Configuration system and method
First Claim
Patent Images
1. An authentication method comprising:
- reading a random covert identifier associated with a product;
reading a unique overt identifier associated with the product; and
combining the random covert identifier with the unique overt identifier to authenticate the product to form a pair of identifiers; and
comparing the unique overt identifier and the random covert identifier respectively to a unique overt number and a random covert number stored in a database, wherein the unique overt identifier is not a function of the random covert identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method includes reading a covert identifier associated with a product, reading an overt identifier associated with the product, and matching a covert identifier with an overt identifier to authenticate the product.
-
Citations
19 Claims
-
1. An authentication method comprising:
-
reading a random covert identifier associated with a product; reading a unique overt identifier associated with the product; and combining the random covert identifier with the unique overt identifier to authenticate the product to form a pair of identifiers; and comparing the unique overt identifier and the random covert identifier respectively to a unique overt number and a random covert number stored in a database, wherein the unique overt identifier is not a function of the random covert identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A machine-readable medium that provides instructions that, when executed by a machine, cause the machine to perform operations comprising:
-
reading a random covert identifier associated with a product; reading a unique overt identifier associated with the product; and combining the random covert identifier with the unique overt identifier to authenticate the product to form a pair of identifiers; and comparing the unique overt identifier and the random covert identifier respectively to a unique overt number and a random covert number stored in a database, wherein the unique overt identifier is not a function of the random covert identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a memory unit to store instructions; and a processor to receive instructions from the memory unit, the instructions causing the processor to perform operations comprising; reading a random covert identifier associated with a product; reading a unique overt identifier associated with the product; and combining the random covert identifier with the unique overt identifier to authenticate the product to form a pair of identifiers; and comparing the unique overt identifier and the random covert identifier respectively to a unique overt number and a random covert number stored in a database, wherein the unique overt identifier is not a function of the random covert identifier.
-
Specification