Method and device for product and document authentication
First Claim
Patent Images
1. A device comprising:
- a user-operable data code entry port;
a code receiver configured to receive an authentication code from an object;
a memory coupled to the receiver and configured to store the authentication code and the data code; and
a processor coupled to the memory and having executable instructions configured to classify a combination of the authentication code and the data code based on a comparison of the authentication code, the data code and a database, the database including verified authentication data.
1 Assignment
0 Petitions
Accused Products
Abstract
Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a replacement authentication code is generated based on the original authentication code and party-specific code. Documents and currencies can be authenticated independently of any party-specific code by an addition to or alteration of their authentication code with each authentication event.
58 Citations
25 Claims
-
1. A device comprising:
-
a user-operable data code entry port;
a code receiver configured to receive an authentication code from an object;
a memory coupled to the receiver and configured to store the authentication code and the data code; and
a processor coupled to the memory and having executable instructions configured to classify a combination of the authentication code and the data code based on a comparison of the authentication code, the data code and a database, the database including verified authentication data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a data receiver configured to receive an authentication code from an object and configured to receive an identity code from a user;
a communication network coupled to the data receiver wherein the network is configured to communicate data based on the authentication code and the identity code;
a database coupled to the communication network wherein the database includes verified data including a plurality of authentication codes;
a processor coupled to the communication network and configured to classify authenticity based on stored data in the database, the authentication code and the identity code; and
an output device communicatively coupled to the processor and configured to render a notification based on the classification. - View Dependent Claims (9, 10)
-
-
11. A method comprising:
-
accessing an object;
associating an authentication code with the object; and
storing the authentication code in a memory, the memory coupled to a processor configured to correlate a party-specific code with the authentication code in response to an authentication query, the party-specific code received with the authentication query. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
receiving an authentication code associated with an object;
receiving a user entered identity code at a processor;
executing an instruction set on the processor to classify authenticity of the object as a function of the authentication code, the identity code and a stored code, the stored code received from a verified supplier; and
signaling an outcome based on the classifying. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification