×

Authenticating and managing item ownership and authenticity

  • US 9,256,881 B2
  • Filed: 11/07/2014
  • Issued: 02/09/2016
  • Est. Priority Date: 11/08/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for authenticating and managing the ownership of an item comprising:

  • a server comprising at least one processor and a non-transitory memory, wherein the server comprises;

    an item information system that configures the at least on processor to;

    receive tagging device data and associated item data from a physical tagging device affixed to the item, and store the tagging device data and the item data in the non-transitory memory, wherein the physical tagging device stores the tagging device data, wherein the tagging device data comprises a tagging device identification number and a certificate, wherein the certificate comprises a digital signature over a data package, and wherein the data package comprises the tagging device identification number;

    an owner registration and transfer system that configures the at least one processor to;

    receive owner registration data and ownership change requests, and store the ownership history in the non-transitory memory, wherein the owner registration data comprises an identification of a current owner of the item and current owner access credentials; and

    an authentication system that configures the at least one processor to;

    receive the current owner access credentials;

    verify the current owner access credentials are valid based on the identification of the current owner of the item in response to the receipt of the current owner access credentials;

    receive, from a reading device, an authentication request comprising the certificate and the tagging device identification number based on the verification of the current owner access credentials;

    access at least one key stored in a key management system using the tagging device identification number in the authentication request;

    verify the tagging device identification number in the certificate using the at least one key; and

    generate an authentication response in response to the verification of the tagging device identification number in the certificate.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×