×

Method of Authentication of the Items Put Into Circulation

  • US 20090006255A1
  • Filed: 11/29/2006
  • Published: 01/01/2009
  • Est. Priority Date: 01/13/2006
  • Status: Abandoned Application
First Claim
Patent Images

1. Method of authenticating items put into circulation wherein the authentication system administrator, at the request of an authentic product manufacturer, generates and provides the item manufacturer with the specified quantity of authentication marks each of which contains a set of symbols one part of which is open for reading (overt) and is the serial number of the authentication mark, and the other part of which is covered with a protective media a not allowing its visual perception (covert) and is the identification combination, following which the manufacturer marks items put into circulation with the authentication marks provided by the authentication system administrator by attaching authentication marks to the products in such a manner that reading the identification combination is impossible without causing permanent damage to the protective media, and provides the authentication system administrator with a description of the items bearing such authentication marks, a person participating in the circulation of authentication mark bearing items and interested in its authentication removes the protective media after checking its integrity, reads the identification combination and forwards a request to the authentication system administrator containing the serial number and the identification combination of the item authentication mark via any communication means available, the authentication system administrator checks the identification combination contained in the request against the identification combination whose serial number in the authentication database coincides with the serial number of the item and, if the respective identification combinations coincide, forwards to the person performing the item authentication procedure the description of the item that is available in the database as related to the authentication mark provided by that person, and the person performing authentication concludes as to the authenticity of the item if the product description in this person'"'"'s possession coincides with the product description received from the authentication system authentication system administrator.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×