Product authentication using end-to-end cryptographic scheme
First Claim
1. A method for inhibiting introduction of forged items in a distribution channel, comprising:
- recursively generating a hierarchy of codes, each code associated with a different item in a hierarchy of items and wherein at least some of the codes are recursively generated based on either a lower code or a higher code from another level in the hierarchy of codes;
cryptographically binding each code in the hierarchy of codes to obtain a corresponding cryptographic forgery resistant tag; and
physically appending a different code from the hierarchy of codes and its corresponding cryptographic forgery resistant tag to each item in the hierarchy of items according to corresponding levels in the hierarchy of codes and hierarchy of items.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes.
5 Citations
40 Claims
-
1. A method for inhibiting introduction of forged items in a distribution channel, comprising:
-
recursively generating a hierarchy of codes, each code associated with a different item in a hierarchy of items and wherein at least some of the codes are recursively generated based on either a lower code or a higher code from another level in the hierarchy of codes; cryptographically binding each code in the hierarchy of codes to obtain a corresponding cryptographic forgery resistant tag; and physically appending a different code from the hierarchy of codes and its corresponding cryptographic forgery resistant tag to each item in the hierarchy of items according to corresponding levels in the hierarchy of codes and hierarchy of items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An apparatus adapted to inhibit introduction of forged items in a distribution channel, comprising:
-
a processing circuit including a code generator and a cryptographic forgery resistant tag generator, the code generator adapted to recursively generate a hierarchy of codes, each code associated with a different item in a hierarchy of items and wherein at least some of the codes are recursively generated based on either a lower code or a higher code from another level in the hierarchy of codes, and the cryptographic forgery resistant tag generator adapted to cryptographically bind each code in the hierarchy of codes to obtain a corresponding cryptographic forgery resistant tag; and a printer adapted to print a different code from the hierarchy of codes and its corresponding cryptographic forgery resistant tag for appending to each item in the hierarchy of items according to corresponding levels in the hierarchy of codes and hierarchy of items. - View Dependent Claims (26, 27, 28, 29)
-
-
30. An apparatus adapted to inhibit introduction of forged items in a distribution channel, comprising:
-
means for recursively generating a hierarchy of codes, each code associated with a different item in a hierarchy of items and wherein at least some of the codes are recursively generated based on either a lower code or a higher code from another level in the hierarchy of codes; means for cryptographically binding each code in the hierarchy of codes to obtain a corresponding cryptographic forgery resistant tag; and means for physically appending a different code from the hierarchy of codes and its corresponding cryptographic forgery resistant tag to each item in the hierarchy of items according to corresponding levels in the hierarchy of codes and hierarchy of items. - View Dependent Claims (31)
-
-
32. A non-transitory machine-readable medium comprising instructions for inhibiting introduction of forged items in a distribution channel, which when executed by a processor causes the processor to:
-
recursively generate a hierarchy of codes, each code associated with a different item in a hierarchy of items and wherein at least some of the codes are recursively generated based on either a lower code or a higher code from another level in the hierarchy of codes; and cryptographically bind each code in the hierarchy of codes to obtain a corresponding cryptographic forgery resistant tag; and wherein a different code from the hierarchy of codes and its corresponding cryptographic forgery resistant tag are adapted to be appended to each item in the hierarchy of items according to corresponding levels in the hierarchies, and wherein an item at a particular level of the hierarchy of items is stored within an item at the next higher level of the hierarchy of codes and hierarchy of items.
-
-
33. A method for securing a plurality of related items against forgery, comprising:
-
generating a first code for identifying a first item; physically appending the first code to the first item; recursively generating a second code based on the first code for identifying a second item, the second item containing one or more first items; and physically appending the recursively generated second code to the second item. - View Dependent Claims (34, 35, 36)
-
-
37. A method for securing a plurality of related items against forgery, comprising:
-
generating a first code for identifying a first item; physically appending the first code to the first item; recursively generating a second code based on the first code for identifying a second item, the first item containing one or more second items; and physically appending the recursively generated second code to the second item. - View Dependent Claims (38, 39, 40)
-
Specification