Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
First Claim
Patent Images
1. A method for enhancing information security during item transfer, comprising the steps of:
- enumerating an item specific designation for a user specified item;
encoding said enumerated item specific designation into a readable composite symbology encodation;
said composite symbology encodation, comprising;
at least a first and a second encoded symbology portion, wherein said at least first and second portions are electronically joined during said step of encoding and require a combination of said portions to read said encoded item specific designation;
deconstructing said readable composite symbology encodation into said at least first and second encoded symbology portions rendering at least one of said at least first and second portions separately unreadable without the other;
applying one of said deconstructed at least first and second encoded symbology portions to said user specified item;
transferring said user specified item to at least a first authorized party;
transferring said other of said at least first and second encoded symbology portions to said at least first authorized party separately from said user specified item; and
reconstructing said at least first and second encoded symbology portions and into said readable composite symbology encodation, thereby enabling said authorized party to conduct a step of reading said composite symbology encodation and determining said item specific designation.
1 Assignment
0 Petitions
Accused Products
Abstract
One alternative and optional method of the present invention provides a secured item specific identification system incorporating the steps of identifying an item to a determined degree, generating a first identifying code for the item, generating a second code and separately providing the same to a partner, enabling an access to secure identification data regarding the item upon an authorizing use of both the first and second code. In other optional alternative embodiments, the first and second codes may be optionally linked or alternatively provided in alternative and adaptive composite symbology formats.
-
Citations
28 Claims
-
1. A method for enhancing information security during item transfer, comprising the steps of:
-
enumerating an item specific designation for a user specified item; encoding said enumerated item specific designation into a readable composite symbology encodation; said composite symbology encodation, comprising; at least a first and a second encoded symbology portion, wherein said at least first and second portions are electronically joined during said step of encoding and require a combination of said portions to read said encoded item specific designation; deconstructing said readable composite symbology encodation into said at least first and second encoded symbology portions rendering at least one of said at least first and second portions separately unreadable without the other; applying one of said deconstructed at least first and second encoded symbology portions to said user specified item; transferring said user specified item to at least a first authorized party; transferring said other of said at least first and second encoded symbology portions to said at least first authorized party separately from said user specified item; and reconstructing said at least first and second encoded symbology portions and into said readable composite symbology encodation, thereby enabling said authorized party to conduct a step of reading said composite symbology encodation and determining said item specific designation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for enhancing information security during item transfer, comprising the steps of:
-
enumerating an item specific designation for a user specified item; encoding said enumerated item specific designation into a composite symbology encodation; said composite symbology encodation, comprising; at least a first 2D encoded symbology portion and a second 1D encoded symbology portion, wherein said at least first and second portions are electronically joined or linked during said step of encoding and require a combination of said portions to electronically read said composite symbology encodation of said item specific designation; deconstructing said readable composite symbology encodation into said at least first and second encoded symbology portions rendering at least one of said at least first and second portions separately unreadable; applying one of said deconstructed at least first and second encoded symbology portions to said user specified item; transferring said user specified item to at least a first authorized party; transferring said other of said at least first and second encoded symbology portions to said at least first authorized party separately from said user specified item; and reconstructing said at least first and second encoded symbology portions and into said readable composite symbology encodation, thereby enabling said authorized party to conduct a step of reading said composite symbology encodation and determining said item specific designation. - View Dependent Claims (15)
-
-
16. An apparatus, for enhancing information security during an item transfer, comprising:
-
means for enumerating an item specific designation for a user specified item; means for encoding said enumerated item specific designation into a readable composite symbology encodation; said composite symbology encodation, comprising; at least a first and a second encoded symbology portion, wherein said at least first and second portions are electronically joined by said means for encoding thereby requiring at least one of a physical and an electronic combination of said portions to read said encoded item specific designation; means for deconstructing said readable composite symbology encodation into said at least first and second encoded symbology portions rendering at least one of said at least first and second portions separately unreadable; means for applying one of said deconstructed at least first and second encoded symbology portions to said user specified item; means for transferring said user specified item to at least a first authorized party; means for transferring said other of said at least first and second encoded symbology portions to said at least first authorized party separately from said user specified item; and means for reconstructing said at least first and second encoded symbology portions and into said readable composite symbology encodation, thereby enabling said authorized party to read said composite symbology encodation and determining said item specific designation.
-
-
17. An apparatus, for enabling an improved security and information transfer between a label generator generating a label for an item and an authorized party receiving the item, comprising:
-
means for enumerating an item specific designation for said item; means for generating at least a machine readable composite symbology encodation for said item specific designation and for deconstructing said composite symbology encodation into at least a first encoded portion and a second encoded portion rendering said first and second encoded portions separately unreadable; said first encoded portion being a 2D symbology encodation portion; said second encoded portion being a 1D symbology encodation portion; means for printing at least said first encoded portion on a label for said item and applying said label to said item; means for separately transferring said item labeled with said first encoded portion and said second encoded portion to said authorized party; and means for reconstructing said first encoded portion from said label and said separately transferred second encoded portion thereby enabling a reading of said composite symbology and determination by said authorized party of said item specific designation. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method for providing an improved information security during an item transfer between an initial item identifier and at least one supply chain party in a supply chain, comprising the steps of:
-
selecting an item requiring an item specific designation; selecting an identification system for enumerating an identifier for said item from one of an industry-acceptable identification system and a custom-created identification system; enumerating an item specific designation for said item; said item specific designation including at least higher-order information and specific-item information; said specific-item information including at least a unique serial number for said item; encoding at least said specific item information in at least a first 2D bar code; applying said at least first 2D bar code to one of said item and an item label using one of a commercially acceptable off-line and a commercially acceptable online printing method producing a 2D bar code unreadable separately from a security 1D bar code; generating said linked security 1D bar code for said supply chain party enabling a reading of a combination of said 2D and 1D bar codes only when said 2D and 1D bar codes are physically or electronically joined; said 2D bar code and said 1D bar code being one of electronically linked/hooked codes and electronically unlinked/unhooked codes; maintaining a secure database system joining at least each said item, said unique serial number for each item; and
said 2D bar code in a secure database accessible via the Internet;maintaining a secure connection between said secure data base system, the Internet, and said at least one supply chain party enabling access through at least one of an authorized use of said physically or electronically joined 1D and 2D bar codes and an authenticated use employing human enterable data; transferring said security 1D bar code to said supply chain party in a secure manner separately from said 2D bar code and said item; and allowing for a secure updating of a location of said item in said secure data base system along said supply chain, whereby said method enables a certification of a pedigree of said item via said secure data base system and limits an access to said secure data base system when said 1D and 2D bar codes are not joined.
-
-
24. An system for providing an improved information security during an item transfer between an initial item identifier and at least one supply chain party in a supply chain, comprising:
-
means for selecting an item requiring an item specific designation; means for selecting an identification system for enumerating an identifier for said item from one of an industry-acceptable identification system and a custom-created identification system; means for enumerating a item specific designation for said item; said item specific designation including at least higher-order information and specific-item information; said specific-item information including at least a unique serial number for said item; means for encoding at least said specific item information in at least a first 2D bar code; means for applying said at least first 2D bar code to one of said item and an item label using a commercially acceptable off-line or on-line printing method producing a scannable 2D bar code when joined with a linked security 1D bar code; means for generating said linked security 1D bar code for said supply chain party enabling a reading of a combination of said 2D and 1D bar codes only when said 2D and 1D bar codes are physically or electronically joined; said 2D bar code and said 1D bar code being one of electronically linked/hooked codes and electronically unlinked/unhooked codes; means for maintaining a secure database system storing at least each item, said unique serial number for each item; and
said 2D bar code in a secure database;means for establishing and maintaining a secure connection between said secure data base system, and said at least one supply chain party enabling access through at least one of an authorized use of said physically or electronically joined 1D and 2D bar codes and an authenticated use employing secure human enterable data; means for transferring said security 1D bar code to said supply chain party in a secure manner separately from said 2D bar code and said item; and means for allowing for a secure updating of a location of said item in-said secure data base system along said supply chain, whereby said method enables a certification of at least one of an authentication and a pedigree of said item via said secure data base system and limits an access to said secure data base system when said 1D and 2D bar codes are not joined.
-
-
25. A method for providing improved security during an item transfer between an initial item identifier and at least one supply chain party in a supply chain, comprising:
-
selecting an item requiring an item specific designation; selecting an identification system for enumerating an identifier for said item from one of an industry-acceptable identification system and a custom-created identification system; enumerating a item specific designation for said item; said item specific designation including at least higher-order information and specific-item information; said specific-item information including at least a unique serial number for said item; encoding at least said specific item information in at least a first 2D composite bar code; applying said at least first 2D composite bar code to one of said item and an item label using one of a commercially acceptable off-line and a commercially acceptable online printing methods;
producing a readable 2D composite bar code when joined with a second security bar code;requiring said at least one supply chain party to separately secure said second security bar code enabling a reading of said first 2D composite bar code only when said first 2D composite code and said second security bar code are physically or electronically joined; said first 2D composite bar code and said second security code being one of electronically linked/hooked codes and electronically unlinked/unhooked codes; maintaining a secure database system joining at least each item, said unique serial number, said first 2D composite bar code, and said second security code in a secure data base accessible via the Internet; enabling a secure connection between said secure data base system, the Internet, and said at least one supply chain party enabling an access to said secure data base system through at least one of an hand entry and an electronic entry of a joined 2D composite code and said second security bar code; requiring an authentication of said supply chain party by a scanning of at least a first form of scannable identification prior to an accessing of said secure data base system; and allowing for a secure updating of a location of said item in said secure data base system along said supply chain, whereby said method enables a certification of a pedigree of said item via said secure data base system, allows a reporting of the same, and limits an access to said secure data base system when said first 2D composite bar code and said second security bar code are not joined.
-
-
26. A system for enabling an improved security and information transfer between a label generator generating a label for an item and an authorized party receiving the item, comprising:
-
means for enumerating an item specific designation for said item; means for generating at least a machine readable composite symbology encodation for said item specific designation and for printing said composite symbology encodation on said label; said composite symbology encodation including at least a first encoded portion and a second encoded portion; said first encoded portion being a 2D symbology encodation portion; said second encoded portion being a 1D symbology encodation portion; said means for generating including means for printing a human readable encodation reference proximate respective said first and second portions of said composite symbology encodation duplicating said item specific designation, a secure master data system including said machine readable composite symbology encodation linked with said item specific designation for said item; means in said secure master data system for providing a secure access to said secure master data system by said label generator and said authorized party; and said secure master data system including means for machine entering of said machine readable composite symbology and means for human entering of said human readable references, whereby said item label enables a tracking of an item specific designation and thereby enables an improved safety feature enabling at least one of a secure human access and a secure machine access to said item specific designation to confirm an authenticity of said item. - View Dependent Claims (27)
-
-
28. A management platform for managing a method for enhancing information security during item transfer, comprising:
-
means for securely receiving a first encodation portion of a composite symbology encodation from an authorizing supply chain partner; said completed composite symbology encodation representing an item specific designation for a user specified item; said composite symbology encodation including a 1D encodation portion and a 2D encodation portion; means for separately receiving said second encodation portion of said composite symbology encodation separately from said means for securely receiving; said first and second encodation portions being separately unreadable and requiring one of a physical and an electronic joining to form said completed composite symbology encodation prior to one of a physical and a machine reading of said composite symbology encodation; means for one of a physically and a electronically joining said first encodation portion and said second encodation portion and forming said completed composite symbology encodation; and means for scanning said completed composite symbology encodation and for determining said item specific designation, whereby said means for separately receiving and said means for physically and electronically joining providing an enhanced security feature minimizing a risk and determining an authentication of said user specified item.
-
Specification