System and method using information based indicia for securing and authenticating transactions
First Claim
Patent Images
1. A method for authenticating an information-based indicium, comprising:
- receiving, using a computing device, a first identifier and a second identifier independent from the first identifier, wherein the first identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the first identifier;
receiving, using the computing device, a digital certificate, the digital certificate derived at least in part from an encryption of the first identifier and the second identifier and configured to be decrypted with a public key, the digital certificate being authenticated without tracking using a database;
decrypting, using the computing device, the digital certificate; and
comparing the decrypted digital certificate and the first identifier to authenticate the information-based indicium.
5 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and apparatus for authenticating transactions and records is disclosed. An information-based indicium includes an article bearing a first identifier, wherein the first identifier substantially prevents a single user from accumulating multiple articles bearing the same first identifier, and a first digital certificate that is derived in part by encoding the first identifier, wherein the first digital certificate and the article may be presented together to authenticate the indicium by comparing the first digital certificate and the first identifier.
52 Citations
24 Claims
-
1. A method for authenticating an information-based indicium, comprising:
-
receiving, using a computing device, a first identifier and a second identifier independent from the first identifier, wherein the first identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the first identifier; receiving, using the computing device, a digital certificate, the digital certificate derived at least in part from an encryption of the first identifier and the second identifier and configured to be decrypted with a public key, the digital certificate being authenticated without tracking using a database; decrypting, using the computing device, the digital certificate; and comparing the decrypted digital certificate and the first identifier to authenticate the information-based indicium. - View Dependent Claims (2, 3)
-
-
4. A system for encrypting an information-based indicium and for recertification of digital certificates, comprising:
-
an input configured to receive an identifier of an article, wherein the identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the identifier; a computing device configured to generate a first digital certificate derived at least in part from an encryption of the identifier and a second digital certificate derived at least in part from an encryption of the identifier; and an output configured to present collectively the identifier and one of the first digital certificate and the second digital certificate for an authentication of the information-based indicium, wherein the one of the first digital certificate and the second digital certificate other than the one of the first digital certificate and the second digital certificate used for the authentication is configured to become unusable after the authentication.
-
-
5. A method for encrypting an information-based indicium and for recertification of digital certificates, comprising:
-
receiving, using a computing device, an article bearing an identifier, wherein the identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the identifier; generating, using the computing device, a first digital certificate derived at least in part from an encryption of the identifier; generating, using the computing device, a second digital certificate derived at least in part from an encryption of the identifier; and presenting, using the computing device, collectively the identifier and one of the first digital certificate and the second digital certificate for an authentication of the information-based indicium, wherein the one of the first digital certificate and the second digital certificate other than the one of the first digital certificate and the second digital certificate used for the authentication is configured to become unusable after the authentication.
-
-
6. A system for generating a digital certificate, comprising:
-
an input configured to receive a first identifier and a second identifier independent from the first identifier, wherein the first identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the first identifier; a computing device configured to generate a digital certificate at least in part from an encryption of the first identifier and the second identifier; and an output configured to produce the digital certificate, such that the digital certificate is configured to be decrypted with a public key, whereby the digital certificate is authenticated without tracking using a database. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for generating a digital certificate, comprising:
-
receiving, using a computing device, a first identifier and a. second identifier independent from the first identifier, wherein the first identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the first identifier; and generating, using the computing device, a digital certificate at least in part from an encryption of the first identifier and the second identifier, such that the digital certificate is configured to be decrypted with a public key, the digital certificate being authenticated without tracking using a database. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for producing an information-based indicium, comprising:
-
a transmitter configured to transmit a first identifier and a second identifier independent from the first identifier to a remote device; a receiver configured to receive a digital certificate from the remote device, wherein the digital certificate is generated at least in part from an encryption of the first identifier and the second identifier and configured to be decrypted with a public key, whereby the digital certificate is authenticated without tracking using a database; and an output configured to produce the information-based indicium wherein the information-based indicium is based at least in part on the first and second identifiers. - View Dependent Claims (23)
-
-
24. A method for authenticating an information-based indicium for recertified digital certificates comprising:
-
receiving, using a computing device, an article bearing an identifier, wherein the identifier is configured to prevent a user from accumulating multiple articles, each of the multiple articles bearing the identifier; receiving, using the computing device, a first digital certificate derived at least in part from an encryption of the identifier; receiving, using the computing device, a second digital certificate derived at least in part from an encryption of the identifier; decrypting, using the computing device, one of the first digital certificate and the second digital certificate; and comparing the decrypted digital certificate and the identifier to authenticate the information-based indicium, wherein the one of the first digital certificate and the second digital certificate other than the one of the first digital certificate and the second digital certificate used for the authentication is configured to become unusable after the authentication.
-
Specification