US20080149518A1 - Protection and authentication device for a collectable object - Google Patents
Protection and authentication device for a collectable object Download PDFInfo
- Publication number
- US20080149518A1 US20080149518A1 US12/072,618 US7261808A US2008149518A1 US 20080149518 A1 US20080149518 A1 US 20080149518A1 US 7261808 A US7261808 A US 7261808A US 2008149518 A1 US2008149518 A1 US 2008149518A1
- Authority
- US
- United States
- Prior art keywords
- protection
- collectable object
- authentication device
- collectable
- digital image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004321 preservation Methods 0.000 claims abstract description 4
- 238000000926 separation method Methods 0.000 claims abstract description 4
- 230000000007 visual effect Effects 0.000 description 7
- 239000011159 matrix material Substances 0.000 description 4
- 238000000034 method Methods 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 3
- 238000005299 abrasion Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 239000002932 luster Substances 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- NIXOWILDQLNWCW-UHFFFAOYSA-N acrylic acid group Chemical group C(C=C)(=O)O NIXOWILDQLNWCW-UHFFFAOYSA-N 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 238000003466 welding Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D85/00—Containers, packaging elements or packages, specially adapted for particular articles or materials
- B65D85/58—Containers, packaging elements or packages, specially adapted for particular articles or materials for ball bearings, washers, buttons or like spherical or disc-shaped articles
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D11/00—Containers having bodies formed by interconnecting or uniting two or more rigid, or substantially rigid, components made wholly or mainly of plastics material
- B65D11/10—Containers having bodies formed by interconnecting or uniting two or more rigid, or substantially rigid, components made wholly or mainly of plastics material of polygonal cross-section and all parts being permanently connected to each other
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D2203/00—Decoration means, markings, information elements, contents indicators
- B65D2203/06—Arrangements on packages concerning bar-codes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D2401/00—Tamper-indicating means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D25/00—Details of other kinds or types of rigid or semi-rigid containers
- B65D25/02—Internal fittings
- B65D25/10—Devices to locate articles in containers
Definitions
- the present invention relates to the protection and authentication of collectable objects such as coins, stamps, currency and baseball cards.
- PCGS Professional Coin Grading Service
- NTC Numismatic Guaranty Corporation
- the certification services provide a tamper resistant holder, there are documented cases of deceptive practices of removing the collectable object (e.g., coin) from one holder and utilizing the barcode label and grade of another certified holder to fraudulently represent a different and uncertified collectable.
- the holder is designed to be small and portable which necessitates a small label that only allows for minimal marking space and certification information.
- the user or trader would benefit from a digital image as a record of the collectable object in conjunction with the certification data for viewing and authentication of the collectable object.
- Other benefits are achieved by providing a secret security protocol that links the collectable object with the digital image of the collectable object.
- a protection and authentication device for a collectable object comprises a holder formed for assembly with at least one collectable object to provide protection and preservation of the collectable object.
- the holder is formed so as to resist disassembly and separation with the collectable object.
- the holder further comprises a machine readable coded marking, such as a barcode, that is nondetachably secured to the protection, authentication device.
- the coded marking comprises a cryptographic protocol means for a user to view at least one digital image of the collectable object via a standard computer system to aid the user in the authentication of the collectable object.
- the digital image may be stored at a predetermined remote database.
- a quality digital image (or images) of the collectable object that are created and securely stored at the time of certification of the collectable can serve as a future record to validate authenticity.
- Collectable objects such as rare coins, have unique visual characteristics such as strike, centering, abrasions, luster, dates, wear, mintmarks, and die-varieties. These characteristics can be visually evaluated by a user or buyer to aid in the validation that the certified collectable object has not been deceptively altered or switched with an inferior example or even a counterfeit example.
- Other examples of collectables that will benefit from a protection and authentication device would include for example, stamps, baseball cards, currency, and autographs, and historical documents.
- a coded marking such as a barcode that comprises the means of securely accessing a digital image of the corresponding collectable object, while promoting user security prompted by line-of-sight requirements of a machine that reads the appropriate barcode.
- RFID Radio Frequency Identification
- RFID enabled devices may create a potential security risk of privacy of a user of a rare and valuable collectable object by an unintended third party.
- a security protocol such as a cryptographic protocol
- FIG. 1 shows a right front perspective, exploded view of one embodiment of the present invention device shown disassembled.
- FIG. 2 shows a top plan view of another embodiment of the present invention.
- FIG. 3 shows a top plan elevation view of another embodiment of the present invention.
- FIG. 4 shows a diagram of one embodiment of the present invention that is similar to FIG. 1 .
- FIG. 1 shows a disassembled view of one embodiment of the present invention.
- a protection and authentication device for a collectable object 1 is comprised of a collectable object 11 , a barcode label 9 with visual markings 5 of the collectable object, for example coin 11 , and a tamper resistant collectable holder comprised of an upper housing 3 , and a lower housing 23 that are formed to enclose and protect coin 11 , and barcode label 9 .
- a “holder” shall mean a device that holds an one or more objects.
- the holder is made of a clear plastic, e.g., acrylic, and is designed to be tamper resistant by providing a means that will make it difficult for a user or owner to disassemble the holder once assembled.
- Tamer resistant shall mean, resists interference as to weaken or change for the worse. This can be accomplished by a method that securely bonds the upper housing 3 and lower housing 23 , such as ultrasonic welding of the plastic mating surfaces.
- Inner core 19 is comprised of an inert plastic material and securely holds coin 11 by means of a cut-through opening 17 that allows viewing of the obverse and reverse of the coin.
- Label 9 comprises visual markings 5 , such as the alphanumeric descriptors of collectable coin 11 and may include, but are not limited to, the coin's date, denomination, certification grade, and the machine-readable coded marking, such as a barcode.
- a coded marking is described as a machine-readable representation of information (usually dark ink on a light or contrasting background to create high and low reflectance which is converted to 1s and 0s).
- a good example of a coded marking is a barcode.
- Barcode 7 is just one example of Linear type barcode or a one-dimensional (1D) symbology barcode. When barcode 7 is read by the appropriate barcode reader device, barcode 7 would typically provide basic characteristics of coin 11 corroborating the visual alphanumeric markings of barcode label 9 .
- Label 9 is nondetachably secured to the protection and authentication device by placement into inner core 19 , and the bonding of upper housing 3 to lower housing 23 .
- Barcode 7 also comprises a security protocol, such as a cryptographic protocol means for a user to securely access and view at least one digital image of collectable object 11 .
- a cryptographic protocol is a protocol that performs a security-related function and applies cryptographic methods.
- Cryptographic protocols often utilize one or more underlying key agreement methods that would typically be advantageous to the present invention.
- Just some examples of cryptographic protocols, but not limited to, include key agreements or establishments, entity authentication, symmetric encryption, asymmetric encryption, digital signatures, digital credentials, blind signatures, and shared-secret protocols.
- Various forms of cryptographic protocols could be utilized and encoded in Barcode 7 .
- Public-key cryptography also known as asymmetric cryptography is described as one example for the purpose of describing the present invention.
- Public-key cryptography is a form of cryptography in which a user has a pair of cryptographic keys, a public key and a private key.
- the private key is held secret, while the public key can be widely distributed.
- the keys are related mathematically, but the private key cannot be practically derived from the public key.
- a message encrypted with the public key can be decrypted only with the corresponding private key.
- Barcode 7 maintains a public key linked to a corresponding digital image of coin 11 , that is distributed by a Public-Key-infrastructure (PKI), for example, the certification service that is certifying (and imaging) the collectable object.
- PKI Public-Key-infrastructure
- a certification service shall be described as an industry authority on specific collectable objects, and that provide an expert opinion of grade, authenticity and certification of the collectable object.
- the certification service would encode Barcode 7 , with a public key that can only be decrypted by the certification service's private key, or the certificate authority that has ownership of the private key.
- Barcode 7 may include various means to link to the certification services private network. For example, when Barcode 7 is decoded by means of the appropriate barcode reader, it will reveal a key to the certification services private network and the corresponding digital image of coin 11 that is housed with barcode 7 .
- the key may be in several forms and dependent on the type of cryptography, but would typically include such examples as an encrypted hash function, a random selection of bytes that could be associated with the barcode serial number, or even a message that incorporates a basic description of coin 11 .
- the encoded barcode would typically provide the means to link to the PKI, by such means as a Uniform Resource Locator (URL), or a Hyperlink.
- the PKI maintaining possession of the key pairs, provides the means for decryption, and confidential access and viewing of the corresponding digital image/s of coin 11 by a user of the public key.
- the PKI would be the certification service, but another entity could provide the service in conjunction with the certification service.
- the PKI would typically issue the certificate keys, and link the corresponding digital image/s of the collectable object at the time of certification of the collectable object, for a future record of authentication.
- the digital image/s of a collectable coin for example, will typically possess unique visual characteristics such as strike variations, centering of design, abrasions, luster qualities, date of issue, wear, coloration, mintmarks, and die-varieties, etc., and serve as a future record of coin 11 . Such characteristics can be visually evaluated by a user or buyer to validate that the certified collectable object has not been deceptively altered or switched with an inferior example, or even a counterfeit example after the coin has been certified and encapsulated by the certification.
- Other examples of collectables that would be applicable to the present invention, a protection and authentication device for a collectable object, would include for example, stamps, baseball cards, currency, autographs, and historical documents.
- FIG. 2 shows a top plan view of another embodiment of the present invention.
- a protection and authentication device for a collectable object 30 is comprised of a collectable object 37 , a coded marking such as barcode 35 with visual typical visual descriptive markings 33 of the collectable object, a collectable object (coin) 37 , and a tamper resistant collectable holder 31 .
- Holder 31 is shown as only one of many different possible sizes and form factors that would be applicable to the present invention.
- Barcode 35 comprises a security protocol means for an electronic link that fetches a remote database, such as a certification service's database, so a user can view at least one digital image of collectable coin 37 .
- a hyperlink is a coded reference or navigation element in a document to another section of the same document or to another document at a different website location. In this case, the hyperlink would navigate to the appropriate remote database location so a user can view the corresponding digital image of collectable 37 .
- the website might utilize a user login and password to verify the user's identity.
- the remote website may also provide linked associative data of collectable 37 such as the certification service's population reports, valuation, and interesting history associated with collectable object 37 .
- the user might decide to initiate trading of collectable object 37 , which shall refer to the sale or auction of collectable object 37 , by performing certain user interface protocols, and the digital image of collectable object 37 could then be activated for public viewing as a certified record of the collectable, and offered for sale or auction bidding.
- the auction or sales protocol could be prompted by a user interface protocol at the remote website or another trusted external site, such as an auction company's website.
- FIG. 3 shows another embodiment of the present invention.
- a top plan view of a protection and authentication device for a collectable object 40 is comprised of a collectable object (coin) 37 , two different types of coded markings, or barcodes symbologies, barcode 43 , a linear type barcode or one-dimensional (1D) symbology, and barcode 44 , a data matrix type barcode or two-dimensional (2D) symbology.
- the protection and authentication device for a collectable object 40 may contain more than just one barcode, but at least one barcode comprises a security protocol to electronically link to the corresponding digital image/s of the collectable coin 37 .
- Barcode 43 may be a coded marking with basic encoding relative to the sequential certification information associated with coin 37
- barcode 44 a data matrix barcode could provide the electronic link, or security protocol.
- a data matrix barcode is a Semacode that incorporates machine-readable data matrix symbols that encode an Internet Uniform Resource Locator (URL).
- Semacodes are also referred to as “graphical tags” that can be read by a portable phone's camera using Semacode's SDK software and provide an encoded means to link to a predetermined Internet location.
- the encoding of the Semacode 44 could have the encoded URL that fetches the corresponding digital image of coin 37 electronically, that is stored at a predetermined remote database, such as a certification service's database.
- barcode 43 could comprise another different security protocol, for example, a one-way-link.
- a one-way-link is a type of hyperlink that points to a website without any reciprocal link; thus the link goes “one way” in direction, and provides the encoded destination for viewing the corresponding digital image/s of coin 37 .
- the certification service may utilize other security features such as a user login and password to validate the user's identity.
- FIG. 4 shows a diagram of one embodiment of the present invention that is similar to FIG. 1 .
- a protective holder 300 houses at least one collectable object 305 and a coded marking, such as barcode 303 , that is encoded with a cryptographic key such as a public key.
- the appropriate barcode reader device such as laser scanning device 307 , reads barcode 303 and provides a user with the barcode data to computer system 309 .
- the barcode data may include basic information, such as the collectable's grade, date, and certification information.
- Barcode 303 also provides a cryptographic key, for example that may be in the form of an encrypted message or big number, and can be sent to a Public-Key-Infrastructure (PKI), such as a certification service's remote network 311 .
- PKI Public-Key-Infrastructure
- the PKI decrypts the public key with the ownership of a private key and enables access to securely view a linked image(s) of collectible object 305 that is stored in the PKI's database.
- the PKI may utilize other security features such as a user login and password to validate the user's identity.
- the PKI may also provide linked associative data of collectable 305 such as internet hyperlinks that could bring a user to other internal sites or external sites, including external sites that have a trusted agreement with the PKI, such as an auction company.
- Additional secret data such as the certification service's population reports, may also be made available to the user.
- the user might decide to initiate the sale or auction of collectable 305 , by performing certain user interface protocols, and the digital image of collectable 305 could then be activated for public viewing for sale or auction bidding.
- the auction or sales protocol could be prompted by a user interface protocol at the PKI's remote network or another external site that has a key agreement with the PKI such as auction company 313 .
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
In one embodiment of the present invention, a protection and authentication device for a collectable object is described. The protection, authentication device comprises a holder formed for assembly with at least one collectable object to provide protection and preservation of the collectable object. The holder is formed so as to resist disassembly and separation with the collectable object. The holder further comprises a machine readable coded marking, such as a barcode that is nondetachably secured to the protection, authentication device. The coded marking, comprises a cryptographic protocol means for a user to view at least one digital image of the collectable object via a standard computer system to aid the user in the authentication of the collectable object. The digital image may be stored at a predetermined remote database.
Description
- This application is a continuation-in-part of U.S. patent application Ser. No. 11/493,312 filed on Jul. 26, 2006, by the inventor herein, entitled PROTECTION, AUTHENTICATION, IDENTIFICATION DEVICE FOR A COLLECTABLE OBJECT.
- The present invention relates to the protection and authentication of collectable objects such as coins, stamps, currency and baseball cards.
- An industry for authentication, identification and certification of collectables has gained prominence and certification companies such as the Professional Coin Grading Service (PCGS) and the Numismatic Guaranty Corporation (NGC) have developed protective collectable holders to protect collectable objects such as coins, stamps, currency, and baseball cards. They encapsulate the collectable object and provide a professional opinion for condition and authenticity. These certified holders typically contain a standard barcode and serial number that are used for processing and basic certification information. The information typically relates to the grade, date and denomination and fails to validate that the collectable object has not been deceptively switched with a similar like kind collectable object that is inferior in grade, damaged, or even counterfeit. Although the certification services provide a tamper resistant holder, there are documented cases of deceptive practices of removing the collectable object (e.g., coin) from one holder and utilizing the barcode label and grade of another certified holder to fraudulently represent a different and uncertified collectable. Additionally, the holder is designed to be small and portable which necessitates a small label that only allows for minimal marking space and certification information. Often times the user or trader would benefit from a digital image as a record of the collectable object in conjunction with the certification data for viewing and authentication of the collectable object. Other benefits are achieved by providing a secret security protocol that links the collectable object with the digital image of the collectable object. This would facilitate a more secure means for authentication of the collectable object and increased authentication for marketing, trading, auctions and Internet sales, insurance validation, or simply an ownership validation of the certified collectable. The owner or buyer of a collectable object may also have an interest in additional information relative to the collectable object such as interesting historical information, current valuations, condition populations, and other relevant information. Applicant believes that an improved and more secure system is described for the protection and authentication of collectable objects, and would benefit multiple related collectable-based industries.
- In one embodiment of the present invention, a protection and authentication device for a collectable object is described. The protection, authentication device comprises a holder formed for assembly with at least one collectable object to provide protection and preservation of the collectable object. The holder is formed so as to resist disassembly and separation with the collectable object. The holder further comprises a machine readable coded marking, such as a barcode, that is nondetachably secured to the protection, authentication device. The coded marking comprises a cryptographic protocol means for a user to view at least one digital image of the collectable object via a standard computer system to aid the user in the authentication of the collectable object. The digital image may be stored at a predetermined remote database.
- Recognizing the need for an improved protection and authentication for collectable objects, the following objectives are considered:
- It is an important objective of the present invention to provide for a secure means for a user to validate authentication of a collectable by means of viewing and evaluating a digital image of the collectable that corresponds to the certification of the collectable by a trusted source such as a certification service. A quality digital image (or images) of the collectable object that are created and securely stored at the time of certification of the collectable, can serve as a future record to validate authenticity. Collectable objects such as rare coins, have unique visual characteristics such as strike, centering, abrasions, luster, dates, wear, mintmarks, and die-varieties. These characteristics can be visually evaluated by a user or buyer to aid in the validation that the certified collectable object has not been deceptively altered or switched with an inferior example or even a counterfeit example. Other examples of collectables that will benefit from a protection and authentication device would include for example, stamps, baseball cards, currency, and autographs, and historical documents.
- It is another important objective of the present invention to provide a practical sized portable holder for a collectable object that is tamper resistant and promotes protection of the collectable object stored in the holder.
- It is another important objective of the present invention to provide a coded marking, such as a barcode that comprises the means of securely accessing a digital image of the corresponding collectable object, while promoting user security prompted by line-of-sight requirements of a machine that reads the appropriate barcode. Unlike other antenna based technologies, such as Radio Frequency Identification (RFID) that do not require line-of sight-requirements, it is an important objective of the present invention to provide authentication of the collectable without the use of radio frequency reading technologies. RFID enabled devices may create a potential security risk of privacy of a user of a rare and valuable collectable object by an unintended third party.
- It is another important objective of the present invention to provide the user with digital images of the collectable that can be viewed by means of a standard computer system with Internet capability.
- It is another important objective of the present invention to provide a security protocol, such as a cryptographic protocol, that provides for a user or trader of the collectable object the ability to electronically and securely access a digital image of the collectable object for user authentication, trading and sales.
- It is another important objective of the present invention to provide for the means to store the collectable object and the a coded marking, such as a barcode together, in a method that resists disassembly so as to create higher probability that the owner will be required to utilize the protection and authentication device as a means for accessing the digital image and authentication of the corresponding collectable object.
- It is another important objective of the present invention to provide a user a means of utilizing the digital image and certification of the collectable for other authentication benefits, such as insurance verification and records documentation.
- It is another important objective of the present invention to provide a user the means to quickly and securely link to additional characteristics of the collectable object, for example, valuation, survival population, interesting historical information, etc.
-
FIG. 1 shows a right front perspective, exploded view of one embodiment of the present invention device shown disassembled. -
FIG. 2 shows a top plan view of another embodiment of the present invention. -
FIG. 3 shows a top plan elevation view of another embodiment of the present invention. -
FIG. 4 shows a diagram of one embodiment of the present invention that is similar toFIG. 1 . - The various drawings provided herein are for the purpose of illustrating possible embodiments of the present invention and not for the purpose of limiting the same. Therefore, the drawings herein represent only a few of the many possible variations of the present invention.
-
FIG. 1 shows a disassembled view of one embodiment of the present invention. A protection and authentication device for acollectable object 1, is comprised of acollectable object 11, a barcode label 9 withvisual markings 5 of the collectable object, forexample coin 11, and a tamper resistant collectable holder comprised of anupper housing 3, and alower housing 23 that are formed to enclose and protectcoin 11, and barcode label 9. A “holder” shall mean a device that holds an one or more objects. The holder is made of a clear plastic, e.g., acrylic, and is designed to be tamper resistant by providing a means that will make it difficult for a user or owner to disassemble the holder once assembled. “Tamper resistant” shall mean, resists interference as to weaken or change for the worse. This can be accomplished by a method that securely bonds theupper housing 3 andlower housing 23, such as ultrasonic welding of the plastic mating surfaces.Inner core 19 is comprised of an inert plastic material and securely holdscoin 11 by means of a cut-throughopening 17 that allows viewing of the obverse and reverse of the coin. Label 9 comprisesvisual markings 5, such as the alphanumeric descriptors ofcollectable coin 11 and may include, but are not limited to, the coin's date, denomination, certification grade, and the machine-readable coded marking, such as a barcode. A coded marking is described as a machine-readable representation of information (usually dark ink on a light or contrasting background to create high and low reflectance which is converted to 1s and 0s). A good example of a coded marking is a barcode. There are many types of barcodes that could be utilized in the present invention. Barcode 7 is just one example of Linear type barcode or a one-dimensional (1D) symbology barcode. Whenbarcode 7 is read by the appropriate barcode reader device,barcode 7 would typically provide basic characteristics ofcoin 11 corroborating the visual alphanumeric markings of barcode label 9. Label 9 is nondetachably secured to the protection and authentication device by placement intoinner core 19, and the bonding ofupper housing 3 tolower housing 23. Barcode 7 also comprises a security protocol, such as a cryptographic protocol means for a user to securely access and view at least one digital image ofcollectable object 11. A cryptographic protocol is a protocol that performs a security-related function and applies cryptographic methods. Cryptographic protocols often utilize one or more underlying key agreement methods that would typically be advantageous to the present invention. Just some examples of cryptographic protocols, but not limited to, include key agreements or establishments, entity authentication, symmetric encryption, asymmetric encryption, digital signatures, digital credentials, blind signatures, and shared-secret protocols. Various forms of cryptographic protocols could be utilized and encoded inBarcode 7. Public-key cryptography, also known as asymmetric cryptography is described as one example for the purpose of describing the present invention. Public-key cryptography is a form of cryptography in which a user has a pair of cryptographic keys, a public key and a private key. The private key is held secret, while the public key can be widely distributed. The keys are related mathematically, but the private key cannot be practically derived from the public key. A message encrypted with the public key can be decrypted only with the corresponding private key. For example,Barcode 7 maintains a public key linked to a corresponding digital image ofcoin 11, that is distributed by a Public-Key-infrastructure (PKI), for example, the certification service that is certifying (and imaging) the collectable object. A certification service shall be described as an industry authority on specific collectable objects, and that provide an expert opinion of grade, authenticity and certification of the collectable object. As an example, the certification service would encodeBarcode 7, with a public key that can only be decrypted by the certification service's private key, or the certificate authority that has ownership of the private key.Barcode 7 may include various means to link to the certification services private network. For example, whenBarcode 7 is decoded by means of the appropriate barcode reader, it will reveal a key to the certification services private network and the corresponding digital image ofcoin 11 that is housed withbarcode 7. The key may be in several forms and dependent on the type of cryptography, but would typically include such examples as an encrypted hash function, a random selection of bytes that could be associated with the barcode serial number, or even a message that incorporates a basic description ofcoin 11. The encoded barcode would typically provide the means to link to the PKI, by such means as a Uniform Resource Locator (URL), or a Hyperlink. The PKI, maintaining possession of the key pairs, provides the means for decryption, and confidential access and viewing of the corresponding digital image/s ofcoin 11 by a user of the public key. Typically, the PKI would be the certification service, but another entity could provide the service in conjunction with the certification service. The PKI would typically issue the certificate keys, and link the corresponding digital image/s of the collectable object at the time of certification of the collectable object, for a future record of authentication. The digital image/s of a collectable coin for example, will typically possess unique visual characteristics such as strike variations, centering of design, abrasions, luster qualities, date of issue, wear, coloration, mintmarks, and die-varieties, etc., and serve as a future record ofcoin 11. Such characteristics can be visually evaluated by a user or buyer to validate that the certified collectable object has not been deceptively altered or switched with an inferior example, or even a counterfeit example after the coin has been certified and encapsulated by the certification. Other examples of collectables that would be applicable to the present invention, a protection and authentication device for a collectable object, would include for example, stamps, baseball cards, currency, autographs, and historical documents. -
FIG. 2 shows a top plan view of another embodiment of the present invention. A protection and authentication device for acollectable object 30, is comprised of acollectable object 37, a coded marking such asbarcode 35 with visual typical visualdescriptive markings 33 of the collectable object, a collectable object (coin) 37, and a tamper resistantcollectable holder 31.Holder 31 is shown as only one of many different possible sizes and form factors that would be applicable to the present invention.Barcode 35 comprises a security protocol means for an electronic link that fetches a remote database, such as a certification service's database, so a user can view at least one digital image ofcollectable coin 37. There are many types of electronic links such as hyperlinks, in-line links, deep-links, embedded links. For the purpose of the present invention, and as only one example, a hyperlink is described. A hyperlink is a coded reference or navigation element in a document to another section of the same document or to another document at a different website location. In this case, the hyperlink would navigate to the appropriate remote database location so a user can view the corresponding digital image of collectable 37. As an additional security means, the website might utilize a user login and password to verify the user's identity. The remote website may also provide linked associative data of collectable 37 such as the certification service's population reports, valuation, and interesting history associated withcollectable object 37. The user might decide to initiate trading ofcollectable object 37, which shall refer to the sale or auction ofcollectable object 37, by performing certain user interface protocols, and the digital image ofcollectable object 37 could then be activated for public viewing as a certified record of the collectable, and offered for sale or auction bidding. The auction or sales protocol could be prompted by a user interface protocol at the remote website or another trusted external site, such as an auction company's website. -
FIG. 3 shows another embodiment of the present invention. A top plan view of a protection and authentication device for acollectable object 40, is comprised of a collectable object (coin) 37, two different types of coded markings, or barcodes symbologies,barcode 43, a linear type barcode or one-dimensional (1D) symbology, andbarcode 44, a data matrix type barcode or two-dimensional (2D) symbology. The protection and authentication device for acollectable object 40, may contain more than just one barcode, but at least one barcode comprises a security protocol to electronically link to the corresponding digital image/s of thecollectable coin 37.Barcode 43 may be a coded marking with basic encoding relative to the sequential certification information associated withcoin 37, andbarcode 44, a data matrix barcode could provide the electronic link, or security protocol. For example, one type of a data matrix barcode is a Semacode that incorporates machine-readable data matrix symbols that encode an Internet Uniform Resource Locator (URL). Semacodes are also referred to as “graphical tags” that can be read by a portable phone's camera using Semacode's SDK software and provide an encoded means to link to a predetermined Internet location. The encoding of theSemacode 44 could have the encoded URL that fetches the corresponding digital image ofcoin 37 electronically, that is stored at a predetermined remote database, such as a certification service's database. Alternately, or as an additional security feature,barcode 43 could comprise another different security protocol, for example, a one-way-link. A one-way-link is a type of hyperlink that points to a website without any reciprocal link; thus the link goes “one way” in direction, and provides the encoded destination for viewing the corresponding digital image/s ofcoin 37. The certification service may utilize other security features such as a user login and password to validate the user's identity. -
FIG. 4 shows a diagram of one embodiment of the present invention that is similar toFIG. 1 . Aprotective holder 300 houses at least onecollectable object 305 and a coded marking, such asbarcode 303, that is encoded with a cryptographic key such as a public key. The appropriate barcode reader device, such aslaser scanning device 307, readsbarcode 303 and provides a user with the barcode data tocomputer system 309. The barcode data may include basic information, such as the collectable's grade, date, and certification information.Barcode 303 also provides a cryptographic key, for example that may be in the form of an encrypted message or big number, and can be sent to a Public-Key-Infrastructure (PKI), such as a certification service'sremote network 311. The PKI decrypts the public key with the ownership of a private key and enables access to securely view a linked image(s) ofcollectible object 305 that is stored in the PKI's database. The PKI may utilize other security features such as a user login and password to validate the user's identity. The PKI may also provide linked associative data of collectable 305 such as internet hyperlinks that could bring a user to other internal sites or external sites, including external sites that have a trusted agreement with the PKI, such as an auction company. Additional secret data, such as the certification service's population reports, may also be made available to the user. The user might decide to initiate the sale or auction of collectable 305, by performing certain user interface protocols, and the digital image of collectable 305 could then be activated for public viewing for sale or auction bidding. The auction or sales protocol could be prompted by a user interface protocol at the PKI's remote network or another external site that has a key agreement with the PKI such asauction company 313. - Unless otherwise specifically stated, the terms and expressions have been used herein as terms of description and not limitation. There is no intention to use the terms or expressions to exclude any equivalents of features shown and described or portions thereof, and this invention should be defined in accordance with the claims that follow, or the equivalence thereof.
Claims (20)
1. A protection and authentication device for a collectable object, said device comprising a holder formed for assembly with at least one collectable object to provide protection and preservation of said collectable object, said holder being formed so as to resist disassembly and separation with said collectable object, a machine readable coded marking nondetachably secured to said protection and authentication device, said marking comprising a cryptographic protocol means for a user to view at least one digital image of said collectable object via a standard computer system to aid said user in the authentication of said collectable object, and, said digital image being stored at a predetermined remote database.
2. A protection and authentication device of claim 1 , wherein said machine readable marking is a barcode type marking.
3. A protection and authentication device of claim 1 , wherein the digital image of the collectable object provides an authenticated record of the collectable object.
4. A protection and authentication device of claim 1 , wherein said predetermined remote database may also provide a secure protocol for said user to electronically trade said collectable object utilizing said digital image as a means of authentication of the collectable object.
5. A protection and authentication device of claim 1 , wherein said predetermined database may also provide additional characteristics of said collectable object.
6. A protection and authentication device of claim 2 , wherein the digital image of the collectable object provides an authenticated record of the collectable object.
7. A protection and authentication device of claim 2 , wherein said predetermined remote database may also provide a secure protocol for said user to electronically trade said collectable object utilizing said digital image as a means of authentication of the collectable object.
8. A protection and authentication device of claim 2 , wherein said predetermined database may also provide additional characteristics of said collectable object.
9. A protection and authentication device of claim 3 , wherein said predetermined remote database may also provide a secure protocol for said user to electronically trade, buy or sell said collectable object utilizing said digital image as a means of authentication of the collectable object.
10. A protection and authentication device of claim 3 , wherein said predetermined remote database may also provide additional characteristics of said collectable object.
11. A protection and authentication device for a collectable object, said device comprising a holder formed for assembly with at least one collectable object to provide protection and preservation of said collectable object, said holder being formed so as to resist disassembly and separation with said collectable object, a machine readable barcode nondetachably secured to said protection and authentication device, said barcode comprising a security protocol for a user to electronically link to at least one digital image of said collectable object, said digital image being stored at a predetermined remote database and viewable via a standard computer system to aid said user in the authentication of said collectable object, and, the digital image of the collectable object providing an authenticated record of the collectable object.
12. A protection and authentication device of claim 11 , wherein said predetermined remote database may also provide a secure protocol for said user to electronically trade said collectable object utilizing said digital image as a means of authentication of the collectable object.
13. A protection and authentication device of claim 11 , wherein said predetermined remote database may also provide additional characteristics of said collectable object.
14. A protection and authentication device of claim 11 , wherein said barcode is a one-dimensional (1D) symbology.
15. A protection and authentication device of claim 11 , wherein said barcode is a two-dimensional (2D) symbology.
16. A protection and authentication device of claim 11 , wherein said cryptographic protocol means is symmetric cryptography.
17. A protection and authentication device of claim 11 , wherein said cryptographic protocol means is asymmetric cryptography.
18. A protection and authentication device of claim 11 , said barcode comprises a security protocol including an encoded electronic link to the corresponding digital image of said collectable object at said predetermined remote database.
19. A protection and authentication device of claim 11 , wherein said barcode comprises a security protocol including an encoded Uniform Resource Locator (URL) that links to the corresponding digital image of said collectable object at said predetermined remote database.
20. A protection and authentication device of claim 15 , wherein, said barcode is graphical tag.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/072,618 US20080149518A1 (en) | 2006-07-26 | 2008-02-27 | Protection and authentication device for a collectable object |
US12/924,170 US20110031139A1 (en) | 2006-07-26 | 2010-09-22 | Protection, authentication, identification device for a physical object specimen |
US12/927,565 US20110068016A1 (en) | 2006-07-26 | 2010-11-18 | Collectable display panel device with data storage component |
US12/928,280 US20110082969A1 (en) | 2006-07-26 | 2010-12-08 | Associative data storage devices for authentication of collectable objects |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/493,312 US8376133B2 (en) | 2006-07-26 | 2006-07-26 | Protection, authentication, identification device for a collectable object |
US12/072,618 US20080149518A1 (en) | 2006-07-26 | 2008-02-27 | Protection and authentication device for a collectable object |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/493,312 Continuation-In-Part US8376133B2 (en) | 2006-07-26 | 2006-07-26 | Protection, authentication, identification device for a collectable object |
US11/710,378 Continuation-In-Part US20080023371A1 (en) | 2006-07-26 | 2007-02-23 | Protection and authentication device for trading collectable objects |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/156,186 Continuation-In-Part US20080230402A1 (en) | 2006-07-26 | 2008-05-30 | Authentication and identification device for a collectable object |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080149518A1 true US20080149518A1 (en) | 2008-06-26 |
Family
ID=46330172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/072,618 Abandoned US20080149518A1 (en) | 2006-07-26 | 2008-02-27 | Protection and authentication device for a collectable object |
Country Status (1)
Country | Link |
---|---|
US (1) | US20080149518A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118436A1 (en) * | 2005-07-01 | 2007-05-24 | Mcdowell John C | Collectible holders having radio frequency identification tags and systems and methods for using the same |
US20070113451A1 (en) * | 2005-07-01 | 2007-05-24 | Mcdowell John C | Collectible holders |
US20100045148A1 (en) * | 2008-08-21 | 2010-02-25 | Seckinger Edwin A | Artifact holder and display |
US20100293600A1 (en) * | 2009-05-14 | 2010-11-18 | Microsoft Corporation | Social Authentication for Account Recovery |
US20110126618A1 (en) * | 2009-07-16 | 2011-06-02 | Blake Duane C | AURA devices and methods for increasing rare coin value |
US20120084846A1 (en) * | 2010-09-30 | 2012-04-05 | Google Inc. | Image-based key exchange |
US20120222990A1 (en) * | 2009-10-09 | 2012-09-06 | Michiko Fujiwara | Battery blister pack and method for fabricating the same |
US20130081962A1 (en) * | 2011-09-30 | 2013-04-04 | RMD Intellectual Property, LLC | Electronic Devices Grip Products |
US8550239B2 (en) * | 2011-01-21 | 2013-10-08 | Stephen Nakonechny | Interface apparatus for stacking coin holders |
CN103366439A (en) * | 2012-04-05 | 2013-10-23 | 深圳国宝造币有限公司 | Metal badge and coin, machine-readable anti-counterfeiting system thereof, and machine-readable anti-counterfeiting method of same |
US20140077928A1 (en) * | 2012-09-18 | 2014-03-20 | Broadcom Corporation | System, Method and Computer Program Product for Detecting Tampering in a Product |
AU2013205125B1 (en) * | 2013-04-13 | 2014-07-31 | Hasq Technology Pty Ltd | Method and system for the secure transfer and verification of ownership of digital sequences |
US9070056B1 (en) * | 2010-06-28 | 2015-06-30 | Boost Technologies, Llc | Incentive rewards and methods |
US9124431B2 (en) | 2009-05-14 | 2015-09-01 | Microsoft Technology Licensing, Llc | Evidence-based dynamic scoring to limit guesses in knowledge-based authentication |
US20160078333A1 (en) * | 2013-07-24 | 2016-03-17 | Hewlet-Packard Development Company, L.P. | Encoding an information object |
US11475727B2 (en) * | 2019-06-24 | 2022-10-18 | R B Edgar et al. | Method and system for determining if paper currency has numismatic value |
USD971338S1 (en) * | 2020-02-28 | 2022-11-29 | Certified Guaranty Company, LLC | Case for a trading card |
USD993324S1 (en) * | 2020-02-28 | 2023-07-25 | Certified Guaranty Company, LLC | Case for a trading card |
US20240308730A1 (en) * | 2023-03-16 | 2024-09-19 | Covering the Bases, Inc. | Container with changeable decorative insert capability |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4878579A (en) * | 1987-04-24 | 1989-11-07 | Robert M. Paul | Tamper-proof coin case |
US4915214A (en) * | 1988-10-31 | 1990-04-10 | Wieder Horst K | Holder for numismatic items |
US5113445A (en) * | 1990-07-09 | 1992-05-12 | Symbol Technologies Inc. | System for encoding data in machine readable graphic form |
US5586036A (en) * | 1994-07-05 | 1996-12-17 | Pitney Bowes Inc. | Postage payment system with security for sensitive mailer data and enhanced carrier data functionality |
US6501390B1 (en) * | 1999-01-11 | 2002-12-31 | International Business Machines Corporation | Method and apparatus for securely determining aspects of the history of a good |
US20030028494A1 (en) * | 2001-08-06 | 2003-02-06 | King Shawn L. | Electronic document management system and method |
US20040039663A1 (en) * | 1999-02-26 | 2004-02-26 | Kernz James J. | Integrated market exchange system, apparatus and method facilitating trade in graded encapsulated objects |
US20070113451A1 (en) * | 2005-07-01 | 2007-05-24 | Mcdowell John C | Collectible holders |
US20070187266A1 (en) * | 2006-02-15 | 2007-08-16 | Porter Gilbert D | Method, apparatus, and system for tracking unique items |
-
2008
- 2008-02-27 US US12/072,618 patent/US20080149518A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4878579A (en) * | 1987-04-24 | 1989-11-07 | Robert M. Paul | Tamper-proof coin case |
US4915214A (en) * | 1988-10-31 | 1990-04-10 | Wieder Horst K | Holder for numismatic items |
US5113445A (en) * | 1990-07-09 | 1992-05-12 | Symbol Technologies Inc. | System for encoding data in machine readable graphic form |
US5586036A (en) * | 1994-07-05 | 1996-12-17 | Pitney Bowes Inc. | Postage payment system with security for sensitive mailer data and enhanced carrier data functionality |
US6501390B1 (en) * | 1999-01-11 | 2002-12-31 | International Business Machines Corporation | Method and apparatus for securely determining aspects of the history of a good |
US20040039663A1 (en) * | 1999-02-26 | 2004-02-26 | Kernz James J. | Integrated market exchange system, apparatus and method facilitating trade in graded encapsulated objects |
US20030028494A1 (en) * | 2001-08-06 | 2003-02-06 | King Shawn L. | Electronic document management system and method |
US20070113451A1 (en) * | 2005-07-01 | 2007-05-24 | Mcdowell John C | Collectible holders |
US20070187266A1 (en) * | 2006-02-15 | 2007-08-16 | Porter Gilbert D | Method, apparatus, and system for tracking unique items |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070113451A1 (en) * | 2005-07-01 | 2007-05-24 | Mcdowell John C | Collectible holders |
US20070118436A1 (en) * | 2005-07-01 | 2007-05-24 | Mcdowell John C | Collectible holders having radio frequency identification tags and systems and methods for using the same |
US20100045148A1 (en) * | 2008-08-21 | 2010-02-25 | Seckinger Edwin A | Artifact holder and display |
US10013728B2 (en) | 2009-05-14 | 2018-07-03 | Microsoft Technology Licensing, Llc | Social authentication for account recovery |
US20100293600A1 (en) * | 2009-05-14 | 2010-11-18 | Microsoft Corporation | Social Authentication for Account Recovery |
US8856879B2 (en) * | 2009-05-14 | 2014-10-07 | Microsoft Corporation | Social authentication for account recovery |
US9124431B2 (en) | 2009-05-14 | 2015-09-01 | Microsoft Technology Licensing, Llc | Evidence-based dynamic scoring to limit guesses in knowledge-based authentication |
US20110126618A1 (en) * | 2009-07-16 | 2011-06-02 | Blake Duane C | AURA devices and methods for increasing rare coin value |
US8661889B2 (en) | 2009-07-16 | 2014-03-04 | Duane C. Blake | AURA devices and methods for increasing rare coin value |
US20120222990A1 (en) * | 2009-10-09 | 2012-09-06 | Michiko Fujiwara | Battery blister pack and method for fabricating the same |
US9070056B1 (en) * | 2010-06-28 | 2015-06-30 | Boost Technologies, Llc | Incentive rewards and methods |
CN103154958A (en) * | 2010-09-30 | 2013-06-12 | 谷歌公司 | Image-based key exchange |
CN105893829A (en) * | 2010-09-30 | 2016-08-24 | 谷歌公司 | Image-based key exchange |
US20120084571A1 (en) * | 2010-09-30 | 2012-04-05 | Google Inc. | Image-based key exchange |
US20120084846A1 (en) * | 2010-09-30 | 2012-04-05 | Google Inc. | Image-based key exchange |
US8855300B2 (en) * | 2010-09-30 | 2014-10-07 | Google Inc. | Image-based key exchange |
US8861724B2 (en) * | 2010-09-30 | 2014-10-14 | Google Inc. | Image-based key exchange |
US8550239B2 (en) * | 2011-01-21 | 2013-10-08 | Stephen Nakonechny | Interface apparatus for stacking coin holders |
US9210819B2 (en) * | 2011-09-30 | 2015-12-08 | Otter Products, Llc | Electronic devices grip products |
US20130081962A1 (en) * | 2011-09-30 | 2013-04-04 | RMD Intellectual Property, LLC | Electronic Devices Grip Products |
CN103366439A (en) * | 2012-04-05 | 2013-10-23 | 深圳国宝造币有限公司 | Metal badge and coin, machine-readable anti-counterfeiting system thereof, and machine-readable anti-counterfeiting method of same |
US20140077928A1 (en) * | 2012-09-18 | 2014-03-20 | Broadcom Corporation | System, Method and Computer Program Product for Detecting Tampering in a Product |
US9798294B2 (en) * | 2012-09-18 | 2017-10-24 | Nxp B.V. | System, method and computer program product for detecting tampering in a product |
WO2014165925A1 (en) * | 2013-04-13 | 2014-10-16 | Hasq Technology Pty Ltd | Method and system for the secure transfer and verification of ownership of digital sequences |
AU2013205125B1 (en) * | 2013-04-13 | 2014-07-31 | Hasq Technology Pty Ltd | Method and system for the secure transfer and verification of ownership of digital sequences |
US20160078333A1 (en) * | 2013-07-24 | 2016-03-17 | Hewlet-Packard Development Company, L.P. | Encoding an information object |
US11475727B2 (en) * | 2019-06-24 | 2022-10-18 | R B Edgar et al. | Method and system for determining if paper currency has numismatic value |
USD971338S1 (en) * | 2020-02-28 | 2022-11-29 | Certified Guaranty Company, LLC | Case for a trading card |
USD993324S1 (en) * | 2020-02-28 | 2023-07-25 | Certified Guaranty Company, LLC | Case for a trading card |
US20240308730A1 (en) * | 2023-03-16 | 2024-09-19 | Covering the Bases, Inc. | Container with changeable decorative insert capability |
US12110153B1 (en) * | 2023-03-16 | 2024-10-08 | Covering the Bases, Inc. | Container with changeable decorative insert capability |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080149518A1 (en) | Protection and authentication device for a collectable object | |
US11864642B1 (en) | Secure diamond smart cards and exchange systems therefor | |
KR101420361B1 (en) | Certification system and method for the honest goods using QR code and computer readable recoding medium for performing it | |
US8245927B2 (en) | Method and system for deterring product counterfeiting, diversion and piracy | |
US8108309B2 (en) | Protecting a manufactured item from counterfeiting | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
JP6486595B2 (en) | Source certification, goods and services certification system, and components for it | |
US20080230402A1 (en) | Authentication and identification device for a collectable object | |
RU2485590C1 (en) | Internet-based commodity turnover monitoring method | |
US20070234058A1 (en) | System and method for authenticating products | |
US20080023351A1 (en) | Protection, authentication, identification device for a collectable object | |
US8872622B2 (en) | Authentication of “source” for brands | |
CN109583894A (en) | Offer, verification method and the device of two dimensional code | |
US20080023371A1 (en) | Protection and authentication device for trading collectable objects | |
CN102930307A (en) | Anti-counterfeiting authentication method for famous wine | |
Shaik | Preventing counterfeit products using cryptography, qr code and webservice | |
CN104680226A (en) | Method for protecting the authenticity of an article against imitation and counterfeiting | |
US20070110235A1 (en) | Method and system for authenticating appraisal reports | |
ES2743047T3 (en) | Procedure to ensure the authenticity, integrity and anonymity of a data link, in particular in the presentation of the data link in the form of a two-dimensional optical code | |
CN110580629A (en) | anti-counterfeiting method for verifying authenticity of product before purchase based on variable two-dimensional code | |
JP2013134515A (en) | Method for determining authenticity of article by duplication-impossible identification mark and information code | |
Lehtonen | How to secure supply chains against counterfeit products using low-cost RFID | |
KR100530427B1 (en) | Method for multi-dimensional coding | |
CN118115175A (en) | RSA algorithm-based anti-counterfeiting tracing method | |
Claret-Tournier et al. | Tackling Counterfeiting with a Secure Online Track-and-Trace System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |