Data processing: financial – business practice – management – or co – Business processing using cryptography
Reexamination Certificate
2011-08-09
2011-08-09
Kucab, Jamie (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
C283S074000
Reexamination Certificate
active
07996319
ABSTRACT:
A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein.
REFERENCES:
patent: 3833795 (1974-09-01), Shoshani et al.
patent: 4463250 (1984-07-01), McNeight et al.
patent: 4629873 (1986-12-01), Stockburger et al.
patent: 4686515 (1987-08-01), Anderson et al.
patent: 4816824 (1989-03-01), Katz et al.
patent: 5160171 (1992-11-01), Gregory et al.
patent: 5249044 (1993-09-01), Von Kohorn
patent: 5267756 (1993-12-01), Molee et al.
patent: 5283422 (1994-02-01), Storch et al.
patent: 5360628 (1994-11-01), Butland
patent: 5367148 (1994-11-01), Storch et al.
patent: 5380047 (1995-01-01), Molee et al.
patent: 5418855 (1995-05-01), Liang et al.
patent: 5517336 (1996-05-01), Molee
patent: 5592561 (1997-01-01), Moore
patent: 5762377 (1998-06-01), Chamberlain
patent: 5788669 (1998-08-01), Peterson
patent: 5895073 (1999-04-01), Moore
patent: 5966205 (1999-10-01), Jung et al.
patent: 5974150 (1999-10-01), Kaish et al.
patent: 5979941 (1999-11-01), Mosher, Jr. et al.
patent: 5987138 (1999-11-01), Gilbert et al.
patent: 6038016 (2000-03-01), Jung et al.
patent: 6038334 (2000-03-01), Hamid
patent: 6039249 (2000-03-01), Szewczykowski
patent: 6069955 (2000-05-01), Coppersmith et al.
patent: 6119946 (2000-09-01), Teicher
patent: 6131718 (2000-10-01), Witschorik
patent: 6212638 (2001-04-01), Lee et al.
patent: 6226619 (2001-05-01), Halperin et al.
patent: 6246778 (2001-06-01), Moore
patent: 6358607 (2002-03-01), Grotzner et al.
patent: 6442276 (2002-08-01), Doljack
patent: 6533180 (2003-03-01), Wood
patent: 6547137 (2003-04-01), Begelfer et al.
patent: 6681214 (2004-01-01), Doljack
patent: 6788800 (2004-09-01), Carr et al.
patent: 6802447 (2004-10-01), Horng
patent: 6871789 (2005-03-01), Hilton et al.
patent: 6935560 (2005-08-01), Andreasson et al.
patent: 7038766 (2006-05-01), Kerns et al.
patent: 7042335 (2006-05-01), Franks
patent: 7097098 (2006-08-01), Roberts
patent: 7175081 (2007-02-01), Andreasson et al.
patent: 7283630 (2007-10-01), Doljack
patent: 2001/0041214 (2001-11-01), Brogger et al.
patent: 2002/0122878 (2002-09-01), Kerns et al.
patent: 2002/0146146 (2002-10-01), Miolla et al.
patent: 2003/0141358 (2003-07-01), Hudson
patent: 2003/0164401 (2003-09-01), Andreasson et al.
patent: 2003/0179902 (2003-09-01), Ambrogio et al.
patent: 2004/0034579 (2004-02-01), Xu et al.
patent: 2004/0086117 (2004-05-01), Petersen et al.
patent: 2004/0172537 (2004-09-01), Baus et al.
patent: 2004/0205343 (2004-10-01), Forth et al.
patent: 2005/0151617 (2005-07-01), Nakazawa
patent: 2005/0261935 (2005-11-01), Silverbrook et al.
patent: 2005/0261937 (2005-11-01), Silverbrook et al.
patent: 2005/0261938 (2005-11-01), Silverbrook et al.
patent: 2005/0264001 (2005-12-01), Kerns et al.
patent: 2006/0022799 (2006-02-01), Juels
patent: 2006/0054682 (2006-03-01), de la Huerga
patent: 2006/0174129 (2006-08-01), Brignone et al.
patent: 2006/0175401 (2006-08-01), Roberts
patent: 2006/0181397 (2006-08-01), Limbachiya
patent: 2006/0237547 (2006-10-01), Barenburg et al.
patent: 2006/0255130 (2006-11-01), Whewell et al.
patent: 2007/0012783 (2007-01-01), Mercolino
patent: 2007/0012784 (2007-01-01), Mercolino
patent: 2007/0023513 (2007-02-01), Andreasson et al.
patent: 2007/0198569 (2007-08-01), Johnston
patent: 010155780 (2003-05-01), None
patent: 2000-11114 (2000-01-01), None
patent: 2004342066 (2004-02-01), None
patent: 2005301556 (2005-10-01), None
patent: WO/0195249 (2001-12-01), None
patent: WO 2005/036504 (2005-04-01), None
patent: WO 2005/083644 (2005-09-01), None
patent: WO 2006/098659 (2006-09-01), None
Ranasighe, Damith C., et al., “Confronting Security and Privacy Threats in Modern RFID Systems”, The University of Adelaide Auto-ID Lab, pp. 1-7.
Staake, Thorsten, et al., “Flagship Project Anti-Counterfeiting & Secure Supply Chain”, Auto-ID Labs White Paper WP-PP-001, pp. 1-40.
Duc, Dang Nguyen, et al., “Enhancing Secuirty of EPCGlobal Gen-2 RFD Tag Against Traceabiity and Cloning”, 2006 symposium on Cryptography and Information Security, Hiroshima, Japan, Jan. 17-20, 2006, pp. 1-6.
Duc, Dan Nguyen, et al., “Enhancing Security of EPCGlobal Gen-2 RFID Tag Against Traceabiity and Cloning”, Auto-ID Labs White Paper WP-SWNET-016, pp. 1-11.
“Supply Chain Applications of RFID—Product Packaging”, ISO/TC 122/104/JWG N 05040, ISO/DIS 17366, pp. 1-20.
Laine, S., “Product Authentication with Low-Cost RFID Tags,” pp. 1-9.
Menezes et al., Handbook of Applied Cryptography, 1997, p. 175.
Schneier, Bruce, Applied Cryptography: Protocols, Algorithms and Source Code in C, Oct. 1995, pp. 44-45.
Chen, L., et al., “Key Escrow in Mutually Mistrusting Domains,” Proceedings of Security Protocols, Mark Lomas (ed.), International Workshop, Cambridge, U.K., (Apr. 10-12, 1996).
Salomaa, Arto, “Public Key Cryptography,” Chptr. 1, 2nded., Springer, (1996).
Schneier, Bruce, “Applied Crytography, Protocols, Algorithms, and Source Code in C,” Chptrs. 1, 2, 11, 17, 18, 2nded., John Wiley & Sons, Inc. (1996).
Simonds, Fred “Network Security, Data and Voice Communications,” Chptrs. 10, 12, McGraw-Hill, (1996).
Gustafson, H.M., et al., “Randomness Measures Related to Subject Occurrence,” Proceedings of Cryptography: Policy and Algorithms, Ed Dawson, and Jovan Colic (eds.), Brisbane, Queensland, Australia, (Jul. 3-5, 1995).
Bakhtiari, S., et al., “Keyed Hash Functions,” Proceedings of Cryptography: Policy and Algorithsm, Ed Dawson and Jovan Colic (eds.), Brisbane, Queensland, Australia, pp. 201-214 (Jul. 3-5, 1995).
Lee, S., et al., “Conditional Correlation Attack on Nonlinear Filter Generators,” Proceedings of Advances in Cryptology-ASIACRYPT '96, Kwangjo Kim and Tsutomu Matsumoto (eds.) (Nov. 3-7, 1996).
Johnston, R., Vulnerability Assessment Team, Los Alamos National Laboratory, An Anti-Counterfeiting Strategy Using Numeric Tokens, LAUR-04-8055, pp. 1-21.
SNAP! Serial Number Application, Inc. [online], How do Software Companies Effectively Use Serial Numbers? [retrieved on May 2, 2002] retrieved from the internet http://www.snapinc.com/Pages/faq.html.
Brand Protection—Global Services—De La Rue [online], Track and Trace/SCANet [retrieved on Jun. 12, 2002] retrieved from the internet http:/www/delarue.com/global/bps/technology/portfolio/track/track.asp.
Product Authentication (sphinx system) [online] [retrieved on Feb. 27, 2004] retrieved from the internet www.sphinx-system.com/menu.htm.
AVID identification technology for today and tomorrow [online] [retrieved on Jun. 17, 2002] retrieved from the internet http://www.avidplc.com/assettrac/how.htm.
Software and Media Copy Protection Backgrounder [online] Protected Media [retrieved on Apr. 24, 2002] retrieved from the internet http://www.power-t.com/copy—protect.html.
Tagged Asset Management [online] Tag & Trace Sending Signals for Smarter Business [retrieved on Apr. 24, 2002] retrieved from the internet http://www.climarque.co.uk/passive/security.htm.
Heritage and Arts Company Profile [online] Biocode Ltd [retrieved on Feb. 27, 2004] retrieved from the internet http://www.bioscienceyork.org.uk/members/Company—Details.cfm!CompanyID=1999.
Hitachi, Ltd., Solutions for manufacturing, distribution, tracking, secure ID management and more; Power-Point presentation handout; Feb. 2002.
Codel, Validation Reference (VR)[online] [retrieved on Feb. 27, 2004] retrieved from the internet http://www.authentic1.com/a1/howitworks/vr.htm.
Codel, The VR Tests [online] [retri
Crowell & Moring LLP
Kucab Jamie
Verify Brand LLC
LandOfFree
Authentication and tracking system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authentication and tracking system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication and tracking system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2718201