US20100162413A1 - Two Part Code - Google Patents

Two Part Code Download PDF

Info

Publication number
US20100162413A1
US20100162413A1 US12/693,215 US69321510A US2010162413A1 US 20100162413 A1 US20100162413 A1 US 20100162413A1 US 69321510 A US69321510 A US 69321510A US 2010162413 A1 US2010162413 A1 US 2010162413A1
Authority
US
United States
Prior art keywords
code
parts
codes
authenticity
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/693,215
Inventor
Stephen Paul Pinchen
Jens Jacob Juul Rassmussen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FIL INTERNATIONAL Ltd
Filtrona C&SP Ltd
Original Assignee
Fracture Code Corp ApS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fracture Code Corp ApS filed Critical Fracture Code Corp ApS
Priority to US12/693,215 priority Critical patent/US20100162413A1/en
Publication of US20100162413A1 publication Critical patent/US20100162413A1/en
Priority to US12/840,898 priority patent/US20100282838A1/en
Assigned to FIL INTERNATIONAL LIMITED reassignment FIL INTERNATIONAL LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FRACTURECODE CORPORATION APS
Assigned to FILTRONA C&SP LIMITED reassignment FILTRONA C&SP LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FIL INTERNATIONAL LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/1434Barcodes with supplemental or add-on codes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65BMACHINES, APPARATUS OR DEVICES FOR, OR METHODS OF, PACKAGING ARTICLES OR MATERIALS; UNPACKING
    • B65B61/00Auxiliary devices, not otherwise provided for, for operating on sheets, blanks, webs, binding material, containers or packages
    • B65B61/26Auxiliary devices, not otherwise provided for, for operating on sheets, blanks, webs, binding material, containers or packages for marking or coding completed packages
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65CLABELLING OR TAGGING MACHINES, APPARATUS, OR PROCESSES
    • B65C9/00Details of labelling machines or apparatus
    • B65C9/46Applying date marks, code marks, or the like, to the label during labelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06056Constructional details the marking comprising a further embedded marking, e.g. a 1D bar code with the black bars containing a smaller sized coding

Definitions

  • the present invention relates to codes and is concerned particularly with codes having two parts, which two parts are related.
  • Articles such as consumer products or their packaging, are marked with such codes.
  • the code In order to obtain information about the article, the code must be read by a machine which first performs a scanning operation to acquire digitally an image of the code. The image Is then processed electronically to derive, via application of an algorithm, an alphanumeric character string that may be used to look up data corresponding to the article in a database.
  • the code which typically comprises a rectangular box delimiting a series of intersecting lines, Is difficult to copy to the degree of accuracy needed such that when read by a machine the same alphanumeric character string would be generated.
  • This feature is partly a function of the level of detail, including thicknesses of lines and accuracy of angles therebetween, at which the scanning equipment acquires the image during reading.
  • a further difficulty for would-be counterfeiters is that many of the codes used are no more than 1 mm by 1 mm in area and may be printed in ultraviolet inks, infrared Inks or other security Inks.
  • Embodiments of the present invention aim to provide a machine-readable code for associating data with articles, the authenticity of which code may be verified without obtaining the article data with which the code is associated.
  • Embodiments of the invention also aim to provide a code, for associating articles with data stored in a database, in which the data may be obtained at a faster rate than has previously been possible.
  • a graphically representable, machine readable code having first and second parts wherein a first part may be associated with data and a second part may be associated with the first part, such that a relationship between the parts, or lack thereof, may be discerned by reading both parts of the code, in order to verify the authenticity of the code.
  • the invention also includes a method of verifying—the authenticity or lack of authenticity of a graphically representable machine readable code, wherein the code comprises a first part and a second part, the method comprising reading both the first part and the second part of the code and determining whether the two parts of the code are related, and verifying that the code is authentic in the event that the two parts are related, or verifying that the code is not authentic in the event that the two parts are not related.
  • the invention also includes a code system for associating data with articles, the system comprising means for generating graphic codes for application to articles, machine means for reading the codes to convert each code into a string of characters, and storage means arranged to store data associated with each code, wherein the codes each comprise a first part and a second part, wherein said system includes a population N of codes having, within said population, unique first parts, and wherein within the system a population n of the codes has unique second parts, wherein N>n, and wherein for each code the first portion and the second portion are related, such that a number N/n of codes share the same second parts but have unique first parts.
  • the relationship between the first and second parts of the codes is detectable by a machine reading both parts and performing a mathematical operation on the two parts to discern whether they are related.
  • N/n codes having distinct first parts N share common second parts n.
  • the first part is one of the set of first parts that has the relationship with the read second part. If the parts are related this suggests that the code may be genuine. If the parts are unrelated then the code is definitely unauthentic.
  • the relationship between the first and second. parts of the codes is preferably a function of the generation process by which the first parts were created.
  • the second part of the code may represent one or more characteristics of a batch of first parts. such as a relationship between intersecting lines, which is common to all of the first parts in that particular batch of codes.
  • the invention provides a method of looking up a code in a database to determine data associated with the code, wherein the code comprises first and second parts (F and S) wherein the first part (F) is associated with data in the database and is one of a set N of such first parts, and the second part ( 8 ) is related to the first part and is one of a set n of such second parts, N being much greater than n, the method comprising looking up in the database the second part (S) of the code among the population n, and then looking up the first part (P) of the code within the subset N/n of first parts which share the same second part (S).
  • each code has a second part which belongs in set n, and since each individual second part has associated with it a large number of first parts, the unique codes may be grouped together in a database according to their shared second parts. Codes can thus be identified in a database by first looking for the subset of codes that has the shared common second part and then searching within the range n for the unique first part. This can speed up the search as compared with searching the entire population N.
  • the invention also includes any combination of the features and limitations herein, except combinations of such features as are mutually exclusive.
  • FIG. 1 shows a two-part code, in accordance with an embodiment of the invention
  • FIG. 2 shows schematically a reader apparatus for reading two-part codes
  • FIG. 3 is a flow diagram depicting a reading operation of the apparatus of FIG. 2 .
  • FIG. 4 is a flow diagram depicting a search process according to another embodiment of the present invention.
  • FIG. 1 this shows generally at 10 a two-part code printed on a substrate 12 .
  • the two-part code 10 comprises a first part 14 and a second part 16 which are separated by a portion 12 a of the substrate 12 .
  • the first part 14 occupies a first, generally rectangular area
  • the second part 16 occupies a second, smaller generally rectangular area.
  • the relative sizes of the first and second areas, and/or their shape, could be different from the example shown.
  • the first part of the two-part code comprises a composite indicium such as is described in our UK Patent No. GB 2383878 B and sold commercially under the trade mark FractureCode (RTM) and for which there is currently a co-pending U.S. application, Ser. No. 10/383,185. Whilst the example is of a plurality of intersecting lines, this type of code might comprise other elements or shapes such as dots, rectangles or ellipses or a combination of such elements and/or shapes.
  • RTM FractureCode
  • the second part of the code comprises a two dimensional bar code such as a data matrix code.
  • the second part of the code could be almost any of the currently known codes referred to collectively as “bar codes” and including, but not limited to such codes as: Data Matrix, PDF-417, Micro-PDF-417, QR Code, EAN, MaxiCode, Codabar, RSS, UPC and Interleaved 2 of 5.
  • Codes of the type used for the first part have a very high population of unique Individuals. That is to say that a very large number of unique composite indicia, each being convertible using an algorithm into a unique alphanumeric character string, exists. Codes of the type used for the second part typically have a much lower population of unique individuals. Both first and second parts of the two-part code may be printed on the substrate, using either conventional inks or covert inks, such as are detectable only when illuminated, or irradiated, with light of a certain frequency range.
  • FIG. 2 shows, schematically, a hand-held reading apparatus for reading the two-part codes 10 .
  • An image acquisition device 20 which includes a camera (not shown) is used to acquire an image of the code being read.
  • the acquired image is error-corrected and enhanced electronically in an error correction and image enhancement unit 22 before being fed to an electronic controller 24 .
  • the controller 24 applies algorithms to the first and second parts of the two-part code, to produce first and second respective character strings.
  • the controller 24 accesses a memory 26 , in the form of a look-up table, to look up the second character string—i.e. the character string associated with the second part ( 16 ) of the two part code. From the look-up table in memory 26 the controller is then able to determine whether the first character string - Le.
  • the controller is able to verify whether the first part of the code (being a unique one among a very large population N) belongs to the sub-set of such first parts which is associated with the second part which has been read and is the subject of the look-up operation.
  • a display device 28 such as for example an LCD panel. is used to provide an indication of the results, which might for example be a message indicating [AUTHENTIC ⁇ if the first and second parts are associated, or might be [FAKE ⁇ if the first and second parts are not associated.
  • the controller 24 , memory 26 and display device 28 could be separate from the image acquisition device 20 and the unit 22 , and may for example be constituted in a PC or PDA.
  • the UK patent referred to above describes one technique for deriving a character string from a composite indicium such as is used to form the first part of the code in accordance with an embodiment of the present Invention.
  • Minutiae of the composite indicium maybe associated with intersections of different oblique lines. The locations of the intersections relative to a reference feature. and optionally the angles between the intersecting lines and/or the thicknesses of certain of the lines, can all be processed to produce an alphanumeric character string.
  • a very large number perhaps 1030 or more of unique composite indicia - i.e. first parts of the two-part code may be created.
  • One or more characters in the string can be encoded and included in the second part of the code, so that upon decoding the second part of the code it is possible to tell quickly, by reference to a look up table, whether a particular first part “belongs” with the second part being considered.
  • the primary purpose of the two - part code is to carry information about the article with which it is associated.
  • the second part of the code may include information such as the name of the manufacturer and the type of product.
  • the first part of the code which may have a unique character string associated therewith and may, when looked up In the database, yield far more information, such as the factory in which the article was manufactured, the date and time of manufacture and the intended destination, price and so on.
  • the first parts of the two part code are created first and then subsequently have data attributed to them in a database.
  • the second part of the code is created purposefully to include some identifiable characteristics of the first part.
  • the unique alphanumeric character string associated with it cannot be reproduced and hence the second part of the code cannot be designed to “match” the first part. Therefore, without possession of the algorithm it is not possible to produce an authorized two-part code in which the first and second parts are verifiably appropriately matched.
  • FIG. 3 shows schematically in a flow diagram a process for authenticating the two part code.
  • the two part code is scanned and an image (of both parts) is acquired.
  • a process of error correction and image enhancement is performed electronically.
  • the second part of the code is obtained and at step 36 the second part is looked up in a look-up table of a database.
  • the first part of the code Is obtained using the appropriate algorithm and at step 40 a comparison of the first and second parts of the code is made to verify whether the two parts are associated. If the judgment is YES then at step 42 a positive indication is displayed. such as [AUTHENTIC]. On the other hand, if the determination at step 40 is that the first and second parts of the code are not associated then at step 44 a negative indication, such as [FAKE] is displayed.
  • the apparatus and method described above are concerned only with determining whether or not the two-part code is authentic.
  • the code itself is used mainly to access information about articles with which it is associated. In order to do so, a reference must be made to a large database which contains many unique alpha numeric character strings, each including Information associated with an article.
  • the hand-held reader device of the present invention may include such a database, though such is not included in the embodiment described above. More likely is that the database will be located elsewhere and may, for example, be accessed remotely such as by using an Internet or other network connection.
  • a database holding unique character strings derived from unique first parts of the two part code, groups the unique character strings in regions of the database according to their corresponding second part, which may be far fewer in number.
  • the look up process initially involves accessing that part of the database corresponding to the second part of the code. Then a search for the data associated with the unique character string derived from the unique first part of the code may be made among a far smaller number of such unique character strings.
  • FIG. 4 shows schematically a look up method as a flow diagram.
  • a step 50 an image of both of the first and second parts of the two part code is scanned and electronically acquired.
  • the acquired image is error corrected and enhanced.
  • the first part of the code is obtained and at step 56 the second part is obtained.
  • the second part of the code obtained at step 56 is then looked up in a main database at step 58 and the sub-region of the main database in which the second part is located is identified at step 60 .
  • the first part of the code, obtained at step 54 is looked up in the sub-region of the database identified at step 60 and at step 64 the full data associated with the two part code is output to the user. This process is an order of magnitude faster than searching all of the first parts sequentially in the database.

Abstract

A graphically representable, machine readable code having first and second parts wherein the first part may be associated with data and a second part may be associated with the first part, such that a relationship between the parts, or lack thereof may be discerned by reading both parts of the code, in order to verify the authenticity of the code.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This is a continuation application of Ser. No. 12/408,328 filed Mar. 20, 2009 entitled “Two Part Code” which is a division of Ser. No. 11/542,300, filed Oct. 2, 2006 entitled “Two Part Code” which is a National filing of a corresponding co-pending application filed in the United Kingdom as U.K. Serial No. GB05200654, filed Oct. 3, 2005, entitled “Two Part Code” for which priority is claimed and which are incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • The present invention relates to codes and is concerned particularly with codes having two parts, which two parts are related.
  • Graphic, machine-readable codes are commonly used, for example, to identify articles such as consumer products. Several popular codes are currently used, including one and two-dimensional barcodes and matrix-style codes. In each case the code is applied to an article and enables the article to convey information about itself such as the identity of the manufacturer, and the article type.
  • One sophisticated type of machine readable code is described In our UK Patent No. GB 2383878 (the entire contents of which are incorporated herein by reference) and commercially available under the trade mark Fracture Code (RTM). Advantages of this type of code over other commercial machine-readable codes include a very high population of possible distinct codes as well as the ability to generate unique codes at very high speed.
  • Articles, such as consumer products or their packaging, are marked with such codes. In order to obtain information about the article, the code must be read by a machine which first performs a scanning operation to acquire digitally an image of the code. The image Is then processed electronically to derive, via application of an algorithm, an alphanumeric character string that may be used to look up data corresponding to the article in a database.
  • Another major advantage of this code is the difficulty with which the code may be copied. The code, which typically comprises a rectangular box delimiting a series of intersecting lines, Is difficult to copy to the degree of accuracy needed such that when read by a machine the same alphanumeric character string would be generated. This feature is partly a function of the level of detail, including thicknesses of lines and accuracy of angles therebetween, at which the scanning equipment acquires the image during reading. A further difficulty for would-be counterfeiters, is that many of the codes used are no more than 1 mm by 1 mm in area and may be printed in ultraviolet inks, infrared Inks or other security Inks.
  • A major security advantage of such codes is the fact that at the time of their creation they carry no information whatsoever, but must be scanned, converted into an alphanumeric character string using the algorithm and then related to data held in a database. Only then do they become meaningful.
  • Thus, without the algorithm, there is no way of deriving the information. A corresponding benefit is that even if a code can be reproduced accurately it cannot be applied to a different product from that to which it was originally applied without this fact becoming immediately detectable by a person undertaking a legitimate scanning/lookup operation.
  • SUMMARY OF THE INVENTION
  • Embodiments of the present invention aim to provide a machine-readable code for associating data with articles, the authenticity of which code may be verified without obtaining the article data with which the code is associated.
  • Embodiments of the invention also aim to provide a code, for associating articles with data stored in a database, in which the data may be obtained at a faster rate than has previously been possible.
  • In accordance with one aspect of the present invention there is provided a graphically representable, machine readable code having first and second parts wherein a first part may be associated with data and a second part may be associated with the first part, such that a relationship between the parts, or lack thereof, may be discerned by reading both parts of the code, in order to verify the authenticity of the code.
  • The invention also includes a method of verifying—the authenticity or lack of authenticity of a graphically representable machine readable code, wherein the code comprises a first part and a second part, the method comprising reading both the first part and the second part of the code and determining whether the two parts of the code are related, and verifying that the code is authentic in the event that the two parts are related, or verifying that the code is not authentic in the event that the two parts are not related.
  • The invention also includes a code system for associating data with articles, the system comprising means for generating graphic codes for application to articles, machine means for reading the codes to convert each code into a string of characters, and storage means arranged to store data associated with each code, wherein the codes each comprise a first part and a second part, wherein said system includes a population N of codes having, within said population, unique first parts, and wherein within the system a population n of the codes has unique second parts, wherein N>n, and wherein for each code the first portion and the second portion are related, such that a number N/n of codes share the same second parts but have unique first parts.
  • Preferably the relationship between the first and second parts of the codes is detectable by a machine reading both parts and performing a mathematical operation on the two parts to discern whether they are related.
  • N/n codes, having distinct first parts N share common second parts n. Upon reading of both parts of the code it is possible to determine whether, for that particular code, the first part is one of the set of first parts that has the relationship with the read second part. If the parts are related this suggests that the code may be genuine. If the parts are unrelated then the code is definitely unauthentic.
  • The relationship between the first and second. parts of the codes is preferably a function of the generation process by which the first parts were created. For example, the second part of the code may represent one or more characteristics of a batch of first parts. such as a relationship between intersecting lines, which is common to all of the first parts in that particular batch of codes.
  • Thus, provided that future machine-reading of the two portions of the code is performed in a consistent, approved manner, it is possible to detect a mismatch between the first and second parts which mismatch would suggest an unauthorized or counterfeit code.
  • In another aspect the invention provides a method of looking up a code in a database to determine data associated with the code, wherein the code comprises first and second parts (F and S) wherein the first part (F) is associated with data in the database and is one of a set N of such first parts, and the second part (8) is related to the first part and is one of a set n of such second parts, N being much greater than n, the method comprising looking up in the database the second part (S) of the code among the population n, and then looking up the first part (P) of the code within the subset N/n of first parts which share the same second part (S).
  • Since each code has a second part which belongs in set n, and since each individual second part has associated with it a large number of first parts, the unique codes may be grouped together in a database according to their shared second parts. Codes can thus be identified in a database by first looking for the subset of codes that has the shared common second part and then searching within the range n for the unique first part. This can speed up the search as compared with searching the entire population N.
  • The invention also includes any combination of the features and limitations herein, except combinations of such features as are mutually exclusive.
  • BRIEF DESCRIPTION OF THE DRAWING
  • A preferred embodiment of the present invention will now be described with reference to the accompanying diagrammatic drawings in which:
  • FIG. 1 shows a two-part code, in accordance with an embodiment of the invention,
  • FIG. 2 shows schematically a reader apparatus for reading two-part codes,
  • FIG. 3 is a flow diagram depicting a reading operation of the apparatus of FIG. 2, and
  • FIG. 4 is a flow diagram depicting a search process according to another embodiment of the present invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • Turning to FIG. 1, this shows generally at 10 a two-part code printed on a substrate 12. The two-part code 10 comprises a first part 14 and a second part 16 which are separated by a portion 12 a of the substrate 12. In this case the first part 14 occupies a first, generally rectangular area and the second part 16 occupies a second, smaller generally rectangular area. The relative sizes of the first and second areas, and/or their shape, could be different from the example shown.
  • Inside the area occupied by the first part 14 is a plurality of straight lines, at least some of which intersect each other. In this example the first part of the two-part code comprises a composite indicium such as is described in our UK Patent No. GB 2383878 B and sold commercially under the trade mark FractureCode (RTM) and for which there is currently a co-pending U.S. application, Ser. No. 10/383,185. Whilst the example is of a plurality of intersecting lines, this type of code might comprise other elements or shapes such as dots, rectangles or ellipses or a combination of such elements and/or shapes.
  • In the example, the second part of the code comprises a two dimensional bar code such as a data matrix code. In practice the second part of the code could be almost any of the currently known codes referred to collectively as “bar codes” and including, but not limited to such codes as: Data Matrix, PDF-417, Micro-PDF-417, QR Code, EAN, MaxiCode, Codabar, RSS, UPC and Interleaved 2 of 5.
  • Codes of the type used for the first part have a very high population of unique Individuals. That is to say that a very large number of unique composite indicia, each being convertible using an algorithm into a unique alphanumeric character string, exists. Codes of the type used for the second part typically have a much lower population of unique individuals. Both first and second parts of the two-part code may be printed on the substrate, using either conventional inks or covert inks, such as are detectable only when illuminated, or irradiated, with light of a certain frequency range.
  • FIG. 2 shows, schematically, a hand-held reading apparatus for reading the two-part codes 10. An image acquisition device 20, which includes a camera (not shown) is used to acquire an image of the code being read. The acquired image is error-corrected and enhanced electronically in an error correction and image enhancement unit 22 before being fed to an electronic controller 24. The controller 24 applies algorithms to the first and second parts of the two-part code, to produce first and second respective character strings. The controller 24 then accesses a memory 26, in the form of a look-up table, to look up the second character string—i.e. the character string associated with the second part (16) of the two part code. From the look-up table in memory 26 the controller is then able to determine whether the first character string - Le. of the first part of the two part code—is one of the many first parts which is associated with the second character string. In other words, by performing a look-up function and then comparing the first and second character strings obtained respectively from the first and second parts of the cods, the controller is able to verify whether the first part of the code (being a unique one among a very large population N) belongs to the sub-set of such first parts which is associated with the second part which has been read and is the subject of the look-up operation.
  • A display device 28 such as for example an LCD panel. is used to provide an indication of the results, which might for example be a message indicating [AUTHENTIC} if the first and second parts are associated, or might be [FAKE} if the first and second parts are not associated.
  • The controller 24, memory 26 and display device 28 could be separate from the image acquisition device 20 and the unit 22, and may for example be constituted in a PC or PDA.
  • The UK patent referred to above describes one technique for deriving a character string from a composite indicium such as is used to form the first part of the code in accordance with an embodiment of the present Invention. Minutiae of the composite indicium maybe associated with intersections of different oblique lines. The locations of the intersections relative to a reference feature. and optionally the angles between the intersecting lines and/or the thicknesses of certain of the lines, can all be processed to produce an alphanumeric character string. As stated above, a very large number. perhaps 1030 or more of unique composite indicia - i.e. first parts of the two-part code may be created.
  • One or more characters in the string can be encoded and included in the second part of the code, so that upon decoding the second part of the code it is possible to tell quickly, by reference to a look up table, whether a particular first part “belongs” with the second part being considered.
  • Of course, the primary purpose of the two - part code is to carry information about the article with which it is associated. For example, the second part of the code may include information such as the name of the manufacturer and the type of product. The first part of the code which may have a unique character string associated therewith and may, when looked up In the database, yield far more information, such as the factory in which the article was manufactured, the date and time of manufacture and the intended destination, price and so on.
  • It will be appreciated that the first parts of the two part code are created first and then subsequently have data attributed to them in a database.
  • The second part of the code is created purposefully to include some identifiable characteristics of the first part. However. without applying the algorithm to the first part of the code. the unique alphanumeric character string associated with it cannot be reproduced and hence the second part of the code cannot be designed to “match” the first part. Therefore, without possession of the algorithm it is not possible to produce an authorized two-part code in which the first and second parts are verifiably appropriately matched.
  • FIG. 3 shows schematically in a flow diagram a process for authenticating the two part code. At step 30, the two part code is scanned and an image (of both parts) is acquired. At step 32 a process of error correction and image enhancement is performed electronically. At step 34 the second part of the code is obtained and at step 36 the second part is looked up in a look-up table of a database. At step 38 the first part of the code Is obtained using the appropriate algorithm and at step 40 a comparison of the first and second parts of the code is made to verify whether the two parts are associated. If the judgment is YES then at step 42 a positive indication is displayed. such as [AUTHENTIC]. On the other hand, if the determination at step 40 is that the first and second parts of the code are not associated then at step 44 a negative indication, such as [FAKE] is displayed.
  • It will be appreciated that the apparatus and method described above are concerned only with determining whether or not the two-part code is authentic. However, the code itself is used mainly to access information about articles with which it is associated. In order to do so, a reference must be made to a large database which contains many unique alpha numeric character strings, each including Information associated with an article.
  • The hand-held reader device of the present invention may include such a database, though such is not included in the embodiment described above. More likely is that the database will be located elsewhere and may, for example, be accessed remotely such as by using an Internet or other network connection.
  • Since the database may contain a very large number of unique entries, comprising unique character strings derivable from respective unique first parts. the searching of the database may take considerable time. In order to lower the time taken to look up each unique entry, in accordance with an embodiment of the present invention a database, holding unique character strings derived from unique first parts of the two part code, groups the unique character strings in regions of the database according to their corresponding second part, which may be far fewer in number. Thus, when looking up a particular first part the look up process initially involves accessing that part of the database corresponding to the second part of the code. Then a search for the data associated with the unique character string derived from the unique first part of the code may be made among a far smaller number of such unique character strings.
  • FIG. 4 shows schematically a look up method as a flow diagram. In a step 50 an image of both of the first and second parts of the two part code is scanned and electronically acquired. At step 52 the acquired image is error corrected and enhanced. At step 54 the first part of the code is obtained and at step 56 the second part is obtained. The second part of the code obtained at step 56 is then looked up in a main database at step 58 and the sub-region of the main database in which the second part is located is identified at step 60. At step 62 the first part of the code, obtained at step 54, is looked up in the sub-region of the database identified at step 60 and at step 64 the full data associated with the two part code is output to the user. This process is an order of magnitude faster than searching all of the first parts sequentially in the database.
  • While various embodiments of the invention have been disclosed, it is to be understood that the invention is not so limited and that the invention is limited only by the following claims and equivalents thereof.

Claims (3)

1. A graphically representable, machine readable code having first and second parts wherein the first part may be associated with data and a second part may be associated with the first part, such that a relationship between the parts, or lack thereof may be discerned by reading both parts of the code, in order to verify the authenticity of the code.
2. A method of verifying the authenticity or lack of authenticity of a graphically representable machine readable code, wherein the code comprises a first part and a second part the method comprising machine-reading both the first part and the second part of the code and determining whether the two parts of the code are related, and verifying that the code is authentic in the event that the two parts are related, and verifying that the code is not authentic in the event that the two parts are not related.
3. A method of verifying the authenticity or lack of authenticity of a graphically representable machine readable code, wherein the code comprises a first part and a second part the method comprising the steps of inputting into one or more machine reading devices the first part and the second part of the code, converting the two parts of the code by a controller device to a storage format to thereby characterize each part, comparing each characterized part to stored information of authentic code parts maintained in a memory device, and providing an output from the memory device comparison indicating whether the parts are recognized by information stored in said memory device.
US12/693,215 2005-10-03 2010-01-25 Two Part Code Abandoned US20100162413A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/693,215 US20100162413A1 (en) 2005-10-03 2010-01-25 Two Part Code
US12/840,898 US20100282838A1 (en) 2005-10-03 2010-07-21 Two Part Code

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
GB0520065A GB2430783B (en) 2005-10-03 2005-10-03 Two-part code
GB0520065.4 2005-10-03
US11/542,300 US8297521B2 (en) 2005-10-03 2006-10-02 Two part code
US12/408,328 US20090173797A1 (en) 2005-10-03 2009-03-20 Two part code
US12/693,215 US20100162413A1 (en) 2005-10-03 2010-01-25 Two Part Code

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/408,328 Continuation US20090173797A1 (en) 2005-10-03 2009-03-20 Two part code

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/840,898 Division US20100282838A1 (en) 2005-10-03 2010-07-21 Two Part Code

Publications (1)

Publication Number Publication Date
US20100162413A1 true US20100162413A1 (en) 2010-06-24

Family

ID=35395159

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/542,300 Expired - Fee Related US8297521B2 (en) 2005-10-03 2006-10-02 Two part code
US12/408,328 Abandoned US20090173797A1 (en) 2005-10-03 2009-03-20 Two part code
US12/693,215 Abandoned US20100162413A1 (en) 2005-10-03 2010-01-25 Two Part Code
US12/840,898 Abandoned US20100282838A1 (en) 2005-10-03 2010-07-21 Two Part Code

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/542,300 Expired - Fee Related US8297521B2 (en) 2005-10-03 2006-10-02 Two part code
US12/408,328 Abandoned US20090173797A1 (en) 2005-10-03 2009-03-20 Two part code

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/840,898 Abandoned US20100282838A1 (en) 2005-10-03 2010-07-21 Two Part Code

Country Status (10)

Country Link
US (4) US8297521B2 (en)
EP (1) EP1770602A1 (en)
JP (1) JP5134542B2 (en)
AU (1) AU2006298524B2 (en)
CA (1) CA2562403A1 (en)
GB (1) GB2430783B (en)
IL (1) IL190538A0 (en)
NZ (2) NZ593652A (en)
RU (1) RU2457537C2 (en)
WO (1) WO2007039734A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0702091D0 (en) * 2007-02-02 2007-03-14 Fracture Code Corp Aps Secure Barcode
CN103434284B (en) * 2013-08-30 2016-08-10 东莞市誉铭新精密技术股份有限公司 A kind of labelling apparatus and using method thereof
RU2698768C2 (en) * 2014-06-23 2019-08-29 Инексто Са Method and system for marking finished products in order to detect unauthorized repeated filling
NL2018613B1 (en) * 2017-03-30 2018-10-10 Orbid Ltd Two-dimensional marker for marking an object, method and system for generating the marker, method and system for generating a marker code, and method and system for authenticating an object

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5128527A (en) * 1989-03-29 1992-07-07 Fujitsu Limited Apparatus for reading a bar code
US5198649A (en) * 1989-07-31 1993-03-30 Spectra-Physics, Inc. Bar code scanner and method of scanning bar codes labels with or without an Add-On code
US5367148A (en) * 1986-04-18 1994-11-22 Cias, Inc. Counterfeit detection using ID numbers with at least one random portion
US5602377A (en) * 1995-03-01 1997-02-11 Metanetics Corporation Bar code dataform scanning and labeling apparatus and method
US5979762A (en) * 1988-12-05 1999-11-09 Bianco; James S. Identification means with encrypted security code and method of making and using same
US6098892A (en) * 1998-05-27 2000-08-08 Peoples, Jr.; Max J. Device for conversion from a pharmaceutical identification number to a standardized number and method for doing the same
US6102289A (en) * 1996-06-28 2000-08-15 Intermec Ip Corp. 1D finder pattern for 2D bar codes
US6158660A (en) * 1999-02-25 2000-12-12 Ncr Corporation Methods and apparatus for supplemental barcode detection and decoding
US6357656B1 (en) * 1997-08-18 2002-03-19 Johannes Puff Production and verification method for an access authorization means and corresponding access authorization means
US6550682B2 (en) * 2001-03-02 2003-04-22 Nec Infrontia Corporation Bar code reading method, bar code reading apparatus, and program thereof
US20030121986A1 (en) * 2000-06-06 2003-07-03 Rafsec Oy Method and an apparatus for manufacturing a smart label inlet web
US6729603B1 (en) * 2001-06-08 2004-05-04 Psc Scanning, Inc. Add-on capture rate in a barcode scanning system
US20040174043A1 (en) * 2003-03-06 2004-09-09 Ross Bradsen Motorized rack and pinion assembly
US20050082376A1 (en) * 2001-10-26 2005-04-21 Allen Lubow Method and apparatus for applying bar code information to products during production
US20050199724A1 (en) * 2004-03-01 2005-09-15 Allen Lubow Diffractive optical variable image including barcode
US20050199723A1 (en) * 2001-11-30 2005-09-15 Allen Lubow Method for identifying and authenticating goods using codes, barcodes and radio frequency identification
US6976628B2 (en) * 2001-01-12 2005-12-20 Allscripts, Inc. System and method for ensuring the proper dispensation of pharmaceuticals
US20060015518A1 (en) * 2004-07-19 2006-01-19 Eletreby Magdy A System and method for management of drug labeling information
US20060095778A1 (en) * 2004-10-29 2006-05-04 Duanfeng He Analog and digital indicia authentication
US7108170B2 (en) * 2001-06-08 2006-09-19 Psc Scanning, Inc. Add-on capture rate in a barcode scanning system
US7185824B2 (en) * 2001-04-13 2007-03-06 The Code Corporation System and method for associating pre-printed machine-readable graphical codes with electronically-accessible data
US7207481B2 (en) * 2003-09-23 2007-04-24 Secure Symbology, Inc. Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US7283630B1 (en) * 1997-07-21 2007-10-16 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
US20080121688A1 (en) * 2006-08-30 2008-05-29 Becton, Dickinson And Company Multiple Barcode Format Labelling System and Method
US20080185438A1 (en) * 2007-02-02 2008-08-07 Fracture Code Corporation Aps Secure Barcode

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8804689D0 (en) * 1988-02-29 1988-03-30 Alcatel Business Systems Franking system
JP2520279B2 (en) * 1988-03-03 1996-07-31 日東化学工業株式会社 Method for producing acrylonitrile
US6456729B1 (en) 1994-04-14 2002-09-24 Lewis J. Moore Anti-counterfeiting and tracking system
JPH0856473A (en) * 1994-08-19 1996-03-05 Yanmar Agricult Equip Co Ltd Turning controller of auger for discharging grain
US5932119A (en) * 1996-01-05 1999-08-03 Lazare Kaplan International, Inc. Laser marking system
DE19716049A1 (en) * 1997-04-17 1998-10-22 Christian Ploppa Admission ticket verification system
US6904525B1 (en) 1997-07-01 2005-06-07 Pitney Bowes Inc. Method for preventing counterfeiting of articles of manufacture
US20060118631A1 (en) * 2001-10-26 2006-06-08 Allen Lubow Method and apparatus for applying bar code information to products during production
RU24025U1 (en) * 2001-10-29 2002-07-20 Ямилев Ильгиз Амирович MARKING AND IDENTIFICATION SYSTEM OF THE OBJECT WITH THE SPECIFIED LABELING (OPTIONS)
GB0129369D0 (en) * 2001-12-07 2002-01-30 Filtrona United Kingdom Ltd Method and apparatus for marking articles
JP2004171109A (en) * 2002-11-18 2004-06-17 Nippon Telegr & Teleph Corp <Ntt> Device authentication system
JP2005020727A (en) * 2003-06-05 2005-01-20 Ntt Docomo Inc Method and apparatus for reading and decoding information embedded in two-dimensional bar code
JP4337422B2 (en) * 2003-06-20 2009-09-30 富士ゼロックス株式会社 Article registration apparatus, article confirmation apparatus, and article registration confirmation apparatus
US7687271B2 (en) 2004-04-22 2010-03-30 Kodak Graphic Communications Canada Company Covert authentication method and apparatus
JP2005338669A (en) * 2004-05-31 2005-12-08 Dainippon Printing Co Ltd Body and article for genuineness decision making, and genuineness deciding method thereof

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5367148A (en) * 1986-04-18 1994-11-22 Cias, Inc. Counterfeit detection using ID numbers with at least one random portion
US5979762A (en) * 1988-12-05 1999-11-09 Bianco; James S. Identification means with encrypted security code and method of making and using same
US5128527A (en) * 1989-03-29 1992-07-07 Fujitsu Limited Apparatus for reading a bar code
US5198649A (en) * 1989-07-31 1993-03-30 Spectra-Physics, Inc. Bar code scanner and method of scanning bar codes labels with or without an Add-On code
US5602377A (en) * 1995-03-01 1997-02-11 Metanetics Corporation Bar code dataform scanning and labeling apparatus and method
US6102289A (en) * 1996-06-28 2000-08-15 Intermec Ip Corp. 1D finder pattern for 2D bar codes
US7283630B1 (en) * 1997-07-21 2007-10-16 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
US6357656B1 (en) * 1997-08-18 2002-03-19 Johannes Puff Production and verification method for an access authorization means and corresponding access authorization means
US6098892A (en) * 1998-05-27 2000-08-08 Peoples, Jr.; Max J. Device for conversion from a pharmaceutical identification number to a standardized number and method for doing the same
US6158660A (en) * 1999-02-25 2000-12-12 Ncr Corporation Methods and apparatus for supplemental barcode detection and decoding
US20030121986A1 (en) * 2000-06-06 2003-07-03 Rafsec Oy Method and an apparatus for manufacturing a smart label inlet web
US6976628B2 (en) * 2001-01-12 2005-12-20 Allscripts, Inc. System and method for ensuring the proper dispensation of pharmaceuticals
US6550682B2 (en) * 2001-03-02 2003-04-22 Nec Infrontia Corporation Bar code reading method, bar code reading apparatus, and program thereof
US7185824B2 (en) * 2001-04-13 2007-03-06 The Code Corporation System and method for associating pre-printed machine-readable graphical codes with electronically-accessible data
US6729603B1 (en) * 2001-06-08 2004-05-04 Psc Scanning, Inc. Add-on capture rate in a barcode scanning system
US7299975B2 (en) * 2001-06-08 2007-11-27 Datalogic Scanning, Inc. Add-on capture rate in a barcode scanning system
US7108170B2 (en) * 2001-06-08 2006-09-19 Psc Scanning, Inc. Add-on capture rate in a barcode scanning system
US20050082376A1 (en) * 2001-10-26 2005-04-21 Allen Lubow Method and apparatus for applying bar code information to products during production
US20070145142A1 (en) * 2001-10-26 2007-06-28 International Barcode Corporation Method and apparatus for applying bar code information to products during production
US20050199723A1 (en) * 2001-11-30 2005-09-15 Allen Lubow Method for identifying and authenticating goods using codes, barcodes and radio frequency identification
US20040174043A1 (en) * 2003-03-06 2004-09-09 Ross Bradsen Motorized rack and pinion assembly
US7207481B2 (en) * 2003-09-23 2007-04-24 Secure Symbology, Inc. Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US20050199724A1 (en) * 2004-03-01 2005-09-15 Allen Lubow Diffractive optical variable image including barcode
US20060015518A1 (en) * 2004-07-19 2006-01-19 Eletreby Magdy A System and method for management of drug labeling information
US20060095778A1 (en) * 2004-10-29 2006-05-04 Duanfeng He Analog and digital indicia authentication
US20080121688A1 (en) * 2006-08-30 2008-05-29 Becton, Dickinson And Company Multiple Barcode Format Labelling System and Method
US20080185438A1 (en) * 2007-02-02 2008-08-07 Fracture Code Corporation Aps Secure Barcode

Also Published As

Publication number Publication date
NZ593652A (en) 2012-11-30
IL190538A0 (en) 2008-11-03
US20070102519A1 (en) 2007-05-10
US8297521B2 (en) 2012-10-30
GB2430783B (en) 2010-12-22
AU2006298524A1 (en) 2007-04-12
NZ567273A (en) 2011-07-29
WO2007039734A1 (en) 2007-04-12
GB0520065D0 (en) 2005-11-09
RU2008117400A (en) 2009-11-10
US20090173797A1 (en) 2009-07-09
RU2457537C2 (en) 2012-07-27
GB2430783A (en) 2007-04-04
JP2009510642A (en) 2009-03-12
US20100282838A1 (en) 2010-11-11
JP5134542B2 (en) 2013-01-30
EP1770602A1 (en) 2007-04-04
CA2562403A1 (en) 2007-04-03
AU2006298524B2 (en) 2012-09-13

Similar Documents

Publication Publication Date Title
CN1930578B (en) The digital signature obtained from least one architectural feature of material cell is used to protect the direct reading of sensitive information and read the method for shielded sensitive information
RU2470361C2 (en) Secure barcode
CN105550730B (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
CN111639734B (en) Novel two-dimensional code encoding and anti-counterfeiting application method embedded with QR code
US20210117671A1 (en) Article dual material-digital anti-forgery protection
US20220318346A1 (en) Certified text document
CN115953175B (en) Multiple anti-counterfeiting method, system, equipment and storage medium based on surface layer identification
WO2020011447A1 (en) Article anti-forgery protection
CN106372698A (en) Multidimensional anti-counterfeiting label and anti-counterfeiting verification method thereof
US20100162413A1 (en) Two Part Code
US20070177823A1 (en) Method, systems, and media for identifying whether a machine readable mark may contain sensitive data
JP2017017673A (en) Method for protecting authenticity of article, item, document, package and/or label from imitation, forgery and theft
US11704525B2 (en) Method of marking an object, method for generating a marker, method for generating a marker code, and method for authenticating an object
US7120798B2 (en) System and method for the generation and verification of signatures associated with hardcopy documents
RU2534952C1 (en) Method of labelling product or articles for identification and counterfeit protection thereof
CN100409252C (en) General anticounterfeiting method and system
EP3113083A2 (en) Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
JP2009003960A (en) Article managing system, code determining system, article managing method, and article management code determining method
RU2165643C1 (en) Information authenticating method
KR20170097760A (en) A method for proving and authenticating secure documents based on measurements of relative position changes of different processes involved in manufacture
CN114997350A (en) Method and system for identifying authenticity of article
US20220036374A1 (en) Method for the traceability and authentication of products
TWI518598B (en) A barcode tamper-proofing system and method thereof
RU2213371C1 (en) Object authentication method
UA119429C2 (en) METHOD OF MARKING AND IDENTIFICATION OF AUTHENTIC ORIGIN AND PROTECTION OF ITEMS FROM COUNTERFEITS AND DEVICES FOR ITS IMPLEMENTATION

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIL INTERNATIONAL LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FRACTURECODE CORPORATION APS;REEL/FRAME:028095/0330

Effective date: 20120314

Owner name: FILTRONA C&SP LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FIL INTERNATIONAL LIMITED;REEL/FRAME:028098/0715

Effective date: 20120314

STCB Information on status: application discontinuation

Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION