Patents by Inventor John B. Holz
John B. Holz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9734442Abstract: A security feature and a method for creating a barcode are disclosed. Data is concatenating to be represented in the barcode. The concatenated data is partitioned into n-bit segments. The formatted data is encoded by assigning a respective code to each n-bit segment. The barcode is created using the encoded data.Type: GrantFiled: April 9, 2008Date of Patent: August 15, 2017Assignee: NCR CorporationInventors: Eric William Zwirner, John B. Holz
-
Patent number: 9460948Abstract: A package is provided for use with a track-and-trace data management system. The package comprises a base defining a plurality of compartments, each compartment containing an item, and a cover enclosing the compartments to retain each item inside a respective compartment. Each item carries a unique item code, and the package includes at least one unique security code. The relationship between the unique item code and the at least one unique security code is maintained by the data management system.Type: GrantFiled: December 20, 2007Date of Patent: October 4, 2016Assignee: NCR CorporationInventors: Peter A. Suorsa, John B. Holz, Joseph D. Roth
-
Patent number: 8496185Abstract: A secure identification card is created. The secure identification card includes a first identifying item of information. A first covert marker is applied to the secure identification card. The first covert marker is associated with the first identifying item of information such that the secure identification card is recognized as authentic only if the association between the first covert marker and the first identifying item of information is recognized. The association between the first covert marker and the first identifying item of information is stored at a site that can be used to monitor the use of the secure identification card at a plurality of locations.Type: GrantFiled: June 10, 2008Date of Patent: July 30, 2013Assignee: NCR CorporationInventors: John B. Holz, Peter A. Suorsa
-
Patent number: 8317098Abstract: A method of enabling subsequent validation of an item having a data tag. Data may be read from a tag using an electronic reader. A readable marker, such as a barcode, may be selected from a plurality of different readable markers and applied in proximity to the tag. An association request can be created and communicated to a database, where the association request comprises data from the tag and data relating to the selected readable marker, so that the database may use data from the association request for subsequent validation of the tag. An authentication database for recording an association between a data tag and a readable marker applied to an item carrying that data tag are also described.Type: GrantFiled: December 1, 2006Date of Patent: November 27, 2012Assignee: NCR CorporationInventors: Joseph D. Roth, John B. Holz
-
Patent number: 7845553Abstract: A data management system comprises a data store for storing at least one entry. The entry includes (i) information associated with an item, and (ii) information about a security feature associated with that item. The system also includes an authenticator operable to access the data store in response to a request from a remote reader. The authenticator includes (i) a reader validator to authenticate the remote reader, and (ii) a security feature validator to authenticate a security feature read by the remote reader. The authenticator is also operable to issue an authenticity confirmation in the event that a security feature is successfully validated. The system includes a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.Type: GrantFiled: November 17, 2006Date of Patent: December 7, 2010Assignee: NCR CorporationInventors: John B. Holz, Joseph D. Roth
-
Patent number: 7805609Abstract: A method of charging for secure data management and item authentication. The method includes charging an initiation fee to a customer to create an entry for an item owned or manufactured by the customer. The entry may include (i) information associated with the item, and (ii) information about a security feature associated with that item. The method also includes charging an annual maintenance fee to maintain the entry for the customer; and charging an authentication fee each time the customer requests authentication of the item. The method may also include charging a lease fee to a customer for each secure reader the customer leases, where a secure reader is required to request authentication of an item.Type: GrantFiled: November 17, 2006Date of Patent: September 28, 2010Assignee: NCR CorporationInventors: John B. Holz, Joseph D. Roth
-
Publication number: 20090327701Abstract: An ID card is authenticated. Encrypted data is read from a first security feature on the ID card. A value is computed based on the encrypted data. Unencrypted data is read from a second security feature on the ID card. The value and the unencrypted data is transmitted to an authentication center. An authentication message is received from the authentication center.Type: ApplicationFiled: May 30, 2008Publication date: December 31, 2009Inventor: John B. Holz
-
Publication number: 20090179073Abstract: A secure identification card is created. The secure identification card includes a first identifying item of information. A first covert marker is applied to the secure identification card. The first covert marker is associated with the first identifying item of information such that the secure identification card is recognized as authentic only if the association between the first covert marker and the first identifying item of information is recognized. The association between the first covert marker and the first identifying item of information is stored at a site that can be used to monitor the use of the secure identification card at a plurality of locations.Type: ApplicationFiled: June 10, 2008Publication date: July 16, 2009Inventors: John B. Holz, Peter A. Suorsa
-
Publication number: 20090108081Abstract: A security feature and a method for creating a barcode are disclosed. Data is concatenating to be represented in the barcode. The concatenated data is partitioned into n-bit segments. The formatted data is encoded by assigning a respective code to each n-bit segment. The barcode is created using the encoded data.Type: ApplicationFiled: April 9, 2008Publication date: April 30, 2009Inventors: Eric William Zwirner, John B. Holz
-
Publication number: 20090057421Abstract: A package is provided for use with a track-and-trace data management system. The package comprises a base defining a plurality of compartments, each compartment containing an item, and a cover enclosing the compartments to retain each item inside a respective compartment. Each item carries a unique item code, and the package includes at least one unique security code. The relationship between the unique item code and the at least one unique security code is maintained by the data management system.Type: ApplicationFiled: December 20, 2007Publication date: March 5, 2009Inventors: Peter A. Suorsa, John B. Holz, Joseph D. Roth
-
Patent number: 7494062Abstract: A secure reader for reading a spatial code and a security feature. The secure reader comprises: (i) a security module, and (ii) a read engine for reading both a spatial code and a security feature carried by an item. The security module is operable to transmit a unique reader identification each time an authentication request is sent to a data management system. The spatial code may be a barcode, such as a two-dimensional barcode. The security module may include tamper responsive sensors for destroying any stored data in the event that the security module is tampered with. The security module may also include a unique identification conveyed to the data management system as part of an authentication request to allow the secure reader to be identified by the data management system.Type: GrantFiled: November 17, 2006Date of Patent: February 24, 2009Assignee: NCR CorporationInventors: John B. Holz, Joseph D. Roth, Christopher P. Ricci, Donald J. Pettini
-
Publication number: 20080128492Abstract: A method of enabling subsequent validation of an item having a data tag. Data may be read from a tag using an electronic reader. A readable marker, such as a barcode, may be selected from a plurality of different readable markers and applied in proximity to the tag. An association request can be created and communicated to a database, where the association request comprises data from the tag and data relating to the selected readable marker, so that the database may use data from the association request for subsequent validation of the tag. An authentication database for recording an association between a data tag and a readable marker applied to an item carrying that data tag are also described.Type: ApplicationFiled: December 1, 2006Publication date: June 5, 2008Inventors: Joseph D. Roth, John B. Holz
-
Publication number: 20080129037Abstract: A method and system for tagging an item with a security feature to allow subsequent authentication of the item. The system includes a secure reader for reading both a unique code on an item, such as a barcode, and a security feature applied to the item. The system may be used with a batch of security features for individual application to the item to tag the item. A database is also provided for storing for each tagged item details of (i) the unique code on the item, and (ii) the security feature for that tagged item.Type: ApplicationFiled: December 1, 2006Publication date: June 5, 2008Inventors: Joseph D. Roth, John B. Holz
-
Publication number: 20080116271Abstract: A secure reader for reading a spatial code and a security feature. The secure reader comprises: (i) a security module, and (ii) a read engine for reading both a spatial code and a security feature carried by an item. The security module is operable to transmit a unique reader identification each time an authentication request is sent to a data management system. The spatial code may be a barcode, such as a two-dimensional barcode. The security module may include tamper responsive sensors for destroying any stored data in the event that the security module is tampered with. The security module may also include a unique identification conveyed to the data management system as part of an authentication request to allow the secure reader to be identified by the data management system.Type: ApplicationFiled: November 17, 2006Publication date: May 22, 2008Inventors: John B. Holz, Joseph D. Roth, Christopher P. Ricci, Donald J. Pettini
-
Publication number: 20080120151Abstract: A method of charging for secure data management and item authentication. The method includes charging an initiation fee to a customer to create an entry for an item owned or manufactured by the customer. The entry may include (i) information associated with the item, and (ii) information about a security feature associated with that item. The method also includes charging an annual maintenance fee to maintain the entry for the customer; and charging an authentication fee each time the customer requests authentication of the item. The method may also include charging a lease fee to a customer for each secure reader the customer leases, where a secure reader is required to request authentication of an item.Type: ApplicationFiled: November 17, 2006Publication date: May 22, 2008Inventors: John B. Holz, Joseph D. Roth
-
Publication number: 20080120710Abstract: A data management system comprises a data store for storing at least one entry. The entry includes (i) information associated with an item, and (ii) information about a security feature associated with that item. The system also includes an authenticator operable to access the data store in response to a request from a remote reader. The authenticator includes (i) a reader validator to authenticate the remote reader, and (ii) a security feature validator to authenticate a security feature read by the remote reader. The authenticator is also operable to issue an authenticity confirmation in the event that a security feature is successfully validated: The system includes a port for coupling the remote reader and the authenticator to enable requests to be transmitted from the reader to the authenticator and responses to be transmitted from the authenticator to the remote reader.Type: ApplicationFiled: November 17, 2006Publication date: May 22, 2008Inventors: John B. Holz, Joseph D. Roth