×

Product authentication using end-to-end cryptographic scheme

  • US 9,882,722 B2
  • Filed: 08/12/2014
  • Issued: 01/30/2018
  • Est. Priority Date: 09/22/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for authenticating a first item based on a hierarchy of codes, comprising:

  • obtaining a first item code from the first item using an input device;

    obtaining a second item code from a second item using the input device, where the second item is contained by the first item, wherein the first and second items are part of a hierarchy of items with each item code associated with a different item in the hierarchy of items and with the first item code cryptographically bound to the second item code; and

    authenticating the first item using a processing circuit by using the second item code, wherein the first and second item codes are part of the hierarchy of codes and the first item code is recursively derived from the second item code, and wherein the first item is successfully authenticated if a cryptographic relationship between the first item code and the second item code is verified.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×