Appeal No. 2004-0227 Application 09/140,151 conventional bar-code, other conventional symbols interpretable in alphanumeric characters could also be used to support the further processing of the envelopes 10. Unique self-defined symbols could also be used” (col. 8, lines 28-31). “A variety of further processing can take place based on the information acquired from contents 83 of the envelopes 10. For example, the envelopes 10 can be sorted according to their contents 83, orders or replies can be generated, records can be updated, or the information can be verified” (col. 8, lines 8-12). Brosow discloses a system and method for verifying the authenticity of an object having random imperfections therein or thereon which are capable of being detected (col. 2, lines 46- 50). “The random information serving as an identification code is typical, just like a person’s finger-prints. They have in common that causal factors are used as an identification code, which cannot artificially be imitated because they have been formed accidentally. However, they can easily be checked” (col. 6, lines 52-57). The random imperfections can be added into or onto the object during its manufacture, and can be particles which have electric or magnetic properties deviating from those of the object (col. 4, lines 34-37 and 52-61; col. 5, lines 2-10). The amount of random imperfections is detected and 4Page: Previous 1 2 3 4 5 6 7 8 9 10 NextLast modified: November 3, 2007