This application is a U.S. National Stage Application under 35 U.S.C. 371 of International Application No. PCT/EP2016/051853, filed Jan. 28, 2016, which claims the benefit of and priority to European Patent Application No. 15152959.1, filed Jan. 28, 2015, the contents of all of which are herein incorporated by reference in their entireties.
The present invention relates generally to techniques for labeling items of commerce to improve the traceability and the tracking of an item of commerce to the first and subsequent customers. The invention can be used to establish a link between a unique item identifier and outer packaging materials, also uniquely identified by a code.
Counterfeiting and contraband is a major problem in many industries, and in particular the tobacco industry. To detect counterfeit products, there is a need to be able to authenticate genuine products throughout the supply chain. In order to authenticate a product as genuine, a manufacturer may uniquely mark each product during manufacture and then use that mark or marks to determine whether the product is genuine at a later time.
One way to authenticate a product that is shipped in a container holding a plurality of products is to mark the container with an identifier and to mark each individual product within the container with an identifier. The container identifiers and product identifiers are stored in a database together. A check can be made later in the supply chain to determine whether the product identifiers for products in a particular container correspond to the container identifier for the container. This check consists of comparing a read container and product identifier pair with pairs of identifiers stored in the database. If a matching container identifier and product identifier is in the database, then the product is determined to be genuine.
However, these existing systems are not practically possible to implement for very high volume products, and in particular for cartons of cigarettes in a case. The difficulty with the authentication method is often the volume of data that needs to be stored and sent in order to implement it.
The limitations of the existing systems are further highlighted when secure identifiers are used. For example, the product identifiers placed on certain products (such as easily counterfeited, expensive, or otherwise controlled products) may be complex in order that each identifier is unique and in order that the marking protocol cannot easily be discovered by potential counterfeiters. For this reason, product identifiers can be also encrypted. Secure tracking systems require additional data storage and time for authentication.
In distribution and logistics of many types of products, track and trace, or tracking and tracing, concerns a process of determining the current and past locations (and other information) of a specific product. In this context, the inventive item tracking system allows track and trace of products at individual unit level, as well as at the container level. As used herein, a “unit” of a product is considered to be a single item that is tracked through the system. A unit may eventually be sold in commerce as an individual item, or product. A “container” is an aggregation of two or more units of the product, and the container may also be sold as a single product in commerce. Multiple containers, each comprising multiple units, can be further aggregated into containers of containers. The systems described herein are applicable to various industries, such as the cigarette, food, and pharmaceutical industries, as well as any other industry that produces significant quantities of products that are aggregated into collective packaging. The systems are applicable to all types of goods, including as non-limiting examples, pharmaceuticals and other consumer goods, without regard to the speed at which the goods are produced.
One embodiment of the invention includes a computer-implemented method for identifying manufactured products in containers, each container suitable for containing two or more items, the method comprising the steps of:
generating a set of unique item identifier codes, each item identifier code corresponding to a specific item in a set of items;
at a production line, uniquely identifying multiple items by marking the multiple items with the corresponding unique item identifier code;
at the production line, mechanically allocating two or more items to be aggregated in a container;
detecting the unique item identifier codes on the set of items having been aggregated in the container and transmitting the detected unique item identifier codes to a processor;
storing, in a database, the item identifier codes for each item detected;
at the production line, uniquely identifying the container by marking the container with a unique container identifier;
detecting the unique container identifier on the container and transmitting the detected unique container identifier to the processor;
storing, in a database, a container identifier for each detected container; and
associating the detected container identifier in the database with the detected item identifiers.
According to one embodiment, ranges of identifiers, such as for units of a product, can be determined and the end points of those ranges stored together with the corresponding container identifier, rather than storing each individual unit identifier together with a container identifier. No information is lost with this scheme, but the data storage and data bandwidth requirements are dramatically reduced. According to another embodiment, the product identifiers can include production details. The production details can include a date and time of production, specified to the level of minutes, and an incremental counter value. The product identifiers of products allocated to a particular container can then be placed in a sequential order based on the production time and incremental counter value. Those products in the container having the same production time are placed in a single range, which is stored in the database by recording the lowest incremental counter value in the range and the highest incremental counter value in the range. If a container includes products produced in different minutes, then a plurality of ranges are required for that container. Given that, typically, many items can be produced per minute by a single production line, this method dramatically reduces data storage requirements.
Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
Types of Identifiers
Each item or container can be uniquely identified by a code. As used herein, the terms “code” and “identifier” are used interchangeably to refer to an identifier that is associated with a unit or a container and the terms “bundle” and “container” are used interchangeably. The code can be printed on the bottom part of the item or container in human readable format and encoded using a specific format. Example methods of printing include Dotcode or Datamatrix. Other techniques of suitable print speed and physical size may be used.
In some preferred embodiments, Dotcode can be used as standard machine readable code for individual items, such as cigarette packs. The code can be optimized for inkjet printers or laser printers. In a preferred embodiment, for standard cigarette packs (box or soft) using a 12 digits code, the encoding may be performed with a Dotcode of 7 dots height per 58 dots width. Other configurations may be used for printing and decoding efficiency. The code can be printed in black on white or grey background or printed in white on a black background. A quiet zone of at least one dot size can be used to secure sides of the Dotcode to improve reading efficiency. A larger quiet zone can also facilitate the overall decoding process.
Applying and Associating Codes
Multiple embodiments for applying codes to individual items and associating those codes with other items and containers are described in more detail below. Some or all of the various embodiments described below may be made available in a production facility and an operator panel may be provided so that user selection may be made between them.
The embodiments described herein may read codes having been placed on items and containers. The reading of the codes may be accomplished by one or more optical imaging devices, such as a laser scanner or other similar device necessary to read codes and that would be known to someone skilled in the art. In some cases, one optical imager or “reader” may be configured to read one code at a time. In other cases, one optical imager may be configured to read several codes at one time, such that fewer readers are required to read the same number of codes, whether on items or containers. Single code or multi-code readers can be substituted and used interchangeably in the embodiments described herein. While specific reference is made to optical mechanisms for reading codes or identifiers, non-optical methods could also be used interchangeably to read codes. For example, the optical readers and codes described herein could be substituted with RFID readers and RFID tags without departing from the scope of the invention.
Container Snapshot Embodiment
According to a first embodiment, in the container snapshot embodiment, a device is able to capture all item codes for a container at once and then aggregate the items with their parent container at that time. This embodiment is preferred when clear-wrap is used in the container-making process so that individual items can be scanned after aggregation into a container. The method can include detecting the unique item identifier codes on the set of items by imaging the identifiers through a clear-wrap binding the set of items into the container.
For this approach, each item may have a unique code bottom printed on it; each container may have a unique code printed on it; and a container ejection station may be located after the container snapshot device. As a non-limiting example, the container code may be printed using Datamatrix technique. The container snapshot embodiment is appropriate at least in situations where the container has already been formed and the remaining tasks include reading the item codes before the container label applicator, applying a label to the container, and then reading the container identifier.
Reading Process for Items
With reference to
In an embodiment illustrated in
Reading Process for Containers
The container reader can be configured to decode standard Datamatrix in self-triggering mode. In this embodiment, there is no need of additional sensor to trigger it. With reference to
Container Snapshot Method
The method is described below, with reference to
In one embodiment, the system can be configured to include receiving a configurable number of items threshold value, determining whether the threshold number of items was not detected before aggregation of items into a container, and rejecting a container if that threshold value is met by the container. The system can be configured for storing a number of items threshold value; determining whether the container contains greater than the threshold number of items; and if the container contains greater than the threshold number of items, removing duplicate identifiers from among the stored item identifiers associated with the container. In further embodiments, the method can include determining if, after removing duplicate identifiers, the container is associated with greater than ten identifiers; if the container is determined to be associated with greater than ten identifiers, rejecting the container at the production line.
The system can be configured for storing a number of items threshold value; determining whether the number of items in the container is fewer than the threshold number of items; and if the container contains fewer than the threshold number of items, storing null item identifiers in association with the container identifier. In further embodiments, the method can include determining the number of null items identifiers stored in association with the container identifier; and rejecting the container if the number of null items is greater than a predetermined threshold.
With reference to
With reference to
NOREAD_PT_LinkupID_yyyyMMdd_HHmmssfff_nn
Linkup ID=Linkup Unique Number
yyyy=current year
MM=current month
dd=current day
HHmmssfff=current time at milliseconds level of detail
nn=packID position in queue
A too many No_Reads rule can be configurable by giving the maximum number of items not read that the system accepts without rejecting the container. By default, this value can be set to two. The reject container rule can be linked to an alarm displaying the cause of the rejection.
Virtual Container Embodiment
According to a second embodiment, in the virtual container embodiment, the system reads the identifiers on a set of items at an arbitrary time after the items are physically aggregated into a container. The virtual container embodiment does not require proximity in time or space between reading item identifiers before a container label applicator and reading the container identifier. The virtual container snapshot embodiment can be used if clear-wrap is used in the container making process. In some embodiments, the method can include detecting the unique item identifiers on the set of items by imaging the identifiers through a clear-wrap binding the set of items into the container. In a preferred embodiment, the items have a unique code printed on them, containers have a unique code printed on them, and a container ejection station is available. As non-limiting examples, Dotcode can be used for writing item codes and Datamatrix can be used for writing container codes.
According to one embodiment, as illustrated in
The reading code process can be triggered by detection of items, using one or more of the optical sensors. The reading of a complete container is stored in the electronic data store as a virtual container, and placed in a queue of virtual containers. In the container conveyor area, an empty space may be used to separate each container, for example of at least 60 millimeters. The communication between the reader and the system can be Ethernet based. In a preferred embodiment, the readers can be triggered by external sensors. As described in more detail below, when the container is ready, the system takes the first set of items of the item buffer (e.g., ten items) and creates a virtual container. A unique and temporary identifier is used to identify the virtual container. An example virtual container identifier may be in the form of “XAF32”. After a label has been applied to a container, a first reader reads one item code in the container. The system then searches this code in the collection of stored virtual containers. Upon finding a match, the system associates the items of the virtual container with the container identifier having been read by one of the readers.
As illustrated in
According to one embodiment, the method can include generating a set of unique item identifier codes, each identifier code corresponding to a specific item in a set of items; at a production line, uniquely identifying multiple items by marking the multiple items with the corresponding unique item identifier codes; at the production line, mechanically aggregating two or more items into a container; detecting the unique item identifier codes on the set of items aggregated into the container and transmitting the detected unique item identifier codes to a processor; electronically storing the detected unique item identifier codes in a data store and associating the detected unique identifier codes with a temporary identifier for the container; at the production line, uniquely identifying the container by marking the container with a unique container identifier; detecting the unique container identifier on the container and transmitting the detected unique container identifier to the processor; detecting one item identifier of the set of items aggregated in the container and transmitting the detected item identifier to the processor; determining unique item identifiers for multiple items in the container based on the detected unique item identifier associated with the temporary identifier for the container; and in the electronic data store, associating the determined unique item identifiers for multiple items in the container with the detected unique container identifier.
A process for collecting item identifiers for the virtual container embodiment is illustrated in
A process for collecting container identifiers is illustrated in
An example aggregation process is illustrated in
As illustrated, after the container label applicator, one reader can read an item identifier, and one reader can read a container identifier. The system can then reference the known item identifier and associate that item identifier with the virtual container created before the label applicator. Based on the association from the known item to the other items in the virtual container, the system can then associate the container identifier to all of the item identifiers in the virtual container.
With reference to
NOREAD_PT_LinkupID_yyyyMMdd_HHmmssfff_nn
Linkup ID=Linkup Unique Number
yyyy=current year
MM=current month
dd=current day
HHmmssfff=current time at milliseconds level of detail
nn=packID position in queue
The too many No_Reads rule can configurable by giving the maximum number of items not read that the system accepts without rejecting the container. By default, this value is set to two. A process cleaning the virtual containers from the virtual container identifier queue can be implemented to remove items older than a configurable number of hours. As a non-limiting example, the default value can be set to four hours. The reject container rule can be linked to an alarm displaying the cause of any item or container rejection.
Item Shot Variant A
According to a third embodiment, Item Shot Variant A can be used when the material used for the containers is not transparent. Non-limiting examples of non-transparent container materials may be display carton and paper. Item Shot Variant A may also be used if the line topology does not allow the implementation of the container snapshot or virtual container embodiments, described above. For example, this method can be used when the step of mechanically aggregating the items into a container further comprises enclosing the items using a non-transparent material or the step of mechanically aggregating the items into a container further comprises enclosing the items using a material which prevents the item identifiers from being read optically.
According to the Item Shot Variant A embodiment, a reader is installed at the entrance of the container maker. An overview of the embodiment is illustrated in
In one embodiment of a computer-implemented method for identifying manufactured products in containers, each container suitable for containing two or more items, the method can include generating a set of unique item identifier codes, each identifier code corresponding to a specific item in a set of items; at a production line, uniquely identifying multiple items by marking the multiple items with the corresponding unique item identifier codes; detecting the unique item identifier codes on the set of items and transmitting the detected unique item identifier codes to a processor; storing the detected unique item identifier codes in an item identifier buffer; if the number of detected unique item identifier codes in the buffer is equal to or greater than a predetermined number of item identifier codes, associating the item identifier codes with each other and storing the associated item identifier codes as a virtual container; at the production line, mechanically aggregating two or more items in a container; at the production line, uniquely identifying the container by marking the container with a unique container identifier; detecting the unique container identifier on the container on a conveyor and transmitting the detected unique container identifiers to the processor; and associating container identifiers of containers on the conveyor with virtual containers of item identifier codes.
As illustrated in
As illustrated in
The item code reading process is illustrated in
The virtual container collector and aggregation process is illustrated in
The method can further include electronically storing a value representing a pre-determined maximum number of physical containers on a conveyor, and if a number of container identifiers on the conveyor is equal to a pre-determined maximum number of containers in a conveyor, associating the oldest virtual container with the oldest container.
The container ejection process is illustrated in
In some embodiments, the system can be configured so that each item has a unique code bottom printed (using, for example, Dotcode), each container has a unique code printed (using, for example, Datamatrix SGTIN), a container ejection station exists, and the number of containers in the conveyor going to the label applicator is predetermined. The container reader can be configured to decode standard Datamatrix given an external signal (external trigger). The reader can be located just after the encoding processor (label applicator or printer) of the container and just before the container ejection station (if one is present). The communication between the reader and the system can be Ethernet based.
Item Shot Variant B
According to a fourth embodiment based on Item Shot Variant A, on the conveyor, each container is separated by a physical barrier (slot). With reference to
With reference to
In one embodiment of a computer-implemented method for identifying manufactured products in containers, each container suitable for containing two or more items, the method can include generating a set of unique item identifier codes, each identifier code corresponding to a specific item in a set of items; at a production line, uniquely identifying multiple items by marking the multiple items with the corresponding unique item identifier codes; detecting the unique item identifier codes on the set of items and transmitting the detected unique item identifier codes to a processor; storing the detected unique item identifier codes in an item identifier buffer; if the number of detected unique item identifier codes in the buffer is equal to or greater than a predetermined number of item identifiers, associating the item identifier codes with each other and storing the associated item identifiers as a virtual container; at the production line, mechanically aggregating two or more items in a container; at the production line, uniquely identifying the container by marking the container with a unique container identifier; detecting the unique container identifier on the container on a conveyor based on a demarcation between adjacent containers; transmitting the detected unique container identifiers to the processor; and associating container identifiers of containers on the conveyor with virtual containers of item identifiers. In further embodiments, the demarcation between adjacent containers can be a physical barrier, a slot, or a space.
System Architectures
The systems and methods described herein can be implemented in software or hardware or any combination thereof. The systems and methods described herein can be implemented using one or more computing devices which may or may not be physically or logically separate from each other. Additionally, various aspects of the methods described herein may be combined or merged into other functions. In some embodiments, the illustrated system elements could be combined into a single hardware device or separated into multiple hardware devices. If multiple hardware devices are used, the hardware devices could be physically located proximate to or remotely from each other.
The methods can be implemented in a computer program product accessible from a computer-usable or computer-readable storage medium that provides program code for use by or in connection with a computer or any instruction execution system. A computer-usable or computer-readable storage medium can be any apparatus that can contain or store the program for use by or in connection with the computer or instruction execution system, apparatus, or device.
A data processing system suitable for storing and/or executing the corresponding program code can include at least one processor coupled directly or indirectly to computerized data storage devices such as memory elements. Input/output (I/O) devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system. Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. To provide for interaction with a user, the features can be implemented on a computer with a display device, such as a CRT (cathode ray tube), LCD (liquid crystal display), or another type of monitor for displaying information to the user, and a keyboard and an input device, such as a mouse or trackball by which the user can provide input to the computer.
A computer program can be a set of instructions that can be used, directly or indirectly, in a computer. The systems and methods described herein can be implemented using programming languages such as Flash™, JAVA™, C++, C, C#, Visual Basic™, JavaScript™, PHP, XML, HTML, etc., or a combination of programming languages, including compiled or interpreted languages, and can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. The software can include, but is not limited to, firmware, resident software, microcode, etc. Protocols such as SOAP/HTTP may be used in implementing interfaces between programming modules. The components and functionality described herein may be implemented on any desktop operating system executing in a virtualized or non-virtualized environment, using any programming language suitable for software development, including, but not limited to, different versions of Microsoft Windows™, Apple™ Mac™, iOS™, Unix™/X-Windows™, Linux™, etc.
Suitable processors for the execution of a program of instructions include, but are not limited to, general and special purpose microprocessors, and the sole processor or one of multiple processors or cores, of any kind of computer. A processor may receive and store instructions and data from a computerized data storage device such as a read-only memory, a random access memory, both, or any combination of the data storage devices described herein. A processor may include any processing circuitry or control circuitry operative to control the operations and performance of an electronic device.
The processor may also include, or be operatively coupled to communicate with, one or more data storage devices for storing data. Such data storage devices can include, as non-limiting examples, magnetic disks (including internal hard disks and removable disks), magneto-optical disks, optical disks, read-only memory, random access memory, and/or flash storage. Storage devices suitable for tangibly embodying computer program instructions and data can also include all forms of non-volatile memory, including, for example, semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
The systems, modules, and methods described herein can be implemented using any combination of software or hardware elements. The systems, modules, and methods described herein can be implemented using one or more virtual machines operating alone or in combination with each other. Any applicable virtualization solution can be used for encapsulating a physical computing machine platform into a virtual machine that is executed under the control of virtualization software running on a hardware computing platform or host. The virtual machine can have both virtual system hardware and guest operating system software.
The systems and methods described herein can be implemented in a computer system that includes a back-end component, such as a data server, or that includes a middleware component, such as an application server or an Internet server, or that includes a front-end component, such as a client computer having a graphical user interface or an Internet browser, or any combination of them. The components of the system can be connected by any form or medium of digital data communication such as a communication network. Examples of communication networks include, for example, a LAN, a WAN, and the computers and networks that form the Internet.
One or more embodiments of the invention may be practiced with other computer system configurations, including hand-held devices, microprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, etc. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a network.
While one or more embodiments of the invention have been described, various alterations, additions, permutations and equivalents thereof are included within the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
15152959 | Jan 2015 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2016/051853 | 1/28/2016 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2016/120414 | 8/4/2016 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4035615 | Best et al. | Jul 1977 | A |
4058954 | Asami | Nov 1977 | A |
4094244 | Edwards et al. | Jun 1978 | A |
4354101 | Hester et al. | Oct 1982 | A |
4463250 | McNeight et al. | Jul 1984 | A |
4529871 | Davidson | Jul 1985 | A |
4860226 | Martin et al. | Aug 1989 | A |
4963719 | Brooks et al. | Oct 1990 | A |
5382779 | Gupta | Jan 1995 | A |
5467433 | Lamprecht, Jr. et al. | Nov 1995 | A |
5621864 | Benade et al. | Apr 1997 | A |
5646389 | Bravman et al. | Jul 1997 | A |
5767498 | Heske, III et al. | Jun 1998 | A |
5805779 | Christopher et al. | Sep 1998 | A |
5837983 | Actis et al. | Nov 1998 | A |
5850080 | Herzig | Dec 1998 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5930215 | Fite et al. | Jul 1999 | A |
5974150 | Kaish et al. | Oct 1999 | A |
6069955 | Coppersmith et al. | May 2000 | A |
6122403 | Rhoads | Sep 2000 | A |
6134561 | Brandien et al. | Oct 2000 | A |
6212638 | Lee et al. | Apr 2001 | B1 |
6217966 | Finster et al. | Apr 2001 | B1 |
6226619 | Halperin et al. | May 2001 | B1 |
6260029 | Critelli | Jul 2001 | B1 |
6272634 | Tewfik et al. | Aug 2001 | B1 |
6371375 | Ackley et al. | Apr 2002 | B1 |
6442276 | Doljack | Aug 2002 | B1 |
6456729 | Moore | Sep 2002 | B1 |
6546729 | Hellat et al. | Apr 2003 | B2 |
6547137 | Begelfer et al. | Apr 2003 | B1 |
6712275 | Borg | Mar 2004 | B1 |
6725366 | Swanberg | Apr 2004 | B1 |
6832202 | Schuyler et al. | Dec 2004 | B1 |
6892947 | Jam et al. | May 2005 | B1 |
6963846 | Kelly et al. | Nov 2005 | B1 |
6996543 | Coppersmith et al. | Feb 2006 | B1 |
7028901 | Carlson | Apr 2006 | B2 |
7188258 | Aggarwal et al. | Mar 2007 | B1 |
7246748 | Feuerman et al. | Jul 2007 | B1 |
7267271 | Rhea | Sep 2007 | B2 |
7283630 | Doljack | Oct 2007 | B1 |
7497379 | Chen et al. | Mar 2009 | B2 |
7539868 | Balard et al. | May 2009 | B2 |
8037294 | Nochta | Oct 2011 | B2 |
8175578 | McCown et al. | May 2012 | B2 |
20010047340 | Snow et al. | Nov 2001 | A1 |
20020053796 | McCann et al. | May 2002 | A1 |
20020091593 | Fowler | Jul 2002 | A1 |
20020158133 | Conzola et al. | Oct 2002 | A1 |
20020158137 | Grey et al. | Oct 2002 | A1 |
20030042312 | Cato | Mar 2003 | A1 |
20030051767 | Coccaro et al. | Mar 2003 | A1 |
20030074223 | Hickle et al. | Apr 2003 | A1 |
20030126034 | Cheney et al. | Jul 2003 | A1 |
20040024790 | Everett | Feb 2004 | A1 |
20040084530 | McQueen et al. | May 2004 | A1 |
20040117265 | Hoffman | Jun 2004 | A1 |
20040140362 | Allen | Jul 2004 | A1 |
20040172260 | Junger et al. | Sep 2004 | A1 |
20040212480 | Carrender et al. | Oct 2004 | A1 |
20050006469 | Nonneman et al. | Jan 2005 | A1 |
20050019072 | Lin | Jan 2005 | A1 |
20050061878 | Barenburg | Mar 2005 | A1 |
20050097054 | Dillon | May 2005 | A1 |
20050108044 | Koster | May 2005 | A1 |
20050127176 | Dickinson et al. | Jun 2005 | A1 |
20050189255 | Safian | Sep 2005 | A1 |
20050234823 | Schimpf | Oct 2005 | A1 |
20050246237 | Hudetz et al. | Nov 2005 | A1 |
20050273369 | Ota et al. | Dec 2005 | A1 |
20050273434 | Lubow | Dec 2005 | A1 |
20050288938 | Date et al. | Dec 2005 | A1 |
20060011726 | Chen et al. | Jan 2006 | A1 |
20060080190 | Furukawa et al. | Apr 2006 | A1 |
20060091209 | He | May 2006 | A1 |
20060143180 | Peterson et al. | Jun 2006 | A1 |
20060144940 | Shannon et al. | Jul 2006 | A1 |
20070001006 | Schuessler et al. | Jan 2007 | A1 |
20070024449 | Bilyeu et al. | Feb 2007 | A1 |
20070051816 | Chu | Mar 2007 | A1 |
20070170241 | Grant | Jul 2007 | A1 |
20070203808 | Sekimoto et al. | Aug 2007 | A1 |
20080046263 | Sager et al. | Feb 2008 | A1 |
20080066167 | Andri | Mar 2008 | A1 |
20090014537 | Gelbman | Jan 2009 | A1 |
20090105866 | Fontanot | Apr 2009 | A1 |
20090159666 | O'Brien et al. | Jun 2009 | A1 |
20090230190 | Chanez et al. | Sep 2009 | A1 |
20090237253 | Neuwirth | Sep 2009 | A1 |
20090323967 | Peirce et al. | Dec 2009 | A1 |
20100258641 | Yu | Oct 2010 | A1 |
20110154046 | Fradet et al. | Jun 2011 | A1 |
20110265428 | Schmitz | Nov 2011 | A1 |
20120102334 | O'Loughlin et al. | Apr 2012 | A1 |
20120130868 | Loken | May 2012 | A1 |
20120215918 | Vasters et al. | Aug 2012 | A1 |
20120228388 | Kuo et al. | Sep 2012 | A1 |
20120254052 | Gao et al. | Oct 2012 | A1 |
20120280046 | Muirhead | Nov 2012 | A1 |
20120284505 | Smith et al. | Nov 2012 | A1 |
20120310848 | Gao et al. | Dec 2012 | A1 |
20120328180 | Dahari | Dec 2012 | A1 |
20120330913 | Devadhar | Dec 2012 | A1 |
20130004946 | Chesnut et al. | Jan 2013 | A1 |
20130099901 | Jones et al. | Apr 2013 | A1 |
20130166062 | Casey | Jun 2013 | A1 |
20130169409 | Chang et al. | Jul 2013 | A1 |
20130226326 | Yoshida et al. | Aug 2013 | A1 |
20130283156 | Al Badrashiny et al. | Oct 2013 | A1 |
20130297929 | Chaves et al. | Nov 2013 | A1 |
20140025594 | Schmitz | Jan 2014 | A1 |
20140046852 | Chatelain et al. | Feb 2014 | A1 |
20140122479 | Panferov et al. | May 2014 | A1 |
20140173685 | Bittles et al. | Jun 2014 | A1 |
20140173688 | Fischer et al. | Jun 2014 | A1 |
20140189362 | Van Den Broeck et al. | Jul 2014 | A1 |
20140343719 | Collombet | Nov 2014 | A1 |
20140351601 | Jozwiak | Nov 2014 | A1 |
20140358993 | Sugiyama | Dec 2014 | A1 |
20140367464 | Herzig | Dec 2014 | A1 |
20150242435 | He | Aug 2015 | A1 |
20150269559 | Inotay et al. | Sep 2015 | A1 |
20150310386 | Fradet et al. | Oct 2015 | A1 |
20150317644 | Chanez et al. | Nov 2015 | A1 |
20150332210 | Niquille et al. | Nov 2015 | A1 |
20160027021 | Kerdemelidis | Jan 2016 | A1 |
20160072626 | Kouladjie | Mar 2016 | A1 |
20160299685 | Zhai et al. | Oct 2016 | A1 |
20160307153 | Loken et al. | Oct 2016 | A1 |
20170109549 | Fradet et al. | Apr 2017 | A1 |
20180131520 | Brockhaus et al. | May 2018 | A1 |
Number | Date | Country |
---|---|---|
101354753 | Jan 2009 | CN |
101609626 | Dec 2009 | CN |
102054393 | May 2011 | CN |
102542215 | Jul 2012 | CN |
103530752 | Apr 2014 | CN |
103935568 | Jul 2014 | CN |
103943523 | Jul 2014 | CN |
104252670 | Dec 2014 | CN |
1 645 992 | Apr 2006 | EP |
2104067 | Sep 2009 | EP |
2172882 | Apr 2010 | EP |
2 900 486 | Nov 2007 | FR |
2342743 | Apr 2000 | GB |
H-05151381 | Jun 1993 | JP |
H07-156459 | Jun 1995 | JP |
H08-69247 | Mar 1996 | JP |
A-2001-328711 | Nov 2001 | JP |
A-2002-7970 | Jan 2002 | JP |
2003-104562 | Apr 2003 | JP |
2003208234 | Jul 2003 | JP |
2003233794 | Aug 2003 | JP |
2004320715 | Nov 2004 | JP |
2005-060080 | Mar 2005 | JP |
2005115890 | Apr 2005 | JP |
A-2005-200187 | Jul 2005 | JP |
A-2005-263472 | Sep 2005 | JP |
2005-316940 | Nov 2005 | JP |
2006229582 | Aug 2006 | JP |
2007-018355 | Jan 2007 | JP |
2007-528830 | Oct 2007 | JP |
2008-515741 | May 2008 | JP |
2009-151668 | Jul 2009 | JP |
100911762 | Aug 2009 | KR |
2199781 | Feb 2003 | RU |
2216776 | Nov 2003 | RU |
2225641 | Mar 2004 | RU |
WO-02073551 | Sep 2002 | WO |
WO-2005083644 | Sep 2005 | WO |
WO-2006038114 | Apr 2006 | WO |
WO-2010063909 | Jun 2010 | WO |
WO-2014122479 | Aug 2014 | WO |
Entry |
---|
Hartman, Lauren R., “Marking/coding versatility mets food labeling needs,” Packaging Digest, 35.n4, p. 36(4), UBM Canon LLC, Apr. 1998. |
“Best Compression algorithm for a sequence of integers”, Nov. 12, 2008, Stack Overflow. (XP-002697996). |
“Databases—No longer fit for purpose for Serialisation and Track & Trace”, 2012. |
Extended European Search Report in 15152959.1, dated Oct. 7, 2015, 4 pages. |
PCT Written Opinion of the International Searching Authority in PCT/EP2016/051853, dated Nov. 4, 2016, 11 pages. |
Extended European Search Report in 15153386.6, dated Oct. 16, 2015, 7 pages. |
PCT Written Opinion of the International Searching Authority in PCT/EP2016/052008, dated Jan. 30, 2015, 10 pages. |
PCT International Search Report in PCT/EP2016/072453, dated Dec. 5, 2016. |
PCT International Search Report in PCT/EP2016/069316, dated Oct. 26, 2016. |
PCT International Search Report in PCT/EP2016/070138, dated Dec. 7, 2016. |
PCT International Search Report in PCT/EP2016/070137, dated Nov. 14, 2016. |
Dodge et al., Codes of Life: Identification Codes and the Machine-Readable World, Dec. 2005, Environment and Planning D: Society and Space, vol. 23, pp. 851-881 (Year: 2005). |
China National Intellectual Property Administration Search Report for Application No. 201580033643.9, 2 pages, dated Jul. 25, 2019. |
Modi et al., “Securing the Manufacturing Environment using Biometrics”, Oct. 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, pp. 275-278 (Year 2005). |
In Japanese Patent Application No. 2017-540271, Notice of Reasons for Refusal, dated Nov. 28, 2019, 4pgs. |
Communication issued by the Chinese patent office dated Jan. 15, 2021 for the related application N° ZL201680007632.8. |
Number | Date | Country | |
---|---|---|---|
20180032951 A1 | Feb 2018 | US |