INSTALLATION BAR CODE

Brand Owner (click to sort) Address Description
CONNECTICIANS DATA RECOGNITION, INC. 2929 Longhorn Blvd., Ste. 103 Austin TX 78758 Installation of bar code and optical scanning equipment and accessories;Consultation for bar code and optical scanning equipment and accessories;
LOWRY SOLUTIONS LOWRY HOLDING COMPANY, INC. 9420 Maltby Road Brighton MI 48116 Installation of bar code, RFID and wireless systems and networks;Business management and consultation in the field of radio frequency identification, wireless data collection, and bar code technology; Distributorship services in the field of computer hardware, software and peripheral equipment;Consulting in the field of information technology; Installation and maintenance of computer software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. First and second codes specific to each program are prepared. The first code is encrypted to generate a first encrypted code that encrypts the second code to generate a second encrypted code. The second encrypted code is stored in a memory medium. An install key that the user needs to input is made by combining the first code and the second code. To authorize installation, the first code contained in the input install key is converted into the first encrypted code in the medium, and a computer on which a program is installed obtains the first encrypted code and generates the second encrypted code by encrypting the second code contained in the install key on the basis of the first encrypted code. Then, the computer reads out the second encrypted code stored in the medium and compares both of them, thereby giving the installation authorization.