Method and apparatus for capturing and decoding an image of a remotely located bar code

ABSTRACT

A method for remotely decoding a bar code includes capturing an image of a bar code using a camera, transmitting the image of the bar code across a network, receiving the image of the bar code at a remote location on the network, reproducing the image of the bar code at the remote location to provide a reproduced image of the bar code, and scanning and decoding the reproduced image of the bar code.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation Application of U.S. Ser. No. 11/131,853 filed May 18, 2005 now U.S. Pat. No. 7,150,400, which claims priority to U.S. Provisional Application, Ser. No. 60/572,140 filed May 18, 2004, herein incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates generally to bar code technology, and more particularly to a method and apparatus for capturing a remotely located bar code using a phone camera, security camera, web camera, etc., displaying the captured image on a video display or other media, and scanning and decoding the image of the bar code for use in a variety of applications.

2. Problems in the Art

The use of bar code technology has proliferated as a means for efficient data collection. Generally, bar code technology allows for numbers, characters, or other symbols to be coded into a series of one-dimensional (1D) or two-dimensional (2D) spaced bars, as those terms are commonly known in the art. Currently a bar code scanner is used to capture the bar code pattern on the object, associated software decodes the bar code pattern, and the information from the decoded bar code pattern may be used as data and acted upon accordingly

However, there are currently no known easy means for capturing the image of a remotely located video or printed bar code using a phone camera, web camera, security camera, etc., transmitting the image of a remotely located bar code over a network, displaying the remotely located bar code on a video display or printing the remotely located bar code, and scanning and decoding the remotely located bar code directly from the video display or off a printed media.

There is therefore an unfilled need for a method and apparatus which solves this and other problems.

SUMMARY OF THE INVENTION

Thus, it is a primary object, feature, or advantage of the present invention to provide a method and apparatus for bar code data interchange which overcomes the problems found in the prior art.

A further object, feature, or advantage of the present invention is to provide a method and apparatus for capturing a remotely located bar code with a security camera.

A still further object, feature, or advantage of the present invention is to provide a method and apparatus for capturing a remotely located bar code with a web camera.

Another object, feature, or advantage of the present invention is to provide a method and apparatus for capturing a remotely located bar code with a phone camera.

Yet another object, feature, or advantage of the present invention is to provide a method and apparatus for capturing a remotely located bar code with a digital camera connected to a network.

A further object, feature, or advantage of the present invention is to provide a method and apparatus for capturing a remotely located bar code with a camcorder connected to a network.

A still further object, feature, or advantage of the present invention is to provide a method to scan and decode a bar code directly from a video display of the remotely displayed bar code.

A further object, feature, or advantage of the present invention is to provide a method to scan and decode a bar code from a printed image of the remotely displayed bar code.

One or more of these and/or other objects, features or advantages of the present invention will become apparent from the following specification and claims.

According to one aspect of the invention a method for remotely decoding a bar code is provided. The method includes capturing an image of a bar code using a camera, transmitting the image of the bar code across a network, receiving the image of the bar code at a remote location on the network, reproducing the image of the bar code at the remote location to provide a reproduced image of the bar code, and scanning and decoding the reproduced image of the bar code. The step of reproducing can be on a display or on printed material. The method may further include sending security information (such as hash) to be displayed as a bar code and verfying that information extracted from the reproduced image of the bar code matches the security information.

According to another aspect of the invention, an apparatus for providing security via remote bar codes is provided. The apparatus includes a camera adapted for imaging a bar code, a computer remotely located from the camera, a network operatively connected between the camera and the computer, and a bar code reader operatively connected to the computer and adapted for scanning and decoding a reproduction of the bar code. The bar code reader can be implemented completely in software. There is software executing on the computer which is adapted for verifying that information obtained from the reproduction of the bar code matches stored information.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram illustrating the basic components of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The present invention is directed to a method and apparatus for bar code data interchange. In a preferred embodiment, a user will capture an image of a remotely located video or printed bar code through the use of a device such as, but not limited to, a security camera, web camera, phone camera, etc. The image of the remotely located bar code is transmitted over a hard-wired or wireless network, such as a LAN, WAN, PSTN, the Internet, cell phone or other wireless network, to a device such as, but not limited to a PC, cell phone, tablet, PDA, laptop, etc. The image of the remotely located bar code can be printed for scanning and decoding by a standard bar code reader, or alternatively can be scanned and decoded using a high scan rate CCD or linear imager directly from any video display such as, but not limited to, a television, laptop screen, tablet, PDA, cell phone, PC monitor, ATM display, cash register display, etc.

Printed Bar Codes

Printed bar codes are well known in the art, and are a proven, efficient means for data collection. A bar code is a coded image of bars and spaces, which can be used to represent numbers and other symbols. Printed bar codes can be 1Dimension (1D), or 2Dimension (2D). Common standardized 1D bar code formats include, but are not limited to, Code 39, Code 128, and Interleaved 2 of 5. A common standardized 2D bar code format includes, but is not limited to, PDF 417. There are also various proprietary 1D and 2D bar code formats. A bar code reader is used to read the printed bar code, and translates the image of the bar code into digital data.

Video Bar Codes

In addition to the use of printed bar codes as described in the present invention, bar codes may be captured directly from a video display, such as, but not limited to a PC monitor, PDA display, TV screen, digital camera, etc. Video bar codes are described in US Patent Published Application No. 2002/0195495 to Melick, et al, entitled METHOD AND APPARATUS FOR BAR CODE DATA INTERCHANGE, and is herein incorporated by reference.

Video bar codes are an efficient means for data collection and can be 1Dimension (1D), or 2Dimension (2D). Common standardized 1D bar code formats that have been successfully read off a video display include, but are not limited to, Code 39, Code 128, and Interleaved 2 of 5. A common standardized 2D bar code format that has been successfully read off of a vide display includes, but is not limited to, PDF 417. A high scan rate CCD or linear imager bar code reader is used to read the video bar code, and translates the image of the bar code into digital data. One significant advantage of a video bar code is that is dynamic and can be changed.

The following is a list of various 1D and 2D printed bar codes that are commonly used in the world today that can also be read as a video bar code. This list includes, but is not limited to, Code 39 extended, Danish PTT 39 Bar code, French Postal 39 A/R, German Postal Bar code Identcode 11, German Postal Bar code Leitcode 13, 2 of 5 Industrial, 2 of 5 Matrix Plessey, Codabar, MSI Plessey, MSI Plessey+CHK10, MSI Plessey+CHK10+CHK10, MSI Plessey+CHK11+CHK10, 2 of 5 IATA, 2 of 5 Datalogic, Code 39 Reduced, USPS tray label, USPS sack label, Code32, Codabar Rationalised, MSI Plessey+CHK11, OMR, Code 93, Code 93 extended, 128 A, 128 B, 128 C, UCC-128, EAN/JAN-8, EAN/JAN-8+2, EAN/JAN-8+5, EAN/JAN-13, EAN/JAN-13+2, EAN/JAN-13+5, UPC-A, UPC-A+2, UPC-A+5, UPC-E, UPC-E+2, UPC-E+5, Océ UNICODE, 128 utoswitch, EAN 128, ISBN, ISSN, Swiss Postal, Code11, UPS Standard (18 digits), UPS 18 digits, UPS Standard (11 digits), UPS 11 digits, 128× (Free Type), Telepen, PDF-417, PDF-417 (HP Mode), MicroPDF417, Royal Mail 4-State Customer Code, Dutch 4-State Postal, Singapore Post 4-State Postal Code, Australia Post 4-State Postal Code, Japan Post 4-State Postal Code, Australia Post 4-State Postal Code 37, 52, 67, Australia 4-state postal 37-CUST (HP Mode), Australia 4-state postal 52-FF-MET (HP Mode), Australia 4-state postal 67-FF-MET (HP Mode), Australia 4-state postal FCC-45 REPLY (HP Mode), Singapore Post 4-State Postal Code (HP Mode), DataMatrix, MaxiCode, MaxiCode (HP Mode), USPS FIM, POSTNET 5 ZIP+4, POSTNET 9 ZIP+4, POSTNET 11 DPC, PLANET, Aztec, Aztec Mesas, QR Code, Code 49, Channel Code, Code One, SuperCode, RSS, EAN/UCC Composite Symbology, Codablock F, Dot Code A, Code16K. There are also other various proprietary 1D and 2D bar code formats that can be read as a video bar code.

Remote Bar Code Security

In order to provide an additional layer of security against fraud, the remote machine readable bar code and the human readable text that normally accompanies a machine readable bar code, which reflects the machine readable bar code, can deliberately be different. For example, the machine readable remote bar code might represent the alpha-numeric characters 1589AA, however the remote human readable alpha-numeric text associated with a particular remote machine readable bar code might intentionally read 1255BB on an identification card or badge, a ticket, etc. If the remote bar code was fraudulently created, it is likely the frauds would not check to see if the remote machine readable bar code matched the associated human readable alpha-numeric text. This is a low level of security that can be employed in the present invention. The remote bar codes' machine readable and associated human readable alpha-numeric text would be stored in a database, and when a security agent was viewing a remote machine readable bar code and corresponding human readable alpha-numeric text, both the scan of the remote machine readable bar code and the remote human readable alpha-numeric text would have to match what was stored in the database in order to gain entrance into a secure area, as an example.

Furthermore, a remote bar code can be made more secure when it is printed with a thermochromic ink, available from companies such as, but not limited to, Standard Register. Thermochromic ink changes color or disappears when warmed and returns back to the original color upon cooling, thus making it impossible to copy using photocopiers. Thermochromic ink bar codes are also difficult to counterfeit and can be authenticated at the point of audit without the need of specialized equipment. A remote bar code can be printed using a standard ink and a disappearing thermochromic ink in order to cause the remote bar code to morph into another image. The morphed bar code would translate into a different identification number and would alert auditors of potential fraud related to a specific high value asset. Thermochromic inks used in conjunction with remote bar codes and associated human readable alpha-numeric text are an effective deterrent to fraud.

In addition to a visible remote bar code, a separate invisible remote bar code can be printed on an identification badge. As an example, PhotoSecure, Inc. manufactures photoluminescent inks (SmartDYE™) and related scanners. Fluorescing inks are invisible to the naked eye and provide a moderate amount of protection against copying. By mixing SmartDYE™ components, PhotoSecure can customize each ink batch, if necessary, to have unique fluorescing characteristics. These include the specific frequency of light needed to activate them, the manner in which their fluorescence fades when the photo stimulus is removed, the exact color of the fluorescence, and other properties which can be detected and measured by their scanners. PhotoSecure's scanners are equipped with a strobe light source, a CCD image sensor, and solid-state memory for recording both the response profile of each authentic secure remote bar code and any encoded data the remote bar code may contain.

Alternatively, an identification tag or badge, ticket, etc., may also include a digital watermark to provide another method of security for use with the present invention. Digimarc Corporation's digital watermark technology embeds a special message in an image by making subtle, imperceptible changes to the original data content of an image. A digital watermark on a remote bar code that has been fraudulently copied can be detected using a proprietary scanner.

Tagged Bar Codes

Remote bar codes, whether they are printed or scanned from a video display, can be tagged with data tags, which are useful for describing the data and interchanging the data with a back-end system. Tagged bar codes are described in U.S. Pat. No. 6,764,009, filed May 30, 2002, entitled METHOD FOR TAGGED BAR CODE DATA INTERCHANGE, U.S. Published Application No. 2003/0009350, filed May 30, 2004, entitled METHOD FOR TAGGED BAR CODE DATA INTERCHANGE, and U.S. Published Application No. 2004/0206820, filed May 18, 2004, entitled METHOD FOR TAGGED BAR CODE DATA INTERCHANGE, all of which are herein incorporated by reference.

Such disclosure explains that a bar code may be tagged using XML. Such disclosure also identifies additional types of video displays including a digital TV screen, a CRT computer monitor, a liquid crystal display (LCD), and a CRT TV screen. Such disclosure also indicates that the bar code scanner may be integrated into devices such as a cell phone, a land line phone, a PDA, a computer mouse, a GPS receiver, a pager, a two-way communication device, and a fob. Such disclosure further indicates that a bar code may be a part of an electronic document with fill-in-fields, email, web page, spreadsheet, student record, student report card, invoice, purchase order, repair order, warranty prescription, patient record, and a prisoner's record.

A more complete understanding of the method and apparatus for remotely viewed bar code data interchange will be afforded to those skilled in the art, as well as a realization of the additional features and advantages thereof, by a consideration of the following detailed description of the preferred embodiment. Reference will be made to the appended sheets of drawings which will first be described briefly.

FIG. 1 illustrates the basic components of the present invention. Bar code 101, which is encoded with the data “123ABC”, is shown at a remote location. Bar code 101 may be either a printed or video bar code. Camera 102 in a remote location is used to capture an image of bar code 101. A security camera is shown, but could alternatively be a device such as, but not limited to a phone camera, web camera, television camera, camcorder, digital camera, etc.

Another example of a video camera system that can be used is the BGR Privacam System available from KpN. This is an example of an encrypted video system. A digital camera takes recorded images and divides them into a series of discrete information stream. These data streams are separated and sent to several different authorized recipients. This prevents unauthorized parties from intercepting video image transmission.

Camera 102 is operatively connected via connection 103 to network cloud 104. Connection 103 can be either a wireless or hard-wired connection. The network cloud 104 can be a personal area network (PAN), a local area network (LAN), wide area network (WAN), the public switched network (PSTN), a virtual private network (VPN), the Internet, a wireless network, a cell phone network, or any combination of the above.

The image of bar code 101 captured by camera 102 and transmitted via connection 103 over the network cloud 104 is received and processed for viewing by PC 106. A PC is shown, but alternatively could be a device such as, but not limited to a PDA, laptop PC, tablet, TV monitor, cell phone, etc. Generally, such a device is referred to as a computer.

Bar code scanner 105 is shown scanning the image of remote bar code 101. A high scan rate CCD or linear imager that is capable of reading a 1D or 2d video bar code is the Intermec ScanPlus™ 1800. This same scanner can also be used to read a 1D or 2D printed bar code.

Alternatively, the image of remote bar code 101 can be printed and read with any type of laser, CCD, or linear imager type bar code reader.

The following is a practical example of the present invention being used to gain access to a secure area in an airport.

In this example, bar code 101 is a video bar code being displayed on a cell phone or PDA at a remote location. A video bar code is dynamic and can be changed according to software instructions from an application running on the device displaying the video bar code, or from a back-end server, or PC connected via a hard-wired or wireless connection to a device operating in a remote location that is displaying a bar code 101 for capture by camera 102.

As an example, a worker trying to gain entrance into a secure area in an airport would approach a remote gate and make an entrance request via a land-line phone at the gate to the secured area. A security agent sitting at a remote location would answer the land-line phone. The worker trying to gain access to the secure area would be asked to enter their PIN number using the land-line phone at the gate of the secured area. A back-end software application or database would receive the PIN via a computer-telephone interface card to drive a hash algorithm. The resultant of the hash algorithm would be sent to the worker's cell phone and displayed as a bar code.

The security agent sitting at a remote location would scan the image of the video bar code that had just been sent to the worker's cell phone off of the PC screen. If the scan of the video bar code matched the resultant of the hash algorithm in the back-end database the security agent could unlock the gate into the secure area for the worker.

Additionally, another level of security would be available using the cell phone electronic identification codes associated with any cell phone. This includes the following numbers which are routinely transmitted over the control channel of the cell phone, 1) the electronic signature number (ESN) a 32 bit number programmed into the phone when its manufactured, 2) the mobile identification number (MIN) which is the 10 digit telephone number associated with the cell phone which is programmed into the phone at time of purchase, and 3) the system identification code (S1D) which is a unique 5-digit number assigned to each carrier by the FCC and is also activated at the time of purchase. Any or all of these numbers could be queried and compared to the ones maintained in the database maintained by the airport security office in this example, or alternatively, this information could be checked in the background by the wireless carrier, or a third party.

Additionally, biometric security could be used in order as an additional level of security.

One skilled in the art will instantly recognize that this example is representative of many different applications for the viewing of a remote displayed printed or video bar code.

Having thus described a preferred embodiment and other embodiments of a method and apparatus for viewing of a remotely displayed printed or video bar code, and the scanning of a transmitted image of the remotely displayed bar code it should be apparent to those skilled in the art that certain advantages of the present invention have been achieved. It should also be appreciated that various modifications, adaptations, and alternatives may be made. It is of course not possible to describe every conceivable combination of components for purposes of describing the present invention. All such possible modifications are to be included within the spirit and scope of the present invention which is to be limited only by the following claims. 

1. A method for remotely decoding a bar code for security purposes, comprising: sending information displayed as a secure bar code; capturing an image of the bar code using a camera; transmitting the image of the bar code across a network; receiving the image of the bar code at a remote location on the network; reproducing the image of the bar code on a video display at the remote location to provide a reproduced image of the bar code; scanning and decoding the reproduced image of the bar code from the video display using a bar code reader to provide information; and verifying the information extracted from the reproduced image of the bar code matches the security information.
 2. The method of claim 1 wherein the camera is selected from the set consisting of a phone camera, a security camera, a camcorder, a digital camera, a web camera, and a television camera.
 3. The method of claim 1 wherein transmitting the image of the bar code across a network is encrypted.
 4. The method of claim 1 wherein the bar code is a 2D bar code.
 5. The method of claim 1 wherein the bar code is a 1D bar code.
 6. The method of claim 1 wherein the bar code is selected from the set consisting of Code 39 extended, Danish PTT 39 Bar code, French Postal 39 A/R, German Postal Bar code Identcode 11, German Postal Bar code Leitcode 13, 2 of 5 Industrial, 2 of 5 Matrix Plessey, Codabar, MSI Plessey, MSI Plessey+CHK10, MSI Plessey+CHK10+CHK10, MSI Plessey+CHK11+CHK10, 2 of 5 IATA, 2 of 5 Datalogic, Code 39 Reduced, USPS tray label, USPS sack label, Code32, Codabar Rationalised, MSI Plessey+CHK11, OMR, Code 93, Code 93 extended, 128 A, 128 B, 128 C, UCC-128, EAN/JAN-8, EAN/JAN-8+2, EAN/JAN-8+5, EAN/JAN-13, EAN/JAN-13+2, EAN/JAN-13+5, UPC-A, UPC-A+2, UPC-A+5, UPC-E, UPC-E+2, UPC-E+5, Oc UNICODE, 128 utoswitch, EAN 128, ISBN, ISSN, Swiss Postal, Code11, UPS Standard (18 digits), UPS 18 digits, UPS Standard (11 digits), UPS 11 digits, 128× (Free Type), Telepen, PDF-417, PDF-417 (HP Mode), MicroPDF417, Royal Mail 4-State Customer Code, Dutch 4-State Postal, Singapore Post 4-State Postal Code, Australia Post 4-State Postal Code, Japan Post 4-State Postal Code, Australia Post 4-State Postal Code 37, 52, 67, Australia 4-state postal 37-CUST (HP Mode), Australia 4-state postal 52-FF-MET (HP Mode), Australia 4-state postal 67-FF-MET (HP Mode), Australia 4-state postal FCC-45 REPLY (HP Mode), Singapore Post 4-State Postal Code (HP Mode), DataMatrix, MaxiCode, MaxiCode (HP Mode), USPS FIM, POSTNET 5 ZIP+4, POSTNET 9 ZIP+4, POSTNET 11 DPC, PLANET, Aztec, Aztec Mesas, QR Code, Code 49, Channel Code, Code One, SuperCode, RSS, EAN/UCC Composite Symbology, Codablock F, Dot Code A, and Code16K.
 7. The method of claim 1 wherein the bar code is proprietary.
 8. The method of claim 1 wherein the bar code is a tagged bar code.
 9. The method of claim 8 wherein the bar code is tagged using XML.
 10. The method of claim 1 wherein the video display at the remote location is selected from the set consisting of a television, a laptop screen, a tablet, a PDA, a PC monitor, an ATM display, a cash register display, a digital TV screen, a CRT computer monitor, a liquid crystal display (LCD), and a CRT TV screen.
 11. The method of claim 1 wherein the scanning and decoding is performed using a device selected from the set consisting of a high scan rate CCD, and an imager.
 12. The method of claim 1 wherein the scanning and decoding is performed using a software solution executing on a computing device.
 13. The method of claim 1 wherein the scanning and decoding is performed using a bar code scanner integrated into a device selected from the set consisting of a cell phone, a land line phone, a PDA, a computer mouse, a GPS receiver, a pager, a two-way communication device, and a fob.
 14. The method of claim 1 wherein the source of the image of a bar code is selected from a set consisting of a printed bar code, and a video bar code.
 15. The method of claim 14 wherein the source of the image of a bar code is selected from the set consisting of an identification card, a badge, a ticket, an electronic document, a electronic document with fill-in-fields, an e-mail, a form, a webpage, a spreadsheet, a student record, a student report card, an invoice, a purchase order, a repair order, a warranty, a prescription, a patient record, and a prisoner's record.
 16. The method of claim 1 wherein the method of securing the information displayed in the bar code is selected from the set consisting of a hash, a biometric, and a PIN.
 17. The method of claim 1 wherein the bar code comprises a human readable text portion and machine readable bar code portion.
 18. The method of claim 17 wherein the human readable text portion does not match the machine readable bar code portion to provide increased security.
 19. The method of claim 1 wherein the video display at the remote location is a cell phone.
 20. The method of claim 19 wherein the cell phone is verified using an electronic identification code of the cell phone selected from the set consisting of an electronic signature number, a mobile identification number, and a system identification code.
 21. The method of claim 1 wherein the step of verifying is performed using a computer running software that verifies information derived from the remote bar code matches security information stored in the computer.
 22. The method of claim 1 further comprising granting physical access to a secured site after the step of verifying. 