Tracking and verifying authenticity of items
First Claim
Patent Images
1. A system, comprising:
- an item bearing a multi-layer identifier label, the multi-layer identifier label comprising an upper layer and a lower layer, a public identifier and a private identifier being printed on the lower layer, the public identifier being initially visible through a transparent window of the upper layer, the private identifier being initially non-visible through the upper layer unless a tamper-evident action is performed, wherein the tamper-evident action comprises peeling the upper layer from the lower layer, and the peeling removes the public identifier from the lower layer;
at least one computing device; and
an item tracking application executable in the at least one computing device, wherein when executed the item tracking application causes the at least one computing device to at least;
receive an authentication request for the item, the authentication request specifying the private identifier for the item;
in response to receiving the authentication request, determine whether the item is authentic based at least in part on at least one item history event in an item history record, the item history record corresponding to the private identifier, the at least one item history event being recorded in association with the public identifier for the item; and
send information identifying whether the item is authentic to a client device.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for tracking and verifying the authenticity of items. Public and private unique identifiers are generated for an item, and an identifier label is printed and affixed to the item. The public identifier is visible, but the private identifier is not visible unless a tamper-evident action is performed. Events involving scans of the public identifier are recorded. The private identifier is scanned by a client, and in response, authenticity information for the item is sent to the client. The authenticity information is determined based at least in part on the events relative to the public identifier.
77 Citations
20 Claims
-
1. A system, comprising:
-
an item bearing a multi-layer identifier label, the multi-layer identifier label comprising an upper layer and a lower layer, a public identifier and a private identifier being printed on the lower layer, the public identifier being initially visible through a transparent window of the upper layer, the private identifier being initially non-visible through the upper layer unless a tamper-evident action is performed, wherein the tamper-evident action comprises peeling the upper layer from the lower layer, and the peeling removes the public identifier from the lower layer; at least one computing device; and an item tracking application executable in the at least one computing device, wherein when executed the item tracking application causes the at least one computing device to at least; receive an authentication request for the item, the authentication request specifying the private identifier for the item; in response to receiving the authentication request, determine whether the item is authentic based at least in part on at least one item history event in an item history record, the item history record corresponding to the private identifier, the at least one item history event being recorded in association with the public identifier for the item; and send information identifying whether the item is authentic to a client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving, by at least one computing device, an authentication request for an item to which a multi-layer identifier label has been affixed, the multi-layer identifier label comprising an upper layer and a lower layer, a public identifier and a private identifier being printed on the lower layer, the public identifier being initially visible through a transparent window of the upper layer, the private identifier being initially non-visible through the upper layer unless a tamper-evident action is performed, the authentication request specifying the private identifier for the item, wherein the tamper-evident action comprises peeling the upper layer from the lower layer, and the peeling removes the public identifier from the lower layer; in response to receiving the authentication request, determining, by the at least one computing device, whether the item is authentic based at least in part on at least one item history event in an item history record, the item history record corresponding to the private identifier, the at least one item history event being recorded in association with the public identifier for the item; and sending, by the at least one computing device, information identifying whether the item is authentic to a client device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium embodying a program executable by at least one computing device, wherein when executed the program causes the at least one computing device to at least:
-
receive an authentication request for an item to which a multi-layer identifier label has been affixed, the multi-layer identifier label comprising an upper layer and a lower layer, a public identifier and a private identifier being printed on the lower layer, the public identifier being initially visible through a transparent window of the upper layer, the private identifier being initially non-visible through the upper layer unless a tamper-evident action is performed, the authentication request specifying the private identifier for the item, wherein the tamper-evident action comprises peeling the upper layer from the lower layer, and the peeling removes the public identifier from the lower layer; in response to receiving the authentication request, determine whether the item is authentic based at least in part on at least one item history event in an item history record, the item history record corresponding to the private identifier, the at least one item history event being recorded in association with the public identifier for the item; and send information identifying whether the item is authentic to a client device. - View Dependent Claims (20)
-
Specification