Securing electronic annotations
First Claim
Patent Images
1. A method of securing access to an electronic annotation provided on an object, comprising the steps of:
- providing the object with a plurality of memory tags;
providing on at least one of the memory tags an electronic annotation; and
defining a sequence in which the memory tags must be accessed in order to access the annotation.
1 Assignment
0 Petitions
Accused Products
Abstract
This invention describes methods for securing access to an electronic annotation provided on an object, including the steps of providing the object with a plurality of memory tags, providing an electronic annotation on at least one of the memory tags, and defining a sequence in which the memory tags must be accessed in order to access the annotation.
61 Citations
39 Claims
-
1. A method of securing access to an electronic annotation provided on an object, comprising the steps of:
-
providing the object with a plurality of memory tags;
providing on at least one of the memory tags an electronic annotation; and
defining a sequence in which the memory tags must be accessed in order to access the annotation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An electronically annotated object having annotation access security comprising:
-
a plurality of memory tags arranged on or in the object, at least one of the memory tags having stored therein an electronic annotation; and
wherein the memory tags are ordered into a sequence such that access to the electronic annotation can only be achieved by accessing the memory tags in the sequence in the prescribed order. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method of accessing a secured electronic annotation applied to an object, comprising the steps of:
-
a) with a memory tag reader, reading from a first memory tag in a defined sequence of memory tags on the object an access code for a next memory tag in the sequence;
b) applying the access code to the next memory tag in the sequence;
c) reading from that memory tag an access code for a next memory tag in the sequence;
d) repeating steps b) and c) for all memory tags in the sequence up to n-1, where n is the total number of tags in the sequence;
e) applying the access code to the nth tag in the sequence; and
f) reading the annotation from at least one of the memory tags within the sequence. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
Specification