Skip to Content

Protection Suite

What is icDM Protection Suite?

icDM Protection Suite (icDMPS) is an easy-to-use software package that allows not only to encode and decode text information into Data Matrix symbol, but to digitally protect this symbol from counterfeiting, as well. With icDM Protection Suite, protecting your products and documents has never been quicker or easier!

icDMPS consists of the two software programs – encoding (icDMPS_E) and decoding (icDMPS_D). Encoding software has a proprietary built-in mechanism allowing either to authenticate the encoded Data Matrix symbol afterwards or to encrypt it. The Decoding software checks symbol for authenticity or decrypts it while extracting the information from the symbol.

Depending on application, the programs can be used either together or separately. In a “Supply Chain Application”, for example, the encoding software can be used on the “manufacturing end” and the decoding software – on the “receiving end”.

Why do we need data label protection?

In 2007 – 1.95% of global trade was of counterfeit and pirated products. Accordingly, counterfeiting data labels, designed to carry certain information about the product, has become one of the important steps in manufacturing fake products.

The rise of such fake products in different industries has driven strong requirements for anti-counterfeiting technologies to protect product integrity and company’s brands. This requirement calls for the new product - protective data label which can be either tracked from factory to an end-user, or checked for legitimacy right at the POS.

How does it work?

icDMPS employs the concept of Digital Signature for data authentication. A digital signature scheme allows one to sign an electronic message and later the produced signature can be validated by the owner of the message or by any verifier. It normally utilizes asymmetric algorithm - a private key for signature generation, but a public key (which corresponds to, but is not the same as, the private key) - for signature verification. This is nearly always very computationally intensive and can not be used on DSP-based platform (scanner).

Our patent pending method makes use of symmetric key algorithms integrated into the encoding/decoding mechanism. This makes our software suitable for embedded processing.

As it is always a case with the symmetric-key algorithms, the single secret key is a subject of a certain key-exchange protocol. If this protocol is compromised the whole scheme may become disfunctional.

To strengthen the Authentication mechanism, icDMPS also offers one more layer of protection -additional encryption (on top of authentication) and establishing an alternate key-exchange protocol. This algorithm also satisfies the embedded processing requirements.

For the sake of convenience icDMPS treats two above mentioned algorithms as two types of digital signatures – User Signature and Product Signature. The term “signature” is used only to underline the fact that each Data Matrix, generated using these algorithms, will have the unique digital characteristics distinct from any other Data Matrix symbol with the same encoded message/data.

 

User ID and Product ID – are those secret keys that are communicated within the above mentioned key-exchange protocols.

Both Authentication and Encryption keys are calculated using Random Number Generator (RNG) that uses all the data shown above as the input parameters. The length of this data string (input parameters) might be from 368 up to 2048 bits.  Since the Authentication Key depends on encoded data sequence, it is different for every Matrix going through the Algorithm, which, in turn, makes it very difficult to break.

Download "icDM Protection Suite" Brochure to learn more about this technology. Try free Trial version to get familiar with the Product.

Honeywell Handhelds compatible with 2DTG's DPM DataMatrix Plugin


Xenon 1900 Xenon 1902 Granit 1910i Granit 1911i Vuquest3310g N56XX engine