Compositions, systems, and methods for unique identifiers embedded in machine verifiable marks having error correction features
10977534 ยท 2021-04-13
Assignee
Inventors
Cpc classification
G06K19/06093
PHYSICS
International classification
Abstract
The presently disclosed subject matter is directed to compositions of machine verifiable marks comprising embedded unique identifiers and error correction features. In one embodiment, a composition includes an ordered arrangement of reference characters selected from among a plurality of reference characters. Each reference character of the plurality of reference characters is distinct based upon a value calculated by a similarity of one shape to another. The composition further includes a numeric equivalent associated with the reference characters and an error correction feature.
Claims
1. A composition comprising: an ordered arrangement of reference characters selected from among a plurality of reference characters, wherein each reference character of the plurality of reference characters is distinct based upon a value calculated by a similarity of one shape to another; a numeric equivalent associated with the reference characters; and an error correction feature, wherein the error correction feature comprising at least one of a repeat structure, an error correction bit, or a combination of a repeat structure and an error correction bit.
2. The composition of claim 1, wherein the ordered arrangement of reference characters is represented by a linear arrangement.
3. The composition of claim 2, wherein the linear arrangement is rendered in more than one line.
4. The composition of claim 3, wherein the linear arrangement is rendered in more than one line and forms a content space.
5. The composition of claim 4, wherein the content space comprises information in a public form comprising at least one of alphanumeric text, a barcode, a data matrix code, a quick response (QR) code, or a combination thereof.
6. The composition of claim 4, wherein the content space comprises information required to decode the error correction feature.
7. The composition of claim 1, wherein the repeat structure comprising at least one of a tandem repeat, a distant repeat, a staggered repeat, and a palindrome.
8. The composition of claim 1, wherein the error correction feature is an error correction bit comprising at least one of a parity bit, a check sums, a circular redundancy check, a hash function, Reed-Solomon code, or a combination thereof.
9. A method comprising: generating an ordered arrangement of reference characters comprising a repeat structure of the reference characters, wherein each reference character among a plurality of reference characters comprises a value calculated based upon a similarity of a first character shape to a second character shape; associating each reference character with a numeric equivalent; rendering the ordered arrangement of reference characters on an original item; capturing a representation of the ordered arrangement of reference characters from the original item; determining from the representation of the ordered arrangement of reference characters an errored reference character for which a value may not be determined; and identifying the errored reference character based upon a position in the repeat structure.
10. The method of claim 9, wherein the ordered arrangement of reference characters is represented by a linear arrangement.
11. The method of claim 10, wherein the linear arrangement is rendered in more than one line.
12. The method of claim 11, wherein the linear arrangement is rendered in more than one line and form a content space.
13. The method of claim 12, wherein the content space comprises information in a public form comprising at least one of alphanumeric text, a barcode, a data matrix code, a quick response (QR) code, or a combination thereof.
14. The method of claim 12, wherein the content space comprises information required to decode an error correction feature.
15. The method of claim 14, wherein the error correction feature comprising at least one of a repeat structure, an error correction bit, or a combination of a repeat structure and an error correction bit.
16. The method of claim 15, wherein the repeat structure comprising at least one of a tandem repeat, a distant repeat, a staggered repeat, and a palindrome.
17. The method of claim 15, wherein the error correction feature is an error correction bit comprising at least one of a parity bit, a check sums, a circular redundancy check, a hash function, and Reed-Solomon code.
18. The method of claim 9, further comprising storing a registration signature in a database.
19. A composition comprising: an ordered arrangement of reference characters selected from among a plurality of reference characters, wherein each reference character of the plurality of reference characters is distinct based upon a value calculated by a similarity of one shape to another; a numeric equivalent associated with the reference characters; and an error correction feature, wherein the error correction feature is an error correction bit comprising at least one of a parity bit, a check sums, a circular redundancy check, a hash function, Reed-Solomon code, or a combination thereof.
Description
BRIEF DESCRIPTION OF THE DRAWING FIGURES
(1) The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the disclosure, and together with the description serve to explain the principles of the disclosure.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DETAILED DESCRIPTION
(13) The following description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding of the disclosure. However, in certain instances, well-known or conventional details are not described in order to avoid obscuring the description. References to one embodiment or an embodiment in the present disclosure can be, but not necessarily are, references to the same embodiment and such references mean at least one of the embodiments.
(14) Reference in this specification to one embodiment or an embodiment means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase in one embodiment in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not for other embodiments.
(15) The terms used in this specification generally have their ordinary meanings in the art, within the context of the disclosure, and in the specific context where each term is used. Certain terms that are used to describe the disclosure are discussed below, or elsewhere in the specification, to provide additional guidance to the practitioner regarding the description of the disclosure. For convenience, certain terms may be highlighted, for example using italics and/or quotation marks. The use of highlighting has no influence on the scope and meaning of a term; the scope and meaning of a term is the same, in the same context, whether or not it is highlighted. It will be appreciated that same thing can be said in more than one way.
(16) Consequently, alternative language and synonyms may be used for any one or more of the terms discussed herein, nor is any special significance to be placed upon whether or not a term is elaborated or discussed herein. Synonyms for certain terms are provided. A recital of one or more synonyms does not exclude the use of other synonyms. The use of examples anywhere in this specification, including examples of any terms discussed herein, is illustrative only, and is not intended to further limit the scope and meaning of the disclosure or of any exemplified term. Likewise, the disclosure is not limited to various embodiments given in this specification.
(17) Without intent to limit the scope of the disclosure, examples of instruments, apparatus, methods and their related results according to the embodiments of the present disclosure are given below. Note that titles or subtitles may be used in the examples for convenience of a reader, which in no way should limit the scope of the disclosure. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure pertains. In the case of conflict, the present document, including definitions, will control.
(18) Described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features wherein the unique identifier forms a repeating pattern over lengths greater than that used to form a security mark for a product.
(19) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features wherein the unique identifier forms a repeating pattern over lengths less than that used to form a security mark for a product.
(20) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features wherein the mark comprises a signal for starting or stopping read of a unique identifier.
(21) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features, wherein said features are selected from one or more of: redundant unique identifier information embedded in the sequence of entities, patterns of redundancy selected from among the group: simple repeats, distant repeats, tandem repeats, palindromes, and repeats encoded in symmetrically-related rotation of element, all as further defined and described below.
(22) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features, wherein said features are error correction bits.
(23) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features, wherein said features are error correction bits selected from among the group: parity bits, check sums, a circular redundancy check, and/or a hash function.
(24) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features, wherein said features are error correction bits that are encoded, the encoding selected from among the group: at a specified position in a string of elements, by an element only used to encode error correction bits, and/or in the frequency array of elements by type.
(25) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features, wherein said features are error correction bits that are encoded in elements, the relationship with which and mathematical properties used in error correction are hidden.
(26) Further described herein are compositions of machine verifiable marks comprising embedded unique identifiers and error correction features, wherein error correction comprises both redundancy and error correction bits
(27) Further described herein are machine verifiable marks comprising embedded unique identifiers and error correction features borne by a candidate article subject to identification and/or authentication, wherein a relationship between the unique identifier and identification and/or authentication is stored in a database.
(28) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features to retrieve associated information from a database.
(29) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features borne by a candidate article subject to identification or authentication, wherein the candidate article is a physical object chosen from the group comprising: a pharmaceutical product, a medical device, a diagnostic kit, a cosmetic, a veterinary product, a garment, a retail product, food or beverage, a bottle, a box, a container, a shipping package, a label, or combinations thereof.
(30) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features wherein the mark is borne on a tamper evident label, such tamper evidence selected from among the group wherein: the unique identifier is illegible after removal of the label, the label leaves a detectable residual feature after removal and/or, the label is frangible.
(31) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features borne by a candidate article subject to identification and/or authentication, wherein the candidate article is a digital rendering, such as a screen image, screenshot, PDF, or the like.
(32) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features that degrade when copied.
(33) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features that degrade when exposed to certain environmental conditions.
(34) Further described herein are systems and methods for machine verifiable marks comprising embedded unique identifiers and error correction features borne by a candidate article subject to identification and/or authentication, wherein identification or authentication information about the article is retrieved upon error correction.
(35) Further described herein are describes a computing device comprising: a processor and a memory operable to: capture an image of machine verifiable marks comprising embedded unique identifiers and error correction features borne by a candidate article subject to identification or authentication; correct errors in said mark based upon its error-correction features, extract a unique identifier from the corrected mark; and determine, based upon a comparison between the extracted unique identifier and match information, whether the candidate article is a reference article.
(36) As referred to herein, the term computing device should be broadly construed. Examples may include a server, a workstation, a personal computer (PC), a smart phone (e.g. cell phone), a tablet, a laptop, a smart watch, or the like. An imaging device may be any computing device operable to take to capture image data.
(37) As used herein, an article is a physical object on which a label may be applied. Examples of articles can include (but are not limited to) garments, shipping boxes, vehicles, personal property, electronics, etc.
(38) As used herein, a reference article is an article whose identity is known, such as a person.
(39) As used herein, a candidate article is an article whose identity is to be determined by examination of a mark applied to the article, such as a person whose identity is known.
(40) As used herein, a label refers to machine detectable information affixed to an article. A label may be applied to an article through a number of different methods, including printing on the article or affixing to an article. A label may be visible to the human eye or invisible but machine readable, as in the case of magnetic ink.
(41) As used herein, a mark comprises a label that is embedded with an authorization code. Authorization codes are selected to be unique, and uniquely identify the article within the disclosed system. A mark may be applied to an article through a number of different means including printing on the article or affixing a label to an article. A mark may be visible to the human eye or invisible but machine readable, as in the case of magnetic ink.
(42) As used herein, an authentication code may be any appropriately configured code, including a random code of assigned variables. The code may be any of the codes disclosed in co-pending U.S. patent application Ser. No. 13/457,115 filed on Apr. 26, 2012 and U.S. Pat. No. 9,053,364 filed on Oct. 30, 2013, the entire contents of which are incorporated by reference herein.
(43) As used herein, a signature may be a numerical signature determined from the authorization code. In some embodiments, the signature is a numerical signature.
(44) As used herein, a unique identifier is any identifier that is unique within the disclosed system. An example of a unique identifier is an authorization code.
(45) As used herein, a barcode is an optical, machine-readable, representation of data. In some embodiments, the data describes something about the object that carries the bar-code. Originally barcodes systematically represented data by varying the widths and spacing of parallel lines, and may be referred to as linear or one-dimensional (1D). Later two-dimensional (2D) codes were developed, using rectangles, dots, hexagons and other geometric patterns in two dimensions, usually called barcodes although they do not use bars as such. Characteristic of barcode technologies is that each position carries just two bits of information, i.e., a location is black (1) or white (0).
(46) As used herein, a security thread is physical fiber capable of being imprinted with a machine-readable mark.
(47) As used herein, a tamper evident seal is a seal where it is possible to detect if the seal has been opened or tampered with. As used herein a tamper evident seal may include an embedded security thread.
(48) The unique identifiers embedded in machine-readable marks may be any appropriately configured code, including a random code of assigned variables. The code may be any of the codes as disclosed in U.S. patent application Ser. No. 14/067,945 (issued as U.S. Pat. No. 9,053,364), U.S. patent application Ser. No. 14/936,587 (issued as U.S. Pat. No. 10,044,704), and U.S. patent application Ser. No. 15/935,708 (published as U.S. Publication No. 2018/0218187) the entire contents of which are incorporated by reference herein. The code may also be any of the printed codes of U.S. patent application Ser. No. 11/455,817 (issued as U.S. Pat. No. 7,874,489) and U.S. patent application Ser. No. 11/455,717 (issued as U.S. Pat. No. 8,458,475), the entire contents of which are incorporated by reference herein.
(49) The disclosed compositions are machine verifiable marks comprising embedded unique identifiers and error correction features. Whether produced from an open-format product identification labeling system or in a proprietary code, unique identifiers embedded in machine-readable marks are subject to reading errors. Such errors may occur unintentionally, as may occur because of vibration to a printer head on a manufacturing line, handling in the supply chain, or by some other accidental means. Additionally, fraudsters may smudge, obscuring, tear, attach extraneous marks or otherwise deface the mark in an attempt to undermine the intended security of the identifier.
(50) The disclosed compositions of the machine verifiable marks include those with one or more reference characters. The reference characters may be alphanumeric characters. In some embodiments, the reference characters are reference characters functional in the gridding method described in U.S. patent application Ser. No. 14/067,945 (issued as U.S. Pat. No. 9,053,364).
(51) In the disclosed compositions of the machine verifiable marks, one or more reference characters are provided on a predetermined arrangement map, as is illustrated for the border surrounding a data matrix code and alphanumeric serial number in
(52) The one or more reference characters may be placed onto the image in a random position and at a fixed frequency, wherein the frequency array of reference character (entity) by type (cluster) comprises at least two distinct clusters of entities having detectable counts or relative counts per cluster (signature array) that encodes a product authentication code as is more fully described in U.S. patent application Ser. No. 11/455,817 (issued as U.S. Pat. No. 7,874,489).
(53) The one or more reference characters may be placed onto the image in a random position and at a random frequency. The authentication identifier may define orientation marks. Comparing the predetermined arrangement map includes comparing the orientation marks of the authentication identifier with orientation marks of the true authentication identifier. The one or more reference characters includes one or more reference characters with an intrinsic orientation, as is illustrated for one case in the T character of
(54) The disclosed compositions of machine verifiable marks include those wherein one or more reference characters are provided on a predetermined association or correlation with numeric values, as shown in
(55) The disclosed compositions of the machine verifiable marks can comprise embedded unique identifiers and error correction features wherein error correction may be derived from the unique identifier (sometimes referred to as the UID) forming a repeating pattern over lengths less than that used to form a security mark for a product. With reference to the illustrations of
(56) One aspect of the disclosed compositions of the machine verifiable marks includes locating the position of characters in a layer for the purposes of determining interaction information between layers. In some cases, the layers are physical layers, as when a border is printed around another information layer, or vice versa. The layer also may be a digital layer, as for example may be useful in analyzing an image of the characters by digitally filtering some or all of the image information unrelated to the characters.
(57) The disclosed compositions of the machine verifiable marks include those wherein the mark comprises a signal for starting or stopping read of a unique identifier. The configurations illustrated in
(58) The disclosed compositions of the machine verifiable marks include those wherein the error correction features are error correction bits. Examples of error correction bits include: parity bits, check sums, a circular redundancy check, and a hash function.
(59) One design for disclosed compositions includes where error correction comprises both redundancy and error correction bits. For example, the cartoon of
(60) Machine verifiable marks borne by a candidate article may be identified or authentication or authenticated according to the system and methods outlined in
(61) Similarly, the systems and methods for machine verifiable marks may be applied to authentication or identification of a digital rendering, such as a screen image, screenshot, PDF or the like.
(62) The presently disclosed subject matter may include a computing device comprising: a processor and a memory operable to: capture an image of machine verifiable marks comprising embedded unique identifiers and error correction features borne by a candidate article subject to identification or authentication; correct errors in said mark based upon its error-correction features, extract a unique identifier from the corrected mark; and determine, based upon a comparison between the extracted unique identifier and match information, whether the candidate article is a reference article. In such embodiments, a relationship between the unique identifier and identification or authentication is stored in a database.
(63) In some embodiments, the computing device may be electrically or wirelessly coupled to an imaging device such as a camera and/or bar-code reader/scanner. The computing device may include an imaging device. In certain embodiments, the computing device may be a mobile device such as a smart phone, a tablet, a laptop, a smart watch, or the like.
(64)
(65) The mobile device 602 also includes a processor 606 and a memory 608. In some embodiments the memory 608 or a portion of the memory 608 may be integrated with the processor 606. The memory 608 may include a combination of volatile memory (e.g. random access memory) and non-volatile memory (e.g. flash memory). The memory 608 may include program instructions when executed by the processor 606 allow the mobile device to read via the camera 604 and analyze the one of more of the previously described compositions. In certain embodiments, the processor 606 may be a mobile processor such as the Qualcomm Snapdragon mobile processor. For example, the processor 606 may be the Snapdragon 855
(66) The mobile device 602 also includes a display 612. The mobile device 602 may also include a user interface (UI) 610. The UI 610 and the display 612 may be integrated such as a touchpad display.
(67) The mobile device 602 may include WAN radios 614, LAN radios 616, and PAN radios 618. The WAN radios 1910 may include 2G, 3G, 4G, and/or 5G technologies. The LAN radios 616 may include Wi-Fi technologies such as 802.11a, 802.11b/g/n, and/or 802.11ac circuitry. The PAN radios 618 may include Bluetooth technologies.
(68) The mobile device 602 may also include one or more sensors (not shown in
(69) The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms a, an and the are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms comprises and/or comprising, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
(70) The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.