Method and apparatus for counterfeiting protection
First Claim
1. A method for providing counterfeiting protection for an object, comprising the steps of:
- (a) affixing to an object an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature;
(b) reading the first portion to thereby obtain a first set of information;
(c) transmitting the first set of information to a remote location;
(d) receiving from the remote location a second set of information; and
(e) reading the second portion using the second set of information to thereby determine the authenticity of the object.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure relates generally to methods and apparatus for protecting against counterfeit products and for methods and apparatus for providing counterfeiting protection for an object. In one embodiment, the method includes the steps of: (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information to thereby determine the authenticity of the object.
-
Citations
59 Claims
-
1. A method for providing counterfeiting protection for an object, comprising the steps of:
-
(a) affixing to an object an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature;
(b) reading the first portion to thereby obtain a first set of information;
(c) transmitting the first set of information to a remote location;
(d) receiving from the remote location a second set of information; and
(e) reading the second portion using the second set of information to thereby determine the authenticity of the object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. In a method for providing counterfeiting protection for an object including the steps of:
-
affixing an identifying mark on the object, and reading the identifying mark at a distribution point for the object, the improvement comprising;
affixing a feature on the object wherein the feature is encrypted according to a predetermined encryption method comprising obtaining from a remote location a first set of information to direct the affixing of the feature on the object; and
obtaining from the remote location a second set of information for reading the feature. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. In a method for providing counterfeiting protection for an object where an identifying mark is placed on the object during the manufacture of the object and the identifying mark is read by a reading device at a distribution point for the object, the improvement comprising:
including an encrypted feature in the identifying mark wherein the encrypted feature is not known by either a manufacturer of the object during the manufacture thereof or by an operator of the reading device at said distribution point. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59)
Specification