WO2003007252A1 - Method for generation of authentication information and use thereof - Google Patents

Method for generation of authentication information and use thereof Download PDF

Info

Publication number
WO2003007252A1
WO2003007252A1 PCT/NO2002/000215 NO0200215W WO03007252A1 WO 2003007252 A1 WO2003007252 A1 WO 2003007252A1 NO 0200215 W NO0200215 W NO 0200215W WO 03007252 A1 WO03007252 A1 WO 03007252A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
information
authentication code
code
generation
Prior art date
Application number
PCT/NO2002/000215
Other languages
French (fr)
Inventor
Magnar Loken
Original Assignee
Kezzler As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kezzler As filed Critical Kezzler As
Publication of WO2003007252A1 publication Critical patent/WO2003007252A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C15/00Generating random numbers; Lottery apparatus
    • G07C15/006Generating random numbers; Lottery apparatus electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass

Definitions

  • Present invention relates to a method for generation of authentication information which is used in one or more subsequent authentication operations.
  • Such authentication operations can as an example be to authenticate persons, goods or other objects where the objective substantially is to decide whether some goods, person or other object is authentic in relation to given and spesific information.
  • the authentication information that is generated using the method according to the present invention is consisting of at least a first authentication code and at least a second authentication code.
  • the first code can be randomly selected or otherwise obtained and the second is generated on the basis of the first authentication code.
  • single codes or pair of codes are used in an identification or confirmation process. For instance this takes place during loging on to certain pages on a computer network such as Internet or similar, or when using for instance identity cards, banking cards or similar.
  • single codes are generated which are known to a user or a pair of codes where both codes are known for the user and where a query in a database with one code obtains the other code. The user can then himself investigate whether the pair of codes is correct.
  • the codes are generated in pairs which are defined in advance and stored for instance in a database.
  • Objects that can be authenticated is virtually every conceivable goods and products having a "genuine" origin such as branded goods such as clothing, watches, jewelry and other consumer goods. Further pharmaceuticals and medical equipment can be authenticated. Parts for instance aircrafts and other critical vehicles or critical components in the industry can also be desirable to authenticate. Additionally it can be desirable to authenticate services that are unique such as drawings, documents, etc. Valuable objects such as passports, securities, etc, can also be authenticated by using the present invention.
  • Pair of codes is most often generated using so called "random number generators" that generates a series of random numbers. These numbers can again be expressed in many different ways so that they are expressed as codes in the desired form with desired characters, ect. Thus nobody can guess or deduce the relation between the codes in a pair of codes consisting of two or more codes.
  • the disadvantage with such stored pairs of codes arises when the number of pairs of codes for instance is very high or the number of queries in the database is very high. In such case the access time for accessing the codes is reduced. Further the database is getting very large when a large number of pairs of codes is generated. This is expensive in form of storage and computer processing capacity for referencing and other handling.
  • the objective of the present invention is to substantially reduce or nearly eliminate the need for database capacity, and simultaneously handle a high, and preferably a very high number of pairs of codes.
  • the objective is substantially achieved in that the pairs of codes no longer are generated in advance and stored thereafter, but that a first random code is generated that with the use of additional information and processes are used to generate the second code in a pair of codes.
  • the additional information that is used for generating the second code in the pair of codes can be obtained as randomly selected, known information and/or in combination with one or more randomly selected, known methods or algorithms.
  • the present invention described a method for generation of authentication information for using in one or more subsequent authentication operations, which authentication information is consisting of at least a first authentication code and at least a second authentication code.
  • the method is characterized in that the second authentication code is generated on the basis of the first authentication code with one or more known methods known in advance, where the first authentication code originally is randomly selected or obtained, and the second authentication code is expressing reference to the methods and the information that was used in the generation of the second authentication code.
  • the method known in advance uses one or more randomly selected sets of known information in combination with the first authentication code for generation of the second authentication code. This is preferred since it is this information and the combination of this information together with that or those methods that are used that defines the security margin concerning to the possibility to compromise the pair of codes.
  • the randomly selected information that is used during the generation of the second authentication code can be one or more elements from a group comprising of reference values such as dates or similar, reference to text or strings of numbers, reference to coordinates or other graphical information, or reference to multidimensional matrices.
  • the authentication information attached to the object that is going to be authenticated.
  • the authentication information is subsequent to the generation transferred to a suitable carrier such as paper, plastics or directly onto the product or goods if suitable so that the codes are made available.
  • a suitable carrier such as paper, plastics or directly onto the product or goods if suitable so that the codes are made available.
  • How the carrier with the codes are attached to the goods is known art and what is expected to be mastered for those skilled in the art. It is however an important aspect with the present invention that the code in given circumstances is attached to the product in such a way that the authentication information is concealed until a seal is broken.
  • One such case is boxes, bottles, containers and similar where for instance the codes are attached on the inside of the lid on a pharmaceutical packaging or box.
  • the codes for authentication of products such as clothes where the codes are visible on the laundry tag, is sown or wowen in the fabric.
  • object specific information is it possible to use "object specific" information as part of the known information that is used in the generation of the second authentication code.
  • This can for instance be packing date, serial number, information about the manufacturer, product information or other suitable object specific information that is completely or partly unique for the product or object.
  • object spesific information can during generation of authentication codes and/or during authentication for instance be obtained from the product and/or the manufacturer of the product or object.
  • the main principle for the present invention is that the second authentication code is generated on the basis of the first authentication code, whereby a series of different methods and algorithms are used in a randomly, but reconstructional manner.
  • the numbers of attempts, methods or algorithms that is going to be used is a decision that is made with regard to statistical calculations where the objective is to optimize between security and computational resources and complexity that then is required to perform the method.
  • Another important aspect with present the invention is that the process, methods and the information that is used is not known to other that the part that is generating the authentication codes. Thus this information is the only one that is required to be stored and the savings potential according to the invention lies amongst other things in the difference in required storage capacity on this background.
  • the first or the second code is consisting reference information or also called a sequence series that is used during reconstruction so that authentication may be performed.
  • the generation of a pair of codes consisting of one or more authentication codes can take place in advance, before marking of an object, or during production the marking can be generated in real time when the production and marking is taking place. For instance a secure connection between a producer of authentication information according to present invention and a manufacturer can be established.
  • the first authentication code can be generated at the manufacturer of the product or object, or by the party that is generating the authentication codes. Further can product or product specific information for instance be transferred to the party that is generating the second authentication code as "part information" during generation of the second authentication code according to the present information.
  • the second authentication code is generated and transferred back to the manufacturer that marks the product or object with the first and the second authentication code, possibly more authentication codes if desirable together with possibly product specific information.
  • a first random number or code is generated with a chosen length.
  • the code can consist of any combination of alphanumeric numbers and letters or characters. This number will later form the basis for the second authentication code. Subsequently this additional information or data is supplied and is going to be used in the method at a later stage as previously described.
  • This type of information is typically dates, time or similar.
  • a random number is generated from a number series that is selected and defined in advance. The number series thus runs from 1 to n, where n is a lower or upper defined value. For instance the number 5 emerges.
  • the number 5 according to the method will now decide which method or algorithm that is going to be used during the generation of the second authentication code.
  • the first code and relevant information is "mixed" or is used with the now emerged and selected method outcome.
  • One or more random numbers are again generated where the method this time might be to extract some digital files.
  • the content of these is totally irrelevant, but they all ought to be very different in nature and furthermore not to large due to performance and scalability.
  • Digital files have numerous formats and it is appropriate to use an optimal mix of these, image files and similar.
  • the last operation which also can be chosen to be random, is to add and supply the reference information that describes the actual performed sequence.
  • the random, but reconstructional process is best illustrated by explaining a imagined finished authentication code. During the generation the random sequence was 3, 4 and 56. In this example the process is consisting of tree steps.
  • the first random number was 34554 and the second number before supplying the sequential information was 676.
  • the sequence is merged into this code. This also can be done in many several ways. In one conceivable case this sequence can be placed after the other code. The code is thus 6763456.
  • an application or system by some embodiment will extract this reference information, separate it from the rest of the code, and perform the sequence that was used to generate the codes the first time. During the authentication the process is of course not random, however it is reconstructed.
  • the present invention relates to authentication of a product or object preferably marked with authentication information, but not exclusively, generated according to the present invention.
  • the method is characterized in that at least the second authentication code is transferred to a process that can reconstruct the code construction that forms the basis for the generation of the first code, and that returns at least the first authentication code.
  • a process in this case can for instance be a computer able of performing the first required reconstruction of the first authentication code.
  • the transfer can be done in many different ways, but preferably via telecommunication means such as telephone, Internet, other computer networks or similar.
  • the process that returns the first authentication code also be supplied with specific product information that can assist to authenticate the product or object.
  • Figure 1 shows a sequence for generation of authentication information according to an embodiment according to the present invention
  • Figure 2 shows a sequence for generation of a pair of codes according to the present invention.
  • Figure 1 describes a sequence for generation of authentication information in the form of a pair of codes on the basis of a first authentication code represented with a random number with length n in the sequential step S ⁇ .
  • This is combined with further known information (sequence S 2 ) by a known method or algorithm (sequential step S ), where the method or algorithm is chosen amongst a number of these on the basis of a randomly selected number . This is repeated a desired number of times so that a part of the second authentication number is generated in the sequential step S m .
  • the pair of codes becomes as follows: Authentication code 1 : 3640 and second authentication code : 56411 1220. It is obvious that the first and the second code not necessarily shall have the same length or construction. Further the codes can be presented in many different ways and can also additionally be camouflaged in other information so that the codes exists in another form.

Abstract

Present invention concerns a method for generating authentication information and use thereof in one or several subsequent authentication operations. Such authentication operations can for instance be identifying people, goods or other objects and essentially to decide whether a goods, person or other object is authentic in relation to given specific information. The authentication information that is generated using the method according to the present invention is consisting of at least a first authentication code and at least a second authentication code. The first code can be randomly chosen or otherwise obtained and the second code is generated on the basis of the first authentication code.

Description

Method for Generation of Authentication Information and
Use Thereof .
Present invention relates to a method for generation of authentication information which is used in one or more subsequent authentication operations. Such authentication operations can as an example be to authenticate persons, goods or other objects where the objective substantially is to decide whether some goods, person or other object is authentic in relation to given and spesific information.
The authentication information that is generated using the method according to the present invention is consisting of at least a first authentication code and at least a second authentication code. The first code can be randomly selected or otherwise obtained and the second is generated on the basis of the first authentication code. In many applications where authentication takes place, single codes or pair of codes are used in an identification or confirmation process. For instance this takes place during loging on to certain pages on a computer network such as Internet or similar, or when using for instance identity cards, banking cards or similar. In such cases single codes are generated which are known to a user or a pair of codes where both codes are known for the user and where a query in a database with one code obtains the other code. The user can then himself investigate whether the pair of codes is correct. In such cases the codes are generated in pairs which are defined in advance and stored for instance in a database.
Objects that can be authenticated is virtually every conceivable goods and products having a "genuine" origin such as branded goods such as clothing, watches, jewelry and other consumer goods. Further pharmaceuticals and medical equipment can be authenticated. Parts for instance aircrafts and other critical vehicles or critical components in the industry can also be desirable to authenticate. Additionally it can be desirable to authenticate services that are unique such as drawings, documents, etc. Valuable objects such as passports, securities, etc, can also be authenticated by using the present invention.
Pair of codes is most often generated using so called "random number generators" that generates a series of random numbers. These numbers can again be expressed in many different ways so that they are expressed as codes in the desired form with desired characters, ect. Thus nobody can guess or deduce the relation between the codes in a pair of codes consisting of two or more codes.
The disadvantage with such stored pairs of codes arises when the number of pairs of codes for instance is very high or the number of queries in the database is very high. In such case the access time for accessing the codes is reduced. Further the database is getting very large when a large number of pairs of codes is generated. This is expensive in form of storage and computer processing capacity for referencing and other handling. The objective of the present invention is to substantially reduce or nearly eliminate the need for database capacity, and simultaneously handle a high, and preferably a very high number of pairs of codes.
The objective is substantially achieved in that the pairs of codes no longer are generated in advance and stored thereafter, but that a first random code is generated that with the use of additional information and processes are used to generate the second code in a pair of codes. The additional information that is used for generating the second code in the pair of codes can be obtained as randomly selected, known information and/or in combination with one or more randomly selected, known methods or algorithms.
In order to meet the above described objectives is it according to the present invention described a method for generation of authentication information for using in one or more subsequent authentication operations, which authentication information is consisting of at least a first authentication code and at least a second authentication code. The method is characterized in that the second authentication code is generated on the basis of the first authentication code with one or more known methods known in advance, where the first authentication code originally is randomly selected or obtained, and the second authentication code is expressing reference to the methods and the information that was used in the generation of the second authentication code.
In the preferred embodiment the method known in advance uses one or more randomly selected sets of known information in combination with the first authentication code for generation of the second authentication code. This is preferred since it is this information and the combination of this information together with that or those methods that are used that defines the security margin concerning to the possibility to compromise the pair of codes.
The randomly selected information that is used during the generation of the second authentication code can be one or more elements from a group comprising of reference values such as dates or similar, reference to text or strings of numbers, reference to coordinates or other graphical information, or reference to multidimensional matrices.
Further is the authentication information attached to the object that is going to be authenticated. The authentication information is subsequent to the generation transferred to a suitable carrier such as paper, plastics or directly onto the product or goods if suitable so that the codes are made available. How the carrier with the codes are attached to the goods is known art and what is expected to be mastered for those skilled in the art. It is however an important aspect with the present invention that the code in given circumstances is attached to the product in such a way that the authentication information is concealed until a seal is broken. One such case is boxes, bottles, containers and similar where for instance the codes are attached on the inside of the lid on a pharmaceutical packaging or box.
In another relevant example the codes for authentication of products such as clothes, where the codes are visible on the laundry tag, is sown or wowen in the fabric.
In yet another embodiment is it possible to use "object specific" information as part of the known information that is used in the generation of the second authentication code. This can for instance be packing date, serial number, information about the manufacturer, product information or other suitable object specific information that is completely or partly unique for the product or object. Such object spesific information can during generation of authentication codes and/or during authentication for instance be obtained from the product and/or the manufacturer of the product or object.
The main principle for the present invention is that the second authentication code is generated on the basis of the first authentication code, whereby a series of different methods and algorithms are used in a randomly, but reconstructional manner. The numbers of attempts, methods or algorithms that is going to be used is a decision that is made with regard to statistical calculations where the objective is to optimize between security and computational resources and complexity that then is required to perform the method. Another important aspect with present the invention is that the process, methods and the information that is used is not known to other that the part that is generating the authentication codes. Thus this information is the only one that is required to be stored and the savings potential according to the invention lies amongst other things in the difference in required storage capacity on this background.
The first or the second code is consisting reference information or also called a sequence series that is used during reconstruction so that authentication may be performed.
The generation of a pair of codes consisting of one or more authentication codes can take place in advance, before marking of an object, or during production the marking can be generated in real time when the production and marking is taking place. For instance a secure connection between a producer of authentication information according to present invention and a manufacturer can be established. The first authentication code can be generated at the manufacturer of the product or object, or by the party that is generating the authentication codes. Further can product or product specific information for instance be transferred to the party that is generating the second authentication code as "part information" during generation of the second authentication code according to the present information. The second authentication code is generated and transferred back to the manufacturer that marks the product or object with the first and the second authentication code, possibly more authentication codes if desirable together with possibly product specific information.
In one example of an embodiment of the method according to the present invention, a first random number or code is generated with a chosen length. The code can consist of any combination of alphanumeric numbers and letters or characters. This number will later form the basis for the second authentication code. Subsequently this additional information or data is supplied and is going to be used in the method at a later stage as previously described. This type of information is typically dates, time or similar. Again a random number is generated from a number series that is selected and defined in advance. The number series thus runs from 1 to n, where n is a lower or upper defined value. For instance the number 5 emerges. The number 5 according to the method will now decide which method or algorithm that is going to be used during the generation of the second authentication code. The first code and relevant information is "mixed" or is used with the now emerged and selected method outcome.
One or more random numbers are again generated where the method this time might be to extract some digital files. The content of these is totally irrelevant, but they all ought to be very different in nature and furthermore not to large due to performance and scalability. Digital files have numerous formats and it is appropriate to use an optimal mix of these, image files and similar.
When this is repeated and performed the desired number of times, the second authentication code is nearly obtained. The last operation, which also can be chosen to be random, is to add and supply the reference information that describes the actual performed sequence.
The random, but reconstructional process is best illustrated by explaining a imagined finished authentication code. During the generation the random sequence was 3, 4 and 56. In this example the process is consisting of tree steps.
The first random number was 34554 and the second number before supplying the sequential information was 676. In order to authenticate, the sequence is merged into this code. This also can be done in many several ways. In one conceivable case this sequence can be placed after the other code. The code is thus 6763456.
In the actual authentication process, an application or system by some embodiment will extract this reference information, separate it from the rest of the code, and perform the sequence that was used to generate the codes the first time. During the authentication the process is of course not random, however it is reconstructed.
The sequence and combination of methods and algorithms is put together in any combination and number thereof.
Further it is a considerable advantage with the present invention that the authentication codes that are generated and attached onto an object that is going to be authenticated are visible in "clear text" for the user of the authentication codes.
For authentication typically Internet or other telecommunications between the party that is generating the authentication information, and the party that is authenticating an object, is used. Further the present invention relates to authentication of a product or object preferably marked with authentication information, but not exclusively, generated according to the present invention. The method is characterized in that at least the second authentication code is transferred to a process that can reconstruct the code construction that forms the basis for the generation of the first code, and that returns at least the first authentication code. A process in this case can for instance be a computer able of performing the first required reconstruction of the first authentication code. The transfer can be done in many different ways, but preferably via telecommunication means such as telephone, Internet, other computer networks or similar. As an alternative embodiment can the process that returns the first authentication code also be supplied with specific product information that can assist to authenticate the product or object.
The present invention is further explified and illustrated in the accompanying drawings where: Figure 1 shows a sequence for generation of authentication information according to an embodiment according to the present invention;
Figure 2 shows a sequence for generation of a pair of codes according to the present invention.
Figure 1 describes a sequence for generation of authentication information in the form of a pair of codes on the basis of a first authentication code represented with a random number with length n in the sequential step S\ . This is combined with further known information (sequence S2) by a known method or algorithm (sequential step S ), where the method or algorithm is chosen amongst a number of these on the basis of a randomly selected number
Figure imgf000008_0001
. This is repeated a desired number of times so that a part of the second authentication number is generated in the sequential step Sm. Following this "part code" is combined with the description of the actual performed sequence (sequential step Sm+ι) so that this process is reconstructional and that this is expressed in the second authentication code (sequential step Sm +2). It is in Figure 2 further shown an example for generation of authentication information consisting of a pairs of codes according to the present invention. The first authentication code is randomly selected to be 3640 (sequential step Si in Figure 1). Following the first steps of the method according the present invention, as described in the sequential step Sm in Figure 1, the number 5641 emerges. The sequence that is used is method 1 with information 12 and 20. This information is added (sequential step Sm+ι in Figure 1) and the second authentication code is then: 5641 1 1220 (sequential step Sm + 2 in Figure 1).
The pair of codes becomes as follows: Authentication code 1 : 3640 and second authentication code : 56411 1220. It is obvious that the first and the second code not necessarily shall have the same length or construction. Further the codes can be presented in many different ways and can also additionally be camouflaged in other information so that the codes exists in another form.

Claims

1. Method for generation of authentication information for one or more subsequent authentication operations, which authentication information is consisting of at least a first authentication code and a second authentication code characterised in that the second authentication code is generated on the basis of the first authentication code by a method known in advance, where the first authentication code is originally randomly selected or randomly generated and that the second authentication code is expressing reference to the methods and the information that was used in the generation of the second authentication code.
2. Method according to claim 1, characterised in that the method known is advance uses one or more randomly selected sets of known information in combination with the first authentication code for generation of the second authentication code.
3. Method according to claim 2, characterised in that the randomly selected in advance known information is consisting from a group consisting of for instance: reference values such as dates or similar, reference to text strings or numbers strings, reference to coordinates or other graphical information, or reference to multidimensional matrices.
4. Method according to claim 1 , characterised in that the randomly in advance known information uses one or more sets of known product specific information in combination with the first authentication code for generation of the second authentication code.
5. Method according to claim 4, characterised in that the product specific information is selected from a group consisting of: serial number, production or packing date, product name, manufacturer or similar.
6. Method according to claim 1-5, characterised in that the authentication information is attached to the product so that it can be authenticated.
7. Method for authenticating a product or object marked with the authentication information according to claim 1-6, characterised in that at least the second authentication code is transferred to a process that is able to reconstruct the construction of the code that forms the basis for the generation of the first code, and that returns at least the first authentication code.
8. Method according to claim 7, i characterised in that the process that returns the first authentication code also returns product specific information that assists to authenticate the product or object.
PCT/NO2002/000215 2001-06-20 2002-06-18 Method for generation of authentication information and use thereof WO2003007252A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20013078A NO314372B1 (en) 2001-06-20 2001-06-20 Procedure for generating and subsequently using authentication information
NO20013078 2001-06-20

Publications (1)

Publication Number Publication Date
WO2003007252A1 true WO2003007252A1 (en) 2003-01-23

Family

ID=19912583

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2002/000215 WO2003007252A1 (en) 2001-06-20 2002-06-18 Method for generation of authentication information and use thereof

Country Status (2)

Country Link
NO (1) NO314372B1 (en)
WO (1) WO2003007252A1 (en)

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10343064A1 (en) * 2003-09-16 2005-05-04 Sata Farbspritztechnik Procedure for authenticating a product
EP1837813A1 (en) * 2006-03-15 2007-09-26 Sap Ag System and method for verification of identifiers
EP1852837A1 (en) * 2006-05-05 2007-11-07 Nahro Oktay Method for authenticating a product
US7614546B2 (en) 2005-02-03 2009-11-10 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US7766240B1 (en) 2008-07-19 2010-08-03 Yottamark, Inc. Case-Level Traceability without the need for inline printing
US7823768B2 (en) 2006-02-02 2010-11-02 Yottamark, Inc. System and method of code generation and authentication
US7909239B2 (en) 2007-09-07 2011-03-22 Yottamark, Inc. Attributing harvest information with unique identifiers
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US8155313B2 (en) 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US8240564B2 (en) 2008-07-11 2012-08-14 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8300806B2 (en) 2005-02-03 2012-10-30 Yottamark, Inc. Duo codes for product authentication
US8342393B2 (en) 2007-09-07 2013-01-01 Yottamark, Inc. Attributing harvest information with unique identifiers
US8423770B2 (en) 2009-09-24 2013-04-16 Kezzler As Method and system for providing secure codes for marking on items
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
US8925836B2 (en) 2008-10-29 2015-01-06 Sata Gmbh & Co. Kg Gravity cup for a paint sprayer
USD740393S1 (en) 2013-09-27 2015-10-06 Sata Gmbh & Co. Kg Paint spray gun
US9327301B2 (en) 2008-03-12 2016-05-03 Jeffrey D. Fox Disposable spray gun cartridge
USD758537S1 (en) 2014-07-31 2016-06-07 Sata Gmbh & Co. Kg Paint spray gun rear portion
US9409197B2 (en) 2013-12-18 2016-08-09 Sata Gmbh & Co. Kg Air nozzle closure for a spray gun
USD768820S1 (en) 2014-09-03 2016-10-11 Sata Gmbh & Co. Kg Paint spray gun with pattern
USD770593S1 (en) 2014-07-31 2016-11-01 Sata Gmbh & Co. Kg Paint spray gun
US9533317B2 (en) 2009-07-08 2017-01-03 Sata Gmbh & Co. Kg Paint spray gun
DE102015009123A1 (en) 2015-07-20 2017-01-26 Wolfgang Beyer Procedure for checking the authenticity of the indication of origin and the shelf life of products
US9782785B2 (en) 2010-12-02 2017-10-10 Sata Gmbh & Co. Kg Spray gun and accessories
US9782784B2 (en) 2010-05-28 2017-10-10 Sata Gmbh & Co. Kg Nozzle head for a spray device
US9878336B2 (en) 2006-12-05 2018-01-30 Sata Gmbh & Co. Kg Fluid reservoir for a paint spray gun
US10189037B2 (en) 2011-06-30 2019-01-29 Sata Gmbh & Co. Kg Easy-to-clean spray gun, accessories therefor, and mounting and dismounting methods
US10464076B2 (en) 2015-12-21 2019-11-05 Sata Gmbh & Co. Kg Air cap and nozzle assembly for a spray gun, and spray gun
US10471449B2 (en) 2016-08-19 2019-11-12 Sata Gmbh & Co. Kg Air cap arrangement and spray gun
DE102018115146A1 (en) 2018-06-24 2019-12-24 Industry365 Ug (Haftungsbeschränkt) Process for producing security elements that are invisible to the human eye and cannot be copied in an image, and method for verifying the authenticity of products based on the comparison of unequal information and printed image
US10702879B2 (en) 2014-07-31 2020-07-07 Sata Gmbh & Co. Kg Spray gun manufacturing method, spray gun, spray gun body and cover
US10835911B2 (en) 2016-08-19 2020-11-17 Sata Gmbh & Co. Kg Trigger for a spray gun and spray gun having same
US11141747B2 (en) 2015-05-22 2021-10-12 Sata Gmbh & Co. Kg Nozzle arrangement for a spray gun
US11801521B2 (en) 2018-08-01 2023-10-31 Sata Gmbh & Co. Kg Main body for a spray gun, spray guns, spray gun set, method for producing a main body for a spray gun and method for converting a spray gun
US11826771B2 (en) 2018-08-01 2023-11-28 Sata Gmbh & Co. Kg Set of nozzles for a spray gun, spray gun system, method for embodying a nozzle module, method for selecting a nozzle module from a set of nozzles for a paint job, selection system and computer program product
US11865558B2 (en) 2018-08-01 2024-01-09 Sata Gmbh & Co. Kg Nozzle for a spray gun, nozzle set for a spray gun, spray guns and methods for producing a nozzle for a spray gun

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
WO1998055970A1 (en) * 1997-06-05 1998-12-10 Dix It S.R.L. Method for ascertaining the authenticity of a predetermined product
WO2000030043A1 (en) * 1998-11-13 2000-05-25 Elena Mikhailovna Kirillina A method for identification of authenticity of an inspected object
WO2000034928A1 (en) * 1998-12-04 2000-06-15 Ruiten Theodorus Hubertus Mari A method and security-system for determining the identity of valuable objects

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
WO1998055970A1 (en) * 1997-06-05 1998-12-10 Dix It S.R.L. Method for ascertaining the authenticity of a predetermined product
WO2000030043A1 (en) * 1998-11-13 2000-05-25 Elena Mikhailovna Kirillina A method for identification of authenticity of an inspected object
WO2000034928A1 (en) * 1998-12-04 2000-06-15 Ruiten Theodorus Hubertus Mari A method and security-system for determining the identity of valuable objects

Cited By (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE202004021547U1 (en) 2003-09-16 2009-02-19 Sata Gmbh & Co. Kg Label for application to a product or its packaging
US8352744B2 (en) 2003-09-16 2013-01-08 Sata Gmbh & Co. Kg Product authentication method
DE10343064A1 (en) * 2003-09-16 2005-05-04 Sata Farbspritztechnik Procedure for authenticating a product
US8300806B2 (en) 2005-02-03 2012-10-30 Yottamark, Inc. Duo codes for product authentication
US8245927B2 (en) 2005-02-03 2012-08-21 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US8500015B2 (en) 2005-02-03 2013-08-06 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US7770783B2 (en) 2005-02-03 2010-08-10 Yottamark, Inc. Method and system to provide security information when authenticating product code
US8649512B2 (en) 2005-02-03 2014-02-11 Yottamark, Inc. Duo codes for product authentication
US7992772B2 (en) 2005-02-03 2011-08-09 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy on a single system
US8155313B2 (en) 2005-02-03 2012-04-10 Yottamark, Inc. Systems and methods for employing duo codes for product authentication
US7614546B2 (en) 2005-02-03 2009-11-10 Yottamark, Inc. Method and system for deterring product counterfeiting, diversion and piracy
US7823768B2 (en) 2006-02-02 2010-11-02 Yottamark, Inc. System and method of code generation and authentication
EP1837813A1 (en) * 2006-03-15 2007-09-26 Sap Ag System and method for verification of identifiers
EP1852837A1 (en) * 2006-05-05 2007-11-07 Nahro Oktay Method for authenticating a product
US9878336B2 (en) 2006-12-05 2018-01-30 Sata Gmbh & Co. Kg Fluid reservoir for a paint spray gun
US8342393B2 (en) 2007-09-07 2013-01-01 Yottamark, Inc. Attributing harvest information with unique identifiers
US8887990B2 (en) 2007-09-07 2014-11-18 Yottamark, Inc. Attributing harvest information with unique identifiers
US8825516B2 (en) 2007-09-07 2014-09-02 Yottamark, Inc. Methods for correlating first mile and last mile product data
US7909239B2 (en) 2007-09-07 2011-03-22 Yottamark, Inc. Attributing harvest information with unique identifiers
US8428773B1 (en) 2008-02-12 2013-04-23 Yottamark, Inc. Systems and methods of associating individual packages with harvest crates
US9327301B2 (en) 2008-03-12 2016-05-03 Jeffrey D. Fox Disposable spray gun cartridge
US8261973B2 (en) 2008-07-11 2012-09-11 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8573476B2 (en) 2008-07-11 2013-11-05 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US8240564B2 (en) 2008-07-11 2012-08-14 Yottamark, Inc. Mobile table for implementing clamshell-to-case association
US7766240B1 (en) 2008-07-19 2010-08-03 Yottamark, Inc. Case-Level Traceability without the need for inline printing
US8925836B2 (en) 2008-10-29 2015-01-06 Sata Gmbh & Co. Kg Gravity cup for a paint sprayer
US8286869B1 (en) 2009-05-22 2012-10-16 Yottamark, Inc. Case labeling for field-packed produce
US8196827B1 (en) 2009-05-22 2012-06-12 Yottamark, Inc. Case labeling for field-packed produce
US8152063B1 (en) 2009-05-22 2012-04-10 Yottamark, Inc. Case labeling for field-packed produce
US9533317B2 (en) 2009-07-08 2017-01-03 Sata Gmbh & Co. Kg Paint spray gun
US8423770B2 (en) 2009-09-24 2013-04-16 Kezzler As Method and system for providing secure codes for marking on items
US9782784B2 (en) 2010-05-28 2017-10-10 Sata Gmbh & Co. Kg Nozzle head for a spray device
US9782785B2 (en) 2010-12-02 2017-10-10 Sata Gmbh & Co. Kg Spray gun and accessories
US8210430B1 (en) 2011-02-24 2012-07-03 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US9384460B1 (en) 2011-02-24 2016-07-05 Trimble Navigation Limited Methods for assigning traceability information to and retrieving traceability information from a store shelf
US8474714B1 (en) 2011-02-24 2013-07-02 Yottamark, Inc. Methods for assigning traceability information to and retrieving traceability information from a store shelf
US10189037B2 (en) 2011-06-30 2019-01-29 Sata Gmbh & Co. Kg Easy-to-clean spray gun, accessories therefor, and mounting and dismounting methods
USD740393S1 (en) 2013-09-27 2015-10-06 Sata Gmbh & Co. Kg Paint spray gun
US9409197B2 (en) 2013-12-18 2016-08-09 Sata Gmbh & Co. Kg Air nozzle closure for a spray gun
USD758537S1 (en) 2014-07-31 2016-06-07 Sata Gmbh & Co. Kg Paint spray gun rear portion
USD798419S1 (en) 2014-07-31 2017-09-26 Sata Gmbh & Co. Kg Paint spray gun
USD770593S1 (en) 2014-07-31 2016-11-01 Sata Gmbh & Co. Kg Paint spray gun
USD835235S1 (en) 2014-07-31 2018-12-04 Sata Gmbh & Co. Kg Paint spray gun
US10702879B2 (en) 2014-07-31 2020-07-07 Sata Gmbh & Co. Kg Spray gun manufacturing method, spray gun, spray gun body and cover
USD768820S1 (en) 2014-09-03 2016-10-11 Sata Gmbh & Co. Kg Paint spray gun with pattern
US11141747B2 (en) 2015-05-22 2021-10-12 Sata Gmbh & Co. Kg Nozzle arrangement for a spray gun
DE102015009123A1 (en) 2015-07-20 2017-01-26 Wolfgang Beyer Procedure for checking the authenticity of the indication of origin and the shelf life of products
DE102015009123B4 (en) 2015-07-20 2023-11-30 SparrowView GmbH Procedure for checking the authenticity of the origin labeling and shelf life information of products
WO2017012602A1 (en) 2015-07-20 2017-01-26 Wolfgang Beyer Method for checking the authenticity of the indication of origin and the shelf-life specifications of products
US10464076B2 (en) 2015-12-21 2019-11-05 Sata Gmbh & Co. Kg Air cap and nozzle assembly for a spray gun, and spray gun
US10835911B2 (en) 2016-08-19 2020-11-17 Sata Gmbh & Co. Kg Trigger for a spray gun and spray gun having same
US10471449B2 (en) 2016-08-19 2019-11-12 Sata Gmbh & Co. Kg Air cap arrangement and spray gun
WO2020001696A1 (en) 2018-06-24 2020-01-02 Industry365 Ug (Haftungsbeschränkt) Method for checking the authenticity of products and printed image
WO2020001695A1 (en) 2018-06-24 2020-01-02 Industry365 Ug (Haftungsbeschränkt) Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image
US11587339B2 (en) 2018-06-24 2023-02-21 Industry 365 UG (Haftungsbeschränkt) Method for reading a code stored in a halftone image and comparison with a retrievable value
US11715309B2 (en) 2018-06-24 2023-08-01 Authentic.Network Gmbh Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image
DE102018115146A1 (en) 2018-06-24 2019-12-24 Industry365 Ug (Haftungsbeschränkt) Process for producing security elements that are invisible to the human eye and cannot be copied in an image, and method for verifying the authenticity of products based on the comparison of unequal information and printed image
US11801521B2 (en) 2018-08-01 2023-10-31 Sata Gmbh & Co. Kg Main body for a spray gun, spray guns, spray gun set, method for producing a main body for a spray gun and method for converting a spray gun
US11826771B2 (en) 2018-08-01 2023-11-28 Sata Gmbh & Co. Kg Set of nozzles for a spray gun, spray gun system, method for embodying a nozzle module, method for selecting a nozzle module from a set of nozzles for a paint job, selection system and computer program product
US11865558B2 (en) 2018-08-01 2024-01-09 Sata Gmbh & Co. Kg Nozzle for a spray gun, nozzle set for a spray gun, spray guns and methods for producing a nozzle for a spray gun

Also Published As

Publication number Publication date
NO20013078D0 (en) 2001-06-20
NO20013078L (en) 2002-12-23
NO314372B1 (en) 2003-03-10

Similar Documents

Publication Publication Date Title
WO2003007252A1 (en) Method for generation of authentication information and use thereof
US7438237B2 (en) Method for identification and authenticating without specific reader an identifier
US20030208471A1 (en) Communication storage methods and communication systems
CN105550730B (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
HUE026760T2 (en) Secure item identification and authentication system and method based on unclonable features
CN104766111B (en) Combined anti-fake mark and generation method based on the same ID and device
EP0998800B1 (en) Document or message security arrangements using a numerical hash function
CN107705139A (en) A kind of novel article anti-counterfeiting authentication method
CN106779740A (en) A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach
EP2283456B1 (en) Method and device for identifying objects
RU2216776C2 (en) Method and system for identifying and accounting marked objects
CN106779739A (en) Antiforge system and method that a kind of combination two-dimensional code scanning technology is realized
US20090006255A1 (en) Method of Authentication of the Items Put Into Circulation
CN112131471A (en) Method, device, equipment and medium for relation recommendation based on unauthorized undirected graph
CN109919280B (en) Anti-counterfeiting electronic code label, commodity with anti-counterfeiting electronic code and anti-counterfeiting method
CN116029745A (en) Digital label anti-counterfeiting tracing method, device and system based on blockchain
US20100282838A1 (en) Two Part Code
CN101833728A (en) Commodity anti-counterfeiting method
CN101248474A (en) Method for encryption and decryption of data using pixel
DE112006000872B4 (en) Method for goods shipment authentication
CN111708996B (en) Enterprise internal management consultation information sharing system based on Internet
CN110503437A (en) Based on the article anti-counterfeit method more identified and its system
US20220036374A1 (en) Method for the traceability and authentication of products
JP3903436B2 (en) Imprint authentication system
CN111814937B (en) Anti-counterfeit label generation and printing method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Ref document number: JP

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)