Authenticating and Managing Item Ownership and Authenticity
First Claim
Patent Images
1. A method for creating an authentication tag, the method comprising:
- communicating with a tagging device affixed to an item;
receiving tagging device data and item data from the tagging device, wherein the tagging device data comprises a first digital signature and a first time stamp;
sending the tagging device data and the item data to an authentication server;
receiving an authentication of the tagging device from the authentication server;
requesting an authentication tag based on the authentication of the tagging device; and
receiving the authentication tag, wherein the authentication tag comprises a second digital signature and a second time stamp.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for creating an authentication tag includes receiving, at an authentication server, tagging device data and item data from a tagging device, authenticating, by the authentication server, the tagging device using the tagging device data, generating an authentication tag, and sending, by the authentication server, the authentication tag to the electronic device. The tagging device is affixed to an item, and the authentication tag comprises a digital signature provided by the authentication server.
19 Citations
24 Claims
-
1. A method for creating an authentication tag, the method comprising:
-
communicating with a tagging device affixed to an item; receiving tagging device data and item data from the tagging device, wherein the tagging device data comprises a first digital signature and a first time stamp; sending the tagging device data and the item data to an authentication server; receiving an authentication of the tagging device from the authentication server; requesting an authentication tag based on the authentication of the tagging device; and receiving the authentication tag, wherein the authentication tag comprises a second digital signature and a second time stamp. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for creating an authentication tag, the method comprising:
-
receiving, at an authentication server, tagging device data and item data from a tagging device, wherein the tagging device is affixed to an item; authenticating, by the authentication server, the tagging device using the tagging device data; generating an authentication tag, wherein the authentication tag comprises a digital signature provided by the authentication server; and sending, by the authentication server, the authentication tag to the electronic device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 23, 24)
-
-
22. A method for creating an authentication tag, the method comprising:
-
receiving, at an electronic device, user credentials; sending, by the electronic device, the user credentials to an authentication server; receiving, at the electronic device, user verification based on the sending the user credentials to the authentication server, communicating with a tagging device affixed to an item; receiving, at the electronic device, tagging device data from the tagging device, wherein the tagging device data comprises a first digital signature and a first time stamp; sending, by the electronic device, the tagging device data and the item data to the authentication server; receiving, at the electronic device, an authentication of the tagging device from the authentication server; requesting, at the electronic device, an authentication tag based on the authentication of the tagging device; and receiving the authentication tag, wherein the authentication tag comprises a second digital signature and a second time stamp.
-
Specification