Systems and methods using an origin pattern to verify the authenticity of a host object

A technology of authenticity and pattern, applied in the direction of record carrier, transmission system, digital transmission system used by the machine, can solve the problem of high cost, and achieve the effect of reducing resource consumption

Inactive Publication Date: 2015-11-18
ENCELADUS IP HLDG
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While these measures are effective in specific applications, they are expens

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods using an origin pattern to verify the authenticity of a host object
  • Systems and methods using an origin pattern to verify the authenticity of a host object
  • Systems and methods using an origin pattern to verify the authenticity of a host object

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Implementations include the use of a unique combination of concepts and tools found in differential geometry, encryption, computer-aided design, and smartphone applications to allow manufacturers (e.g., OEMs, design houses, supply chain partners, etc.) to protect their products and assure consumers Systems and methods for product quality. Embodiments achieve protection by generating unique source patterns in the form of computer graphics driven cryptographic challenge pairs or fingerprints for each manufactured part. The source pattern includes a serial number component and a surface texture component. The surface texture component can be 2D or 3D textured, while the serial number component is text or character based, but can appear in the form of a barcode. The source pattern can be verified instantly using an application on the mobile device combined with a central verification processor to provide a semi-distributed verification system. Since the surface texture co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods use an origin pattern to verify the authenticity of a host object. The origin pattern includes a text-based serial number and a computer-graphics based surface-texture component. The serial number includes a public manufacturer identifier and an object identifier sequence that is based on a hash of a private manufacturer identifier and a private object identifier. The surface-texture component includes a two dimensional texture mapped onto a three dimensional surface, the generation of the surface being based on the hash. In response to an authentication request for an origin pair, the system may verify the serial number component exists in a data store and generate a challenge surface-texture component based on data in the data store. If the challenge surface-texture component matches, the system may use a time-location stamp to determine an authenticity probability and provide an indication of authenticity in response to the verification request.

Description

[0001] Related applications [0002] This application claims priority under 35 U.S.C. §119 to Provisional Patent Application Serial No. 61 / 971,880, filed March 28, 2014, entitled "SECURITY SCHEME FORAUTHENTICATING PRODUCTORIGINS." The subject matter of this earlier filed application is hereby incorporated by reference herein. technical field [0003] The subject matter of the present invention relates to a security scheme for verifying the origin of an object. Background technique [0004] According to the International Chamber of Commerce, counterfeit goods account for a massive 6% of global GDP each year. This 'object infringement' not only threatens the profits of the entire industry, but it can compromise the safety of inauthentic consumers who are often unaware of their products. Technologies currently being used to try to combat counterfeiting include holograms, chemical forensics, radio frequency identification and moiré ink patterns, among others. While these mea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00
CPCG06K9/00577G06K19/086G06K2009/0059G09C5/00H04L9/3239H04L9/3226G06F21/10G06V20/80G06V20/95G06K19/06037G06K19/10G06T15/04
Inventor W·P·斯科特
Owner ENCELADUS IP HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products