SlideShare a Scribd company logo
1 of 11
Download to read offline
Abstract
Prior Publication Data
Related U.S. Patent Documents
References Cited
Other References
Claims
Description
Technical Field
Background
Summary
Detailed Description, figures and data needed to file
the patent.
Inventors:
Mangesh Mahajan (Irvine)
Henri Duong (Irvine)
Assignee:
Jennifer Bell, Sugarsgone LLC.
Preamble Notes for Internal Presentations:
Problem with bitcoin related patents is ‘On Sale Bar’ rule under 35 U.S.C.
Section 102(b), meaning that if the invention has been on sale for over a year
then the invention is no longer patentable. Under the ‘On Sale Bar’ rule, most
patent applications could be invalid because it closely mirrors Bitcoin with
features such as making free and anonymous electronic payments and Bitcoin
has been in circulation since 2009.
Why large corporations like EBay / Amazon / Visa have failed in gaining any
patents related with Bitcoin.
Sugarsgone LLC’s patent does not infringe or invade Bitcoin as a coinage
system, but it uses Bitcoin’s property of “traceability of the block chains” to create
associative connection with “Virtual or Non virtual objects” resulting in a
database. This resulting database can be used to authenticate, certify origin and
lawful yet anonymous ownership of the object.
Patent 1
Method for authenticating and identifying handbags using Chipless RFID
tag and bitcoin’s property of “traceability of the block chains” for building
a handbag authentication database.
ABSTRACT
A radio frequency identification (RFID) tag and a method and system for communicating with the
RFID tag. The RFID tag includes a first and second structure respectively holding first data and
second data that is complementary to the first data. The RFID tag does NOT include a microchip.
An electromagnetic radio frequency signal is transmitted from an interrogator to the RFID tag.
The interrogator receives, from the RFID tag, a response signal including third data being the first
data or a combination of the first data and the second data. The interrogator extracts the third
data from the response signal. A default value equal to the combination of the first data and the
second data is stored in the interrogator. If the interrogator determines that the third data is
unequal/equal to the default value, then a screen of the interrogator displays that the RFID tag is
enabled/not enabled.
A unique electronic database stores RFID chips values and maps them in one to one
correspondence to a bitcoin account, with predetermined amount. When bag is authentically
bought/sold/transferred this associated bitcoin amount is also transferred and entry in the
database is modified.
Matching of bitcoin wallet and amount with RFID tag indicates Proof of origin/authenticity and
authentic transfer of the bag with owner’s legitimate consent.
CLAIMS
30 CLAIMS
1. A radio frequency identification (RFID) tag, comprising:
an antenna;
a first structure holding first data;
a second structure holding second data;
a first pair of strip lines electrically connecting the first structure to the antenna; and
a second pair of strip lines electrically connecting the second structure to the antenna,
wherein the second data is complementary to the first data,
wherein the RFID tag does not comprise a microchip,
wherein the RFID tag is not enabled,
wherein the antenna is configured to receive an interrogation signal from an interrogator and to
transmit the received interrogation signal simultaneously to the first and second structures via the
first and second pair of strip lines, respectively,
wherein the interrogation signal is an electromagnetic radio frequency signal,
wherein the first structure is configured to modulate the interrogation signal received from the
antenna with the first data to generate a first modulated signal and to transmit the first modulated
signal to the antenna via the first pair of strip lines,
wherein the second structure is configured to modulate the interrogation signal received from the
antenna with the second data to generate a second modulated signal and to transmit the second
modulated signal to the antenna via the second pair of strip lines,
wherein the antenna is configured to combine the first and second modulated signals to generate
a response signal comprising third data that is a combination of the first data and the second data
and to transmit the response signal to the interrogator,
wherein the second pair of strip lines are configured to be burst open by a stimulus to disconnect
the second structure from the antenna to enable the RFID tag, and
wherein if the antenna in the RFID tag after being enabled were to receive the interrogation signal
from the interrogator, then the third data in the response signal generated from the received
interrogation signal would comprise the first data and would not comprise the combination of the
first data and the second data.
2. The RFID tag of claim 1,
wherein the first and second pair of strip lines are made of a same material;
wherein an electrical resistance of the second pair of strip lines exceeds an electrical resistance
of the first pair of strip lines;
wherein the stimulus is an electromagnetic field;
wherein upon application of the electromagnetic field to the first and second pair of strip lines for
a sufficient length of time such that an electric field strength of the electromagnetic field exceeds
a specified first threshold value, the second pair of strip lines is configured to be burst open by
being heated and melted by an electric current resulting from the electric field strength and the
first pair of strip lines is configured to not be burst open.
3. The RFID tag of claim 1, wherein the first and second pair of strip lines each have a same
length, and wherein a width of each strip line of the second pair of strip lines is less than a width
of each strip line of the first pair of strip lines.
4. The RFID tag of claim 1, wherein the interrogation signal and the electromagnetic field are at
about a same radio frequency.
5. The RFID tag of claim 1, wherein the stimulus is laser light, and wherein the laser light is
configured to burst open the second pair of strip lines by melting or evaporating a portion of the
second pair of strip lines.
6. The RFID tag of claim 1, wherein the stimulus is heating, chemical action, or mechanical
action.
7. The RFID tag of claim 1, wherein each strip line of the second pair of strip lines is configured to
be burst open by the stimulus.
8. The RFID tag of claim 1,
wherein the antenna is a dipole antenna comprising a first pole and a second pole;
wherein the first structure comprises a first substrate, a first transducer at an end of the first
substrate, and one or more conductive reflectors on the first substrate configured in a first spatial
distribution that encodes the first data;
wherein the second structure comprises a second substrate, a second transducer at an end of
the second substrate, and one or more conductive reflectors on the second substrate configured
in a second spatial distribution that encodes the second data;
wherein the first pair of strip lines consist of a first strip line and a second strip line;
wherein the second pair of strip lines consist of a third strip line and a fourth strip line;
wherein the first strip line electrically connects the first transducer to the first pole;
wherein the second strip line electrically connects the first transducer to the second pole;
wherein the third strip line electrically connects the second transducer to the first pole;
wherein the fourth strip line electrically connects the second transducer to the second pole;
wherein the fourth strip line is configured to be burst open by the stimulus and the first, second,
and third strip lines are not configured to be burst open by the stimulus;
wherein the first and second substrates each comprise piezoelectric characteristics;
wherein the antenna is configured to receive transmit the received interrogation signal
simultaneously to the first and second transducers via the first and second pair of strip lines,
respectively;
wherein the first transducer is configured to transform the interrogation signal into a first surface
acoustic wave signal that travels on the first substrate and is reflected by the one or more
conductive reflectors on the first substrate back to the first transducer in a timing pattern that
generates the first modulated signal; and
wherein the second transducer is configured to transform the interrogation signal into a second
surface acoustic wave signal that travels on the second substrate and is reflected by the one or
more conductive reflectors on the second substrate back to the second transducer in a timing
pattern that generates the second modulated signal.
9. A method for communicating with a radio frequency identification (RFID) tag, wherein the RFID
tag comprises a first structure holding first data and a second structure holding second data,
wherein the second data is complementary to the first data, and wherein the RFID tag does not
comprise a microchip, said method comprising:
transmitting an interrogation signal from an interrogator to the RFID tag, wherein the interrogation
signal is an electromagnetic radio frequency signal;
after said transmitting the interrogation signal, receiving, by the interrogator from the RFID tag, a
response signal comprising third data selected from the group consisting of the first data and a
combination of the first data and the second data;
extracting, by the interrogator, the third data from the received response signal;
after said extracting, comparing, by the interrogator, the third data with a default value stored in
the interrogator, wherein the default value consists of the combination of the first data and the
second data;
if said comparing determines that the third data is unequal to the default value then displaying on
a screen of the interrogator that the RFID tag is enabled;
if said comparing determines that the third data is equal to the default value then displaying on
the screen of the interrogator that the RFID tag is not enabled.
10. The method of claim 9, wherein said comparing determines that the third data is unequal to
the default value.
11. The method of claim 9, wherein said comparing determines that the third data is equal to the
default value, and wherein the method further comprises:
responsive to said comparing having determined that the third data is equal to the default value,
enabling the RFID tag.
12. The method of claim 11,
wherein the RFID tag comprises an antenna and a first pair of strip lines electrically connecting
the first structure to the antenna;
wherein prior to said enabling the RFID tag, the RFID tag comprises a second pair of strip lines
electrically connecting the second structure to the antenna;
wherein said enabling the RFID tag comprises bursting open the second pair of strip lines by
applying a stimulus to the RFID tag to disconnect the second structure from the antenna; and
wherein if the antenna in the enabled RFID tag were to receive the interrogation signal from the
interrogator then the third data in the response signal generated from the received interrogation
signal would comprise the first data and not comprise the combination of the first data and the
second data.
13. The method of claim 12,
wherein an electrical resistance of the second pair of strip lines exceeds an electrical resistance
of the first pair of strip lines; and
wherein said applying the stimulus to the RFID tag comprises applying an electromagnetic field to
the first and second pair of strip lines for a sufficient length of time such that an electric field
strength of the electromagnetic field exceeds a specified first threshold value, resulting in the
second pair of strip lines being burst open by being heated and melted by an electric current
resulting from the electric field strength and the first pair of strip lines not being burst open.
14. The method of claim 13, wherein the method further comprises prior to said applying the
electromagnetic field to the first and second pair of strip lines:
transmitting the electromagnetic field from the interrogator to the antenna of the RFID tag,
wherein the antenna of the RFID tag is configured to receive the transmitted electromagnetic field
and to propagate the received electromagnetic field simultaneously to the first and second pair of
strip lines.
15. The method of claim 14, wherein the interrogation signal and the electromagnetic field are at
about a same radio frequency.
16. The method of claim 12, wherein said applying the stimulus to the RFID tag comprises
exposing the second pair of strip lines to laser light to melt or evaporate a portion of the second
pair of strip lines to burst open the second pair of strip lines.
17. The method of claim 12, wherein said applying the stimulus to the RFID tag comprises
applying heating, applying chemical action, or applying mechanical action to the second pair of
strip lines to burst open the second pair of strip lines.
18. The method of claim 9, wherein the third data consists of a sequence of binary values,
wherein if the RFID tag is not enabled then each binary value of the sequence of binary values is
1, and wherein if the RFID tag is enabled then the sequence of binary values comprises 0 and 1.
19. A computer usable storage medium having a computer readable program code embodied
therein, said computer readable program code containing instructions that when executed by a
processor implement the method of claim 9.
20. A system comprising a processor and a computer readable memory unit coupled to the
processor, said memory unit containing instructions that when executed by the processor
implement the method of claim 9, wherein the system comprises the interrogator, and wherein the
interrogator comprises the processor and the memory unit.
Database & associative Bitcoin Wallet Process Claims:
21. A system comprising a unique identification number generation assigned to every handbag.
, said unique identification number can be named (Bag Identification Number) (BIN) or any other
vatiable name, wherein the system comprises one is to one mapping of such number with the real
world manufactured or digitally produced virtual world handbag.
22. The system of claim 21 of generating a (Bag Identification Number) (BIN) or any other
vatiable name, wherein the computer or digital database which stores such One is to one
mapping can be established and maintained.
23. The database of claim 22 of generating a (Bag Identification Number) (BIN) or any other
vatiable name, wherein the computer or digital database which stores such One is to one
mapping can be further used to trigger a software code to generate automated unique electronic
mail IDs. These Auto generated uniqe email IDs shall be mapped in One is to one
correspondance with each Bag Identification Number entry.
24.a Unique Bag Identification Numbers with associated unique email IDs of claim 21 and 23 is
used to create a bitcoin wallet using existing digital bitcoin digital infrastructure.
24.b wherein the computer or digital database which stores such One is to one mapping of A.
(Bag Identification Number) (BIN) or any other vatiable name, B. Unique email ID C. Digital wallet
can be established and maintained.
25.a Unique Bag Identification Numbers with associated unique email IDs of claim 21 and 23 is
mapped to unique chipless RFID tag numbers affxied or attached to real world manufactured
bags.
25.b Unique Bag Identification Numbers with associated unique email IDs of claim 21 and 23 is
mapped to unique virtual chipless RFID tag numbers affxied or attached to virtual world
manufactured bags.
26. The method of claim 24.a generated Bitcoin Wallets will have a predetermied random number
generated Satoshis (Smaller amount of Bitcoin in them) Value of such a Bitcoins can be identified
as a extra security parameter.
27. The method of claim 24.a and 26 is used to claim or establish ownership of associated with
(Bag Identification Number) (BIN) or any other vatiable name, wherein the computer or digital
database which stores such One is to one mapping of claim 23. Is unique way of identificaiton of
authentic manufacturing, ownership of associated RFID Tags attached handbags of Claim 25.a.
28.a Database in claim 22 is used to validate (Digital validation, production of authentic digital
certification), wherein Bitcoin wallet ID of “point of orgin” (Manufacturer) of claim 25.a must match
in it’s value to generate such validation. (Validation 1)
28.b Database in claim 22 is used to validate (Digital validation, production of authentic digital
certification), wherein Bitcoin wallet ID of “point of orgin” (Manufacturer) of claim 26 must match in
it’s value to generate such validation. (Validation 2)
29 Change of ownership is validated and authenticated in a database if values of claim 28.a and
claim 28.b are matching.
29 In case of theft or loss of bag, Digital wallet ID owner can claim a temporary suspension of ID
verification process of claim 28.a and claim 28.b
29 Digital wallet ID of claim 24.a can be also mapped with hardware based bitcoin wallet.
30. A chipless RFID tag antenna or reader is used to identify chipless RFID tag attached or
inserted in the handbag structure of claim 25.a and communicate Unique RFID tag number to the
database of claim 22.
List of Figures
Figure 1- Chipless RFID tag embedded or attached in a handbag
Figure 2- How BIN reads chipless RFID tags.png
Figure 3- Generation, mapping and storage of database values
Figure 4-A-
Counterfeit and Stolen Bags Vs. Authentic Bags.png
Figure 4-B-
Counterfeit and Stolen Bags Vs. Authentic Bags.png
Patent 1- Sugarsgone
Patent 1- Sugarsgone
Patent 1- Sugarsgone
Patent 1- Sugarsgone

More Related Content

Viewers also liked (8)

Gantus ray regional director m
Gantus ray regional director mGantus ray regional director m
Gantus ray regional director m
 
drug like property concepts in pharmaceutical design
drug like property concepts in pharmaceutical designdrug like property concepts in pharmaceutical design
drug like property concepts in pharmaceutical design
 
Komiksowa edukacja informacyjna
Komiksowa edukacja informacyjnaKomiksowa edukacja informacyjna
Komiksowa edukacja informacyjna
 
Marihuana
MarihuanaMarihuana
Marihuana
 
Bibliostory – educational comic stories: A case-based media and information l...
Bibliostory – educational comic stories: A case-based media and information l...Bibliostory – educational comic stories: A case-based media and information l...
Bibliostory – educational comic stories: A case-based media and information l...
 
Tumores cardiacos
Tumores cardiacosTumores cardiacos
Tumores cardiacos
 
Fashion cycle , Adaption of fashion
Fashion cycle , Adaption of fashionFashion cycle , Adaption of fashion
Fashion cycle , Adaption of fashion
 
Critica del sistema Ético-Legal de la contaduría publica Colombiana
Critica del sistema Ético-Legal de la contaduría publica ColombianaCritica del sistema Ético-Legal de la contaduría publica Colombiana
Critica del sistema Ético-Legal de la contaduría publica Colombiana
 

Similar to Patent 1- Sugarsgone

5171 5175.output
5171 5175.output5171 5175.output
5171 5175.output
j1075017
 
decision denying institution- US5805504
decision denying institution- US5805504 decision denying institution- US5805504
decision denying institution- US5805504
Khaled Fekih-Romdhane
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)
Debasish Sahoo
 
Document of practice english abcd
Document of practice english abcdDocument of practice english abcd
Document of practice english abcd
Taxhidin Kadiri
 
Sample patent invalidity report analyst oserve
Sample patent invalidity report analyst oserveSample patent invalidity report analyst oserve
Sample patent invalidity report analyst oserve
AnalystO Serve
 

Similar to Patent 1- Sugarsgone (20)

5171 5175.output
5171 5175.output5171 5175.output
5171 5175.output
 
decision denying institution- US5805504
decision denying institution- US5805504 decision denying institution- US5805504
decision denying institution- US5805504
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
 
5G Patent Portfolio Auction
5G Patent Portfolio Auction5G Patent Portfolio Auction
5G Patent Portfolio Auction
 
780010
780010780010
780010
 
Wireless Patents under the PTAB’s IPR & CBM Scrutiny
Wireless Patents under the PTAB’s IPR & CBM ScrutinyWireless Patents under the PTAB’s IPR & CBM Scrutiny
Wireless Patents under the PTAB’s IPR & CBM Scrutiny
 
Patents Granted by Indian Patent Office in August 2014 - Overview
Patents Granted by Indian Patent Office in August 2014 - OverviewPatents Granted by Indian Patent Office in August 2014 - Overview
Patents Granted by Indian Patent Office in August 2014 - Overview
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)
 
LTE Essential Patent Analysis 1Q 2010
LTE Essential Patent Analysis 1Q 2010LTE Essential Patent Analysis 1Q 2010
LTE Essential Patent Analysis 1Q 2010
 
decision denying institution-8
decision denying institution-8decision denying institution-8
decision denying institution-8
 
Document of practice english abcd
Document of practice english abcdDocument of practice english abcd
Document of practice english abcd
 
5301 5305.output
5301 5305.output5301 5305.output
5301 5305.output
 
5301 5305.output
5301 5305.output5301 5305.output
5301 5305.output
 
52633
5263352633
52633
 
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
 
780003
780003780003
780003
 
780003
780003780003
780003
 
780003
780003780003
780003
 
Sample patent invalidity report analyst oserve
Sample patent invalidity report analyst oserveSample patent invalidity report analyst oserve
Sample patent invalidity report analyst oserve
 
CLASS 1.pptx
CLASS 1.pptxCLASS 1.pptx
CLASS 1.pptx
 

Patent 1- Sugarsgone

  • 1. Abstract Prior Publication Data Related U.S. Patent Documents References Cited Other References Claims Description Technical Field Background Summary Detailed Description, figures and data needed to file the patent. Inventors: Mangesh Mahajan (Irvine) Henri Duong (Irvine) Assignee: Jennifer Bell, Sugarsgone LLC. Preamble Notes for Internal Presentations: Problem with bitcoin related patents is ‘On Sale Bar’ rule under 35 U.S.C. Section 102(b), meaning that if the invention has been on sale for over a year then the invention is no longer patentable. Under the ‘On Sale Bar’ rule, most patent applications could be invalid because it closely mirrors Bitcoin with features such as making free and anonymous electronic payments and Bitcoin has been in circulation since 2009. Why large corporations like EBay / Amazon / Visa have failed in gaining any patents related with Bitcoin. Sugarsgone LLC’s patent does not infringe or invade Bitcoin as a coinage system, but it uses Bitcoin’s property of “traceability of the block chains” to create associative connection with “Virtual or Non virtual objects” resulting in a database. This resulting database can be used to authenticate, certify origin and lawful yet anonymous ownership of the object. Patent 1 Method for authenticating and identifying handbags using Chipless RFID tag and bitcoin’s property of “traceability of the block chains” for building a handbag authentication database. ABSTRACT
  • 2. A radio frequency identification (RFID) tag and a method and system for communicating with the RFID tag. The RFID tag includes a first and second structure respectively holding first data and second data that is complementary to the first data. The RFID tag does NOT include a microchip. An electromagnetic radio frequency signal is transmitted from an interrogator to the RFID tag. The interrogator receives, from the RFID tag, a response signal including third data being the first data or a combination of the first data and the second data. The interrogator extracts the third data from the response signal. A default value equal to the combination of the first data and the second data is stored in the interrogator. If the interrogator determines that the third data is unequal/equal to the default value, then a screen of the interrogator displays that the RFID tag is enabled/not enabled. A unique electronic database stores RFID chips values and maps them in one to one correspondence to a bitcoin account, with predetermined amount. When bag is authentically bought/sold/transferred this associated bitcoin amount is also transferred and entry in the database is modified. Matching of bitcoin wallet and amount with RFID tag indicates Proof of origin/authenticity and authentic transfer of the bag with owner’s legitimate consent. CLAIMS 30 CLAIMS 1. A radio frequency identification (RFID) tag, comprising: an antenna; a first structure holding first data; a second structure holding second data; a first pair of strip lines electrically connecting the first structure to the antenna; and a second pair of strip lines electrically connecting the second structure to the antenna, wherein the second data is complementary to the first data, wherein the RFID tag does not comprise a microchip, wherein the RFID tag is not enabled, wherein the antenna is configured to receive an interrogation signal from an interrogator and to transmit the received interrogation signal simultaneously to the first and second structures via the first and second pair of strip lines, respectively, wherein the interrogation signal is an electromagnetic radio frequency signal, wherein the first structure is configured to modulate the interrogation signal received from the antenna with the first data to generate a first modulated signal and to transmit the first modulated signal to the antenna via the first pair of strip lines, wherein the second structure is configured to modulate the interrogation signal received from the antenna with the second data to generate a second modulated signal and to transmit the second modulated signal to the antenna via the second pair of strip lines,
  • 3. wherein the antenna is configured to combine the first and second modulated signals to generate a response signal comprising third data that is a combination of the first data and the second data and to transmit the response signal to the interrogator, wherein the second pair of strip lines are configured to be burst open by a stimulus to disconnect the second structure from the antenna to enable the RFID tag, and wherein if the antenna in the RFID tag after being enabled were to receive the interrogation signal from the interrogator, then the third data in the response signal generated from the received interrogation signal would comprise the first data and would not comprise the combination of the first data and the second data. 2. The RFID tag of claim 1, wherein the first and second pair of strip lines are made of a same material; wherein an electrical resistance of the second pair of strip lines exceeds an electrical resistance of the first pair of strip lines; wherein the stimulus is an electromagnetic field; wherein upon application of the electromagnetic field to the first and second pair of strip lines for a sufficient length of time such that an electric field strength of the electromagnetic field exceeds a specified first threshold value, the second pair of strip lines is configured to be burst open by being heated and melted by an electric current resulting from the electric field strength and the first pair of strip lines is configured to not be burst open. 3. The RFID tag of claim 1, wherein the first and second pair of strip lines each have a same length, and wherein a width of each strip line of the second pair of strip lines is less than a width of each strip line of the first pair of strip lines. 4. The RFID tag of claim 1, wherein the interrogation signal and the electromagnetic field are at about a same radio frequency. 5. The RFID tag of claim 1, wherein the stimulus is laser light, and wherein the laser light is configured to burst open the second pair of strip lines by melting or evaporating a portion of the second pair of strip lines. 6. The RFID tag of claim 1, wherein the stimulus is heating, chemical action, or mechanical action. 7. The RFID tag of claim 1, wherein each strip line of the second pair of strip lines is configured to be burst open by the stimulus. 8. The RFID tag of claim 1, wherein the antenna is a dipole antenna comprising a first pole and a second pole; wherein the first structure comprises a first substrate, a first transducer at an end of the first substrate, and one or more conductive reflectors on the first substrate configured in a first spatial distribution that encodes the first data; wherein the second structure comprises a second substrate, a second transducer at an end of the second substrate, and one or more conductive reflectors on the second substrate configured in a second spatial distribution that encodes the second data; wherein the first pair of strip lines consist of a first strip line and a second strip line;
  • 4. wherein the second pair of strip lines consist of a third strip line and a fourth strip line; wherein the first strip line electrically connects the first transducer to the first pole; wherein the second strip line electrically connects the first transducer to the second pole; wherein the third strip line electrically connects the second transducer to the first pole; wherein the fourth strip line electrically connects the second transducer to the second pole; wherein the fourth strip line is configured to be burst open by the stimulus and the first, second, and third strip lines are not configured to be burst open by the stimulus; wherein the first and second substrates each comprise piezoelectric characteristics; wherein the antenna is configured to receive transmit the received interrogation signal simultaneously to the first and second transducers via the first and second pair of strip lines, respectively; wherein the first transducer is configured to transform the interrogation signal into a first surface acoustic wave signal that travels on the first substrate and is reflected by the one or more conductive reflectors on the first substrate back to the first transducer in a timing pattern that generates the first modulated signal; and wherein the second transducer is configured to transform the interrogation signal into a second surface acoustic wave signal that travels on the second substrate and is reflected by the one or more conductive reflectors on the second substrate back to the second transducer in a timing pattern that generates the second modulated signal. 9. A method for communicating with a radio frequency identification (RFID) tag, wherein the RFID tag comprises a first structure holding first data and a second structure holding second data, wherein the second data is complementary to the first data, and wherein the RFID tag does not comprise a microchip, said method comprising: transmitting an interrogation signal from an interrogator to the RFID tag, wherein the interrogation signal is an electromagnetic radio frequency signal; after said transmitting the interrogation signal, receiving, by the interrogator from the RFID tag, a response signal comprising third data selected from the group consisting of the first data and a combination of the first data and the second data; extracting, by the interrogator, the third data from the received response signal; after said extracting, comparing, by the interrogator, the third data with a default value stored in the interrogator, wherein the default value consists of the combination of the first data and the second data; if said comparing determines that the third data is unequal to the default value then displaying on a screen of the interrogator that the RFID tag is enabled; if said comparing determines that the third data is equal to the default value then displaying on the screen of the interrogator that the RFID tag is not enabled. 10. The method of claim 9, wherein said comparing determines that the third data is unequal to the default value. 11. The method of claim 9, wherein said comparing determines that the third data is equal to the default value, and wherein the method further comprises:
  • 5. responsive to said comparing having determined that the third data is equal to the default value, enabling the RFID tag. 12. The method of claim 11, wherein the RFID tag comprises an antenna and a first pair of strip lines electrically connecting the first structure to the antenna; wherein prior to said enabling the RFID tag, the RFID tag comprises a second pair of strip lines electrically connecting the second structure to the antenna; wherein said enabling the RFID tag comprises bursting open the second pair of strip lines by applying a stimulus to the RFID tag to disconnect the second structure from the antenna; and wherein if the antenna in the enabled RFID tag were to receive the interrogation signal from the interrogator then the third data in the response signal generated from the received interrogation signal would comprise the first data and not comprise the combination of the first data and the second data. 13. The method of claim 12, wherein an electrical resistance of the second pair of strip lines exceeds an electrical resistance of the first pair of strip lines; and wherein said applying the stimulus to the RFID tag comprises applying an electromagnetic field to the first and second pair of strip lines for a sufficient length of time such that an electric field strength of the electromagnetic field exceeds a specified first threshold value, resulting in the second pair of strip lines being burst open by being heated and melted by an electric current resulting from the electric field strength and the first pair of strip lines not being burst open. 14. The method of claim 13, wherein the method further comprises prior to said applying the electromagnetic field to the first and second pair of strip lines: transmitting the electromagnetic field from the interrogator to the antenna of the RFID tag, wherein the antenna of the RFID tag is configured to receive the transmitted electromagnetic field and to propagate the received electromagnetic field simultaneously to the first and second pair of strip lines. 15. The method of claim 14, wherein the interrogation signal and the electromagnetic field are at about a same radio frequency. 16. The method of claim 12, wherein said applying the stimulus to the RFID tag comprises exposing the second pair of strip lines to laser light to melt or evaporate a portion of the second pair of strip lines to burst open the second pair of strip lines. 17. The method of claim 12, wherein said applying the stimulus to the RFID tag comprises applying heating, applying chemical action, or applying mechanical action to the second pair of strip lines to burst open the second pair of strip lines. 18. The method of claim 9, wherein the third data consists of a sequence of binary values, wherein if the RFID tag is not enabled then each binary value of the sequence of binary values is 1, and wherein if the RFID tag is enabled then the sequence of binary values comprises 0 and 1.
  • 6. 19. A computer usable storage medium having a computer readable program code embodied therein, said computer readable program code containing instructions that when executed by a processor implement the method of claim 9. 20. A system comprising a processor and a computer readable memory unit coupled to the processor, said memory unit containing instructions that when executed by the processor implement the method of claim 9, wherein the system comprises the interrogator, and wherein the interrogator comprises the processor and the memory unit. Database & associative Bitcoin Wallet Process Claims: 21. A system comprising a unique identification number generation assigned to every handbag. , said unique identification number can be named (Bag Identification Number) (BIN) or any other vatiable name, wherein the system comprises one is to one mapping of such number with the real world manufactured or digitally produced virtual world handbag. 22. The system of claim 21 of generating a (Bag Identification Number) (BIN) or any other vatiable name, wherein the computer or digital database which stores such One is to one mapping can be established and maintained. 23. The database of claim 22 of generating a (Bag Identification Number) (BIN) or any other vatiable name, wherein the computer or digital database which stores such One is to one mapping can be further used to trigger a software code to generate automated unique electronic mail IDs. These Auto generated uniqe email IDs shall be mapped in One is to one correspondance with each Bag Identification Number entry. 24.a Unique Bag Identification Numbers with associated unique email IDs of claim 21 and 23 is used to create a bitcoin wallet using existing digital bitcoin digital infrastructure. 24.b wherein the computer or digital database which stores such One is to one mapping of A. (Bag Identification Number) (BIN) or any other vatiable name, B. Unique email ID C. Digital wallet can be established and maintained. 25.a Unique Bag Identification Numbers with associated unique email IDs of claim 21 and 23 is mapped to unique chipless RFID tag numbers affxied or attached to real world manufactured bags. 25.b Unique Bag Identification Numbers with associated unique email IDs of claim 21 and 23 is mapped to unique virtual chipless RFID tag numbers affxied or attached to virtual world manufactured bags. 26. The method of claim 24.a generated Bitcoin Wallets will have a predetermied random number generated Satoshis (Smaller amount of Bitcoin in them) Value of such a Bitcoins can be identified as a extra security parameter. 27. The method of claim 24.a and 26 is used to claim or establish ownership of associated with (Bag Identification Number) (BIN) or any other vatiable name, wherein the computer or digital database which stores such One is to one mapping of claim 23. Is unique way of identificaiton of authentic manufacturing, ownership of associated RFID Tags attached handbags of Claim 25.a.
  • 7. 28.a Database in claim 22 is used to validate (Digital validation, production of authentic digital certification), wherein Bitcoin wallet ID of “point of orgin” (Manufacturer) of claim 25.a must match in it’s value to generate such validation. (Validation 1) 28.b Database in claim 22 is used to validate (Digital validation, production of authentic digital certification), wherein Bitcoin wallet ID of “point of orgin” (Manufacturer) of claim 26 must match in it’s value to generate such validation. (Validation 2) 29 Change of ownership is validated and authenticated in a database if values of claim 28.a and claim 28.b are matching. 29 In case of theft or loss of bag, Digital wallet ID owner can claim a temporary suspension of ID verification process of claim 28.a and claim 28.b 29 Digital wallet ID of claim 24.a can be also mapped with hardware based bitcoin wallet. 30. A chipless RFID tag antenna or reader is used to identify chipless RFID tag attached or inserted in the handbag structure of claim 25.a and communicate Unique RFID tag number to the database of claim 22. List of Figures Figure 1- Chipless RFID tag embedded or attached in a handbag Figure 2- How BIN reads chipless RFID tags.png Figure 3- Generation, mapping and storage of database values Figure 4-A- Counterfeit and Stolen Bags Vs. Authentic Bags.png Figure 4-B- Counterfeit and Stolen Bags Vs. Authentic Bags.png