Method And Device For Identifying Objects
First Claim
1. A method for identifying an object, comprising at least one object identifier, with an object code that is used to verify the authenticity of the object, comprising the steps:
- a) generating of a unique random system code, which consists of a first and a second part of the system code, in which the first part of the system code is created from a first character set by a first random method and the second part of the system code from a second character set by a second random method, and storing the system code together with at least a first object-specific information in a first data memory, in which the first part of the system code is encrypted by a first encryption method and the second part of the system code by a second encryption method, which uses the first part of the system code as key, before storing them;
b) generating of a random encryption key from a third character set by a third random method;
of a unique assignment identifier by an assignment method and storing the encryption key, the assignment identifier and at least a second object-specific information in a second data memory;
c) generating of an object code, which consists of at least the first part of the system code and the assignment identifier;
encrypting of the system code by a third encryption method, which uses the encryption key as key;
encrypting of the object identifier by a fourth encryption method which uses the system code as key; and
storing the encrypted system code together with the encrypted object identifier in a third data memory;
d) attaching the object code to the object;
wherein the method provides a fourth data memory, in which query-specific data created during the verification of the authenticity of the object is stored.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for identifying an object comprising at least one object identifier with an object code that is used to verify the authenticity of the object. The method comprises the following steps: creation of a unique random system code consisting of a first and a second system code, the first part of the system code being generated from a first character set by a first random method and the second part of the system code being generated from a second character set by a second random method and saving of the system code together with at least one first object-specific information in a first data memory, the first part of the system code being encrypted by a first encryption method and the second part of the system code by a second encryption method prior to being saved; creation of a random encryption key from a third character set by a third random method, creation of a unique assignment identifier by an assignment method and saving of the encryption key, assignment identifier and at least one second object-specific piece of information in a second data memory; creation of the object code, consisting of the first part of the system code and the assignment key, encryption of the object identifier by a fourth encryption method and saving of the encrypted system code together with the encrypted object identifier in a third data memory; and attachment of the object code to the object.
-
Citations
20 Claims
-
1. A method for identifying an object, comprising at least one object identifier, with an object code that is used to verify the authenticity of the object, comprising the steps:
-
a) generating of a unique random system code, which consists of a first and a second part of the system code, in which the first part of the system code is created from a first character set by a first random method and the second part of the system code from a second character set by a second random method, and storing the system code together with at least a first object-specific information in a first data memory, in which the first part of the system code is encrypted by a first encryption method and the second part of the system code by a second encryption method, which uses the first part of the system code as key, before storing them; b) generating of a random encryption key from a third character set by a third random method;
of a unique assignment identifier by an assignment method and storing the encryption key, the assignment identifier and at least a second object-specific information in a second data memory;c) generating of an object code, which consists of at least the first part of the system code and the assignment identifier;
encrypting of the system code by a third encryption method, which uses the encryption key as key;
encrypting of the object identifier by a fourth encryption method which uses the system code as key; and
storing the encrypted system code together with the encrypted object identifier in a third data memory;d) attaching the object code to the object; wherein the method provides a fourth data memory, in which query-specific data created during the verification of the authenticity of the object is stored. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18, 19, 20)
-
-
11. A device for identifying an object with an object code, comprising at least one object identifier, which is used for the verification of the authenticity of the object, comprising:
-
a System Code Creation Facility, which is configured to create a unique random system code, which consists of a first and a second part of the system code, wherein the first part of the system code is created from a first character set by a first random method and the second part of the system code is created from a second character set by a second random method; a First Data Memory Facility, which is configured to store the system code created by the System Code Creation Facility together with at least a first object-specific information, wherein, before storing, the first part of the system code is encrypted by a first encryption method and the second part of the system code is encrypted by a second encryption method, which uses the first part of the system code as key; an Encryption Key Creation Facility, which is configured to create a random encryption key from a third character set by a third random method and a unique assignment identifier by an assignment method; a Second Data Memory Facility, which is configured to store the created encryption key, the assignment identifier and at least a second object-specific information; an Object Code Creation Facility, which is configured to create an object code, which consists of at least the first part of the system code and the assignment identifier;
a Third Data Memory Facility, which is configured to store the system code encrypted by a third encryption method, which uses the encryption key as key, together with the object identifier, which is encrypted by a fourth encryption method which uses the system code as key;an Object Code Attachment Facility, which is configured to attach the object code to the object; and a fourth Data Memory Facility, which is configured to store query-specific data, which is generated during the verification of the authenticity of the object. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification