会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 44. 发明专利
    • A method of content authentication inside a sealed box using special labels
    • AU2011225766A1
    • 2012-11-08
    • AU2011225766
    • 2011-03-01
    • ANAND ASHISH
    • ANAND ASHISH
    • G06K19/06G06V30/224
    • This invention proposes a content verification and authentication method inside a sealed box, which transits between point-of-packaging and point-of delivery through a logistics supply-chain on per-hop basis. This method is about tagging each item with a label containing internal layering of radio-opaque material randomly oriented. Externally all labels/tags look symmetrical and hence even if an insider replaces the original item and tags with genuine labels on fake item, still this gets detected as original reference imaging signature will have different orientation. Every-time these labels are reused they auto-acquire their imaging credential. This method also mitigates false alarm after ensuring that imaging has changed only due to horizontal movement of items inside the box and not because of orientation. Method has inherent capability to resolve count-deficiency due to pattern overlap. For accelerated direction- agnostic scanning in high volume logistics industry for box level authentication, two labels with covert pattern is highly useful. Labels with covert pattern is again based on orientation, which is not known by insiders and credential is acquired only at time of application of labels. This method can also be used as covert anti-counterfeiting mechanism by associating imaging of random covert patterns with overt feature of unique-alpha-numeric per-piece id.
    • 45. 发明申请
    • ANTI-DUPLICATION MECHANISM FOR NON-ELECTRONIC CONSUMER PRODUCTS VERIFIABLE BY END CONSUMER
    • 消费者认可的非电子消费产品的反复机制
    • WO2010079465A3
    • 2011-05-05
    • PCT/IB2010050940
    • 2010-03-04
    • ANAND ASHISH
    • ANAND ASHISH
    • G06K19/10G06K5/00G06K9/00G06K17/00
    • G07F7/0813G06Q20/409
    • This invention proposes a consumer verifiable seamless mechanism of anti-counterfeiting especially applicable to non-electronic consumer products. Known methods like bar-code, holograms, RFID, nano-fingerprinting or special packaging are either not consumer verifiable in tangible manner OR not able to address elaborate threat-model. The invention proposes set of 3 unique credentials generation per-piece of product that needs to be protected against counterfeiting. Once the product is billed, the package is opened customer needs to send first two numbers in authentication request. Authentication request is processed at the authentication server end and third number is sent to consumer end for his self- verification. For storage scalability purposes, invention proposes that both second number and third number should be deduced from first one and thus only first number needs storage. Another important attribute that this invention proposes that it should be technically and tangibly verifiable that a junk credential is not generated by authentication server. Despite being technically replicable, this method becomes full-proof as it is supported by heuristic analysis engine which acts like honey-trap for counterfeiters and this becomes its biggest strength.
    • 本发明提出了一种消费者可验证的防伪机制,特别适用于非电子消费品。 诸如条码,全息图,RFID,纳米指纹或特殊包装等已知方法或者不是以消费者的形式进行验证,或者无法解决复杂的威胁模型。 本发明提出了一组需要防止假冒的每件产品的3个独特凭证生成。 一旦产品收费,打包的客户需要在认证请求中发送前两个号码。 认证请求在认证服务器端处理,第三个号码被发送给消费者端进行自我验证。 为了存储可扩展性的目的,本发明建议从第一个数字和第三个数字中推算出第二个数字和第三个数字,因此只有第一个数字需要存储。 本发明提出的另一个重要特征是,技术上和实际上可以验证,认证服务器不会产生垃圾凭据。 尽管在技术上可以复制,但是这种方法变得全面,因为它是由启发式分析引擎支持的,这种启发式分析引擎像制造商的蜜蜂一样,这成为其最大的优势。
    • 46. 发明申请
    • A METHOD OF CONTENT AUTHENTICATION INSIDE A SEALED BOX USING SPECIAL LABELS
    • 使用特殊标签的密封盒内部认证的方法
    • WO2011110973A3
    • 2012-07-05
    • PCT/IB2011050859
    • 2011-03-01
    • ANAND ASHISH
    • ANAND ASHISH
    • G06K19/06G06K9/18G06K9/62G06K9/78
    • G06K9/00G06K9/00577
    • This invention proposes a content verification and authentication method inside a sealed box, which transits between point-of-packaging and point-of delivery through a logistics supply-chain on per-hop basis. This method is about tagging each item with a label containing internal layering of radio-opaque material randomly oriented. Externally all labels/tags look symmetrical and hence even if an insider replaces the original item and tags with genuine labels on fake item, still this gets detected as original reference imaging signature will have different orientation. Every-time these labels are reused they auto-acquire their imaging credential. This method also mitigates false alarm after ensuring that imaging has changed only due to horizontal movement of items inside the box and not because of orientation. Method has inherent capability to resolve count-deficiency due to pattern overlap. For accelerated direction- agnostic scanning in high volume logistics industry for box level authentication, two labels with covert pattern is highly useful. Labels with covert pattern is again based on orientation, which is not known by insiders and credential is acquired only at time of application of labels. This method can also be used as covert anti-counterfeiting mechanism by associating imaging of random covert patterns with overt feature of unique-alpha-numeric per-piece id.
    • 本发明提出了一种密封盒内的内容验证和认证方法,其在每个包的物流供应链上在包装点和交货点之间转移。 这种方法是关于标记每个项目,标签包含随机取向的不透射线材料的内部分层。 外部所有的标签/标签看起来都是对称的,因此即使内部人员用假标签替换原始商品和标签,仍然会被检测到,因为原始参考图像签名将具有不同的方向。 每次这些标签被重新使用时,他们会自动获取其成像凭证。 这种方法还可以确保成像仅由于箱内物品的水平移动而不是由于取向而改变,从而减轻了误报。 方法具有解决由于模式重叠导致的计数缺陷的固有能力。 为了加快大批量物流行业的方向性无障碍扫描,用于盒级认证,两个具有隐蔽图案的标签非常有用。 具有隐蔽模式的标签再次基于方向,内部人员不知道,只有在应用标签时才获取凭据。 这种方法也可以通过将随机隐藏图案的成像与独特的字母数字的每件号的明显特征相关联来用作秘密防伪机制。
    • 47. 发明申请
    • INTEGRITY CHECKING AND REPORTING MODEL FOR HARDWARE ROOTED TRUST ENABLED E-VOTING PLATFORM
    • 硬件检查和报告模型为硬件信任启用电子投票平台
    • WO2007148258A3
    • 2008-10-30
    • PCT/IB2007052219
    • 2007-06-12
    • ANAND ASHISH
    • ANAND ASHISH
    • G07C13/00G06F21/57G06F21/71
    • G07C13/00G06F21/57G06F21/71
    • Tamper-proofing is not sufficient for embedded computing platform security as it solves only half of the problem & replication can defeat all sophisticated measures of tamper-proofing. A replicated platform means look-alike and functionally equivalent model of original device. This invention uses hardware rooted trust in a novel way to guarantee platform security without hardware upgrade and re-certification. Tangible assurance about integrity of platform is essential to secure maximum public trust using an external attestation & certification unit (020). Attestation & certification unit (020) along with platform (021) is provisioned with security credentials using a provisioning server (018 & 019) shown as core root-of-trust at platform-vendor premises in a auditable and verifiable manner, beyond any disputes or litigations. This invention is based on distributed root-of-trust security model (as shown in Diagram 11) wherein both attestation unit (020) and platform (021) is on same trust hierarchy and hence can be used in many horizontal applications which are otherwise complex from legal, public-trust aspects and onus of anything going wrong is mostly one-sided. This also provides a maximum security against insider threats from inside of vendor premises.
    • 防篡改对于嵌入式计算平台的安全性来说是不够的,因为它解决了只有一半的问题,复制可能会击败所有复杂的防篡改措施。 复制平台意味着类似于原始设备的功能等同的模型。 本发明以一种新颖的方式使用硬件根系信任,保证平台安全,无需硬件升级和重新认证。 使用外部认证和认证单位(020)确保最大限度的公众信任对于平台完整性的切实保证至关重要。 证明和认证单位(020)以及平台(021)使用供应服务器(018&019)提供安全凭证,该供应服务器(018&019)以可审核和可验证的方式在平台 - 供应商处所显示为核心信任根源,超出任何争议 或诉讼。 本发明基于分布式信任安全模型(如图11所示),其中证明单元(020)和平台(021)都在相同的信任层级上,并且因此可以在许多水平应用中使用,否则这些应用是复杂的 从法律,公共信任的角度和任何事情出发,主要是片面的。 这也为供应商内部的内部威胁提供了最大的安全保障。
    • 48. 发明申请
    • ANTI-DUPLICATION MECHANISM FOR NON-ELECTRONIC CONSUMER PRODUCTS VERIFIABLE BY END CONSUMER
    • 消费者认可的非电子消费产品的反复机制
    • WO2010079465A2
    • 2010-07-15
    • PCT/IB2010050940
    • 2010-03-04
    • ANAND ASHISH
    • ANAND ASHISH
    • G06K5/00
    • G07F7/0813G06Q20/409
    • This invention proposes a consumer verifiable seamless mechanism of anti-counterfeiting especially applicable to non-electronic consumer products. Known methods like bar-code, holograms, RFID, nano-fingerprinting or special packaging are either not consumer verifiable in tangible manner OR not able to address elaborate threat-model. The invention proposes set of 3 unique credentials generation per-piece of product that needs to be protected against counterfeiting. Once the product is billed, the package is opened customer needs to send first two numbers in authentication request. Authentication request is processed at the authentication server end and third number is sent to consumer end for his self- verification. For storage scalability purposes, invention proposes that both second number and third number should be deduced from first one and thus only first number needs storage. Another important attribute that this invention proposes that it should be technically and tangibly verifiable that a junk credential is not generated by authentication server. Despite being technically replicable, this method becomes full-proof as it is supported by heuristic analysis engine which acts like honey-trap for counterfeiters and this becomes its biggest strength.
    • 本发明提出了一种消费者可验证的防伪机制,特别适用于非电子消费品。 诸如条码,全息图,RFID,纳米指纹或特殊包装等已知方法或者不是以消费者的形式进行验证,或者无法解决复杂的威胁模型。 本发明提出了一组需要防止假冒的每件产品的3个独特凭证生成。 一旦产品收费,打包的客户需要在认证请求中发送前两个号码。 认证请求在认证服务器端处理,第三个号码被发送给消费者端进行自我验证。 为了存储可扩展性的目的,本发明建议从第一个数字和第三个数字中推算出第二个数字和第三个数字,因此只有第一个数字需要存储。 本发明提出的另一个重要特征是,技术上和实际上可以验证,认证服务器不会产生垃圾凭据。 尽管在技术上可以复制,但是这种方法变得全面,因为它是由启发式分析引擎支持的,这种启发式分析引擎像制造商的蜜蜂一样,这成为其最大的优势。