Duo Codes for Product Authentication
First Claim
1. A method comprising:
- generating a first code including bits representing an identification number and a switch bit having a first value;
generating a second code including bits representing the identification number of the first code, and a bit representing the switch bit having a second value;
encrypting the first code to generate a first cipher text; and
encrypting the second code to generate a second cipher text.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that employ two or more cryptographically linked codes. The codes, when encrypted, become cipher texts that appear unrelated. The codes described herein are characterized by a series of bits including one or more switch bits. The cipher text of a code having a switch bit in one state will appear to be unrelated to the cipher text of another code differing only in that the switch bit is in the opposite state. The cryptographically linked codes can be used in various combinations, such as on a product and its packaging, on a product and a component of the product, on a certificate packaged with the product and on the packaging, or on outer and inner packagings of the product.
102 Citations
25 Claims
-
1. A method comprising:
-
generating a first code including bits representing an identification number and a switch bit having a first value; generating a second code including bits representing the identification number of the first code, and a bit representing the switch bit having a second value; encrypting the first code to generate a first cipher text; and encrypting the second code to generate a second cipher text. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
generating a first code consisting of a series of bits, each bit having a value, and at least one of the bits being a switch bit having a first value; generating a second code consisting of the same series of bits with the same values as in the first code, except that the at least one switch bit has a second value; encrypting the first code to generate a first cipher text; and encrypting the second code to generate a second cipher text. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
a computer-readable medium including a data structure comprising an encryption of a first code, the first code consisting of a series of bits including at least one switch bit, each of the bits of the first code having a value, and an encryption of a second code logically related to the first code, the second code consisting of the same series of bits with the same values as the bits of the first code, except at least one of the switch bits of the second code has a different value than the same bit in the first code. - View Dependent Claims (17, 18)
-
19. A system comprising:
-
a first object marked with a first cipher text comprising an encryption of a first code having a identification number and at least one switch bit; and a second object marked with a second cipher text comprising an encryption of a second code having the identification number and the at least one switch bit, the at least one switch bit having a different value than in the first code. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification