country code, (2) manufacturer identifier, (3) manufacturer's product identifier and (4) a check digit.
  • UPC-A bar code points to a line item in a database corresponding to that product and the line item includes only these four (4) items of product information.
  • Some 1 -dimensional (1-D or ID) bar codes are referred to as belonging to the (n, k) family.
  • a code of (n, k) type uniquely represents characters by a string of n modules containing "n" bars and "k" spaces.
  • This type of 1-D symbology bar code or EAN/USC symbology is ideal for identifying products sold at a point of sale (POS).
  • POS point of sale
  • this code is designed to be especially tolerant of differing printing methods and allows the bar code to be scanned omni-directionally, speeding up the scanning process, but with the price of severely limiting the amount of data.
  • two-dimensional (2-D) bar codes carry more information per defined dimension substrate area than linear one- dimensional (1-D) bar codes.
  • Some two-dimensional (2-D) bar code symbologies are just an extension of one-dimensional bar codes, in that they are formed by stacking (in an expanded dimension) rows of one-dimensional bar codes and typically placing a horizontal line between each row. In order to keep the same vertical dimension of the overall bar code, the height of each row is made smaller than the normal height of a one-dimensional bar code.
  • An example of this type of code is discussed generally in U.S. Pat. No. 4,794,239, the entire contents of which are incorporated by reference.
  • the scanner's bar code operative processing means must be able to determine the relative position of each scanned codeword (the "codeword” being the numeric value of a ID or optionally a 2D bar code).
  • the scanner must also determine where the codeword fits in relation to other code words within its row and with respect to other rows of code words.
  • Matrix Type codes (Maxi-Code, Data Matrix etc.) codes provide this type of high information density storage capacity in a reasonable size, but are also susceptible to inter-row cross-talk problems during use.
  • Matrix codes are not decodable by a laser scanner (must therefore be read by a more sophisticated and costly optical scanner) and therefore may not be used in many laser-scanning applications.
  • the use of 2D symbology is growing very slowly due to large infrastructure costs, the cross- talk problem noted above, and other concerns commonly known.
  • RSS Reduced Space Symbology
  • CS Composite Symbology
  • RSS-14 encodes the full 14 digit UCC/EAN Item Number in a linear symbol that can be scanned rasteringly or omni-directionally by suitably programmed scanners.
  • RSS-14 LIMITED is a ID linear symbol that encodes a 14 digit UCC/EAN Item Number with a Packaging Indicator/Logistical Variant of zero or one as a prefix to the following number. It is designed for use on small items where label space is horizontally restricted, and will not be scanned at point of sale (POS).
  • GTI Global Trading Identification Number
  • RSS-14 encodes the full 14 digit UCC/EAN Item Number in a linear symbol that can be scanned rasteringly or omni-directionally by suitably programmed scanners.
  • RSS-14 LIMITED is a ID linear symbol that encodes a 14 digit UCC/EAN Item Number with a Packaging Indicator/Logistical Variant of zero or one as a prefix to the following number. It is designed for use on small items where label space is horizontally restricted, and will not
  • ID and 2D codes may be noted from WO 2003/038738, US 7,207,481 and US 7,261,235, US 5,128,527, the entire content of each of which is incorporated herein by reference, as well as the steps and processes for applying bar code for truncating and stacking in two rows (outside a defined dimension), and is used where label space available and particularly on items that are not intended to be scanned at point of sale.
  • a second symbology, Composite Symbology consists of a 1-D symbol (RSS, UPC EAN or UCC/EAN- 128) paired with, and optionally in some cases 'electronically " and logically Tinked' to a 2-D symbol printed ' in the immediate area' of the ID symbol (as in US 7,207,481, incorporated earlier) but outside the defined dimension for the particular code standard.
  • the 2-D symbol is either a PDF-417 symbol, or a UCC EAN specific variant of Micro-PDF-417.
  • Micro-PDF-417 is the version of PDF-417 designed for small item marking applications (small size), for example in semiconductor and electronic component manufacture.
  • CS Composite Symbology
  • CC Composite Component
  • LC Linear Component
  • CC-A has a data capacity of up to 56 digits and uses a UCC/EAN defined variant of Micro-PDF.
  • B CC-B has a data capacity of up to 338 digits and uses standard Micro-PDF with a UCC/EAN reserved codeword.
  • C CC-C has a data capacity of up to 2361 digits and uses a standard PDF-417 with a UCC/EAN reserved codeword.
  • a key concept within the Composite Symbology (CS) is 'linking.
  • the Composite Component (CC) of a Composite Symbol (CS) is printed in immediate conjunction with or in immediate reference with a 1-D bar code symbol, (the Linear Component (LC)) but outside the defined dimension of the standard 1D/2D existing recognized symbology.
  • the 1-D (LC) symbol always contains the primary product identification.
  • the conventional Composite Component (CC) always contains a special codeword indicating that the data is in accordance with UCC/EAN standards; e.g., (a) that a 1-D symbol is also present (required to read), and (b) that the 2-D bar code is "linked" to the 1-D symbol.
  • the 1-D bar code also contains a "link,” indicating that a Composite Component (CC) is present and that the 1-D bar code is linked thereto.
  • CC Composite Component
  • “where possible” reflects the fact that while some 1-D/LC symbologies, such as RSS, can support such a link, other 1-D/LC symbologies such as UPC/EAN and UCC EAN- 128, cannot.
  • the I bar code used within the Composite Symbol (CS) can be RSS, UPC/EAN or UCC/EAN-128.
  • Example 1 Composite Symbology (CS) with RSS-14 limited symbology. See FIG. 1.
  • Example 2 Composite Symbol (CS) with RSS-14 stacked symbology. See FIG. 2,
  • Example 3 Composite Symbol (CS) with UCC/EAN-128 type symbology. See FIG. 3.
  • Example 4 Composite Symbol (CS) with UPC-A type symbology. See FIG. 4.
  • Composite Symbology (CS) concepts are also applicable to other symbologies, including RSS, RSS-14 Truncated, RSS-14 Expanded, RSS- 14 Stacked Omni-directional, UPC-E, EAN-13, EAN-8, with the corresponding Composite variants: CC-A/B, CC-A/B (14), CC-C and CC-C (14).
  • manufactures adopt an anti-counterfeiting solution having the ability to (1) incorporate all products with at least two types of validated anti-counterfeiting technology, into labeling at the point of manufacture (with at least one of these technologies being “covert” or requiring special equipment or knowledge for detection and the other being “overt”, or obvious that an anti-counterfeiting method is being used); (2) create some type of broad electronic data base for tracking purposes, (3) achieve the goal of pedigree requirements by phasing in a system for an electronic pedigree for all drugs and biologies; and (4) that the authentication trail result in a pedigree, capable of specific origin, point of manufacture, contents information, date, lot number to an individual item number.
  • EPC.TM. Electronic Product Codes
  • EPC.TM. is a new type of designated alpha-numeric code that operates like the old bar code symbologies, in that when used as a coded identifier and scanned, links to a line in a database, in many cases an internet-maintained database.
  • the EPC.TM. identifier consists of a string of characters containing information about a specific product or higher order information, i.e.: manufacturer, object classification, and other identifiers specific to an industry and in some rare cases, and a unique serial number for each designated item.
  • the motivation for the new EPC.TM. system is to provide a single code uniquely identifying a product, whether by unit, or at any desired packaging level, from its manufacture through the supply chain to delivery, by a system of readers and online databases that are updated regularly as that item(s) moves through the supply chain.
  • the EPC.TM. system is linked with, and transmitted by, the RFID tag technology system, either in 64 or 96 bit configurations.
  • the EPC.TM. system unfortunately necessitates all of the software, hardware, and RFID configurations included in an integrated superstructure, as well as being dependent on the unproven online database for tracking and reporting.
  • Radio Frequency Identification has been advocated as the successor to the bar code because of its ability to store much information and have that information read by out-of-line-of-sight readers, in either singularly or in multiple configurations employing RF signal receivers. Read/ Write RFID tags may also allow the "tagged" information to be electronically updated.
  • RFID Radio Frequency Identification
  • drawbacks to the RFID system include the expensive, and the interconnected and integrated infrastructure necessary to support the utilization of RFID as a vehicle for the transportation of information.
  • the EPC.TM. process necessitates all of the software, hardware and RFID configurations included in an integrated infrastructure, as well as being dependent upon an unproven online RFID linked database for tracking and reporting.
  • Other problems with RFID exist including interference with the tiny RF (Radio Frequency) signals, and privacy issues. As a consequence, there has been resistance to immediate investment and adaptation of the R ID symbology schema.
  • What is needed is the capacity for use of an existing recognized symbology having a defined dimension in the industry to be modified into a composite symbology in a new way to utilize the 'unused' portions in the defined dimensions of the recognized symbology and for use and integration with these items in a commercial system from original creation to point of purchase.
  • What is needed is a manner to employ previously unknown recognized symbologies and new item-specific information without changing the present physical infrastructure substantially, using known existing printing techniques, and addressing privacy and speed concerns while enabling secure information systems to track user-identified items through changes in makeup or amount, quantity, location, etc. while retaining original information within the same defined dimension.
  • the proposed invention provides a secured item specific identification system provides a method and a resultant apparatus for an enhanced symbology wherein unused portions of existing recognized symbologies are recognized and utilized for readable data presentation and system linkages without interfering with an existing initial readability function of the existing recognized symbology by using a composite symbology format and one or multiple character linked streams.
  • the system provides reading, printing, and scanning integrated options with enhanced data sharing and protection from counterfeiting.
  • These features may include, but are not limited to: inclusion of alpha, numeric, or alpha-numeric characters either in human readable or OCR readable format that may be used as modifiers concealed or revealed in portions of ID symbologies that can improve data sharing of relevant information about the product here-to-for only available in 2D symbologies, or connect via internet connection to relevant URL's (universal resource locators). Information may be obtained via conventional or specially constructed readers, visually or in combination. In addition, by means of creating those characters with an inability to be duplicated, when needed, a method is provided for product protection from counterfeiting.
  • Another alternative aspect of least one embodiment of the present invention is to, not only provide the usual parameters of a recognized ID bar code according to recognized globally accepted various code standards, but to utilize unused portions and available for selected data; to wit: the spaces in between, above and alongside the bars of ID bar codes, without interfering with the original machine readability of the bars and spaces that configure the recognized code.
  • Another alternative aspect of the present invention is to provide a system and method and apparatus operative to create an algorithm functional to automatically insert selected data in a method so as to create logical alpha, numeric and/or alphanumeric data string characters in a wide range of fonts and sizes, in said unused portions available for data: to wit: the spaces in between, above and on the sides of the bars of ID bar codes.
  • Another alternative aspect of the present invention is to utilize that algorithm in a software program to enable a user skilled in the arts to create one or multiple human readable alpha, numeric, and/or alphanumeric character data strings in a wide range of fonts and sizes.
  • Another alternative aspect of the present invention is to utilize that algorithm in a software program to enable a user, skilled in the arts, to create composite Optical Character Recognition (OCR) alpha, numeric, and/or alphanumeric character data strings, in a wide range of fonts and sizes that can still be interpreted by a conventional off the shelf and easily available, or specially constructed OCR program linked to a scanner or reader, either connected to a desktop, laptop, tablet or pad or smartphone utilizing said program.
  • OCR Optical Character Recognition
  • Said reader or scanner would be configured to have the ability to decode the ID bar code as constructed, as well as optically 'read' the OCR characters embedded therein and allow a program for suitably configured desktop, laptop, tablet or pad, and smartphones (each electronic device being operatively functional and containing non-transitory processor readable mediums and associated electronics for receive, updating and communicating, whether wireless or tethered, to parse the character string in appropriate lines in programs and/or databases.
  • Another alternative aspect of the present invention is to enhance the ability of ID bar codes to further include the ability of a preprogrammed scanner/reader to provide a prefix necessary to connecting to the World Wide Web or internet, or: http://. Then in a further specifically adding the web address to create a 'tiny URL' link; for example, tinyurl.com/ and then by including in the existing spaces of the recognized ID bar code symbology the data string, for instance: 'n4ows7m' would appear to a suitably configured scanner/reader to be the web address of: http://tinyurl.com/n4ows7m then, in a suitably configured scanner/reader the command for 'enter' as a 'suffix' would complete the string and command needed to complete an internet connection to that URL.
  • Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes that embodies an expiration date of an item in any of the acceptable configurations acceptable to various supply chain requirements.
  • Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes that embodies a lot number in any of the acceptable configurations acceptable to various supply chain requirements.
  • Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes that embodies a serial number, either sequential or random, in any of the acceptable con6gurations acceptable to various supply chain requirements.
  • Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes, that embodies any other GSI GTIN and /or requirements for NDC requirements or recognized categories that would enhance an otherwise unenhanced ID bar code or linear portion of 2D bar codes.
  • Another alternative aspect of the present invention is to allow for the GSI Application Identifiers(AI) to be used as a prefix, i.e.: (17) expiration date, (10) lot number and (21) serial number, for any of the aforementioned character data strings in a wide range of fonts and sizes, according to the GSI specifications for numeric and/or alphanumeric requirements set forth.
  • Another alternative aspect of the present invention is to provide a methodology in the construction of alternative data so as to allow single or multiple character data strings to be included on a single ID bar code or linear portion of a 2D bar code as needed by the user.
  • Another alternative aspect of the present invention is to provide the ability of the software program to allow for said data string characters in a wide range of fonts and sizes, to be created in a color from any of the color standards such as: RGB, CYMK or other globally accepted color palette.
  • Another alternative aspect of the present invention is to provide a method to change the color of the bars and spaces to reflect the correct relationship, either visually, conceptually or for security purposes.
  • Another alternative aspect of the present invention is for said data string characters in a wide range of fonts and sizes to be intentionally bold so as to be easily read as human readable or as OCR machine readable.
  • Another alternative aspect of the present invention is to provide for said data string characters in a wide range of fonts and sizes to be intentionally light colored in a manner so as to render them either virtually (human-visibly) non- discernible or non-existent when copied.
  • Another alternative aspect of the present invention is to provide a method to provide supply chain and interested parties a way to recognize that if said alpha, numeric, and/or alpha numeric data string characters are not present in the unused portions of the spaces in between the bars, that the product is suspect.
  • Another alternative aspect of the present invention is to provide for a graphic that is barely evident, but when copied is much less discernable or disappears altogether (from human-visual appearance or during a photo-copy or scan-copy).
  • Another alternative aspect of the present invention is to provide a hexadecimal color block in either the spaces between or above the bars of a ID bar code as an alternative that is available, and relates in some manner, such as a serial number, to the character data string contained in the ID bar code.
  • Another alternative aspect of the present invention is to provide a secure methodology to encrypt the entire code by altering the bar and space relationship (forming a composite symbology (CS)) and requiring a separately-known password to 'reconstruct' the original information for full reading of the composite symbology (CS).
  • Another alternative aspect of the present invention is to provide all the attribute parameters to construct a ID bar code that comply with relevant recognized standards specifications, guidelines and constraints inherent in the of building of said ID bar code for the various business, commercial, healthcare and other sectors; such as, but not limited to: pharmaceutical, postal, gaming, publishing or finance.
  • Another alternative aspect of the present invention is to provide a method to save the constructed composite symbology (CS) bar code with the relevant information in a graphic format that may include, but not limited to: EPS, Bitmap or PDF.
  • CS composite symbology
  • Another alternative aspect of the present invention is to provide a stand alone application with or without all of the aforementioned attributes usable for desktop graphic design.
  • Another alternative aspect of the present invention is to provide operative device drivers and engine code libraries stored in non-transitory processor readable mediums for non-commercial printers such as, but not limited to: inkjet and laser.
  • Another alternative aspect of the present invention is to provide device drivers and engine code libraries stored in a non-transitory processor readable medium for commercial printing, such as, but not limited to: offset lithography, engraving, thermography, reprographics, digital, letterpress, screen, flexography and gravure.
  • Another aspect of the present invention is to provide device drivers and engine code libraries stored in a non-transitory processor readable medium for production line printers, such as, but not limited to: inkjet, laser, offset lithography and digital.
  • Another aspect of the present invention is to provide an internet activated, online application with all the aforementioned attributes, that contains the appropriate interface stored in a non-transitory processor readable medium to construct a specific ID bar code and download it to a suitably configured printer; i.e.: desktop, commercial or online (production).
  • Fig. 1 is an exemplary code specimen as discussed herein.
  • Fig. 2 is an exemplary code specimen as discussed herein.
  • Fig. 3 is an exemplary code specimen as discussed herein.
  • Fig. 4 is an exemplary code specimen as discussed herein.
  • Fig. 5 is an is a simplified schematic view of two types of devices, a personal computer and a wireless device master data system links data bases and otherwise, both of which have access to at least one network such as the Internet and/or a wireless network, which may be used according to an exemplary embodiments of a method and/or system of the present invention.
  • Fig. 6 is an exemplary construct of one of the functional electronic devices in the proposed system.
  • Fig. 7 is a descriptive diagram depicting steps in a labeling process according to one alternative embodiment of the present invention.
  • Fig. 8 is a schematic opening step of a database creation encodation with the master data system 10 for creating a GSI or other ID or 2D composite encodation.
  • Fig. 9 is a schematic illustration opening step to identify a data bar options for types of actions.
  • Fig. 10 is a schematic illustration step for determining file and action type options.
  • Fig. 11 is a schematic illustration step for determining text and options.
  • FIG. 12 is a schematic illustration step for entering additional information into an encodation database determining step.
  • Fig. 13 is a schematic illustration step for entering additional information into the encodation database determining step such as color, space, etc.
  • Fig. 14 is a schematic illustration step for entering additional information into the encodation database step such as type and style of fonts.
  • Fig. 15 is a schematic illustration step for a draw block color step, noting the hexadecimal color pattern (optionally visible) and representing the developing composite new symbology in a viewing pane.
  • Fig. 16. is an exemplary alternative encodation illustration wherein a determination is made to insert a color designation (outer ring is blue, middle red, inner pale green) for a security image as viewed in a pre-view window.
  • Fig. 17 is an exemplary databar noting an insertion of an Expiration designation ( ⁇ 140216') placed between the bar spaces.
  • Fig. 18 is an exemplary databar noting an insertion of an Lot designation ('LRDC999') placed between the bar spaces.
  • Fig. 19 is an exemplary databar noting an insertion of a Serial Number designation ('500000019') placed between the bar spaces.
  • Fig. 20 is an exemplary databar noting a color insertion of all three Expiration, Lot, Serial designations placed between the bar spaces.
  • Fig. 21 is an exemplary databar noting a light-pale color insertion of all three Expiration, Lot, Serial designations placed between the bar spaces. It is noted that the indications are intentionally noted as very faint and pale in view of the light color and are the same as in Fig. 20 illustrating designation of color tone.
  • Fig. 22 is the exemplary databar of Fig. 21 after a photocopying step noting the inability to copy the light-pale color insertion images and thereby serve as a safety feature.
  • Fig. 23 is an exemplary data bar noting the insertion of a faint-color unencrypted Expiration, Lot, Serial Number.
  • Fig. 24 is an exemplary data bar as in Fig. 23 noting the inclusion of printing using non-human visible ink (readable by laser spectrum of scanners, phones, and other imaging systems.
  • Fig. 25 is a schematic representation of a rejected retrieval result for accessing master data system 10 without the correct composite symbology (a rejection requiring entry of a password) as a fraud prevention measure.
  • Fig. 26 is an enlarged and updated and partially reduced (bottom numbers removed for close-viewing) version of a previous encodation now including an additional tiny URL completion set ('n40ws7m') which when linked with an external reader and reading the composite encodation will scan and connect the link and then access master data system 10 and further scan the encoded Expiration/Lot/Serial for enhanced security.
  • 'n40ws7m' additional tiny URL completion set
  • Fig. 27 is a schematic view of another embodiment as discussed herein. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIG. 5 a simplified schematic view of a proposed system 1 contains two types of devices, a personal computer 2 having a keyboard 4 and mouse 5 and related non-transitory processor readable medium and related features and functions stored in a unit 6 having memory interface storage at 7A, 7B, as will be discussed with a wireless device 8 master data system 10 with operative interfaces and linkages 1 1 to data bases and otherwise, both of which have access to at least one network 12 such as the Internet and/or a wireless network 12 for linking anywhere in the world or to other computers and electronic functional devices represented at 13, which may be used according to an exemplary embodiments of a method and/or system of the present invention.
  • a network 12 such as the Internet and/or a wireless network 12 for linking anywhere in the world or to other computers and electronic functional devices represented at 13, which may be used according to an exemplary embodiments of a method and/or system of the present invention.
  • At least one of the functional electronic devices in system 1 will include a computer bus 301 for interlinking and communication with a number of functional elements including a computer processing unit 302, a video feature 303, a printer feature 304, an audio 305 or scanner feature 306, a display device 308 for displaying interactive data, a random access memory device 314, a ROM 313, disk features 312, a keyboard 311 as representative keyboards 4 previously, and a pointing device 310.
  • communications system 307 is functionally communicative with each aspect in master system 10 noted earlier.
  • the recordable mediums herein may be transitory or non -transitory processor readable mediums but that each will function within the range of computer mediums known in the art now and in the future to effectively operate as noted herein.
  • Fig. 7 is a descriptive diagram depicting steps in a labeling process according to one alternative embodiment of the present invention for an operative master data system 10 for producing the proposed symbologies proposed herein along a production environment wherein a roll of printed labels 1 (or pre-printed packages with a pre-printed ID or 2D recognized symbology having a specified pre-defined dimension) is provided to a scanner 2 for initial scanning to determine the correct label details therein and for related interface with the respective master data system 10 and then next to a labeler 3 for either label control in a label step 3 or transfer to a further scanner 4 (optional) for additional confirmation, and upon receiving a confirmation of advancement transmission to a printer for printing an additional sysmbology and for a scanning 6 for determining correctness to a later printer 7 for optional further application of information to a downstream packaging system 8 to a further optional scanner 9 for conBrmation of one or more factors of the prior labeling and identification steps to a possible further printer 10 as may be desired within master data
  • a GS1 Data Bar Application is launched and provided for user-interaction using the proposed network 12 and computer interface devices (computer 3, 13, 8, etc.) and an access step is provided wherein a user launches the GS 1 Databar Application (See Fig. 8) and determine step provides the composite symbology desired needed (See Fig. 9); next a selection step is made of an Exact GS1 format needed (See Fig. 10); and an entry and update is made to enter main text for ID data string (Fig. 1 1); in a next step there is a determination if 2D text is needed (Fig.
  • the Expiration (E) is very faint (intentionally difficult to reproduce/intentionally blurry) as ' 140216' (faintly visible), the Lot number (L) is 'RDC999' (faintly visible), and the Serial Number (S) is '00000018' (faintly visible); it is noted the non-faint/non-hidden version is shown in Fig. 20.
  • a security image ('oval') is shown I Fig. 16 in 'faint' view.
  • a difficult-to- reproduce color may be used in a human- visible spectrum, or alternatively a non- human- visible-spectrum but scan-able spectrum may be used to print on the code (rendering the ELS, security image, etc. 'invisible' to a viewer-infringer).
  • a step of determining and drawing a 'color' Expiration (E) is shown in a designated color (here purple and faint).
  • a 'color' Lot (L) number is shown in a designated color (here purple and faint).
  • a 'color' Serial (S) number in a designated color (here purple).
  • a Data bar notes the Expiration/Lot/Serial number in a light color (here a faint purple).
  • a Data bar shows the Fig. 21 faint color in an 'after copying' designating that the faint color strength and color choice is sufficient to thwart a copy infringement effort (Fig. 22 is Fig. 21 after a 'copy step).
  • a Fig. 23 step the previously designated GS1 Data for Expiration, Lot, and Serial are shown in light color (purple here) and then in a Fig.
  • Step 25 if the ID data is to be encrypted (as in Fig. 24) then a password is stored in the originating database, and upon a user-scanning the code a password-entry window is provided with a password retrieval function through the master data system 10.
  • a further step Fig.
  • a reader/scanner is preprogrammed to scan and link the ' ID' included symbology with the URL and link to the site in the data-base via the master data system 10 and to then read the Expiration/Lot/Serial number and the ID code as well.
  • Fig. 26 is in the same as Fig. 20 (bold printing) but with the removal of the bottom numerals for review.
  • each of the existing recognized symbologies include a defined outer dimension that is recognized as being the outer-dimensional height/width of the ID or 2D code itself.
  • a side dimension 100 on either left-right side above each outer numeral is required to remain 'open' within the outer dimension height/width.
  • the present invention recognizes the opportunity to create a new composite symbology (CS) where the additional ID or 2D encodation is placed within the existing recognized symbology boundaries and within the readable-space therein.
  • CS composite symbology
  • a color (shown black/white) hexadecimal block 101 is placed within the defined dimension 102 for the particular existing recognized symbology in the 'Master ID' 103.
  • the color block 101 is constructed using the encodation algorithms noted herein to convert a unique serial number (or other information such as lot, serial number, expiration, etc.) into a colored hexadecimal (or non-colored), and place and print the same within the defined dimension region 102 without the need for additional space.
  • a database generated using this unique serial number with this master number will identify a range of numbers with a specified lot number and expiration date range.
  • Fig. 27B the same composite encodation as in Fig.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A secured item specific identification system provides a method and a resultant apparatus for an enhanced symbology wherein unused portions of existing recognized symbologies are recognized and utilized for readable data presentation and system linkages without interfering with an existing initial readability function of the existing recognized symbology by using a composite symbology format and one or multiple character linked streams. The system provides reading, printing, and scanning integrated options with enhanced data sharing and protection from counterfeiting.

Description

METHOD, SYSTEM, AND APPARATUS FOR CREATING AN ENHANCING COMPOSITE SYMBOLOGY AND THEIR CONSTRUCTION AND METHOD FOR IMPROVED PRODUCT PROTECTION USING ENHANCED SYMBOLOGY
CROSS REFERENCE TO RELATED APPLICATIONS
[001] This application relates to and claims priority from US Prov, Ser. No,: 61/945,470 filed February 27, 2014, the entire contents of which are incorporated herein by reference.
FIGURE FOR PUBLICATION
[002] Fig. 15
BACKGROUND OF THE INVENTION Field of the Invention
[003] The present invention relates to a method, system, and apparatus for constructing enhanced composite symbology features. More particularly, the present invention relates to a method, system and apparatus for constructing enhanced composite symbology features into globally recognized symbologies for improved data sharing and protection from counterfeiting. Further, the present invention relates broadly to the construction, enhancing and inclusion of methods to expand the abilities of, but not limit the functions of ID linear bar codes of the various symbologies and to provide anti-counterfeiting protection for products.
Description of the Related Art
[004] Machine readable bar codes have become ubiquitous in the world of commerce and are necessary for the identification of products in the marketplace. These machine readable codes link the information encoded therein to fully operable database lines that coincide with other data such as, but not limited to, price and quantity. Existing recognized one-dimensional (ID) bar code symbologies such as GS1-128, UPC- A and EAN-13 are indispensible in rapidly identifying product for inventory control and at Point of Sale (POS). Information regarding Lot Number, Expiration Date or Serial Number (if present) now may resides on the label around the bar code, and unfortunately is solely in human readable, not machine readable, format.
[005] At present, individualized unit(s) are not uniquely identified at production and there are numerous problems associated with such attempts. A run of 10,000 or 1,000,000 units (for example) of a product will all have the same existing recognized symbology bar code identifier that indicates, among criteria unique to its industry; country, manufacturer, product and unit count. Because of these limitations, ID bar codes, while useful and an existmg recognized symbology, lack basic information that needs to be provided in addition to the bar code. In addition, because every unit of every product with a ID bar code carries the same identifier, counterfeiting is a real and current threat as is noted below.
[006] At present, existing recognized symbologies in two-dimensional (2D) bar codes such as: DataMatrix, PDF417 and QR codes serve to compress much more data in a smaller footprint, but require expensive camera based scanner/readers and associated operational systems for those scanner/readers to read and decode said data at high speed. 2D bar codes however, because of their data compression inside the code itself, can contain more relevant product information such as, but not limited to; identifier, lot number, expiration date and a unique sequential or random serial number, in a machine readable format. This can provide for a supply chain traceability, and a more secure method of identifying units of products while providing significantly more data than ID bar codes, while, because of their ability to accept serial numbers, provide a measure of counterfeit protection. [007] Generally, since their invention in the early 1950's, bar codes have accelerated the flow of products and information throughout the global business community. Coupled with the improvements in data accuracy that accompanies the adoption of bar code technology over keyboard data entry, bar code systems are now critical elements in conducting business in the global economy.
[008] As discussed in U.S. Pat. No. 6,631,843, the entire contents of which are incorporated fully by reference, optically encoded indicia, such as bar codes are known in the art. Bar codes carry information encoded into bars and spaces of various widths, arranged in predetermined patterns. The bars and spaces are made up of unit elements called modules having defined dimensions (height/width). A module has a specified height and width which is accepted in the industry and used to plan printer, scanner, label, and packaging dimensions. Width is usually called the horizontal dimension of the module. When a laser scanner scans a bar code, bar code modules are usually crossed by the scanning beam typically along its horizontal dimension, but many bar codes may be scanned omni-directionally.
[009] The relative size of a bar coded label is determined by the type of coding used, as are the actual sizes of the label's individual bars and spaces. The size of the bar code is also directly proportional to the amount of information that is stored in that bar code. Conversely, the amount of information is constrained by the defined dimension limitations on the bar code. In sum, bar codes are scanned via a bar code scanning system, and the encoded information gets extracted and decoded by the system's processing means.
[0010] Bar code reading can be accomplished by scanning across the bar code with a laser scanner, a wand, a charged coupled device (CCD), or some other solid-state imaging device (SSI). Bar code reading systems are known in the art and have been disclosed, for example, in U.S. Pat. Nos. 4,251,798; 4,360,798; 4,369,361; 4,387,297; 4,409,470 and 4,460,120, the entire contents of each which are incorporated fully by reference. [001 1 J The newest symboiogies include options to encode multiple languages within the same symbol, and can even allow (through deliberate redundancies) reconstruction of data if the symbol is damaged. There are over one hundred (100) defined and known bar code symboiogies. Unfortunately, only a handful of these symboiogies are in current use, and fewer still are widely known and used internationally.
[0012] A number of different one-dimensional bar code symboiogies (alternatively called or referred to as ID-encodation schemes or ID symboiogies) exist. These symboiogies include, but are not necessarily limited to: UPC-A, UPC-E, EAN-8, EAN-13 and UCC/EAN-128 and/or other common-type and known ID bar codes as defined by the representative governing councils, and standards defining organizations. This may also include applicable Application Identifiers, UCC Coupon Value Codes and HIBC UCC/EAN-128 Secondary Input Data formats encoded in UCC/EAN-128, among others known in the ID bar code symbology field.
[0013] The Uniform Code Council, Inc. (UCC) and EAN International are voluntary standards organizations that together manage the EAN/UCC system. The Automatic Identification Manufacturers Association (AIM) and AIDC are also standards defining organizations that set global standards for multiple facets of technology. Unfortunately, ID bar codes, due to their low information density storage capacity and defined dimensions, can carry only a limited amount of information, on the order of ten to twenty letters or digits assigned under relative standards to general-level type information. This general-level type information is usually an index to a particular file listing or a general database where general- level information (country code, manufacture's name, type of product, UCC identification, etc.) is stored regarding a manufacturer or type of product.
[0014] Since the inception of retail bar code scanning, the identification of products using machine-readable bar codes has enhanced the efficiency of the supply chain, and the networking of voluntary opt-in supply-chain partners, in all business sectors.
[0015] By using bar codes as a "pointer" to an accessible database field, machine- readable bar codes have the ability to quickly and accurately identify product and other previously-entered coded information, for example sales coupons relating to a particularly item. Unfortunately, bar codes as "dumb" vehicles for information have the limitation of being held to a space requirement that puts a ceiling (maximum) on the amount of information that can be contained in the bar code.
[0016] It should be understood, that a conventional bar code symbol is a 'one- dimensional' (ID) symbol, in that the bars and the spaces extend only in a single direction and 'two-dimensional" (2D) bar codes have been proposed with various concerns noted below with bars, spaces, lines that extend in two directions.
[0017] With the advent of two-dimensional (2-D) encodation schemes (alternatively called 2D symbologies or 2D encodation schemes) for bar codes such as: DataMatrix, PDF-417, Reduced Space Symbology (RSS) and Composite Symbology (CS), the amount of information that may be placed into the physical bar code (within a smaller footprint) increased.
[0018] Unfortunately 2-D bar code use (and 2D symbology use) in the retail sector is limited by the requirements dictated by the Uniform Code Council (UCC) standard symbology for retail, UPC-A bar codes. The UPC-A standard had a 12 digit, numeric only identifier that breaks down the classification of a product to for items, namely: (1) country code, (2) manufacturer identifier, (3) manufacturer's product identifier and (4) a check digit. Thus, when scanned, a UPC-A bar code points to a line item in a database corresponding to that product and the line item includes only these four (4) items of product information. Where a UPC-A code was extended indefinitely in size (for example 20 centimeters (cm)) additional data may be stored, this adaptation has not been adopted due to the impermissible size concerns and inability to manage a code data base in such a manner.
[0019] Some 1 -dimensional (1-D or ID) bar codes are referred to as belonging to the (n, k) family. A code of (n, k) type uniquely represents characters by a string of n modules containing "n" bars and "k" spaces. The UPC symbology is an example of a (7,2) code, i.e., n=7 and k~2. This type of 1-D symbology bar code or EAN/USC symbology is ideal for identifying products sold at a point of sale (POS). As will be noted, this code is designed to be especially tolerant of differing printing methods and allows the bar code to be scanned omni-directionally, speeding up the scanning process, but with the price of severely limiting the amount of data.
[0020] Since many retailers have not purchased 2-D or 2D bar code scanners which are expensive, the use of 2-D bar codes in the retail sector provides an additional limitation and risks confusion. As a consequence, 2-D readers and codes are commonly relegated to use in the manufacture of small items that required a machine readable bar code (like electronics), that before 2D bar codes could not be marked with the standard 1-D bar codes like UCC/EAN Code 128, Code 39, or Interleaved 2 of 5 Codes. The Interleaved 2 of 5 Codes include (1) a quite zone, (2) a start character, (3) the encoding data, (4) a stop character, and (5) a trailing quiet zone, in addition to the information noted above.
[0021] As will be generally described, two-dimensional (2-D) bar codes carry more information per defined dimension substrate area than linear one- dimensional (1-D) bar codes. Some two-dimensional (2-D) bar code symbologies are just an extension of one-dimensional bar codes, in that they are formed by stacking (in an expanded dimension) rows of one-dimensional bar codes and typically placing a horizontal line between each row. In order to keep the same vertical dimension of the overall bar code, the height of each row is made smaller than the normal height of a one-dimensional bar code. An example of this type of code is discussed generally in U.S. Pat. No. 4,794,239, the entire contents of which are incorporated by reference.
[0022] A number of different two-dimensional 2D symbologies exist. Some of the symbologies are: Aztec Code, Code 16K, Code 49, Data Matrix and Maxi- Code, etc. PDF-417 symbology is one type of "stacked' two-dimensional bar code symbology used when needed to encode a greater amount of information within a limited amount of space, thus giving generating an even higher information density encodation scheme. An example of this type of symbology is discussed in U.S. Pat. No. 5,304,786, the entire contents of which are incorporated by reference.
[0023] When a bar code is scanned by a laser scanner or a Charge Coupled Device (CCD) scanner, the scanner's bar code operative processing means must be able to determine the relative position of each scanned codeword (the "codeword" being the numeric value of a ID or optionally a 2D bar code). Unfortunately, not only must the scanner itself be able to properly decode and parse the information contained in the particular codeword, the scanner must also determine where the codeword fits in relation to other code words within its row and with respect to other rows of code words.
[0024] Being able to implicitly encode the size or version of the bar code label while eliminating the explicit version information code words will increase the label data storage efficiency.
[0025] One type of 2D symbology, "Matrix Type codes" (Maxi-Code, Data Matrix etc.) codes provide this type of high information density storage capacity in a reasonable size, but are also susceptible to inter-row cross-talk problems during use. As an additional problem, Matrix codes are not decodable by a laser scanner (must therefore be read by a more sophisticated and costly optical scanner) and therefore may not be used in many laser-scanning applications. In sum, the use of 2D symbology is growing very slowly due to large infrastructure costs, the cross- talk problem noted above, and other concerns commonly known. [0026] There remains, however, an increasing need for machine-readable symbols that contain more information than conventional bar code symbols. These types of symbols are generally referred to as Reduced Space Symbology (RSS) and Composite Symbology (CS) symbols and should be understood as also being either types of ID or 2D symbologies depending upon their actual design (as will be discussed below), and may be included in references hereafter to ID or 2D symbologies as will be noted.
[0027] There are four different versions of the RSS family, each with slightly different features. Each version is designed to contain the UCC/EAN's designated Global Trading Identification Number (GTI ). RSS-14 encodes the full 14 digit UCC/EAN Item Number in a linear symbol that can be scanned rasteringly or omni-directionally by suitably programmed scanners. RSS-14 LIMITED is a ID linear symbol that encodes a 14 digit UCC/EAN Item Number with a Packaging Indicator/Logistical Variant of zero or one as a prefix to the following number. It is designed for use on small items where label space is horizontally restricted, and will not be scanned at point of sale (POS).
[0028] Different arrangements for ID and 2D codes may be noted from WO 2003/038738, US 7,207,481 and US 7,261,235, US 5,128,527, the entire content of each of which is incorporated herein by reference, as well as the steps and processes for applying bar code for truncating and stacking in two rows (outside a defined dimension), and is used where label space available and particularly on items that are not intended to be scanned at point of sale.
[0029] A second symbology, Composite Symbology (CS), consists of a 1-D symbol (RSS, UPC EAN or UCC/EAN- 128) paired with, and optionally in some cases 'electronically" and logically Tinked' to a 2-D symbol printed 'in the immediate area' of the ID symbol (as in US 7,207,481, incorporated earlier) but outside the defined dimension for the particular code standard. The 2-D symbol is either a PDF-417 symbol, or a UCC EAN specific variant of Micro-PDF-417. Micro-PDF-417 is the version of PDF-417 designed for small item marking applications (small size), for example in semiconductor and electronic component manufacture. Collectively, reference to a Composite Symbology hereafter may refer to a linked or non-linked/unlinked Composite Symbology depending upon the reference as noted herein.
[0030) in a conventional Composite Symbol (CS), the 1-D bar code is always immediately present and contains primary product identification information. Several types of Composite Symbols (CS) have been organizationally defined. The data capacity of the Composite (2-D) Component ranges from 56 digits to a maximum of 2361 digits.
[0031] As noted, present Composite Symbology (CS) technology combines a 1-D bar code with a high-capacity 2-D symbol based on PDF-417 or Micro-PDF in a single code printed together. In CS, the 2-D symbol is referred to as the Composite Component (CC) whilst the 1-D symbol is known as the Linear Component (LC).
[0032] There are three variants of the Composite Component (CC) each with a different data capacity: (A) CC-A has a data capacity of up to 56 digits and uses a UCC/EAN defined variant of Micro-PDF. (B) CC-B has a data capacity of up to 338 digits and uses standard Micro-PDF with a UCC/EAN reserved codeword. (C) CC-C has a data capacity of up to 2361 digits and uses a standard PDF-417 with a UCC/EAN reserved codeword.
[0033] A key concept within the Composite Symbology (CS) is 'linking.' The Composite Component (CC) of a Composite Symbol (CS) is printed in immediate conjunction with or in immediate reference with a 1-D bar code symbol, (the Linear Component (LC)) but outside the defined dimension of the standard 1D/2D existing recognized symbology. In 'linking,' the 1-D (LC) symbol always contains the primary product identification. The conventional Composite Component (CC), always contains a special codeword indicating that the data is in accordance with UCC/EAN standards; e.g., (a) that a 1-D symbol is also present (required to read), and (b) that the 2-D bar code is "linked" to the 1-D symbol.
[0034] In conventional CS, "where possible" (e.g., optionally), the 1-D bar code also contains a "link," indicating that a Composite Component (CC) is present and that the 1-D bar code is linked thereto. Here, "where possible" reflects the fact that while some 1-D/LC symbologies, such as RSS, can support such a link, other 1-D/LC symbologies such as UPC/EAN and UCC EAN- 128, cannot. Depending on the application, the I bar code used within the Composite Symbol (CS) can be RSS, UPC/EAN or UCC/EAN-128.
[0035] Unfortunately, practical restrictions exist using the CS format. For example, RSS can be used only with CC-A and CC-B symbologies. As further explanation, the following examples and symbols are included. Example 1, Composite Symbology (CS) with RSS-14 limited symbology. See FIG. 1. Example 2, Composite Symbol (CS) with RSS-14 stacked symbology. See FIG. 2, Example 3, Composite Symbol (CS) with UCC/EAN-128 type symbology. See FIG. 3. Example 4, Composite Symbol (CS) with UPC-A type symbology. See FIG. 4. Additionally, Composite Symbology (CS) concepts are also applicable to other symbologies, including RSS, RSS-14 Truncated, RSS-14 Expanded, RSS- 14 Stacked Omni-directional, UPC-E, EAN-13, EAN-8, with the corresponding Composite variants: CC-A/B, CC-A/B (14), CC-C and CC-C (14).
[0036] In sum, conventional Composite Symbology (CS), which incorporates a 1- D linear component with a 2-D Composite Component but requires that combination to be outside the defined dimensions of the previously accepted dimensions of the recognized standard symbology, and was a recently created class of symbology designed to address applications that are not being met by current technology solution sets. Composite Symbology (CS), as previously used in US 7,207,481 and 7,261,235 by the inventor, was understood as a combination of two encodation schemes, generally a ID and 2D scheme.
[0037] Unfortunately, where new 1-D, 2-D, or CS technology is created, infringers, copyists, counterfeiters, and other criminals rapidly attempt to duplicate or copy a particular bar code to gain legitimacy and move their goods into or through a legitimate means and into the opt-in manufacturer-supplier- customer network. As a further detriment, the use of such complex encodations and symbologies negatively impacted the ease-of-use of previously developed scanners, readers, printers, and related identification and tracking schemas.
[0038] it is estimated that approximately 30 billion dollars, or about 10% of the entire world pharmaceutical drug market is "lost" annually (via theft, physical loss, counterfeiting, improper returns, legitimate returns, or damage). Additionally, negative impacts of a similar order of magnitude exist in the worlds of fashion infringement, lottery tickets, commercial and consumer products (goods, farm items, aerospace, automotive etc.). There is an immediate need for a solution to prevent counterfeit drug labels and products because the largest markets for counterfeit drugs include the US and European Union countries.
[0039] The FDA and other product protection groups suggests, that manufactures adopt an anti-counterfeiting solution having the ability to (1) incorporate all products with at least two types of validated anti-counterfeiting technology, into labeling at the point of manufacture (with at least one of these technologies being "covert" or requiring special equipment or knowledge for detection and the other being "overt", or obvious that an anti-counterfeiting method is being used); (2) create some type of broad electronic data base for tracking purposes, (3) achieve the goal of pedigree requirements by phasing in a system for an electronic pedigree for all drugs and biologies; and (4) that the authentication trail result in a pedigree, capable of specific origin, point of manufacture, contents information, date, lot number to an individual item number.
[0040] In one step taken to meet the FDA suggestions, Electronic Product Codes (EPC.TM.) have been recently created. EPC.TM. is a new type of designated alpha-numeric code that operates like the old bar code symbologies, in that when used as a coded identifier and scanned, links to a line in a database, in many cases an internet-maintained database. The EPC.TM. identifier consists of a string of characters containing information about a specific product or higher order information, i.e.: manufacturer, object classification, and other identifiers specific to an industry and in some rare cases, and a unique serial number for each designated item. The motivation for the new EPC.TM. system is to provide a single code uniquely identifying a product, whether by unit, or at any desired packaging level, from its manufacture through the supply chain to delivery, by a system of readers and online databases that are updated regularly as that item(s) moves through the supply chain.
[0041] The EPC.TM. system is linked with, and transmitted by, the RFID tag technology system, either in 64 or 96 bit configurations. As a consequence, the EPC.TM. system unfortunately necessitates all of the software, hardware, and RFID configurations included in an integrated superstructure, as well as being dependent on the unproven online database for tracking and reporting.
[0042] Radio Frequency Identification (RFID) has been touted as the successor to the bar code because of its ability to store much information and have that information read by out-of-line-of-sight readers, in either singularly or in multiple configurations employing RF signal receivers. Read/ Write RFID tags may also allow the "tagged" information to be electronically updated. Several drawbacks to the RFID system include the expensive, and the interconnected and integrated infrastructure necessary to support the utilization of RFID as a vehicle for the transportation of information. Unfortunately, the EPC.TM. process necessitates all of the software, hardware and RFID configurations included in an integrated infrastructure, as well as being dependent upon an unproven online RFID linked database for tracking and reporting. Other problems with RFID exist including interference with the tiny RF (Radio Frequency) signals, and privacy issues. As a consequence, there has been resistance to immediate investment and adaptation of the R ID symbology schema.
[0043] What is needed is the capacity for use of an existing recognized symbology having a defined dimension in the industry to be modified into a composite symbology in a new way to utilize the 'unused' portions in the defined dimensions of the recognized symbology and for use and integration with these items in a commercial system from original creation to point of purchase. What is needed is a manner to employ previously unknown recognized symbologies and new item-specific information without changing the present physical infrastructure substantially, using known existing printing techniques, and addressing privacy and speed concerns while enabling secure information systems to track user-identified items through changes in makeup or amount, quantity, location, etc. while retaining original information within the same defined dimension.
[0044] Accordingly, there is a need for an improved enhanced symbology having attributes as desired and their construction and inclusion for improved data sharing and product protection.
ASPECTS AND SUMMARY OF THE INVENTION
[0045] In response, the proposed invention provides a secured item specific identification system provides a method and a resultant apparatus for an enhanced symbology wherein unused portions of existing recognized symbologies are recognized and utilized for readable data presentation and system linkages without interfering with an existing initial readability function of the existing recognized symbology by using a composite symbology format and one or multiple character linked streams. The system provides reading, printing, and scanning integrated options with enhanced data sharing and protection from counterfeiting.
[0046] According to another alternative aspect of the present invention there is provided a method for the construction and inclusion of features into existing recognized symbologies such as, but not limited to: UPC- A, UPC-E, EAN-13, EAN-8, Code 128, GS1-128, EAN UCC-128, GS1 DataBar, GTIN-8, GTTN-12 (NDC), GTIN-13, GTIN-14, ITF-14, HIBC, SCC-14, SSCC-18, among other symbologies, or ID portions thereof (i.e.: linear portions of 2D symbologies), that may be applicable and within the defined dimensions of such recognized symbologies so as to form a composite symbology (CS) with a readable data presentation having one or more linked streams of information. These features may include, but are not limited to: inclusion of alpha, numeric, or alpha-numeric characters either in human readable or OCR readable format that may be used as modifiers concealed or revealed in portions of ID symbologies that can improve data sharing of relevant information about the product here-to-for only available in 2D symbologies, or connect via internet connection to relevant URL's (universal resource locators). Information may be obtained via conventional or specially constructed readers, visually or in combination. In addition, by means of creating those characters with an inability to be duplicated, when needed, a method is provided for product protection from counterfeiting.
[0047] Another alternative aspect of least one embodiment of the present invention is to, not only provide the usual parameters of a recognized ID bar code according to recognized globally accepted various code standards, but to utilize unused portions and available for selected data; to wit: the spaces in between, above and alongside the bars of ID bar codes, without interfering with the original machine readability of the bars and spaces that configure the recognized code. [0048] Another alternative aspect of the present invention is to provide a system and method and apparatus operative to create an algorithm functional to automatically insert selected data in a method so as to create logical alpha, numeric and/or alphanumeric data string characters in a wide range of fonts and sizes, in said unused portions available for data: to wit: the spaces in between, above and on the sides of the bars of ID bar codes.
[0049] Another alternative aspect of the present invention is to utilize that algorithm in a software program to enable a user skilled in the arts to create one or multiple human readable alpha, numeric, and/or alphanumeric character data strings in a wide range of fonts and sizes.
[0050] Another alternative aspect of the present invention is to utilize that algorithm in a software program to enable a user, skilled in the arts, to create composite Optical Character Recognition (OCR) alpha, numeric, and/or alphanumeric character data strings, in a wide range of fonts and sizes that can still be interpreted by a conventional off the shelf and easily available, or specially constructed OCR program linked to a scanner or reader, either connected to a desktop, laptop, tablet or pad or smartphone utilizing said program. Said reader or scanner would be configured to have the ability to decode the ID bar code as constructed, as well as optically 'read' the OCR characters embedded therein and allow a program for suitably configured desktop, laptop, tablet or pad, and smartphones (each electronic device being operatively functional and containing non-transitory processor readable mediums and associated electronics for receive, updating and communicating, whether wireless or tethered, to parse the character string in appropriate lines in programs and/or databases.
[0051 ] Another alternative aspect of the present invention is to enhance the ability of ID bar codes to further include the ability of a preprogrammed scanner/reader to provide a prefix necessary to connecting to the World Wide Web or internet, or: http://. Then in a further specifically adding the web address to create a 'tiny URL' link; for example, tinyurl.com/ and then by including in the existing spaces of the recognized ID bar code symbology the data string, for instance: 'n4ows7m' would appear to a suitably configured scanner/reader to be the web address of: http://tinyurl.com/n4ows7m then, in a suitably configured scanner/reader the command for 'enter' as a 'suffix' would complete the string and command needed to complete an internet connection to that URL.
[0052] Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes that embodies an expiration date of an item in any of the acceptable configurations acceptable to various supply chain requirements.
[0053] Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes that embodies a lot number in any of the acceptable configurations acceptable to various supply chain requirements.
[0054] Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes that embodies a serial number, either sequential or random, in any of the acceptable con6gurations acceptable to various supply chain requirements.
[0055] Another alternative aspect of the present invention is to provide a human readable or OCR readable character data string in a wide range of fonts and sizes, that embodies any other GSI GTIN and /or requirements for NDC requirements or recognized categories that would enhance an otherwise unenhanced ID bar code or linear portion of 2D bar codes.
[0056] Another alternative aspect of the present invention is to allow for the GSI Application Identifiers(AI) to be used as a prefix, i.e.: (17) expiration date, (10) lot number and (21) serial number, for any of the aforementioned character data strings in a wide range of fonts and sizes, according to the GSI specifications for numeric and/or alphanumeric requirements set forth. [0057] Another alternative aspect of the present invention is to provide a methodology in the construction of alternative data so as to allow single or multiple character data strings to be included on a single ID bar code or linear portion of a 2D bar code as needed by the user.
[0058] Another alternative aspect of the present invention is to provide the ability of the software program to allow for said data string characters in a wide range of fonts and sizes, to be created in a color from any of the color standards such as: RGB, CYMK or other globally accepted color palette.
[0059] Another alternative aspect of the present invention is to provide a method to change the color of the bars and spaces to reflect the correct relationship, either visually, conceptually or for security purposes.
[0060] Another alternative aspect of the present invention is for said data string characters in a wide range of fonts and sizes to be intentionally bold so as to be easily read as human readable or as OCR machine readable.
[0061] Another alternative aspect of the present invention is to provide for said data string characters in a wide range of fonts and sizes to be intentionally light colored in a manner so as to render them either virtually (human-visibly) non- discernible or non-existent when copied.
[0062] Another alternative aspect of the present invention is to provide a method to provide supply chain and interested parties a way to recognize that if said alpha, numeric, and/or alpha numeric data string characters are not present in the unused portions of the spaces in between the bars, that the product is suspect.
[0063] Another alternative aspect of the present invention is to provide for a graphic that is barely evident, but when copied is much less discernable or disappears altogether (from human-visual appearance or during a photo-copy or scan-copy).
[0064] Another alternative aspect of the present invention is to provide a hexadecimal color block in either the spaces between or above the bars of a ID bar code as an alternative that is available, and relates in some manner, such as a serial number, to the character data string contained in the ID bar code.
[0065] Another alternative aspect of the present invention is to provide a secure methodology to encrypt the entire code by altering the bar and space relationship (forming a composite symbology (CS)) and requiring a separately-known password to 'reconstruct' the original information for full reading of the composite symbology (CS).
[0066] Another alternative aspect of the present invention is to provide all the attribute parameters to construct a ID bar code that comply with relevant recognized standards specifications, guidelines and constraints inherent in the of building of said ID bar code for the various business, commercial, healthcare and other sectors; such as, but not limited to: pharmaceutical, postal, gaming, publishing or finance.
[0067] Another alternative aspect of the present invention is to provide a method to save the constructed composite symbology (CS) bar code with the relevant information in a graphic format that may include, but not limited to: EPS, Bitmap or PDF.
[0068] Another alternative aspect of the present invention is to provide a stand alone application with or without all of the aforementioned attributes usable for desktop graphic design.
[0069] Another alternative aspect of the present invention is to provide operative device drivers and engine code libraries stored in non-transitory processor readable mediums for non-commercial printers such as, but not limited to: inkjet and laser.
[0070] Another alternative aspect of the present invention is to provide device drivers and engine code libraries stored in a non-transitory processor readable medium for commercial printing, such as, but not limited to: offset lithography, engraving, thermography, reprographics, digital, letterpress, screen, flexography and gravure.
[0071] Another aspect of the present invention is to provide device drivers and engine code libraries stored in a non-transitory processor readable medium for production line printers, such as, but not limited to: inkjet, laser, offset lithography and digital.
[0072] Another aspect of the present invention is to provide an internet activated, online application with all the aforementioned attributes, that contains the appropriate interface stored in a non-transitory processor readable medium to construct a specific ID bar code and download it to a suitably configured printer; i.e.: desktop, commercial or online (production).
[0073] The above and other aspects, features and advantages of the present invention will become apparent from the following description read in conjunction with the accompanying drawings, in which like reference numerals designate the same elements.
BRIEF DESCRIPTION OF THE DRAWINGS
[0074] Fig. 1 is an exemplary code specimen as discussed herein.
[0075] Fig. 2 is an exemplary code specimen as discussed herein.
[0076] Fig. 3 is an exemplary code specimen as discussed herein.
[0077] Fig. 4 is an exemplary code specimen as discussed herein.
[0078] Fig. 5 is an is a simplified schematic view of two types of devices, a personal computer and a wireless device master data system links data bases and otherwise, both of which have access to at least one network such as the Internet and/or a wireless network, which may be used according to an exemplary embodiments of a method and/or system of the present invention.
[0079] Fig. 6, is an exemplary construct of one of the functional electronic devices in the proposed system. [0080] Fig. 7 is a descriptive diagram depicting steps in a labeling process according to one alternative embodiment of the present invention.
[0081] Fig. 8 is a schematic opening step of a database creation encodation with the master data system 10 for creating a GSI or other ID or 2D composite encodation.
[0082] Fig. 9 is a schematic illustration opening step to identify a data bar options for types of actions.
[0083] Fig. 10 is a schematic illustration step for determining file and action type options.
[0084] Fig. 11 is a schematic illustration step for determining text and options.
[0085] Fig. 12 is a schematic illustration step for entering additional information into an encodation database determining step.
[0086] Fig. 13 is a schematic illustration step for entering additional information into the encodation database determining step such as color, space, etc.
[0087] Fig. 14 is a schematic illustration step for entering additional information into the encodation database step such as type and style of fonts.
[0088] Fig. 15 is a schematic illustration step for a draw block color step, noting the hexadecimal color pattern (optionally visible) and representing the developing composite new symbology in a viewing pane.
[0089] Fig. 16. is an exemplary alternative encodation illustration wherein a determination is made to insert a color designation (outer ring is blue, middle red, inner pale green) for a security image as viewed in a pre-view window.
[0090] Fig. 17 is an exemplary databar noting an insertion of an Expiration designation (Έ140216') placed between the bar spaces.
[0091] Fig. 18 is an exemplary databar noting an insertion of an Lot designation ('LRDC999') placed between the bar spaces.
[0092] Fig. 19 is an exemplary databar noting an insertion of a Serial Number designation ('500000019') placed between the bar spaces. [0093] Fig. 20 is an exemplary databar noting a color insertion of all three Expiration, Lot, Serial designations placed between the bar spaces.
[0094] Fig. 21 is an exemplary databar noting a light-pale color insertion of all three Expiration, Lot, Serial designations placed between the bar spaces. It is noted that the indications are intentionally noted as very faint and pale in view of the light color and are the same as in Fig. 20 illustrating designation of color tone.
[0095] Fig. 22 is the exemplary databar of Fig. 21 after a photocopying step noting the inability to copy the light-pale color insertion images and thereby serve as a safety feature.
[0096] Fig. 23 is an exemplary data bar noting the insertion of a faint-color unencrypted Expiration, Lot, Serial Number.
[0097] Fig. 24 is an exemplary data bar as in Fig. 23 noting the inclusion of printing using non-human visible ink (readable by laser spectrum of scanners, phones, and other imaging systems.
[0098] Fig. 25 is a schematic representation of a rejected retrieval result for accessing master data system 10 without the correct composite symbology (a rejection requiring entry of a password) as a fraud prevention measure.
[0099] Fig. 26 is an enlarged and updated and partially reduced (bottom numbers removed for close-viewing) version of a previous encodation now including an additional tiny URL completion set ('n40ws7m') which when linked with an external reader and reading the composite encodation will scan and connect the link and then access master data system 10 and further scan the encoded Expiration/Lot/Serial for enhanced security.
[00100] Fig. 27 is a schematic view of another embodiment as discussed herein. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[00101] Reference will now be made in detail to embodiments of the invention. Wherever possible, same or similar reference numerals are used in the drawings and the description to refer to the same or like parts or steps. The drawings are in simplified form and are not to precise scale. The word 'update' or 'couple' or 'link' and similar terms do not necessarily denote direct and immediate connections, but also include connections through intermediate elements or devices. For purposes of convenience and clarity only, directional (up/down, etc.) or motional (forward/back, etc.) terms may be used with respect to the drawings. These and similar directional terms should not be construed to limit the scope in any manner. It will also be understood that other embodiments may be utilized without departing from the scope of the present invention, and that the detailed description is not to be taken in a limiting sense, and mat elements may be differently positioned, or otherwise noted as in the appended claims without requirements of the written description being required thereto.
[00102] Various operations and steps may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding embodiments of the present invention; however, the order of description should not be construed to imply that these operations are order dependent.
[00103] Referring now to Fig. 5 wherein a simplified schematic view of a proposed system 1 contains two types of devices, a personal computer 2 having a keyboard 4 and mouse 5 and related non-transitory processor readable medium and related features and functions stored in a unit 6 having memory interface storage at 7A, 7B, as will be discussed with a wireless device 8 master data system 10 with operative interfaces and linkages 1 1 to data bases and otherwise, both of which have access to at least one network 12 such as the Internet and/or a wireless network 12 for linking anywhere in the world or to other computers and electronic functional devices represented at 13, which may be used according to an exemplary embodiments of a method and/or system of the present invention.
[00104] Referring not to Fig. 6, it will be recognized that at least one of the functional electronic devices in system 1 will include a computer bus 301 for interlinking and communication with a number of functional elements including a computer processing unit 302, a video feature 303, a printer feature 304, an audio 305 or scanner feature 306, a display device 308 for displaying interactive data, a random access memory device 314, a ROM 313, disk features 312, a keyboard 311 as representative keyboards 4 previously, and a pointing device 310. it is noted that communications system 307 is functionally communicative with each aspect in master system 10 noted earlier. It is also noted that the recordable mediums herein may be transitory or non -transitory processor readable mediums but that each will function within the range of computer mediums known in the art now and in the future to effectively operate as noted herein.
[00105] Referring now to Fig. 7 is a descriptive diagram depicting steps in a labeling process according to one alternative embodiment of the present invention for an operative master data system 10 for producing the proposed symbologies proposed herein along a production environment wherein a roll of printed labels 1 (or pre-printed packages with a pre-printed ID or 2D recognized symbology having a specified pre-defined dimension) is provided to a scanner 2 for initial scanning to determine the correct label details therein and for related interface with the respective master data system 10 and then next to a labeler 3 for either label control in a label step 3 or transfer to a further scanner 4 (optional) for additional confirmation, and upon receiving a confirmation of advancement transmission to a printer for printing an additional sysmbology and for a scanning 6 for determining correctness to a later printer 7 for optional further application of information to a downstream packaging system 8 to a further optional scanner 9 for conBrmation of one or more factors of the prior labeling and identification steps to a possible further printer 10 as may be desired within master data system 10, so that ultimately a composite symbology (CS) schema as identified herein produced using an existing recognized symbology having a defined dimension and the inclusion of further readable data presentations to form a composite symbology format with the pre-defined symbology dimension.
[00106] Referring now to a method of steps for preparing the proposed enhance symbology on a specified symbology construction forms a resultant series of optional specified symbology constructions forms. It will be understood that the proposed steps are performed using recordable medium that is a non- transitory or transitory processor medium that is linked with a database construction and programming stored for access and for receiving the prepared encodations and storing the data from the enhanced composite symbology (CS) at respective steps of the determination of the same, and later manufacturing (printing, labeling, scanning for confirmation, and integration to master data system 10 for production of the enhanced composite symbology). In a first step a GS1 Data Bar Application is launched and provided for user-interaction using the proposed network 12 and computer interface devices (computer 3, 13, 8, etc.) and an access step is provided wherein a user launches the GS 1 Databar Application (See Fig. 8) and determine step provides the composite symbology desired needed (See Fig. 9); next a selection step is made of an Exact GS1 format needed (See Fig. 10); and an entry and update is made to enter main text for ID data string (Fig. 1 1); in a next step there is a determination if 2D text is needed (Fig. 12) and a next step wherein a determination of the font, size, and Bold or Italic of ID and if so, displayed and determine a bar and bar and space color and min/max width and height, and through other entry options the expiration dates in yymmdd format, enter lot number in alpha numeric format xxxxxx, enter serial number in alpha/numeric format xxxxxxx and subsequent editions as desired and enter color of characters, size of the font, determine if expiration, lot, or serial number should be visible, partially hidden, or hidden, determine if a color choice is light enough to thwart copying (typically below 20% of copy/print normal quality), determine if hexadecimal color pattern should be visible (or not) (see Figs. 13-15) and visual example of developing composite symbology (CS) with a ID code in Fig. 15. It is noted that in Fig. 15, The Expiration (E) date, Lot Number (L), and Serial number (S) are in a stacked arrangement between bars of the ID code and the initial identifier E, L, or S is determined to be 'visible/strong-prin and the actual data (shown in shadow only) for the E, L, or S are spaced by unit into the next- series unit openings within the ID code. For example, the Expiration (E) is very faint (intentionally difficult to reproduce/intentionally blurry) as ' 140216' (faintly visible), the Lot number (L) is 'RDC999' (faintly visible), and the Serial Number (S) is '00000018' (faintly visible); it is noted the non-faint/non-hidden version is shown in Fig. 20. In a next step an example of a security image ('oval') is shown I Fig. 16 in 'faint' view. In the noted 'faint' or hidden views a difficult-to- reproduce color may be used in a human- visible spectrum, or alternatively a non- human- visible-spectrum but scan-able spectrum may be used to print on the code (rendering the ELS, security image, etc. 'invisible' to a viewer-infringer). In Fig. 17 a step of determining and drawing a 'color' Expiration (E) is shown in a designated color (here purple and faint). In Fig. 18 a 'color' Lot (L) number is shown in a designated color (here purple and faint). In a Fig. 19, a 'color' Serial (S) number in a designated color (here purple). In a Fig. 20 a Data bar notes the Expiration/Lot/Serial number in a light color (here a faint purple). In a Fig. 22 a Data bar shows the Fig. 21 faint color in an 'after copying' designating that the faint color strength and color choice is sufficient to thwart a copy infringement effort (Fig. 22 is Fig. 21 after a 'copy step). In a Fig. 23 step the previously designated GS1 Data for Expiration, Lot, and Serial are shown in light color (purple here) and then in a Fig. 24 step they are 'encrypted' through an automatic encryption routine and then printed in a non-human-visible ink (but is scan-able under conventional laser wavelengths) to prevent visible review of the data, in a Step 25 if the ID data is to be encrypted (as in Fig. 24) then a password is stored in the originating database, and upon a user-scanning the code a password-entry window is provided with a password retrieval function through the master data system 10. In a further step (Fig. 25) a determination is made in printing if the ID is to linked with a 'tiny' URL (http://tinyurl.com) and the needed 'link' is within the ID symbology (see 'n40ws7m') shown, in addition to an example of Expiration, Lot, and Serial number are identified. Here a reader/scanner is preprogrammed to scan and link the ' ID' included symbology with the URL and link to the site in the data-base via the master data system 10 and to then read the Expiration/Lot/Serial number and the ID code as well. It is specifically noted that Fig. 26 is in the same as Fig. 20 (bold printing) but with the removal of the bottom numerals for review.
[00107] It is intended that all types of bar codes, now known or developed in the future be recognized as bar codes herein and without limitation.
[00108] It is noted that each of the existing recognized symbologies include a defined outer dimension that is recognized as being the outer-dimensional height/width of the ID or 2D code itself. For example, in Fig. 15, it is noted that a side dimension 100 on either left-right side above each outer numeral is required to remain 'open' within the outer dimension height/width. As a result, the present invention recognizes the opportunity to create a new composite symbology (CS) where the additional ID or 2D encodation is placed within the existing recognized symbology boundaries and within the readable-space therein. Referring now to Fig. 27A and include, in differing dimensions. In Fig. 27A a color (shown black/white) hexadecimal block 101 is placed within the defined dimension 102 for the particular existing recognized symbology in the 'Master ID' 103. The color block 101 is constructed using the encodation algorithms noted herein to convert a unique serial number (or other information such as lot, serial number, expiration, etc.) into a colored hexadecimal (or non-colored), and place and print the same within the defined dimension region 102 without the need for additional space. Thus, a database generated using this unique serial number with this master number will identify a range of numbers with a specified lot number and expiration date range. As is noted in Fig. 27B, the same composite encodation as in Fig. 27A is provided but by instead printing 'red' characters (noted at ) directly-on the black bars (not between the bars and not outside the bars but within the defined dimension region 102, no scan ability is lost and the composite syrnbology (CS) is preserved. The R designation is directed to three 'Red' printed characters ELS in a vertical column in the large black bar (as noted by arrows). To the human eye- this color distinction is visible and serves as an alternative enhance syrnbology for a new composite syrnbology (CS).
[00109] Having described at least one of the preferred embodiments of the present invention with reference to the accompanying drawings, it will be apparent to those skills that the invention is not limited to those precise embodiments, and that various modifications and variations can be made in the presently disclosed system without departing from the scope or spirit of the invention. Thus, it is intended that the present disclosure cover modifications and variations of this disclosure provided they come within the scope of the appended claims and their equivalents.

Claims

WHAT IS CLAIMED IS:
1. An enhanced composite symbology (ECS) containing enhanced information security features, comprising:
a recognized one-dimensional or two-dimensional encoded symbology operative with an external recognized scanning schema associated with said recognized encoded symbology;
said encoded symbology having a defined outer dimension according to said recognized symbology and wherein said defined outer dimension bounds a region containing both said recognized encoded symbology and a plurality of non-encoded symbology portions; and
at least one additional encodation identification symbology;
said at least one additional encodation identification symbology positioned within said outer dimension of said recognized encoded symbology forming said enhanced composite symbology (ECS) upon a use therewith; and
said at least one additional encodation identification symbology being in a non-use interference position within one said defined outer dimension.
2. The enhanced composite symbology (ECS), according to claim 1, wherein:
said at least one additional encodation identification symbology being in a position that is one of (i) within said non-encoded symbology portions , (ii) upon said recognized encoded symbology, and (iii) a combination of within said non- encoded symbology portions and upon said recognized encoded symbology.
3. The enhanced composite symbology (ECS), according to claim 2, wherein: said at least one additional encodation identification symbology is one of an alpha, a numeric, an alpha-numeric, and a symbolic symbology.
4. The enhanced composite symbology (ECS), according to claim 2, wherein:
said at least additional encodation identification symbology is a data string presented in one of a human-readable and a machine readable format,
5. The enhanced composite symbology (ECS), according to claim 4, wherein:
said at least one additional encodation identification symbology includes one of a prefix universal resource locator (URL) in a first location within said defined outer dimension and a suffix linkage for an external prefix universal resource locator (URL) enabling a linkage to said data string.
6. The enhanced composite symbology (ECS), according to claim 2, wherein:
said at least one additional encodation identification symbology embodies one of a lot number, an expiration date, and a serial number.
7. The enhanced composite symbology (ECS), according to claim 2, wherein:
said at least one additional encodation identification symbology is in one of a human-visible spectrum and a non-human visible spectrum.
8. A method for enhancing information security during an item transfer, comprising the steps of: selecting a recognized one-dimensional or two-dimensional encoded symbology operative with an external recognized scanning schema associated with said recognized encoded symbology;
said encoded symbology having a defined outer dimension according to said recognized symbology and wherein said defined outer dimension bounds a region containing both said recognized encoded symbology and a plurality of non-encoded symbology portions; and enumerating an item specific designation for a user specified item;
selecting at least one additional encodation identification symbology; encoding said recognized one-dimensional or two-dimensional encoded symbology and said at least one additional encodation identification symbology into a readable enhanced composite symbology (ECS) encodation;
said readable enhanced composite symbology (ECS) comprising:
said at least one additional encodation identification symbology positioned within said outer dimension of said recognized encoded symbology forming said enhanced composite symbology (CS) upon a use therewith; and
said at least one additional encodation identification symbology being in a non-use interference position within one said defined outer dimension;
applying said enhanced composite symbology (ECS) to said item; and storing said enhanced composite symbology (ECS) in a parsed non- transitory processor readable medium whereby said stored enhanced composite symbology (ECS) separately identifies said at least one additional encodation identification symbology and said recognized one-dimensional or two- dimensional encoded symbology.
9. The method for enhancing information security during an item transfer, according to claim 8, wherein:
said at least one additional encodation identification symbology is encoded in a position that is one of (i) within said non-encoded symbology portions , (ii) upon said recognized encoded symbology, and (iii) a combination of within said non-encoded symbology portions and upon said recognized encoded symbology.
10. The method for enhancing information security during an item transfer according to claim 9, wherein:
said at least one additional encodation identification symbology is one of an alpha, a numeric, an alpha-numeric, and a symbolic symbology.
1 1. The method for enhancing information security during an item transfer according to claim 10, wherein:
said at least additional encodation identification symbology is a data string presented in one of a human-readable and a machine readable format.
12. The method for enhancing information security during an item transfer according to claim 10, wherein:
said at least one additional encodation identification symbology includes one of a prefix universal resource locator (URL) in a first location within said defined outer dimension and a suffix linkage for an external prefix universal resource locator (URL) enabling a linkage to said data string.
13. The method for enhancing information security during an item transfer according to claim 10, wherein: said at least one additional encodation identification symbology embodies one of a lot number, an expiration date, and a serial number.
14. The method for enhancing information security during an item transfer according to claim 10, wherein:
said at least one additional encodation identification symbology is in one of a human-visible spectrum and a non-human visible spectrum.
15. A system for enhancing information security during an item transfer, comprising:
a recognized one-dimensional or two-dimensional encoded symbology operative with an external recognized scanning schema associated with said recognized encoded symbology;
said encoded symbology having a defined outer dimension according to said recognized symbology and wherein said defined outer dimension bounds a region containing both said recognized encoded symbology and a plurality of non-encoded symbology portions; and an item specific designation for a user specified item;
at least one additional encodation identification symbology;
an encoding module for encoding said recognized one-dimensional or two-dimensional encoded symbology and said at least one additional encodation identification symbology into a readable enhanced composite symbology (ECS) encodation;
said readable enhanced composite symbology (ECS) comprising;
said at least one additional encodation identification symbology positioned within said outer dimension of said recognized encoded symbology forming said enhanced composite symbology (CS) upon a use therewith; and said at least one additional encodation identification symbology being in a non-use interference position within one said defined outer dimension;
a printing system for applying said enhanced composite symbology (ECS) to said item; and
means for storing said enhanced composite symbology (ECS) in a parsed non-transitory processor readable medium whereby said stored enhanced composite symbology (ECS) separately identifies said at least one additional encodation identification symbology and said recognized one-dimensional or two- dimensional encoded symbology.
16. The system for enhancing information security during an item transfer, according to claim 15, wherein:
said at least one additional encodation identification symbology is encoded in a position that is one of (i) within said non-encoded symbology portions , (ii) upon said recognized encoded symbology, and (iii) a combination of within said non-encoded symbology portions and upon said recognized encoded symbology.
PCT/US2015/018200 2014-02-27 2015-02-27 Method, system, and apparatus for creating an enhancing WO2015131163A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201461945470P 2014-02-27 2014-02-27
US61/945,470 2014-02-27

Publications (1)

Publication Number Publication Date
WO2015131163A1 true WO2015131163A1 (en) 2015-09-03

Family

ID=54009696

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/018200 WO2015131163A1 (en) 2014-02-27 2015-02-27 Method, system, and apparatus for creating an enhancing

Country Status (1)

Country Link
WO (1) WO2015131163A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202017105935U1 (en) 2017-09-28 2017-10-13 Constantia Hueck Folien Gmbh & Co. Kg Security feature for packaging

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4889367A (en) * 1988-10-07 1989-12-26 Frito-Lay, Inc. Multi-readable information system
US5109153A (en) * 1990-04-17 1992-04-28 Johnsen Edward L Flash imaging and voidable articles
US20040211844A1 (en) * 2003-04-24 2004-10-28 Marshall Richard A. Barcodes including embedded security features and space saving interleaved text
US20120037695A1 (en) * 2010-08-12 2012-02-16 Fuji Xerox Co., Ltd. Embedded media barcode links and systems and methods for generating and using them
US20120153023A1 (en) * 2008-07-29 2012-06-21 Xerox Corporation Colored barcode decoding

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4889367A (en) * 1988-10-07 1989-12-26 Frito-Lay, Inc. Multi-readable information system
US5109153A (en) * 1990-04-17 1992-04-28 Johnsen Edward L Flash imaging and voidable articles
US20040211844A1 (en) * 2003-04-24 2004-10-28 Marshall Richard A. Barcodes including embedded security features and space saving interleaved text
US20120153023A1 (en) * 2008-07-29 2012-06-21 Xerox Corporation Colored barcode decoding
US20120037695A1 (en) * 2010-08-12 2012-02-16 Fuji Xerox Co., Ltd. Embedded media barcode links and systems and methods for generating and using them

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202017105935U1 (en) 2017-09-28 2017-10-13 Constantia Hueck Folien Gmbh & Co. Kg Security feature for packaging

Similar Documents

Publication Publication Date Title
Soon QR code
US11620658B2 (en) Authenticated barcode pattern
Kato et al. Barcodes for mobile devices
US7350708B2 (en) Method for data interchange
US7207481B2 (en) Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US7337971B2 (en) Method and apparatus for capturing and decoding an image of a remotely located bar code
US8566598B2 (en) Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication
US8528817B2 (en) Methods and systems for data interchange
RU2470361C2 (en) Secure barcode
WO2005086076A1 (en) System for encoding information using colors
EP1856624A2 (en) Method and system for improving, modifying, and adding information during a transfer or transaction
US20070074024A1 (en) Multiple code service system and method thereof
AU2004275395A1 (en) Method for identifying and authenticating goods using codes, barcodes and radio frequency identification
CN108351956B (en) Method and system for printing forensic-encoded 2D barcodes
Hara Development and popularization of QR code—Code development pursuing reading performance and market forming by open strategy—
Albakir et al. A conceptual design of genuine Halal logo detector
US10977534B1 (en) Compositions, systems, and methods for unique identifiers embedded in machine verifiable marks having error correction features
WO2015131163A1 (en) Method, system, and apparatus for creating an enhancing
US7341196B2 (en) Location identification of machine-readable data embedded in data carriers
Kulkarni et al. Creation and analysis of QR code
CN111091012A (en) Bar code generating method of bar code machine and related product
Grover et al. Parameters effecting 2D barcode scanning reliability
Khedekar et al. Authentication system using quick response code
WO2006065250A1 (en) Method for data interchange
KR101599636B1 (en) Parallel import goods customs clearance label, parrel import goods customs clearance label management system and the method for managing the system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15755530

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15755530

Country of ref document: EP

Kind code of ref document: A1