Method and device for protecting products against counterfeiting
First Claim
Patent Images
1. A method comprising:
- receiving a request to access a first unique identifier stored in a shadow memory area of a transponder, read access to the first identifier being based on a state of a flag and on knowledge of secret shadow memory access information, the transponder having a second unique identifier stored in a second memory area;
requiring authentication prior to permitting read access to the first identifier in response to the state of the flag having a first value; and
permitting read access to the first identifier when the request includes the secret shadow memory access information.
11 Assignments
0 Petitions
Accused Products
Abstract
A method for protecting a product against counterfeiting is provided that has a transponder associated with the product, upon which at least one unique identifier is stored, wherein a flag in a set or cleared state is associated with the identifier, and when the flag is set, read access to the identifier by a reader is only permitted after authentication. The invention further relates to a transponder for protecting a product against counterfeiting.
-
Citations
27 Claims
-
1. A method comprising:
-
receiving a request to access a first unique identifier stored in a shadow memory area of a transponder, read access to the first identifier being based on a state of a flag and on knowledge of secret shadow memory access information, the transponder having a second unique identifier stored in a second memory area; requiring authentication prior to permitting read access to the first identifier in response to the state of the flag having a first value; and permitting read access to the first identifier when the request includes the secret shadow memory access information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A transponder comprising:
-
a shadow memory area storing a first unique identifier, read access to the first identifier being based on a state of a flag and on knowledge of secret shadow memory access information; a second memory area storing a second unique identifier; and one or more computer-readable non-transitory storage media coupled to the memory areas that embody logic that is operable when executed to; receive a request to access the first identifier stored in the shadow memory area; require authentication prior to permitting read access to the first identifier in response to the state of the flag having a first value; and permit read access to the first identifier when the request includes the secret shadow memory access information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. One or more non-transitory computer-readable storage media that embody logic that is operable when executed to:
-
receive a request to access a first unique identifier stored in a shadow memory area of a transponder, read access to the at least one unique identifier being based on a state of a flag and on knowledge of secret shadow memory access information, the transponder having a second unique identifier stored in a second memory area; require authentication prior to permitting read access to the first identifier in response to the state of the flag having a first value; and permit read access to the first identifier when the request includes the secret shadow memory access information. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification