SECURITY CUSTOMIZATION SYSTEM AND METHOD
First Claim
Patent Images
1. A method for handling security customization data, said method comprising the steps of:
- a. accessing a database having one or more logical records containing receiver specific security information comprising origination information and designation information by a user;
b. verifying said security information using a controller for said database of security information to access a logical record comprising receiver record data;
c. generating marking information comprising the security information;
d. transferring the marking information to the printer via said controller after verification;
e. printing the marking information comprising a verifiable security marking usable for security image identification on the receiver in a manner that is out of local control and under control of the owner using access codes to access said remote database; and
f. updating the logical record during steps c-e.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system for generating security customization data that is stored in a database allowing the security feature to be transferred from the database to a local printer to be printed as a verifiable marking usable for security image identification without local intervention or knowledge. Database access is controlled using the one or more access codes in conjunction with a controller and database that are remote from the printer or has remote control so that only those with access to that portion of the database can make changes.
20 Citations
17 Claims
-
1. A method for handling security customization data, said method comprising the steps of:
-
a. accessing a database having one or more logical records containing receiver specific security information comprising origination information and designation information by a user; b. verifying said security information using a controller for said database of security information to access a logical record comprising receiver record data; c. generating marking information comprising the security information; d. transferring the marking information to the printer via said controller after verification; e. printing the marking information comprising a verifiable security marking usable for security image identification on the receiver in a manner that is out of local control and under control of the owner using access codes to access said remote database; and f. updating the logical record during steps c-e. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for printing security customization data, said system comprising:
-
a. controller to control access to a remote database comprising memory using an access code in conjunction with security information; b. database memory for storing a logical record comprising one or more one or more receiver ID records comprising human readable data and encodeable security instructions comprising origination information and designation information accessible by a user using a verifiable code to access said logical record by verifying said encodeable information; c. processor for generating marking information from stored marking information for printing said marking information;
[Note that this could be generated by another controller such as in printer or another source such as a cell phone];d. printer in communication with said database memory and processor for printing the marking information as a verifiable security marking usable for security image identification on the receiver after approval via controller; e. communication network for transferring said marking information instructions from the remote database to the printer. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer program product for handling security customization data, the computer program product comprising computer steps of:
-
a. generating a logical record corresponding to one or more receivers, said logical record including the state of the receiver data and security instructions comprising marking information instructions; b. generating marking information comprising to the security instructions; c. transferring the marking information to the printer; d. remotely printing the marking information as a verifiable security marking usable for security image identification on the receiver in a manner that is out of local control; e. controlling access to the logical record using the one or more access codes to download the marking information; and f. updating the logical record during steps c-e.
-
-
17. A method for handling security customization data, said method comprising the steps of:
-
a. generating an access code to a remote database corresponding to owner; b. accessing the remote database via a controller comprising security instructions including marking information instructions for a receiver using the access code; c. transferring said marking information instructions from said remote database to the printer during printing; d. initiating the receiver specific marking information instructions for a verifiable security marking (machine readable); e. printing on the receiver the verifiable security marking; and f. recording the printing-related events in the remote database.
-
Specification