Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication
First Claim
Patent Images
1. A method comprising:
- receiving by a computer processor an authentication code associated with an object and a party-specific code associated with a party, the party-specific code is unknown to the processor prior to its receipt by the processor;
subsequently executing an instruction set by the processor to classify authenticity of the object as a function of the authentication code and a stored code to which no party-specific code is associated, the stored code received from a manufacturer of the object;
subsequently causing the party-specific code to become associated with the stored code upon matching of the authentication code to a stored code such that the stored code is judged to no longer match the authentication code;
subsequently signaling an outcome based on the classifying;
prompting the party for a selection as to whether the party would like to transfer the object to another party if the outcome indicates that the object is authentic and it is determined that the object is intended and allowed by the manufacturer to be transferred between parties; and
causing a new party-specific code received from the another party to become associated with the stored code after a response to the prompt indicates the authentic object is being transferred to the another party.
1 Assignment
0 Petitions
Accused Products
Abstract
Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a replacement authentication code is generated based on the original authentication code and party-specific code. Documents and currencies can be authenticated independently of any party-specific code by an addition to or alteration of their authentication code with each authentication event.
-
Citations
3 Claims
-
1. A method comprising:
-
receiving by a computer processor an authentication code associated with an object and a party-specific code associated with a party, the party-specific code is unknown to the processor prior to its receipt by the processor; subsequently executing an instruction set by the processor to classify authenticity of the object as a function of the authentication code and a stored code to which no party-specific code is associated, the stored code received from a manufacturer of the object; subsequently causing the party-specific code to become associated with the stored code upon matching of the authentication code to a stored code such that the stored code is judged to no longer match the authentication code; subsequently signaling an outcome based on the classifying; prompting the party for a selection as to whether the party would like to transfer the object to another party if the outcome indicates that the object is authentic and it is determined that the object is intended and allowed by the manufacturer to be transferred between parties; and causing a new party-specific code received from the another party to become associated with the stored code after a response to the prompt indicates the authentic object is being transferred to the another party.
-
-
2. A method comprising:
-
receiving by a computer processor an authentication code associated with an object and a party-specific code associated with a party, the party-specific code is unknown to the processor prior to its receipt by the processor; subsequently executing an instruction set by the processor to classify authenticity of the object as a function of the authentication code and a stored code to which no party-specific code is associated, the stored code received from a manufacturer of the object; subsequently causing the party-specific code to become connected to or combined with the stored code upon matching of the authentication code to a stored code such that the stored code is judged to no longer match the authentication code; subsequently signaling an outcome based on the classifying; prompting the party for a selection as to whether the party would like to transfer the object to another party if the outcome indicates that the object is authentic and it is determined that the object is intended and allowed by the manufacturer to be transferred between parties; and causing a new party-specific code received from the another party to become associated with the stored code after a response to the prompt indicates the authentic object is being transferred to the another party.
-
-
3. A method comprising:
-
receiving by a computer processor an object'"'"'s authentication code and a party-specific code associated with a party, the party-specific code is unknown to the processor prior to its receipt by the processor; subsequently executing an instruction set by the processor to classify authenticity of the object as a function of the object'"'"'s authentication code and a stored code to which no party-specific code is associated, the stored code received from a manufacturer of the object; subsequently causing the party-specific code to become connected to or combined with the stored code upon matching of the authentication code to the stored code such that the stored code is judged to no longer match the authentication code; subsequently signaling an outcome based on the classifying; prompting the party for a selection as to whether the party would like to transfer the object to another party if the outcome indicates that the object is authentic and it is determined that the object is intended and allowed by the manufacturer to be transferred between parties; and causing a new party-specific code received from the another party to become associated with the stored code after a response to the prompt indicates the authentic object is being transferred to the another party.
-
Specification