Method and device for identifying objects
First Claim
1. A method for identifying an object, comprising at least one object identifier, with an object code that is used to verify the authenticity of the object, comprising:
- generating a unique random system code, which consists of a first and a second part of the system code, in which the first part of the system code is created from a first character set by a first random method that randomly selects a number of characters from the first character set and the second part of the system code from a second character set by a second random method that randomly selects a number of characters from the second character set, and storing the system code together with at least a first object-specific information in a first data memory, in which the first part of the system code is encrypted by a first encryption method and the second part of the system code by a symmetric encryption method, which uses the first part of the system code as a key for the symmetric encryption;
generating a random encryption key from a third character set by a third random method of a unique assignment identifier by an assignment method and storing the encryption key, the assignment identifier and at least a second object-specific information in a second data memory;
generating an object code, which consists of at least the first part of the system code and the assignment identifier encrypting the system code by a third encryption method, which uses the encryption key as a key, encrypting of the object identifier by a fourth encryption method which uses the system code as a key, and storing the encrypted system code together with the encrypted object identifier in a third data memory;
attaching the object code to the object, wherein the method provides a fourth data memory, in which query-specific data created during verification of the authenticity of the object is stored.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for identifying an object comprising at least one object identifier with an object code that is used to verify the authenticity of the object. The method comprises the following steps: creation of a unique random system code consisting of a first and a second system code, the first part of the system code being generated from a first character set by a first random method and the second part of the system code being generated from a second character set by a second random method and saving of the system code together with at least one first object-specific information in a first data memory, the first part of the system code being encrypted by a first encryption method and the second part of the system code by a second encryption method prior to being saved; creation of a random encryption key from a third character set by a third random method, creation of a unique assignment identifier by an assignment method and saving of the encryption key, assignment identifier and at least one second object-specific piece of information in a second data memory; creation of the object code, consisting of the first part of the system code and the assignment key, encryption of the object identifier by a fourth encryption method and saving of the encrypted system code together with the encrypted object identifier in a third data memory; and attachment of the object code to the object.
18 Citations
25 Claims
-
1. A method for identifying an object, comprising at least one object identifier, with an object code that is used to verify the authenticity of the object, comprising:
-
generating a unique random system code, which consists of a first and a second part of the system code, in which the first part of the system code is created from a first character set by a first random method that randomly selects a number of characters from the first character set and the second part of the system code from a second character set by a second random method that randomly selects a number of characters from the second character set, and storing the system code together with at least a first object-specific information in a first data memory, in which the first part of the system code is encrypted by a first encryption method and the second part of the system code by a symmetric encryption method, which uses the first part of the system code as a key for the symmetric encryption; generating a random encryption key from a third character set by a third random method of a unique assignment identifier by an assignment method and storing the encryption key, the assignment identifier and at least a second object-specific information in a second data memory; generating an object code, which consists of at least the first part of the system code and the assignment identifier encrypting the system code by a third encryption method, which uses the encryption key as a key, encrypting of the object identifier by a fourth encryption method which uses the system code as a key, and storing the encrypted system code together with the encrypted object identifier in a third data memory; attaching the object code to the object, wherein the method provides a fourth data memory, in which query-specific data created during verification of the authenticity of the object is stored. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 24, 25)
-
-
14. A device for identifying an object with an object code, comprising at least one object identifier, which is used for the verification of the authenticity of the object;
- comprising;
a System Code Creation circuit that creates a unique random system code, which consists of a first and a second part of the system code, wherein the first part of the system code is created from a first character set by a first random method that randomly selects a number of characters from the first character set and the second part of the system code is created from a second character set by a second random method that randomly selects a number of characters from the second character set; a First Data Memory circuit that stores the system code created by the System Code Creation circuit together with at least a first object-specific information, wherein, before storing, the first part of the system code is encrypted by a first encryption method and the second part of the system code is encrypted by a symmetric encryption method, which uses the first part of the system code as a key for the symmetric encryption; an Encryption Key Creation circuit that creates a random encryption key from a third character set by a third random method and a unique assignment identifier by an assignment method; a Second Data Memory circuit that stores the created encryption key, the assignment identifier and at least a second object-specific information; an Object Code Creation circuit that creates an object code, which consists of at least the first part of the system code and the assignment identifier; a Third Data Memory circuit that stores the system code encrypted by a third encryption method, which uses the encryption key as a key, together with the object identifier, which is encrypted by a fourth encryption method which uses the system code as a key; an Object Code Attachment circuit that attaches the object code to the object; and a fourth Data Memory circuit that stores query-specific data, which is generated during the verification of the authenticity of the object. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
- comprising;
Specification