Data management
First Claim
1. A data management system comprising:
- a data store for storing at least one entry, the entry including (i) information associated with an item, and (ii) information about a security feature associated with that item;
an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader, the authenticated remote reader used to authenticate the item and the reader validator authenticating the remote reader by ascertaining the identity and location of the remote reader and by verifying that the remote reader uses a proper encryption key and protocols for accessing the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and adapted to parse the request for an algorithm identification code that identifies an algorithm for reading and transforming the security feature, the security feature validator also operable to issue an authenticity confirmation when a security feature is successfully validated; and
a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
6 Assignments
0 Petitions
Accused Products
Abstract
A data management system comprises a data store for storing at least one entry. The entry includes (i) information associated with an item, and (ii) information about a security feature associated with that item. The system also includes an authenticator operable to access the data store in response to a request from a remote reader. The authenticator includes (i) a reader validator to authenticate the remote reader, and (ii) a security feature validator to authenticate a security feature read by the remote reader. The authenticator is also operable to issue an authenticity confirmation in the event that a security feature is successfully validated. The system includes a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
-
Citations
34 Claims
-
1. A data management system comprising:
-
a data store for storing at least one entry, the entry including (i) information associated with an item, and (ii) information about a security feature associated with that item; an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader, the authenticated remote reader used to authenticate the item and the reader validator authenticating the remote reader by ascertaining the identity and location of the remote reader and by verifying that the remote reader uses a proper encryption key and protocols for accessing the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and adapted to parse the request for an algorithm identification code that identifies an algorithm for reading and transforming the security feature, the security feature validator also operable to issue an authenticity confirmation when a security feature is successfully validated; and a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of managing data, the method comprising:
-
storing information associated with an item including information about a security feature associated with that item; receiving a request from a remote reader where the request includes data read from a security feature and the request includes an algorithm identification code for an algorithm to read and transform the security feature; authenticating the remote reader by ascertaining an identity and location of the remote reader and by verifying that the remote reader is using an appropriate encryption key and protocol to access a data store; processing the data read from the security feature using the algorithm to ascertain an item associated with the read data; accessing the data store using the ascertained item as an index; comparing the processed data with data associated with the item from the data store; and generating an authenticity confirmation in response to a successful authentication of the security feature read by the remote reader. - View Dependent Claims (20, 21)
-
-
22. An authentication system for authenticating an item, the system comprising:
-
a data management system; at least one remote reader coupled to the data management system, the remote reader comprising;
(i) a tamper-responsive security module, and (ii) a read engine for reading a security feature carried by an item; anda dongle coupled to the remote reader and adapted to deliver a unique code to the remote reader, the remote reader adapted to compare the unique code to a dongle code stored in non-volatile storage on the remote reader and in response, the remote reader adapted to authenticate to the data management system by providing an appropriate encryption key and using a proper protocol to communicate with the data management system. - View Dependent Claims (23)
-
-
24. A method of populating an authentication record in a data store for a customer, the method comprising:
-
receiving spatial code data and security feature data captured by a remote reader operated by or for the customer and identifying an algorithm used to read and transform the security feature data; identifying the customer based on at least a portion of the spatial code data; validating that the remote reader is permitted to create authentication records by ascertaining an identity and location of the remote reader and by verifying that the remote reader is using a proper encryption key and protocol to communicate with a data store; and populating an authentication record in the data store, the record including customer identification information, item information, and security feature information. - View Dependent Claims (25)
-
-
26. A data management system for tracking an item, the system comprising:
-
a data store for storing at least one entry, the entry including (i) information identifying an item, and (ii) information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader by ascertaining an identity and location of the remote reader and by verifying that the remote reader is using a proper encryption key and protocol to communicate with the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and to issue an authenticity confirmation in the event that a security feature is successfully validated; a tracker for maintaining a record in the data store of each occasion on which the item is authenticated and the location of the remote reader that requested authentication of that item; and a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
-
-
27. A data management system comprising:
-
a data store for storing at least one entry, the entry including (i) information associated with an item, and (ii) information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader by confirming that a unique number provided by the remote reader with the request is associated in the data store with a customer number provided by the remote reader with the request and to verify that the remote reader is using a proper encryption key and protocol to communicate with the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and also operable to issue an authenticity confirmation in the event that a security feature is successfully validated; and a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
-
-
28. A method of managing data, the method comprising:
-
storing information associated with an item including information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; receiving a request from a remote reader where the request includes data read from a security feature; authenticating the remote reader by confirming that a unique number provided by the remote reader with the request is associated with a customer number provided by the remote reader with the request and by verifying that the remote reader is using a protocol and encryption key expected by a data store; processing the data read from the security feature to ascertain an item associated with the read data; accessing the data store using the ascertained item as an index; comparing the processed data with data associated with the item from the data store; generating an authenticity confirmation in response to a successful authentication of the security feature read by the remote reader.
-
-
29. A method of populating an authentication record in a data store for a customer, the method comprising:
-
receiving spatial code data and security feature data captured by a remote reader operated by or for the customer and identifying an algorithm used to read and transform the security feature data; identifying the customer based on at least a portion of the spatial code data; validating that the remote reader is permitted to create authentication records by confirming that a unique number provided by the remote reader with the request is associated in a data store with the identified customer and verifying that the remote reader is using a proper encryption key and protocol to communicate with the data store; and populating an authentication record in the data store, the record including customer identification information, item information, and security feature information.
-
-
30. A data management system for tracking an item, the system comprising:
-
a data store for storing at least one entry, the entry including (i) information identifying an item, and (ii) information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader by confirming that a unique number provided by the remote reader with the request is associated with a customer number provided by the remote reader with the request and to verify that the remote reader is using a proper encryption key and protocol to communicate with the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and to issue an authenticity confirmation in the event that a security feature is successfully validated; a tracker for maintaining a record in the data store of each occasion on which the item is authenticated and the location of the remote reader that requested authentication of that item; and a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
-
-
31. A data management system comprising:
-
a data store for storing at least one entry, the entry including (i) information associated with an item, and (ii) information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader each time a request is received and to verify that the remote reader is using a proper encryption key to communicate with the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and also operable to issue an authenticity confirmation in the event that a security feature is successfully validated; and a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
-
-
32. A method of managing data, the method comprising:
-
storing information associated with an item including information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; receiving a request from a remote reader where the request includes data read from a security feature; authenticating the remote reader each time a request is received by verifying that the remote reader is using a proper encryption key; processing the data read from the security feature to ascertain an item associated with the read data; accessing the data store using the ascertained item as an index; comparing the processed data with data associated with the item from the data store; generating an authenticity confirmation in response to a successful authentication of the security feature read by the remote reader.
-
-
33. A method of populating an authentication record in a data store for a customer, the method comprising:
-
receiving spatial code data and security feature data captured by a remote reader operated by or for the customer and identifying an algorithm used to read and transform the security feature data; identifying the customer based on at least a portion of the spatial code data; validating that the remote reader is permitted to create authentication records each time a request is received by verifying that the remote reader is using a protocol expected by the data store; and populating an authentication record in the data store, the record including customer identification information, item information, and security feature information.
-
-
34. A data management system for tracking an item, the system comprising:
-
a data store for storing at least one entry, the entry including (i) information identifying an item, and (ii) information about a security feature associated with that item and including an algorithm identification code for a specific algorithm used to read and transform the security feature; an authenticator operable to access the data store in response to a request from a remote reader and including (i) a reader validator to authenticate the remote reader each time a request is received and to verify that the remote reader is using a proper encryption key and protocol to communicate with the data store, and (ii) a security feature validator to authenticate a security feature read by the remote reader and to issue an authenticity confirmation in the event that a security feature is successfully validated; a tracker for maintaining a record in the data store of each occasion on which the item is authenticated and the location of the remote reader that requested authentication of that item; and a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the remote reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.
-
Specification