top of page

I discovered that a patent was really like buying a lottery ticket to a lawsuit

Elon Musk

Open Domain IP

Protecting to in-the-clear inventory labeling with non-collision, unique random serial numbers in order to prevent forward guessing by bad actors.

Abstract: In an anti-counterfeit system and method, a set of identification codes are generated from data associated with units from a line of items. Universal labeling standards currently require a product to carry within its item unit identification (IUID). The IUID contains a series of identifying strings that are used to ascertain the manufacturer, product type, batch of production, expiration date and a unit serial number that, when concatenated with the batch, allows the identification of one unit from another even if all label and physical attributes are similar to the rest of that batch. Current implementations of IUID’s allow bad actors to forward-predict the IUID of future production runs and label their fake products with concocted IUID’s. Their counterfeit product labels become indistinguishable from genuinely labeled products because they are using future valid number strings.

Ensuring the correct routing of electronic product verification messages for physical Identifiers through the use of domain or subdomain message routing through the manufacturer’s public URL

Abstract: In an anti-counterfeit system and method unique product identifiers or codes are used to identify each unique item manufactured allowing each single item to be distinguished from all other alike items. Furthermore, the manufacturers of these items provide an electronic verification capability for each unique code they have used to label an item. This invention simply requires these messages to be routed directly to the public website Uniform Resource locator URL domain or subdomain and then to be redirected to either the manufacturer’s own electronic verification capability, or, as is more commonly practised, on to their respective third party service provider, thus providing surety that the verifying party controls both the public facing URL, and any redirects it then makes, of the product being queried for verification.

Encrypted, anonymized, and obfuscated communication of status and state changes for electronic physical product Identifiers.  

Abstract:  A process, In a system or network of computers where two or more parties wish to isolate and protect their information about electronic physical product identifiers but wish to share the state, status, part or all of their records for that item if another correctly credentialed participant presents an obscured but identical set of identifiers to those of an item of which they have knowledge.

Same or Better Non Fungible Token.​ (SorB NFT)

Abstract: This invention allows the electronic representation of inventory real world assets on a rolling basis, taking into account inflows and outflows through sales and resupply without requiring each individual item to have its own electronic non fungible token but instead grouping like for like items together but ensuring either the count, and or consideration and or age profile of the the underlying assets remain the same or greater than the original issuance. This reduces the cost of issuing electronic representations of inventory and protects the integrity of the non fungible token as it further prevents degradation of value by exchanging items with longer expiration for items for shorter expiration.

Anti-counterfeiting system and method

Abstract: In an anti-counterfeiting system and method, a set of identification codes are generated from data associated with units of a line of items. A manufacturer affixes machine readable forms of such identification codes to units of an item, and scans or reads the affixed identification codes before distribution of the units in order to flag only affixed identification codes as “active”. Thereafter, when a user scans or reads the machine readable form of an affixed identification code from a unit of some item, such as by using a “smart phone”, the identification code value is transmitted for verification and validation, and subjected to selected computer based tests to determine the authenticity of the identification code and thus of the associated unit. The user is provided with feedback as to the genuineness of the unit, or is contacted by or directed to contact a representative of the manufacturer if doubt exists.

bottom of page