Proprietary HD Barcode Ideal for Brand Protection, Anti-Counterfeiting and Authentication

April 11, 2015
Instantly determine authenticity of printed packages, materials, or products by incorporating a patented, proprietary HD Barcode into the manufacturing process.

Instantly determine authenticity of printed packages, materials, or products by incorporating a patented, proprietary HD Barcode into the manufacturing process.

When comparing methodologies for security, HD Barcode is unlike other expensive authentication methods in its ability to embed large amounts of data, including 58,000 times more than UPC Codes or 175 times more than QR Barcodes, all contained within a small, configurable 2D barcode. This can incorporate changing the barcode as required to indicate, (1) the location and type of other variable covert data printed on the label or product, (2) matching embedded code information to visible lot numbers or unique symbols, (3) indicate where the product should be sold or distributed and (4) provide information via “voice output” with an authorized Smartphone application. HD Barcode can also embed or link to a proprietary application on the Smartphone allowing display of full color product images that can only be shown when the code is read.

In addition to text information, images of covert or overt security features can be incorporated to allow an individual to compare features indicated within the authentic product to security features within the image and provide positive authentication- without use of a database or Internet connection. Since it is a barcode, there are no major add-on costs for additional security features, databases, or manufacturing equipment, etc. to place security labels on the package. Multiple codes can be placed in areas of the product that are hard to remove. These HD Barcodes may contain different information and require a different reader and password to display security label information.

HD Barcode is unlike other public 2D Barcodes, as each manufacturer is assigned a unique identifier number, which only they and authorized personnel can use. Manufacturers are provided “code generation" software that is kept separate from readers for printing the HD Barcodes. When creating the codes, the manufacturer generates an “undisclosed password” which is proprietary to only them. The manufacturer installs a reader application on an authorized Smartphone, so that when this undisclosed password is detected, it will display the information in the HD Barcode, but not the undisclosed password itself. The manufacturers may have unlimited passwords for different users. There is no “back door” and reader software can be time stamped so only authorized personnel can read the information within the code for a specific time frame. The code's structure does not follow a set pattern for an individual to be able to decode an HD Barcod. As a final security measure, authorized personnel can be issued an ID card with a separate HD Barcode that must be scanned before the application is activated and usable, thus preventing reader devices from being compromised in the event they are lost or stolen.

>> For more information about this product, click  here

Sponsored Recommendations

Put the Plant Floor in Your Pocket with Ignition Perspective

Build mobile-responsive HTML applications that run natively on any screen.

Ignition: Industrial-Strength System Security and Stability

Ignition is built on a solid, unified architecture and proven, industrial-grade security technology, which is why industrial organizations all over the world have been trusting...

Iron Foundry Gains Competitive Edge & Increases Efficiency with Innovative Technology

With help from Artek, Ferroloy implemented Ignition to digitally transform their disconnected foundry through efficient data collection and analysis while integrating the new ...

Empowering Data Center Growth: Leveraging Ignition for Scalability and Efficiency

Data center growth has exploded over the past decade. Initially driven by organizations moving their computer assets to the cloud, this trend has only accelerated. With the rise...