US 12,067,440 B2
Systems and methods for generating secure tags
Iain James McDonald, Vaucluse (AU); Patrick Rene Philippe Michel, Mosman (AU); Anthony Surtees, Watsons Bay (AU); and Morgan Lean, Erskineville (AU)
Assigned to Laava ID Pty Ltd, Surry Hills (AU)
Filed by Laava ID Pty Ltd, Surry Hills (AU)
Filed on Dec. 13, 2022, as Appl. No. 18/065,319.
Application 18/065,319 is a continuation of application No. 17/249,550, filed on Mar. 4, 2021, granted, now 11,544,519.
Application 17/249,550 is a continuation of application No. 16/736,524, filed on Jan. 7, 2020, granted, now 10,970,615, issued on Apr. 6, 2021.
Application 16/736,524 is a continuation of application No. 16/528,150, filed on Jul. 31, 2019, granted, now 10,565,490, issued on Feb. 18, 2020.
Application 16/528,150 is a continuation of application No. 16/299,981, filed on Mar. 12, 2019, granted, now 10,474,945, issued on Nov. 12, 2019.
Application 16/299,981 is a continuation of application No. PCT/IB2018/000915, filed on Jul. 20, 2018.
Claims priority of provisional application 62/535,201, filed on Jul. 20, 2017.
Prior Publication US 2023/0342582 A1, Oct. 26, 2023
Int. Cl. G06K 19/08 (2006.01); G06K 19/07 (2006.01); G06K 19/14 (2006.01); G06K 19/18 (2006.01); G06Q 10/0833 (2023.01); G06Q 30/00 (2023.01); G06Q 30/018 (2023.01); H04L 9/08 (2006.01)
CPC G06K 19/145 (2013.01) [G06K 19/07 (2013.01); G06K 19/18 (2013.01); G06Q 10/0833 (2013.01); G06Q 30/00 (2013.01); G06Q 30/018 (2013.01); H04L 9/0861 (2013.01); H04L 2209/805 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A secure tag system, comprising:
at least one processor; and
at least one non-transitory memory containing instructions that, when executed by the at least one processor, cause the secure tag system to perform operations comprising:
receiving a request from a first user for a digital product;
generating a first secure tag associated with the digital product and the first user, generation including selection of first tag features from a superset of potential first tag features for inclusion in the secure tag and selection of second tag features, the second tag features being the presence of connections between at least a subset of the first tag features;
providing the first secure tag to the first user; and
providing the digital product.