System and method for tracking and authenticating items through an internet web site
First Claim
Patent Images
1. A method of securely tracking an item using an internet web site for a user to verify that the item is genuine, comprising:
- entering a code to obtain secure access to the web site;
selecting the item from a list on the web site;
determining whether the code is authentic;
allowing modification of tracking data if the code is determined to be authentic; and
sending an alert as to a fraud potential if the code is determined to be not authentic.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of securely tracking an item using an internet web site for a user to verify that the item is genuine, comprises entering a code to obtain secure access to the web site; selecting the item from a list on the web site; determining whether the code is authentic; allowing modification of tracking data if the code is determined to be authentic; and sending an alert as to a fraud potential if the code is determined to be not authentic.
-
Citations
18 Claims
-
1. A method of securely tracking an item using an internet web site for a user to verify that the item is genuine, comprising:
-
entering a code to obtain secure access to the web site;
selecting the item from a list on the web site;
determining whether the code is authentic;
allowing modification of tracking data if the code is determined to be authentic; and
sending an alert as to a fraud potential if the code is determined to be not authentic. - View Dependent Claims (2, 3, 4)
-
-
5. A method of defining and customizing a web site for a user to verify that an item is genuine, comprising:
-
adding the item onto a database linked to the web site to create an item record;
adding a name or a character identifying a substrate attached to the item; and
assigning a security access level to the user on the web site. - View Dependent Claims (6, 7, 8)
-
-
9. A method of entering security data on a web site for a user to verify that a an item is genuine, comprising:
-
entering a code to obtain secure access to the web site;
selecting the item from a list on the web site;
modifying information relating to a substrate attached to the item; and
saving the modified information onto a database linked to the web site. - View Dependent Claims (10, 11)
-
-
12. A method of securely investigating an item using an internet web site for an investigator to verify that the item is genuine, comprising:
-
entering a code to obtain secure access to the web site;
selecting the item from a list on the web site;
determining whether the code is authentic;
allowing the investigator to inquire about the item if the code is determined to be authentic; and
sending an alert as to a fraud potential if the code is determined to be not authentic. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of performing security management on an investigator using an internet web site that allows a user to view a record of the investigator, comprising:
-
identifying the investigator;
requesting a report based on the identification on items scanned by the investigator to determine whether the items are genuine; and
limiting the items scanned by the investigator to a desired period of time. - View Dependent Claims (18)
-
Specification