Product protection gateway and method for checking the authenticity of products
First Claim
1. A computer implemented method for protecting a product identification to ensure the authenticity of a product piece, comprising the following steps:
- creating product protection identification comprising;
detecting on a first computer a product-specific identification sequence (K) for each product piece;
converting on said first computer the product-specific identification sequence (K) with a first hash method to a first hash sequence;
generating on said first an encoded check sequence (C) by encoding the first hash sequence by using a symmetric encoding method (F1) and a secret encoding sequence (B);
converting on said first computer the encoded check sequence (C) with a second hash method to a second hash sequence;
affixing to or on the product piece a product control sequence, comprising;
(a) the encoded check sequence (C) or a sequence that is derived from the encoded check sequence (C), and(b) the second hash sequence;
checking the product protection identification affixed on or to the product piece comprising;
receiving the product control sequence via a second computer;
deriving a decoded sequence on said second computer by decoding the product control sequence;
checking the authenticity on said second computer of the decoded product control sequence.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a product protection system whereby a product piece is provided with a product-specific identification sequence (K) which is converted into a coded check sequence (C), by means of an encoding method (F1) using a secret encoding sequence (B). A product control sequence is applied to or on the product piece which comprises the coded check sequence (C), or a sequence derived therefrom. In order to check the authenticity of the product piece, the product control sequence is recorded by a control requester and transmitted by internet to a product protection server structure. A decoded check sequence is derived therein from the product control sequence by means of a decoding method using a decoding sequence. The authenticity of the decoded check sequence, or a sequence derived therefrom is checked and the result of the authenticity check transmitted by internet to the control requester.
-
Citations
47 Claims
-
1. A computer implemented method for protecting a product identification to ensure the authenticity of a product piece, comprising the following steps:
-
creating product protection identification comprising; detecting on a first computer a product-specific identification sequence (K) for each product piece; converting on said first computer the product-specific identification sequence (K) with a first hash method to a first hash sequence; generating on said first an encoded check sequence (C) by encoding the first hash sequence by using a symmetric encoding method (F1) and a secret encoding sequence (B); converting on said first computer the encoded check sequence (C) with a second hash method to a second hash sequence; affixing to or on the product piece a product control sequence, comprising; (a) the encoded check sequence (C) or a sequence that is derived from the encoded check sequence (C), and (b) the second hash sequence; checking the product protection identification affixed on or to the product piece comprising; receiving the product control sequence via a second computer; deriving a decoded sequence on said second computer by decoding the product control sequence; checking the authenticity on said second computer of the decoded product control sequence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented method for checking the authenticity of a product piece with a product control sequence affixed on or to the product piece, and using the Internet, comprising:
-
detecting the product control sequence on the side of a person submitting the authenticity check, wherein the product control sequence was generated and affixed on or to the product piece by steps including;
detecting a product-specific identification sequence (K) for the product piece;
generating on a computer, an encoded check sequence (C) using a symmetric encoding method (F1) with a seret encoding sequence (B), wherein the symmetric encoding method is performed on one of;
the product-specific identification sequence (K) or a sequence dervied from (K);
converting on the computer, the encoded check sequence (C) with a hash method to a hash sequence;
fixing to or on the product piece product control sequence, which comprises (a) the encoded check sequence (C) or a sequence that is derived from the encoded check seqence (C) and (b) the hash sequence;transmitting of the product control sequence via the Internet to a product-protection server structure; converting on the product-protection server structure, the hash sequence with a hash reversing function to derive the encoded check sequence (C); decoding on the product-protection server structure the encoded check sequence (C) that is derived from the product control sequence, by using a decoding method (F2) and a decoding sequence (A) and generating on said product-protection server a decoded check sequence, wherein the decoding sequence (A) and the secret encoding sequence (B) together form a complementary code pair; checking on the product-protection server structure, the authenticity of the decoded check sequence or a sequence derived from the decoded check sequence; and transmitting of the result of the authenticity check via the Internet to the person requesting the check. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer implemented method for preventing the imitation of a product comprising:
-
generating a product protection identification which is affixed on or to the product piece comprising; detecting on a first computer, a product-specific identification sequence (K) for each product piece; generating on, said first computer, an encoded check sequence (C) using a symmetric encoding method (F1), with a secret encoding sequence (B), wherein said symmetric encoding method is performed on one of; the product-specific identification sequence (K) or a sequence derived from (K); converting on said first computer, the encoded check sequence (C) with a hash method to a hash sequence; affixing to or on the product piece a product control sequence, comprising; (a) the encoded check sequence (C) or a sequence that is derived from the encoded check sequence (C) and (b) the hash sequence; and checking the product protection identification affixed on or to the product piece using the internet, comprising; detecting the product control sequence by a submitter of a control request; transmitting of the product control sequence via the Internet to a product-protection server structure; converting on the product-protection server structure, the hash sequence with a hash reversing function to derive the encoded check sequence (C); decoding on the the product-protection server structure, the encoded check sequence (C) that is derived from the product control sequence, on the side of the product-protection server structure, by using a decoding method (F2) and a decoding sequence (A) and generating a decoded check sequence, wherein the decoding sequence (A) and the encoding sequence (B) together form a complementary code pair; checking on the product-protection server structure, the authenticity of the decoded check sequence or a sequence derived from the decoded check sequence; and transmitting the result of the authenticity check via the Internet to the submitter of the control request. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification