Method and system for marking manufactured items to detect unauthorized refilling
First Claim
1. An apparatus for marking a manufactured item, the manufactured item comprising a container and a removable closure for the container, the apparatus comprising:
- one or more computer processors for generating a first code for the container and a second code for the closure;
at least one marker configured to mark the container with the first code and the closure with the second code;
wherein the first code and the second code are different but interrelated such that at least a portion of one of the first code and the second code can be derived from the other of the first code and the second code, and wherein at least a portion of the first or second code is derived by performing a cryptographic process on the other of the first or second code.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for marking a manufactured item is provided, the manufactured item comprising a container and a removable closure for the container, the method comprising: generating a first code for the container, generating a second code for the closure, marking the container with the first code, and marking the closure with the second code, wherein the first code and the second code are interrelated such that at least a portion of one of the first code and the second code can be derived from the other of the first code and the second code. In an authentication process one of the first or second codes or a portion of the first or second code, in encrypted or unencrypted form, may be compared with a value derived from reading the other of the first or second code.
-
Citations
20 Claims
-
1. An apparatus for marking a manufactured item, the manufactured item comprising a container and a removable closure for the container, the apparatus comprising:
-
one or more computer processors for generating a first code for the container and a second code for the closure; at least one marker configured to mark the container with the first code and the closure with the second code; wherein the first code and the second code are different but interrelated such that at least a portion of one of the first code and the second code can be derived from the other of the first code and the second code, and wherein at least a portion of the first or second code is derived by performing a cryptographic process on the other of the first or second code. - View Dependent Claims (2, 3, 4)
-
-
5. A method for marking a manufactured item, the manufactured item comprising a container and a removable closure for the container, the method comprising:
-
generating a first code for the container; generating a second code for the closure; marking the container with the first code; and marking the closure with the second code, wherein the first code and the second code are different but interrelated such that at least a portion of one of the first code and the second code can be derived from the other of the first code and the second code, and wherein at least a portion of the first or second code is derived by performing a cryptographic process on the other of the first or second code. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
- 13. A manufactured item comprising a container and a closure, wherein the container is marked with first code and the closure is marked with a second code, wherein the first code and the second code are different but interrelated such that at least a portion of one of the first code and the second code can be derived from the other of the first code and the second code, and wherein at least a portion of the first or second code is derived by performing a cryptographic process on the other of the first or second code.
-
18. A method of authenticating a manufactured item comprising a container and a removable closure for the container, the method comprising:
-
generating a first code for the container; generating a second code for the closure; marking the container with the first code; marking the closure with the second code, wherein at least a portion of the first or second code is derived by performing a cryptographic process on the other of the first or second code process such that at least a portion of one of the first code and the second code can be derived from the other of the first code and the second code; reading one of the first code and the second code and at least a portion of the other of the first code and the second code, deriving a portion of the other of the first code and the second code from the one of the first code and the second code; comparing the derived portion of the other of the first code and the second code with the read portion of the other of the first code and the second code; and providing an indication that the manufactured item is authentic if the derived portion of the other of the first code and the second code is identical to the read portion of the other of the first code and the second code. - View Dependent Claims (19, 20)
-
Specification