Misplaced Pages

Item Unique Identification

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Unique Identification Marking , UID marking , Item Unique Identification or IUID , is a part of the compliance process mandated by the United States Department of Defense . It is a permanent marking method used to give equipment a unique ID. Marking is essential for all equipment with an acquisition cost of over $ 5,000, equipment which is mission essential, controlled inventory, or serially-controlled . UID-marking is a set of data for assets that is globally unique and unambiguous. The technology used to mark an item is 2D Data Matrix ECC 200 Symbol. UID marking can be used to ensure data integrity and data quality throughout an item's lifecycle; it also supports multi-faceted business applications.

#284715

50-617: As per the memorandum issued by the Department of Defense (DoD), UID-marking is a must for all solicitations issued on or after Jan. 1, 2005. Also the US Department of Defense has made it mandatory for all federal contractors to have UID-marking on their government furnished military and non-military equipment by September 30, 2007. Only after the products have UID-marking containing uniquely identified numbers, they are eligible for IUID Registry. Tangible items are distinguished from one another by

100-606: A different set for the next character. The only difference is that they reverse upper-and lower-case letters. C40 is primarily upper-case, with lower-case letters in set 3; Text is the other way around. Set 1, containing ASCII control codes, and set 2, containing punctuation symbols are identical in C40 and Text mode. EDIFACT mode uses six bits per character, with four characters packed into three bytes. It can store digits, upper-case letters, and many punctuation marks, but has no support for lower-case letters. Base 256 mode data starts with

150-489: A length indicator, followed by a number of data bytes. A length of 1 to 249 is encoded as a single byte, and longer lengths are stored as two bytes. It is desirable to avoid long strings of zeros in the coded message, because they become large blank areas in the Data Matrix symbol, which may cause a scanner to lose synchronization. (The default ASCII encoding does not use zero for this reason.) In order to make that less likely,

200-559: A number of purposes, such as movement tracking or inventory stock checks. Data Matrix codes, along with other open-source codes such as 1D barcodes can also be read with mobile phones by downloading code specific mobile applications. Although many mobile devices are able to read 2D codes including Data Matrix Code, few extend the decoding to enable mobile access and interaction, whereupon the codes can be used securely and across media; for example, in track and trace, anti-counterfeit, e.govt, and banking solutions. Data Matrix codes are used in

250-462: A parcel has been dispatched to the recipient. For industrial engineering purposes, Data Matrix codes can be marked directly onto components, ensuring that only the intended component is identified with the data-matrix-encoded data. The codes can be marked onto components with various methods, but within the aerospace industry these are commonly industrial ink-jet, dot-peen marking, laser marking, and electrolytic chemical etching (ECE). These methods give

300-441: A permanent mark which can last up to the lifetime of the component. Data Matrix codes are usually verified using specialist camera equipment and software. This verification ensures the code conforms to the relevant standards, and ensures readability for the lifetime of the component. After component enters service, the Data Matrix code can then be read by a reader camera, which decodes the Data Matrix data which can then be used for

350-459: Is x 8 + x 5 + x 3 + x 2 + 1 {\displaystyle x^{8}+x^{5}+x^{3}+x^{2}+1} , corresponding to the polynomial number 301, with initial root = 1. The Reed–Solomon code uses one of 37 different polynomials over F 256 {\displaystyle \mathbb {F} _{256}} , with degrees ranging from 7 to 68, depending on how many error correction bytes

400-459: Is an issue, but all color variations need to be tested before production to ensure they are readable. In May 2006 a German computer programmer, Bernd Hopfengärtner, created a large Data Matrix in a wheat field (in a fashion similar to crop circles ). The message read " Hello, World! ". In June 2011 the Parisian tattoo artist K.A.R.L., as part of a promotion for Ballantine's scotch whisky, created

450-583: Is applied with either direct part UID-marking techniques or labels must also prove to be generated to a level of quality that meets the standards set by the International Organization for Standardization (ISO) and the Society of Automotive Engineers (SAE). UID Markings and 2D Matrix Barcode Symbols can be created on a variety of surfaces. Generally UCC.EAN, ANSI MH 10.8.2 or ATA style descriptors are used for UID-marking symbol. Vendors supplying parts to

500-456: Is based upon normal industry practices of the organization assigning the serialization. The formatted data is called a Unique Item Identifier (UII). The Data Matrix symbol is a machine-readable representation of the UII. When DoD requires this marking it shall be applied directly to the surface of the item or shall be applied to an identification plate, tag or label securely fastened to the item. The UII

550-512: Is both invalid and unenforceable due to inequitable conduct by the defendants during the procurement of the patent. While the ruling was delivered after the patent expired, it precluded claims for infringement based on use of Data Matrix prior to November 2007. A German patent application DE 4107020 was filed in 1991, and published in 1992. This patent is not cited in the above US patent applications and might invalidate them. Two-dimensional Too Many Requests If you report this error to

SECTION 10

#1732858803285

600-505: Is crucial. Then comes the reporting phase where the UID meeting requirements are tracked to the item-specific location. The IUID data is submitted to the WAWF (Wide Area Work Flow) and UID Registry In the last step of IUID compliance. All the contracts, deliverables and government properties, that meet the criteria, possessed by the contractors need to be marked with this 2D data matrix code standard. It

650-432: Is delimited by a finder pattern, and this is surrounded on all four sides by a quiet zone border (margin). (Note: The modules may be round or square- no specific shape is defined in the standard. For example, dot-peened cells are generally round.) ECC 200, the newer version of Data Matrix, uses Reed–Solomon codes for error and erasure recovery. ECC 200 allows the routine reconstruction of the entire encoded data string when

700-473: Is from a few bytes up to 1556 bytes . The length of the encoded data depends on the number of cells in the matrix. Error correction codes are often used to increase reliability: even if one or more cells are damaged so it is unreadable, the message can still be read. A Data Matrix symbol can store up to 2,335 alphanumeric characters. Data Matrix symbols are rectangular, usually square in shape and composed of square "cells" which represent bits . Depending on

750-481: Is globally unique and unambiguous, ensures data integrity and data quality throughout life, and supports multi-faceted business applications and users. 2D Matrix - The 2D Data Matrix symbol marked on the item contains data compression, redundancy, and additional information to aid in decoding. This information can be translated by an MRI device (per ISO-15343) and concatenated into a human-readable string of 50 characters or less per MIL-STD-130N. (Note that this limit

800-492: Is intended to be a permanent mark and cannot be changed over the life of the item. To create a compliant unique item identifier, all required information about the part and the organization producing it is linked together – concatenated – into a single data field of up to 50 numeric, alphabetic or alphanumeric characters. This data must be entered into the IUID Registry to “ensure uniqueness” of each item submitted for listing in

850-403: Is located overseas or in use and scheduled to return to a central location. The following enumeration constructs are approved: Data Matrix A Data Matrix is a two-dimensional code consisting of black and white "cells" or dots arranged in either a square or rectangular pattern, also known as a matrix . The information to be encoded can be text or numeric data. Usual data size

900-533: Is mandatory for all suppliers to be UID Compliant who deliver their items to the DoD . All the items and properties either owned by or in the contract with the [DoD], and that meet the criteria, need to be identified with a unique serialized identification number and for them UID Compliance standard is obligatory. This identification number is very essential for meeting the MIL STD 130 standards. IUID - Item Unique Identification

950-512: Is the first and foremost step of the UID Compliance process. This marking is nothing but the 2D data matrix code. Dot peen, chemical etch, laser mark , durable polyester or ink jet are generally used for marking. After conforming to the set standards with regard to printing and marking, the next step is syntax and formatting. Before the items are ready to be received they must be scanned and tracked for checking accuracy and hence this step

1000-501: Is the strategic system implemented by the DoD to enhance the traceability of the property. UID - Unique Identification, the term UID is commonly used for different things and sometimes used in place of IUID, and thus can be a source of confusion. Generally, "The UID" refers to the physical mark on the asset or the UID Label. UII - The Unique Item Identifier is a set of data for an asset(s) that

1050-552: Is treated as a single item. In this case, the IUID is no longer useful after the items are separated, and the individual items from the batch or lot are never uniquely identified. IUID is physically marked on tangible items or assets using a two-dimensional (2D) Data Matrix symbol with the data formatted in accordance with specified standards. The encoded data is identified by the use of data identifiers, application identifiers or text element identifiers. The choice of which identifier to use

SECTION 20

#1732858803285

1100-467: The food industry in autocoding systems to prevent food products being packaged and dated incorrectly. Codes are maintained internally on a food manufacturers database and associated with each unique product, e.g. ingredient variations. For each product run the unique code is supplied to the printer. Label artwork is required to allow the 2D Data Matrix to be positioned for optimal scanning. For black on white codes testing isn't required unless print quality

1150-426: The Department of Defense are required to supply parts with UID Data Matrix Symbols conforming to MIL-STD 130M standard. By using a Data Matrix Symbol laser etching system to engrave a UID onto each part, items can be uniquely identified by manufacturer, part number and serial number. UID bar code must be maintained as a readable bar code throughout the entire life of the item; hence strong consideration must be given to

1200-489: The ECC 000 through 140 error correction can be recognized by the upper-right corner module being the inverse of the background color. (binary 1). According to ISO/IEC 16022, "ECC 000–140 should only be used in closed applications where a single party controls both the production and reading of the symbols and is responsible for overall system performance." Data Matrix was invented by International Data Matrix, Inc. (ID Matrix) which

1250-439: The ECC 200 error correction can be recognized by the upper-right corner module being the same as the background color. (binary 0). Additional capabilities that differentiate ECC 200 symbols from the earlier standards include: Older versions of Data Matrix include ECC 000, ECC 050, ECC 080, ECC 100, ECC 140. Instead of using Reed–Solomon codes like ECC 200, ECC 000–140 use a convolution-based error correction. Each varies in

1300-462: The Government, either by flowing down the requirements to the subcontractor or marking the item themselves. The prime will also have the added responsibility of ensuring uniqueness of the subcontractor's serial number within the prime's enterprise (Construct #1) or the subcontractor's serial number within the subcontractor's part number within the prime's enterprise (Construct #2). Marking and printing

1350-583: The UID-marking methodology. Metal tag with a permanent adhesive or durable polyester label are suitable for many environments but other marking items such as laser etch, dot peen, Metalphoto photosensitive anodized aluminum , chemical etch or ink jet can also be used for direct part Unique Identification. The following methodologies (constructs) and equivalents are approved: The following IUID Equivalents are also approved: Accepted Issuing Agencies: Department of Defense Instruction (DoDI) 8320.04 mandates that

1400-525: The amount of error correction it offers, with ECC 000 offering none, and ECC 140 offering the greatest. For error detection at decode time, even in the case of ECC 000, each of these versions also encode a cyclic redundancy check (CRC) on the bit pattern. As an added measure, the placement of each bit in the code is determined by bit-placement tables included in the specification. These older versions always have an odd number of modules, and can be made in sizes ranging from 9 × 9 to 49 × 49. All symbols utilizing

1450-474: The assignment of a unique identifier in the form of a unique data string and encoded in a bar code placed on the item. An item unique identifier is only assigned to a single item and is never reused. Once assigned to an item, the IUID is never changed even if the item is modified or re-engineered. IUID is similar to social security numbering used to distinguish citizens of the United States from one another. In

1500-408: The case of a lot or batch of items that are not individually serialized, the entire lot or batch may have a unique identifier assigned. For example, a manufacturer might place a unique IUID physical mark on the exterior of a kit or container that holds a gross quantity of mission critical items. The government would refer to this IUID at the point of acceptance. The entire gross quantity in this case

1550-564: The code adds. The encoding process is described in the ISO/IEC standard 16022:2006. Open-source software for encoding and decoding the ECC-200 variant of Data Matrix has been published. The diagrams below illustrate the placement of the message data within a Data Matrix symbol. The message is "Misplaced Pages", and it is arranged in a somewhat complicated diagonal pattern starting near the upper-left corner. Some characters are split in two pieces, such as

Item Unique Identification - Misplaced Pages Continue

1600-434: The code's ability to encode fifty characters in a symbol that is readable at 2 or 3 mm (0.003 or 0.005 sq in) and the fact that the code can be read with only a 20% contrast ratio. A Data Matrix is scalable; commercial applications exist with images as small as 300 micrometres (0.012 in) (laser etched on a 600-micrometre (0.024 in) silicon device) and as large as a 1 metre (3 ft) square (painted on

1650-427: The coding used, a "light" cell represents a 0 and a "dark" cell is a 1, or vice versa. Every Data Matrix is composed of two solid adjacent borders in an "L" shape (called the "finder pattern") and two other borders consisting of alternating dark and light "cells" or modules (called the "timing pattern"). Within these borders are rows and columns of cells encoding information. The finder pattern is used to locate and orient

1700-489: The elements of which are encoded as bytes of 8 bits ; the byte b 7 b 6 b 5 b 4 b 3 b 2 b 1 b 0 {\displaystyle b_{7}b_{6}b_{5}b_{4}b_{3}b_{2}b_{1}b_{0}} with a standard numerical value ∑ i = 0 7 b i 2 i {\displaystyle \textstyle \sum _{i=0}^{7}b_{i}2^{i}} encodes

1750-619: The field element ∑ i = 0 7 b i α i {\displaystyle \textstyle \sum _{i=0}^{7}b_{i}\alpha ^{i}} where α ∈ F 256 {\displaystyle \alpha \in \mathbb {F} _{256}} is taken to be a primitive element satisfying α 8 + α 5 + α 3 + α 2 + 1 = 0 {\displaystyle \alpha ^{8}+\alpha ^{5}+\alpha ^{3}+\alpha ^{2}+1=0} . The primitive polynomial

1800-426: The following tangible items are marked with an item unique identifier: Responsibility - Often, the question of responsibility for IUID comes into light when multiple organization are involved in the production and/or procurement of items. According to the guidance, IUID is required at the component level based on a program manager determination. Program managers should be interpreted as any activity member who manages

1850-495: The government or are in the custody of contractors. The registry also stores "Virtual IUID" information for assets that fall under IUID criteria but are unable to be marked (mainly due to asset location constraints) The IUID Registry can be publicly accessed online. Virtual IUID - Asset data is uploaded to the registry as with normal IUID but the asset is not physically marked until a trigger event occurs (such as maintenance, transportation, or inspection). Commonly used when an asset

1900-596: The initial W, and the third 'i' is in "corner pattern 2" rather than the usual L-shaped arrangement. Also shown are the end-of-message code (marked End), the padding (P) and error correction (E) bytes, and four modules of unused space (X). Multiple encoding modes are used to store different kinds of messages. The default mode stores one ASCII character per 8-bit codeword. Control codes are provided to switch between modes, as shown below. The C40, Text and X12 modes are potentially more compact for storing text messages. They are similar to DEC Radix-50 , using character codes in

1950-441: The item does not already have unique identification and meets IUID criteria, the enterprise furnishing the item to the Government must provide unique item identification marking as part of the purchase price. In situations where sub-contractors are furnishing items to the prime contractor, it is the responsibility of the prime contractor to ensure that the items are marked in accordance with the IUID requirements prior to furnishing to

2000-454: The length and data bytes are obscured by adding a pseudorandom value R(n), where n is the position in the byte stream. Prior to the expiration of US patent 5,612,524 in November 2007, intellectual property company Acacia Technologies claimed that Data Matrix was partially covered by its contents. As the patent owner, Acacia allegedly contacted Data Matrix users demanding license fees related to

2050-504: The patent. Cognex Corporation , a large manufacturer of 2D barcode devices, filed a declaratory judgment complaint on 13 March 2006 after receiving information that Acacia had contacted its customers demanding licensing fees. On 19 May 2008 Judge Joan N. Ericksen of the U.S. District Court in Minnesota ruled in favor of Cognex. The ruling held that the '524 patent, which claimed to cover a system for capturing and reading 2D symbology codes,

Item Unique Identification - Misplaced Pages Continue

2100-443: The range 0–39, and three of these codes are combined to make a number up to 40 =64000, which is packed into two bytes (maximum value 65536) as follows: The resulting value of B1 is in the range 0–250. The special value 254 is used to return to ASCII encoding mode. Character code interpretations are shown in the table below. The C40 and Text modes have four separate sets. Set 0 is the default, and contains codes that temporarily select

2150-458: The registry. This unique item identifier can also see use within manufacturing, maintenance and logistics organizations for any number of varied purposes. Marking of tangible items or assets in accordance with IUID policy is mandated by incorporating Defense Federal Acquisition Regulation Supplement (DFARS) clause 252-211-7003 in DoD contracts. Per the UID standard, a 2D Data Matrix bar code that

2200-425: The requirement for procurement of an item. This would include personnel such as Integrated Support Team Managers, Systems Managers, or Item Managers . The prime contractor is responsible for ensuring uniqueness. The prime contractor can direct their vendors to use the prime's EID. However, from a manufacturing process perspective, this may not be the most efficient and effective way for their vendors to mark parts. If

2250-403: The roof of a boxcar ). Fidelity of the marking and reading systems are the only limitation. The US Electronic Industries Alliance (EIA) recommends using Data Matrix for labeling small electronic components. Data Matrix codes are becoming common on printed media such as labels and letters. The code can be read quickly by a barcode reader which allows the media to be tracked, for example when

2300-414: The symbol has sustained 30% damage, assuming the matrix can still be accurately located. Data Matrix has an error rate of less than 1 in 10 million characters scanned. Symbols have an even number of rows and an even number of columns. Most of the symbols are square with sizes from 10 × 10 to 144 × 144. Some symbols however are rectangular with sizes from 8×18 to 16×48 (even values only). All symbols using

2350-414: The symbol while the timing pattern provides a count of the number of rows and columns in the symbol. As more data is encoded in the symbol, the number of cells (rows and columns) increases. Each code is unique. Symbol sizes vary from 10×10 to 144×144 in the new version ECC 200, and from 9×9 to 49×49 in the old version ECC 000 – 140. The most popular application for Data Matrix is marking small items, due to

2400-454: The world's first animated tattoo utilizing a Data Matrix code in a collaborative process streamed live on Facebook. Data Matrix symbols are made up of modules arranged within a perimeter finder and timing pattern. It can encode up to 3,116 characters from the entire ASCII character set (with extensions). The symbol consists of data regions which contain modules set out in a regular array. Large symbols contain several regions. Each data region

2450-585: Was merged into RVSI/ Acuity CiMatrix , who were acquired by Siemens AG in October 2005 and Microscan Systems in September 2008. Data Matrix is covered today by several ISO / IEC standards and is in the public domain for many applications, which means it can be used free of any licensing or royalties. Data Matrix codes use Reed–Solomon error correction over the finite field F 256 {\displaystyle \mathbb {F} _{256}} (or GF(2 ) ),

2500-594: Was previously 78 characters in MIL-STD-130M, superseded in December 2007.) The human-readable concatenated UII (Unique Item Identifier) is properly referred to as the IUII or "Individual Unique Item Identifier". The IUII provides a high probability of being globally unique, regardless of context. IUID Registry - The U.S. Federal Government maintains an IUID Registry data system to store records for all assets marked and delivered to

#284715