Authenticating and managing item ownership and authenticity
First Claim
Patent Images
1. A method implemented by a reading device, the method comprising:
- communicating with a tagging device affixed to an item;
receiving tagging device data and item data from the tagging device, wherein the tagging device data comprise a first digital signature and a first time stamp;
sending the tagging device data and the item data to an authentication server;
receiving an authentication of the tagging device from the authentication server;
requesting an authentication tag in response to receiving the authentication; and
receiving the authentication tag,wherein the authentication tag comprises a second digital signature and a second time stamp, andwherein the authentication tag verifies authenticity of the item at a time identified by the second time stamp.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for creating an authentication tag includes receiving, at an authentication server, tagging device data and item data from a tagging device, authenticating, by the authentication server, the tagging device using the tagging device data, generating an authentication tag, and sending, by the authentication server, the authentication tag to the electronic device. The tagging device is affixed to an item, and the authentication tag comprises a digital signature provided by the authentication server.
17 Citations
24 Claims
-
1. A method implemented by a reading device, the method comprising:
-
communicating with a tagging device affixed to an item; receiving tagging device data and item data from the tagging device, wherein the tagging device data comprise a first digital signature and a first time stamp; sending the tagging device data and the item data to an authentication server; receiving an authentication of the tagging device from the authentication server; requesting an authentication tag in response to receiving the authentication; and receiving the authentication tag, wherein the authentication tag comprises a second digital signature and a second time stamp, and wherein the authentication tag verifies authenticity of the item at a time identified by the second time stamp. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method implemented by an authentication server, the method comprising:
-
receiving tagging device data and item data originating from a tagging device affixed to an item; authenticating the tagging device using the tagging device data; sending an authentication of the tagging device to a reading device; receiving a request for an authentication tag in response to sending the authentication; generating the authentication tag, wherein the authentication tag comprises a second digital signature and a second time stamp, and wherein the authentication tag verifies authenticity of the item at a time identified by the second time stamp; and sending the authentication tag to the reading device. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method implemented by a reading device, the method comprising:
-
receiving user credentials; sending the user credentials to an authentication server; receiving user verification based on the user credentials; communicating with a tagging device affixed to an item; receiving tagging device data and item data from the tagging device, wherein the tagging device data comprise a first digital signature and a first time stamp; sending the tagging device data and the item data to the authentication server; receiving an authentication of the tagging device from the authentication server; requesting an authentication tag in response to receiving the authentication; and receiving the authentication tag, wherein the authentication tag comprises a second digital signature and a second time stamp, and wherein the authentication tag verifies authenticity of the item at a time identified by the second time stamp. - View Dependent Claims (22, 23, 24)
-
Specification