Duo Codes for Product Authentication
First Claim
1. A method for marking products comprising:
- marking the product with a first cipher text that is an encryption of a first code having an identification number and at least one switch bit; and
marking a component or a packaging of the product with a second cipher text that is an encryption of a second code having the identification number and the at least one switch bit, the at least one switch bit having a different value than in the first code.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that employ two or more cryptographically linked codes. The codes, when encrypted, become cipher texts that appear unrelated. The codes described herein are characterized by a series of bits including one or more switch bits. The cipher text of a code having a switch bit in one state will appear to be unrelated to the cipher text of another code differing only in that the switch bit is in the opposite state. The cryptographically linked codes can be used in various combinations, such as on a product and its packaging, on a product and a component of the product, on a certificate packaged with the product and on the packaging, or on outer and inner packagings of the product.
102 Citations
24 Claims
-
1. A method for marking products comprising:
-
marking the product with a first cipher text that is an encryption of a first code having an identification number and at least one switch bit; and marking a component or a packaging of the product with a second cipher text that is an encryption of a second code having the identification number and the at least one switch bit, the at least one switch bit having a different value than in the first code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for marking products comprising:
-
marking an outer packaging of the product with a first cipher text that is an encryption of a first code having an identification number and at least one switch bit; and marking an inner packaging of the product with a second cipher text that is an encryption of a second code having the identification number and the at least one switch bit, the at least one switch bit having a different value than in the first code. - View Dependent Claims (10, 11, 12)
-
-
13. A business method comprising:
selling a service including providing pairs of cipher texts, a first cipher text of each pair being an encryption of a first code, a second cipher text of each pair being an encryption of a second code, where each of the first and second codes consists of the same series of bits encoding the same identification number and at least one switch bit having a different value between the first and second codes; and receiving an activation notification for one of the first or second cipher texts of a provided pair of cipher texts. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
22. A computing system comprising:
-
logic configured to send pairs of cipher texts, a first cipher text of each pair being an encryption of a first code, and a second cipher text of each pair being an encryption of a second code, where each of the first and second codes consists of the same series of bits encoding the same identification number and at least one switch bit having a different value between the first and second codes; and logic configured to receive an activation notification for one of the cipher texts of one of the sent pairs of cipher texts. - View Dependent Claims (23, 24)
-
Specification