Method, system, and apparatus for enabling secure functionalities
First Claim
Patent Images
1. A method comprising:
- receiving indicia of a first optical scanning of a first optical code by a first user equipment via an encrypted channel;
receiving a first location indicia data associated with said first optical scanning of said first optical code from said first user equipment via an encrypted channel;
receiving indicia of a second optical scanning of said first optical code by a second user equipment via an encrypted channel;
receiving a second location indicia data associated with said second optical scanning of said first optical code from said second user equipment via an encrypted channel; and
selectively enabling in said second user equipment via an encrypted channel a predetermined and restricted functionality associated with said first optical code, upon compliance to a predetermined proximity criterion, said compliance resulting, at least in part, from proximity determined between a first location, associated with said first location indicia data, and a second location, associated with said second location indicia data, wherein said predetermined and restricted functionality is selected from the group consisting of;
a secure transfer of ownership of an asset associated with said first optical code, a secure authentication of an asset associated with said first optical code, a secure transfer of ownership of an object associated with said first optical code, a secure verification of the authenticity of an object associated with said first optical code, a secure verification of the authenticity of a document associated with said first optical code, a secure transfer of ownership of a document associated with said first optical code, and combinations thereof.
2 Assignments
0 Petitions
Accused Products
Abstract
In accordance with one embodiment of the present invention, a method comprises receiving attributes data for a tagged item that are measured or recorded by sensors of a user equipment such as a smart phone. Attributes of record can be securely stored and can be controlled remotely. By comparing measured attributes with attributes of record according to a predetermined algorithm, a preset functionality, associated with said tagged item, is selectively enabled. In some implementations, the present invention is used to validate the authenticity of documents or objects. In some implementations, an optical code is used to tag said item.
160 Citations
20 Claims
-
1. A method comprising:
-
receiving indicia of a first optical scanning of a first optical code by a first user equipment via an encrypted channel; receiving a first location indicia data associated with said first optical scanning of said first optical code from said first user equipment via an encrypted channel; receiving indicia of a second optical scanning of said first optical code by a second user equipment via an encrypted channel; receiving a second location indicia data associated with said second optical scanning of said first optical code from said second user equipment via an encrypted channel; and selectively enabling in said second user equipment via an encrypted channel a predetermined and restricted functionality associated with said first optical code, upon compliance to a predetermined proximity criterion, said compliance resulting, at least in part, from proximity determined between a first location, associated with said first location indicia data, and a second location, associated with said second location indicia data, wherein said predetermined and restricted functionality is selected from the group consisting of;
a secure transfer of ownership of an asset associated with said first optical code, a secure authentication of an asset associated with said first optical code, a secure transfer of ownership of an object associated with said first optical code, a secure verification of the authenticity of an object associated with said first optical code, a secure verification of the authenticity of a document associated with said first optical code, a secure transfer of ownership of a document associated with said first optical code, and combinations thereof. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory computer-readable medium having a set of instructions for controlling at least one general-purpose digital computer in performing desired functions comprising:
a set of instructions formed into each of a plurality of modules, each modules comprising instructions for; facilitating the receiving indicia of a first optical scanning of a first optical code by a first user equipment via an encrypted channel; facilitating the receiving a first location indicia data associated with said first optical scanning of said first optical code from said first user equipment via an encrypted channel; facilitating the receiving indicia of a second optical scanning of said first optical code by a second user equipment via an encrypted channel; facilitating the receiving a second location indicia data associated with said second optical scanning of said first optical code from said second user equipment via an encrypted channel; and facilitating the selectively enabling in said second user equipment, via an encrypted channel, a predetermined and restricted functionality associated with said first optical code, upon compliance to a predetermined proximity criterion, said compliance resulting, at least in part, from proximity determined between a first location, associated with said first location indicia data, and a second location, associated with said second location indicia data, wherein said predetermined and restricted functionality is selected from the group consisting of;
a secure transfer of ownership of an asset associated with said first optical code, a secure authentication of an asset associated with said first optical code, a secure transfer of ownership of an object associated with said first optical code, a secure verification of the authenticity of an object associated with said first optical code, a secure verification of the authenticity of a document associated with said first optical code, a secure transfer of ownership of a document associated with said first optical code, and combinations thereof.- View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. An apparatus, comprising:
-
at least one processor; and
at least one non-transitory computer-readable medium including a computer program code;
the at least one non-transitory computer-readable medium and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following;facilitating the receiving of indicia of a first optical scanning of a first optical code by a first user equipment via an encrypted channel; facilitating the receiving of a first location indicia data associated with said first optical scanning of said first optical code from said first user equipment via an encrypted channel; facilitating the receiving of indicia of a second optical scanning of said first optical code by a second user equipment via an encrypted channel; facilitating the receiving of a second location indicia data associated with said second optical scanning of said first optical code from said second user equipment via an encrypted channel; facilitating selectively enabling in said second user equipment, via an encrypted channel, a predetermined and restricted functionality associated with said first optical code, upon compliance to a predetermined proximity criterion, said compliance resulting, at least in part, from proximity determined between a first location, associated with said first location indicia data, and a second location, associated with said second location indicia data, wherein said predetermined and restricted functionality is selected from the group consisting of;
a secure transfer of ownership of an asset associated with said first optical code, a secure authentication of an asset associated with said first optical code, a secure transfer of ownership of an object associated with said first optical code, a secure verification of the authenticity of an object associated with said first optical code, a secure verification of the authenticity of a document associated with said first optical code, a secure transfer of ownership of a document associated with said first optical code, and combinations thereof. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification