Method and apparatus for article authentication
First Claim
1. An authentication method for authenticating an article in a device, the method comprising the steps of:
- reading an identification number stored on the article;
reading an authentication number stored on the article;
determining an input number based at least in part on the identification number;
applying an authentication function to the input number to calculate an output number, wherein the authentication function is an encryption transformation of the input number, wherein the step of applying the authentication function further comprises the steps of;
providing a first prime number, Q;
providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; and
calculating the output number according to the formula;
output number=MN MOD Q,where N is the input number,wherein the second prime number is selected such that the second prime number is greater than 0, the second prime number is not equal to 1, and the second prime number is not equal to one-half of, the first prime number minus 1; and
determining that the article is authentic only if the authentication number corresponds to the output number.
9 Assignments
0 Petitions
Accused Products
Abstract
An authentication method for authenticating an article in a device includes the steps of a) reading an identification number stored on the article, b) reading an authentication number stored on the article, c) determining an input number based at least in part on the identification number, d) applying an authentication function to the input number to calculate an output number, e) determining that the article is authentic only if the authentication number corresponds to the output number, and f) permitting use of the article in the device if the article is authentic, and disabling use of the article in the device if the article is not authentic.
119 Citations
108 Claims
-
1. An authentication method for authenticating an article in a device, the method comprising the steps of:
-
reading an identification number stored on the article; reading an authentication number stored on the article; determining an input number based at least in part on the identification number; applying an authentication function to the input number to calculate an output number, wherein the authentication function is an encryption transformation of the input number, wherein the step of applying the authentication function further comprises the steps of; providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the input number, wherein the second prime number is selected such that the second prime number is greater than 0, the second prime number is not equal to 1, and the second prime number is not equal to one-half of, the first prime number minus 1; and determining that the article is authentic only if the authentication number corresponds to the output number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An authentication method for authenticating an article in a device, the method comprising the steps of:
-
reading an identification number stored on the article; reading an authentication number stored on the article; determining an input number based at least in part on the identification number; applying an authentication function to the input number to calculate an output number, wherein the authentication function is an encryption transformation of the input number, wherein the step of applying the authentication function further comprises the steps of; providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the input number, and determining that the article is authentic only if the authentication number corresponds to the output number, wherein said calculating step comprises; a) initializing a partial product by; setting a multiplier equal to the second prime number; setting the partial product equal to 1 if the least significant bit of the input number is equal to 0; setting the partial product equal to the multiplier modulo the first prime number if the least significant bit of the input number is equal to 1; b) from the least significant bit to the most significant bit of the input number, for each such bit, iteratively evaluating the partial product by; doubling the multiplier; resetting the partial product equal to the prior partial product modulo the first prime number if a next unevaluated bit of the input number is equal to 0; resetting the partial product equal to (a) the prior partial product times the modulo of the multiplier over the second prime number (b) modulo the second prime number, if said next unevaluated bit of the input number is equal to 1; and c) concluding said iterative evaluation of the partial product after evaluating the partial product for the most significant bit of the input number. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An authentication method for authenticating an article in a device, the method comprising the steps of:
-
reading an identification number stored on the article; reading an authentication number stored on the article; determining an input number based at least in part on the identification number; applying an authentication function to the input number to calculate an output number; determining that the article is authentic only if the authentication number corresponds to the output number; and providing a counter on the article, the counter configured to be read by the device; periodically updating an article usage value in the counter as the article is used to reflect an extent of usage or depletion of the article; reading the article usage value by the device; and determining that the article is authentic only if the article usage value is greater than a predetermined value. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A device configured to authenticate an article installable in the device, the device comprising:
-
a reader adapted to read an identification number stored on the article, the identification number corresponding to an identification of the article, the reader further adapted to read an authentication number stored on the article; and a memory of the device containing a computer program configured to transform the identification number into an output number and compare the output number to the authentication number, and the article being authenticated only if the output number is equal to the authentication number, wherein the computer program that transforms the identification number into an output number comprises; a preparatory computer program in a memory of the device configured to transform the identification number into an intermediate number; and an encryption computer program in a memory of the device configured to encrypt the intermediate number to provide the output number, and wherein the output number is compared to the authentication number to determine the authenticity of the article in the device. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A device configured to authenticate an article installable in the device, the device comprising:
-
a reader adapted to read an identification number stored on the article, the identification number corresponding to an identification of the article, the reader further adapted to read an authentication number stored on the article; and a memory of the device containing a computer program configured to transform the identification number into an output number and compare the output number to the authentication number, and the article being authenticated only if the output number is equal to the authentication number, wherein the reader is configured to read a media type number stored on the article. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A device configured to authenticate an article installable in the device, the device comprising:
-
a reader adapted to read an identification number stored on the article, the identification number corresponding to an identification of the article, the reader further adapted to read an authentication number stored on the article; a memory of the device containing a computer program configured to transform the identification number into an output number and compare the output number to the authentication number, and the article being authenticated only if the output number is equal to the authentication number; and a counter on the article, the counter configured to be read by the device wherein the reader reads an article usage value in the counter, the article usage value reflecting an extent of usage or depletion of the article. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
-
59. A device configured to authenticate an article installable in the device, the device comprising:
-
a reader adapted to read an identification number stored on the article, the identification number corresponding to an identification of the article, the reader further adapted to read an authentication number stored on the article; and a memory of the device containing a computer program configured to transform the identification number into an output number and compare the output number to the authentication number, and the article being authenticated only if the output number is equal to the authentication number, wherein the memory further includes a table accessible by the device, the table containing the identification numbers corresponding to a plurality of the articles used in the device; and
each identification number having an associated entry in the table corresponding to a last read article usage value of each article used in the device, andwherein the computer program determines that the article installed in the device is authentic only if its article usage value is less than the last read article usage value for the corresponding identification number in the table. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
-
71. An article adapted to be authenticated by a host device, the article comprising a memory system configured to store a first predetermined number and an authentication number, the first predetermined number corresponding to an identification of the article,
wherein the authentication number is calculated by: -
providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the first predetermined number, wherein the second prime number is selected such that the second prime number is greater than 0, the second prime number is not equal to 1, and the second prime number is not equal to one-half of, the first prime number minus 1. - View Dependent Claims (72, 73, 74)
-
-
75. An article adapted to be authenticated by a host device, the article comprising a memory system configured to store a predetermined number and an authentication number, the predetermined number corresponding to an identification of the article,
wherein the authentication number is calculated by: -
providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the predetermined number, wherein the step of calculating the output number further comprises the steps of; a) initializing a partial product by;
setting a multiplier equal to the second prime number;
setting the partial product equal to 1 if the least significant bit of the predetermined number is equal to 0;
setting the partial product equal to the multiplier modulo the first prime number if the least significant bit of the predetermined number is equal to 1;b) evaluating the partial product iteratively from the least significant bit of the predetermined number to the most significant bit of the predetermined number by;
doubling the multiplier;
resetting the partial product equal to the prior partial product modulo the first prime number if a next unevaluated bit of the predetermined number is equal to 0;
resetting the partial product equal to (a) the prior partial product times the modulo of the multiplier over the second prime number (b) modulo the second prime number, if said next unevaluated bit of the predetermined number is equal to 1; andc) terminating the iteratively evaluation of the partial product after evaluating the partial product for the most significant bit of the predetermined number. - View Dependent Claims (76, 77, 78)
-
-
79. An authentication method for authenticating an article in a device, the method comprising the steps of:
-
reading a selected number; reading an authentication number, wherein at least one of the selected number or authentication number are stored on the article; determining an input number based at least in part on the selected number; applying an authentication function to the input number to calculate an output number, wherein the authentication function is an encryption transformation of the input number, wherein the step of applying the authentication function further comprises the steps of; providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the input number, wherein the second prime number is selected such that the second prime number is greater than 0, not equal to 1, and not equal to one-half of, the first prime number minus 1; and determining that the article is authentic only if the authentication number corresponds to the output number. - View Dependent Claims (80, 81, 82, 83, 84)
-
-
85. An authentication method for authenticating an article in a device, the method comprising the steps of:
-
reading a selected number; reading an authentication number, wherein at least one of the selected number or authentication number are stored on the article; determining an input number based at least in part on the selected number; applying an authentication function to the input number to calculate an output number, wherein the authentication function is an encryption transformation of the input number, wherein the step of applying the authentication function further comprises the steps of; providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the input number, and determining that the article is authentic only if the authentication number corresponds to the output number, wherein said calculating step comprises; a) initializing a partial product by; setting a multiplier equal to the second prime number; setting the partial product equal to 1 if the least significant bit of the input number is equal to 0; setting the partial product equal to the multiplier modulo the first prime number if the least significant bit of the input number is equal to 1; b) from the least significant bit to the most significant bit of the input number, for each such bit, iteratively evaluating the partial product by; doubling the multiplier; resetting the partial product equal to the prior partial product modulo the first prime number if a next unevaluated bit of the input number is equal to 0; resetting the partial product equal to (a) the prior partial product times the modulo of the multiplier over the second prime number (b) modulo the second prime number, if said next unevaluated bit of the input number is equal to 1; and c) concluding said iterative evaluation of the partial product after evaluating the partial product for the most significant bit of the input number. - View Dependent Claims (86, 87, 88, 89, 90, 91)
-
-
92. An authentication method for authenticating an article in a device, the method comprising the steps of:
-
reading a selected number; reading an authentication number, wherein at least one of the selected number or authentication number are stored on the article; determining an input number based at least in part on the selected number; applying an authentication function to the input number to calculate an output number; determining that the article is authentic only if the authentication number corresponds to the output number; and providing a counter on the article, the counter configured to be read by the device; periodically updating an article usage value in the counter as the article is used to reflect an extent of usage or depletion of the article; reading the article usage value by the device; and determining that the article is authentic only if the article usage value is greater than a predetermined value. - View Dependent Claims (93, 94, 95, 96, 97, 98)
-
-
99. An article adapted to be authenticated by a host device, the article comprising a memory configured to store at least one of a selected number or an authentication number,
wherein the authentication number is calculated by: -
providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the selected number, wherein the second prime number is greater than 0, not equal to 1, and not equal to one-half of, the first prime number minus 1. - View Dependent Claims (100, 101, 102, 103)
-
-
104. An article adapted to be authenticated by a host device, the article comprising a memory system configured to store at least one of a selected number or an authentication number,
wherein the authentication number is calculated by: -
providing a first prime number, Q; providing a second prime number, M;
the second prime number being a primitive element of the prime Galois Field of the first prime number; andcalculating the output number according to the formula; output number=MN MOD Q, where N is the selected number, wherein the step of calculating the output number further comprises the steps of; a) initializing a partial product by;
setting a multiplier equal to the second prime number;
setting the partial product equal to 1 if the least significant bit of the predetermined number is equal to 0;
setting the partial product equal to the multiplier modulo the first prime number if the least significant bit of the predetermined number is equal to 1;b) evaluating the partial product iteratively from the least significant bit of the predetermined number to the most significant bit of the predetermined number by;
doubling the multiplier;
resetting the partial product equal to the prior partial product modulo the first prime number if a next unevaluated bit of the predetermined number is equal to 0;
resetting the partial product equal to (a) the prior partial product times the modulo of the multiplier over the second prime number (b) modulo the second prime number, if said next unevaluated bit of the predetermined number is equal to 1; andc) terminating the iteratively evaluation of the partial product after evaluating the partial product for the most significant bit of the predetermined number. - View Dependent Claims (105, 106, 107, 108)
-
Specification