Authentication of products using identification tags
First Claim
Patent Images
1. An identification tag for authenticating a product, wherein the identification tag is associated with the product and has authentication data transmissible to a reader device;
- the authentication data comprising;
source data comprising a tag identifier that uniquely identifies the identification tag and a product identifier that identifies a property value of the product, wherein the property value is verifiable by a measurement of the product so that an authentic product is distinguishable from a non-authentic product on the basis of the property value; and
a signature value being a result of a private key encryption of a representation of the source data, wherein the private key encryption uses a private key of a public key encryption method.
2 Assignments
0 Petitions
Accused Products
Abstract
An identification tag for authenticating a product is associated with the product and has authentication data transmissible to a reader device. The authentication data include source data including a tag identifier that uniquely identifies the identification tag and a signature value that is a result of a private key encryption of a representation of the source data, where the private key encryption uses a private key of a public key encryption method.
-
Citations
38 Claims
-
1. An identification tag for authenticating a product, wherein the identification tag is associated with the product and has authentication data transmissible to a reader device;
- the authentication data comprising;
source data comprising a tag identifier that uniquely identifies the identification tag and a product identifier that identifies a property value of the product, wherein the property value is verifiable by a measurement of the product so that an authentic product is distinguishable from a non-authentic product on the basis of the property value; and
a signature value being a result of a private key encryption of a representation of the source data, wherein the private key encryption uses a private key of a public key encryption method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- the authentication data comprising;
-
12. A verification device for authenticating a product, wherein the verification device uses transmissible authentication data from an identification tag associated with the product;
- the verification device comprising;
a reader unit configured to read the authentication data from the identification tag; and
a decryption engine configured to;
identify source data and a signature value from the authentication data read by the reader unit, wherein the source data comprise a tag identifier that uniquely identifies the identification tag and a product identifier that identifies a property value of the product, wherein the property value is verifiable by a measurement of the product that an authentic product is distinguishable from a non-authentic product on the basis of the property value and wherein the signature value represents a result of a private key encryption of a representation of the source data, the private key encryption using a private key of a public key encryption method;
decrypt the signature value with a public key decryption using a public key, the public key decryption being applicable to decrypt data which have been encrypted with the private key encryption using the private key; and
check if the decrypted signature value is equal to the representation of the source data. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
- the verification device comprising;
-
22. A branding machine for writing at least one portion of authentication data to an identification tag, wherein the authentication data are transmissible from the identification tag to a reader unit of a verification device;
- the branding machine comprising;
an encryption engine configured to;
provide a tag identifier that identifies uniquely the identification tag and a product identifier that identifies a property value of the product, wherein the property value is verifiable by a measurement of the product so that an authentic product is distinguishable from a non-authentic product on the basis of the property value; and
compute a signature value that is a result of a private key encryption of a representation of source data that comprise the tag identifier and the product identifier, wherein the private key encryption uses a private key of a public key encryption method; and
a writing unit configured to write the signature value to the identification tag. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
- the branding machine comprising;
-
30. A system for authenticating a product comprising:
-
an identification tag associated with the product and including authentication data transmissible to a reader device for authenticating a product;
a verification device that uses the transmissible authentication data from the identification tag; and
a branding machine for writing at least one portion of authentication data to the identification tag, wherein the authentication data comprise source data including a tag identifier that uniquely identifies the identification tag and a product identifier that identifies a property value of the product, wherein the property value is verifiable by a measurement of the product so that an authentic product is distinguishable from a non-authentic product on the basis of the property value, wherein the source data comprise a signature value that is a result of a private key encryption of a representation of the source data, wherein the private key encryption uses a private key of a public key encryption method, wherein the verification device comprises the reader device, and wherein the reader device is configured to read the authentication data from the identification tag, wherein the verification device comprises a decryption engine configured to;
identify the source data and the signature value from the authentication data read by the reader device;
decrypt the signature value with a public key decryption using a public key, the public key decryption being applicable to decrypt data that have been encrypted with the private key encryption using the private key; and
check if the decrypted signature value is equal to the representation of the source data. wherein the branding machine comprises an encryption engine configured to;
provide the tag identifier and the product identifier; and
compute the signature value; and
wherein the branding device comprises a writing unit configured to write the signature value to the identification tag.
-
-
31. A computer implemented method for creating at least one portion of authentication data, wherein the authentication data are applicable to be stored on an identification tag;
- the method comprising;
providing a tag identifier that identifies uniquely the identification tag and a product identifier that identifies a property value of the product, wherein the property value is verifiable by a measurement of the product so that an authentic product is distinguishable from a non-authentic product on the basis of the property value;
computing a representation of source data that comprise the tag identifier and the product identifier; and
computing a signature value by encrypting the representation with a private key encryption, wherein the private key encryption uses a private key of a public key encryption method and wherein the authentication data comprise the source data and the signature value. - View Dependent Claims (32, 33, 34)
- the method comprising;
-
35. A computer implemented method for checking authentication data, wherein the authentication data have been read from an identification tag;
- the method comprising;
identifying source data from the authentication data, wherein the source data comprise a tag identifier which uniquely identifies the identification tag and a product identifier which specifies a means of obtaining a property value of the product, wherein the property value is verifiable by a measurement of the product so that an authentic product is distinguishable from a non-authentic product on the basis of the property value;
identifying a signature value from the authentication data, wherein the signature value represents a result of a private key encryption of a representation of the source data, the private key encryption using a private key of a public key encryption method;
computing the representation of the source data;
decrypting the signature value with a public key decryption using a public key, the public key decryption being applicable to decrypt data which have been encrypted with the private key encryption using the private key; and
checking if the decrypted signature value is equal to the representation of the source data. - View Dependent Claims (36, 37, 38)
- the method comprising;
Specification