Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system

Inactive Publication Date: 2017-01-12
SUN CHEM CORP
View PDF12 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This solution effectively prevents counterfeiting by ensuring that unauthorized reproduction of the secure glyph results in intellectual property infringement, extending the security protection lifespan beyond utility patent limits and allowing for continuous authentication of products with market longevity.

Problems solved by technology

However, because the taggant represents the only source of the identification and authentication security feature, and given that the machine readable security feature of the image is coded, it therefore does not contain or form part of an intellectual property protected feature.
However, again given that the invisible designs themselves are not, nor do they contain any, intellectual property protected features, the invisible designs serve as the only security feature for identifying and authenticating the textiles.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system
  • Authentication system
  • Authentication system

Examples

Experimental program
Comparison scheme
Effect test

example 1

Authentication of an Overt Secure Glyph on an Object

[0174]A glyph for an object was provided having an n-fold rotational symmetry of 4 and which the intellectual property protected feature was visible to the naked-eye by applying a printing ink or coating containing a taggant onto the object by known application methods.

[0175]The object was then interrogated by a handheld machine reader and authentication conducted by both the naked-eye and the reader.

example 2

Authentication of a Covert Trademark Glyph on an Object and Use with a Machine

[0176]A trademark glyph was provided having an n-fold rotational symmetry of 4 and which was invisible to the naked-eye by applying a printing ink or coating onto the lid of the single use beverage dispensing cup to create the design and form of the trademark.

[0177]The beverage dispensing cup is inserted into a beverage dispensing machine or brewer, where upon insertion, the trademark glyph becomes visible to the naked-eye. The beverage dispensing cup is then subjected interrogation by an authentication apparatus incorporated within the machine and the trademark glyph is displayed a visual display on the dispensing machine.

[0178]Upon interrogation, the beverage dispensing cup is subjected to identification and authentication by the machine reader and the process of using the beverage dispensing cup either continues or is halted based on the results of the authentication for the trademark glyph appearing on...

example 3

Authentication of an Overt Trademark Glyph on an Object and Use with a Machine

[0182]A trademark glyph for an ink-jet cartridge for use in an ink-jet printer was provided which was visible to the naked-eye. A printing ink or coating containing a secure glyph is patterned deposited onto an ink-jet printer cartridge to create the design and form of the trademark glyph using a known application methods.

[0183]Trademark glyph design can be any shape because the ink-jet cartridges preferably may only be inserted into the printer in one way, so the orientation of the cartridge is mandated by the printer.

[0184]The ink-jet cartridge is then inserted into a printer and subjected to a means for interrogating the trademark glyph by a reader.

[0185]Upon interrogation of the trademark glyph, the ink-jet cartridge is subjected to identification and authentication by the reader and the process of using the ink-jet cartridge in the printer either continues and accepts the ink from the cartridge or doe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is directed to an authenticating apparatus, system and a method for authentication of an object or product having a secure glyph thereon. The invention is also directed to the use of the object or product in a machine wherein the secure glyph has an intellectual property protected feature and a machine readable feature.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority to U.S. Provisional Patent Application Ser. No. 62 / 062,425 filed Oct. 10, 2014, which is incorporated herein by reference in its entirety and for all purposes.FIELD OF THE INVENTION[0002]The present invention is directed to an authenticating apparatus, system and a method for authentication of an object or product having a secure glyph thereon, wherein the secure glyph has an intellectual property protected feature and a machine readable feature. The invention is also directed to the use of the object or product having a secure glyph thereon in a machine or device.BACKGROUND OF THE INVENTION[0003]Systems and methods have been employed to prevent or reduce counterfeiting, infringement and the parallel importing of objects and products carrying a valuable piece of intellectual property, such as a company name, logo, image, brand, copyright or trademark.[0004]Most systems and methods contain one or more prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06K7/14A47J31/44
CPCA47J31/4492G06K7/143G06F21/34G06F21/36G06Q50/184Y02A90/10G06F21/10G06Q30/0185
Inventor BLATT, JESSICAPERSLEY, SIDNEYACHKAR, CHARLESPOSTLE, STEPHENRICH, DANNY
Owner SUN CHEM CORP