×

Systems and methods of securing items and verifying the same

  • US 10,597,903 B2
  • Filed: 04/27/2018
  • Issued: 03/24/2020
  • Est. Priority Date: 04/27/2018
  • Status: Active Grant
First Claim
Patent Images

1. A method of utilizing a first verification mechanism to verify a configuration of an artifact over a first period of time, the method comprising:

  • associating the first verification mechanism with the artifact such that the first verification mechanism is moved to a verifying configuration and the artifact is moved to a first verifiable configuration, wherein moving the artifact away from the first verifiable configuration includes moving the first verification mechanism away from the verifying configuration,utilizing a scanning feature of a first electronic device to perform a first scanning operation at a first point in time, thereby obtaining scan information for a first verification record,wherein the artifact is in the first verifiable configuration at the first point in time,wherein the first scanning operation includes obtaining information associated with the first verification mechanism,wherein the first verification record includes a time stamp representing the first point in time, thereby providing evidence that the artifact was in the first verifiable configuration at the first point in time,wherein the first verification mechanism includes a unique identifier distinguishing the first verification mechanism from a second verification mechanism, information associated with the unique identifier being included in the first verification record so as to enable the first verification record to be distinguishable from a second verification record associated with the second verification mechanism,wherein the first verification mechanism is incapable of moving back to the verifying configuration after the first verification mechanism is moved away from the verifying configuration, andwherein the first verification mechanism is configured to quickly and easily move away from the verifying configuration such that the first verification mechanism does not inhibit the artifact from moving away from the first verifiable configuration, thereby allowing the artifact to remain in a readily accessible configuration while the first verification mechanism remains in a verifying configuration.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×