An rf electronic identification system (10) is disclosed and claimed. The system includes at least one transponder encoder (14.1) for writing data into a memory arrangement (52) of a selected transponder (1.1) of a plurality of transponders (1.1 to 1.n) adapted to receive data from the at least one encoder. The system further includes at least one verifier (16) for interrogating a selected transponder (1.1) and to read data stored in the transponder. The encoder includes a controller (42) for providing an identification code characteristic of the encoder to form part of the data to be written into the transponder. The verifier includes computing means (56) for extracting the identification code from the data read thereby and for comparing the code to authorized codes. An indicator (18) provides an indication whether the identification code corresponds to any of the authorized codes or not. A method of verifying the authenticity of a transponder is also disclosed and claimed.

Patent
   RE44220
Priority
Jun 18 1998
Filed
Jun 05 2009
Issued
May 14 2013
Expiry
Jun 16 2019

TERM.DISCL.
Assg.orig
Entity
Large
1
283
all paid
0. 29. A method of verifying the authenticity of a transponder comprising:
receiving, at a computing means, encrypted data and input data relating to a physical characteristic of the transponder;
applying an algorithm to the encrypted data and the input data, using the computing means, to generate an output number; and
comparing, using the computing means, the output number to a list of numbers.
0. 34. A reader configured to authenticate a transponder, the reader comprising:
an rf transceiver; and
computing means configured to:
receive encrypted data and input data relating to a physical characteristic of the transponder via the rf transceiver;
apply an algorithm to the encrypted data and the input data to generate an output number; and
compare the output number to a list of numbers.
18. A method of verifying the authenticity of a transponder, the method including the steps of:
generating encrypted data utilizing an algorithm and input data characteristic of a transponder encoder;
writing the encrypted data and data relating to an identification code of an entity externally of external to the transponder into the transponder utilizing the transponder encoder;
reading the data written into the transponder with a verifier via a radio frequency link extending between the verifier and the transponder;
extracting from the data read, the encrypted data; decipher, deciphering the encrypted data to generate deciphered data using computing means of the verifier; and
comparing the deciphered data to authorized data and
providing an indication based on the comparison.
1. An electronic identification system including:
at least one transponder encoder for writing data to a transponder;
said encoder comprising means for providing an identification code characteristic of an entity externally of external to the transponder;
a plurality of transponders each adapted to receive data from the at least one encoder and to store the data received in a respective memory arrangement of the transponder;
at least one verifier for interrogating a selected transponder and to read reading data stored in the memory arrangement of the selected transponder via a radio frequency link;
wherein said encoder further comprises an encryption device for utilizing an algorithm and input data characteristic of the encoder to generate encrypted data to form at least part of the data written to the selected transponder;
the at least one verifier comprises comprising computing means for extracting and deciphering the encrypted data from the data read thereby; and
a comparator for comparing the deciphered data to authorized data and
an indicator for providing an indication of an outcome of the comparison.
2. A system as claimed in claim 1, wherein the encoder includes a memory arrangement wherein configured to store a plurality of identity identification codes characteristic of the encoder are stored; and wherein the encoder comprises a controller for randomly selecting one of a selected identification code from said plurality of identification codes for use as the input data by the encryption device.
3. A system as claimed in claim 2 further including a central computer for generating the plurality of identification codes, for downloading the identification codes into the memory arrangement of the encoder and into a memory arrangement of the at least one verifier.
4. A system as claimed in claim 2 wherein the algorithm comprises a first encryption algorithm and wherein the encryption device utilizes the selected identification code and the first encryption algorithm to generate the encrypted data.
5. A system as claimed in claim 4 wherein the controller of the encoder is programmed randomly to configured to select the first encryption algorithm from a first set of encryption algorithms pre-stored in the memory arrangement of the encoder.
6. A system as claimed in claim 5 wherein each algorithm in the first set of encryption algorithms is associated with a respective algorithm address in the memory arrangement of the encoder.
7. A system as claimed in claim 6 wherein the encrypted data further comprises encrypted address data relating to the respective algorithm address of the selected first encryption algorithm.
8. A system as claimed in claim 7 wherein the encryption device utilizes a second encryption algorithm and said data relating to the respective algorithm address to generate the encrypted address data.
9. A system as claimed in claim 8 wherein the second algorithm is of a general form wherein the respective algorithm address is equal to at least one term plus a second remainder.
10. A system as claimed in claim 9 wherein the encrypted address data comprises the aforementioned second remainder.
11. A system as claimed in claim 4 1 wherein each encryption the algorithm includes comprises at least one term which that is a function of at least one physical characteristic of the selected transponder into onto which the data is to be written.
12. A system as claimed in claim 11 wherein the at least one physical characteristic of the selected transponder is a frequency of a clock forming part of the transponder.
13. A system as claimed in claim 11 wherein each algorithm is of a general form wherein the selected identification code is equal to said at least one term plus a first remainder.
0. 14. A system as claimed in claim 13 wherein the encrypted comprises the aforementioned remainder.
15. A system as claimed in claim 8 wherein the computing means of the verifier is configured to use the second encryption algorithm to decrypt the encrypted address data to yield the respective algorithm address data.
16. A system as claimed in claim 15 wherein the computing means of the verifier is configured to utilize the respective algorithm address data to retrieve the selected first encryption algorithm, to obtain input data and to use said input data and the first encryption algorithm to decrypt the encrypted data to yield decrypted data when deciphering the encrypted data and generating the deciphered data.
17. A system as claimed in claim 16 wherein the comparator forms part of the verifier and is configured to compare the decrypted deciphered data to the authorized identification codes data which are is stored in the memory arrangement of the verifier.
19. A method as claimed in claim 18 wherein the input data comprises an identification code characteristic of the encoder.
20. A method as claimed in claim 19 wherein the transponder encoder has a plurality of identification codes characteristic thereof and wherein the method includes the step of randomly selecting one of these the plurality of identification codes as said the input data.
21. A method as claimed in claim 18 wherein the step of generating encrypted data comprises the step of utilizing a first encryption algorithm and the identification code to generate the encrypted data relating to the identification code.
22. A method as claimed in claim 21 wherein the first encryption algorithm is selectable from a first set of encryption algorithms.
23. A method as claimed in claim 22 wherein the first encryption algorithm includes at least one term which that is a function of at least one physical characteristic of the transponder into which the data is written.
24. A method as claimed in claim 23 wherein each algorithm of the first set of encryption algorithms is accessible by the encoder from a memory arrangement thereof utilizing a respective algorithm address.
25. A method as claimed in claim 24 wherein the step of generating encrypted data comprises the step of utilizing a second encryption algorithm and data relating to the respec tive algorithm address of the selected algorithm, to generate encrypted data relating to the respective algorithm address.
26. A method as claimed in claim 25 including the step of utilizing at the verifier decrypted data relating to the respective algorithm address to retrieve from a memory arrangement of the verifier the first encryption algorithm utilized during the first encryption process.
27. A method as claimed in claim 26 comprising the steps of providing to computing means in the verifier input data; and utilizing said input data and the retrieved first encryption algorithm to decrypt the encrypted data relating to the identification code.
28. A method as claimed in claim 27 wherein the step of comparing comprises the step of comparing the decrypted data relating to the identification code to data relating to authorized identification codes stored in a memory arrangement of the verifier.
0. 30. The method of claim 29, wherein the transponder comprises a clock defining a clock frequency, and wherein the input data relating to a physical characteristic of the transponder comprises the clock frequency.
0. 31. The method of claim 29, wherein the list of numbers comprises a plurality of identification numbers characteristic of an entity external to the transponder.
0. 32. The method of claim 29, wherein the list of numbers comprises a plurality of identification numbers characteristic of an encoder.
0. 33. The method of claim 29, wherein the computing means is part of a reader.

This application is a continuation of application Ser. No. 10/827,814, filed Apr. 20, 2004 now U.S. Pat. No. 6,954,533, which is a continuation of application Ser. No. 09/334,151, filed Jun. 16, 1999 now U.S. Pat. No. 6,724,895, which application is incorporated herein by reference.

THIS invention relates to electronic identification systems and more particularly to such systems including radio frequency (RF) transponders and associated readers, interrogators and verifiers therefor.

A system of the aforementioned kind is typically used to mark and identify products or goods, and would further include a plurality of encoder units for writing data into respective memory arrangements of the transponders. In use, a transponder is attached to a product item and the data written into the transponder may relate to the kind of product, the date of manufacture and/or any other data relating to the product. Normally the data is written into the memory arrangement at the source of the product, but in some applications additional data may be written into the memory arrangement at various points along a distribution chain. Of course the data written into the memory arrangement can at any stage be read with a verifier, interrogator or reader.

In some applications, security arrangements are required which would prevent unauthorized parties from attaching non-genuine transponders (purporting to store data encoded by an authorised encoder) to grey or infringing goods, thereby facilitating passing the grey goods off as genuine goods.

Accordingly, it is an object of the present invention to provide a system and method with which the applicant believes transponders originating from an authorized source could be distinguished from non-genuine transponders.

According to the invention there is provided an electronic identification system, the system including:

The identity code is preferably characteristic of the encoder.

The encoder may include a memory arrangement wherein a plurality of identification codes for the encoder are stored and the means for providing an identification code may include a controller for randomly selecting one of the authorized codes.

The system may further include a central computer for generating the plurality of identification codes and for downloading the identification codes into the at least one encoder and into the at least one verifier, to constitute corresponding authorized codes.

The controller of the encoder may further include encryption means utilizing a first encryption algorithm and the identification code in a first encryption process, to provide encrypted data relating to the identification code, to form part of the data to be written into the transponder.

In a preferred embodiment the controller of the encoder is programmed randomly to select the first encryption algorithm from a first set of encryption algorithms pre-stored in the memory arrangement of the encoder.

Each encryption algorithm may be associated with a unique algorithm address in the memory arrangement of the encoder.

The algorithms may be downloaded from the central computer into the encoder upon start-up of the encoder. The algorithms are preferably also downloaded into memory locations of the verifier having corresponding addresses.

Each algorithm may include a function of at least one physical characteristic of the transponder, for example a clock frequency of circuitry of the transponder. The algorithm may be of a general form wherein the selected identification code is equal to at least one function of a suitable physical characteristic of the transponder plus a first remainder.

The data relating to the identification code and which forms part of the data to be written into the transponder may include the aforementioned first remainder. Preferably it consists of the first remainder only.

Data relating to the algorithm address of the selected algorithm may also be included in the data to be written into the memory arrangement of the transponder. The controller of the encoder may utilize a second algorithm and the data relating to the address in a second encryption process, to yield encrypted data relating to the algorithm address. The second algorithm may be of a general form wherein the algorithm address is equal to at least one function of an independent variable plus a second remainder.

The encrypted data relating to the algorithm address and which forms part of the data to be written into the transponder may include the aforementioned second remainder. Preferably it consists of the second remainder only.

The verifier may include computing means adapted to use the second algorithm to decrypt the encrypted data relating to the address for the first algorithm.

The computing means may further be programmed to retrieve the first algorithm, to input data relating to the physical characteristics of the transponder and to use said data and the first algorithm to decrypt the data relating to the identification code, to yield an output code.

The computing means of the verifier may further include a comparator for comparing the output code to the authorized codes which are stored in the memory arrangement of the verifier.

The indicating means of the verifier may include a display.

The verifier may form part of a reader for the transponders. Alternatively, it may be a separate unit.

Also included within the scope of the present invention is a method of verifying the authenticity of a transponder, the method including the steps of:

The identification code may be characteristic of the encoder.

The encoder may have a plurality of identification codes associated therewith and the method may include the step of randomly selecting one of these codes for inclusion in the data to be written into the transponder.

Further according to the method of the invention a first encryption algorithm and the selected identification code may be used in a first encryption process to yield encrypted data relating to the identification code. Preferably the first algorithm is selectable from a first set of encryption algorithms. The algorithms may include a function of at least one physical characteristic of the transponder into which the data is to be written.

Each of the first set of encryption algorithms may be accessible by the encoder from a memory arrangement thereof utilizing a respective algorithm address. The method may include the further step of including data relating to the algorithm address of the selected algorithm in the data to be written into the transponder. A second algorithm and data relating to the address of the selected algorithm may•be' utilized in a second encryption process to yield encrypted data relating to the algorithm address for inclusion in the data to be written into the transponder.

The method may further include the step of utilizing at the verifier the data relating to the algorithm address to retrieve from a memory arrangement of the verifier the algorithm utilized during the first encryption process.

The method may further include the steps of: providing computing means in the verifier with data relating to the physical characteristics of the transponder; and utilizing said data and the retrieved algorithm to decrypt the encrypted data relating to the identification code.

The method may still further include the step of comparing the decrypted data relating to the identification code to the data relating to authorized identification codes stored in a memory arrangement of the verifier.

Also included within the scope of the invention is a method of programming data into a transponder, the method including the steps of:

The physical characteristic may be the frequency of a clock of the transponder and may be measured by receiving a response signal from the transponder and utilizing the received signal to measure the clock frequency. The encrypted data may be written into the transponder by transmitting it to the transponder.

The invention will now further be described, by way of example only, with reference to the accompanying diagrams wherein:

FIG. 1 is a basic block diagram of a system according to the invention;

FIG. 2 is a block diagram showing an encoder, a transponder and a verifier forming part of the system in more detail; and

FIG. 3 is a basic flow diagram of a decoding process forming part of the method according to the invention.

An electronic identification system according to the invention is generally designated by the reference numeral 10 in FIG. 1.

The system 10 includes a central computer system 12 which manages and controls the rest of the system. The system 10 further includes a plurality of transponder encoders 14.1 to 14.3 adapted to be brought into communication with the central computer to be programmed thereby. In use, each encoder is preferably located at a source (not shown) or manufacturing plant of products to which transponders are to be secured, to program such transponders by writing data into the transponders. Each encoder has at least one, preferably eight plain-text identification (PTID) numbers or codes characteristic thereof. For example, the PTID'S associated with encoder 14.1 are numbers 121 to 128. These numbers are generated and issued by the central computer and stored in memory arrangements of each of the central computer 12, the relevant encoder and verifiers, which will be referred to hereinafter. Also stored in the central computer for downloading into the encoders and the verifiers respectively, are algorithms for encrypting data to be written into the transponders by the encoders and for decrypting the data by verifiers or readers, as will hereinafter be described. The PTID's and algorithms may from time to time be changed by the central computer 12 by downloading new numbers and algorithms, to maintain and improve the integrity and security of the system.

The system further includes a plurality of radio frequency (RF) transponders. Transponders 1.1 to 1.n are associated with encoder 14.1, transponders 2.1 to 2.n with encoder 14.2 and transponders 3.1 to 3.n with encoder 14.3.

The system still further includes a plurality of verifiers or readers (only one of which is shown at 16 in FIG. 1). The verifier includes display means 18 for displaying the outcome of an authenticity verification procedure performed in use by the verifier 16 on any of the transponders, in respect of the authenticity of an encoder used to program that transponder.

The encoders 14.1 to 14.3 are similar and therefore only encoder 14.1 will be described in more detail herebelow with reference to FIG. 2. Encoder 14.1 includes an RF transceiver 40, a controller 42 and a memory arrangement 44. Memory arrangement 44 includes a plurality of storage locations each addressable by the controller by a unique address ADD#OO to ADD#nn. The aforementioned PTID codes of the encoder 14.1, once downloaded by the central computer 12, are stored in respective ones of these locations. The aforementioned encryption algorithms or data relating thereto are also stored in respective ones of these locations and are directly or indirectly retrievable by the controller 42 by the respective addresses.

The transponders are also similar and therefore only transponder 1.1 will be described in more detail. Transponder 1.1 includes an RF transceiver 46, control circuitry 48, a clock 50 having a clock frequency fc and a memory arrangement 52.

Verifier 16 may form part of a reader (not shown) for the transponders, or may be a separate unit. The verifier 16 includes an RF transceiver 54, computing means 56, display 18 and a memory arrangement 58. The memory arrangement 58 includes a plurality of storage locations each addressable by the computing means 56 by a unique address ADD#OO to ADD#nn. The aforementioned PTID codes of the encoders are received from the central computer and stored in respective ones of these locations. The aforementioned encryption/decryption algorithms are similarly received from the central computer and stored in respective locations, or data relating to the algorithms may be stored in these locations. The algorithms are directly or indirectly retrievable by the computing means 56 by their respective addresses.

In use and as is well known in the art, a selected transponder 1.1 is brought into range of a programmed encoder 14.1. Data including data relating to the product to which the transponder is to be applied is transmitted via an RF link including transceiver 40, antenna 41, antenna 47 and transceiver 46 to the transponder. The transponder receives that data and stores the data in memory arrangement 52 forming part of the transponder. Along the distribution chain of the product, further data may similarly be written into the memory arrangement 52.

As is also well known in the art, the data may at any stage be read by a reader or verifier 16 in known manner. The verifier 16 transmits an RF energizing signal 62 to the transponder 1.1 and a virtual battery forming part of the transponder circuitry 54 is charged. The transponder responds by backscatter modulating on the energizing signal serving as carrier, a data stream including the data stored in the memory arrangement 52 and timed by the frequency fc of the clock 50. The verifier 16 in turn receives this data and may be adapted in known manner to switch the transponder just read to a sleep or the like mode, which causes the transponder to stop modulating the energizing signal.

It will be appreciated that with such a conventional system an unauthorized distributor of pirate, grey or otherwise infringing goods may simply attach a non-genuine transponder (carrying data similar to the data carried by transponders attached to genuine goods) to the grey goods. Unless sophisticated security mechanisms and methods are employed, such grey goods will not easily be identified or traced.

According to the invention, encrypted data relating to a selected one of the PTID numbers of the source encoder 14.1 is written into and stored as part of the data stored in the memory arrangement 52 of the transponder. To achieve this, the encoder controller is adapted randomly to select anyone of the eight PTID numbers. This PTID number and a selected one of the encryption algorithms are utilized by encryption means forming part of the controller in a first encryption process, to yield encrypted data relating to the PTID number. At least some of the variables to be used with the encryption algorithm are functions of measurable physical characteristics of the transponder 1.1, such as the frequency fc of the transponder clock 50. The clock frequency fc is determined from a response signal from the transponder during the programming process.

The verifier 16 in turn is adapted (as will hereinafter be described) to retrieve the relevant decryption algorithm from its memory arrangement 58, to determine the relevant physical properties of the transponder concerned and to decipher the encrypted data into a plain-text number. If the deciphered plain-text number is equal to an authorized PTID number stored in the memory arrangement 58 of the verifier 16, an “AUTHENTIC” message is displayed on display 18. If the result of the deciphering process does not correspond to an authorized PTID, a “FALSE” message is displayed.

The encryption algorithm may be of the general form:
PTID=a.f(x)+b.f(y)+c.f(z)+rem   —A
wherein

The encrypted data relating to the PTID of the encoder 14.1 and which is subsequently stored in the transponder 1.1, is preferably the remainder (rem) part only, of the above encryption process. The rem-data may be four bits in length.

As stated hereinbefore, a randomly selected first algorithm of a first set of encryption algorithms stored in the encoder 14.1 and correspondingly stored in the verifier 16 may be used to encrypt the PTID number of the encoder which is, as stated hereinbefore, randomly selected by the encoder from the available PTID numbers therefor. Data relating to the address where the selected first algorithm is stored and a second algorithm are used in a second encryption process, to yield encrypted data relating to the address of the selected first algorithm. The second algorithm is of the following general form:
AAD=d.f(m)+e.f(n)+REM   —B
wherein

The encrypted data relating to the address of the first encryption algorithm and which is to be stored in the transponder 1.1, is preferably the remainder (REM) part only of the aforementioned second encryption process. The REM-data may be four bits in length.

The data stored in the memory arrangement 52 of transponder 1.1 and which is backscatter modulated in the form of a data stream on the energizing signal 62 during a reading or verification process of the transponder, is diagrammatically illustrated in FIG. 3.

The data stream is designated 20 in FIG. 3. The REM-data 22 is utilized together with equation 8 as shown at 24, to calculate the address of the first encryption algorithm used by the encoder 14.1 to provide encrypted data relating to the randomly selected PTI number of the encoder. This address is utilized by the computing means 56 to retrieve the first algorithm from the memory arrangement 58 forming part of the verifier.

The aforementioned first algorithm, the rem-data 26 in the data stream 20 and input data 28 relating to physical characteristics (in this sample the frequency fc of the clock 50) of the transponder are utilized by the verifier 16 to calculate a plain-text output number at 30.

The plain-text output number is fed at 32 to a comparator of the computing means 56, to compare the number to a list of authorized PTID numbers stored in the memory arrangement 58 of the verifier. If the output number corresponds to one of the authorized PTID numbers, the verifier displays on display 18 the message “AUTHENTIC”. This would indicate that the transponder 1.1 has been programmed with an authorized encoder 14.1 at the source of the product. If the output number does not so correspond, it would mean that the transponder 1.1 includes fake data and has not been programmed at an authorized source of the particular product. A “FALSE” message would then be displayed on display 18.

It will be appreciated that there are many variations in detail on the method and system according to the invention without departing from the scope and spirit of the appended claims.

Turner, Christopher Gordon Gervase, Kruger, Johan Dawid

Patent Priority Assignee Title
9317009, Feb 19 2014 Xerox Corporation Systems and methods for mounting an externally readable monitoring module on a rotating customer replaceable component in an operating device
Patent Priority Assignee Title
3729362,
3956615, Jun 25 1974 IBM Corporation Transaction execution system with secure data storage and communications
4111121, Jun 07 1976 Premark FEG Corporation Multi-impression printer for pressure sensitive labels
4132583, Feb 21 1975 South Shore Machine Company, Inc. Label applicator
4496237, Aug 09 1982 Xerox Corporation Consumable status display
4516208, Nov 21 1980 Tokyo Electric Co. Ltd. Label issuing apparatus with programmable label feed
4663622, Jun 23 1980 Light Signatures, Inc. Non-counterfeitable document system
4691202, Apr 03 1984 Senelco Limited Identification systems
4783798, Mar 14 1985 ACS COMMUNICATIONS SYSTEMS INCORPORATED Encrypting transponder
4807287, Apr 06 1987 Light Signatures, Inc. Document authentication method
4839642, Jan 22 1985 Northern Illinois Gas Company Data transmission system with data verification
4846504, Aug 30 1988 CCL INDUSTRIES, INC Secure on-pack promotional coupons
4855754, Jul 21 1986 Ricoh Co., Ltd. Control device for an image recorder
4857893, Jul 18 1986 B I INCORPORATED Single chip transponder device
4870459, Nov 06 1987 MINOLTA CAMERA KABUSHIKI KAISHA, C O OSAKA KOKUSAI BUILDING, 2-30, AZUCHI-MACHI, HIGASHI-KU, OSAKA-SHI, OSAKA, 541, JAPAN Copying machine
4882604, Aug 12 1987 Minolta Camera Kabushiki Kaisha Electronic machine having time measuring function
4930915, Jan 07 1987 Oki Electric Industry Co., Ltd. Printer having means for identifying print head type
4961142, Jun 29 1988 MasterCard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
4970531, Feb 13 1987 Hitachi, Ltd. Thermal transfer printer
4993068, Nov 27 1989 Motorola, Inc. Unforgeable personal identification system
5010573, Apr 28 1989 Cryptographic system by blocs of binery data
5015834, Apr 08 1988 Toppan Printing Co., Ltd. Information card system communicable in contactless manner
5024718, Oct 18 1988 Kleinewefers GmbH Label applying apparatus
5036461, May 16 1990 Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
5041826, Feb 15 1984 Destron Fearing Corporation Identification system
5066978, Jun 02 1988 Fujitsu Limited Image forming apparatus having an exchangeable unit exchange timing indicating device
5078523, Mar 04 1988 BRADY WORLDWIDE, INC Tape cassette with identifying circuit element for printing machine
5132729, Jan 25 1990 MINOLTA CAMERA KABUSHIKI KAISHA A CORPORATION OF JAPAN Genuine security article distinguishing system for an image forming apparatus
5148534, Nov 05 1986 CISCO TECHNOLOGY, INC , A CORPORATION OF CALIFORNIA Hardware cartridge representing verifiable, use-once authorization
5167752, Oct 31 1990 CL & D Graphics Inc.; CL & D GRAPHICS INC , A CORP OF WI Apparatus for making laminated web with spaced removable elements
5189246, Sep 28 1989 CSIR Timing apparatus
5196840, Nov 05 1990 International Business Machines Corporation Secure communications system for remotely located computers
5216464, Dec 17 1990 Minolta Camera Kabushiki Kaisha Image forming apparatus having replaceable element which is replaced based on frequency of use
5229587, Nov 28 1990 Tohoku Ricoh Co., Ltd. Bar code label printer and bar code label issuing method
5239294, Jul 12 1989 Motorola, Inc Method and apparatus for authenication and protection of subscribers in telecommunication systems
5266968, Mar 27 1992 Eastman Kodak Company Non-volatile memory thermal printer cartridge
5272503, Sep 02 1992 Xerox Corporation Replaceable sub-assemblies for electrostatographic reproducing machines
5282421, Sep 28 1989 CSIR Timing apparatus
5283597, May 17 1991 Fuji Xerox Co., Ltd. Laser beam printer with automatic laser beam control
5283613, Feb 19 1993 Xerox Corporation Monitoring system with dual memory for electrophotographic printing machines using replaceable cartridges
5318370, Nov 17 1992 BRADY WORLDWIDE, INC Cartridge with data memory system and method regarding same
5333960, Nov 21 1991 SAMSUNG ELECTRONICS CO , LTD Device and method for displaying a residual amount of cartridge ribbon for a color video printer
5340968, May 07 1991 NIPPONDENSO CO , LTD Information storage medium with electronic and visual areas
5353009, Jan 04 1991 CSIR Communication system
5355413, Mar 06 1992 Renesas Electronics Corporation Authentication method performed between IC card and terminal unit and system therefor
5379344, Apr 27 1990 SCANDIC INTERNATIONAL PTY LTD Smart card validation device and method
5385416, Dec 13 1991 Sony Corporation Device for identifying an ink ribbon cartridge used in a printer
5387302, Oct 12 1992 DISPAC Method of automatically and continuously labelling articles such as fruit or vegetables, and apparatus for implementing the method
5400319, Oct 06 1993 Digital Audio Disc Corporation CD-ROM with machine-readable I.D. code
5406890, Sep 28 1989 CSIR Timing apparatus
5428659, Mar 16 1992 Eastman Kodak Company Device for transferring electrical signals and electric energy to the memory device of a cassette
5452059, Aug 27 1992 Minolta Camera Kabushiki Kaisha Image forming apparatus which stores counted value in different memories depending on condition of cover
5455617, Nov 12 1993 Eastman Kodak Company Thermal printer supply having non-volatile memory
5479467, Apr 28 1993 Kabushiki Kaisha TEC History recording apparatus
5491540, Dec 22 1994 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Replacement part with integral memory for usage and calibration data
5491751, May 21 1993 MAKEMUSISC! INC Intelligent accompaniment apparatus and method
5507489, Nov 04 1992 Info Telecom; La Francaise des Jeux Electronic game-of-chance device
5510884, Mar 24 1995 Xerox Corporation Supply accessory for a printing machine with hidden identifier
5513169, Oct 06 1993 Sony Corporation; Digital Audio Disc Corporation CD-ROM with machine-readable i.d. code
5519381, Nov 18 1992 JPMORGAN CHASE BANK, N A , AS THE SUCCESSOR AGENT Detection of multiple articles
5528222, Sep 09 1994 INTERMEC IP CORP , A CORPORATION OF DELAWARE Radio frequency circuit and memory in thin flexible package
5537105, Jan 04 1991 Zebra Technologies Corporation Electronic identification system
5541904, Nov 29 1994 Sony Corporation; Digital Audio Disc Corporation CD-ROM with machine-readable I.D. code
5544273, Jan 19 1995 ALCATEL USA, INC Fiber optic cable storage shelf and method using same
5546163, Sep 30 1993 Minolta Co., Ltd. Image forming apparatus having counters for counting frequency of use of parts
5557280, Aug 26 1992 Zebra Technologies Corporation Synchronized electronic identification system
5566441, Mar 11 1993 ZIH Corp Attaching an electronic circuit to a substrate
5568552, Sep 07 1994 Intel Corporation Method for providing a roving software license from one node to another node
5572193, Dec 07 1990 Motorola Mobility, Inc Method for authentication and protection of subscribers in telecommunications systems
5577121, Jun 09 1994 TOUCH TECHNOLOGY, INC Transaction system for integrated circuit cards
5579088, Dec 31 1993 SAMSUNG ELECTRONICS CO , LTD Image forming apparatus having programmable developer cartridge
5614278, May 10 1994 Esselte Meto International GmbH Strip of separable labels or tags having a display surface for display of information thereon
5625692, Jan 23 1995 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
5625693, Jul 07 1995 OPENTV, INC Apparatus and method for authenticating transmitting applications in an interactive TV system
5640002, Aug 15 1995 RUPPERT, JONATHAN P Portable RF ID tag and barcode reader
5660663, May 10 1994 Esselte Meto International GmbH Marking tag
5666585, Nov 28 1994 Mita Industrial Co. Ltd. Maintenance supervising system for an image-reproducing system
5699066, Aug 26 1992 Zebra Technologies Corporation Synchronized electronic identification system
5713679, Oct 07 1996 PAXAR AMERICAS, INC Apparatus for selectively dispensing liner-type and linerless-type labels
5717974, May 31 1995 SAMSUNG ELECTRONICS CO , LTD , A CORP OF KOREA Method for monitoring prescribed use periods of replaceable parts within an image forming apparatus
5724423, Sep 18 1995 Telefonaktiebolaget LM Ericsson Method and apparatus for user authentication
5724425, Jun 10 1994 Sun Microsystems, Inc Method and apparatus for enhancing software security and distributing software
5726630, Nov 18 1992 Zebra Technologies Corporation Detection of multiple articles
5754656, Aug 04 1995 Hitachi, Ltd. Electronic shopping method, electronic shopping system and document authenticating method relating thereto
5755519, Dec 04 1996 ASSA ABLOY AB Printer ribbon identification sensor
5760916, Sep 16 1996 Intellectual Ventures Fund 83 LLC Image handling system and method
5771291, Dec 11 1995 MDM GROUP User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer
5781635, Dec 29 1995 Intel Corporation Method and apparatus for improved digital message transaction model
5781708, Sep 13 1994 Intermec IP CORP Integral bar code printer and reader system and method of operation
5787174, Jun 17 1992 Round Rock Research, LLC Remote identification of integrated circuit
5787278, Dec 28 1994 Pitney Bowes Inc Method and system for generating and mailing a system performance report, utilizing a report template with predetermined control commands for controlling the printer
5797060, Jun 17 1994 Texas Instruments Incorporated; Agfa-Gevaert N.V. Electrophotographic printing subsystem with self-monitoring and adjustment
5805703, Sep 17 1991 NeXT Software, Inc. Method and apparatus for digital signature authentication
5810353, May 12 1997 Lexmark International, Inc Modular output stackers for printers
5865390, Oct 24 1996 Variable-length antenna element
5867102, Feb 27 1997 MOORE WALLACE USA LLC Electronic article surveillance label assembly and method of manufacture
5875248, Feb 25 1997 International Business Machines Corporation Method of counterfeit detection of electronic data stored on a device
5881136, Sep 10 1993 AVAYA Inc Fax overflow system
5892211, Jun 09 1994 TOUCH TECHNOLOGY, INC Transaction system comprising a first transportable integrated circuit device, a terminal, and a security device
5897741, Feb 09 1998 Premark FEG L.L.C.; PREMARK FEG L L C Apparatus for applying security tags to labels
5902437, Mar 04 1994 FLEXcon Company Inc. Method of making resonant tag labels
5907739, Mar 05 1996 Canon Kabushiki Kaisha Image forming apparatus
5907748, Jul 24 1996 Canon Kabushiki Kaisha Electrical connector, process cartridge and electrophotographic image forming apparatus
5909233, Oct 02 1992 Zebra Technologies Corporation Media transfer system for a thermal demand printer
5917911, Jan 23 1997 GENERAL DYNAMICS C4 SYSTEMS, INC Method and system for hierarchical key access and recovery
5978483, Apr 07 1997 Inkel Corporation Securely encrypted remote keyless entry system
5982295, Dec 21 1995 Denso Corporation Anti-theft device having excellent identification code overwriting capabilities
5995626, Aug 04 1995 Hitachi, Ltd. Electronic shopping method, electronic shopping system and document authenticating method relating thereto
6011937, Jun 13 1996 Sagem Communications Assembly of a printer and its consumption tank for business machine
6014533, May 12 1997 Canon Kabushiki Kaisha Connector, processing unit or process cartridge, and electrophotographic image forming apparatus
6015344, Apr 05 1996 SG GAMING, INC Prize redemption system for games
6019461, May 19 1995 Oki Data Corporation Printer and printing cartridge therefor
6019865, Jan 21 1998 MOORE NORTH AMERICA, INC Method of forming labels containing transponders
6049289, Sep 06 1996 MICROCHIP TECHNOLOGY INC Remote controlled garage door opening system
6049610, Sep 17 1991 NeXT Software, Inc. Method and apparatus for digital signature authentication
6050622, Dec 19 1991 ASSA ABLOY AB Safety sealing device
6068372, Oct 31 1997 Xerox Corporation Replaceable intermediate transfer surface application assembly
6075997, Nov 03 1997 Telefonaktiebolaget L M Ericsson (publ); TELEFONAKTIEBOLAGET L M ERICSSON PUBL Automatic configuration of antenna near parts equipment
6092888, Jun 04 1997 FUNAI ELECTRIC CO , LTD Method of transmitting raster information from a host computer to an ink jet printer and corresponding method of printing
6099178, Aug 12 1998 Eastman Kodak Company Printer with media supply spool adapted to sense type of media, and method of assembling same
6100804, Jul 16 1998 Intecmec IP Corp. Radio frequency identification system
6106166, Apr 16 1999 Eastman Kodak Company Photoprocessing apparatus for sensing type of photoprocessing consumable and method of assembling the apparatus
6118379, Dec 31 1997 Intermec IP Corp. Radio frequency identification transponder having a spiral antenna
6123796, Oct 13 1995 Antares Capital LP Method of making and applying combination article security target and printed label
6130613, Jun 09 1998 Google Technology Holdings LLC Radio frequency indentification stamp and radio frequency indentification mailing label
6163260, Dec 10 1998 Intermec IP Corp. Linerless label tracking system
6163361, Apr 23 1999 Monument Peak Ventures, LLC Digital camera including a printer for receiving a cartridge having security control circuitry
6163631, Jun 20 1997 Sharp Kabushiki Kaisha Waveguide type optical integrated circuit element and method for fabricating same
6173119, Aug 11 1999 Monument Peak Ventures, LLC Camera having radio-frequency identification transponder
6188423, Sep 15 1997 Avery Dennison Retail Information Services LLC Early thermal printhead failure prediction system
6206292, Jan 23 1999 GEMALTO SA Surface-printable RFID-transponders
6227643, May 20 1997 Eastman Kodak Company Intelligent printer components and printing system
6246326, May 05 1999 Intermec IP Corp. Performance optimized smart label printer
6249291, Sep 22 1995 NEXT SOFTWARE, INC Method and apparatus for managing internet transactions
6263170, Dec 08 1999 Xerox Corporation Consumable component identification and detection
6271928, Mar 04 1998 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Electrical storage device for a replaceable printing component
6280544, Apr 21 1999 Intermec IP Corp. RF tag application system
6285342, Oct 29 1999 Intermec IP Corp. Radio frequency tag with miniaturized resonant antenna
6286762, Sep 21 1999 Siemens Corporate Research, Inc Method and apparatus to perform a predefined search on data carriers, such as RFID tags
6290138, Sep 19 1997 Kabushiki Kaisha Toshiba Wireless data storage medium with flexible image recording section
6295423, Oct 01 1999 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Methods and systems for monitoring consumable item lifetimes for peripheral units
6312106, Apr 20 1999 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Method and apparatus for transferring information between a replaceable consumable and a printing device
6327972, Oct 07 1998 Kabushiki Kaisha Sato Printer with a device for the driving of transponder chips
6332062, Oct 01 1999 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Systems and methods for customizing user messages in a printing system
6334921, Jun 20 1998 Checkpoint Systems International GmbH Apparatus and method for manufacturing labels for electronic article surveillance
6351618, Dec 20 2000 Xerox Corporation Method of using a security system for replaceable cartridges for printing machines
6351621, Jun 26 2000 Xerox Corporation Wireless interaction with memory associated with a replaceable module for office equipment
6357503, Jun 13 1998 Pasquini und Kromer GmbH Device for producing a strip with self-adhesive labels or other materials with parts placed underneath and a device for laterally guiding edges
6363483, Nov 03 1994 QUARTERHILL INC ; WI-LAN INC Methods and systems for performing article authentication
6375298, May 20 1997 Eastman Kodak Company Intelligent printer components and printing system
6381418, Aug 11 1999 Eastman Kodak Company Print having information associated with the print stored in a memory coupled to the print
6385407, Dec 28 1998 Hitachi Maxell, Ltd Accommodating enclosure and management system
6386772, Jan 25 1999 ASSA ABLOY AB Method and apparatus for communicating between printer or laminator and supplies
6404335, Sep 19 1997 Kabushiki Kaisha Toshiba Apparatus for issuing wireless information storage media
6409401, Mar 30 2000 Zebra Technologies Corporation Portable printer with RFID encoder
6418283, Oct 02 2000 Xerox Corporation Communications cartridge
6451154, Feb 18 2000 Moore North America, Inc. RFID manufacturing concepts
6473571, Oct 02 2000 Xerox Corporation Communicating dispensing article
6487812, Dec 01 2000 Remote fish bite indicator
6490352, Mar 05 1999 Cryptographic elliptic curve apparatus and method
6490420, Dec 20 2000 Xerox Corporation Security method for a smart card
6522348, Apr 30 1998 Sagem Communications Cartridge for consumable product for a printer
6525835, Dec 15 1999 Pitney Bowes Inc.; Pitney Bowes Inc Method and system for parcel label generation
6527356, Jun 02 2000 Eastman Kodak Company Printer capable of forming an image on a receiver substrate according to type of receiver substrate and a method of assembling the printer
6532351, Jun 26 2000 Xerox Corporation Wireless interaction with memory associated with a replaceable module for office equipment
6536660, Jun 21 1999 Lincoln Global, Inc. Inventory of consumables in electric arc welding process
6539867, May 22 2000 S-PRINTING SOLUTION CO , LTD Method of replacement component communicating with printer and method of printer communicating with replacement component
6546327, Aug 29 2000 Toyota Jidosha Kabushiki Kaisha Running control apparatus and method
6557606, Oct 30 1998 Checkpoint Systems International GmbH Device and method for inserting a security and/or identification element between two layers of a marking strip for items of baggage
6557758, Oct 01 1999 Moore North America, Inc. Direct to package printing system with RFID write/read capability
6588658, Jun 23 2000 ABNOTE USA, INC Transaction card with attached auxiliary member
6592035, Sep 27 2001 ABNOTE USA, INC Method and apparatus for rapid, serial transaction item fabrication
6593853, Feb 18 2000 BRADY WORLDWIDE, INC RFID label printing system
6593952, Jun 14 1999 Sony Corporation Printer system, printer apparatus, printing method, ink ribbon and printing medium
6597465, Aug 09 1994 Intermec IP CORP; Intermec IP Corporation Automatic mode detection and conversion system for printers and tag interrogators
6603497, Apr 08 1999 ABLECO FINANCE LLC, AS COLLATERAL AGENT Replaceable donor sheet assembly with memory for use with a thermal printer
6629134, Sep 16 1999 Xerox Corporation Context sensitive web-based user support
6634814, Aug 12 1998 Eastman Kodak Company Printer media supply spool adapted to allow the printer to sense type of media, and method of assembling same
6636702, Oct 06 2000 Kabushiki Kaisha Toshiba Identifying apparatus, apparatus to be identified, identifying method, and printing apparatus
6644544, Jun 16 1999 Eastman Kodak Company Imaging apparatus capable of forming an image consistent with type of imaging consumable loaded therein and method of assembling the apparatus
6644771, Jul 12 1997 Memjet Technology Limited Printing cartridge with radio frequency identification
6683638, Feb 23 2001 Oki Data Corporation Print head and image forming apparatus using multiplexed compensation data
6687634, Jun 08 2001 HEWLETT-PACKARD DEVELOPMENT COMPANY L P Quality monitoring and maintenance for products employing end user serviceable components
6694884, Jan 25 1999 ASSA ABLOY AB Method and apparatus for communicating between printer and card supply
6708005, Mar 09 2001 Canon Kabushiki Kaisha Image forming apparatus and method of controlling memory thereof
6714745, Jan 28 2000 Canon Kabushiki Kaisha Image forming apparatus having a plurality of image forming stations, and unit detachably mountable on the apparatus
6722753, Sep 03 1998 Hewlett-Packard Company Method and apparatus for checking compatibility of a replaceable printing component
6724895, Jun 18 1998 Zebra Technologies Corporation Electronic identification system and method with source authenticity verification
6735399, May 17 2002 Xerox Corporation Post-launch process optimization of replaceable sub-assembly utilization through customer replaceable unit memory programming
6738903, Oct 01 1999 HEWLETT-PACKARD DEVELOPMENT COMPANY L P Password protected memory on replaceable components for printing devices
6748182, Sep 26 2000 Hitachi, Ltd. Replacing part containing consumable part and image forming apparatus using replacing part
6791704, Oct 23 1998 Canon Kabushiki Kaisha Method and device for managing printing product resources available in a printer
6793307, Jun 02 2000 Eastman Kodak Company Printer capable of forming an image on a receiver substrate according to type of receiver substrate and a method of assembling the printer
6798997, Sep 16 1999 Xerox Corporation Supply ordering apparatus
6802659, Aug 04 1997 INTERMED IP CORP Arrangement for automatic setting of programmable devices and materials therefor
6807380, Mar 19 2002 Fuji Xerox Co., Ltd. Wireless communication system and image forming device
6808255, Oct 01 1999 HEWLETT-PACKARD DEVELOPMENT COMPANY L P Storage of printing device usage data on a printing device replaceable component
6820039, Apr 19 2002 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Facilitating device upkeep
6832866, Jan 25 1999 ASSA ABLOY AB Printer or laminator supply
6879785, Mar 11 2002 Kyocera Mita Corporation Image forming apparatus having reusable unit and reusable unit with indicator of record on use
6894711, Jun 21 2002 DAI NIPPON PRINTING CO , LTD Thermal transfer recording web roll
6932527, Jan 25 1999 ASSA ABLOY AB Card cartridge
6954533, Jun 18 1998 Zebra Technologies Corporation Electronic identification system and method with source authenticity
6963351, Dec 21 2001 Entrust Corporation Radio frequency identification tags on consumable items used in printers and related equipment
6986057, Aug 07 2000 Maxim Integrated Products, Inc Security device and method
7018117, Jan 25 1999 ASSA ABLOY AB Identification card printer ribbon cartridge
7031946, Dec 28 1999 COLLABO INNOVATIONS, INC Information recording medium, noncontact IC tag, access device, access system, life cycle management system, input/output method, and access method
7137000, Aug 24 2001 Zebra Technologies Corporation Method and apparatus for article authentication
7147165, Nov 17 2003 ENTRUST DATACARD CORPORATION Adapting element for programmable electronic holders
7183505, Aug 14 2003 ENTRUST DATACARD CORPORATION Adapting element for programmable electronic holders and use in a multipurpose personalization machine
7206010, Apr 16 2004 Zebra Technologies Corporation Systems and methods for providing a media located on a spool and/or a cartridge where the media includes a wireless communication device attached thereto
7228433, Jun 16 1999 Zebra Technologies Corporation Electronic identification system and method with source authenticity
7237485, Jan 25 1999 ASSA ABLOY AB Print supply monitoring
7430762, Mar 01 2002 ASSA ABLOY AB Identification card manufacturing security
7664257, Aug 24 2001 Zebra Technologies Corporation Method and apparatus for article authentication
20010027443,
20010029857,
20010048361,
20010056409,
20020062898,
20020145036,
20020170973,
20020195194,
20020195195,
20030063002,
20030089444,
20030128269,
20030183329,
20030189490,
20040109715,
20040114981,
20050275708,
20060123471,
20060203075,
20070056027,
20070057057,
20080316523,
AU743556,
D347021, Sep 08 1992 Zebra Technologies Corporation Thermal transfer printer
DE19653113,
EP595549,
EP878403,
EP1016037,
GB2303613,
JP11263025,
JP2000062273,
JP2000246921,
JP2000355146,
JP2001001424,
JP2001096814,
JP2001215779,
JP2001510912,
JP2002334313,
JP2003011931,
JP2003011939,
JP2003159838,
JP2003207984,
JP3220572,
JP409185324,
JP4371026,
JP5335969,
JP6124369,
JP6246281,
JP9104189,
RU2120387,
RU2147790,
SE96044029,
SU1069276,
WO7807,
WO43932,
WO47410,
WO100492,
WO115382,
WO157807,
WO161646,
WO235463,
WO3019459,
WO3029005,
WO9608092,
WO9628941,
WO9711530,
WO9839734,
WO9852762,
///////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Jun 05 2009ZIH Corp.(assignment on the face of the patent)
Oct 27 2014ZIH CorpMORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENTSECURITY AGREEMENT0341140270 pdf
Oct 27 2014Laser Band, LLCMORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENTSECURITY AGREEMENT0341140270 pdf
Oct 27 2014Zebra Enterprise Solutions CorpMORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENTSECURITY AGREEMENT0341140270 pdf
Oct 27 2014Symbol Technologies, IncMORGAN STANLEY SENIOR FUNDING, INC AS THE COLLATERAL AGENTSECURITY AGREEMENT0341140270 pdf
Sep 07 2017MORGAN STANLEY SENIOR FUNDING, INC , AS THE EXISTING AGENTJPMORGAN CHASE BANK, N A , AS THE SUCCESSOR AGENTPATENT SECURITY INTEREST ASSIGNMENT AGREEMENT0447910842 pdf
Dec 20 2018ZIH CorpZebra Technologies CorporationMERGER SEE DOCUMENT FOR DETAILS 0488840618 pdf
Date Maintenance Fee Events
Dec 05 2014M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Nov 21 2018M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
May 14 20164 years fee payment window open
Nov 14 20166 months grace period start (w surcharge)
May 14 2017patent expiry (for year 4)
May 14 20192 years to revive unintentionally abandoned end. (for year 4)
May 14 20208 years fee payment window open
Nov 14 20206 months grace period start (w surcharge)
May 14 2021patent expiry (for year 8)
May 14 20232 years to revive unintentionally abandoned end. (for year 8)
May 14 202412 years fee payment window open
Nov 14 20246 months grace period start (w surcharge)
May 14 2025patent expiry (for year 12)
May 14 20272 years to revive unintentionally abandoned end. (for year 12)