U.S. patent application number 12/041392 was filed with the patent office on 2008-07-03 for method and apparatus for capturing and decoding an image of a remotely located bar code.
This patent application is currently assigned to TRIPLETAIL VENTURES, INC.. Invention is credited to Leslie D. Baych, Bruce D. Melick, David M. Snyder, Paul R. Staman.
Application Number | 20080156879 12/041392 |
Document ID | / |
Family ID | 35374256 |
Filed Date | 2008-07-03 |
United States Patent
Application |
20080156879 |
Kind Code |
A1 |
Melick; Bruce D. ; et
al. |
July 3, 2008 |
METHOD AND APPARATUS FOR CAPTURING AND DECODING AN IMAGE OF A
REMOTELY LOCATED BAR CODE
Abstract
A method for remotely decoding a bar code includes capturing an
image of a bar code using a camera, transmitting the image of the
bar code across a network, receiving the image of the bar code at a
remote location on the network, reproducing the image of the bar
code at the remote location to provide a reproduced image of the
bar code, and scanning and decoding the reproduced image of the bar
code.
Inventors: |
Melick; Bruce D.; (Cedar
Rapids, IA) ; Snyder; David M.; (Cedar Rapids,
IA) ; Baych; Leslie D.; (Cedar Rapids, IA) ;
Staman; Paul R.; (Amana, IA) |
Correspondence
Address: |
MCKEE, VOORHEES & SEASE, P.L.C.
801 GRAND AVENUE, SUITE 3200
DES MOINES
IA
50309-2721
US
|
Assignee: |
TRIPLETAIL VENTURES, INC.
CEDAR RAPIDS
IA
|
Family ID: |
35374256 |
Appl. No.: |
12/041392 |
Filed: |
March 3, 2008 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
11564333 |
Nov 29, 2006 |
7337971 |
|
|
12041392 |
|
|
|
|
11131853 |
May 18, 2005 |
7150400 |
|
|
11564333 |
|
|
|
|
60572140 |
May 18, 2004 |
|
|
|
Current U.S.
Class: |
235/462.41 |
Current CPC
Class: |
G06K 17/00 20130101;
G06K 7/1095 20130101 |
Class at
Publication: |
235/462.41 |
International
Class: |
G06K 7/10 20060101
G06K007/10 |
Claims
1. A method for remotely decoding a machine readable code for
security purposes, comprising: sending information displayed as a
secure machine readable code; capturing an image of the machine
readable code using a camera; transmitting the image of the machine
readable code across a network; receiving the image of the machine
readable code at a remote location on the network; reproducing the
image of the machine readable code on a video display at the remote
location to provide a reproduced image of the machine readable
code; scanning and decoding the reproduced image of the machine
readable code from the video display using a machine readable code
reader to provide information; and verifying the information
extracted from the reproduced image of the machine readable code
matches the security information.
2. The method of claim 1 wherein the camera is selected from the
set consisting of a phone camera, a security camera, a camcorder, a
digital camera, a web camera, and a television camera.
3. The method of claim 1 wherein transmitting the image of the
machine readable code across a network is encrypted.
4. The method of claim 1 wherein the machine readable code is
proprietary.
5. The method of claim 1 wherein the machine readable code is a
tagged machine readable code.
6. The method of claim 5 wherein the machine readable code is
tagged using XML.
7. The method of claim 1 wherein the video display at the remote
location is selected from the set consisting of a television, a
laptop screen, a tablet, a PDA, a PC monitor, an ATM display, a
cash register display, a digital TV screen, a CRT computer monitor,
a liquid crystal display (LCD), and a CRT TV screen.
8. The method of claim 1 wherein the scanning and decoding is
performed using a device selected from the set consisting of a high
scan rate CCD, and an imager.
9. The method of claim 1 wherein the scanning and decoding is
performed using a software solution executing on a computing
device.
10. The method of claim 1 wherein the scanning and decoding is
performed using a machine readable code scanner integrated into a
device selected from the set consisting of a cell phone, a land
line phone, a PDA, a computer mouse, a GPS receiver, a pager, a
two-way communication device, and a fob.
11. The method of claim 1 wherein the source of the image of a
machine readable code is selected from a set consisting of a
printed machine readable code, and a video displayed machine
readable code.
12. The method of claim 14 wherein the source of the image of a
machine readable code is selected from the set consisting of an
identification card, a badge, a ticket, an electronic document, a
electronic document with fill-in-fields, an e-mail, a form, a
webpage, a spreadsheet, a student record, a student report card, an
invoice, a purchase order, a repair order, a warranty, a
prescription, a patient record, and a prisoner's record.
13. The method of claim 1 wherein the method of securing the
information displayed in the machine readable code is selected from
the set consisting of a hash, a biometric, and a PIN.
14. The method of claim 1 wherein the machine readable code
comprises a human readable text portion and machine readable
machine readable code portion.
15. The method of claim 14 wherein the human readable text portion
does not match the machine readable machine readable code portion
to provide increased security.
16. The method of claim 1 wherein the video display at the remote
location is a cell phone.
17. The method of claim 15 wherein the cell phone is verified using
an electronic identification code of the cell phone selected from
the set consisting of an electronic signature number, a mobile
identification number, and a system identification code.
18. The method of claim 1 wherein the step of verifying is
performed using a computer running software that verifies
information derived from the remote machine readable code matches
security information stored in the computer.
19. The method of claim 1 further comprising granting physical
access to a secured site after the step of verifying.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a Continuation Application of U.S. Ser.
No. 11/564,333 filed Nov. 29, 2006, which is a Continuation
Application of U.S. Ser. No. 11/131,853 filed May 18, 2005, which
claims priority to U.S. Provisional Application, Ser. No.
60/572,140 filed May 18, 2004, herein incorporated by
reference.
BACKGROUND OF THE INVENTION
[0002] 1. Field of the Invention
[0003] This invention relates generally to bar code technology, and
more particularly to a method and apparatus for capturing a
remotely located bar code using a phone camera, security camera,
web camera, etc., displaying the captured image on a video display
or other media, and scanning and decoding the image of the bar code
for use in a variety of applications.
[0004] 2. Problems in the Art
[0005] The use of bar code technology has proliferated as a means
for efficient data collection. Generally, bar code technology
allows for numbers, characters, or other symbols to be coded into a
series of one-dimensional (1D) or two-dimensional (2D) spaced bars,
as those terms are commonly known in the art. Currently a bar code
scanner is used to capture the bar code pattern on the object,
associated software decodes the bar code pattern, and the
information from the decoded bar code pattern may be used as data
and acted upon accordingly
[0006] However, there are currently no known easy means for
capturing the image of a remotely located video or printed bar code
using a phone camera, web camera, security camera, etc.,
transmitting the image of a remotely located bar code over a
network, displaying the remotely located bar code on a video
display or printing the remotely located bar code, and scanning and
decoding the remotely located bar code directly from the video
display or off a printed media.
[0007] There is therefore an unfilled need for a method and
apparatus which solves this and other problems.
SUMMARY OF THE INVENTION
[0008] Thus, it is a primary object, feature, or advantage of the
present invention to provide a method and apparatus for bar code
data interchange which overcomes the problems found in the prior
art.
[0009] A further object, feature, or advantage of the present
invention is to provide a method and apparatus for capturing a
remotely located bar code with a security camera.
[0010] A still further object, feature, or advantage of the present
invention is to provide a method and apparatus for capturing a
remotely located bar code with a web camera.
[0011] Another object, feature, or advantage of the present
invention is to provide a method and apparatus for capturing a
remotely located bar code with a phone camera.
[0012] Yet another object, feature, or advantage of the present
invention is to provide a method and apparatus for capturing a
remotely located bar code with a digital camera connected to a
network.
[0013] A further object, feature, or advantage of the present
invention is to provide a method and apparatus for capturing a
remotely located bar code with a camcorder connected to a
network.
[0014] A still further object, feature, or advantage of the present
invention is to provide a method to scan and decode a bar code
directly from a video display of the remotely displayed bar
code.
[0015] A further object, feature, or advantage of the present
invention is to provide a method to scan and decode a bar code from
a printed image of the remotely displayed bar code.
[0016] One or more of these and/or other objects, features or
advantages of the present invention will become apparent from the
following specification and claims.
[0017] According to one aspect of the invention a method for
remotely decoding a bar code is provided. The method includes
capturing an image of a bar code using a camera, transmitting the
image of the bar code across a network, receiving the image of the
bar code at a remote location on the network, reproducing the image
of the bar code at the remote location to provide a reproduced
image of the bar code, and scanning and decoding the reproduced
image of the bar code. The step of reproducing can be on a display
or on printed material. The method may further include sending
security information (such as hash) to be displayed as a bar code
and verifying that information extracted from the reproduced image
of the bar code matches the security information.
[0018] According to another aspect of the invention, an apparatus
for providing security via remote bar codes is provided. The
apparatus includes a camera adapted for imaging a bar code, a
computer remotely located from the camera, a network operatively
connected between the camera and the computer, and a bar code
reader operatively connected to the computer and adapted for
scanning and decoding a reproduction of the bar code. The bar code
reader can be implemented completely in software. There is software
executing on the computer which is adapted for verifying that
information obtained from the reproduction of the bar code matches
stored information.
BRIEF DESCRIPTION OF THE DRAWINGS
[0019] FIG. 1 is a diagram illustrating the basic components of the
present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0020] The present invention is directed to a method and apparatus
for bar code data interchange. In a preferred embodiment, a user
will capture an image of a remotely located video or printed bar
code through the use of a device such as, but not limited to, a
security camera, web camera, phone camera, etc. The image of the
remotely located bar code is transmitted over a hard-wired or
wireless network, such as a LAN, WAN, PSTN, the Internet, cell
phone or other wireless network, to a device such as, but not
limited to a PC, cell phone, tablet, PDA, laptop, etc. The image of
the remotely located bar code can be printed for scanning and
decoding by a standard bar code reader, or alternatively can be
scanned and decoded using a high scan rate CCD or linear imager
directly from any video display such as, but not limited to, a
television, laptop screen, tablet, PDA, cell phone, PC monitor, ATM
display, cash register display, etc.
Printed Bar Codes
[0021] Printed bar codes are well known in the art, and are a
proven, efficient means for data collection. A bar code is a coded
image of bars and spaces, which can be used to represent numbers
and other symbols. Printed bar codes can be 1Dimension (1D), or
2Dimension (2D). Common standardized 1D bar code formats include,
but are not limited to, Code 39, Code 128, and Interleaved 2 of 5.
A common standardized 2D bar code format includes, but is not
limited to, PDF 417. There are also various proprietary 1D and 2D
bar code formats. A bar code reader is used to read the printed bar
code, and translates the image of the bar code into digital
data.
Video Bar Codes
[0022] In addition to the use of printed bar codes as described in
the present invention, bar codes may be captured directly from a
video display, such as, but not limited to a PC monitor, PDA
display, TV screen, digital camera, etc. Video bar codes are
described in US Patent Published Application No. 2002/0195495 to
Melick, et al, entitled METHOD AND APPARATUS FOR BAR CODE DATA
INTERCHANGE, and is herein incorporated by reference.
[0023] Video bar codes are an efficient means for data collection
and can be 1Dimension (1D), or 2Dimension (2D). Common standardized
1D bar code formats that have been successfully read off a video
display include, but are not limited to, Code 39, Code 128, and
Interleaved 2 of 5. A common standardized 2D bar code format that
has been successfully read off of a vide display includes, but is
not limited to, PDF 417. A high scan rate CCD or linear imager bar
code reader is used to read the video bar code, and translates the
image of the bar code into digital data. One significant advantage
of a video bar code is that is dynamic and can be changed.
[0024] The following is a list of various 1D and 2D printed bar
codes that are commonly used in the world today that can also be
read as a video bar code. This list includes, but is not limited
to, Code 39 extended, Danish PTT 39 Bar code, French Postal 39 A/R,
German Postal Bar code Identcode 11, German Postal Bar code
Leitcode 13, 2 of 5 Industrial, 2 of 5 Matrix Plessey, Codabar, MSI
Plessey, MSI Plessey+CHK10, MSI Plessey+CHK10+CHK10, MSI
Plessey+CHK11+CHK10, 2 of 5 IATA, 2 of 5 Datalogic, Code 39
Reduced, USPS tray label, USPS sack label, Code32, Codabar
Rationalised, MSI Plessey+CHK11, OMR, Code 93, Code 93 extended,
128 A, 128 B, 128 C, UCC-128, EAN/JAN-8, EAN/JAN-8+2, EAN/JAN-8+5,
EAN/JAN-13, EAN/JAN-13+2, EAN/JAN-13+5, UPC-A, UPC-A+2, UPC-A+5,
UPC-E, UPC-E+2, UPC-E+5, Oce UNICODE, 128 utoswitch, EAN 128, ISBN,
ISSN, Swiss Postal, Code11, UPS Standard (18 digits), UPS 18
digits, UPS Standard (11 digits), UPS 11 digits, 128 X (Free Type),
Telepen, PDF-417, PDF-417 (HP Mode), MicroPDF417, Royal Mail
4-State Customer Code, Dutch 4-State Postal, Singapore Post 4-State
Postal Code, Australia Post 4-State Postal Code, Japan Post 4-State
Postal Code, Australia Post 4-State Postal Code 37,52,67, Australia
4-state postal 37-CUST (HP Mode), Australia 4-state postal
52-FF-MET (HP Mode), Australia 4-state postal 67-FF-MET (HP Mode),
Australia 4-state postal FCC-45 REPLY (HP Mode), Singapore Post
4-State Postal Code (HP Mode), DataMatrix, MaxiCode, MaxiCode (HP
Mode), USPS FIM, POSTNET 5 ZIP+4, POSTNET 9 ZIP+4, POSTNET 11 DPC,
PLANET, Aztec, Aztec Mesas, QR Code, Code 49, Channel Code, Code
One, SuperCode, RSS, EAN/UCC Composite Symbology, Codablock F, Dot
Code A, Code16K. There are also other various proprietary 1D and 2D
bar code formats that can be read as a video bar code.
Remote Bar Code Security
[0025] In order to provide an additional layer of security against
fraud, the remote machine readable bar code and the human readable
text that normally accompanies a machine readable bar code, which
reflects the machine readable bar code, can deliberately be
different. For example, the machine readable remote bar code might
represent the alpha-numeric characters 1589AA, however the remote
human readable alpha-numeric text associated with a particular
remote machine readable bar code might intentionally read 1255BB on
an identification card or badge, a ticket, etc. If the remote bar
code was fraudulently created, it is likely the frauds would not
check to see if the remote machine readable bar code matched the
associated human readable alpha-numeric text. This is a low level
of security that can be employed in the present invention. The
remote bar codes' machine readable and associated human readable
alpha-numeric text would be stored in a database, and when a
security agent was viewing a remote machine readable bar code and
corresponding human readable alpha-numeric text, both the scan of
the remote machine readable bar code and the remote human readable
alpha-numeric text would have to match what was stored in the
database in order to gain entrance into a secure area, as an
example.
[0026] Furthermore, a remote bar code can be made more secure when
it is printed with a thermochromic ink, available from companies
such as, but not limited to, Standard Register. Thermochromic ink
changes color or disappears when warmed and returns back to the
original color upon cooling, thus making it impossible to copy
using photocopiers. Thermochromic ink bar codes are also difficult
to counterfeit and can be authenticated at the point of audit
without the need of specialized equipment. A remote bar code can be
printed using a standard ink and a disappearing thermochromic ink
in order to cause the remote bar code to morph into another image.
The morphed bar code would translate into a different
identification number and would alert auditors of potential fraud
related to a specific high value asset. Thermochromic inks used in
conjunction with remote bar codes and associated human readable
alpha-numeric text are an effective deterrent to fraud.
[0027] In addition to a visible remote bar code, a separate
invisible remote bar code can be printed on an identification
badge. As an example, PhotoSecure, Inc. manufactures
photoluminescent inks (SmartDYE.TM.) and related scanners.
Fluorescing inks are invisible to the naked eye and provide a
moderate amount of protection against copying. By mixing
SmartDYE.TM. components, PhotoSecure can customize each ink batch,
if necessary, to have unique fluorescing characteristics. These
include the specific frequency of light needed to activate them,
the manner in which their fluorescence fades when the photo
stimulus is removed, the exact color of the fluorescence, and other
properties which can be detected and measured by their scanners.
PhotoSecure's scanners are equipped with a strobe light source, a
CCD image sensor, and solid-state memory for recording both the
response profile of each authentic secure remote bar code and any
encoded data the remote bar code may contain.
[0028] Alternatively, an identification tag or badge, ticket, etc.,
may also include a digital watermark to provide another method of
security for use with the present invention. Digimarc Corporation's
digital watermark technology embeds a special message in an image
by making subtle, imperceptible changes to the original data
content of an image. A digital watermark on a remote bar code that
has been fraudulently copied can be detected using a proprietary
scanner.
Tagged Bar Codes
[0029] Remote bar codes, whether they are printed or scanned from a
video display, can be tagged with data tags, which are useful for
describing the data and interchanging the data with a back-end
system. Tagged bar codes are described in U.S. Pat. No. 6,764,009,
filed May 30, 2002, entitled METHOD FOR TAGGED BAR CODE DATA
INTERCHANGE, U.S. Published Application No. 2003/0009350, filed May
30, 2004, entitled METHOD FOR TAGGED BAR CODE DATA INTERCHANGE, and
U.S. Published Application No. 2004/0206820, filed May 18, 2004,
entitled METHOD FOR TAGGED BAR CODE DATA INTERCHANGE, all of which
are herein incorporated by reference.
[0030] Such disclosure explains that a bar code may be tagged using
XML. Such disclosure also identifies additional types of video
displays including a digital TV screen, a CRT computer monitor, a
liquid crystal display (LCD), and a CRT TV screen. Such disclosure
also indicates that the bar code scanner may be integrated into
devices such as a cell phone, a land line phone, a PDA, a computer
mouse, a GPS receiver, a pager, a two-way communication device, and
a fob. Such disclosure further indicates that a bar code may be a
part of an electronic document with fill-in-fields, email, web
page, spreadsheet, student record, student report card, invoice,
purchase order, repair order, warranty prescription, patient
record, and a prisoner's record.
[0031] A more complete understanding of the method and apparatus
for remotely viewed bar code data interchange will be afforded to
those skilled in the art, as well as a realization of the
additional features and advantages thereof, by a consideration of
the following detailed description of the preferred embodiment.
Reference will be made to the appended sheets of drawings which
will first be described briefly.
[0032] FIG. 1 illustrates the basic components of the present
invention. Bar code 101, which is encoded with the data "123ABC",
is shown at a remote location. Bar code 101 may be either a printed
or video bar code. Camera 102 in a remote location is used to
capture an image of bar code 101. A security camera is shown, but
could alternatively be a device such as, but not limited to a phone
camera, web camera, television camera, camcorder, digital camera,
etc.
[0033] Another example of a video camera system that can be used is
the BGR Privacam System available from KpN. This is an example of
an encrypted video system. A digital camera takes recorded images
and divides them into a series of discrete information stream.
These data streams are separated and sent to several different
authorized recipients. This prevents unauthorized parties from
intercepting video image transmission.
[0034] Camera 102 is operatively connected via connection 103 to
network cloud 104. Connection 103 can be either a wireless or
hard-wired connection. The network cloud 104 can be a personal area
network (PAN), a local area network (LAN), wide area network (WAN),
the public switched network (PSTN), a virtual private network
(VPN), the Internet, a wireless network, a cell phone network, or
any combination of the above.
[0035] The image of bar code 101 captured by camera 102 and
transmitted via connection 103 over the network cloud 104 is
received and processed for viewing by PC 106. A PC is shown, but
alternatively could be a device such as, but not limited to a PDA,
laptop PC, tablet, TV monitor, cell phone, etc. Generally, such a
device is referred to as a computer.
[0036] Bar code scanner 105 is shown scanning the image of remote
bar code 101. A high scan rate CCD or linear imager that is capable
of reading a 1D or 2d video bar code is the Intermec ScanPlus.TM.
1800. This same scanner can also be used to read a 1D or 2D printed
bar code.
[0037] Alternatively, the image of remote bar code 101 can be
printed and read with any type of laser, CCD, or linear imager type
bar code reader.
[0038] The following is a practical example of the present
invention being used to gain access to a secure area in an
airport.
[0039] In this example, bar code 101 is a video bar code being
displayed on a cell phone or PDA at a remote location. A video bar
code is dynamic and can be changed according to software
instructions from an application running on the device displaying
the video bar code, or from a back-end server, or PC connected via
a hard-wired or wireless connection to a device operating in a
remote location that is displaying a bar code 101 for capture by
camera 102.
[0040] As an example, a worker trying to gain entrance into a
secure area in an airport would approach a remote gate and make an
entrance request via a land-line phone at the gate to the secured
area. A security agent sitting at a remote location would answer
the land-line phone. The worker trying to gain access to the secure
area would be asked to enter their PIN number using the land-line
phone at the gate of the secured area. A back-end software
application or database would receive the PIN via a
computer-telephone interface card to drive a hash algorithm. The
resultant of the hash algorithm would be sent to the worker's cell
phone and displayed as a bar code.
[0041] The security agent sitting at a remote location would scan
the image of the video bar code that had just been sent to the
worker's cell phone off of the PC screen. If the scan of the video
bar code matched the resultant of the hash algorithm in the
back-end database the security agent could unlock the gate into the
secure area for the worker.
[0042] Additionally, another level of security would be available
using the cell phone electronic identification codes associated
with any cell phone. This includes the following numbers which are
routinely transmitted over the control channel of the cell phone,
1) the electronic signature number (ESN) a 32 bit number programmed
into the phone when its manufactured, 2) the mobile identification
number (MIN) which is the 10 digit telephone number associated with
the cell phone which is programmed into the phone at time of
purchase, and 3) the system identification code (SID) which is a
unique 5-digit number assigned to each carrier by the FCC and is
also activated at the time of purchase. Any or all of these numbers
could be queried and compared to the ones maintained in the
database maintained by the airport security office in this example,
or alternatively, this information could be checked in the
background by the wireless carrier, or a third party.
[0043] Additionally, biometric security could be used in order as
an additional level of security.
[0044] One skilled in the art will instantly recognize that this
example is representative of many different applications for the
viewing of a remote displayed printed or video bar code.
[0045] Having thus described a preferred embodiment and other
embodiments of a method and apparatus for viewing of a remotely
displayed printed or video bar code, and the scanning of a
transmitted image of the remotely displayed bar code it should be
apparent to those skilled in the art that certain advantages of the
present invention have been achieved. It should also be appreciated
that various modifications, adaptations, and alternatives may be
made. It is of course not possible to describe every conceivable
combination of components for purposes of describing the present
invention. All such possible modifications are to be included
within the spirit and scope of the present invention which is to be
limited only by the following claims.
* * * * *