Method, apparatus, and system for determining a fraudulent item
First Claim
1. A method for determining if an item is a fraudulent item, the method comprising the steps of:
- obtaining a first number associated with the item or item'"'"'s packaging;
obtaining a second number associated with the item or item'"'"'s packaging;
utilizing a cryptographic process and the first number to cryptographically verify the second number; and
determining the product'"'"'s authenticity based on the verification.
2 Assignments
0 Petitions
Accused Products
Abstract
In order to address the need for detection of fraudulent items, a method, apparatus, and system for detection of fraudulent items is provided herein. Special anti-forgery Radio-Frequency identification (RFID) tags are utilized with additional measures to thwart would-be forgers. Each anti-forgery RFID tag comprises a unique, or semi-unique number that, along with a private key possessed by only the legitimate product manufacturer, determines a signature that is preferably printed on the product packaging. Utilizing the unique number on the anti-forgery RFID and a public key corresponding to the private key, the signature is verified by standard public-key cryptographic methods. The validation of the signature identifies the product'"'"'s authenticity.
-
Citations
18 Claims
-
1. A method for determining if an item is a fraudulent item, the method comprising the steps of:
-
obtaining a first number associated with the item or item'"'"'s packaging;
obtaining a second number associated with the item or item'"'"'s packaging;
utilizing a cryptographic process and the first number to cryptographically verify the second number; and
determining the product'"'"'s authenticity based on the verification. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of manufacturing a product in order to prevent forgery, the method comprising the steps of:
-
obtaining a tag comprising a first number;
determining a second number utilizing the first number and a cryptographic process, wherein cryptographic verification of the second number insures the product'"'"'s authenticity;
affixing the first number to either the product or the packaging associated with the product; and
affixing the second number to either the product or the packaging associated with the product. - View Dependent Claims (7, 8, 9)
-
-
10. A method comprising the steps of:
-
obtaining a first number from an RFID tag associated with an item;
obtaining a second number printed on the item or the item'"'"'s packaging;
utilizing a public key and the first number to verify the second number; and
determining the item'"'"'s authenticity based on the verification.
-
-
11. A method comprising the steps of:
-
obtaining an RFID tag comprising a first number;
utilizing a private key and the first number to create a second number such that cryptographic verification of the second number insures a product'"'"'s authenticity; and
affixing the second number and the RFID tag to the item or the item'"'"'s packaging.
-
-
12. An RFID tag comprising:
-
a first portion comprising product identification information; and
a second portion comprising an unalterable random or semi-random number, wherein the unalterable random or semi-random number is utilized along with a cryptographic signature to verify a products authenticity. - View Dependent Claims (13, 14)
-
-
15. A product scanner comprising:
-
an RF tag reader outputting contents of an RF tag;
a scanner outputting a cryptographic signature; and
logic circuitry having the contents of the RF tag and the cryptographic signature as an input and outputting information as to whether an item is a forgery. - View Dependent Claims (16)
-
-
17. An apparatus comprising:
-
an RF reader outputting contents of an RF tag;
logic circuitry having the contents of the RF tag as an input and outputting a cryptographic signature; and
printing circuitry having the cryptographic signature as an input and printing the cryptographic signature upon an item or packaging. - View Dependent Claims (18)
-
Specification