Notarizable electronic paper
First Claim
1. An electronic paper device comprising:
- one or more processors configured for executing one or more program instructions;
one or more decryption modules operable with the one or more processors;
at least one recordable medium operable with the one or more processors and configured for including at least;
informational data in at least one protected region that is accessible by an authorized third party pursuant to at least one security scheme, the informational data being provided by a first party, the first party being at least one of a manufacturer or a vendor of a product associated with the informational data, the informational data being viewable by a second party, the second party being at least one of a consumer or a purchaser of the product associated with the informational data, the authorized third party being at least one of an inspector of the product associated with the informational data or a device associated with inspection of the product associated with the informational data; and
verification data that is rendered void upon detection of unauthorized access with respect to the at least one protected region that is accessible by the authorized third party pursuant to the at least one security scheme, andwherein the one or more decryption modules are operable to provide access to the informational data and to provide a verification output to the authorized third party.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method helps to control “read” and/or “write” access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper material that is protected by a security methodology accessible to authorized entities. Some embodiments maintain a record of access activity regarding the restricted portion, and a record of access activity regarding use of an item or product or service related to the e-paper informational data. Some implementations include an authorization listing of a party having a particular access privilege or authorization to make modifications to various restricted portions including an authentication region and a protected region. One possible aspect includes performing a verification analysis of data indicia in a restricted portion of the e-paper media. Additional possible system and process components may determine an authenticity status of the data indicia, and provide an output result.
192 Citations
31 Claims
-
1. An electronic paper device comprising:
-
one or more processors configured for executing one or more program instructions; one or more decryption modules operable with the one or more processors; at least one recordable medium operable with the one or more processors and configured for including at least; informational data in at least one protected region that is accessible by an authorized third party pursuant to at least one security scheme, the informational data being provided by a first party, the first party being at least one of a manufacturer or a vendor of a product associated with the informational data, the informational data being viewable by a second party, the second party being at least one of a consumer or a purchaser of the product associated with the informational data, the authorized third party being at least one of an inspector of the product associated with the informational data or a device associated with inspection of the product associated with the informational data; and verification data that is rendered void upon detection of unauthorized access with respect to the at least one protected region that is accessible by the authorized third party pursuant to the at least one security scheme, and wherein the one or more decryption modules are operable to provide access to the informational data and to provide a verification output to the authorized third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. An electronic paper device comprising:
-
one or more processors configured for executing one or more program instructions; one or more decryption modules operable with the one or more processors; at least one recordable medium operable with the one or more processors, the at least one recordable medium configured to be affixed to a pharmaceutical product container and configured for including at least; informational data in at least one protected region that is accessible by an authorized third party pursuant to at least one security scheme, the informational data being provided by at least one of a manufacturer or a vendor of a pharmaceutical product associated with the informational data, the informational data being viewable by at least one of a consumer or a purchaser of the pharmaceutical product associated with the informational data, the authorized third party including at least one of an inspector of the pharmaceutical product associated with the informational data or a device associated with inspection of the pharmaceutical product associated with the informational data, wherein the informational data includes at least one of a potency, a dosage, a consumption schedule, an expiration, a contraindication, a patient identity, or an authorizing physician identity associated with the pharmaceutical product intended to be contained within the pharmaceutical product container; and verification data that is rendered void upon detection of unauthorized access with respect to the at least one protected region that is accessible by the authorized third party pursuant to the at least one security scheme, and wherein the one or more decryption modules are operable to provide access to the informational data and to provide a verification output to the authorized third party.
-
Specification