Patent 5768384
Prior art
Earlier patents, publications, and products that may anticipate or render the claims unpatentable.
Active provider: Google · gemini-2.5-pro
Prior art
Earlier patents, publications, and products that may anticipate or render the claims unpatentable.
An analysis of the prior art cited during the examination of US patent 5,768,384 reveals several key references that inform the scope and patentability of the claimed invention. The following patents, cited by the USPTO examiner, are the most relevant in assessing the novelty of the claims.
Prior Art Analysis
The core of US patent 5,768,384, as detailed in its independent claims (1 and 19), lies in a system and method for generating unique, encrypted information at the point of manufacture, affixing it to an article, and later comparing that information with data from associated documents (like invoices or manifests) to authenticate the article and track it through the supply chain. A key element is the "manufacturing meter," a secure device that creates this encrypted data, often including details about the manufacturing process, location, and even the equipment operator.
The following patents were considered by the examiner and are relevant to these concepts.
1. US5592561A: Anti-counterfeiting system
- Full Citation: Moore; Lewis J., US Patent 5,592,561, filed April 14, 1994, published January 7, 1997.
- Brief Description: This patent describes a system to prevent counterfeiting by generating a unique, random, encrypted "authenticator number" for each product or document. This number is stored in a central database along with product information (like serial number, date, and place of manufacture). The authenticator number is printed on the product as a bar code. Authentication occurs by scanning the bar code, transmitting the number to the central database, and verifying that the number is valid and has not been previously used.
- Potential Anticipation of Claims: This reference is highly relevant to the core concepts of US 5,768,384.
- Claim 1: US '561 discloses a system for authenticating articles using encrypted information (
authenticator number) that is uniquely associated with an article (serial number). It describes printing this information and affixing it to the article. It also describes a means for identifying authenticity by comparing the information on the article with a central record (central data registry). While it doesn't explicitly mention a "manufacturing meter" that includes operator information, the functions of generating a unique encrypted number at the point of manufacture and associating it with production data are present. - Claim 2: The
central data registryin US '561 performs a similar function to thedata centerin claim 2, as it's a remote entity that manages the authenticating numbers. - Claims 5, 6, 9: The system in US '561 stores information such as the time/date and place of manufacture and the article's serial number in its central database, which is analogous to the encrypted information described in these claims.
- Claim 15: The use of scanners to read the authenticator number from the product is explicitly taught.
- Claim 19: The method of producing encrypted data on an article, storing associated information, and later comparing them for authentication is the central teaching of US '561.
- Claim 1: US '561 discloses a system for authenticating articles using encrypted information (
2. US5666421A: Mail processing system including data center verification for mailpieces
- Full Citation: Pitney Bowes Inc., US Patent 5,666,421, filed October 8, 1993, published September 9, 1997.
- Brief Description: This patent, assigned to the same entity as the subject patent, describes a secure postage metering system. A postage meter at a mailer's location generates a unique, encrypted number for each mailpiece. This number, along with mailing information (date, postage amount, origin ZIP code), is encoded into a 2-D barcode (indicia) printed on the mailpiece. A central data center stores this information. The postal service can then scan the barcode, decrypt it, and verify the mailpiece's authenticity and payment against the central data center's records.
- Potential Anticipation of Claims: This reference establishes the concept of a secure, remote "meter" communicating with a central "data center" for authentication purposes, which is a direct parallel to the system in US 5,768,384, albeit in the context of mail processing rather than general manufacturing.
- Claim 1: The postage meter is analogous to the
manufacturing meter. It producesencrypted informationthat isuniquely associated with eachmailpiece. A printer prints this information, which isaffixed to themailpiece. The postal service's verification system serves as themeans for identifying the authenticity. The key difference is the focus on mailpieces versus general "articles of manufacture" and the inclusion of "operator" information in claim 1. - Claim 2 & 4: The
data centerin US '421 is a direct parallel to the data center claimed here. It communicates with the remote meters to authorize postage and verify the integrity of the information generated. - Claim 3: The postage meter contains descending and ascending registers for tracking postage value, which is conceptually identical to the registers described in claim 3 for tracking the number of authorized articles.
- Claim 5: The encrypted indicia includes a
time stamp(date of mailing).
- Claim 1: The postage meter is analogous to the
3. US5384846A: System and apparatus for controlled production of a secure identification card
- Full Citation: Pitney Bowes Inc., US Patent 5,384,846, filed April 26, 1993, published January 24, 1995.
- Brief Description: This patent details a system for creating secure ID cards. An "authenticator" device, similar to a postage meter, controls the card printer. It receives personal data for the cardholder, generates a unique encrypted validation number based on that data, and causes the printer to print the data and the encrypted number onto the card. The system uses secure registers to track the number of cards produced versus the number authorized by a central data center.
- Potential Anticipation of Claims: This reference introduces the concept of a secure "authenticator" device controlling a printer to produce an authenticated item (an ID card) and including encrypted personal data.
- Claim 1: The "authenticator" is a
manufacturing meter. It producesencrypted informationassociated with the card and theoperator(in this case, the cardholder). The printer affixes this information to the article (the ID card). This system strongly anticipates the hardware and process flow, with the primary distinction being the application to ID cards instead of general manufactured goods. - Claims 2, 3, 4: This patent explicitly teaches a remote
data centerthat authorizes a specific number of cards to be printed. The authenticator device containsdescendingandascendingregisters to track this usage, and the system is designed for forensic integrity, directly aligning with these dependent claims.
- Claim 1: The "authenticator" is a
4. US5426700A: Method and apparatus for verification of classes of documents
- Full Citation: Pitney Bowes Inc., US Patent 5,426,700, filed August 23, 1993, published June 20, 1995.
- Brief Description: This system authenticates documents by printing an encrypted number on them derived from the document's content (e.g., dollar amount on a check, tracking number on a shipping document). To verify the document, a scanner reads the content and the encrypted number. A verification device then re-encrypts the scanned content and compares the result to the encrypted number on the document. A match confirms the document's authenticity and that its contents have not been altered.
- Potential Anticipation of Claims: This patent is relevant for its teaching of comparing encrypted data on an item with information derived from the item itself or associated documents.
- Claim 1 & 19: This reference discloses the core comparison step for authentication. It describes creating encrypted information (
means for producing information that is used to identify the manufactured article) and latercomparing the encrypted information printed on the article with the information produced. This aligns closely with the final element of claim 1 and the comparison step in method claim 19.
- Claim 1 & 19: This reference discloses the core comparison step for authentication. It describes creating encrypted information (
Generated 4/28/2026, 4:46:10 AM