×

Method and device for identifying objects

  • US 8,942,372 B2
  • Filed: 05/19/2009
  • Issued: 01/27/2015
  • Est. Priority Date: 05/20/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying an object, comprising at least one object identifier, with an object code that is used to verify the authenticity of the object, comprising:

  • generating a unique random system code, which consists of a first and a second part of the system code, in which the first part of the system code is created from a first character set by a first random method that randomly selects a number of characters from the first character set and the second part of the system code from a second character set by a second random method that randomly selects a number of characters from the second character set, and storing the system code together with at least a first object-specific information in a first data memory, in which the first part of the system code is encrypted by a first encryption method and the second part of the system code by a symmetric encryption method, which uses the first part of the system code as a key for the symmetric encryption;

    generating a random encryption key from a third character set by a third random method of a unique assignment identifier by an assignment method and storing the encryption key, the assignment identifier and at least a second object-specific information in a second data memory;

    generating an object code, which consists of at least the first part of the system code and the assignment identifier encrypting the system code by a third encryption method, which uses the encryption key as a key, encrypting of the object identifier by a fourth encryption method which uses the system code as a key, and storing the encrypted system code together with the encrypted object identifier in a third data memory;

    attaching the object code to the object, wherein the method provides a fourth data memory, in which query-specific data created during verification of the authenticity of the object is stored.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×