×

Security method with applied invisible security code markings

  • US 5,083,814 A
  • Filed: 03/27/1991
  • Issued: 01/28/1992
  • Est. Priority Date: 03/27/1991
  • Status: Expired due to Fees
First Claim
Patent Images

1. A security method for applying invisible security markings to articles such as automobiles, boating equipment, objects of art and collectibles, comprising:

  • a. supplying an installer of said security markings with equipment comprising a unit having a keyboard for data entry, a visual screen for monitoring the data entry procedure and for displaying information on the locations on an article where it is to be marked with invisible security markings, with the unit having a memory programmed with sets of many possible marking sites for different particular types of articles, portable and a hand-held marking device;

    b. recording and inputting data, with said unit, necessary to institute a subscription to the security method such as a subscriber'"'"'s name and address, a description of the article to be protected, and the manufacturer serial number of the article;

    c. selecting different locations on the article to which invisible security markings are to be applied by reading from said memory a programmed set of possible marking locations for the particular type of article, with the number of locations and the particular selected locations being selected differently from article to article;

    d. instructing the installer on the precise locations where the article is to be marked by displaying information on those locations on the display screen;

    e. covertly selecting, without disclosure to either installer or subscriber, a unique and confidential registration code which is to be applied to all selected locations on the article;

    f. applying the registration code to the selected locations on the article with said hand-held marking device with markings which are invisible to the human eye; and

    g. transferring the subscriber information, confidential registration code, and locations of all invisible security markings to a limited-access central data base.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×