COLLABORATIVE PRODUCT AUTHENTICATION
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving an identification of an RFID tag from a mobile device;
identifying a product associated with the identification;
identifying a keeper associated with the product;
providing the keeper to the mobile device;
receiving authentication information associated with the product from the mobile device, wherein the authentication information includes whether the product is genuine or counterfeit;
associating the authentication information with the product and the keeper; and
evaluating the authentication information.
1 Assignment
0 Petitions
Accused Products
Abstract
An identification of an RFID tag is received from a mobile device. A product associated with the identification is identified, and a keeper associated with the product is identified. The keeper is provided to the mobile device, and a selection of the keeper is received from the mobile device. Authentication information associated with the product and the keeper is identified, and the authentication information is provided to the mobile device.
58 Citations
19 Claims
-
1. A computer-implemented method, comprising:
-
receiving an identification of an RFID tag from a mobile device; identifying a product associated with the identification; identifying a keeper associated with the product; providing the keeper to the mobile device; receiving authentication information associated with the product from the mobile device, wherein the authentication information includes whether the product is genuine or counterfeit; associating the authentication information with the product and the keeper; and evaluating the authentication information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method, comprising:
-
receiving an identification of an RFID tag from a mobile device, wherein the identification of an RFID tag is received by a scan of the RFID tag by the mobile device; identifying a product associated with the identification; identifying a keeper associated with the product; providing the keeper to the mobile device; receiving a selection of the keeper from the mobile device; identifying authentication information associated with the product and the keeper; and providing the authentication information to the mobile device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-implemented method, comprising:
-
receiving an identification of an RFID tag associated with a product; providing the identification to a product authentication system; receiving a keeper associated with the product based on the identification, wherein the keeper is one of a merchant that sells the product or a merchant that stores the product; in response to receiving the keeper, receiving a selection of authentication information associated with the product; and providing the authentication information associated with the product to the product authentication system. - View Dependent Claims (12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
receiving an identification of an RFID tag associated with a product; providing the identification to a product authentication system; receiving a keeper associated with the product based on the identification; and in response to receiving a selection of the keeper, receiving and displaying authentication information associated with the product. - View Dependent Claims (16, 17, 18)
-
-
19. A system, comprising:
-
a mobile device that receives an identification of an RFID tag associated with a product, provides the identification to an identification engine, receives a keeper associated with the product based on the identification, and in response to receiving the keeper, receives a selection of authentication information associated with the product, and provides the authentication information associated with the product to the product authentication engine; and an identification engine that receives the identification, identifies the keeper associated with the product, provides the keeper to the mobile device, receives the authentication information associated with the product from the mobile device, associates the authentication information with the product and the keeper, and evaluates the authentication information.
-
Specification