Suche Bilder Maps Play YouTube News Gmail Drive Mehr »
Anmelden
Nutzer von Screenreadern: Klicke auf diesen Link, um die Bedienungshilfen zu aktivieren. Dieser Modus bietet die gleichen Grundfunktionen, funktioniert aber besser mit deinem Reader.

Patentsuche

  1. Erweiterte Patentsuche
VeröffentlichungsnummerUSRE44220 E1
PublikationstypErteilung
AnmeldenummerUS 12/479,504
Veröffentlichungsdatum14. Mai 2013
Eingetragen5. Juni 2009
Prioritätsdatum18. Juni 1998
GebührenstatusBezahlt
Auch veröffentlicht unterUS6724895, US6954533, US7228433, US20040196980, US20060075233
Veröffentlichungsnummer12479504, 479504, US RE44220 E1, US RE44220E1, US-E1-RE44220, USRE44220 E1, USRE44220E1
ErfinderChristopher Gordon Gervase Turner, Johan Dawid Kruger
Ursprünglich BevollmächtigterZih Corp.
Zitat exportierenBiBTeX, EndNote, RefMan
Externe Links: USPTO, USPTO-Zuordnung, Espacenet
Electronic identification system and method with source authenticity
US RE44220 E1
Zusammenfassung
An RF electronic identification system (10) is disclosed and claimed. The system includes at least one transponder encoder (14.1) for writing data into a memory arrangement (52) of a selected transponder (1.1) of a plurality of transponders (1.1 to 1.n) adapted to receive data from the at least one encoder. The system further includes at least one verifier (16) for interrogating a selected transponder (1.1) and to read data stored in the transponder. The encoder includes a controller (42) for providing an identification code characteristic of the encoder to form part of the data to be written into the transponder. The verifier includes computing means (56) for extracting the identification code from the data read thereby and for comparing the code to authorized codes. An indicator (18) provides an indication whether the identification code corresponds to any of the authorized codes or not. A method of verifying the authenticity of a transponder is also disclosed and claimed.
Bilder(4)
Previous page
Next page
Ansprüche(34)
The invention claimed is:
1. An electronic identification system including:
at least one transponder encoder for writing data to a transponder;
said encoder comprising means for providing an identification code characteristic of an entity externally of external to the transponder;
a plurality of transponders each adapted to receive data from the at least one encoder and to store the data received in a respective memory arrangement of the transponder;
at least one verifier for interrogating a selected transponder and to read reading data stored in the memory arrangement of the selected transponder via a radio frequency link;
wherein said encoder further comprises an encryption device for utilizing an algorithm and input data characteristic of the encoder to generate encrypted data to form at least part of the data written to the selected transponder;
the at least one verifier comprises comprising computing means for extracting and deciphering the encrypted data from the data read thereby; and
a comparator for comparing the deciphered data to authorized data and
an indicator for providing an indication of an outcome of the comparison.
2. A system as claimed in claim 1, wherein the encoder includes a memory arrangement wherein configured to store a plurality of identity identification codes characteristic of the encoder are stored; and wherein the encoder comprises a controller for randomly selecting one of a selected identification code from said plurality of identification codes for use as the input data by the encryption device.
3. A system as claimed in claim 2 further including a central computer for generating the plurality of identification codes, for downloading the identification codes into the memory arrangement of the encoder and into a memory arrangement of the at least one verifier.
4. A system as claimed in claim 2 wherein the algorithm comprises a first encryption algorithm and wherein the encryption device utilizes the selected identification code and the first encryption algorithm to generate the encrypted data.
5. A system as claimed in claim 4 wherein the controller of the encoder is programmed randomly to configured to select the first encryption algorithm from a first set of encryption algorithms pre-stored in the memory arrangement of the encoder.
6. A system as claimed in claim 5 wherein each algorithm in the first set of encryption algorithms is associated with a respective algorithm address in the memory arrangement of the encoder.
7. A system as claimed in claim 6 wherein the encrypted data further comprises encrypted address data relating to the respective algorithm address of the selected first encryption algorithm.
8. A system as claimed in claim 7 wherein the encryption device utilizes a second encryption algorithm and said data relating to the respective algorithm address to generate the encrypted address data.
9. A system as claimed in claim 8 wherein the second algorithm is of a general form wherein the respective algorithm address is equal to at least one term plus a second remainder.
10. A system as claimed in claim 9 wherein the encrypted address data comprises the aforementioned second remainder.
11. A system as claimed in claim 4 1 wherein each encryption the algorithm includes comprises at least one term which that is a function of at least one physical characteristic of the selected transponder into onto which the data is to be written.
12. A system as claimed in claim 11 wherein the at least one physical characteristic of the selected transponder is a frequency of a clock forming part of the transponder.
13. A system as claimed in claim 11 wherein each algorithm is of a general form wherein the selected identification code is equal to said at least one term plus a first remainder.
14. A system as claimed in claim 13 wherein the encrypted comprises the aforementioned remainder.
15. A system as claimed in claim 8 wherein the computing means of the verifier is configured to use the second encryption algorithm to decrypt the encrypted address data to yield the respective algorithm address data.
16. A system as claimed in claim 15 wherein the computing means of the verifier is configured to utilize the respective algorithm address data to retrieve the selected first encryption algorithm, to obtain input data and to use said input data and the first encryption algorithm to decrypt the encrypted data to yield decrypted data when deciphering the encrypted data and generating the deciphered data.
17. A system as claimed in claim 16 wherein the comparator forms part of the verifier and is configured to compare the decrypted deciphered data to the authorized identification codes data which are is stored in the memory arrangement of the verifier.
18. A method of verifying the authenticity of a transponder, the method including the steps of:
generating encrypted data utilizing an algorithm and input data characteristic of a transponder encoder;
writing the encrypted data and data relating to an identification code of an entity externally of external to the transponder into the transponder utilizing the transponder encoder;
reading the data written into the transponder with a verifier via a radio frequency link extending between the verifier and the transponder;
extracting from the data read, the encrypted data; decipher, deciphering the encrypted data to generate deciphered data using computing means of the verifier; and
comparing the deciphered data to authorized data and
providing an indication based on the comparison.
19. A method as claimed in claim 18 wherein the input data comprises an identification code characteristic of the encoder.
20. A method as claimed in claim 19 wherein the transponder encoder has a plurality of identification codes characteristic thereof and wherein the method includes the step of randomly selecting one of these the plurality of identification codes as said the input data.
21. A method as claimed in claim 18 wherein the step of generating encrypted data comprises the step of utilizing a first encryption algorithm and the identification code to generate the encrypted data relating to the identification code.
22. A method as claimed in claim 21 wherein the first encryption algorithm is selectable from a first set of encryption algorithms.
23. A method as claimed in claim 22 wherein the first encryption algorithm includes at least one term which that is a function of at least one physical characteristic of the transponder into which the data is written.
24. A method as claimed in claim 23 wherein each algorithm of the first set of encryption algorithms is accessible by the encoder from a memory arrangement thereof utilizing a respective algorithm address.
25. A method as claimed in claim 24 wherein the step of generating encrypted data comprises the step of utilizing a second encryption algorithm and data relating to the respec tive algorithm address of the selected algorithm, to generate encrypted data relating to the respective algorithm address.
26. A method as claimed in claim 25 including the step of utilizing at the verifier decrypted data relating to the respective algorithm address to retrieve from a memory arrangement of the verifier the first encryption algorithm utilized during the first encryption process.
27. A method as claimed in claim 26 comprising the steps of providing to computing means in the verifier input data; and utilizing said input data and the retrieved first encryption algorithm to decrypt the encrypted data relating to the identification code.
28. A method as claimed in claim 27 wherein the step of comparing comprises the step of comparing the decrypted data relating to the identification code to data relating to authorized identification codes stored in a memory arrangement of the verifier.
29. A method of verifying the authenticity of a transponder comprising:
receiving, at a computing means, encrypted data and input data relating to a physical characteristic of the transponder;
applying an algorithm to the encrypted data and the input data, using the computing means, to generate an output number; and
comparing, using the computing means, the output number to a list of numbers.
30. The method of claim 29, wherein the transponder comprises a clock defining a clock frequency, and wherein the input data relating to a physical characteristic of the transponder comprises the clock frequency.
31. The method of claim 29, wherein the list of numbers comprises a plurality of identification numbers characteristic of an entity external to the transponder.
32. The method of claim 29, wherein the list of numbers comprises a plurality of identification numbers characteristic of an encoder.
33. The method of claim 29, wherein the computing means is part of a reader.
34. A reader configured to authenticate a transponder, the reader comprising:
an RF transceiver; and
computing means configured to:
receive encrypted data and input data relating to a physical characteristic of the transponder via the RF transceiver;
apply an algorithm to the encrypted data and the input data to generate an output number; and
compare the output number to a list of numbers.
Beschreibung

This application is a continuation of application Ser. No. 10/827,814, filed Apr. 20, 2004 now U.S. Pat. No. 6,954,533, which is a continuation of application Ser. No. 09/334,151, filed Jun. 16, 1999 now U.S. Pat. No. 6,724,895, which application is incorporated herein by reference.

INTRODUCTION AND BACKGROUND

THIS invention relates to electronic identification systems and more particularly to such systems including radio frequency (RF) transponders and associated readers, interrogators and verifiers therefor.

A system of the aforementioned kind is typically used to mark and identify products or goods, and would further include a plurality of encoder units for writing data into respective memory arrangements of the transponders. In use, a transponder is attached to a product item and the data written into the transponder may relate to the kind of product, the date of manufacture and/or any other data relating to the product. Normally the data is written into the memory arrangement at the source of the product, but in some applications additional data may be written into the memory arrangement at various points along a distribution chain. Of course the data written into the memory arrangement can at any stage be read with a verifier, interrogator or reader.

In some applications, security arrangements are required which would prevent unauthorized parties from attaching non-genuine transponders (purporting to store data encoded by an authorised encoder) to grey or infringing goods, thereby facilitating passing the grey goods off as genuine goods.

OBJECT OF THE INVENTION

Accordingly, it is an object of the present invention to provide a system and method with which the applicant believes transponders originating from an authorized source could be distinguished from non-genuine transponders.

SUMMARY OF THE INVENTION

According to the invention there is provided an electronic identification system, the system including:

    • at least one transponder encoder for writing data into a memory arrangement of a transponder;
    • a plurality of transponders adapted to receive data from the at least one encoder;
    • at least one verifier for interrogating a selected transponder and to read data stored in the transponder;
    • said encoder including means for providing an identification code characteristic of an entity externally of the transponder, to form part of the data to be written into the transponder;
    • the verifier including computing means for extracting the identification code from the data read thereby and for comparing the code to an authorized code; and indicator means for giving an indication whether the identification code corresponds to the authorized code.

The identity code is preferably characteristic of the encoder.

The encoder may include a memory arrangement wherein a plurality of identification codes for the encoder are stored and the means for providing an identification code may include a controller for randomly selecting one of the authorized codes.

The system may further include a central computer for generating the plurality of identification codes and for downloading the identification codes into the at least one encoder and into the at least one verifier, to constitute corresponding authorized codes.

The controller of the encoder may further include encryption means utilizing a first encryption algorithm and the identification code in a first encryption process, to provide encrypted data relating to the identification code, to form part of the data to be written into the transponder.

In a preferred embodiment the controller of the encoder is programmed randomly to select the first encryption algorithm from a first set of encryption algorithms pre-stored in the memory arrangement of the encoder.

Each encryption algorithm may be associated with a unique algorithm address in the memory arrangement of the encoder.

The algorithms may be downloaded from the central computer into the encoder upon start-up of the encoder. The algorithms are preferably also downloaded into memory locations of the verifier having corresponding addresses.

Each algorithm may include a function of at least one physical characteristic of the transponder, for example a clock frequency of circuitry of the transponder. The algorithm may be of a general form wherein the selected identification code is equal to at least one function of a suitable physical characteristic of the transponder plus a first remainder.

The data relating to the identification code and which forms part of the data to be written into the transponder may include the aforementioned first remainder. Preferably it consists of the first remainder only.

Data relating to the algorithm address of the selected algorithm may also be included in the data to be written into the memory arrangement of the transponder. The controller of the encoder may utilize a second algorithm and the data relating to the address in a second encryption process, to yield encrypted data relating to the algorithm address. The second algorithm may be of a general form wherein the algorithm address is equal to at least one function of an independent variable plus a second remainder.

The encrypted data relating to the algorithm address and which forms part of the data to be written into the transponder may include the aforementioned second remainder. Preferably it consists of the second remainder only.

The verifier may include computing means adapted to use the second algorithm to decrypt the encrypted data relating to the address for the first algorithm.

The computing means may further be programmed to retrieve the first algorithm, to input data relating to the physical characteristics of the transponder and to use said data and the first algorithm to decrypt the data relating to the identification code, to yield an output code.

The computing means of the verifier may further include a comparator for comparing the output code to the authorized codes which are stored in the memory arrangement of the verifier.

The indicating means of the verifier may include a display.

The verifier may form part of a reader for the transponders. Alternatively, it may be a separate unit.

Also included within the scope of the present invention is a method of verifying the authenticity of a transponder, the method including the steps of:

    • writing data into the transponder by an authorized transponder encoder;
    • including in the data, data relating to an identification code of an entity externally of the transponder;
    • reading the data written into the transponder with a verifier;
    • extracting from the data read, the data relating to the identification code;
    • comparing the extracted data to data relating to an authorised identification code for the entity; and
    • providing an indication whether the extracted data matches the data relating to authorized identification code.

The identification code may be characteristic of the encoder.

The encoder may have a plurality of identification codes associated therewith and the method may include the step of randomly selecting one of these codes for inclusion in the data to be written into the transponder.

Further according to the method of the invention a first encryption algorithm and the selected identification code may be used in a first encryption process to yield encrypted data relating to the identification code. Preferably the first algorithm is selectable from a first set of encryption algorithms. The algorithms may include a function of at least one physical characteristic of the transponder into which the data is to be written.

Each of the first set of encryption algorithms may be accessible by the encoder from a memory arrangement thereof utilizing a respective algorithm address. The method may include the further step of including data relating to the algorithm address of the selected algorithm in the data to be written into the transponder. A second algorithm and data relating to the address of the selected algorithm may•be' utilized in a second encryption process to yield encrypted data relating to the algorithm address for inclusion in the data to be written into the transponder.

The method may further include the step of utilizing at the verifier the data relating to the algorithm address to retrieve from a memory arrangement of the verifier the algorithm utilized during the first encryption process.

The method may further include the steps of: providing computing means in the verifier with data relating to the physical characteristics of the transponder; and utilizing said data and the retrieved algorithm to decrypt the encrypted data relating to the identification code.

The method may still further include the step of comparing the decrypted data relating to the identification code to the data relating to authorized identification codes stored in a memory arrangement of the verifier.

Also included within the scope of the invention is a method of programming data into a transponder, the method including the steps of:

    • electronically measuring a physical characteristic of the transponder and producing data relating thereto;
    • utilizing the produced data in an encryption algorithm to encrypt data to be written into the transponder; and
    • writing the encrypted data into a memory arrangement of the transponder.

The physical characteristic may be the frequency of a clock of the transponder and may be measured by receiving a response signal from the transponder and utilizing the received signal to measure the clock frequency. The encrypted data may be written into the transponder by transmitting it to the transponder.

BRIEF DESCRIPTION OF THE ACCOMPANYING DIAGRAMS

The invention will now further be described, by way of example only, with reference to the accompanying diagrams wherein:

FIG. 1 is a basic block diagram of a system according to the invention;

FIG. 2 is a block diagram showing an encoder, a transponder and a verifier forming part of the system in more detail; and

FIG. 3 is a basic flow diagram of a decoding process forming part of the method according to the invention.

DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION

An electronic identification system according to the invention is generally designated by the reference numeral 10 in FIG. 1.

The system 10 includes a central computer system 12 which manages and controls the rest of the system. The system 10 further includes a plurality of transponder encoders 14.1 to 14.3 adapted to be brought into communication with the central computer to be programmed thereby. In use, each encoder is preferably located at a source (not shown) or manufacturing plant of products to which transponders are to be secured, to program such transponders by writing data into the transponders. Each encoder has at least one, preferably eight plain-text identification (PTID) numbers or codes characteristic thereof. For example, the PTID'S associated with encoder 14.1 are numbers 121 to 128. These numbers are generated and issued by the central computer and stored in memory arrangements of each of the central computer 12, the relevant encoder and verifiers, which will be referred to hereinafter. Also stored in the central computer for downloading into the encoders and the verifiers respectively, are algorithms for encrypting data to be written into the transponders by the encoders and for decrypting the data by verifiers or readers, as will hereinafter be described. The PTID's and algorithms may from time to time be changed by the central computer 12 by downloading new numbers and algorithms, to maintain and improve the integrity and security of the system.

The system further includes a plurality of radio frequency (RF) transponders. Transponders 1.1 to 1.n are associated with encoder 14.1, transponders 2.1 to 2.n with encoder 14.2 and transponders 3.1 to 3.n with encoder 14.3.

The system still further includes a plurality of verifiers or readers (only one of which is shown at 16 in FIG. 1). The verifier includes display means 18 for displaying the outcome of an authenticity verification procedure performed in use by the verifier 16 on any of the transponders, in respect of the authenticity of an encoder used to program that transponder.

The encoders 14.1 to 14.3 are similar and therefore only encoder 14.1 will be described in more detail herebelow with reference to FIG. 2. Encoder 14.1 includes an RF transceiver 40, a controller 42 and a memory arrangement 44. Memory arrangement 44 includes a plurality of storage locations each addressable by the controller by a unique address ADD#OO to ADD#nn. The aforementioned PTID codes of the encoder 14.1, once downloaded by the central computer 12, are stored in respective ones of these locations. The aforementioned encryption algorithms or data relating thereto are also stored in respective ones of these locations and are directly or indirectly retrievable by the controller 42 by the respective addresses.

The transponders are also similar and therefore only transponder 1.1 will be described in more detail. Transponder 1.1 includes an RF transceiver 46, control circuitry 48, a clock 50 having a clock frequency fc and a memory arrangement 52.

Verifier 16 may form part of a reader (not shown) for the transponders, or may be a separate unit. The verifier 16 includes an RF transceiver 54, computing means 56, display 18 and a memory arrangement 58. The memory arrangement 58 includes a plurality of storage locations each addressable by the computing means 56 by a unique address ADD#OO to ADD#nn. The aforementioned PTID codes of the encoders are received from the central computer and stored in respective ones of these locations. The aforementioned encryption/decryption algorithms are similarly received from the central computer and stored in respective locations, or data relating to the algorithms may be stored in these locations. The algorithms are directly or indirectly retrievable by the computing means 56 by their respective addresses.

In use and as is well known in the art, a selected transponder 1.1 is brought into range of a programmed encoder 14.1. Data including data relating to the product to which the transponder is to be applied is transmitted via an RF link including transceiver 40, antenna 41, antenna 47 and transceiver 46 to the transponder. The transponder receives that data and stores the data in memory arrangement 52 forming part of the transponder. Along the distribution chain of the product, further data may similarly be written into the memory arrangement 52.

As is also well known in the art, the data may at any stage be read by a reader or verifier 16 in known manner. The verifier 16 transmits an RF energizing signal 62 to the transponder 1.1 and a virtual battery forming part of the transponder circuitry 54 is charged. The transponder responds by backscatter modulating on the energizing signal serving as carrier, a data stream including the data stored in the memory arrangement 52 and timed by the frequency fc of the clock 50. The verifier 16 in turn receives this data and may be adapted in known manner to switch the transponder just read to a sleep or the like mode, which causes the transponder to stop modulating the energizing signal.

It will be appreciated that with such a conventional system an unauthorized distributor of pirate, grey or otherwise infringing goods may simply attach a non-genuine transponder (carrying data similar to the data carried by transponders attached to genuine goods) to the grey goods. Unless sophisticated security mechanisms and methods are employed, such grey goods will not easily be identified or traced.

According to the invention, encrypted data relating to a selected one of the PTID numbers of the source encoder 14.1 is written into and stored as part of the data stored in the memory arrangement 52 of the transponder. To achieve this, the encoder controller is adapted randomly to select anyone of the eight PTID numbers. This PTID number and a selected one of the encryption algorithms are utilized by encryption means forming part of the controller in a first encryption process, to yield encrypted data relating to the PTID number. At least some of the variables to be used with the encryption algorithm are functions of measurable physical characteristics of the transponder 1.1, such as the frequency fc of the transponder clock 50. The clock frequency fc is determined from a response signal from the transponder during the programming process.

The verifier 16 in turn is adapted (as will hereinafter be described) to retrieve the relevant decryption algorithm from its memory arrangement 58, to determine the relevant physical properties of the transponder concerned and to decipher the encrypted data into a plain-text number. If the deciphered plain-text number is equal to an authorized PTID number stored in the memory arrangement 58 of the verifier 16, an “AUTHENTIC” message is displayed on display 18. If the result of the deciphering process does not correspond to an authorized PTID, a “FALSE” message is displayed.

The encryption algorithm may be of the general form:
PTID=a.f(x)+b.f(y)+c.f(z)+rem   —A
wherein

    • PTID is the selected PTID number of the encoder;
    • a, b and c are scaling constants;
    • x, y z are independent variables, preferably relating to physical characteristics of the transponder being programmed; and
    • rem is a remainder.

The encrypted data relating to the PTID of the encoder 14.1 and which is subsequently stored in the transponder 1.1, is preferably the remainder (rem) part only, of the above encryption process. The rem-data may be four bits in length.

As stated hereinbefore, a randomly selected first algorithm of a first set of encryption algorithms stored in the encoder 14.1 and correspondingly stored in the verifier 16 may be used to encrypt the PTID number of the encoder which is, as stated hereinbefore, randomly selected by the encoder from the available PTID numbers therefor. Data relating to the address where the selected first algorithm is stored and a second algorithm are used in a second encryption process, to yield encrypted data relating to the address of the selected first algorithm. The second algorithm is of the following general form:
AAD=d.f(m)+e.f(n)+REM   —B
wherein

    • AAD is the address of the selected first algorithm;
    • d, e and g are scaling constacts;
    • m, n and o are independent variables; and
    • REM is a remainder.

The encrypted data relating to the address of the first encryption algorithm and which is to be stored in the transponder 1.1, is preferably the remainder (REM) part only of the aforementioned second encryption process. The REM-data may be four bits in length.

The data stored in the memory arrangement 52 of transponder 1.1 and which is backscatter modulated in the form of a data stream on the energizing signal 62 during a reading or verification process of the transponder, is diagrammatically illustrated in FIG. 3.

The data stream is designated 20 in FIG. 3. The REM-data 22 is utilized together with equation 8 as shown at 24, to calculate the address of the first encryption algorithm used by the encoder 14.1 to provide encrypted data relating to the randomly selected PTI number of the encoder. This address is utilized by the computing means 56 to retrieve the first algorithm from the memory arrangement 58 forming part of the verifier.

The aforementioned first algorithm, the rem-data 26 in the data stream 20 and input data 28 relating to physical characteristics (in this sample the frequency fc of the clock 50) of the transponder are utilized by the verifier 16 to calculate a plain-text output number at 30.

The plain-text output number is fed at 32 to a comparator of the computing means 56, to compare the number to a list of authorized PTID numbers stored in the memory arrangement 58 of the verifier. If the output number corresponds to one of the authorized PTID numbers, the verifier displays on display 18 the message “AUTHENTIC”. This would indicate that the transponder 1.1 has been programmed with an authorized encoder 14.1 at the source of the product. If the output number does not so correspond, it would mean that the transponder 1.1 includes fake data and has not been programmed at an authorized source of the particular product. A “FALSE” message would then be displayed on display 18.

It will be appreciated that there are many variations in detail on the method and system according to the invention without departing from the scope and spirit of the appended claims.

Patentzitate
Zitiertes PatentEingetragen Veröffentlichungsdatum Antragsteller Titel
US372936221. Dez. 197024. Apr. 1973French JLabeling machine
US3956615 *25. Juni 197411. Mai 1976Ibm CorporationTransaction execution system with secure data storage and communications
US41111217. Juni 19765. Sept. 1978Hobart CorporationMulti-impression printer for pressure sensitive labels
US413258317. März 19782. Jan. 1979South Shore Machine Company, Inc.Label applicator
US44962379. Aug. 198229. Jan. 1985Xerox CorporationConsumable status display
US451620816. Nov. 19817. Mai 1985Tokyo Electric Co. Ltd.Label issuing apparatus with programmable label feed
US466362229. Apr. 19855. Mai 1987Light Signatures, Inc.Non-counterfeitable document system
US46912023. Apr. 19851. Sept. 1987Denne Phillip R MIdentification systems
US478379814. März 19858. Nov. 1988Acs Communications Systems, Inc.Encrypting transponder
US4807287 *6. Apr. 198721. Febr. 1989Light Signatures, Inc.Document authentication method
US48396428. Okt. 198713. Juni 1989Northern Illinois Gas CompanyData transmission system with data verification
US484650430. Aug. 198811. Juli 1989Avery International CorporationSecure on-pack promotional coupons
US485575416. Juli 19878. Aug. 1989Ricoh Co., Ltd.Control device for an image recorder
US48578938. Febr. 198815. Aug. 1989Bi Inc.Single chip transponder device
US48704594. Nov. 198826. Sept. 1989Minolta Camera Kabushiki KaishaCopying machine
US488260411. Aug. 198821. Nov. 1989Minolta Camera Kabushiki KaishaElectronic machine having time measuring function
US49309156. Jan. 19885. Juni 1990Oki Electric Industry Co., Ltd.Printer having means for identifying print head type
US4961142 *29. Juni 19882. Okt. 1990Mastercard International, Inc.Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
US497053116. Febr. 198813. Nov. 1990Hitachi, Ltd.Thermal transfer printer
US4993068 *27. Nov. 198912. Febr. 1991Motorola, Inc.Unforgeable personal identification system
US5010573 *27. Apr. 199023. Apr. 1991Musyck Emile PCryptographic system by blocs of binery data
US50158347. Apr. 198914. Mai 1991Toppan Printing Co., Ltd.Information card system communicable in contactless manner
US502471813. Okt. 198918. Juni 1991Kleinewefers GmbhLabel applying apparatus
US5036461 *16. Mai 199030. Juli 1991Elliott John CTwo-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
US504182616. Febr. 199020. Aug. 1991Destron/Idi Inc.Identification system
US506697831. Mai 198919. Nov. 1991Fujitsu LimitedImage forming apparatus having an exchangeable unit exchange timing indicating device
US507852317. Nov. 19897. Jan. 1992Varitronic Systems, Inc.Tape cassette with identifying circuit element for printing machine
US513272925. Jan. 199121. Juli 1992Minolta Camera Kabushiki KaishaGenuine security article distinguishing system for an image forming apparatus
US51485343. Apr. 199115. Sept. 1992International Business Machines Corp.Hardware cartridge representing verifiable, use-once authorization
US516775231. Okt. 19901. Dez. 1992Cl & D Graphics Inc.Apparatus for making laminated web with spaced removable elements
US518924625. Sept. 199023. Febr. 1993CsirTiming apparatus
US5196840 *5. Nov. 199023. März 1993International Business Machines CorporationSecure communications system for remotely located computers
US521646413. Dez. 19911. Juni 1993Minolta Camera Kabushiki KaishaImage forming apparatus having replaceable element which is replaced based on frequency of use
US522958725. Nov. 199120. Juli 1993Tohoku Ricoh Co., Ltd.Bar code label printer and bar code label issuing method
US5239294 *7. Dez. 199024. Aug. 1993Motorola, Inc.Method and apparatus for authenication and protection of subscribers in telecommunication systems
US526696827. März 199230. Nov. 1993Eastman Kodak CompanyNon-volatile memory thermal printer cartridge
US52725032. Sept. 199221. Dez. 1993Xerox CorporationReplaceable sub-assemblies for electrostatographic reproducing machines
US528242128. Juli 19921. Febr. 1994CsirTiming apparatus
US528359715. Mai 19921. Febr. 1994Fuji Xerox Co., Ltd.Laser beam printer with automatic laser beam control
US528361319. Febr. 19931. Febr. 1994Xerox CorporationMonitoring system with dual memory for electrophotographic printing machines using replaceable cartridges
US531837017. Nov. 19927. Juni 1994Varitronic Systems, Inc.Cartridge with data memory system and method regarding same
US533396023. Nov. 19922. Aug. 1994Samsung Electronics Co., Ltd.Device and method for displaying a residual amount of cartridge ribbon for a color video printer
US53409685. Mai 199223. Aug. 1994Nippondenso Company, Ltd.Information storage medium with electronic and visual areas
US53530097. Juli 19934. Okt. 1994CsirCommunication system
US5355413 *1. März 199311. Okt. 1994Mitsubishi Denki Kabushiki KaishaAuthentication method performed between IC card and terminal unit and system therefor
US5379344 *26. Apr. 19913. Jan. 1995Scandic International Pty. Ltd.Smart card validation device and method
US53854162. Dez. 199231. Jan. 1995Sony CorporationDevice for identifying an ink ribbon cartridge used in a printer
US53873028. Okt. 19937. Febr. 1995DispacMethod of automatically and continuously labelling articles such as fruit or vegetables, and apparatus for implementing the method
US5400319 *6. Okt. 199321. März 1995Digital Audio Disc CorporationCD-ROM with machine-readable I.D. code
US540689030. Juli 199318. Apr. 1995CsirTiming apparatus
US542865911. Okt. 199427. Juni 1995Eastman Kodak CompanyDevice for transferring electrical signals and electric energy to the memory device of a cassette
US545205911. Aug. 199319. Sept. 1995Minolta Camera Kabushiki KaishaImage forming apparatus which stores counted value in different memories depending on condition of cover
US545561712. Mai 19943. Okt. 1995Eastman Kodak CompanyThermal printer supply having non-volatile memory
US547946725. Apr. 199426. Dez. 1995Kabushiki Kaisha TecHistory recording apparatus
US549154022. Dez. 199413. Febr. 1996Hewlett-Packard CompanyReplacement part with integral memory for usage and calibration data
US5491751 *5. Juni 199513. Febr. 1996Coda Music Technology, Inc.Intelligent accompaniment apparatus and method
US5507489 *30. Sept. 199316. Apr. 1996Info TelecomElectronic game-of-chance device
US551088424. März 199523. Apr. 1996Xerox CorporationSupply accessory for a printing machine with hidden identifier
US5513169 *29. Nov. 199430. Apr. 1996Sony CorporationCD-ROM with machine-readable i.d. code
US551938118. Nov. 199321. Mai 1996British Technology Group LimitedDetection of multiple articles
US55282229. Sept. 199418. Juni 1996International Business Machines CorporationRadio frequency circuit and memory in thin flexible package
US55371053. Jan. 199216. Juli 1996British Technology Group LimitedElectronic identification system
US5541904 *2. Juni 199530. Juli 1996Sony CorporationCD-ROM with machine-readable I.D. code
US554427319. Jan. 19956. Aug. 1996Dsc Communications CorporationFiber optic cable storage shelf and method using same
US554616327. Sept. 199413. Aug. 1996Minolta Co., Ltd.Image forming apparatus having counters for counting frequency of use of parts
US555728025. Aug. 199317. Sept. 1996British Technology Group LimitedSynchronized electronic identification system
US556644111. März 199422. Okt. 1996British Technology Group LimitedAttaching an electronic circuit to a substrate
US55685527. Juni 199522. Okt. 1996Intel CorporationMethod for providing a roving software license from one node to another node
US5572193 *22. Aug. 19945. Nov. 1996Motorola, Inc.Method for authentication and protection of subscribers in telecommunications systems
US5577121 *9. Juni 199419. Nov. 1996Electronic Payment Services, Inc.Transaction system for integrated circuit cards
US557908830. Dez. 199426. Nov. 1996Samsung Electronics Co., Ltd.Image forming apparatus having programmable developer cartridge
US56142788. Mai 199525. März 1997Esselte Meto International GmbhStrip of separable labels or tags having a display surface for display of information thereon
US562569223. Jan. 199529. Apr. 1997International Business Machines CorporationMethod and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US56256937. Juli 199529. Apr. 1997Thomson Consumer Electronics, Inc.Apparatus and method for authenticating transmitting applications in an interactive TV system
US5640002 *15. Aug. 199517. Juni 1997Ruppert; Jonathan PaulPortable RF ID tag and barcode reader
US56606637. Juni 199526. Aug. 1997Esselte Meto International GmbhMarking tag
US566658527. Nov. 19959. Sept. 1997Mita Industrial Co. Ltd.Maintenance supervising system for an image-reproducing system
US569906617. Juni 199616. Dez. 1997British Technology Group LimitedSynchronized electronic identification system
US57136797. Okt. 19963. Febr. 1998Monarch Marking Systems, Inc.Apparatus for selectively dispensing liner-type and linerless-type labels
US571797429. Mai 199610. Febr. 1998Samsung Electronics Co., Ltd.Method for monitoring prescribed use periods of replaceable parts within an image forming apparatus
US5724423 *18. Sept. 19953. März 1998Telefonaktiebolaget Lm EricssonMethod and apparatus for user authentication
US572442510. Juni 19943. März 1998Sun Microsystems, Inc.Method and apparatus for enhancing software security and distributing software
US572663029. Dez. 199510. März 1998British Technology Group LimitedDetection of multiple articles
US57546561. Aug. 199619. Mai 1998Hitachi, Ltd.Electronic shopping method, electronic shopping system and document authenticating method relating thereto
US57555194. Dez. 199626. Mai 1998Fargo Electronics, Inc.Printer ribbon identification sensor
US5760916 *16. Sept. 19962. Juni 1998Eastman Kodak CompanyImage handling system and method
US5771291 *11. Dez. 199523. Juni 1998Newton; FarrellUser identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer
US5781635 *29. Dez. 199514. Juli 1998Intel CorporationMethod and apparatus for improved digital message transaction model
US57817084. Dez. 199614. Juli 1998Intermec Technology, Inc.Integral bar code printer and reader system and method of operation
US5787174 *2. Nov. 199528. Juli 1998Micron Technology, Inc.Remote identification of integrated circuit
US578727828. Dez. 199428. Juli 1998Pitney Bowes Inc.Method and system for generating and mailing a system performance report, utilizing a report template with predetermined control commands for controlling the printer
US57970605. Nov. 199618. Aug. 1998Texas Instruments IncorporatedElectrophotographic printing subsystem with self-monitoring and adjustment
US580570327. Nov. 19968. Sept. 1998Next Software, Inc.Method and apparatus for digital signature authentication
US581035312. Mai 199722. Sept. 1998Lexmark International, Inc.Modular output stackers for printers
US586539024. Okt. 19962. Febr. 1999Iveges; Steve IVariable-length antenna element
US586710227. Febr. 19972. Febr. 1999Wallace Computer Services, Inc.Electronic article surveillance label assembly and method of manufacture
US5875248 *25. Febr. 199723. Febr. 1999International Business Machines CorporationMethod of counterfeit detection of electronic data stored on a device
US5881136 *1. Juli 19979. März 1999Octel Communication CorporationFax overflow system
US5892211 *1. Mai 19976. Apr. 1999Electronic Payment Services, Inc.Transaction system comprising a first transportable integrated circuit device, a terminal, and a security device
US58977419. Febr. 199827. Apr. 1999Premark Feg L.L.C.Apparatus for applying security tags to labels
US590243729. Febr. 199611. Mai 1999Flexcon Company Inc.Method of making resonant tag labels
US590773927. Febr. 199725. Mai 1999Canon Kabushiki KaishaImage forming apparatus
US590774822. Juli 199725. Mai 1999Canon Kabushiki KaishaElectrical connector, process cartridge and electrophotographic image forming apparatus
US590923327. Jan. 19971. Juni 1999Zebra Technologies CorporationMedia transfer system for a thermal demand printer
US5917911 *23. Jan. 199729. Juni 1999Motorola, Inc.Method and system for hierarchical key access and recovery
US5978483 *18. Juni 19972. Nov. 1999Inkel CorporationSecurely encrypted remote keyless entry system
US598229519. Dez. 19969. Nov. 1999Denso CorporationAnti-theft device having excellent identification code overwriting capabilities
US59956262. Apr. 199830. Nov. 1999Hitachi, Ltd.Electronic shopping method, electronic shopping system and document authenticating method relating thereto
US601193713. Juni 19974. Jan. 2000Sagem SaAssembly of a printer and its consumption tank for business machine
US601453312. Mai 199811. Jan. 2000Canon Kabushiki KaishaConnector, processing unit or process cartridge, and electrophotographic image forming apparatus
US6015344 *29. Sept. 199718. Jan. 2000Rlt Acquisition, Inc.Prize redemption system for games
US60194612. Mai 19961. Febr. 2000Oki Data CorporationPrinter and printing cartridge therefor
US601986521. Jan. 19981. Febr. 2000Moore U.S.A. Inc.Method of forming labels containing transponders
US60492896. Sept. 199611. Apr. 2000Overhead Door CorporationRemote controlled garage door opening system
US60496109. Sept. 199811. Apr. 2000Next Software, Inc.Method and apparatus for digital signature authentication
US605062224. Dez. 199618. Apr. 2000Gustafson; AkeSafety sealing device
US606837231. Okt. 199730. Mai 2000Xerox CorporationReplaceable intermediate transfer surface application assembly
US60759973. Nov. 199713. Juni 2000Telefonaktiebolaget L M Ericsson (Publ)Automatic configuration of antenna near parts equipment
US60928884. Juni 199725. Juli 2000Lexmark International, Inc.Method of transmitting raster information from a host computer to an ink jet printer and corresponding method of printing
US609917812. Aug. 19988. Aug. 2000Eastman Kodak CompanyPrinter with media supply spool adapted to sense type of media, and method of assembling same
US610080429. Okt. 19988. Aug. 2000Intecmec Ip Corp.Radio frequency identification system
US610616616. Apr. 199922. Aug. 2000Eastman Kodak CompanyPhotoprocessing apparatus for sensing type of photoprocessing consumable and method of assembling the apparatus
US611837913. Nov. 199812. Sept. 2000Intermec Ip Corp.Radio frequency identification transponder having a spiral antenna
US612379617. Juli 199826. Sept. 2000Superior Label Systems, Inc.Method of making and applying combination article security target and printed label
US613061311. Sept. 199810. Okt. 2000Motorola, Inc.Radio frequency indentification stamp and radio frequency indentification mailing label
US616326010. Dez. 199819. Dez. 2000Intermec Ip Corp.Linerless label tracking system
US616336123. Apr. 199919. Dez. 2000Eastman Kodak CompanyDigital camera including a printer for receiving a cartridge having security control circuitry
US616363117. Juni 199819. Dez. 2000Sharp Kabushiki KaishaWaveguide type optical integrated circuit element and method for fabricating same
US617311911. Aug. 19999. Jan. 2001Eastman Kodak CompanyCamera having radio-frequency identification transponder
US61884238. Nov. 199913. Febr. 2001Monarch Marking Systems, Inc.Early thermal printhead failure prediction system
US620629220. Jan. 200027. März 2001Sihl GmbhSurface-printable RFID-transponders
US622764325. Febr. 19988. Mai 2001Encad, Inc.Intelligent printer components and printing system
US62463265. Mai 199912. Juni 2001Intermec Ip Corp.Performance optimized smart label printer
US6249291 *22. Sept. 199519. Juni 2001Next Software, Inc.Method and apparatus for managing internet transactions
US62631708. Dez. 199917. Juli 2001Xerox CorporationConsumable component identification and detection
US62719284. März 19987. Aug. 2001Hewlett-Packard CompanyElectrical storage device for a replaceable printing component
US628054421. Apr. 199928. Aug. 2001Intermec Ip Corp.RF tag application system
US628534229. Okt. 19994. Sept. 2001Intermec Ip Corp.Radio frequency tag with miniaturized resonant antenna
US628676221. Sept. 199911. Sept. 2001Intermec Ip Corp.Method and apparatus to perform a predefined search on data carriers, such as RFID tags
US629013814. Sept. 199818. Sept. 2001Kabushiki Kaisha ToshibaWireless data storage medium with flexible image recording section
US629542310. Jan. 200025. Sept. 2001Hewlett-Packard CompanyMethods and systems for monitoring consumable item lifetimes for peripheral units
US631210620. Apr. 19996. Nov. 2001Hewlett-Packard CompanyMethod and apparatus for transferring information between a replaceable consumable and a printing device
US63279727. Okt. 199911. Dez. 2001Meto International GmbhPrinter with a device for the driving of transponder chips
US633206210. Jan. 200018. Dez. 2001Hewlett-Packard CompanySystems and methods for customizing user messages in a printing system
US633492121. Juni 19991. Jan. 2002Meto International GmbhApparatus and method for manufacturing labels for electronic article surveillance
US635161820. Dez. 200026. Febr. 2002Xerox CorporationMethod of using a security system for replaceable cartridges for printing machines
US635162126. Juni 200026. Febr. 2002Xerox CorporationWireless interaction with memory associated with a replaceable module for office equipment
US635750314. Juni 199919. März 2002Pasquini Und Kromer GmbhDevice for producing a strip with self-adhesive labels or other materials with parts placed underneath and a device for laterally guiding edges
US63634833. Nov. 199426. März 2002Lucent Technologies Inc.Methods and systems for performing article authentication
US637529823. Febr. 200123. Apr. 2002Encad, Inc.Intelligent printer components and printing system
US638141811. Aug. 199930. Apr. 2002Eastman Kodak CompanyPrint having information associated with the print stored in a memory coupled to the print
US638540728. Dez. 19997. Mai 2002Hitachi Maxell, Ltd.Accommodating enclosure and management system
US638677221. Jan. 200014. Mai 2002Fargo Electronics, Inc.Method and apparatus for communicating between printer or laminator and supplies
US640433517. Sept. 199811. Juni 2002Kabushiki Kaisha ToshibaApparatus for issuing wireless information storage media
US640940126. März 200125. Juni 2002Zih Corp.Portable printer with RFID encoder
US64182832. Okt. 20009. Juli 2002Xerox CorporationCommunications cartridge
US645115418. Febr. 200017. Sept. 2002Moore North America, Inc.RFID manufacturing concepts
US64735712. Okt. 200029. Okt. 2002Xerox CorporationCommunicating dispensing article
US64878121. Dez. 20003. Dez. 2002Jason J. JohnsonRemote fish bite indicator
US64903523. März 20003. Dez. 2002Richard SchroeppelCryptographic elliptic curve apparatus and method
US649042020. Dez. 20013. Dez. 2002Xerox CorporationSecurity method for a smart card
US652234830. Apr. 199918. Febr. 2003Sagem SaCartridge for consumable product for a printer
US652583515. Dez. 199925. Febr. 2003Pitney Bowes Inc.Method and system for parcel label generation
US65273562. Juni 20004. März 2003Eastman Kodak CompanyPrinter capable of forming an image on a receiver substrate according to type of receiver substrate and a method of assembling the printer
US653235122. Okt. 200111. März 2003Xerox CorporationWireless interaction with memory associated with a replaceable module for office equipment
US653666026. Apr. 200125. März 2003Lincoln Global, Inc.Inventory of consumables in electric arc welding process
US653986722. Mai 20011. Apr. 2003Samsung Electronics Co., Ltd.Method of replacement component communicating with printer and method of printer communicating with replacement component
US65463276. Aug. 20018. Apr. 2003Toyota Jidosha Kabushiki KaishaRunning control apparatus and method
US65576061. Nov. 19996. Mai 2003Meto International GmbhDevice and method for inserting a security and/or identification element between two layers of a marking strip for items of baggage
US65577581. Okt. 19996. Mai 2003Moore North America, Inc.Direct to package printing system with RFID write/read capability
US658865823. Juni 20008. Juli 2003Eric BlankTransaction card with attached auxiliary member
US659203527. Sept. 200115. Juli 2003Arthur Blank & Co.Method and apparatus for rapid, serial transaction item fabrication
US659385318. Febr. 200015. Juli 2003Brady Worldwide, Inc.RFID label printing system
US659395214. Juni 200015. Juli 2003Sony CorporationPrinter system, printer apparatus, printing method, ink ribbon and printing medium
US659746527. Apr. 199822. Juli 2003Intermec Ip Corp.Automatic mode detection and conversion system for printers and tag interrogators
US660349730. Nov. 20005. Aug. 2003Gerber Scientific Products, Inc.Replaceable donor sheet assembly with memory for use with a thermal printer
US662913416. Sept. 199930. Sept. 2003Xerox CorporationContext sensitive web-based user support
US663481423. Jan. 200121. Okt. 2003Eastman Kodak CompanyPrinter media supply spool adapted to allow the printer to sense type of media, and method of assembling same
US663670213. Sept. 200121. Okt. 2003Kabushiki Kaisha ToshibaIdentifying apparatus, apparatus to be identified, identifying method, and printing apparatus
US664454416. Juni 199911. Nov. 2003Eastman Kodak CompanyImaging apparatus capable of forming an image consistent with type of imaging consumable loaded therein and method of assembling the apparatus
US66447716. Aug. 200111. Nov. 2003Silverbrook Research Pty LtdPrinting cartridge with radio frequency identification
US668363819. Febr. 200227. Jan. 2004Oki Data CorporationPrint head and image forming apparatus using multiplexed compensation data
US66876348. Juni 20013. Febr. 2004Hewlett-Packard Development Company, L.P.Quality monitoring and maintenance for products employing end user serviceable components
US66948848. Febr. 200224. Febr. 2004Fargo Electronics, Inc.Method and apparatus for communicating between printer and card supply
US67080055. März 200216. März 2004Canon Kabushiki KaishaImage forming apparatus and method of controlling memory thereof
US67147459. Okt. 200230. März 2004Canon Kabushiki KaishaImage forming apparatus having a plurality of image forming stations, and unit detachably mountable on the apparatus
US672275315. Okt. 200220. Apr. 2004Hewlett-Packard Development Company, L.P.Method and apparatus for checking compatibility of a replaceable printing component
US672489516. Juni 199920. Apr. 2004Supersensor (Proprietary) LimitedElectronic identification system and method with source authenticity verification
US673539917. Mai 200211. Mai 2004Xerox CorporationPost-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming
US673890310. Jan. 200018. Mai 2004Hewlett-Packard Development Company, Lp.Password protected memory on replaceable components for printing devices
US674818224. Sept. 20018. Juni 2004Hitachi, Ltd.Replacing part containing consumable part and image forming apparatus using replacing part
US679170420. Okt. 199914. Sept. 2004Canon Kabushiki KaishaMethod and device for managing printing product resources available in a printer
US679330710. Okt. 200221. Sept. 2004Eastman Kodak CompanyPrinter capable of forming an image on a receiver substrate according to type of receiver substrate and a method of assembling the printer
US679899714. Sept. 200028. Sept. 2004Xerox CorporationSupply ordering apparatus
US680265924. Juli 200112. Okt. 2004Mats CremonArrangement for automatic setting of programmable devices and materials therefor
US680738026. Aug. 200219. Okt. 2004Fuji Xerox Co., Ltd.Wireless communication system and image forming device
US680825510. Jan. 200026. Okt. 2004Hewlett-Packard Development Company, L.P.Storage of printing device usage data on a printing device replaceable component
US682003919. Apr. 200216. Nov. 2004Hewlett-Packard Development Company, L.P.Facilitating device upkeep
US683286625. Nov. 200321. Dez. 2004Fargo Electronics, Inc.Printer or laminator supply
US68797855. März 200312. Apr. 2005Kyocera Mita CorporationImage forming apparatus having reusable unit and reusable unit with indicator of record on use
US689471119. Juni 200317. Mai 2005Dai Nippon Printing Co., Ltd.Thermal transfer recording web roll
US693252719. Apr. 200223. Aug. 2005Fargo Electronics, Inc.Card cartridge
US695453320. Apr. 200411. Okt. 2005Supersensor (Proprietary) LimitedElectronic identification system and method with source authenticity
US69633512. Dez. 20028. Nov. 2005Datacard CorporationRadio frequency identification tags on consumable items used in printers and related equipment
US698605722. Aug. 200010. Jan. 2006Dallas Semiconductor CorporationSecurity device and method
US701811725. Aug. 200328. März 2006Fargo Electronics, Inc.Identification card printer ribbon cartridge
US703194626. Dez. 200018. Apr. 2006Matsushita Electric Industrial Co., Ltd.Information recording medium, noncontact IC tag, access device, access system, life cycle management system, input/output method, and access method
US71370006. Juni 200214. Nov. 2006Zih Corp.Method and apparatus for article authentication
US714716530. Dez. 200312. Dez. 2006Datacard CorporationAdapting element for programmable electronic holders
US718350530. Dez. 200327. Febr. 2007Datacard CorporationAdapting element for programmable electronic holders and use in a multipurpose personalization machine
US720601016. Apr. 200417. Apr. 2007Zih Corp.Systems and methods for providing a media located on a spool and/or a cartridge where the media includes a wireless communication device attached thereto
US722843311. Okt. 20055. Juni 2007Zih Corp.Electronic identification system and method with source authenticity
US723748513. Aug. 20043. Juli 2007Fargo Electronics, Inc.Print supply monitoring
US743076221. Febr. 200330. Sept. 2008Fargo Electronics, Inc.Identification card manufacturing security
US766425728. Febr. 200616. Febr. 2010Zih Corp.Method and apparatus for article authentication
US2001002744329. März 20014. Okt. 2001Hiroshi HanzawaAccounting printing system, accounting printing method, computer-readable storage medium storing accounting printing program, stencil printing apparatus, and information distributing apparatus
US200100298577. Okt. 199918. Okt. 2001Miguel HerediaPrinter with a device for the driving of transponder chips
US2001004836124. Mai 20016. Dez. 2001Mays Wesley M.Method and apparatus for providing interchangeability of RFID devices
US2001005640915. Mai 200127. Dez. 2001Bellovin Steven MichaelOffline one time credit card numbers for secure e-commerce
US2002006289828. Aug. 200130. Mai 2002Austin Pixie A.RF tag application system
US200201450364. Apr. 200110. Okt. 2002Otto Jerome A.Radio frequency identification system and method
US2002017097322. Apr. 200221. Nov. 2002Nobuyuki TerauraSheet of printing paper, a printer, a copy machine, a facsimile, a document scanner, a method of controlling a printer, a method of controlling a document scanner, a method of controlling a scanner, a printer and a communication unit
US2002019519429. Juli 200226. Dez. 2002Moore North America, Inc..RFID manufacturing concepts
US2002019519529. Juli 200226. Dez. 2002Moore North America, Inc..RFID manufacturing concepts
US2003006300227. Sept. 20023. Apr. 2003Hitachi, Ltd.Method of manufacturing electronic tag
US2003008944430. Sept. 200215. Mai 2003Roland MelzerMethod and apparatus for producing data carriers equipped with an integrated transponder
US200301282692. Dez. 200210. Juli 2003Squires Milo B.Radio frequency identification tags on consumable items used in printers and related equipment
US2003018332931. März 20032. Okt. 2003Detlef DuschekDevice and method for inserting a security and/or identification element between two layers of a marking strip for items of baggage
US200301894903. Apr. 20029. Okt. 20033M Innovative Properties CompanyRadio-frequency indentification tag and tape applicator, radio-frequency identification tag applicator, and methods of applying radio-frequency identification tags
US2004010971525. Aug. 200310. Juni 2004Fargo Electronics, Inc.Identification card printer and ribbon cartridge
US2004011498125. Aug. 200317. Juni 2004Fargo Electronics, Inc.Identification card printer ribbon cartridge
US200502757087. Juni 200515. Dez. 2005Datacard CorporationRadio frequency identification tags on consumable items used in printers and related equipment
US2006012347128. Okt. 20058. Juni 2006Fargo Electronics, Inc.Credential production using a secured consumable supply
US200602030759. März 200514. Sept. 2006George VazacSystem and method for thermal transfer print head profiling
US2007005602718. Aug. 20068. März 2007Fargo Electronics, Inc.Securely processing and tracking consumable supplies and consumable material
US200700570577. Sept. 200615. März 2007Assa Abloy Identification Technology Group AbSynchronization techniques in multi-technology/multi-frequency rfid reader arrays
US2008031652312. Aug. 200825. Dez. 2008Fargo Electronics, Inc.Identification card manufacturing security
USD3470218. Sept. 199217. Mai 1994Zebra Technologies CorporationThermal transfer printer
AU743556B2 Titel nicht verfügbar
DE19653113A119. Dez. 199626. Juni 1997Denso CorpAnti-Diebstahlsvorrichtung mit verbesserten Identifikationscode-Überschreibeigenschaften
DE19653113B419. Dez. 199613. Nov. 2008Denso Corp., Kariya-shiAnti-Diebstahlsvorrichtung mit verbesserten Identifikationscode-Überschreibeigenschaften
EP0595549A321. Okt. 199324. Aug. 1994Hughes Microelectronics EuropaRadio frequency baggage tags
EP0878403A16. Mai 199818. Nov. 1998Monarch Marking Systems, INC.Label printing apparatus and method
EP1016037B13. März 199816. Jan. 2002IerMethod and system for issuing identification labels
GB2303613A Titel nicht verfügbar
JP2000062273A Titel nicht verfügbar
JP2000246921A Titel nicht verfügbar
JP2000355146A Titel nicht verfügbar
JP2001001424A Titel nicht verfügbar
JP2001096814A Titel nicht verfügbar
JP2001215779A Titel nicht verfügbar
JP2001510912A Titel nicht verfügbar
JP2002334313A Titel nicht verfügbar
JP2003011931A Titel nicht verfügbar
JP2003011939A Titel nicht verfügbar
JP2003159838A Titel nicht verfügbar
JP2003207984A Titel nicht verfügbar
RU2120387C1 Titel nicht verfügbar
RU2147790C1 Titel nicht verfügbar
SU1069276A1 Titel nicht verfügbar
WO1996008092A11. Sept. 199514. März 1996Intel CorporationRoving software license for a hardware agent
WO1996028941A111. Jan. 199619. Sept. 1996Motorola Inc.Radio frequency identification system for reliable communication
WO1997011530A120. Sept. 199527. März 1997Hitachi, Ltd.Method and device for decoding burst error of reed-solomon code
WO1998039734A13. März 199811. Sept. 1998IerMethod and system for issuing identification labels
WO1998052762A Titel nicht verfügbar
WO2000007807A119. Juli 199917. Febr. 2000Loerd KentA label feeder
WO2000043932A221. Jan. 200027. Juli 2000Fargo Electronics, Inc.Method and apparatus for communicating between printer or laminator and supplies
WO2000047410A18. Sept. 199917. Aug. 2000Nedblake Greydon W JrDevice for products with labels
WO2001000492A123. Juni 20004. Jan. 2001New Jersey Machine Inc.Labelling apparatus
WO2001015382A121. Aug. 19991. März 2001Kent Ridge Digital LabsLegitimacy protection of electronic document and a printed copy thereof
WO2001057807A123. Mai 20009. Aug. 20013M Innovative Properties CompanyMethod of authenticating a tag
WO2001061646A120. Dez. 200023. Aug. 2001Moore North America, Inc.Rfid manufacturing concepts
WO2002035463A223. Okt. 20012. Mai 2002Avery Dennison CorporationUse of an rfid label for labelling an object to be transported with regard to the destination thereof in addition to a system, method, printer and tag for the same
WO2003019459A222. Aug. 20026. März 2003Zih Corp.Method and apparatus for article authentication
WO2003029005A217. Sept. 200210. Apr. 2003Zih Corp.Method and apparatus for associating on demand certain selected media and value-adding elements
Nichtpatentzitate
Referenz
13 pages from http://www.fargo.com/Products/ribbons.asp dated Jan. 17, 2001 regarding Fargo Electronics: card printer ribbons.
24 pages from Eltron® Card Printer Products re P200 Series Card Printers.
3Bielomatik-One (1) page from http://www.bielomatik.de/sixcms/detail.php?id=903&template=masch-detail-en Apr. 1, 2003 re Multi-Web Lamination process flow: Smart Labels (Compact Version).
4Bielomatik—One (1) page from http://www.bielomatik.de/sixcms/detail.php?id=903&template=masch—detail—en Apr. 1, 2003 re Multi-Web Lamination process flow: Smart Labels (Compact Version).
5Bielomatik-One (1) page from http://www.bielomatik.de/sixcms/detail.php?id=906&template=schema-detail-en Apr. 1, 2003 re Mutli-Web Lamination process flow: Smart Tickets (Compact Version).
6Bielomatik—One (1) page from http://www.bielomatik.de/sixcms/detail.php?id=906&template=schema—detail—en Apr. 1, 2003 re Mutli-Web Lamination process flow: Smart Tickets (Compact Version).
7Bielomatik-One (1) page from http://www.bielomatik.de/sixcms/detail.php?id=908&template+schema-detail-en Apr. 1, 2003 re Multi-Web Lamination process flow: Smart Labels, Tags und (sic) Tickets.
8Bielomatik—One (1) page from http://www.bielomatik.de/sixcms/detail.php?id=908&template+schema—detail—en Apr. 1, 2003 re Multi-Web Lamination process flow: Smart Labels, Tags und (sic) Tickets.
9Bielomatik-Two (2) pages from http://www.bielomatik.de/sixcms/detail.php?id=874&template=masch-detail-en Apr. 1, 2003 re TAL-100 Transponder Attaching and Laminating Machine.
10Bielomatik—Two (2) pages from http://www.bielomatik.de/sixcms/detail.php?id=874&template=masch—detail—en Apr. 1, 2003 re TAL-100 Transponder Attaching and Laminating Machine.
11Bielomatik-Two (2) pages from http://www.bielomatik.de/sixcms/detail.php?id=876&template=masch-detail-en Apr. 1, 2003 re TLA-100 Transponder and Label Attaching Machine.
12Bielomatik—Two (2) pages from http://www.bielomatik.de/sixcms/detail.php?id=876&template=masch—detail—en Apr. 1, 2003 re TLA-100 Transponder and Label Attaching Machine.
13Biolomatik-Two (2) pages from http://www.bielomatik.de/sixcms/detail.php?id=877&template=masch13 detail-en Apr. 1, 2003 re TTL-100 Transponder and Ticket Laminating Machine.
14Biolomatik—Two (2) pages from http://www.bielomatik.de/sixcms/detail.php?id=877&template=masch13 detail—en Apr. 1, 2003 re TTL-100 Transponder and Ticket Laminating Machine.
15Blahut, R. E., Theory and Practice of Error control Codes, Chapter 4, The Arithmetic of Galois Fields, Addison-Wesley Publishing Company, 1993, p. 65, 80, 81, 82, 83.
16Chang, C.C., et al., Using Smart Cards to Authenticate Passwords, Security Technology, 1993, Security Technology, Proceedings, Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on Oct. 13-15, 1993, pp. 154-156.
17Da, L. et al., The Encryptive Mechanism and Applications of Smart Card; Computer Engineering; Published May 1997; 6 pages; vol. 23, No. 3.
18Fenghua, J. et al., A Practical Encryption Method Based on IC Card; Published 1997; vol. 6.
19Final Office Action for U.S. Appl. No. 11/364,354 dated Mar. 5, 2008.
20Gupta, R. et al.; On Randomization in Sequential and Distributed Algoritym, ACM Computing Surveys (CSUR), vol. 26, Issue 1 (Mar. 1994), pp. 7-86.
21Hohberger, C. P., A "White Paper" on the Development of AIM Industry Standards for 13.56 MHz RFID Smart Labels and RFID Printer/Encoders, dated May 24, 2000.
22International Search Report for Application No. PCT/US02/26617 dated Mar. 20, 2003.
23Liping, H., Universal Read/Write System and Application of IC Card; Journal of Tianjin University of Commerce; Published Mar. 1998; 6 pages; vol. 2.
24Menezes, A. et al., Handbook of Applied Cryptography, CRC Press, 1997, pp. 389, 394, 395, 399, 401.
25Motorola announces BiStatix 125KHz RFID tag, Transponder News Press Release, Mar. 2, 1999.
26Office Action for U.S. Appl. No. 10/164,070 dated Jul. 2, 2004.
27Office Action for U.S. Appl. No. 10/164,070 dated Jul. 29, 2005.
28Office Action for U.S. Appl. No. 11/364,354 dated Feb. 25, 2009.
29Office Action for U.S. Appl. No. 11/364,354 dated Sep. 18, 2008.
30Office Action for U.S. Appl. No. 11/364,354 dated Sep. 26, 2007.
31Office Action for U.S. Appl. No. 12/648,961 dated Jun. 29, 2011.
32Office Action Response for U.S. Appl. No. 10/164,070 dated Jul. 19, 2004.
33Office Action Response for U.S. Appl. No. 10/164,070 dated Nov. 14, 2005.
34Office Action Response for U.S. Appl. No. 11/364,354 dated Dec. 17, 2008.
35Office Action Response for U.S. Appl. No. 11/364,354 dated Jan. 25, 2008.
36Office Action Response for U.S. Appl. No. 11/364,354 dated Jul. 27, 2009.
37Office Action Response for U.S. Appl. No. 12/648,961 dated Nov. 29, 2011.
38RFID Technology & Smart Labels, dated Sep. 14, 1999.
39Stallings, W., Key Management; Other Public-Key Cryptosystems, Cryptography and Network Security Principles and Practice, Third Edition, Upper Saddle River, NJ, Prentice Hall, 2003, pp. 293-296.
40Supplemental Office Action Response for U.S. Appl. No. 10/164,070 dated Jan. 18, 2006.
41Supplemental Office Action Response for U.S. Application No. 11/364,354 dated Aug. 19, 2009.
42The Supplementary European Search Report for European Patent Application No. 02 75 9421, completed Oct. 30, 2008.
43Tu, K., An ID-Based Cryptographic Technique for IFF, Military Communications Conference, 1995 Milcom '95, Conference Records, IEEE, vol. 3, Nov. 8, 1995, pp. 1258-1262, vol. 3.
44U.S. Appl. No. 12/648,961, filed Dec. 29, 2009, In re: Holberger et al., entitled Method and Apparatus for Article Authentication.
45U.S. Appl. No. 60/117,123, filed Jan. 25, 1999 entitled Ribbon Core Identification Coding Device.
46U.S. Appl. No. 60/314,926, filed Aug. 24, 2011 entitled Method and Apparatus for Consumable Authentication.
47U.S. Appl. No. 60/459,712, filed Apr. 2, 2003 entitled Inverted Identification Card Printing and Ribbon Cartridge.
48U.S. Appl. No. 60/497,009, filed Aug. 19, 2003 entitled Identification Card Printer and Ribbon Cartridge.
49Xuebin, T. et al., The Development of a Contract-less IC Card Used as ID Card; Micoelectronics; Published Jun. 1998; 6 pages; vol. 28, No. 3.
Referenziert von
Zitiert von PatentEingetragen Veröffentlichungsdatum Antragsteller Titel
US9317009 *19. Febr. 201419. Apr. 2016Xerox CorporationSystems and methods for mounting an externally readable monitoring module on a rotating customer replaceable component in an operating device
US20150234347 *19. Febr. 201420. Aug. 2015Xerox CorporationSystems and methods for mounting an externally readable monitoring module on a rotating customer replaceable component in an operating device
Klassifizierungen
US-Klassifikation713/182, 713/185, 713/193
Internationale KlassifikationG07C9/00, G06K7/00, H04L29/06
UnternehmensklassifikationH04L9/3226, G07C9/00103, G06K7/0008
Juristische Ereignisse
DatumCodeEreignisBeschreibung
17. Sept. 2013CCCertificate of correction
31. Okt. 2014ASAssignment
Owner name: MORGAN STANLEY SENIOR FUNDING, INC. AS THE COLLATE
Free format text: SECURITY AGREEMENT;ASSIGNORS:ZIH CORP.;LASER BAND, LLC;ZEBRA ENTERPRISE SOLUTIONS CORP.;AND OTHERS;REEL/FRAME:034114/0270
Effective date: 20141027
5. Dez. 2014FPAYFee payment
Year of fee payment: 8