Parallel and reflective coding structures inclusive of data from both parties
to a transaction are propagated beginning with an algorithm derived maker's code,
an item code unique to and associated with a single article made by a maker, and
data identifying both the maker and the legitimate acquirer. Use of secure hash
algorithms, single and double key encryption are suggested to obtain two virtually
irreversible parallel coding structures that reflect the identities of the current
and previous owner and are also mathematically reflective in that one code is derivable
by either code structure in verification of both authenticity and ownership. Multiple
modes of verification with coding printed on a receipt for the article are provided
including Internet, offline computer, land line and SMS cellular telephone. Authenticity,
non-repudiation, proof of legitimate ownership and provenance are provided for
any article of value including pharmaceuticals and other consumable product warranting authentification.