AUTHENTICATION OF PACKAGED PRODUCTS
First Claim
1. A method for producing an authenticated packaged product, the method comprising:
- providing on the product a security code encoding security data for the product;
packing the product in packaging;
providing a tag carrying encrypted product data on the packaging, the product data comprising the security data;
storing a decryption key for the encrypted product data at a network server;
providing on the packaging access data for accessing the decryption key at the network server;
reading, using a verifier computer having reader apparatus operatively associated therewith, the encrypted product data from the tag, wherein the product data includes a unique product identifier for the product;
receiving the security code from the product and decoding the security code to obtain the security data for the product;
receiving the access data and communicating with the network server to obtain the decryption key;
decrypting the encrypted product data using the decryption key to obtain decrypted security data;
calculating a hash of the decrypted product identifier and sending the hash to the network server for storage at the server of use data, comprising the hash with the decryption key;
receiving from the server with the decryption key any use data stored with that key;
checking whether the hash of the decrypted product identifier matches a hash in the use data; and
verifying that the decrypted security data matches the security data for the product.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods are provided for producing an authenticated packaged product. The method includes providing on the product a security code encoding security data for the product, packing the product in packaging, and providing a tag carrying encrypted product data on the packaging. The product data comprises the security data for the product. The method further comprises storing a decryption key for the encrypted product data at a network server, and providing on the packaging access data for accessing the decryption key at the network server. Corresponding methods and systems are provided for verifying authenticity of such an authenticated packaged product.
-
Citations
25 Claims
-
1. A method for producing an authenticated packaged product, the method comprising:
-
providing on the product a security code encoding security data for the product; packing the product in packaging; providing a tag carrying encrypted product data on the packaging, the product data comprising the security data; storing a decryption key for the encrypted product data at a network server; providing on the packaging access data for accessing the decryption key at the network server; reading, using a verifier computer having reader apparatus operatively associated therewith, the encrypted product data from the tag, wherein the product data includes a unique product identifier for the product; receiving the security code from the product and decoding the security code to obtain the security data for the product; receiving the access data and communicating with the network server to obtain the decryption key; decrypting the encrypted product data using the decryption key to obtain decrypted security data; calculating a hash of the decrypted product identifier and sending the hash to the network server for storage at the server of use data, comprising the hash with the decryption key; receiving from the server with the decryption key any use data stored with that key; checking whether the hash of the decrypted product identifier matches a hash in the use data; and verifying that the decrypted security data matches the security data for the product. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 15, 16, 17)
-
-
11. (canceled)
-
13. (canceled)
-
14. (canceled)
-
18. A system for verifying authenticity of a packaged product, the system comprising a server storing a decryption key, and a verifier computer, having reader apparatus operatively associated therewith, are operable for communication with the server via a network, wherein:
the packaged product comprises; a security code on the product and encoding security data for the product; a packaging; a tag carrying encrypted product data on the packaging, the product data comprising the security data; a decryption key for the encrypted product data stored at a network server; and access data on the packaging for accessing the decryption key at the network server; the verifier computer is adapted to read, via the reader apparatus, the encrypted product data from the tag, wherein the product data includes a unique product identifier for the product, to receive the security code from the product and decode the security code to obtain the security data for the product, and to receive the access data and use the access data to send an access request for the decryption key to the server via the network; the server is adapted, in response to the access request, to send the decryption key to the verifier computer via the network; and the verifier computer is further adapted to decrypt the encrypted product data using the decryption key to obtain decrypted security data, to calculate a hash of the decrypted product identifier and to send the hash to the network server for storage at the server of use data, comprising the hash with the decryption key, to receive from the server with the decryption key any use data stored with that key, to check whether the hash of the decrypted product identifier matches a hash in the use data; and
to verify that the decrypted security data matches the security data for the product.
-
19. A packaged product comprising:
-
a security code on the product, the security code encoding security data for the product; a tag carrying encrypted product data on the packaging, the product data comprising said security data; and access data, for accessing a decryption key for the encrypted product data at a network server storing the decryption key, on the packaging. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification