Method and apparatus for counterfeiting protection
First Claim
1. A method for providing counterfeiting protection for an object, comprising the steps of:
- (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature;
(b) reading the first portion to thereby obtain a first set of information;
(c) transmitting the first set of information to a remote location;
(d) receiving from the remote location a second set of information; and
(e) reading the second portion using the second set of information to thereby determine the authenticity of the object.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosure relates generally to methods and apparatus for protecting against counterfeit products and for methods and apparatus for providing counterfeiting protection for an object. In one embodiment, the method includes the steps of: (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information to thereby determine the authenticity of the object.
51 Citations
47 Claims
-
1. A method for providing counterfeiting protection for an object, comprising the steps of:
-
(a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature;
(b) reading the first portion to thereby obtain a first set of information;
(c) transmitting the first set of information to a remote location;
(d) receiving from the remote location a second set of information; and
(e) reading the second portion using the second set of information to thereby determine the authenticity of the object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
(a) providing an item with an identifying mark affixed thereto to a user, wherein said identifying mark has a first portion and a second portion and wherein said second portion includes an encrypted feature; and
(b) instructing said user to perform the following after receiving said item;
(i) read the first portion to thereby obtain a first set of information;
(ii) transmit the first set of information to a remote location;
(iii) receive from the remote location a second set of information; and
(iv) read the second portion using the second set of information to thereby determine the authenticity of the object.
-
-
26. A method for determining authenticity of an object, comprising:
-
reading an identifying mark on an object;
determining if the identifying mark includes a first portion and a second portion;
determining if the second portion includes a feature encrypted according to a predetermined encryption method;
indicating a lack of authenticity of the object upon the occurrence of one or more of the following;
an absence of said first portion on said object, an absence of said second portion on said object, or an absence of said feature encrypted according to the predetermined encryption method on said object; and
indicating authenticity of the object upon the occurrence of all of the following;
a determination that said first portion is on said object, a determination that said second portion is on said object, and the determination that said feature encrypted according to the predetermined encryption method is on said object. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification