Remote authentication of two dimensional barcoded indicia
First Claim
Patent Images
1. An indicia authentication system comprising:
- a franking device for embedding identification and encrypted device data into indicia and applying the indicia to an article; and
a computing device for utilizing the identification data to retrieve authentication data for deciphering the encrypted device data, wherein the computing is adapted to utilize the deciphered device data to determine the validity of the indicia.
2 Assignments
0 Petitions
Accused Products
Abstract
An indicia authentication system includes a franking device for embedding identification and encrypted authentication data into indicia and applying the indicia to an article, and a computing device for utilizing the identification data to retrieve a key for deciphering the encrypted authentication data, where the computing device is adapted to utilize the deciphered authentication data to determine the validity of the indicia.
33 Citations
16 Claims
-
1. An indicia authentication system comprising:
-
a franking device for embedding identification and encrypted device data into indicia and applying the indicia to an article; and
a computing device for utilizing the identification data to retrieve authentication data for deciphering the encrypted device data, wherein the computing is adapted to utilize the deciphered device data to determine the validity of the indicia. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of verifying the authenticity of indicia comprising:
-
embedding identification and encrypted device data into indicia;
utilizing the identification data to retrieve authentication data for deciphering the encrypted device data; and
utilizing the deciphered device data to determine the validity of the indicia. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of verifying the authenticity of indicia comprising:
-
providing device data to a first hash function to yield a first hash value;
providing the first hash value to a first digital signature function utilizing a device private key to yield a first digital signature value; and
incorporating an identifier, the first hash value and the first digital signature value into the indicia. - View Dependent Claims (14, 15, 16)
-
Specification