Sign In

Communications of the ACM

ACM TechNews

Catching Fake Meds in a Snapshot


View as: Print Mobile App Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook
2D bar code

A new anti-counterfeiting system would use two-dimensional bar codes, like the one shown, to tag medication distributed in the developing world. The images would hold information about the kind of drug contained in a package and the legitimate owner.

Credit: QR Code 2D Barcode Generator

New York University researchers have proposed Epothecary, a system that uses cell phones to authenticate and track drugs distributed in the developing world. The system reads two-dimensional (2D) bar codes on drug packages and assigns them to distributors and pharmacists in an effort to prevent the distribution of counterfeit drugs through legitimate channels.

The World Health Organization estimates that more than 10 percent of drugs in the developing world are counterfeit. New York University Ph.D. candidate Michael Paik says Epothecary can significantly reduce the use of counterfeit drugs by providing a drug-tracking scheme. Under Epothecary, every shipping crate, box, and individual drug container would be marked with a unique 2D bar code that contains the name of the drug and the quantity.

Retailers and distributors also would be given a unique bar code. To buy medication, a retailer logs on to the Epothecary system on a cell phone and provides a password. The retailer then takes a picture of the distributor's bar code and the bar code of the medication. Cell phone software deciphers the information in the two bar codes, and encrypted information is sent to a central server. The server then checks that the distributor is the legitimate owner of the drugs, and the retailer can purchase the drugs and record the transaction on the server.

Consumers can receive eight-digit numbers from retailers that can be used to retrieve information about the drug about to be purchased to ensure that it is a legitimate product.

From Technology Review
View Full Article

 

Abstracts Copyright © 2009 Information Inc., Bethesda, Maryland, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
ACM Resources