Method and apparatus for counterfeiting protection
First Claim
1. A system for providing counterfeiting protection for an object, comprising:
- an affixer for affixing to an object an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature;
a first reading device for reading the first portion to thereby obtain a first set of information;
a transmitter for transmitting the first set of information to a remote location;
a receiver for receiving from the remote location a second set of information; and
a second reading device for reading the second portion using the second set of information to thereby determine the authenticity of the object.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosure relates generally to methods and apparatus for protecting against counterfeit products and for methods and apparatus for providing counterfeiting protection for an object. In one embodiment, the method includes the steps of: (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information to thereby determine the authenticity of the object.
48 Citations
55 Claims
-
1. A system for providing counterfeiting protection for an object, comprising:
-
an affixer for affixing to an object an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature;
a first reading device for reading the first portion to thereby obtain a first set of information;
a transmitter for transmitting the first set of information to a remote location;
a receiver for receiving from the remote location a second set of information; and
a second reading device for reading the second portion using the second set of information to thereby determine the authenticity of the object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. In a system for providing counterfeiting protection for an object where the system includes a writing device for placing an identifying mark on the object and a reading device for reading the identifying mark at a distribution point for the object, the improvement comprising:
-
said writing device further comprising circuitry for receiving a first set of information from a remote location and an affixer for placing an encrypted feature on said object as a function of said first set of information; and
said reading device further comprising circuitry for receiving a second set of information from said remote location wherein said second set of information includes instructions for the reading device to read said encrypted feature. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. In a system for providing counterfeiting protection for an object where the system includes a writing device for placing an identifying mark on the object during the manufacture of the object and a reading device for reading the identifying mark at a distribution point for the object, the improvement comprising:
said writing device configured to include an encrypted feature in the identifying mark wherein the encrypted feature is not known by either a manufacturer of the object during the manufacture thereof or by an operator of the reading device at said distribution point. - View Dependent Claims (50, 51, 52, 53, 54, 55)
Specification