Method and apparatus for counterfeiting protection
First Claim
1. A method comprising:
- receiving an object having an identifying mark,locating said identifying mark associated with said object and place said identifying mark in proximity to a reading device;
reading said identifying mark with said reading device to determine whether said identifying mark includes a first portion;
when said identifying mark includes said first portion, reading said first portion to thereby obtain a first set of information;
transmitting the first set of information to a remote location;
determining at the remote location a second set of information based on the received first set of information;
receiving from the remote location the second set of information;
using said second set of information, optically investigating said identifying mark to determine whether said identifying mark includes a second portion;
when said identifying mark includes said second portion, reading said second portion with said reading device to thereby obtain a third set of information;
transmitting the third set of information to said remote location; and
using said third set of information, determining at said remote location whether said second portion includes a feature encrypted according to a pre-determined method and verifying at said remote location authenticity of said encrypted feature if determined to be present in said second portion.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure relates generally to methods and apparatus for protecting against counterfeit products and for methods and apparatus for providing counterfeiting protection for an object. In one embodiment, the method includes the steps of: (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information to thereby determine the authenticity of the object.
-
Citations
11 Claims
-
1. A method comprising:
-
receiving an object having an identifying mark, locating said identifying mark associated with said object and place said identifying mark in proximity to a reading device; reading said identifying mark with said reading device to determine whether said identifying mark includes a first portion; when said identifying mark includes said first portion, reading said first portion to thereby obtain a first set of information; transmitting the first set of information to a remote location; determining at the remote location a second set of information based on the received first set of information; receiving from the remote location the second set of information; using said second set of information, optically investigating said identifying mark to determine whether said identifying mark includes a second portion; when said identifying mark includes said second portion, reading said second portion with said reading device to thereby obtain a third set of information; transmitting the third set of information to said remote location; and using said third set of information, determining at said remote location whether said second portion includes a feature encrypted according to a pre-determined method and verifying at said remote location authenticity of said encrypted feature if determined to be present in said second portion. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
receiving a first request from a manufacturer of an object desirous of preventing counterfeiting of said object; generating an encryption feature for said object at a facility remote from where said object is to be manufactured; and sending said encryption feature to said manufacturer to be included as part of an identification mark to be placed on said object during manufacture thereof, wherein content of said encryption feature is not known by said manufacturer. - View Dependent Claims (5, 6)
-
-
7. An apparatus configured to perform the following:
-
receive a first request from a manufacturer of a product desirous of preventing counterfeiting of said product; generate an encrypted feature for said product; and send said encrypted feature to said manufacturer without making content of said encrypted feature known to said manufacturer, wherein said encrypted feature is to be included as part of an identification mark to be placed on said product during manufacture thereof. - View Dependent Claims (8)
-
-
9. An apparatus configured to perform the following:
-
read an identifying mark associated with an object; determine if the identifying mark includes a first portion and a second portion; determine if the second portion includes a feature encrypted according to a predetermined encryption method; attempt to verify if said encrypted feature is authentic; indicate a lack of authenticity of the object upon the occurrence of one or more of the following;
an absence of said first portion from said identifying mark, an absence of said second portion from said identifying mark, an absence of said feature in said second portion encrypted according to the predetermined encryption method, or a failure to verify authenticity of said encrypted feature; andindicate authenticity of the object upon the occurrence of all of the following;
a determination that said first and said second portions are present in said identifying mark, a determination that said feature encrypted according to the predetermined encryption method is present in said second portion, and a successful verification of authenticity of said encrypted feature. - View Dependent Claims (10, 11)
-
Specification