US20090287498A2 - System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto - Google Patents

System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto Download PDF

Info

Publication number
US20090287498A2
US20090287498A2 US12/325,152 US32515208A US2009287498A2 US 20090287498 A2 US20090287498 A2 US 20090287498A2 US 32515208 A US32515208 A US 32515208A US 2009287498 A2 US2009287498 A2 US 2009287498A2
Authority
US
United States
Prior art keywords
product
uid
authorized party
identification code
unique identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/325,152
Other versions
US8650097B2 (en
US20090144074A1 (en
Inventor
Yu Choi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHENUINE CORP
Original Assignee
ZHENUINE CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHENUINE CORP filed Critical ZHENUINE CORP
Priority to PCT/US2008/085083 priority Critical patent/WO2009073579A2/en
Priority to US12/325,152 priority patent/US8650097B2/en
Publication of US20090144074A1 publication Critical patent/US20090144074A1/en
Priority to US12/501,434 priority patent/US8253569B2/en
Publication of US20090287498A2 publication Critical patent/US20090287498A2/en
Priority to US13/849,598 priority patent/US20130227653A1/en
Application granted granted Critical
Publication of US8650097B2 publication Critical patent/US8650097B2/en
Priority to US15/346,100 priority patent/US20170053293A1/en
Priority to US15/477,957 priority patent/US20170206532A1/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/012Providing warranty services

Definitions

  • the present invention relates to a system and method for registration of electronic products each having a unique identification code pre-assigned thereto with a centralized registration center, and subsequently utilizing at least one unique identification code to obtain one or more information items related to each registered product from the registration center, and more particularly to a system and method for streamlined registration, with one or more registration centers over at least one communication network, of electronic products each having a unique identification code pre-assigned thereto that is associated with one or more data records stored in a corresponding file at a predetermined registration center, and later utilizing at least one unique identification code to access, verify, edit, transfer, transmit, and otherwise manage at least one information item related to each registered product in its corresponding registration center data record.
  • serial numbers for different products from different manufacturers may be identical or confusingly similar to one another. In view of the sheer and ever-growing quantity of available electronic products, this occurrence continues to become increasingly more frequent. Thus, currently, no serial number can ever really be assured of being “unique”.
  • serial numbers are not visibly displayed to product users for inspection, but are only capable of being retrieved through use of external electronic devices (such as computers) utilizing specially configured software (e.g., typically provided by the manufacturer to authorized personnel).
  • product serial numbers were exclusively utilized by the respective product manufacturers, and/or by repair/service providers, for warranty activation and administration, product update and recall notifications, and in connection with the provision of product configuration maintenance/repair services.
  • Primary and aftermarket consumers, law enforcement personnel, product users, and other inquiring parties were not able to use serial numbers to any significant extent, especially because certain potentially very useful information was simply not available in connection with the serial numbers.
  • each mobile telephone includes an International Mobile Equipment Identity (IMEI) number stored in its memory, which can be viewed on the phone display screen in response to certain commands.
  • IMEI International Mobile Equipment Identity
  • the IMEI number is used by the GSM (Global System for Mobile communications) network to identify valid mobile devices, it can therefore be used to stop a stolen phone from accessing the network, fraudulent alteration thereof may enable a perpetrator to use a stolen or otherwise unlawfully obtained mobile telephone with an altered IMEI number, to misappropriate communication and/or data services. It should also be noted that the IMEI number is most often only used to identify a specific mobile telephone, and is not in any way linked to, or associated with, a mobile service subscriber using the telephone.
  • UIDs assigned to various electronic products are not duplicated, regardless of different product manufacturers. It would further be desirable to provide an embedded or integrated UID component for electronic product operable for at least one of: (1) selective activation in response to one or more predetermined criteria (e.g., an authorized inquirer request, etc.), (2) display of the UID to an inquirer, for example by use of a product's display component, (3) proximity-limited transmission of the UID from the component to a preconfigured UID receiver, (4) wireless transmission (preferably secure) of the UID from the component to a an authorized receiving system, (5) transmission (preferably secure) of the UID through a physical electronic connection to an authorized requesting component or system.
  • predetermined criteria e.g., an authorized inquirer request, etc.
  • At least one UID registration center database further comprises user accounts for parties including, but not limited to, at least one of the following: product manufacturers, product distributors, retail stores, e-commerce stores, consumers, etc., where each account is associated with one or more UIDs that each corresponds to its UID registration center database file (as described above).
  • the registrant in conjunction with creation of a UID registration center file for a particular electronic product (i.e., during electronic product UID registration), the registrant is provided with at least one verifier, each operable to at least one of: (1) ensure that subsequently only an authorized party may access the file by supplying a provided verifier to the registration center control system, (2) ensure that prior to activation by an electronic product seller, cannot be used to access the UID registration center file to guard against theft, loss, or other misappropriation of the corresponding electronic product, during transit from the seller to a buyer, and (3) when provided for a product manufacturer, ensure that the verifier is associated with each particular product UID and stored in the corresponding UID registration center file linked to the manufacturer's user account, such that the verifier is provided to a purchaser of the particular electronic product to facilitate ready registration thereof with the UID registration center.
  • UID registration center database file including, but not limited to, at least one of the following: name/contact information of owner, name/contact information of store, purchase date, return date, service/warranty claims, status (lost, stolen, returned to store or manufacturer, reconditioned, etc.), with each information item being optionally time-stamped.
  • UID registration center it would moreover be desirable to provide an additional access platform to enable other inquiring parties to connect to at least one UID registration center, seeking to verify particular product information through the use of UIDs for various purposes (such as to enable law enforcement officers to determine the status (stolen, etc.) of a recovered electronic products and to locate the owner of a recovered stolen product, or to enable a person who finds a lost product, to contact its owner and return it).
  • FIG. 1A is a schematic diagram of a first exemplary embodiment of a novel component, integrated into a particular electronic product, operable, in accordance with the present invention, to securely store, protect, and, in response to an authorized inquiry thereto, provide a unique ID (UID) previously assigned to the particular electronic product;
  • UID unique ID
  • FIG. 1B is a schematic diagram of a first exemplary alternate embodiment of the inventive UID component of FIG. 1A , implemented by way of example, as an integrated circuit (IC) comprising corresponding sub-components;
  • IC integrated circuit
  • FIG. 2A is a schematic diagram of a second exemplary embodiment of a novel component, embedded into a particular product, operable, in accordance with the present invention, to secure store, protect, and in response to an authorized inquiry thereto, selectively provide, in a passive or an active manner, a unique ID (UID) previously assigned to the particular product, and that may also be selectively deactivated and/or activated by the user thereof;
  • a unique ID UID
  • FIG. 2B is a schematic diagram of a first exemplary alternate embodiment of the inventive UID component of FIG. 2A , implemented by way of example, as an UID component that may be selectively activated and/or deactivated by a user, and that may be further selectively operable to transmit a UID in a wireless manner whether through contact or proximity with an UID reading device, or otherwise.
  • FIG. 3 is a schematic diagram of an exemplary embodiment of an infrastructure of the inventive product information registration, verification and management system that incorporates at least one UID registration center, and that is usable by various parties having accounts therewith;
  • FIG. 4 is a schematic diagram of an exemplary embodiment of an implementation of user accounts and UID registration center files in conjunction with utilization of the inventive system infrastructure of FIG. 3 ;
  • FIG. 5 is a process flow diagram of an exemplary embodiment of a product manufacturer UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4 ;
  • FIG. 6 is a process flow diagram of an exemplary embodiment of a product sales intermediary UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4 ;
  • FIG. 7 is a process flow diagram of an exemplary embodiment of a product consumer UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4 ;
  • FIG. 8 is a process flow diagram of an exemplary embodiment of a third party (law enforcement, misc. inquirer) UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4 .
  • a third party law enforcement, misc. inquirer
  • the system and method of the present invention address and resolve all of the disadvantages of the previously known relevant solutions by advantageously providing integrated or embedded components, for electronic (or other) products, each operable to securely store and selectively provide access to, a unique ID (“UID”) previously assigned to its corresponding specific product, where the UID of each product is registered with one or more particular UID registration centers over at least one communication network, and associated with one or more data records stored in a corresponding database file at the particular UID registration center, the data records being inclusive of information related to the product, the product purchase history, current ownership, etc., and wherein one or more authorized parties may subsequently advantageously utilize at least one UID (and optionally a verifier) to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item related to the one or more corresponding registered products in their UID registration center database file.
  • UID unique ID
  • inventive system and method advantageously provide an optimized process for verifiable transfer of ownership rights between a product's authorized owner and intended recipient, the transfer process being implemented over at least one communication network with graphical user interfaces provided for each party, where the transfer of ownership rights involves association of the product's UID with the receiving party's data record and confirming ownership transfer, and optional transfer of additional product-related information from the former product owner to the current recipient.
  • the novel electronic product-related information registration, verification, and management system and method provides electronic (or other) products with a unique ID (“UID”) assigned to each product and stored in an integrated or embedded product component in such a manner as to: (1) make the UID readily available to a (preferably authorized) inquirer, and (2) make the UID virtually impossible to remove or change without destroying or seriously damaging its corresponding product, and further comprises least one registration center operable to store and enable conditional access to, at least one information record linked to each product through its UID, such that the at least one information record may be advantageously accessed and/or managed by at least one authorized inquirer through use of the UID.
  • UID unique ID
  • the inventive system and method ensure that the UIDs assigned to various electronic product are not duplicated, regardless of different product manufacturers, and provide an integrated or embedded UID component for electronic (or other) products operable for at least one of.
  • the inventive electronic product-related information registration, verification, and management system and method is provided for electronic products each having a UID assigned thereto and securely stored therein in an integrated and/or embedded component thereof, that comprises at least one UID registration center, each having a communication system operable to receive UID and other information, over at least one communication network, a control system, and a UID database system that comprises a plurality of data records each linked t a particular UID stored in a corresponding UID registration center database file, such that at least one authorized inquirer is able to utilize a particular UID (preferably in conjunction with provision of a verifier to verify authorization) to access, verify, edit, transfer, transmit, and otherwise manage at least one information item related to each registered product in its corresponding UID registration center database file.
  • the inventive system and method also advantageously ensure that the integrated/embedded UID components (and the corresponding UIDs) assigned to various electronic and other products, are configured for use in conjunction with various conventional and future shipping, storage, inventory, tracking, etc
  • a novel system and method for electronic product information registration, verification and management for use in conjunction with electronic products supplied with UIDs is provided with an infrastructure in which at least one UID registration center database further comprises user accounts for parties including, but not limited to, at least one of the following: product manufacturers, product distributors, retail stores, e-commerce stores, consumers, etc., where each account is associated with one or more UIDs that each corresponds to its UID registration center database file (as described above).
  • a novel system and method is provided for UID-based electronic product information registration, verification and management, in which, in conjunction with creation of a UID registration center file for a particular electronic product (i.e., during electronic product UID registration), the registrant is provided with at least one verifier, each operable to at least one of:
  • the various above-described exemplary embodiments of the inventive system and method may include one or more of the following exemplary embodiments of UID registration center account features:
  • the system and method of the present invention remedy the disadvantages of all previously known techniques, systems and methodologies relating to registration, verification, and management of information related to various goods, and particularly to electronic or other valuable products or devices.
  • the inventive system and method advantageously provide novel integrated or embedded components (or novel feature sets, implemented, for example, as hardwired functions or program instruction sets in multipurpose electronic systems or components), for electronic (or other) products, each such component operable to securely store and selectively provide access to, a unique ID (“UID”) previously assigned to its specific corresponding product, where the UID of each product is preferably registered with one or more particular UID registration center, over at least one communication network, and associated with one or more data records stored in a corresponding database file at the particular UID registration center, linked to the products UID.
  • the product data records are preferably inclusive of various information items related to the product, that may include, but that are not limited to, one or more of the following:
  • one or more authorized parties may subsequently advantageously utilize the product's UID (and optionally a verifier previously assigned thereto during registration or otherwise lawfully provided thereto (e.g., from the manufacturer, or from the product's seller during purchase thereof), to access, verify, edit, transfer, transmit, and/or to otherwise manage at least one data item in the UID registration center database file that corresponds to the proffered UID (and optionally that also corresponds to the predetermined verifier).
  • a product's UID is not changeable by anyone without causing damage to, or destroying the product in question.
  • the entire component containing the UID may be changed only by a party having authorized access to special equipment/tools/information available only to the product's manufacturer.
  • the UID may be readable from the product (e.g., displayable either on the product itself (if the product has a screen), or through an appropriate device capable of reading and displaying the UIDs), the exact location of the UID in the product or in the product electronic circuitry (i.e., in which specific IC or register is the UID stored) may be kept secret and known only to the authorized party assigning the UID to the product (e.g., manufacturer, etc.). In an alternate embodiment of the invention, the UID may be unchangeable by anyone as noted above, except by the authorized party that originally assigned the UID to the product.
  • FIG. 1A a first exemplary embodiment of a novel product component configured for integration into a particular electronic (or other) product or device, is shown as an integrated UID component 10 , being operable, in accordance with the present invention, to securely store, protect, and, in response to an authorized inquiry thereto, provide a unique ID (UID) previously assigned to the particular product.
  • the UID component 10 includes a control component 16 , a protected memory 14 for storing the UID (and optionally for storing other information), and an input/output system 20 configured for receiving signal 22 and sending out signals 24 , 26 .
  • the component 10 may be implemented in a housing 12 .
  • UID component 10 a a first exemplary alternate embodiment of the inventive UID component 10 of FIG. 1A is shown as an UID component 10 a , implemented by way of example as an integrated circuit (IC) 12 a (or an equivalent component), comprising corresponding sub-components as described below.
  • IC integrated circuit
  • the UID component 10 a is configured for preferable use with a product which comprises an integral display component operable to display the UID in response to an authorized request therefor, as described below
  • the IC 12 a contains a CPU (central processing unit) 16 a , an OTP ROM 14 a for storing the UID, a flash ROM 18 a , a data SRAM 18 b , an LCD driver 20 a (for example for driving an LCD display component (not shown) of the product in which the component 10 a is installed), a serial I/O port 20 b , an I/O port- 1 20 c , an I/O port- 2 20 d , and a data bus 20 e.
  • a serial I/O port 20 b for example for driving an LCD display component (not shown) of the product in which the component 10 a is installed
  • serial I/O port 20 b for example for driving an LCD display component (not shown) of the product in which the component 10 a is installed
  • this request is transmitted to the component 11 a from the product's input component (not shown, such as a keypad, button, touchscreen control, or equivalent, and arrives as a signal through I/O port- 1 20 c , and then passes through the data bus 20 e into the CPU 16 a .
  • the CPU 16 a operates in accordance with program instructions stored in the memory of Flash ROM 18 a , and has access to, and is capable of utilizing, the data SRAM 18 b .
  • the CPU 16 a then retrieves the UID from OTP ROM 14 a , and processes the UID as data, thereafter sending it to the LCD Driver 20 a to output to the product display and to thus display the UID for verification or for other purpose.
  • a request for the UID may also be made to the UID component 10 a through data communication (for example such as request by the owner or other possessor of the product to transmit the UID to some other external (e.g., remote) system (ranging from a proximal reader to a centralized UID and product information database system), for example for the purposes of UID registration, UID verification, or for any other applicable purpose.
  • data communication for example such as request by the owner or other possessor of the product to transmit the UID to some other external (e.g., remote) system (ranging from a proximal reader to a centralized UID and product information database system), for example for the purposes of UID registration, UID verification, or for any other applicable purpose.
  • the applicable signal arrives through I/O port- 2 20 d , and then passes through data bus 20 e into the CPU 16 a in accordance with the programming stored in the memory of Flash ROM 18 a , and in the data SRAM 18 b .
  • the CPU 16 a then retrieves the UID stored in the OTP ROM 14 a , and, after processing, sends the UID as data through the data bus 20 e to the I/O port- 2 20 d to the external (e.g., remote) system for the designated purpose (e.g., registration, verification, etc.).
  • the external e.g., remote
  • the IC 12 a can be a microprocessor, a microcontroller, a chipset (northbridge, etc.), or equivalent solid state or other form of logic circuitry that is configured for storing and processing information. Because components such as the IC 12 a are present in abundance in virtually all electronic product, in one embodiment of the invention, the UID and the relevant program instructions for its storage, processing, retrieval, display and transmittal may be implemented in the existing components/circuitry of the product, without requiring any new components or without requiring physical modification of the product's electronics. Optionally, the specific location of the UID and the relevant program instructions related thereto, may be determined secretly by the originator of the UID (such as the product manufacturer).
  • the UID cannot be changed by any means, and can only be disabled by damaging or destroying the product itself. Even if the IC 12 a associated with the UID is identified, any attempted UID change would require replacement of the IC 12 a , which would certainly damage the product.
  • an embedded UID component 50 being operable, in accordance with the present invention, to securely store, protect, and, in response to an authorized inquiry thereto, in a passive or an active manner, selectively provide and/or transmit and/or broadcast a unique ID (UID) previously assigned to the particular product.
  • the UID component 50 includes an optional control component 58 , a protected memory 54 for storing the UID, and a communication system 56 configured for receiving a signal 62 and sending out signals 64 , 66 .
  • the component 50 may be implemented in a housing 52 and may receive power, either from a self-contained power source 68 (such as a battery), or may receive external power 70 , or both (together or in accordance with at least one power management protocol—e.g., the component 50 may utilize the power source 70 during normal use, but switch to the self-contained source 68 if the flow of power from the source 70 is disrupted, due to source 70 being depleted or damaged (essentially functioning as a failsafe or backup)).
  • the component 50 may be configured as a passive device that does not require its own source of power from operation, and that may be activated only in response to a sufficiently proximal corresponding compatible UID reading device.
  • the UID component 50 may be implemented as a chip, circuitry, tag, etc., that is configured to utilize one or more of remote data reading/transmission technologies, including, but not limited to: active or as a passive RFID (or equivalent), BluetoothTM, Wi-Fi, RuBeetTM, wireless data transmission (e.g., BluetoothTM, Wi-Fi, RuBeetTM, Wireless USB, magnetic contact data transfer, various high speed cellular data transmission protocols (EDGE, etc.), infrared (IR), or through any wireless data reading/transmission technology equivalent to any of the above.
  • remote data reading/transmission technologies including, but not limited to: active or as a passive RFID (or equivalent), BluetoothTM, Wi-Fi, RuBeetTM, wireless data transmission (e.g., BluetoothTM, Wi-Fi, RuBeetTM, Wireless USB, magnetic contact data transfer, various high speed cellular data transmission protocols (EDGE, etc.), infrared (IR), or through any wireless data reading/transmission technology equivalent to any of the above.
  • the UID component 50 is capable of transmitting the UID in a wireless manner, in view of security and privacy concerns, in another embodiment of the invention, the UID component 50 is optionally provided with a selectively operable switch 60 , which may be advantageously used by an authorized party (e.g., by the owner of the corresponding product, by law enforcement, etc.) to deactivate, or to activate, the communication system 56 (which may be an antenna, other transmitter, etc.), as may be desired to either restrict, or to allow access to the UID from external requestors.
  • an authorized party e.g., by the owner of the corresponding product, by law enforcement, etc.
  • the communication system 56 which may be an antenna, other transmitter, etc.
  • the UID component 50 may simply serve as a modified alternate version of an integrated component 10 (or 10 a ) of FIGS. 1A , (and 1 B), respectively, essentially being implemented as the component 10 or component 10 a , except also being supplied with predetermined wireless data transmission functionality provided by communication system 56 (and optionally by switch component 60 ), selectively operable to wirelessly receive UID related instructions and to selectively wirelessly transmit the UID to a designated external recipient, in response to authorized requests.
  • One alternate embodiment of the UID component 50 is shown in FIG. 2B and discussed in greater detail in connection therewith.
  • the UID component 50 a may be implemented as individual components spread through the product inclusive of the UID component 68 (such as an RFID chip, the components 10 , 10 a of FIGS. 1A, 1B ), switch 60 a and antenna 56 a.
  • the UID component 68 there is an OTP ROM (or equivalent memory) for storing the UID, logic circuitry, and communications circuitry (such as described above in connection with FIGS. 1A and 1B ).
  • OTP ROM or equivalent memory
  • the UID can be read from a predetermined (for example by the UID originator, by the product manufactures and/or by the user) distance (ranging from substantial contact with the product or component 50 a , to the outer range of the remote data transmission technology implemented in the component 50 a ), making it convenient for tracking products incorporating the UID component 50 a , such as during transportation, storages etc thereof.
  • a passive or self-powered version of the UID component 50 a may be used in a case when the product in which it is embedded runs out of power or is damaged such that the UID cannot be read through conventional means.
  • the UID component 52 a may optionally comprise an internal power source (e.g., depending on whether it is capable of passive, active, or semi-passive operational modes).
  • the UID component 50 a can use the power obtained from the product in which it is installed.
  • the switch 60 a positioned between the antenna 56 a and the UID component 68 , is provided for the product owner/operator to be able to control (by switching it on or off) remote reading/transmission functions of the UID device 50 a (e.g. limiting them to contact reading only), or to switch the external access to the UID component 68 on or off entirely.
  • the UID component 50 a is embedded in the product, or is otherwise attached to the product (internally or externally), such as being inserted therein, being attached thereto, or implanted.
  • an UID originator 106 e.g., a party authorized to issue UIDs, such as a manufacturer, an industry authority or council, etc.
  • assigns a UID to a product 102 such as an electronic device
  • a UID which is stored in the UID component 104 such as any of the UID components 10 , 10 a , 50 , or 50 a (of FIGS. 1A to 2 B)).
  • the product 102 also includes a certain set of product information items associated therewith (product info 102 a ) which may include, but which are not limited to: product 102 ownership rights information (e.g., name/contact information of owner, name/contact information of store selling product 102 , purchase date, return date, and service/warranty claims, product 102 status (lost, stolen, returned to store or manufacturer, reconditioned, etc.), product 102 manufacturer information (name, contact information, product brand name, model name/number, production date, warranty information, technical support information, etc), with one or more of the information items 102 a being optionally time-stamped.
  • product 102 ownership rights information e.g., name/contact information of owner, name/contact information of store selling product 102 , purchase date, return date, and service/warranty claims, product 102 status (lost, stolen, returned to store or manufacturer, reconditioned, etc.)
  • product 102 manufacturer information name, contact information, product brand name, model name/number, production date, warranty
  • one or more parties other than the UID originator 106 may be authorized to access the UID of the product 102 (whether from the product itself or from an appropriate product record in the UID database system 126 ), access, transfer, manage, and/or change all or part of the product information 102 a .
  • These potential authorized parties may include, but are not limited to, one or more of the following: consumers, aftermarket consumers, law enforcement personnel, retail stores, E-Commerce vendors (such as on-line stores, auction websites, etc.), aftermarket sellers (through classified ads, auctions, etc.), or another inquirers (such as persons finding a lost or stolen product 102 ).
  • the various possible authorized parties may be generally categorized as being “end user” inquirers 110 , i.e., parties who eventually wind up in the possession of the product 102 , or “intermediary” inquirers 112 , such as parties that serve as intermediaries in getting the product 102 from its manufacturer (e.g., UID originator 106 ), to the end-user consumer (optionally the product 102 may pass through multiple intermediary parties before ending up with the consumer).
  • end user inquirers 110 i.e., parties who eventually wind up in the possession of the product 102
  • intermediarry inquirers 112 , such as parties that serve as intermediaries in getting the product 102 from its manufacturer (e.g., UID originator 106 ), to the end-user consumer (optionally the product 102 may pass through multiple intermediary parties before ending up with the consumer).
  • each of the “end-user” inquirers 110 may be supplied with a corresponding communication-capable systems 110 a to 110 d
  • one or more of each of the “intermediary” inquirers 112 may be supplied with a corresponding communication-capable systems 112 a to 112 e , each for accessing the UID registration center 120 a UID database system 126 , (and optionally for accessing the UID from the product 102 UID component 104 ), and for performing various UID and product 102 related tasks.
  • the UID registration center 120 a components including the communication system 122 , the control system 124 , and the UID database system 126 , preferably provides one or more of the following features to various parties selected from parties 110 , 112 :
  • FIG. 4 An exemplary process for managing various party 110 , 112 UID registration database 126 accounts and corresponding product 102 records (such as for transferring product 102 ownership rights, etc.) is shown as a process 200 in FIG. 4 , and described further below in connection therewith.
  • Various exemplary embodiments of processes that may be implemented utilizing the inventive system infrastructure 100 are shown as processes 500 , 600 , 700 , and 800 in FIGS. 5, 6 , 7 , and 8 , respectively, and that are described by way of example in greater detail below in connection therewith.
  • the novel infrastructure 100 may be used for a variety of other customizable purposes and business processes involving product 102 sales between different parties, and/or involving other utilization of the product 102 UID and product information 102 a for verification and/or transfer of product 102 physical possession or ownership rights. It should also be noted that the inventive infrastructure 100 is very flexible, and in one embodiment of the present invention, may advantageously even be used in connection with product 102 having UIDs, but lacking UID components 104 for electronically storing the UIDs (such as products having UIDs inscribed on, or inside them, etc.).
  • an E-commerce party such as an online auction company, or an e-Commerce site usable by individual independent sellers
  • the E-commerce party may then verify the information associated with the UID that is stored in the corresponding UID registration center database system product 102 record, matches the information being provided by the seller for the product 102 in the proposed sales posting.
  • the E-commerce party may utilize its own dedicated UID registration center 120 b , specifically for its needs.
  • This exemplary utilization of the novel infrastructure 100 is thus advantageous in greatly reducing not only e-commerce related fraud, but also in reducing the liability that E-commerce vendors currently carry to various product manufacturers for allowing (or for failing to stop) the sale of counterfeit products through their websites.
  • FIG. 4 an exemplary embodiment of an implementation process 200 of user accounts and UID registration center 120 a database system 126 records (referred to herein as “files” by way of example only) in conjunction with utilization of the inventive system infrastructure 100 of FIG. 3 , is shown.
  • the process 200 that the registration center 120 a (through its control system 124 ) enables processing and transferring of various electronic product 102 files between different accounts, created in the UID database system 126 , for various authorized parties (i.e., manufacturers (e.g., UID originators 106 ), distributors, stores, and consumers).
  • These account include a manufacturer A account 410 , a manufacturer B account 420 , a distributor account 430 , a store account 440 , a consumer X account 450 , and a consumer Y account 460 , all of which are opened and configured by, or for, the corresponding parties through the control system 124 , and that are stored in the database 126 .
  • Each account contains may contain one or more many product files, with each file containing product information corresponding to a unique specific product with an UID previously assigned thereto.
  • the store account 440 is shown having a product A 1 file 441 , a product B 2 file 442 , and a product D 1 file 443 .
  • Each file contains corresponding product information such as the product's UID, verifier, product name, brand name, etc.
  • the manufacturer A account 410 transfers product A 1 file 411 and A 3 file 413 to the distributor account 430 when the products A 1 , A 3 are sold to the distributor.
  • the manufacturer A account 410 still retains product A 2 file 412 which remains in stock.
  • the manufacturer B account 420 can transfer a product B 2 file 422 to the distributor account 430 when the product B 2 is sold to the distributor.
  • the manufacturer B account 420 still retains product B 1 file 421 and product B 3 file 423 which remain in stock.
  • the distributor can thereafter transfer product A 1 file 431 , and product B 2 file 433 , to the store account 440 when the products A 1 , B 2 are sold to the store with the store account 440 .
  • the distributor account 430 still retains product A 3 file 432 which remains in stock.
  • the store through its store account 440 , can transfer the product A 1 file 441 to the consumer X account 450 , when the product A 1 is sold to consumer X with the account 450 , and can transfer product B 2 file 442 , and product D 1 file 443 , to the consumer Y account 460 , when the products B 2 , D 1 are sold to consumer Y with the account 460 .
  • the consumer Y can later use their account 460 to transfer product D 1 file 461 to the consumer X account 450 , when the product D 1 is sold to consumer X with the account 450 .
  • the consumer Y account is shown as having product B 2 file 462 and a product E 6 file 463 , which correspond to products B 2 and 6 that still have not been sold yet.
  • the consumer X account 450 is shown as having the product A 1 file 451 , the product D 1 file 452 and a product C 5 file 453 which are products that are in the possession of consumer X.
  • UID originator e.g., UID originator 106 , a product 102 manufacturer, etc.
  • UID registration center 120 a account set-up, configuration, and/or utilization
  • the process 500 provides one contemplated representation of the process of a manufacturer (or other UID originator 106 ) creating UIDs which are then stored in UID components 10 , 10 a , 50 , 50 a (of FIGS. 1A to 2 B) or in UID component 104 of FIG.
  • the UID originator 106 logs into their own pre-existing account at a UID registration center 120 a at step 510 .
  • the UID originator account preferably contains at least one product file, each containing product-related information such as UID, verifier, product name, brand name etc.
  • the UID originator decides whether to use an existing product file or to generate a new one.
  • the UID originator uses the old product file, they retrieve old product file by UID at step 512 from database and a table lists all of the old product files. Otherwise, the UID originator can create a new product file by UID at step 513 in a new product file table list. The UID originator then selects and opens the product file by submitting a proper UID at step 514 , that matches the desired product file in the table list. The UID originator edits existing data or enters new data in the product file at step 515 , such as a verifier, product name, brand name, model number, dates etc. The UID originator then stores the altered/new data into the product file associated with the UID in the UID database system 126 at step 516 .
  • the UID is then electronically stored in the product UID component (such as components 10 , 10 a , 50 , 50 a , 104 of FIGS. 1A-3 ), and provides verifier (e.g. by printing a slip with verifier info) at step 517 , which may be packed with the product being shipped.
  • the UID originator determines whether the buyer has an account in the UID database system 126 , at step 519 . If the buyer has an account, the UID originator then transfers the product file to the buyer's account by reassigning the product UID to the buyer's account at step 521 . Otherwise, the UID originator activates the verifier linked to the product UID being sold at step 520 , to enable buyer (e.g., consumer) registration.
  • FIG. 6 an exemplary embodiment of a product sales intermediary (distributor, store, e-commerce seller, etc.) UID registration center 120 a account set-up, configuration, and/or utilization, is shown as a process 600 , that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3 .
  • the process 600 by way of example provides one contemplated representation of a process of an intermediary party 112 (of FIG. 3 ), receiving or retrieving a UID database system 126 product file, and transferring it to a buyer account in the UID database system 126 of the UID registration center 120 a.
  • the intermediary party 112 logs in at the UID registration center 120 a at step 610 , and accesses the intermediary party 112 's own pre-existing account.
  • the intermediary party 112 decides whether to use an existing product file or to generate a new one at step 611 . If the intermediary party 112 uses the old product file, then the old product file is retrieved at step 612 from the UID database system 126 by submitting the UID thereto, or selected from a table lists all of pre-existing product files. Otherwise, the product file is received from a product seller through receipt and submission of UID at step 613 (where for example multiple product UIDs and product files may be received through a transfer-in product files table list).
  • the intermediary party 112 selects and opens the product file by submitting the corresponding UID at step 614 , present in the table list of the account's product files.
  • Product data is updated in product file at step 615 , such as the owner info, e-mail address, lost, stolen, etc.
  • the data is stored into product file associated with UID in the UID database system 126 at step 616 .
  • the intermediary party 112 verifies whether the buyer has an active UID database system 126 account in the UID registration center 120 a at step 618 . If the buyer has the account, the intermediary party 112 then transfers the product file to the buyer account by use of UID at step 620 . Otherwise, the intermediary party 112 activates the verifier associated with the UID at step 619 for buyer (e.g., consumer) registration.
  • FIG. 7 an exemplary embodiment of a process for consumer UID registration center 120 a account set-up, configuration, and/or utilization is shown as a process 700 , that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3 .
  • the process 700 provides one contemplated representation of the process of a consumer creating an account, receiving or retrieving a UID registration center 120 a UID database system 126 product file, and transferring it to another buyer account in the UID database system 126 of the UID registration center 120 a.
  • the process determines whether or not the consumer already has an account in the UID database system 126 . If the consumer does not have an account, an account is created at step 713 and the product UID and corresponding verifier (received by consumer from the party previously selling the product to them) is entered at step 716 .
  • the product file is retrieved (through use of UID) from the UID database system 126 , and opened at step 719 , so that product file data can be updated or changed in the product file at step 720 (such as changing the owner's name, e-mail address, etc.)
  • the consumer logs into the account at step 711 and decides whether or not to create a new product file at step 714 . If a new product file is not to be created (e.g., the product file is already in the consumer account), the consumer just select and opens the product file by use of UID from a product files table at step 717 , and conducts data management in the product file at step 720 , such as marking the product as status as being lost, stolen, etc.
  • the consumer selects whether the product file was transferred in from the seller at step 715 . If the product file is not transferred in, then the consumer enters the UID and verifier at step 716 to retrieve and open the product file by UID from database at step 719 , and updates the data in the product file at step 720 . If the product file is transferred in, then the consumer selects and opens the product file by use of the UID from a transfer product files list at step 718 , and updates the data in the product file at step 720 . After the product data is updated in the product file at step 720 , then the updated data is stored in the product file associated with the UID at step 721 . If the consumer later desires to resell the product at a later step 722 , the product file is transferred to the new buyer account by use of UID at step 723 .
  • FIG. 8 an exemplary embodiment of a process for a third party (law enforcement, finder of a lost or misplaced product, miscellaneous inquirer, etc.) UID registration center 120 a account set-up, configuration, and/or utilization, is shown as a process 800 , that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3 .
  • the process 800 by way of example provides one contemplated representation of the process of an end-user party 110 such as a product finder, law enforcement personnel, etc., who wants to verify product information in the UID database system 126 of the UID registration center 120 a.
  • the inquirer can just access the UID registration center 120 a at step 810 and read or scan the UID from the product at step 811 . They may then enter UID and submit it to the UID registration center 120 a at step 812 .
  • the UID control system 124 will then search for the corresponding product file, by use UID, in the UID database system 126 , at step 813 .
  • the process 800 determines if the search is successful. If the search is not successful, then the process 800 shows the input UID as being a wrong or a counterfeit entry at step 815 . If the search is successful, then the process 800 shows the product owner information (and optionally additional product information) at step 816 . If there is determination of a need to contact the owner (such as the product status showing up as being “lost” or “stolen”) at step 817 , then the legal owner of the product is contacted at step 818 .

Abstract

The system and method of the present invention provide integrated or embedded components, for electronic (or other) products, each operable to securely store and selectively provide access to, a unique ID (UID) previously assigned to its corresponding specific product, where the UID of each product is registered with one or more particular UID registration centers over at least one communication network, and associated with one or more data records stored in a corresponding database file at the particular UID registration center, the data records being inclusive of information related to the product, the product purchase history, current ownership, etch, and wherein one or more authorized parties may subsequently advantageously utilize at least one UID (and optionally a verifier) to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item related to the one or more corresponding registered products in their UID registration center database file. Also provided is an optimized process for verifiable transfer of ownership rights between a product's authorized owner and intended recipient, the transfer process being implemented over at least one communication network with graphical user interfaces provided for each party, where the transfer of ownership rights involves association of the product's UID with the receiving party's data record and confirming ownership transfer, and optional transfer of additional product-related information from the former product owner to the current recipient.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present patent application claims priority from the U.S. Provisional Patent Application of Yu Yung Choi entitled “METHOD AND SYSTEM FOR REGISTERING AND VERIFYING THE ELECTRONIC PRODUCT ON THE INTERNET” (Ser. No. 60/991,759), fled on Dec. 3, 2007.
  • FIELD OF THE INVENTION
  • The present invention relates to a system and method for registration of electronic products each having a unique identification code pre-assigned thereto with a centralized registration center, and subsequently utilizing at least one unique identification code to obtain one or more information items related to each registered product from the registration center, and more particularly to a system and method for streamlined registration, with one or more registration centers over at least one communication network, of electronic products each having a unique identification code pre-assigned thereto that is associated with one or more data records stored in a corresponding file at a predetermined registration center, and later utilizing at least one unique identification code to access, verify, edit, transfer, transmit, and otherwise manage at least one information item related to each registered product in its corresponding registration center data record.
  • BACKGROUND OF THE INVENTION
  • In the past several decades, there has been an unprecedented and ever-accelerating growth in availability and sheer quantity and variety of increasingly complex and popular technological items, especially with respect to electronic products and other products ranging from mobile telephones, to media storage and playback products, to personal digital assistants (PDAs), to portable and other types of computers, and so on. However, this course of events has brought about a number of significant and escalating challenges across a wide spectrum of circumstances.
  • Because of the rapid advances in technological developments, many electronic products are constantly replaced with newer models in relatively short product cycles (some measured in months), which, coupled with the desire of the some consumers to have the “latest and greatest” and the goals of other consumers to find “bargains”, lead to a proliferation of a number of secondary markets for pre-owned products.
  • These markets are quite enormous in scope, and are bolstered by the access to a vast worldwide customer base through popular online auction sites and ready availability of easy to use and inexpensive person-o-person sales facilitators (such as local buy-sell online listings). However, in all types of aftermarket sales, there is an enormous problem with fraud (such as an online auction seller misrepresenting that they actually have the offered electronic product in hand, or that they are in fact the legitimate owner of the product), counterfeiting of expensive products, misrepresentations about item repair histories, ownership records, warranties, age, and so on.
  • It should also be noted that because many electronic products are in consistent demand, and with quite a few types of these products being expensive, they are often regrets for theft or other misappropriation, or otherwise figure in various other types of illegal activities as was noted above (such as fraud, counterfeiting, etc.). In many cases, even if stolen or otherwise misplaced items are recovered by law enforcement, it is very difficult, if not impossible to determine and/or verify ownership.
  • In addition, product manufacturers rely on establishing, developing and growing a loyal customer base and are always interested in gathering information from purchasers/owners of their products. Most often, this information is gathered though voluntary registration of the products with the manufacturer by their users/owners, for which incentives are often offered (or penalties established for failure to register—such as loss of warranty). Because many users never bother to register their products/products, manufacturer are always looking for incentives to encourage registrations.
  • Moreover, many product purchasers/users often alter or otherwise misrepresent product purchase information by registering it long after the original purchase date in an effort to extend the effective coverage period of product warranty. Paper receipts issued by most product vendors may be easily forged or otherwise altered. This results in significant losses to manufacturers.
  • There are a number of reasons why the above challenges have remained largely unmet these reasons include, but are not limited to, at least one of the following
      • (1) the difficulty in obtaining certain specific information about each particular unique electronic product (authenticity, legal status (whether the product is stolen, etc.), purchase records; ownership records and history, warranty/repair history, etch)—hereinafter the “PRODUCT RECORD”,
      • (2) the difficulty in linking the PRODUCT RECORD to its corresponding electronic product and in maintaining the link over time, and
      • (3) the difficulty in obtaining, verifying, tracking, and otherwise managing PRODUCT RECORDs.
  • The above-noted difficulties are not surprising, due to the fact that for decades, the only manner in which each particular electronic product was through its serial number assigned by the product manufacturer. A product serial number is typically printed on, engraved on, or most often otherwise attached to an outer surface of the product (such as printed on a sticker or metal or plastic tape glued to the device) In some cases, serial numbers are provided on an inner surface of the device, such as inside its housings under a removable battery, etc.) As a result, in the vast majority of cases, serial numbers are quite easy to remove, obscure, or alter. Moreover, because each product manufacturer provides its own serial numbers using its own numbering scheme, most often without regard for serial number nomenclature of other manufacturers, in certain cases, serial numbers for different products from different manufacturers may be identical or confusingly similar to one another. In view of the sheer and ever-growing quantity of available electronic products, this occurrence continues to become increasingly more frequent. Thus, currently, no serial number can ever really be assured of being “unique”.
  • In recent years certain electronic products have been introduced that store serial numbers in digital memory in addition to, or in lieu of, those numbers being physically provided on the device. In cases where serial numbers are only provided in electronic form, the numbers are not visibly displayed to product users for inspection, but are only capable of being retrieved through use of external electronic devices (such as computers) utilizing specially configured software (e.g., typically provided by the manufacturer to authorized personnel).
  • For the above reasons, product serial numbers were exclusively utilized by the respective product manufacturers, and/or by repair/service providers, for warranty activation and administration, product update and recall notifications, and in connection with the provision of product configuration maintenance/repair services. Primary and aftermarket consumers, law enforcement personnel, product users, and other inquiring parties were not able to use serial numbers to any significant extent, especially because certain potentially very useful information was simply not available in connection with the serial numbers.
  • In the above-mentioned cases, where serial numbers are digitally stored in certain electronic products, significant problems can arise in connection with unauthorized manipulation thereof. By way of example, each mobile telephone includes an International Mobile Equipment Identity (IMEI) number stored in its memory, which can be viewed on the phone display screen in response to certain commands. However, on many mobile telephones, it is possible to alter the IMEI number utilizing a computer or equivalent device equipped with special software configured for that purpose, whether by the manufacturer or, more typically, by an unauthorized third party. Even a cursory Internet search, will readily reveal dozens of “hacking” solutions for modifying the IMEI number of most mobile telephones available on the market.
  • Because the IMEI number is used by the GSM (Global System for Mobile communications) network to identify valid mobile devices, it can therefore be used to stop a stolen phone from accessing the network, fraudulent alteration thereof may enable a perpetrator to use a stolen or otherwise unlawfully obtained mobile telephone with an altered IMEI number, to misappropriate communication and/or data services. It should also be noted that the IMEI number is most often only used to identify a specific mobile telephone, and is not in any way linked to, or associated with, a mobile service subscriber using the telephone.
  • Certain attempts to address the numerous challenges above have been made, but none have achieved any measurable commercial success, and none have gained any significant degree of widespread implementation By way of example, U.S. Pat. No. 6,259,367 and U.S. Pat. No. 7,222,791 have proposed utilizing bar code labels, RFID tags, and/or magnetic tags affixed to various products, in conjunction with appropriate compatible “reader devices” and other system component, for product identification, verification, and related product information management. However, these solutions still suffer from significant disadvantages of the previously known product information gathering and management approaches. For example, in each case, the data-containing, magnetic, and/or electronic labels and/or tags are easy to remove, alter, or erase by physical action. Furthermore, none of the suggested solutions address the challenge of ensuring the implementation and use of truly unique “serial numbers” or equivalents across different manufacturers and/or products.
  • Other solutions have been proposed that focus on tracking ownership, and verifying the authenticity, of certain products and valuable items (such as artwork). However, all of these solutions require modification of the
  • It would thus be desirable to provide an electronic product-related information registration, verification, and management system and method by providing electronic products with a unique ID (“UID”) assigned to each product and stored in an integrated or embedded product component in such a manner as to (1) make the UID readily available to an inquirer, and (2) make the UID virtually impossible to remove or change without destroying or seriously damaging its corresponding product, and to provide at least one registration center operable to store and enable conditional access to, at least one information record linked to each product through its UID, such that the at least one information record may be advantageously accessed and/or managed by at least one authorized inquirer through use of the UID.
  • It would also be desirable to provide a system and method for ensuring that the UIDs assigned to various electronic products are not duplicated, regardless of different product manufacturers. It would further be desirable to provide an embedded or integrated UID component for electronic product operable for at least one of: (1) selective activation in response to one or more predetermined criteria (e.g., an authorized inquirer request, etc.), (2) display of the UID to an inquirer, for example by use of a product's display component, (3) proximity-limited transmission of the UID from the component to a preconfigured UID receiver, (4) wireless transmission (preferably secure) of the UID from the component to a an authorized receiving system, (5) transmission (preferably secure) of the UID through a physical electronic connection to an authorized requesting component or system.
  • It would additionally be desirable to provide an electronic product-related information registration, verification, and management system and method for electronic products each having a UID assigned thereto and securely stored therein in an integrated and/or embedded component thereof, that comprises at least one UID registration center, each having a communication system operable to receive UID and other information, over at least one communication network, a control system, and a UID database system that comprises a plurality of data records each linked to a particular UID stored in a corresponding UID registration center database file, such that at least one authorized inquirer is able to utilize a particular UID (preferably in conjunction with provision of a verifier to verify authorization) to access, verify, edit, transfer, transmit, and otherwise manage at least one information item related to each registered product in its corresponding UID registration center database file.
  • It would also be desirable to provide a system and method for ensuring that the integrated/embedded UID components (and the corresponding UIDs) assigned to various electronic products, are configured for use in conjunction with various conventional and future shipping, storage, inventory, tracking, etc. systems.
  • It would moreover be desirable to provide a system and method for electronic product information registration, verification and management for use in conjunction with electronic products supplied with UIDs, in which at least one UID registration center database further comprises user accounts for parties including, but not limited to, at least one of the following: product manufacturers, product distributors, retail stores, e-commerce stores, consumers, etc., where each account is associated with one or more UIDs that each corresponds to its UID registration center database file (as described above).
  • It would furthermore be desirable to provide a system and method for UID-based electronic product information registration, verification and management in which, in conjunction with creation of a UID registration center file for a particular electronic product (i.e., during electronic product UID registration), the registrant is provided with at least one verifier, each operable to at least one of: (1) ensure that subsequently only an authorized party may access the file by supplying a provided verifier to the registration center control system, (2) ensure that prior to activation by an electronic product seller, cannot be used to access the UID registration center file to guard against theft, loss, or other misappropriation of the corresponding electronic product, during transit from the seller to a buyer, and (3) when provided for a product manufacturer, ensure that the verifier is associated with each particular product UID and stored in the corresponding UID registration center file linked to the manufacturer's user account, such that the verifier is provided to a purchaser of the particular electronic product to facilitate ready registration thereof with the UID registration center.
  • It would additionally be desirable to enable a product manufacturer with an account at the UID registration center to automatically transmit and enter, at least one product information item associated with each particular product's UID, into that product's corresponding UID registration center database file, with the at least one product information item including but not being limited to at least one of the following: manufacturer name, contact information, product brand name, model name/number, production date, warranty information, technical support information, and so on.
  • It would likewise be additionally be desirable to enable an electronic product sales intermediary party having an account at the UID registration center (e.g., distributor, store, aftermarket seller, etc.), to add product historical information to a particular registered product's UID registration center database file, including, but not limited to, at least one of the following: name/contact information of distributor, name/contact information of store, purchase date, return date, and service/warranty claims, status (lost, stolen, returned to manufacturer, reconditioned, etc.), with each information item being optionally time-stamped. It would also be desirable, to selectively ensure that all, or a predetermined portion, of product historical information stored in the UID registration center database file, is prevented from being edited or deleted.
  • It would furthermore be additionally be desirable to enable a consumer (or another end-user party), a distributors a store, an aftermarket seller, or another party having an account at the UID registration center, to add/update/edit certain product information to a particular registered product's UID registration center database file, including, but not limited to, at least one of the following: name/contact information of owner, name/contact information of store, purchase date, return date, service/warranty claims, status (lost, stolen, returned to store or manufacturer, reconditioned, etc.), with each information item being optionally time-stamped. It would also be desirable, to enable the consumer selling a particular electronic product to a buyer, to transfer the UID registration center database file corresponding to the UID of the product being sold, to the buyer, such that the buyer is able to access the UID registration center database file and link the file to their existing (or newly created) account.
  • It would moreover be desirable to provide an additional access platform to enable other inquiring parties to connect to at least one UID registration center, seeking to verify particular product information through the use of UIDs for various purposes (such as to enable law enforcement officers to determine the status (stolen, etc.) of a recovered electronic products and to locate the owner of a recovered stolen product, or to enable a person who finds a lost product, to contact its owner and return it).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the drawings, wherein like reference characters denote corresponding or similar elements throughout the various figures:
  • FIG. 1A is a schematic diagram of a first exemplary embodiment of a novel component, integrated into a particular electronic product, operable, in accordance with the present invention, to securely store, protect, and, in response to an authorized inquiry thereto, provide a unique ID (UID) previously assigned to the particular electronic product;
  • FIG. 1B is a schematic diagram of a first exemplary alternate embodiment of the inventive UID component of FIG. 1A, implemented by way of example, as an integrated circuit (IC) comprising corresponding sub-components;
  • FIG. 2A is a schematic diagram of a second exemplary embodiment of a novel component, embedded into a particular product, operable, in accordance with the present invention, to secure store, protect, and in response to an authorized inquiry thereto, selectively provide, in a passive or an active manner, a unique ID (UID) previously assigned to the particular product, and that may also be selectively deactivated and/or activated by the user thereof;
  • FIG. 2B is a schematic diagram of a first exemplary alternate embodiment of the inventive UID component of FIG. 2A, implemented by way of example, as an UID component that may be selectively activated and/or deactivated by a user, and that may be further selectively operable to transmit a UID in a wireless manner whether through contact or proximity with an UID reading device, or otherwise.
  • FIG. 3 is a schematic diagram of an exemplary embodiment of an infrastructure of the inventive product information registration, verification and management system that incorporates at least one UID registration center, and that is usable by various parties having accounts therewith;
  • FIG. 4 is a schematic diagram of an exemplary embodiment of an implementation of user accounts and UID registration center files in conjunction with utilization of the inventive system infrastructure of FIG. 3;
  • FIG. 5 is a process flow diagram of an exemplary embodiment of a product manufacturer UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4;
  • FIG. 6 is a process flow diagram of an exemplary embodiment of a product sales intermediary UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4;
  • FIG. 7 is a process flow diagram of an exemplary embodiment of a product consumer UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4; and
  • FIG. 8 is a process flow diagram of an exemplary embodiment of a third party (law enforcement, misc. inquirer) UID registration center account set-up, configuration, and/or utilization process that may be implemented in, and utilized in conjunction with, the inventive system infrastructure of FIG. 4.
  • SUMMARY OF THE INVENTION
  • The system and method of the present invention address and resolve all of the disadvantages of the previously known relevant solutions by advantageously providing integrated or embedded components, for electronic (or other) products, each operable to securely store and selectively provide access to, a unique ID (“UID”) previously assigned to its corresponding specific product, where the UID of each product is registered with one or more particular UID registration centers over at least one communication network, and associated with one or more data records stored in a corresponding database file at the particular UID registration center, the data records being inclusive of information related to the product, the product purchase history, current ownership, etc., and wherein one or more authorized parties may subsequently advantageously utilize at least one UID (and optionally a verifier) to access, verify, edit, transfer, transmit, and/or otherwise manage at least one information item related to the one or more corresponding registered products in their UID registration center database file.
  • In addition, the inventive system and method advantageously provide an optimized process for verifiable transfer of ownership rights between a product's authorized owner and intended recipient, the transfer process being implemented over at least one communication network with graphical user interfaces provided for each party, where the transfer of ownership rights involves association of the product's UID with the receiving party's data record and confirming ownership transfer, and optional transfer of additional product-related information from the former product owner to the current recipient.
  • In one of its exemplary embodiments, the novel electronic product-related information registration, verification, and management system and method provides electronic (or other) products with a unique ID (“UID”) assigned to each product and stored in an integrated or embedded product component in such a manner as to: (1) make the UID readily available to a (preferably authorized) inquirer, and (2) make the UID virtually impossible to remove or change without destroying or seriously damaging its corresponding product, and further comprises least one registration center operable to store and enable conditional access to, at least one information record linked to each product through its UID, such that the at least one information record may be advantageously accessed and/or managed by at least one authorized inquirer through use of the UID.
  • In another exemplary embodiment thereof, the inventive system and method ensure that the UIDs assigned to various electronic product are not duplicated, regardless of different product manufacturers, and provide an integrated or embedded UID component for electronic (or other) products operable for at least one of.
      • (1) selective activation in response to one or more predetermined criteria (e.g., an authorized inquirer request, etc.),
      • (2) display of the UID to an inquirer, for example by use of a product's display component,
      • (3) proximity-limited transmission of the UID from the component to a preconfigured UID receiver,
      • (4) wireless transmission (preferably secure) of the UID from the component to a an authorized receiving system, and
      • (5) transmission (preferably secure) of the UID through a physical electronic connection to an authorized requesting component or system.
  • In another of its exemplary embodiments, the inventive electronic product-related information registration, verification, and management system and method is provided for electronic products each having a UID assigned thereto and securely stored therein in an integrated and/or embedded component thereof, that comprises at least one UID registration center, each having a communication system operable to receive UID and other information, over at least one communication network, a control system, and a UID database system that comprises a plurality of data records each linked t a particular UID stored in a corresponding UID registration center database file, such that at least one authorized inquirer is able to utilize a particular UID (preferably in conjunction with provision of a verifier to verify authorization) to access, verify, edit, transfer, transmit, and otherwise manage at least one information item related to each registered product in its corresponding UID registration center database file. The inventive system and method also advantageously ensure that the integrated/embedded UID components (and the corresponding UIDs) assigned to various electronic and other products, are configured for use in conjunction with various conventional and future shipping, storage, inventory, tracking, etc. systems.
  • In yet another embodiment of the present invention, a novel system and method for electronic product information registration, verification and management for use in conjunction with electronic products supplied with UIDs, is provided with an infrastructure in which at least one UID registration center database further comprises user accounts for parties including, but not limited to, at least one of the following: product manufacturers, product distributors, retail stores, e-commerce stores, consumers, etc., where each account is associated with one or more UIDs that each corresponds to its UID registration center database file (as described above).
  • In an additional exemplary embodiment of the present invention, a novel system and method is provided for UID-based electronic product information registration, verification and management, in which, in conjunction with creation of a UID registration center file for a particular electronic product (i.e., during electronic product UID registration), the registrant is provided with at least one verifier, each operable to at least one of:
      • (1) ensure that subsequently only an authorized party may access the file by supplying a provided verifier to the registration center control system,
      • (2) ensure that prior to activation by an electronic product seller, cannot be used to access the UID registration center file to guard against theft, loss, or other misappropriation of the corresponding electronic product, during transit from the seller to a buyer, and
      • (3) when provided for a product manufacturers ensure that the verifier is associated with each particular product UID and stored in the corresponding UID registration center file linked to the manufacturer's user account such that the verifier is provided to a purchaser of the particular electronic product to facilitate ready registration thereof with the UID registration center.
  • Advantageously, the various above-described exemplary embodiments of the inventive system and method, may include one or more of the following exemplary embodiments of UID registration center account features:
      • (1) Provision of a product manufacturer with an account at the UID registration center, that may be selectively utilized to automatically transmit and enter, at least one product information item associated with each particular product's UID, into that product's corresponding UID registration center database files with the at least one product information item including, but not being limited to at least one of the following: manufacturer names contact information, product brand name, model name/number, production date, warranty information, technical support information, and so on;
      • (2) Enabling an electronic (or other) product sales intermediary party having an account at the UID registration center (e.g., distributor, store, aftermarket seller, etch), to add product historical information to a particular registered product's UID registration center database file, including, but not limited to, at least one of the following: name/contact information of distributor, name/contact information of store, purchase date, return date, and service/warranty claims, status (lost, stolen, returned to manufacturer, reconditioned, etc.), with each information item being optionally time-stamped. In a preferred embodiment of the present invention, the novel system selectively ensures that all, or, optionally, a predetermined portion, of product historical information stored in the UID registration center database file is prevented from being edited or deleted;
      • (3) Enabling a consumer (or another end-user party), a distributor, a store, an after-market seller, or another party having an account at the UID registration center, to add/update/edit certain product information to a particular registered product's UID registration center database file, including, but not limited to, at least one of the following: name/contact information of owner, name/contact information of store, purchase date, return date, service/warranty claims, status (lost, stolen, returned to store or manufacturer, reconditioned, etc.), with each information item being optionally time-stamped;
      • (4) Enabling a consumer selling a particular electronic (or other) product to a buyer, to transfer the UID registration center database file, corresponding to the UID of the product being sold, to the buyer, such that the buyer is able to access the UID registration center database file, and link the file to their existing (or newly created account); and
      • (5) Providing an additional access platform to enable other inquiring parties to connect to at least one UID registration center, seeking to verify particular product information through the use of UIDs for various purposes (such as to enable law enforcement officers to determine the status (stolen, etc.) of a recovered electronic product, and to locate the owner of a recovered stolen product, or to enable a person who finds a lost product, to contact its owner to make arrangements for a return thereof).
  • Other objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which reference should be made to the appended claims.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • The system and method of the present invention remedy the disadvantages of all previously known techniques, systems and methodologies relating to registration, verification, and management of information related to various goods, and particularly to electronic or other valuable products or devices.
  • In essence, in various embodiments thereof, the inventive system and method advantageously provide novel integrated or embedded components (or novel feature sets, implemented, for example, as hardwired functions or program instruction sets in multipurpose electronic systems or components), for electronic (or other) products, each such component operable to securely store and selectively provide access to, a unique ID (“UID”) previously assigned to its specific corresponding product, where the UID of each product is preferably registered with one or more particular UID registration center, over at least one communication network, and associated with one or more data records stored in a corresponding database file at the particular UID registration center, linked to the products UID. The product data records are preferably inclusive of various information items related to the product, that may include, but that are not limited to, one or more of the following:
      • technical and/or warranty information about the product itself,
      • product condition status (product servicing, and maintenance history, whether the product is reconditioned or refurbished, whether under current warranty, whether the product is “new old stock”, etc.),
      • product manufacturer information,
      • date/place of first purchase (e.g., store contact information),
      • the product's ownership history, inclusive of its current ownership, with current owner contact information, and
      • the status of the product (lost, stolen, etc.),
  • Advantageously, in accordance with various embodiments of the inventive system and method, after registration of product UIDs in conjunction with the creation and configuration of corresponding UID registration center database files, and population thereof with at least one relevant product data record, one or more authorized parties (such as the product owner (e.g., a consumer), the product manufacturer, a product sales intermediary(ies) (e.g., distributor, store, aftermarket seller) may subsequently advantageously utilize the product's UID (and optionally a verifier previously assigned thereto during registration or otherwise lawfully provided thereto (e.g., from the manufacturer, or from the product's seller during purchase thereof), to access, verify, edit, transfer, transmit, and/or to otherwise manage at least one data item in the UID registration center database file that corresponds to the proffered UID (and optionally that also corresponds to the predetermined verifier).
  • It should be noted that while the various exemplary embodiments of the inventive system and method are described with reference to “electronic products”, and/or to “devices”, it should be understood that the novel and advantageous inventive principles and techniques disclosed herein can be readily configured, adapted, and/or applied for use with any goods (whether electronic or not), that are capable of including and/or incorporating the inventive integrated, or an embedded, UID component (such as an embodiment of the inventive UID components of FIG. 1 or 2, described in greater detail below, as a matter of design choice, and without departing from the spirit of the present invention.
  • Advantageously unlike previously known means for uniquely identifying products, in accordance with the present invention, in a preferred embodiment thereof a product's UID is not changeable by anyone without causing damage to, or destroying the product in question. Alternately, the entire component containing the UID may be changed only by a party having authorized access to special equipment/tools/information available only to the product's manufacturer. Optionally, while the UID may be readable from the product (e.g., displayable either on the product itself (if the product has a screen), or through an appropriate device capable of reading and displaying the UIDs), the exact location of the UID in the product or in the product electronic circuitry (i.e., in which specific IC or register is the UID stored) may be kept secret and known only to the authorized party assigning the UID to the product (e.g., manufacturer, etc.). In an alternate embodiment of the invention, the UID may be unchangeable by anyone as noted above, except by the authorized party that originally assigned the UID to the product.
  • Referring now to FIG. 1A, a first exemplary embodiment of a novel product component configured for integration into a particular electronic (or other) product or device, is shown as an integrated UID component 10, being operable, in accordance with the present invention, to securely store, protect, and, in response to an authorized inquiry thereto, provide a unique ID (UID) previously assigned to the particular product. The UID component 10 includes a control component 16, a protected memory 14 for storing the UID (and optionally for storing other information), and an input/output system 20 configured for receiving signal 22 and sending out signals 24, 26. Optionally, the component 10 may be implemented in a housing 12.
  • Referring now to FIG. 1B, a first exemplary alternate embodiment of the inventive UID component 10 of FIG. 1A is shown as an UID component 10 a, implemented by way of example as an integrated circuit (IC) 12 a (or an equivalent component), comprising corresponding sub-components as described below. By way of example, the UID component 10 a is configured for preferable use with a product which comprises an integral display component operable to display the UID in response to an authorized request therefor, as described below The IC 12 a contains a CPU (central processing unit) 16 a, an OTP ROM 14 a for storing the UID, a flash ROM 18 a, a data SRAM 18 b, an LCD driver 20 a (for example for driving an LCD display component (not shown) of the product in which the component 10 a is installed), a serial I/O port 20 b, an I/O port-1 20 c, an I/O port-2 20 d, and a data bus 20 e.
  • When a request is made to display the UID on the products integrated display (not shown), this request is transmitted to the component 11 a from the product's input component (not shown, such as a keypad, button, touchscreen control, or equivalent, and arrives as a signal through I/O port-1 20 c, and then passes through the data bus 20 e into the CPU 16 a. The CPU 16 a operates in accordance with program instructions stored in the memory of Flash ROM 18 a, and has access to, and is capable of utilizing, the data SRAM 18 b. The CPU 16 a then retrieves the UID from OTP ROM 14 a, and processes the UID as data, thereafter sending it to the LCD Driver 20 a to output to the product display and to thus display the UID for verification or for other purpose.
  • A request for the UID may also be made to the UID component 10 a through data communication (for example such as request by the owner or other possessor of the product to transmit the UID to some other external (e.g., remote) system (ranging from a proximal reader to a centralized UID and product information database system), for example for the purposes of UID registration, UID verification, or for any other applicable purpose. In the case of such a data communication UID request, the applicable signal arrives through I/O port-2 20 d, and then passes through data bus 20 e into the CPU 16 a in accordance with the programming stored in the memory of Flash ROM 18 a, and in the data SRAM 18 b. The CPU 16 a then retrieves the UID stored in the OTP ROM 14 a, and, after processing, sends the UID as data through the data bus 20 e to the I/O port-2 20 d to the external (e.g., remote) system for the designated purpose (e.g., registration, verification, etc.).
  • The IC 12 a can be a microprocessor, a microcontroller, a chipset (northbridge, etc.), or equivalent solid state or other form of logic circuitry that is configured for storing and processing information. Because components such as the IC 12 a are present in abundance in virtually all electronic product, in one embodiment of the invention, the UID and the relevant program instructions for its storage, processing, retrieval, display and transmittal may be implemented in the existing components/circuitry of the product, without requiring any new components or without requiring physical modification of the product's electronics. Optionally, the specific location of the UID and the relevant program instructions related thereto, may be determined secretly by the originator of the UID (such as the product manufacturer). In an alternate embodiment of the invention, if the product does not possess the necessary components/circuitry to provide the above-described UID related functionality, the IC 12 a may be implemented as an additional component added to the product mainboard/motherboard, or equivalent, specifically for the purpose of providing the necessary UID-related functionality.
  • Regardless of the type of IC 12 a-related implementation, in a preferred embodiment of the invention, the UID cannot be changed by any means, and can only be disabled by damaging or destroying the product itself. Even if the IC 12 a associated with the UID is identified, any attempted UID change would require replacement of the IC 12 a, which would certainly damage the product.
  • Referring now to FIG. 2A, a second exemplary embodiment of a novel product component configured for embedding into a particular electronic (or other) product or device, is shown as an embedded UID component 50, being operable, in accordance with the present invention, to securely store, protect, and, in response to an authorized inquiry thereto, in a passive or an active manner, selectively provide and/or transmit and/or broadcast a unique ID (UID) previously assigned to the particular product. The UID component 50 includes an optional control component 58, a protected memory 54 for storing the UID, and a communication system 56 configured for receiving a signal 62 and sending out signals 64, 66. Optionally, the component 50 may be implemented in a housing 52 and may receive power, either from a self-contained power source 68 (such as a battery), or may receive external power 70, or both (together or in accordance with at least one power management protocol—e.g., the component 50 may utilize the power source 70 during normal use, but switch to the self-contained source 68 if the flow of power from the source 70 is disrupted, due to source 70 being depleted or damaged (essentially functioning as a failsafe or backup)). Alternately, the component 50 may be configured as a passive device that does not require its own source of power from operation, and that may be activated only in response to a sufficiently proximal corresponding compatible UID reading device. By way of example only, the UID component 50 may be implemented as a chip, circuitry, tag, etc., that is configured to utilize one or more of remote data reading/transmission technologies, including, but not limited to: active or as a passive RFID (or equivalent), Bluetooth™, Wi-Fi, RuBeet™, wireless data transmission (e.g., Bluetooth™, Wi-Fi, RuBeet™, Wireless USB, magnetic contact data transfer, various high speed cellular data transmission protocols (EDGE, etc.), infrared (IR), or through any wireless data reading/transmission technology equivalent to any of the above.
  • Because the UID component 50 is capable of transmitting the UID in a wireless manner, in view of security and privacy concerns, in another embodiment of the invention, the UID component 50 is optionally provided with a selectively operable switch 60, which may be advantageously used by an authorized party (e.g., by the owner of the corresponding product, by law enforcement, etc.) to deactivate, or to activate, the communication system 56 (which may be an antenna, other transmitter, etc.), as may be desired to either restrict, or to allow access to the UID from external requestors.
  • Alternately, the UID component 50 may simply serve as a modified alternate version of an integrated component 10 (or 10 a) of FIGS. 1A, (and 1B), respectively, essentially being implemented as the component 10 or component 10 a, except also being supplied with predetermined wireless data transmission functionality provided by communication system 56 (and optionally by switch component 60), selectively operable to wirelessly receive UID related instructions and to selectively wirelessly transmit the UID to a designated external recipient, in response to authorized requests. One alternate embodiment of the UID component 50, is shown in FIG. 2B and discussed in greater detail in connection therewith.
  • Referring now to FIG. 2B, a schematic diagram of a first exemplary alternate embodiment of the inventive UID component 50 of FIG. 2A, is shown as an UID component 50 a, implemented, by way of example only, as an active or as a passive RFID (or equivalent) device (such as a Bluetooth™, Wi-Fi, RuBee™, or equivalent device), indicated herein as “RFID” for the sale of convenience only. In one inventive embodiment hereof, the UID component 50 a may be implemented in a remotely readable tag 52 a (such as an RFID or RuBee tag, or equivalent), which contains (or is connected to) a UID component 68 (such as the components 10, 10 a of FIGS. 1A, 1B), switch 60 a and antenna 56 a. In another inventive embodiment hereof, the UID component 50 a may be implemented as individual components spread through the product inclusive of the UID component 68 (such as an RFID chip, the components 10, 10 a of FIGS. 1A, 1B), switch 60 a and antenna 56 a.
  • Inside the UID component 68, there is an OTP ROM (or equivalent memory) for storing the UID, logic circuitry, and communications circuitry (such as described above in connection with FIGS. 1A and 1B). Using an RFID reader (or equivalent), the UID can be read from a predetermined (for example by the UID originator, by the product manufactures and/or by the user) distance (ranging from substantial contact with the product or component 50 a, to the outer range of the remote data transmission technology implemented in the component 50 a), making it convenient for tracking products incorporating the UID component 50 a, such as during transportation, storages etc thereof.
  • Also, a passive or self-powered version of the UID component 50 a may be used in a case when the product in which it is embedded runs out of power or is damaged such that the UID cannot be read through conventional means. As described above in connection with the UID component 50 of FIG. 2A, the UID component 52 a may optionally comprise an internal power source (e.g., depending on whether it is capable of passive, active, or semi-passive operational modes). Optionally, the UID component 50 a can use the power obtained from the product in which it is installed.
  • Advantageously, the switch 60 a, positioned between the antenna 56 a and the UID component 68, is provided for the product owner/operator to be able to control (by switching it on or off) remote reading/transmission functions of the UID device 50 a (e.g. limiting them to contact reading only), or to switch the external access to the UID component 68 on or off entirely. These features are advantageous for addressing security issues, such as consumer privacy concerns. Advantageously, in various embodiments of the invention, the UID component 50 a is embedded in the product, or is otherwise attached to the product (internally or externally), such as being inserted therein, being attached thereto, or implanted.
  • Referring now to FIG. 3, an exemplary embodiment of a novel infrastructure 100 of the inventive product information registration, verification and management system that incorporates at least one UID registration center, and that is usable by various parties having accounts therewith is shown. In accordance with the inventive infrastructure 100, an UID originator 106 (e.g., a party authorized to issue UIDs, such as a manufacturer, an industry authority or council, etc.), assigns a UID to a product 102 (such as an electronic device), a UID which is stored in the UID component 104 (such as any of the UID components 10, 10 a, 50, or 50 a (of FIGS. 1A to 2B)). The UID is pre-recorded by the ID originator 106 in a corresponding account, having multiple product-specific data records defined therein, stored at a UID registration center 120 a, in a UID database system 126, and managed by a control system 124 (such as one or more computer servers and accompanying software and infrastructure). The UID registration center 120 a also includes a communication system 122 operable to enable bidirectional communication with the UID originator 106 or with other parties systems (e.g., any of the systems 110, 112, or optionally even with the product 102). The UID registration center 120 a may be a single centralized entity, or it may include multiple communicating or independent entities (for example classified into different industries).
  • In one embodiment of the invention, multiple different UID originators 106 may work together, through a centralized UID registration center 120 a, to collaborate in the process of generating new UIDs, to ensure that each new UID assigned to any future product is truly unique across multiple UID originators 106, to prevent a situation in which different UID originators 106 in different industries may use the same UID for different products (e.g., to avoid a case where a UID assigned to a mobile phone of one manufacturer, may accidentally be the same as a UID assigned to a television set by another manufacturer).
  • In addition to its UID, the product 102 also includes a certain set of product information items associated therewith (product info 102 a) which may include, but which are not limited to: product 102 ownership rights information (e.g., name/contact information of owner, name/contact information of store selling product 102, purchase date, return date, and service/warranty claims, product 102 status (lost, stolen, returned to store or manufacturer, reconditioned, etc.), product 102 manufacturer information (name, contact information, product brand name, model name/number, production date, warranty information, technical support information, etc), with one or more of the information items 102 a being optionally time-stamped.
  • In accordance with the present invention, under various circumstances, one or more parties other than the UID originator 106 may be authorized to access the UID of the product 102 (whether from the product itself or from an appropriate product record in the UID database system 126), access, transfer, manage, and/or change all or part of the product information 102 a. These potential authorized parties may include, but are not limited to, one or more of the following: consumers, aftermarket consumers, law enforcement personnel, retail stores, E-Commerce vendors (such as on-line stores, auction websites, etc.), aftermarket sellers (through classified ads, auctions, etc.), or another inquirers (such as persons finding a lost or stolen product 102). Optionally, the various possible authorized parties may be generally categorized as being “end user” inquirers 110, i.e., parties who eventually wind up in the possession of the product 102, or “intermediary” inquirers 112, such as parties that serve as intermediaries in getting the product 102 from its manufacturer (e.g., UID originator 106), to the end-user consumer (optionally the product 102 may pass through multiple intermediary parties before ending up with the consumer).
  • While in one embodiment of the invention, various parties can use the product 102 itself it transmit its UID to the UID registration center 120 a, and/or to access the appropriate account and product data record(s) in the UID database system 126, through the communication network(s) 116, in another embodiment of the invention, one or more of each of the “end-user” inquirers 110 may be supplied with a corresponding communication-capable systems 110 a to 110 d, and one or more of each of the “intermediary” inquirers 112 may be supplied with a corresponding communication-capable systems 112 a to 112 e, each for accessing the UID registration center 120 a UID database system 126, (and optionally for accessing the UID from the product 102 UID component 104), and for performing various UID and product 102 related tasks.
  • The UID registration center 120 a components, including the communication system 122, the control system 124, and the UID database system 126, preferably provides one or more of the following features to various parties selected from parties 110, 112:
      • (1) Provision of the UID originator 106 with an account at the UID registration center 120 a, that may be selectively utilized to automatically transmit and enter, at least one product information item 102 a associated with each particular product 102 UID, into that product 102 corresponding UID registration center database 126 product 102 record. In a preferred embodiment of the present invention, the novel system selectively ensures that all, or, optionally, a predetermined portion, of product historical information stored in the UID registration center database 126 product 102 record is prevented from being edited or deleted;
      • (2) Enabling an electronic (or other) product intermediary party 112 having an account at the UID registration center 120 a (e.g., distributor, store, aftermarket seller, etc.), to add product 102 historical information to a particular registered product 102 UID registration center database 126 product 102 record;
      • (3) Enabling a consumer, or other “end-user” party 110, to establish an account at the UID registration center 120 a, which may then be used to add/update/edit certain product information 102 a to a particular registered product 102 UID registration center database 126 product 102 record;
      • (4) Enabling a seller selling a particular electronic (or other) product 102 to a buyers to transfer the UID registration center database 126 product 102 record, corresponding to the UID of the product 102 being sold, to the buyer, such that the buyer is able to access the UID registration center database 126 product 102 record, and link the product 102 record to their existing (or newly created account); and
      • (5) Providing an additional access platform to enable other inquiring authorized parties (from parties 110, 112) to connect to the UID registration center 120 a, seeking to verify particular product information 102 a, through the use of UIDs for various purposes (such as to enable law enforcement officers to determine the status (stolen, etc.) of a recovered U D-equipped product 102, and to locate the owner of a recovered stolen product 102, or to enable a person who finds a lost product 102, to contact its owner to make arrangements for a return thereof).
  • An exemplary process for managing various party 110, 112 UID registration database 126 accounts and corresponding product 102 records (such as for transferring product 102 ownership rights, etc.) is shown as a process 200 in FIG. 4, and described further below in connection therewith. Various exemplary embodiments of processes that may be implemented utilizing the inventive system infrastructure 100, are shown as processes 500, 600, 700, and 800 in FIGS. 5, 6, 7, and 8, respectively, and that are described by way of example in greater detail below in connection therewith.
  • Advantageously, the novel infrastructure 100 may be used for a variety of other customizable purposes and business processes involving product 102 sales between different parties, and/or involving other utilization of the product 102 UID and product information 102 a for verification and/or transfer of product 102 physical possession or ownership rights. It should also be noted that the inventive infrastructure 100 is very flexible, and in one embodiment of the present invention, may advantageously even be used in connection with product 102 having UIDs, but lacking UID components 104 for electronically storing the UIDs (such as products having UIDs inscribed on, or inside them, etc.).
  • By way of example of such a utilization of the novel infrastructure 100, an E-commerce party (such as an online auction company, or an e-Commerce site usable by individual independent sellers), may require that at least a portion of its sellers (e.g., those selling items over a certain price point), provide, to the E-commerce party's system 112 c, the UID of any product 102 the sellers want to post for sale, prior to the posting thereof, for verification of the seller's possession and/or ownership rights in the product 102. After each seller provides the UID of the product 102 to be posted for sale through the seller system 112 d, the E-commerce party may then verify the information associated with the UID that is stored in the corresponding UID registration center database system product 102 record, matches the information being provided by the seller for the product 102 in the proposed sales posting. Optionally, the E-commerce party may utilize its own dedicated UID registration center 120 b, specifically for its needs. Thus, information as to whether the product 102 being sold is actually in seller's possession, whether the product 102 had been lost or stolen, or whether the product 102 is authentic, may be readily verified. This exemplary utilization of the novel infrastructure 100 is thus advantageous in greatly reducing not only e-commerce related fraud, but also in reducing the liability that E-commerce vendors currently carry to various product manufacturers for allowing (or for failing to stop) the sale of counterfeit products through their websites.
  • Referring now to FIG. 4, an exemplary embodiment of an implementation process 200 of user accounts and UID registration center 120 a database system 126 records (referred to herein as “files” by way of example only) in conjunction with utilization of the inventive system infrastructure 100 of FIG. 3, is shown. The process 200 that the registration center 120 a (through its control system 124) enables processing and transferring of various electronic product 102 files between different accounts, created in the UID database system 126, for various authorized parties (i.e., manufacturers (e.g., UID originators 106), distributors, stores, and consumers). These account, by way of example, include a manufacturer A account 410, a manufacturer B account 420, a distributor account 430, a store account 440, a consumer X account 450, and a consumer Y account 460, all of which are opened and configured by, or for, the corresponding parties through the control system 124, and that are stored in the database 126. Each account contains may contain one or more many product files, with each file containing product information corresponding to a unique specific product with an UID previously assigned thereto. For example, the store account 440 is shown having a product A1 file 441, a product B2 file 442, and a product D1 file 443. Each file contains corresponding product information such as the product's UID, verifier, product name, brand name, etc.
  • In one operation of the process 200, the manufacturer A account 410 transfers product A1 file 411 and A3 file 413 to the distributor account 430 when the products A1, A3 are sold to the distributor. The manufacturer A account 410 still retains product A2 file 412 which remains in stock. The manufacturer B account 420 can transfer a product B2 file 422 to the distributor account 430 when the product B2 is sold to the distributor. The manufacturer B account 420 still retains product B1 file 421 and product B3 file 423 which remain in stock. The through its distributor account 430, the distributor can thereafter transfer product A1 file 431, and product B2 file 433, to the store account 440 when the products A1, B2 are sold to the store with the store account 440. The distributor account 430 still retains product A3 file 432 which remains in stock. The store, through its store account 440, can transfer the product A1 file 441 to the consumer X account 450, when the product A1 is sold to consumer X with the account 450, and can transfer product B2 file 442, and product D1 file 443, to the consumer Y account 460, when the products B2, D1 are sold to consumer Y with the account 460. The consumer Y can later use their account 460 to transfer product D1 file 461 to the consumer X account 450, when the product D1 is sold to consumer X with the account 450. The consumer Y account is shown as having product B2 file 462 and a product E6 file 463, which correspond to products B2 and 6 that still have not been sold yet. The consumer X account 450 is shown as having the product A1 file 451, the product D1 file 452 and a product C5 file 453 which are products that are in the possession of consumer X.
  • Referring now to FIG. 5, an exemplary embodiment of a process for enabling an UID originator (e.g., UID originator 106, a product 102 manufacturer, etc.) UID registration center 120 a account set-up, configuration, and/or utilization, is shown as a process 500, that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3. The process 500, by way of example, provides one contemplated representation of the process of a manufacturer (or other UID originator 106) creating UIDs which are then stored in UID components 10, 10 a, 50, 50 a (of FIGS. 1A to 2B) or in UID component 104 of FIG. 3, that would be incorporated in corresponding electronic (or other) products 102, and then transferring the UID and product-related information (e.g., at least one of: the ownership rights to the product, product information, manufacturer contact, etc.), to a corresponding product record (referred to herein as a “file” by way of example only) of a buyer account in the UID database system 126 of the UID registration center 120 a.
  • The UID originator 106 logs into their own pre-existing account at a UID registration center 120 a at step 510. The UID originator account preferably contains at least one product file, each containing product-related information such as UID, verifier, product name, brand name etc. At step 511 the UID originator decides whether to use an existing product file or to generate a new one.
  • If the UID originator uses the old product file, they retrieve old product file by UID at step 512 from database and a table lists all of the old product files. Otherwise, the UID originator can create a new product file by UID at step 513 in a new product file table list. The UID originator then selects and opens the product file by submitting a proper UID at step 514, that matches the desired product file in the table list. The UID originator edits existing data or enters new data in the product file at step 515, such as a verifier, product name, brand name, model number, dates etc. The UID originator then stores the altered/new data into the product file associated with the UID in the UID database system 126 at step 516. The UID is then electronically stored in the product UID component (such as components 10, 10 a, 50, 50 a, 104 of FIGS. 1A-3), and provides verifier (e.g. by printing a slip with verifier info) at step 517, which may be packed with the product being shipped. Once the product is sold at step 518, the UID originator determines whether the buyer has an account in the UID database system 126, at step 519. If the buyer has an account, the UID originator then transfers the product file to the buyer's account by reassigning the product UID to the buyer's account at step 521. Otherwise, the UID originator activates the verifier linked to the product UID being sold at step 520, to enable buyer (e.g., consumer) registration.
  • Referring now to FIG. 6, an exemplary embodiment of a product sales intermediary (distributor, store, e-commerce seller, etc.) UID registration center 120 a account set-up, configuration, and/or utilization, is shown as a process 600, that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3. The process 600 by way of example provides one contemplated representation of a process of an intermediary party 112 (of FIG. 3), receiving or retrieving a UID database system 126 product file, and transferring it to a buyer account in the UID database system 126 of the UID registration center 120 a.
  • The intermediary party 112 logs in at the UID registration center 120 a at step 610, and accesses the intermediary party 112's own pre-existing account. The intermediary party 112 decides whether to use an existing product file or to generate a new one at step 611. If the intermediary party 112 uses the old product file, then the old product file is retrieved at step 612 from the UID database system 126 by submitting the UID thereto, or selected from a table lists all of pre-existing product files. Otherwise, the product file is received from a product seller through receipt and submission of UID at step 613 (where for example multiple product UIDs and product files may be received through a transfer-in product files table list). Then the intermediary party 112 selects and opens the product file by submitting the corresponding UID at step 614, present in the table list of the account's product files. Product data is updated in product file at step 615, such as the owner info, e-mail address, lost, stolen, etc. Then the data is stored into product file associated with UID in the UID database system 126 at step 616. Once the product is sold, at step 617 the intermediary party 112 verifies whether the buyer has an active UID database system 126 account in the UID registration center 120 a at step 618. If the buyer has the account, the intermediary party 112 then transfers the product file to the buyer account by use of UID at step 620. Otherwise, the intermediary party 112 activates the verifier associated with the UID at step 619 for buyer (e.g., consumer) registration.
  • Referring now to FIG. 7, an exemplary embodiment of a process for consumer UID registration center 120 a account set-up, configuration, and/or utilization is shown as a process 700, that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3. The process 700, by way of example, provides one contemplated representation of the process of a consumer creating an account, receiving or retrieving a UID registration center 120 a UID database system 126 product file, and transferring it to another buyer account in the UID database system 126 of the UID registration center 120 a.
  • When the consumer purchases the product, they access the UID registration center 120 a at step 710. At step 712, the process determines whether or not the consumer already has an account in the UID database system 126. If the consumer does not have an account, an account is created at step 713 and the product UID and corresponding verifier (received by consumer from the party previously selling the product to them) is entered at step 716. Then, the product file is retrieved (through use of UID) from the UID database system 126, and opened at step 719, so that product file data can be updated or changed in the product file at step 720 (such as changing the owner's name, e-mail address, etc.) If the consumer has an account, then the consumer logs into the account at step 711 and decides whether or not to create a new product file at step 714. If a new product file is not to be created (e.g., the product file is already in the consumer account), the consumer just select and opens the product file by use of UID from a product files table at step 717, and conducts data management in the product file at step 720, such as marking the product as status as being lost, stolen, etc.
  • If a new product file is created, then the consumer selects whether the product file was transferred in from the seller at step 715. If the product file is not transferred in, then the consumer enters the UID and verifier at step 716 to retrieve and open the product file by UID from database at step 719, and updates the data in the product file at step 720. If the product file is transferred in, then the consumer selects and opens the product file by use of the UID from a transfer product files list at step 718, and updates the data in the product file at step 720. After the product data is updated in the product file at step 720, then the updated data is stored in the product file associated with the UID at step 721. If the consumer later desires to resell the product at a later step 722, the product file is transferred to the new buyer account by use of UID at step 723.
  • Referring now to FIG. 8, an exemplary embodiment of a process for a third party (law enforcement, finder of a lost or misplaced product, miscellaneous inquirer, etc.) UID registration center 120 a account set-up, configuration, and/or utilization, is shown as a process 800, that may be implemented in, and utilized in conjunction with, the inventive system infrastructure 100 of FIG. 3. The process 800, by way of example provides one contemplated representation of the process of an end-user party 110 such as a product finder, law enforcement personnel, etc., who wants to verify product information in the UID database system 126 of the UID registration center 120 a.
  • The inquirer can just access the UID registration center 120 a at step 810 and read or scan the UID from the product at step 811. They may then enter UID and submit it to the UID registration center 120 a at step 812. The UID control system 124 will then search for the corresponding product file, by use UID, in the UID database system 126, at step 813. At step 814, the process 800 determines if the search is successful. If the search is not successful, then the process 800 shows the input UID as being a wrong or a counterfeit entry at step 815. If the search is successful, then the process 800 shows the product owner information (and optionally additional product information) at step 816. If there is determination of a need to contact the owner (such as the product status showing up as being “lost” or “stolen”) at step 817, then the legal owner of the product is contacted at step 818.
  • Thus, while there have been shown and described and pointed out fundamental novel features of the inventive system and method as applied to preferred embodiments thereof, it will be understood that various omissions and substitutions and changes in the form and details of the products and methods illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto.

Claims (29)

1. A data processing system for selectively managing at least one information item related to the product comprising:
embedding means for electronically embedding a unique identification code, representative of a predefined product information item, provided by an originating authorized party, at a predefined location in at least a portion of the product, such that said unique identification code is not changeable without damaging or destroying the product's functionality; and
output means, selectively operable by at least one authorized party, to retrieve said unique identification code from said predefined location, and to output said unique identification code thereto, for at least one predefined purpose.
2. The data processing system of claim 1, wherein said at least one authorized party comprises at least one of: a product manufacturer, a product distributor, a store selling the product, an owner of the product, an intended recipient of ownership rights to the product, law enforcement personnel, and a party finding a product that has been previously lost or stolen.
3. The data processing system of claim 1, wherein said output means further comprise at least one of:
a display component, incorporated in the product, operable to visually display information, and selectively operable to display said unique identification code to said at least one authorized party in response to a predefined request therefor;
an audio output component, incorporated in the product operable to audibly output information, and selectively operable to audibly output said unique identification code to said at least one authorized party, in response to said predefined request therefor; and
an unique identification code reading systems separate from the product, selectively operable, by said at least one authorized party, to selectively retrieve said unique identification code from said embedding means and to output said unique identification code to said at least one authorized party, in response to a predefined request therefore by at least one of: visual output, or audio output.
4. The data processing system of claim 1, wherein said embedding means further comprise one of:
an electronic product component operable to perform at least one predetermined function for the product, and further operable to store said unique identification code at said predefined location therein; or
a dedicated electronic component, located at a predetermined position within the product operable to store said unique identification code therein.
5. The data processing system of claim 4, further configured for use in conjunction with a unique identification code remote reading system, wherein said embedding means and said output means further comprise a remotely readable data provision component selectively operable to remotely provide said unique identification code, across a predefined transmission distance, to said unique identification code remote reading system, in response to a command thereto by said at least one authorized party.
6. The data processing system of claim 5, further comprising at least one of a product electrical power source and a dedicated embedding means power source wherein said remotely readable data provision component is configured for active operation requiring electrical power therefor, said electrical power being provided by at least one of said a product electrical power source, or said embedding means power source, such that said remotely readable data provision component is not operable in the absence of provision of electrical power thereto.
7. The data processing system of claim 6, comprising both said product electrical power source and said dedicated embedding means power source, wherein said dedicated embedding means power source is only operable to provide electrical power to the remotely readable data provision component when said product electrical power source is not operable.
8. The data processing system of claim 5, wherein said remotely readable data provision component is configured for passive operation requiring no electrical power therefor, such that said remotely readable data provision component is only operable to provide said unique identification code in response to an authorized command from a unique identification code remote reading system configured to be operable to passively interface with said passive remotely readable data provision component.
9. The data processing system of claim 5, wherein:
said remotely readable data provision component is implemented and configured utilizing at least one of the following techniques for provision of said unique identification code: radio frequency ID (RFID), Bluetooth, wireless data transmission, RuBee, magnetic contact data transfer, at least one high speed cellular data transmission protocol, and infrared (IR), and
said predefined transmission distance is configured to be at least one of: substantially physical contact between said unique identification code remote reading system and said product, a predefined proximity distance between said unique identification code remote reading system and said product, and a line of sight distance between said unique identification code remote reading system and said product.
10. The data processing system of claim 5, wherein said remotely readable data provision component further comprises means for deactivation thereof by at least one predetermined authorized party, to selectively prevent said remotely readable data provision component from providing said unique identification code to any unique identification code remote reading system.
11. The data processing system of claim 1, wherein said unique identification code comprises a unique serial number assigned to the product by said originating authorized party.
12. The data processing system of claim 11, further comprising data processing means for enabling each of a plurality of authorized originating parties to verify the uniqueness of an intended unique serial number prior to assignment thereof to a corresponding product as said corresponding product's unique identification code.
13. The data processing system of claim 1 further comprising:
a data management system, responsive to said at least one authorized party, operable to:
selectively register said unique identification code associated with the product, in a product data record in a corresponding product account owned by said at least one authorized party,
associate at least one information item related to the product with said unique identification code, and
store said at least one information item in said product data record; and
verification means for verifying, by said at least one authorized party, said at least one information item related to the product, by supplying at least said unique identification code to said data management system to access at least a portion of said product data record containing said at least one information item.
14. The data processing system of claim 13, wherein said verification means further comprise authorization means for ensuring that said data record is only accessible to said at least one authorized party by requiring said at least one authorized party to provide, to said verification means, proof of an authorization to access said product data record.
15. The data processing system of claim 14, wherein said authorization means comprise a verifier requiring an authorization code for access therethrough, and wherein said proof of an authorization to access said product data record, comprises said authorization code.
16. The data processing system of claim 15, wherein said authorization code is provided to said at least one authorized party by another authorized party having previous ownership rights to the product.
17. The data processing system of claim 14, wherein said at least one information item comprises a record of current ownership rights in the product, further comprising data management means for selectively transferring, in response to a transfer authorization by a predetermined authorized party, of said current ownership rights in a product between a first authorized party, of said at least one authorized party, and a second authorized party, of said at least one authorized party, by reassigning said unique identification code associated with the product from a first product data record in said first authorized party's product account to a second product data record in said second authorized party's product account, and associating said record of current ownership rights with the second product data record in said second authorized party's product account.
18. The data processing system of claim 17, wherein said data management means further comprises means for transferring at least a portion of said at least one information item, in addition to said current ownership rights, from said first product data record to said second product data record, in response to said transfer authorization.
19. The data processing system of claim 17, wherein said data management means is implemented as an Internet website with a graphical user interface, accessible by said first and said second authorized parties, and where said verifier comprises at least one of: authorization code request security responsive to a predetermined authorization code provided by a predefined authorized party, or a biometric identity verification of at least one of said first and said second parties.
20. The data processing system of claim 19, wherein said predetermined authorization code is provided by said originating authorized party to an initial authorized party acquiring said ownership rights in the product, and wherein said predetermined authorization code is provided by said initial authorized party to each subsequent authorized party acquiring said ownership rights in the product, wherein at least one of said initial authorized party and said each subsequent authorized party, comprise said first authorized party.
21. A data processing system for managing, over at least one communication network, a plurality of information items related to a product, and to transactions between plural parties involving the product, comprising:
embedding means for electronically embedding a unique identification code, representative of a predefined plural product information item, provided by an authorized party of the plural parties, at a predefined location in at least a portion of the product, such that said unique identification code is not changeable without damaging or destroying the product's functionality;
an information management system operable to:
enable configuration, storage, access and management of at least one product management account for each of the plural parties, wherein each said at least one product management account comprises a product record corresponding to the product, and configured for storing, viewing, and managing at least a portion of the plural product information items corresponding to the product and at least comprising said unique identification code;
enable said plural authorized parties to at least one of access and manage, a least a portion of information contained in said product record; and
selectively enable a first plural authorized party to transfer proof of ownership rights in the product to a second plural authorized party by transferring, in response to a transfer authorization, said unique identification code of the product and at least corresponding ownership information from said first plural authorized party's product record to said second plural authorized party's product record.
22. A data processing system for managing, over at least one communication network a plurality of information items related to a product, and to transactions between plural parties involving the product, the plural information items including at least a unique identification code associated with the product, comprising:
a data management system, responsive to at least one instruction from at least one authorized party of the plural parties, and operable to:
selectively register the unique identification code associated with the product, in a product data record in a corresponding product account owned by said at least one authorized party,
associate at least one product information item, of the plural information items with the unique identification code, and
store said at least one product information item in said product data record; and
verification means for verifying, by said at least one authorized party, said at least one product information item, by supplying at least the unique identification code to said data management system to access at least a portion of said product data record containing said at least one product information item.
23. The data processing system of claim 22, wherein said verification means further comprise authorization means for ensuring that said data record is only accessible to said at least one authorized party, by requiring said at least one authorized party to provide, to said verification means, proof of an authorization to access said product data record.
24. The data processing system of claim 23, wherein said proof if authorization is provided to said at least one authorized party by another authorized party having previous ownership rights to the product.
25. The data processing system of claim 23, wherein said at least one product information item comprises a record of current ownership rights in the product, further comprising data management means for selectively transferring, in response to a transfer authorization by a predetermined authorized party, of said current ownership rights in a product between a first authorized party, of said at least one authorized party, and a second authorized party, of said at least one authorized party, by reassigning the unique identification code associated with the product from a first product data record in said first authorized party's product account to a second product data record in said second authorized party's product account, and associating said record of current ownership rights with the second product data record in said second authorized party's product account.
26. The data processing system of claim 25, wherein said data management means is implemented as an Internet website with a graphical user interface, accessible by said first and said second authorized parties, and where said verifier comprises at least one of: authorization code request security responsive to a predetermined authorization code provided by a predefined authorized party, or a biometric identity verification of at least one of said first and said second parties.
27. The data processing system of claim 22, wherein the unique identification code is assigned to the product by an originating authorized party of the plural parties, further comprising:
embedding means for electronically embedding the unique identification code, at a predefined location in at least a portion of the product, such that the unique identification code is not changeable without damaging or destroying the product's functionality, and
output means, selectively operable by at least one authorized party of the plural parties, to retrieve the unique identification code from said predefined location, and to output said unique identification code thereto, for at least one predefined purpose.
28. The data processing system of claim 27, wherein said data management system further comprises said verification means, and herein, said at least one predefined purpose comprises at least one of: registering the product with said data management system, creating said product data record in said data management system viewing at least one product information item in said product data record, updating or changing at least one product information item in said product data record, verifying product ownership rights of a particular party, determining a legal status of the product, verifying a possession-claiming party's physical possession of the product, and verifying the product's authenticity.
29. The data processing system of claim 28, wherein said data management system is configured for use with an electronic commerce system operable to enable a selling party to generate an electronic posting offering a predetermined product for sale in accordance with predetermined sales posting criteria, wherein said data management system further comprises a sales posting verification system, interfaced with said electronic commerce system, operable to:
enable said selling party to provide, to said data management system, a corresponding predetermined UID for said predetermined product being offered for sale, in conjunction with at least a portion of product sales information from said electronic posting, and seller identity information;
verify said selling party's compliance with said predetermined sales posting criteria, by comparing said predetermined UID, said seller identity information, and said at least a portion of product sales information with information available in a predetermined product data record corresponding to said predetermined UID; and
when said predetermined sales posting criteria are successfully verified, enabling said selling party to complete said electronic posting, and when said predetermined sales posting criteria are not verified, preventing said selling party from completing said electronic posting.
US12/325,152 2007-12-03 2008-11-29 System and method for streamlined registration of products over a communication network and for verification and management of information related thereto Expired - Fee Related US8650097B2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
PCT/US2008/085083 WO2009073579A2 (en) 2007-12-03 2008-11-29 System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto
US12/325,152 US8650097B2 (en) 2007-12-03 2008-11-29 System and method for streamlined registration of products over a communication network and for verification and management of information related thereto
US12/501,434 US8253569B2 (en) 2007-12-03 2009-07-12 Secure electromagnetic data storage element having a plurality of selectively determined switchable security modes
US13/849,598 US20130227653A1 (en) 2008-11-29 2013-03-25 System and method for streamlined registration of products over a communication network and for verification and management of information related thereto
US15/346,100 US20170053293A1 (en) 2007-12-03 2016-11-08 System and method for streamlined registration and management of products over a communication network related thereto
US15/477,957 US20170206532A1 (en) 2007-12-03 2017-04-03 System and method for streamlined registration and management of products over a communication network related thereto

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US99175907P 2007-12-03 2007-12-03
US12/325,152 US8650097B2 (en) 2007-12-03 2008-11-29 System and method for streamlined registration of products over a communication network and for verification and management of information related thereto

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US99175907P Continuation-In-Part 2007-12-03 2007-12-03

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US12/501,434 Continuation-In-Part US8253569B2 (en) 2007-12-03 2009-07-12 Secure electromagnetic data storage element having a plurality of selectively determined switchable security modes
US13/849,598 Continuation-In-Part US20130227653A1 (en) 2007-12-03 2013-03-25 System and method for streamlined registration of products over a communication network and for verification and management of information related thereto

Publications (3)

Publication Number Publication Date
US20090144074A1 US20090144074A1 (en) 2009-06-04
US20090287498A2 true US20090287498A2 (en) 2009-11-19
US8650097B2 US8650097B2 (en) 2014-02-11

Family

ID=40676663

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/325,152 Expired - Fee Related US8650097B2 (en) 2007-12-03 2008-11-29 System and method for streamlined registration of products over a communication network and for verification and management of information related thereto

Country Status (3)

Country Link
US (1) US8650097B2 (en)
CN (1) CN101960896B (en)
WO (1) WO2009073579A2 (en)

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090287589A1 (en) * 2008-05-16 2009-11-19 Fivel Steven E Mobile, compact communication device including rfid
US20090307343A1 (en) * 2008-06-05 2009-12-10 Canon Kabushiki Kaisha Server apparatus, method for controlling the server apparatus, and storage medium
US20100241528A1 (en) * 2009-01-21 2010-09-23 Nike, Inc. Anti-counterfeiting system and method
US20100306112A1 (en) * 2009-06-01 2010-12-02 Userstar Information System Co., Ltd. Online trading method and system with mechanism for verifying authenticity of a product
US20120059693A1 (en) * 2010-09-02 2012-03-08 Brian Colodny System and method for inventory and return of lost items
US8229861B1 (en) * 2008-06-11 2012-07-24 Trandal David S Methods and systems for online warranty management
US20120239813A1 (en) * 2011-03-15 2012-09-20 Samsung Electronics Co., Ltd. Methods for generating electronic appliance identifier and managing information by using electronic appliance identifier
US8295812B1 (en) * 2010-10-15 2012-10-23 Sprint Communications Company L.P. Reducing mobile-phone fraud
US20130097317A1 (en) * 2011-10-18 2013-04-18 Daniel Sheleheda Method and apparatus for remote trust management for machine to machine communications in a network
US8468064B1 (en) 2008-10-08 2013-06-18 David S. Trandal Methods and systems for receipt management and price comparison
US20130169440A1 (en) * 2010-06-07 2013-07-04 Pataco Ag Securing device for objects
US20130193203A1 (en) * 2012-01-13 2013-08-01 Logic PD, Inc. Methods for embedding device-specific data to enable remote identification and provisioning of specific devices
US20140250183A1 (en) * 2012-01-25 2014-09-04 Panasonic Corporation Home appliance information management apparatus, home appliance information sharing method, and home appliance information sharing system
US8857704B2 (en) 2012-01-13 2014-10-14 Logic PD, Inc. Methods for embedding device-specific data to enable remote access to real time device data
US20150032642A1 (en) * 2013-07-26 2015-01-29 Bank Of America Corporation Use of an e-receipt to verify ownership and service of a product
WO2015030851A3 (en) * 2013-08-22 2015-04-23 Valmarc Corporation Marketing of authenticated articles through social networking
US9195973B1 (en) 2009-06-17 2015-11-24 David S. Trandal Methods and systems for processing telephonic communications and product data
US20160055531A1 (en) * 2014-08-22 2016-02-25 Pasquale Vincent Costa Marketing of authenticated articles thru social networking
US9313099B2 (en) 2012-01-13 2016-04-12 Logic PD, Inc. Systems, devices and methods for provisioning, pairing and activating a newly manufactured device for automatic joining of customer's network
US9367527B2 (en) 2013-03-15 2016-06-14 Chargerback, Inc. Centralized lost and found system
US9626645B2 (en) 2014-01-17 2017-04-18 Chargerback, Inc. System, method and apparatus for locating and merging data fields of lost records with found records
US20170193520A1 (en) * 2015-12-30 2017-07-06 International Business Machines Corporation Managing component ownership information across a corresponding life cycle
US20170300905A1 (en) * 2016-04-18 2017-10-19 Alitheon, Inc. Authentication-triggered processes
US10482552B2 (en) 2014-01-17 2019-11-19 Chargerback, Inc. System and method for efficient and automatic reporting and return of lost items
US10482422B2 (en) 2014-01-17 2019-11-19 Chargerback, Inc. System, method and apparatus for locating and merging documents
US10540664B2 (en) 2016-02-19 2020-01-21 Alitheon, Inc. Preserving a level of confidence of authenticity of an object
US10740767B2 (en) 2016-06-28 2020-08-11 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US10839528B2 (en) 2016-08-19 2020-11-17 Alitheon, Inc. Authentication-based tracking
US10872265B2 (en) 2011-03-02 2020-12-22 Alitheon, Inc. Database for detecting counterfeit items using digital fingerprint records
US10902540B2 (en) 2016-08-12 2021-01-26 Alitheon, Inc. Event-driven authentication of physical objects
US10915612B2 (en) 2016-07-05 2021-02-09 Alitheon, Inc. Authenticated production
US10915749B2 (en) 2011-03-02 2021-02-09 Alitheon, Inc. Authentication of a suspect object using extracted native features
US10963670B2 (en) 2019-02-06 2021-03-30 Alitheon, Inc. Object change detection and measurement using digital fingerprints
US11062118B2 (en) 2017-07-25 2021-07-13 Alitheon, Inc. Model-based digital fingerprinting
US11087013B2 (en) 2018-01-22 2021-08-10 Alitheon, Inc. Secure digital fingerprint key object database
US11238146B2 (en) 2019-10-17 2022-02-01 Alitheon, Inc. Securing composite objects using digital fingerprints
US11250443B2 (en) 2013-03-15 2022-02-15 Chargerback, Inc. Lost item recovery with reporting and notifying system
US11250286B2 (en) 2019-05-02 2022-02-15 Alitheon, Inc. Automated authentication region localization and capture
US11321964B2 (en) 2019-05-10 2022-05-03 Alitheon, Inc. Loop chain digital fingerprint method and system
US11341348B2 (en) 2020-03-23 2022-05-24 Alitheon, Inc. Hand biometrics system and method using digital fingerprints
US11568683B2 (en) 2020-03-23 2023-01-31 Alitheon, Inc. Facial biometrics system and method using digital fingerprints
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
US11700123B2 (en) 2020-06-17 2023-07-11 Alitheon, Inc. Asset-backed digital security tokens
US11915503B2 (en) 2020-01-28 2024-02-27 Alitheon, Inc. Depth-based digital fingerprinting

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3882797A1 (en) 2007-09-24 2021-09-22 Apple Inc. Embedded authentication systems in an electronic device
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
DE102010010779A1 (en) * 2010-03-09 2011-09-15 Code-No.Com Gmbh Product e.g. cigarette pack, securing method, involves storing product-code pair in data base, partially transmitting user-specific data to data base, and requesting product-code pair by users by transmitting appropriate code
US8533857B2 (en) 2011-04-12 2013-09-10 Teletech Holdings, Inc. Methods for providing cross-vendor support services
US9178994B2 (en) 2011-04-12 2015-11-03 Teletech Holdings, Inc. Methods for providing self-support services using information from a viral source
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US20140040626A1 (en) * 2012-08-01 2014-02-06 Dan FREDINBURG Anonymization and reattribution framework for offline identifiers
US20140279597A1 (en) * 2013-03-14 2014-09-18 General Instrument Corporation Automated transfer of a unique identifier for a consumer electronics device
CN104182866A (en) * 2013-05-22 2014-12-03 吴宁飞 Product or object anti-counterfeiting system and method suitable for situations, such as switch transaction and the like
US9898642B2 (en) * 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US9483763B2 (en) 2014-05-29 2016-11-01 Apple Inc. User interface for payments
CN104112203A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 Consumption record display method and device
CN105335147A (en) * 2014-08-11 2016-02-17 联想(北京)有限公司 Information processing method and electronic equipment
CN105610768A (en) * 2014-11-25 2016-05-25 阿里巴巴集团控股有限公司 Method and device for processing network operation
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
US11403583B2 (en) * 2016-05-27 2022-08-02 Peyman Ahmadi Computer system method of optimizing matching and dispatch of cargo and transport-unit based on individual transport-unit and its elements quality
MX2019005630A (en) * 2016-11-16 2019-09-19 Walmart Apollo Llc Registration-based user-interface architecture.
EP4155988A1 (en) 2017-09-09 2023-03-29 Apple Inc. Implementation of biometric authentication for performing a respective function
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
CN108174354B (en) * 2017-12-26 2020-06-26 中国联合网络通信集团有限公司 NPO mobile phone fraud tracing method and system
CN108171296A (en) * 2018-01-17 2018-06-15 北京网信云服信息科技有限公司 A kind of IC card, card-reading apparatus and IC card data processing system
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
CN108960377A (en) * 2018-08-08 2018-12-07 林煊煊 A kind of merchandise control platform, method, apparatus, system and equipment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11392702B2 (en) 2019-03-17 2022-07-19 Microsoft Technology Licensing, Llc Discovery and matching of internet of things (IoT) devices and services using a secure global registry
US11372980B2 (en) 2019-06-14 2022-06-28 Netiq Corporation Blockchains for software component vulnerability databases
US11210404B2 (en) 2019-06-14 2021-12-28 Netiq Corporation Blockchain-based state verifications of software component vulnerability database for software products
CN110674115A (en) * 2019-09-25 2020-01-10 山东鲁能软件技术有限公司 Method and system for realizing automatic file establishment based on mobile terminal
FR3113749A1 (en) * 2020-08-31 2022-03-04 Pivicar System for identifying and tracking the owner of a luxury product.

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6206282B1 (en) * 1998-03-03 2001-03-27 Pyper Products Corporation RF embedded identification device
US6249227B1 (en) * 1998-01-05 2001-06-19 Intermec Ip Corp. RFID integrated in electronic assets
US20020032626A1 (en) * 1999-12-17 2002-03-14 Dewolf Frederik M. Global asset information registry
US6453417B1 (en) * 1993-05-12 2002-09-17 Usar Systems, Inc. Microcontroller with secure signature extraction
US6788800B1 (en) * 2000-07-25 2004-09-07 Digimarc Corporation Authenticating objects using embedded data
US20050035860A1 (en) * 2003-08-11 2005-02-17 Accenture Global Services Gmbh. Manufactured article recovery system
US6886748B1 (en) * 1996-01-02 2005-05-03 Steven Jerome Moore Apparatus and method for purchased product security
US20050114270A1 (en) * 2003-11-21 2005-05-26 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
US20050146006A1 (en) * 2003-12-26 2005-07-07 Semiconductor Energy Laboratory Co., Ltd. Securities, chip mounting product, and manufacturing method thereof
US20050168339A1 (en) * 2004-02-04 2005-08-04 Semiconductor Energy Laboratory Co., Ltd. ID label, ID tag, and ID card
US6965886B2 (en) * 2001-11-01 2005-11-15 Actimize Ltd. System and method for analyzing and utilizing data, by executing complex analytical models in real time
US7000834B2 (en) * 2001-02-21 2006-02-21 International Business Machines Corporation Method to address security and privacy issue of the use of RFID systems to track consumer products
US7042335B2 (en) * 2002-08-30 2006-05-09 Franks Theresa S Registry system, database and method
US7072892B2 (en) * 1999-09-30 2006-07-04 Allen David Hertz Business model for recovery of missing goods, persons, of fugitives or disbursements of unclaimed goods using the internet
US20070103274A1 (en) * 2005-04-13 2007-05-10 Oliver Berthold Radio frequency identification (RFID) system that meets data protection requirements through owner-controlled RFID tag functionality
US20070109103A1 (en) * 2005-09-07 2007-05-17 California Institute Of Technology Commercial product activation and monitoring using radio frequency identification (RFID) technology
US7230534B2 (en) * 1998-03-27 2007-06-12 Micron Technology, Inc. Method and system for identifying lost or stolen devices
US20070210923A1 (en) * 2005-12-09 2007-09-13 Butler Timothy P Multiple radio frequency network node rfid tag

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6453417B1 (en) * 1993-05-12 2002-09-17 Usar Systems, Inc. Microcontroller with secure signature extraction
US6886748B1 (en) * 1996-01-02 2005-05-03 Steven Jerome Moore Apparatus and method for purchased product security
US7172117B2 (en) * 1996-01-02 2007-02-06 Steven Jerome Moore Apparatus and method for purchased product security
US6249227B1 (en) * 1998-01-05 2001-06-19 Intermec Ip Corp. RFID integrated in electronic assets
US6206282B1 (en) * 1998-03-03 2001-03-27 Pyper Products Corporation RF embedded identification device
US7230534B2 (en) * 1998-03-27 2007-06-12 Micron Technology, Inc. Method and system for identifying lost or stolen devices
US7072892B2 (en) * 1999-09-30 2006-07-04 Allen David Hertz Business model for recovery of missing goods, persons, of fugitives or disbursements of unclaimed goods using the internet
US20020032626A1 (en) * 1999-12-17 2002-03-14 Dewolf Frederik M. Global asset information registry
US6788800B1 (en) * 2000-07-25 2004-09-07 Digimarc Corporation Authenticating objects using embedded data
US7000834B2 (en) * 2001-02-21 2006-02-21 International Business Machines Corporation Method to address security and privacy issue of the use of RFID systems to track consumer products
US6965886B2 (en) * 2001-11-01 2005-11-15 Actimize Ltd. System and method for analyzing and utilizing data, by executing complex analytical models in real time
US7375614B2 (en) * 2002-08-30 2008-05-20 Franks Theresa S Registry system, database and method
US7042335B2 (en) * 2002-08-30 2006-05-09 Franks Theresa S Registry system, database and method
US20050035860A1 (en) * 2003-08-11 2005-02-17 Accenture Global Services Gmbh. Manufactured article recovery system
US20050114270A1 (en) * 2003-11-21 2005-05-26 International Business Machines Corporation Merchandise-integral transaction receipt and auditable product ownership trail
US20050146006A1 (en) * 2003-12-26 2005-07-07 Semiconductor Energy Laboratory Co., Ltd. Securities, chip mounting product, and manufacturing method thereof
US20050168339A1 (en) * 2004-02-04 2005-08-04 Semiconductor Energy Laboratory Co., Ltd. ID label, ID tag, and ID card
US20070103274A1 (en) * 2005-04-13 2007-05-10 Oliver Berthold Radio frequency identification (RFID) system that meets data protection requirements through owner-controlled RFID tag functionality
US20070109103A1 (en) * 2005-09-07 2007-05-17 California Institute Of Technology Commercial product activation and monitoring using radio frequency identification (RFID) technology
US20070210923A1 (en) * 2005-12-09 2007-09-13 Butler Timothy P Multiple radio frequency network node rfid tag

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"RFID's: Security Challenge", Claburn, Thomas; Hulme, George V., InformationWeek 1014( Nov. 15, 2004), pg. 49 *

Cited By (78)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090287589A1 (en) * 2008-05-16 2009-11-19 Fivel Steven E Mobile, compact communication device including rfid
US20090307343A1 (en) * 2008-06-05 2009-12-10 Canon Kabushiki Kaisha Server apparatus, method for controlling the server apparatus, and storage medium
US8819114B2 (en) * 2008-06-05 2014-08-26 Canon Kabushiki Kaisha Server apparatus, method for controlling the server apparatus, and storage medium
US8229861B1 (en) * 2008-06-11 2012-07-24 Trandal David S Methods and systems for online warranty management
US8468064B1 (en) 2008-10-08 2013-06-18 David S. Trandal Methods and systems for receipt management and price comparison
US8374920B2 (en) * 2009-01-21 2013-02-12 Nike, Inc. Anti-counterfeiting system and method
US20100241528A1 (en) * 2009-01-21 2010-09-23 Nike, Inc. Anti-counterfeiting system and method
US20100306112A1 (en) * 2009-06-01 2010-12-02 Userstar Information System Co., Ltd. Online trading method and system with mechanism for verifying authenticity of a product
US9195973B1 (en) 2009-06-17 2015-11-24 David S. Trandal Methods and systems for processing telephonic communications and product data
US9524626B2 (en) * 2010-06-07 2016-12-20 Pataco Ag Securing device for objects
US20130169440A1 (en) * 2010-06-07 2013-07-04 Pataco Ag Securing device for objects
US10134248B2 (en) * 2010-06-07 2018-11-20 Pataco Ag Securing device for objects
US20120059693A1 (en) * 2010-09-02 2012-03-08 Brian Colodny System and method for inventory and return of lost items
US11836649B2 (en) 2010-09-02 2023-12-05 Chargerback, Inc. Lost item recovery with reporting and notifying system
US11004086B2 (en) 2010-09-02 2021-05-11 Chargerback, Inc. Lost item recovery with reporting and notifying system
US8295812B1 (en) * 2010-10-15 2012-10-23 Sprint Communications Company L.P. Reducing mobile-phone fraud
US8483663B1 (en) * 2010-10-15 2013-07-09 Sprint Communications Company L.P. Reducing mobile-phone fraud
US11423641B2 (en) 2011-03-02 2022-08-23 Alitheon, Inc. Database for detecting counterfeit items using digital fingerprint records
US10872265B2 (en) 2011-03-02 2020-12-22 Alitheon, Inc. Database for detecting counterfeit items using digital fingerprint records
US10915749B2 (en) 2011-03-02 2021-02-09 Alitheon, Inc. Authentication of a suspect object using extracted native features
US20120239813A1 (en) * 2011-03-15 2012-09-20 Samsung Electronics Co., Ltd. Methods for generating electronic appliance identifier and managing information by using electronic appliance identifier
US9684938B2 (en) * 2011-03-15 2017-06-20 Samsung Electronics Co., Ltd. Methods for generating electronic appliance identifier and managing information by using electronic appliance identifier
US20130097317A1 (en) * 2011-10-18 2013-04-18 Daniel Sheleheda Method and apparatus for remote trust management for machine to machine communications in a network
US9313099B2 (en) 2012-01-13 2016-04-12 Logic PD, Inc. Systems, devices and methods for provisioning, pairing and activating a newly manufactured device for automatic joining of customer's network
US8857704B2 (en) 2012-01-13 2014-10-14 Logic PD, Inc. Methods for embedding device-specific data to enable remote access to real time device data
US20130193203A1 (en) * 2012-01-13 2013-08-01 Logic PD, Inc. Methods for embedding device-specific data to enable remote identification and provisioning of specific devices
US8857705B2 (en) * 2012-01-13 2014-10-14 Logic PD, Inc. Methods for embedding device-specific data to enable remote identification and provisioning of specific devices
US9641596B2 (en) * 2012-01-25 2017-05-02 Panasonic Intellectual Property Management Co., Ltd. Home appliance information management apparatus, home appliance information sharing method, and home appliance information sharing system
US20140250183A1 (en) * 2012-01-25 2014-09-04 Panasonic Corporation Home appliance information management apparatus, home appliance information sharing method, and home appliance information sharing system
US11599888B2 (en) 2013-03-15 2023-03-07 Chargerback, Inc. Lost item recovery with reporting and notifying system
US11250443B2 (en) 2013-03-15 2022-02-15 Chargerback, Inc. Lost item recovery with reporting and notifying system
US9367527B2 (en) 2013-03-15 2016-06-14 Chargerback, Inc. Centralized lost and found system
US10521802B2 (en) 2013-03-15 2019-12-31 Charberback, Inc. Lost item recovery with reporting and notifying system
US20150032642A1 (en) * 2013-07-26 2015-01-29 Bank Of America Corporation Use of an e-receipt to verify ownership and service of a product
WO2015030851A3 (en) * 2013-08-22 2015-04-23 Valmarc Corporation Marketing of authenticated articles through social networking
US10482422B2 (en) 2014-01-17 2019-11-19 Chargerback, Inc. System, method and apparatus for locating and merging documents
US10482552B2 (en) 2014-01-17 2019-11-19 Chargerback, Inc. System and method for efficient and automatic reporting and return of lost items
US10762586B2 (en) 2014-01-17 2020-09-01 Chargerback, Inc. System and method for efficient and automatic reporting and return of lost items
US11170341B2 (en) 2014-01-17 2021-11-09 Chargerback, Inc. System, method, and apparatus for locating and merging documents
US9626645B2 (en) 2014-01-17 2017-04-18 Chargerback, Inc. System, method and apparatus for locating and merging data fields of lost records with found records
US10949421B2 (en) 2014-01-17 2021-03-16 Chargerback, Inc. System, method, and apparatus for locating and merging data fields of lost records with found records
US20160055531A1 (en) * 2014-08-22 2016-02-25 Pasquale Vincent Costa Marketing of authenticated articles thru social networking
US20170193520A1 (en) * 2015-12-30 2017-07-06 International Business Machines Corporation Managing component ownership information across a corresponding life cycle
US11062323B2 (en) * 2015-12-30 2021-07-13 International Business Machines Corporation Managing component ownership information across a corresponding life cycle
US10861026B2 (en) 2016-02-19 2020-12-08 Alitheon, Inc. Personal history in track and trace system
US11593815B2 (en) 2016-02-19 2023-02-28 Alitheon Inc. Preserving authentication under item change
US10540664B2 (en) 2016-02-19 2020-01-21 Alitheon, Inc. Preserving a level of confidence of authenticity of an object
US10572883B2 (en) 2016-02-19 2020-02-25 Alitheon, Inc. Preserving a level of confidence of authenticity of an object
US11068909B1 (en) 2016-02-19 2021-07-20 Alitheon, Inc. Multi-level authentication
US11682026B2 (en) 2016-02-19 2023-06-20 Alitheon, Inc. Personal history in track and trace system
US11100517B2 (en) 2016-02-19 2021-08-24 Alitheon, Inc. Preserving authentication under item change
US11301872B2 (en) 2016-02-19 2022-04-12 Alitheon, Inc. Personal history in track and trace system
US11830003B2 (en) 2016-04-18 2023-11-28 Alitheon, Inc. Authentication-triggered processes
US10867301B2 (en) * 2016-04-18 2020-12-15 Alitheon, Inc. Authentication-triggered processes
US20170300905A1 (en) * 2016-04-18 2017-10-19 Alitheon, Inc. Authentication-triggered processes
US10740767B2 (en) 2016-06-28 2020-08-11 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US11379856B2 (en) 2016-06-28 2022-07-05 Alitheon, Inc. Centralized databases storing digital fingerprints of objects for collaborative authentication
US10915612B2 (en) 2016-07-05 2021-02-09 Alitheon, Inc. Authenticated production
US11636191B2 (en) 2016-07-05 2023-04-25 Alitheon, Inc. Authenticated production
US10902540B2 (en) 2016-08-12 2021-01-26 Alitheon, Inc. Event-driven authentication of physical objects
US10839528B2 (en) 2016-08-19 2020-11-17 Alitheon, Inc. Authentication-based tracking
US11741205B2 (en) 2016-08-19 2023-08-29 Alitheon, Inc. Authentication-based tracking
US11062118B2 (en) 2017-07-25 2021-07-13 Alitheon, Inc. Model-based digital fingerprinting
US11593503B2 (en) 2018-01-22 2023-02-28 Alitheon, Inc. Secure digital fingerprint key object database
US11087013B2 (en) 2018-01-22 2021-08-10 Alitheon, Inc. Secure digital fingerprint key object database
US11843709B2 (en) 2018-01-22 2023-12-12 Alitheon, Inc. Secure digital fingerprint key object database
US11386697B2 (en) 2019-02-06 2022-07-12 Alitheon, Inc. Object change detection and measurement using digital fingerprints
US11488413B2 (en) 2019-02-06 2022-11-01 Alitheon, Inc. Object change detection and measurement using digital fingerprints
US10963670B2 (en) 2019-02-06 2021-03-30 Alitheon, Inc. Object change detection and measurement using digital fingerprints
US11250286B2 (en) 2019-05-02 2022-02-15 Alitheon, Inc. Automated authentication region localization and capture
US11321964B2 (en) 2019-05-10 2022-05-03 Alitheon, Inc. Loop chain digital fingerprint method and system
US11238146B2 (en) 2019-10-17 2022-02-01 Alitheon, Inc. Securing composite objects using digital fingerprints
US11922753B2 (en) 2019-10-17 2024-03-05 Alitheon, Inc. Securing composite objects using digital fingerprints
US11915503B2 (en) 2020-01-28 2024-02-27 Alitheon, Inc. Depth-based digital fingerprinting
US11568683B2 (en) 2020-03-23 2023-01-31 Alitheon, Inc. Facial biometrics system and method using digital fingerprints
US11341348B2 (en) 2020-03-23 2022-05-24 Alitheon, Inc. Hand biometrics system and method using digital fingerprints
US11663849B1 (en) 2020-04-23 2023-05-30 Alitheon, Inc. Transform pyramiding for fingerprint matching system and method
US11700123B2 (en) 2020-06-17 2023-07-11 Alitheon, Inc. Asset-backed digital security tokens

Also Published As

Publication number Publication date
CN101960896B (en) 2014-12-10
WO2009073579A2 (en) 2009-06-11
US8650097B2 (en) 2014-02-11
CN101960896A (en) 2011-01-26
WO2009073579A3 (en) 2010-02-18
US20090144074A1 (en) 2009-06-04

Similar Documents

Publication Publication Date Title
US8650097B2 (en) System and method for streamlined registration of products over a communication network and for verification and management of information related thereto
US20170053293A1 (en) System and method for streamlined registration and management of products over a communication network related thereto
CN112470441B (en) Method for carrying out security tracking on article by using distributed computing
US10387695B2 (en) Authenticating and managing item ownership and authenticity
US8432257B2 (en) Merchandise-integral transaction receipt and auditable product ownership trail
CN105378774A (en) Secure transaction systems and methods
CN101583968A (en) Systems and methods for non-traditional payment
JP2005514696A (en) Organization-property-person model asset tracking system and method
KR20060022617A (en) Article authentication system comprising radio frequency identifications and mobile communication terminals and the method using the same
WO2006122343A1 (en) Asset registration system and method
JP4476693B2 (en) Product information provision device
JP6830074B2 (en) Reuse product distribution management system and reuse product distribution management method
KR100844177B1 (en) System and method for product history management using serial number
JP2006154977A (en) Lost article retrieval-and-liaison system
US11604770B2 (en) Methods and systems for secure product tracking data storage and verification
US20220198167A1 (en) Method and system for registering and authenticating items
KR20060058180A (en) Method, system, and sticker for managing the warranty information of the goods via network
JP2005157855A (en) Rental product management system
KR20230065771A (en) Shipping information security processing system and method
KR20040072590A (en) Method for managing the warranty information of the goods via network and system thereof
JP2022060841A (en) Transaction processing apparatus, transaction processing program, and transaction processing method
JP2005258871A (en) Writing device of radio tag and processing method thereby
AU2005331886A1 (en) Asset registration system and method
JP2002356226A (en) Commodity management system and medium recorded with commodity management data

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO MICRO (ORIGINAL EVENT CODE: MICR)

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20220211