Secure authentication system for collectable and consumer items
First Claim
Patent Images
1. Establishment of an object'"'"'s unique id comprised of public key &
- private key encryption pairings Storage for date and time item placed into game Storage for date and time item was either created, distributed, placed into service, or purchased Storage for historic images or video of an event or object authentication of an item Registering existing collectables with ownership lineage being established such that even if another item has the unique ID, or the unique ID is stolen or removed from a device the ownership lineage will be used to identify the items compromised background. Recording of the exact position an RFID tag is embedded within or onto an object Permanent adhesion of an RFID tag on to an object Tamper proof RFID tag application Creation of the object'"'"'s “
life-cycle”
, such manufacturing, distribution, sales, ownership, and valuation details as records within a database Access to the object'"'"'s “
life-cycle”
data by successful authentication and validation challenges Identification of fraudulent or counterfeit items Registration of ownership rights to an object by using a product'"'"'s encrypted key Utilization of a trusted authority to perform irrefutable authentication services Utilization of a trusted reader to perform validated reading/interrogation of an RFID tag Establishment of a cohesive network of computers and servers to accomplish an encrypted key'"'"'s creation, the encrypted key writing into an RFID tag, the RFID tags placement into or onto an object, and the tracking of that object'"'"'s logistical data. The exact position of an RFID tag into or onto an object utilizing XRay, MRI, CatScan, or some other means to internally record the physical placement of the RFID tag
0 Assignments
0 Petitions
Accused Products
Abstract
A system and methods to authenticate collectable items using Unique Identifier (FIG. 1 element 110) housed within collectable item (FIG. 1 element 100) or attached to collectable item, Unique Identifier reader (FIG. 5 element 500), and
Authentication Authority database (FIG. 6 element 680). Cryptographic techniques and Authentication Unique data (FIG. 8) increases the authentication strength of collectable item and establish ownership lineage of collectable item.
234 Citations
1 Claim
-
1. Establishment of an object'"'"'s unique id comprised of public key &
- private key encryption pairings
Storage for date and time item placed into game Storage for date and time item was either created, distributed, placed into service, or purchased Storage for historic images or video of an event or object authentication of an item Registering existing collectables with ownership lineage being established such that even if another item has the unique ID, or the unique ID is stolen or removed from a device the ownership lineage will be used to identify the items compromised background. Recording of the exact position an RFID tag is embedded within or onto an object Permanent adhesion of an RFID tag on to an object Tamper proof RFID tag application Creation of the object'"'"'s “
life-cycle”
, such manufacturing, distribution, sales, ownership, and valuation details as records within a databaseAccess to the object'"'"'s “
life-cycle”
data by successful authentication and validation challengesIdentification of fraudulent or counterfeit items Registration of ownership rights to an object by using a product'"'"'s encrypted key Utilization of a trusted authority to perform irrefutable authentication services Utilization of a trusted reader to perform validated reading/interrogation of an RFID tag Establishment of a cohesive network of computers and servers to accomplish an encrypted key'"'"'s creation, the encrypted key writing into an RFID tag, the RFID tags placement into or onto an object, and the tracking of that object'"'"'s logistical data. The exact position of an RFID tag into or onto an object utilizing XRay, MRI, CatScan, or some other means to internally record the physical placement of the RFID tag
- private key encryption pairings
Specification