Verification of authenticity of goods by use of random numbers
First Claim
1. A method of verifying the authenticity of goods, comprising the steps of:
- generating one or more combination codes, wherein each combination code has a random portion and a non-random portion;
encrypting the one or more combination codes;
associating the encrypted combination codes with one or more goods, wherein each of the goods has a unique encrypted combination code; and
examining goods to verify whether they are authentic, wherein examining the goods comprises;
reading the code associated with one of the one or more goods;
decrypting the code;
evaluating the decrypted code to verify whether the good is authentic, andwherein the method further includes detecting a diversion of goods from a desired channel or channels of distribution, wherein each desired channel of distribution has a unique encryption key to perform the encryption of the combination codes, and wherein examining of the goods comprises verifying whether an encryption key used for encrypting the combination codes on the inspected goods within the desired channel or channels of distribution matches the encryption key which is uniquely dedicated for the desired channel or channels of distribution, thereby identifying whether a diversion of goods has occurred.
2 Assignments
0 Petitions
Accused Products
Abstract
Method of verifying authenticity of goods uses combination codes that have a random portion and a non-random portion that includes at least a secret portion that is encrypted. The combination codes are encrypted and may be applied to goods and checked to determine authenticity of goods; the secret portion may be encrypted with a public key and can be decrypted, for example, using a corresponding private key. The authenticity may include whether or not a tax or duty has been paid. The checking may include checking, e.g., viewing the non-random portion of the decrypted combination code to determine whether it is the same as the non-random portion used to compose the combination code.
-
Citations
28 Claims
-
1. A method of verifying the authenticity of goods, comprising the steps of:
-
generating one or more combination codes, wherein each combination code has a random portion and a non-random portion; encrypting the one or more combination codes; associating the encrypted combination codes with one or more goods, wherein each of the goods has a unique encrypted combination code; and examining goods to verify whether they are authentic, wherein examining the goods comprises; reading the code associated with one of the one or more goods; decrypting the code; evaluating the decrypted code to verify whether the good is authentic, and wherein the method further includes detecting a diversion of goods from a desired channel or channels of distribution, wherein each desired channel of distribution has a unique encryption key to perform the encryption of the combination codes, and wherein examining of the goods comprises verifying whether an encryption key used for encrypting the combination codes on the inspected goods within the desired channel or channels of distribution matches the encryption key which is uniquely dedicated for the desired channel or channels of distribution, thereby identifying whether a diversion of goods has occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of verifying the authenticity of goods, comprising the steps of:
-
generating one or more combination codes, wherein each combination code has a random portion and a non-random portion; encrypting the one or more combination codes; associating the encrypted combination codes with one or more goods, wherein each of the goods has a unique encrypted combination code; and examining goods to verify whether they are authentic, wherein examining the goods comprises; reading the code associated with one of the one or more goods; decrypting the code; and evaluating the decrypted code to verify whether the good is authentic, wherein the non-random portion includes at least a secret portion that is encrypted, and wherein the secret portion is encrypted with a public key and can be decrypted with a corresponding private key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of verifying the authenticity of goods, comprising the steps of:
-
generating one or more combination codes, wherein each combination code has a random portion and a non-random portion; encrypting the one or more combination codes; associating the encrypted combination codes with one or more goods, wherein each of the goods has a unique encrypted combination code; and examining goods to verify whether they are authentic, wherein examining the goods comprises; reading the code associated with one of the one or more goods; decrypting the code; and evaluating the decrypted code to verify whether the good is authentic, and wherein the non-random portion of the combination code includes a secret encrypted portion containing tracking information, and wherein examining the goods comprises; decrypting the combination code; and decrypting the secret portion of the decrypted combination code to determine the tracking information. - View Dependent Claims (20, 21, 22)
-
-
23. A method of preparing authenticating indicia for items, comprising
composing a plurality of combination codes, each including a unique random portion and a non-random portion, and wherein the non-random portion includes at least a secret portion that is encrypted, encrypting the combination codes, and further comprising applying the encrypted combination codes to goods for use to determine whether a required tax or duty has been paid.
-
24. A method of checking authentication of an item identified by a respective encrypted combination code of a plurality of encrypted combination codes, each combination code including a unique random portion and a non-random portion, and wherein the non-random portion includes at least a secret portion that is encrypted, comprising
checking the decrypted combination code to determine whether the non-random portion is correct, said checking comprising viewing the non-random portion of the decrypted combination code to determine whether it is the same as the non-random portion used to compose the combination code.
-
25. A method of checking authentication of an item identified by a respective encrypted combination code of a plurality of encrypted combination codes, each combination code including a unique random portion and a non-random portion, and wherein the non-random portion includes at least a secret portion that is encrypted, comprising
checking the decrypted combination code to determine whether the non-random portion is correct, and if at the checking step the non-random portion is correct, the method further comprising further checking the decrypted combination code to determine whether the random portion of the decrypted combination code is unique.
-
27. A method of using coded information, comprising obtaining a random code intended to be coupled with a further non-random code, obtaining a non-random code including at least a secret portion that is encrypted so as to be decrypted only by use of a private key, combining the non-random code with the random code to obtain a combination code;
- encrypting the combination code;
applying the encrypted combination code or associating it with at least one of an object, item, good, or program; and
verifying authenticity of the at least one of the object, item, good, or program or of some characteristic of the at least one of the object, item, good, or program by decrypting that which was encrypted, including decrypting the secret portion by a private key. - View Dependent Claims (28)
- encrypting the combination code;
Specification