Method and system for deterring product counterfeiting, diversion and piracy
First Claim
Patent Images
1. A system comprising:
- a client including code generation logic to utilize data received from a host to generate a plurality of security codes and to direct a printing device to print the plurality of security codes on a plurality of products without retaining the plurality of security codes after the printing device has printed the plurality of security codes on the plurality of products; and
a host including code authentication logic to receive a code authentication request that includes a security code that has been printed on a particular product and to authenticate the security code by determining whether the security code was generated by the client.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating goods and thereby detecting and deterring counterfeits are disclosed. According to one aspect of the invention, a client utilizes data received from a host to generate a plurality of security codes and to direct a printing device to print the plurality of security codes on a plurality of products, without retaining the plurality of security codes after the printing device has printed the plurality of security codes on the plurality of products. After the security codes have been printed, a person can communicate the security code to the host, which can verify its authenticity.
-
Citations
24 Claims
-
1. A system comprising:
-
a client including code generation logic to utilize data received from a host to generate a plurality of security codes and to direct a printing device to print the plurality of security codes on a plurality of products without retaining the plurality of security codes after the printing device has printed the plurality of security codes on the plurality of products; and
a host including code authentication logic to receive a code authentication request that includes a security code that has been printed on a particular product and to authenticate the security code by determining whether the security code was generated by the client. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method comprising:
-
responsive to receiving data from a host, utilizing the data from the host to generate a plurality of security codes; and
directing a printing device to print the plurality of security codes on a plurality of goods without retaining the security codes after the printing device has printed the security codes on the plurality of goods. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method comprising:
-
receiving, over a network, a code authentication request including a security code that has been printed on a product; and
authenticating the security code without comparing the security code to a previously generated security code stored in a repository of previously generated security codes that have been printed on products. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification