Systems and methods for employing duo codes for product authentication
First Claim
1. A method for marking products comprising:
- generating, using a microprocessor, first and second cipher texts byappending a switch bit having a value to an identification number to create a first code,changing only the value of the switch bit of the first code to create a second code comprising the same identification number and a switch bit having a value different than the value of the switch bit of the first code,encrypting the first code to generate the first cipher text, andencrypting the second code to generate the second cipher text;
marking the product with the first cipher text; and
marking a component or a packaging of the product with the second cipher text.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that employ two or more cryptographically linked codes. The codes, when encrypted, become cipher texts that appear unrelated. The codes described herein are characterized by a series of bits including one or more switch bits. The cipher text of a code having a switch bit in one state will appear to be unrelated to the cipher text of another code differing only in that the switch bit is in the opposite state. The cryptographically linked codes can be used in various combinations, such as on a product and its packaging, on a product and a component of the product, on a certificate packaged with the product and on the packaging, or on outer and inner packagings of the product.
150 Citations
21 Claims
-
1. A method for marking products comprising:
-
generating, using a microprocessor, first and second cipher texts by appending a switch bit having a value to an identification number to create a first code, changing only the value of the switch bit of the first code to create a second code comprising the same identification number and a switch bit having a value different than the value of the switch bit of the first code, encrypting the first code to generate the first cipher text, and encrypting the second code to generate the second cipher text; marking the product with the first cipher text; and marking a component or a packaging of the product with the second cipher text. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for marking products comprising:
-
generating, using a microprocessor, first and second cipher texts by appending a switch bit having a value to an identification number to create a first code, changing only the value of the switch bit of the first code to create a second code comprising the same identification number and a switch bit having a value different than the value of the switch bit of the first code, encrypting the first code to generate the first cipher text, and encrypting the second code to generate the second cipher text; marking an outer packaging of the product with the first cipher text; and marking an inner packaging of the product with the second cipher text. - View Dependent Claims (8, 9)
-
-
10. A business method comprising:
-
generating, using a microprocessor, pairs of first and second cipher texts by, for each pair, appending a switch bit having a value to an unique identification number to create a first code, changing only the value of the switch bit of the first code to create a second code comprising the same identification number and a switch bit having a value different than the value of the switch bit of the first code, encrypting the first code to generate the first cipher text, and encrypting the second code to generate the second cipher text; and selling a service including providing the pairs of cipher texts receiving an activation notification for one of the first or second cipher texts of a provided pair of cipher texts. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computing system comprising:
-
logic, including a microprocessor, configured to generate pairs of first and second cipher texts by, for each pair, appending a switch bit having a value to an unique identification number to create a first code, changing only the value of the switch bit of the first code to create a second code comprising the same identification number and a switch bit having a value different than the value of the switch bit of the first code, encrypting the first code to generate the first cipher text, and encrypting the second code to generate the second cipher text; logic configured to send the pairs of cipher texts and; logic configured to receive an activation notification for one of the cipher texts of one of the sent pairs of cipher texts. - View Dependent Claims (20, 21)
-
Specification