Duo codes for product authentication
First Claim
1. A method comprising:
- generating with a microprocessor a first code including bits representing an identification number comprising a batch number and a switch bit having a first value;
generating a second code including bits representing the identification number of the first code, and a bit representing the switch bit having a second value different than the first value;
encrypting the first code to generate a first cipher text;
encrypting the second code to generate a second cipher text;
marking an outer packaging of a product with the first cipher text; and
marking an inner packaging of the product with the second cipher text.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that employ two or more cryptographically linked codes. The codes, when encrypted, become cipher texts that appear unrelated. The codes described herein are characterized by a series of bits including one or more switch bits. The cipher text of a code having a switch bit in one state will appear to be unrelated to the cipher text of another code differing only in that the switch bit is in the opposite state. The cryptographically linked codes can be used in various combinations, such as on a product and its packaging, on a product and a component of the product, on a certificate packaged with the product and on the packaging, or on outer and inner packagings of the product.
148 Citations
36 Claims
-
1. A method comprising:
-
generating with a microprocessor a first code including bits representing an identification number comprising a batch number and a switch bit having a first value; generating a second code including bits representing the identification number of the first code, and a bit representing the switch bit having a second value different than the first value; encrypting the first code to generate a first cipher text; encrypting the second code to generate a second cipher text; marking an outer packaging of a product with the first cipher text; and marking an inner packaging of the product with the second cipher text. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
generating with a microprocessor a first code consisting of a series of bits, each bit having a value, and at least one of the bits being a switch bit having a first value, the series of bits of the first code, other than the at least one switch bit, comprising an identification number including a batch number; generating a second code consisting of the same series of bits with the same values as in the first code, except that the at least one switch bit has a second value different than the first value; encrypting the first code to generate a first cipher text; encrypting the second code to generate a second cipher text; marking an outer packaging of a product with the first cipher text; and marking an inner packaging of the product with the second cipher text. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method comprising:
-
generating with a microprocessor a first code including bits representing an identification number comprising a batch number and a switch bit having a first value; generating a second code including bits representing the identification number of the first code, and a bit representing the switch bit having a second value different than the first value; encrypting the first code to generate a first cipher text; encrypting the second code to generate a second cipher text; marking a packaging with the first cipher text; and marking a product disposed within the packaging with the second cipher text. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
generating with a microprocessor a first code consisting of a series of bits, each bit having a value, and at least one of the bits being a switch bit having a first value, the series of bits of the first code, other than the at least one switch bit, comprising an identification number including a batch number; generating a second code consisting of the same series of bits with the same values as in the first code, except that the at least one switch bit has a second value different than the first value; encrypting the first code to generate a first cipher text; encrypting the second code to generate a second cipher text; marking a packaging with the first cipher text; and marking a product disposed within the packaging with the second cipher text. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A method comprising:
-
generating with a microprocessor a first code including bits representing an identification number comprising a batch number and a switch bit having a first value; generating a second code including bits representing the identification number of the first code, and a bit representing the switch bit having a second value different than the first value; encrypting the first code to generate a first cipher text; encrypting the second code to generate a second cipher text; marking a product with the first cipher text; and marking a component of the product with the second cipher text. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method comprising:
-
generating with a microprocessor a first code consisting of a series of bits, each bit having a value, and at least one of the bits being a switch bit having a first value, the series of bits of the first code, other than the at least one switch bit, comprising an identification number including a batch number; generating a second code consisting of the same series of bits with the same values as in the first code, except that the at least one switch bit has a second value different than the first value; encrypting the first code to generate a first cipher text; encrypting the second code to generate a second cipher text; marking a product with the first cipher text; and marking a component of the product with the second cipher text. - View Dependent Claims (33, 34, 35, 36)
-
Specification