So the manufacturer provides a number on a label that can be verified to 
have been written by them that is unique and unguessable for each label 
printing.

We provide a program to generate these labels and a PWA to verify the 
labels. We’d need to serve the PWA on the Internet, and the label generator 
source code. A Go program can host the PWA and Go can be the language for 
the label generator. We’d need to localize/translate the PWA and maybe the 
label generator.

I’m not familiar with non-english processors and operating systems around 
the world. I’m concerned that Go is supported only for the big server ones 
for english speakers which may be different than at printing stations, but 
maybe we are just dealing with Windows and Linux on x86 processors 
generally.

By having the URL for the manufacturer’s public key in the label we don’t 
have to track a list of manufacturers. The manufacturer follows our 
specification for a verification server and label inputs. They track their 
UUIDs and keys and we handle the ECDSA decryption logic and let them say 
yes/no to the decrypted UUID. I may be misunderstanding how ECDSA would be 
used.

My previous train of thought was based on wanting to have complete control 
over the consumer experience. By relying on manufacturers’ servers the same 
implementation is repeated and could be done incorrectly, and there could 
be downtime. Distributors are an important part of the supply chain and 
they do open medication packaging necessarily. Pharmacies often repackage 
medication. Untrustworthy pharmacies could get trusted packaging, and 
untrustworthy pharmacies seem to be the biggest problem stated by the 
report.

Matt

On Tuesday, December 26, 2017 at 4:36:25 PM UTC-6, Tamás Gulácsi wrote:
>
>
>
> 2017. december 26., kedd 21:59:17 UTC+1 időpontban Frank Davidson a 
> következőt írta:
>>
>> I was thinking a Progressive Web App (PWA) to avoid writing multiple 
>> Android, Web, iOS apps... I know QR codes are more broadly used but I'm not 
>> sure if they can store the amount of info we would need? I think you need 
>> 384 bits plus the data we need to encode for secure ECDSA? Aztec codes seem 
>> to be used somewhat ubiquitously and seem also to be able to store a good 
>> amount more data than QR. Building a PWA using Aztec codes for end users, 
>> we might be able to use the JS port of Zxing: 
>> https://github.com/LazarSoft/jsqrcode
>>
>>
>
> http://www.tec-it.com/en/support/knowbase/barcode-overview/2d-barcodes/Default.aspx
>
> QR code: 4296 alpha, 7089 numeric characters
> Aztec: 3067 alphanumeric, 3832 numeric, 1914 Bytes
>
> so no real limitations here.
>
> If the URL in the Aztec code designates a landing page on the 
>> manufacturer's certified domain, that end point can deliver up the correct 
>> public key, and since that is used to verify the signature, and a man in 
>> the middle attack is prevented by the manufacturer's domain's cert, I think 
>> we'd be done. I'm thinking we may not even need a server as the domain's 
>> certificate from a valid CA would serve this purpose.
>>
>> Thoughts?
>>
>
>  Yes, the app could download the public key from the _central authority_ - 
> you have to provide a certificate authority which signs the private keys, 
> to forbid
> anybody to serve  its own Aztec codes with a a vanilla public key.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to