HK1224787A1 - Method and system for verifying of the authenticity of a consumer product - Google Patents
Method and system for verifying of the authenticity of a consumer product Download PDFInfo
- Publication number
- HK1224787A1 HK1224787A1 HK16113107.5A HK16113107A HK1224787A1 HK 1224787 A1 HK1224787 A1 HK 1224787A1 HK 16113107 A HK16113107 A HK 16113107A HK 1224787 A1 HK1224787 A1 HK 1224787A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- code
- consumer product
- authenticity
- covert
- verifying
- Prior art date
Links
Abstract
A method and system is provided for verifying of the authenticity of a consumer product, the method including: providing an overt code on a consumer product, the overt code being readable prior to sale of the consumer product; providing a covert code on the consumer product, the covert code being revealed post sale of the consumer product; receiving a transmission of the covert code from a purchaser of the consumer product; verifying the covert code by reference to a database; if the covert code verifies the authenticity of the consumer product, transmitting an authentication signal to the purchaser; and cancelling the covert code and the overt code once the covert code has been used to verify the authenticity of the consumer product.
Description
Technical Field
The present invention relates generally to methods and systems for verifying the authenticity of consumer products. The present invention more particularly relates to methods and systems that enable a purchaser to confirm that a consumer product originates from an authorized source and is a verified authentic product.
Background
Counterfeit goods transactions are a growing area of interest. Counterfeiting is often viewed as a victim's act of crime, counterfeiting goods only offering alternative purchases at a lower price, and being viewed by the counterfeiter himself as having a low risk of prosecution relative to the significant benefit to be brought. However, in reality, product counterfeiting and fraud jeopardizes public health and safety, poses serious risks to national industries, and impairs legitimate commerce.
The range of counterfeit products available is wide and trends indicate that counterfeiters no longer limit their behaviour to luxury items such as apparel and electronic products, but are increasingly turning to consumer products such as pharmaceuticals, wine, cigarettes, milk powder, baby food and cosmetics. Counterfeiting consumer products is not only illegal, but also constitutes a serious threat to public health and safety, as the counterfeit consumer products are not subject to the usual regulatory checks that maintain product safety standards.
Accordingly, the availability of counterfeit apparel and electronic products is a significant financial and economic problem in terms of lost revenue to authorized manufacturers and the potential for damaging brand reputation due to poor quality counterfeit goods, while there are also serious health and safety implications associated with consumers who unknowingly purchase and consume certain counterfeit consumer products, including food, cosmetics, and pharmaceuticals. Diseases and injuries have resulted from the consumption of counterfeit consumer products, including adverse reactions that can cause hospitalization and even death. For example, it is well known that the presence of melamine-containing counterfeit infant formulas has led to hundreds of thousands of Chinese children becoming ill and dying.
As the quality of packaging used by counterfeiters continues to improve, it becomes increasingly difficult for consumers and actuators to distinguish between genuine and counterfeit items. New methods are needed to provide consumers with confidence that the product being sold is due to an authorized source.
While various attempts have been made to provide security tags, these have a number of drawbacks. Such authentication systems typically generate a unique code, such as a string of textual alphanumeric characters or a bar code, and attach the resulting label to the consumer product. The tag may be validated using a web browser or SMS using various means. However, the generated response relates to the validity of the tag, i.e. it indicates whether the tag itself is authenticated and the product is authenticated only by the association. Accordingly, these approaches inherently provide opportunities for misuse due to label relocation (i.e., transferring labels from authentic products to counterfeit products), as well as fraudulent acquisition of labels. In both cases, the tag will generate a valid authentication response, even though the product itself is counterfeit. Furthermore, web browser-based authentication systems are susceptible to counterfeiting due to the relative ease of creating counterfeit security tags that are directed to fraud authentication websites, which in turn return counterfeit product authentications to consumers.
Furthermore, there is a continuing need for brand owners to communicate with consumers more efficiently and to provide information that will enable consumers to derive more benefits from products. The benefit to the consumer may be at least in part the confidence that the product is genuine.
The reference herein to a patent document or other matter which is given as prior art is not to be taken as an admission that the document or matter was known in australia or that the information it contains was part of the common general knowledge as at the priority date of any of the claims.
Disclosure of Invention
According to an aspect of the present invention, there is provided a method for verifying the authenticity of a consumer product, the method comprising the steps of: a) providing an overt code on the consumer product, the overt code being readable prior to sale of the consumer product; b) providing a covert code on a consumer product, the covert code being readable after sale of the consumer product; c) receiving a transmission of the covert code from a purchaser of a consumer product; d) verifying the covert code with reference to a database; e) transmitting an authentication signal to the purchaser if the covert code verifies authenticity of the consumer product; and f) canceling the covert code and the overt code once the covert code has been used for verifying the authenticity of a consumer product.
The method may further comprise the steps of: information is communicated regarding one or more discernable product attributes of the consumer product to enable a purchaser to verify that the consumer product matches the one or more discernable product attributes. In one embodiment, a first set of one or more discernible product attributes is associated with an overt code and a second set of one or more discernible product attributes is associated with a covert code. The second set of one or more discernible product attributes can include the first set of one or more discernible product attributes and additionally include at least one other discernible product attribute. In this case, preferably, at least one other discernible product attribute is not discernible prior to purchase. For example, the at least one other discernible product attribute may be a particular color of the scoop that cannot be discerned until the purchaser opens the package.
The method may be preceded by the steps of generating overt and covert codes and associating a code pair comprising an overt code and a covert code in a database. In one embodiment, this entails associating a pair of overt and covert codes to be applied to the same consumer product. The step of associating the code pairs preferably takes place at a secondary location remote from the primary location or locations where the overt and covert codes are generated. Furthermore, the secondary location is further preferably remote from the location where the consumer product is manufactured and/or the code pair is applied to the product. In particular embodiments, the secondary location is associated with a certification authority.
In case the covert code does not verify the authenticity of the consumer product, the method may further comprise the steps of: a non-authentication signal is transmitted to the purchaser along with a request for information relating to the acquisition of the consumer product. This enables authorized sources of consumer products to obtain information about counterfeit products, including their location, as well as the identity of the entity that provided the counterfeit product for sale.
In one embodiment, the method further comprises the steps of: receiving a registration request from a purchaser; wherein the registration application is received prior to receiving the transmission of the covert code. The enrollment step is performed only once for each buyer of the consumer product. In the event that a product recall or similar need to contact a buyer occurs at some future time, the buyer registration significantly simplifies the recall process. In addition, the secure enrollment of the buyer enables authorized sources of consumer products to gather valuable information about the buyer's statistics and purchasing habits of the consumer product.
In one particular form of the invention, the method further comprises the steps of: information regarding the product recall affecting the authenticated consumer product is transmitted to the purchaser.
In one embodiment, the method further comprises the steps of: a lot code is provided for a set of consumer products, the lot code being associated with data identifying the set of consumer products prior to sale. The step of providing a batch code provides the advantage of tracking a large number of consumer products throughout the distribution channel. The batch code is readable during distribution and is no longer readable once the consumer product is offered for sale in a retail environment. For example, the lot code may be provided on a carton that holds a plurality of individually packaged consumer products. The lot code is therefore used to track "lots" of consumer products and is intended for product tracking rather than certification.
In one particular form of the invention, information regarding product recalls affecting consumer products is communicated to a distribution channel intermediary based on lot codes. Preferably, the distribution channel intermediary is a retailer or wholesaler.
The consumer product may be any type of consumer product including, but not limited to, apparel, sporting goods, or electronics. In a particular embodiment, the consumer product is a perishable product, such as wine, cigarette, pharmaceutical or nutraceutical. In another embodiment, the consumer product is an edible product, such as food products including baby food, dairy products, meat and meat products. In yet another embodiment, the consumer product is a multi-purpose product intended for infants and children, e.g., infant formula.
According to another aspect of the present invention, there is provided a system for verifying the authenticity of a consumer product, the system comprising: a) one or more code generation modules to provide an overt code and a covert code, wherein both the overt code and the covert code are to be applied to a consumer product; b) a database for associating the overt code with data identifying the consumer product and the covert code with data usable for authenticating the consumer product; c) a receiving and transmitting module for receiving a transmission of the covert code from a communication device associated with a purchaser of the consumer product and transmitting an authentication signal to the communication device via a network if the covert code verifies the authenticity of the consumer product; d) a code cancellation module for canceling the covert code and the overt code once the covert code has been used to verify the authenticity of the consumer product.
In one embodiment, the system further comprises a code linking module for associating code pairs comprising an overt code and a covert code in the database. The associated code pairs may be physically linked. For example, in one embodiment, the overt code may be applied as an adhesive label over the covert code, which also constitutes an adhesive label. In this configuration, the overt code and the covert code can be applied to the consumer product simultaneously in a single step as a two-layer security tag. In another embodiment, the overt code is printed on a surface that can be removed from the covert code, for example, by scratching. In yet another embodiment, the covert code is covered by removable means and the overt code is printed elsewhere on the consumer product. In this particular case, there is no physical link between the overt code and the covert code.
The code linking module may reside at a secondary location remote from one or more primary locations where the one or more code generation modules reside. In addition, the secondary location is also remote from the location where the consumer product is manufactured and/or the overt and covert codes are applied to the product.
The overt code preferably comprises a machine readable code.
The covert code also preferably comprises a machine readable code.
In one form of the invention, the machine-readable code comprises a QR or "quick response" code.
The hidden code may be hidden under the overt code. This functionality can be provided by a peel or scratch-off label that includes a overt code that can be removed from the package once the consumer product has been disposed of (i.e., sold) and the purchaser wishes to authenticate the consumer product. Accordingly, the overt code may be removed by the purchaser after purchasing the consumer product to reveal the covert code.
The machine-readable code may be readable by a scanner associated with the communication device. The communication device may be a smartphone or other device with similar functionality connected to a communication network.
The system may also include a database storing information related to the consumer product, which is transmitted to the communication device along with the covert code. The information related to the consumer product can include information about special offers related to the consumer product, new products or services, or any other information that an authorized source of the consumer product may wish to communicate to a purchaser.
Drawings
The invention will now be described in more detail with reference to the accompanying drawings. It is to be understood that the particularity of the accompanying drawings does not supersede the generality of the preceding description of the invention.
FIG. 1A is a flow chart demonstrating the steps involved in a method for verifying the authenticity of a consumer product.
FIG. 1B is a flow chart demonstrating steps involved in a method for verifying the authenticity of a consumer product according to another embodiment.
FIG. 2 is a schematic diagram illustrating a computer-enabled system for performing the method illustrated in FIG. 1.
FIG. 3 is a schematic diagram illustrating one embodiment of a system for applying code pairs to consumer products.
FIG. 4 is a schematic diagram showing elements of a kit for verifying the authenticity of a consumer product.
FIG. 5 is a schematic diagram showing, in block diagram form, various functional elements of the computer-enabled system of FIG. 2.
Detailed Description
Referring initially to FIG. 1A, a method 100 for verifying the authenticity of a consumer product is described. The consumer product to be certified may be any suitable consumer product including, for example, apparel, sports apparel, or electronic products, or a consumable product such as a drug, wine, cigarette, infant formula, packaged food, or cosmetic. The consumer product may be of the type presented in some sort of package or container, or may simply be labeled. In either case, the container, package or label provides a surface on which the overt code and the covert code may be provided.
At step 110, the method provides a first code in the form of an overt code on the consumer product. The overt code is associated with data identifying the consumer product. That is, the overt code and the data are associated in the database. The overt code is intended to be readable throughout the distribution process and, in particular, prior to sale of the consumer product.
At step 120, the method provides a second code in the form of a hidden code on the consumer product. The covert code is associated with data that can be used to authenticate the consumer product. I.e. the covert code and the authentication data are associated in the database. Unlike the overt code, the covert code is intended to be readable only after sale of the consumer product. In the database, there is a link between the overt code and the covert code. It is to be understood that the order of steps 110 and 120 may be reversed, for example in the physical application of the code, where the overt code is applied over or on top of the covert code.
At step 130, a transmission of the covert code is received from the purchaser. The covert code is verified with reference to a database. If the covert code is verified, an authentication signal will be transmitted to the purchaser at step 150. If the first covert code is not verified at step 140, the verification process terminates at step 150.
At step 170, once the authenticity of the consumer product has been verified using the covert code, the code pair comprising the overt code and the covert code is cancelled. "Cancel" effectively means whether the associated code "cannot be said" is deleted or otherwise removed from the code list, which will generate an authentication response from the scan request. This self-canceling feature prevents a single covert code from being used more than once to authenticate a product. That is, the covert code is actually a single-use code for the purpose of authenticating a product, thereby inherently increasing the security of the authentication method of the present invention. However, the covert code may be scanned by the purchaser after authentication to provide information about the consumer product. Such information may include a description of the product, and information about the availability of repeat purchases. However, the covert code is used only as a one-time authentication code.
An overt code is a multi-read code that can be read any number of times throughout the distribution of a consumer product. That is, unless or until the overt code is removed, to reveal a covert code that may be obscured below depending on the physical configuration of the code pair. Reading the overt code provides valuable information about the identity of the product prior to purchasing the consumer product.
Referring now to FIG. 1B, a method 100 for verifying the authenticity of a consumer product is described, in accordance with another embodiment. This method is largely identical to that described with reference to fig. 1A, except that it includes some additional steps in which the sensible code is verified separately at step 135. If the overt code fails to verify at step 135, an "error" message will be generated at step 160 alerting the consumer that the product appears to be counterfeit and optionally presenting the consumer with a brief questionnaire attempting to extract useful data related to the attempted purchase of the counterfeit product, such as location, store details, date, time, etc.
If the overt code is verified at step 135, product information that generally identifies the product is displayed to the scanning entity at step 145, whether the scanning entity is a potential purchaser of the consumer product or part of the distribution chain.
The remaining steps 120, 130, 140, 150, 170 are similar to those described with reference to fig. 1A.
Optionally, in the event that the covert code cannot be verified and the consumer product is suspected of being counterfeit, a message is transmitted to the purchaser advising that the consumer product is suspected of being counterfeit. This message may be accompanied by a suggestion not to consume the suspected consumer product and/or a request for a message identifying the date, time, and location of purchase of the suspected consumer product. In this case, details of the suspected consumer product are provided to an authorized source of the product, enabling necessary investigation as to the source of the counterfeit consumer product.
Cancellation of code pairs (i.e., overt codes along with associated covert codes) can occur, for example, at any suitable time, it is contemplated that cancellation of codes can occur immediately after scanning for covert codes. Alternatively, the cancellation of the overt code and the covert code may occur after the authentication signal is transmitted to the purchaser.
The overt code and the covert code form a pair of codes that are placed on the consumer product for security purposes. Each code is a unique or substantially unique identifier associated with a consumer product, i.e., there is a one-to-one correspondence between the set of overt codes and the set of consumer products, and a one-to-one correspondence between the set of covert codes and the set of consumer products. Substantially unique should be understood to require that at least 95% of the codes are unique, preferably at least 99% of the codes are unique, and more preferably at least 99.9999% of the codes are unique.
The code may consist of, for example, an ASCII string. The physical representation of the code may be a label, typically comprising a machine readable code, such as a bar code. The barcode may be a two-dimensional barcode, sometimes referred to as a QR or "quick response" code. Thus, the overt code and the covert code may be referred to as the names QR1 and QR2, respectively.
A separate certification authority may be responsible for generating the overt code (QR1) and the covert code (QR2) and communicating them to the label printer. The manufacturer provides the consumer product identification and associated information to the certification authority, which links this information to the overt code or covert code in the database. The covert code will preferably contain some additional information that is only transmitted after purchase. At this point, the code pair (i.e., QR1 and QR2) becomes active (i.e., able to respond to scan requests).
Furthermore, since security tags include overt codes associated with particular products, they cannot be transferred between manufacturers, or even between products produced by the same manufacturer. In fact, preferably, the security label is not even transferable between different batches of the same consumer product.
The steps of the method may be performed by or with the approval of a certification authority, which may or may not be the same entity that is the authorized source of the consumer product (e.g., the consumer product manufacturer). Alternatively, it is contemplated that the described consumer product authentication service may be provided by some separate entity that authorizes the provision of the authentication service on behalf of the authorized source of the consumer product.
The verification method of the present invention is intended to be interactive, involving the purchaser in the authentication process, to give the purchaser a high degree of confidence in the authentication process. The purchaser may implement the authentication method using an application on a smart phone or similar handheld device. Alternatively, the method can be implemented with a browser available via a smartphone or similar handheld device, as long as the device is linked to a communication network. However, network interfaces are significantly less secure and are likely to be subject to "phishing" or similar security vulnerabilities.
Once the covert code is scanned, in addition to transmitting the authentication signal to the communication device, the authentication signal may be accompanied by product descriptive information to further enable the consumer to confirm that the product is authentic based on a visual inspection. For example, the product description information will typically relate to the package contents, i.e. aspects of the consumer product that are not discernible from the external features of the product. In the example where the consumer product is a consumable product such as a pharmaceutical or infant formula, the product descriptive information can indicate a visual characteristic of the product, for example "the packaged contents are a cream/white/granular powder" or "the package contains a blue spoon for dispensing the contents". This allows the consumer to confirm to him or herself through visual inspection of the contents: the product is consumer safe because the matching contents are described and have passed other authentication steps.
Preferably, the purchaser is required to enroll with the certification authority prior to using the verification method. To enroll, the purchaser must provide contact details such as a telephone number and an email address, and preferably other details to enable a certification authority or authorized source of the consumer product to obtain some statistical data relating to the purchaser (i.e. data such as gender, age, race, location and employment status). A purchase history can then be established for the registered purchaser. In the case of registering a purchaser with a certification authority, the purchaser is enabled to recover information about the consumer product by scanning the previous "hidden" code of the product after product certification.
The method may further include the step of providing a batch code for the collection of consumer products. In this case, the lot code is associated with data identifying the collection of consumer products prior to sale. For example, batch codes QR3, QR4, etc. are associated with product batches (e.g., for shipping boxes that each contain x cans of consumer products, and for shipping pallets that each contain y shipping boxes). These lot codes are unique identifier codes for the lot (not an individual item of a consumer product).
The overt code, covert code, and batch code are randomly generated. However, before any of these code types are transcribed onto the label for placement on the consumer product, the code may be modified (typically by adding one or more characters) so that the code can be quickly identified as a valid code, i.e., an overt code or a covert code, associated with the authentication system. This enables a fast identification means by a scanner (provided in a smart phone) without the need for remote communication. That is, by distinguishing between valid codes, a fast and local means of identifying pseudocodes is provided. One means of implementing this fast identification strategy is through the use of a checksum algorithm. For example, if the code is an 8-digit string, two more digits are added to the end of the string of digits, so that the sum of the original string of 8 digits includes the last two digits. It is to be understood that there are a variety of alternative checksum algorithms or non-checksum algorithms that can be used for similar purposes.
The step of providing a batch code provides the advantage of tracking a larger number of consumer products throughout the distribution channel. The batch code is readable during distribution and is no longer readable once the consumer product is offered for sale in the retail environment. For example, the lot code may be provided on a carton that holds a plurality of individually packaged consumer products. The lot code is thus used to track "lots" of consumer products and is intended for product tracking rather than certification.
Information regarding product recalls affecting consumer products can be transmitted to the distribution channel broker based on the batch code. That is, after identifying product security issues, information regarding product recalls can be pushed to a smartphone application of the type described previously, enabling information to be streamed directly to current potential consumers (in the case of edible and/or perishable consumer products), e.g., recent purchasers of related consumer products. Associating only a small amount of geolocation information with the purchaser through active registration can be sufficient to allow authorized sources of consumer products to determine the location of affected batches of products and isolate areas where suspected consumer products may have been distributed.
Referring now to FIG. 2, the verification steps of the method described with reference to FIG. 1 are implemented using a computer system. The code generation module 210 provides overt and covert codes. Both the overt code and the covert code are applied to the consumer product (see fig. 3 and 4).
In the database 240, the overt code is associated with data identifying the consumer product and the covert code is associated with data that can be used to authenticate the consumer product. That is, the database 240 may comprise a single database, or may comprise multiple databases, i.e., the overt codes and their associated data are stored in a first database, and the covert codes and their associated data are stored in a second database. The link will exist between an overt code and an associated covert code applied to a single consumer product. Alternatively, the code pairs may exist in a single table containing all relevant product information and images in a database linked to multiple other tables (likely in the same database, although possibly in another database). Other tables in the same database can contain information such as manufacturer details, customer data, feedback due to customer interaction with the system, and various return data and statistics.
The receiving and transmitting module 260 is provided for receiving a transmission of the covert code from a communication device associated with a purchaser of the consumer product and transmitting an authentication signal to the communication device via the network 220. The authentication signal is only transmitted if the covert code verifies the authenticity of the consumer product. If the covert code does not verify the authenticity of the consumer product, no authentication signal is transmitted to the purchaser. Instead, a message may be transmitted to the purchaser advising that the consumer product suspected of being purchased is counterfeit and optionally requesting that the purchaser provide information to enable the source of the counterfeit consumer product to be identified.
A code cancellation module 270 is also provided for canceling the covert code and the overt code once they have been used to verify the authenticity of the consumer product. The cancellation of the code in effect means that the code can no longer be authenticated, so that a counterfeiter will not be able to copy either the overt code or the covert code. There is no requirement to literally delete or otherwise remove the correlation code or its associated information from the database. When the purchaser scans the covert code, cancellation of the code may require that the purchaser be assigned "ownership" of the particular code. Assigning, linking, or otherwise associating a "cancelled code" with a purchaser in this manner means that the particular code is cancelled for virtually all other consumers. This function may be performed by, for example, a certification authority.
The purchaser of the consumer product scans the covert code provided on the consumer product using a communication device 230 associated with the purchaser. The communication device 230 may be a smart phone, personal digital assistant, personal computer, or similar computing device connected to the communication network 220. The communication network 220 preferably provides wireless network access. The receiving and transmitting module 260 receives a transmission of the covert code from the communication device 230 via the communication network 220. The database 240 verifies the authenticity of the covert code.
Verification actually involves matching the transmitted covert code to one or more issued covert codes for the consumer product. If the covert code can be verified, an authentication signal is transmitted to the communication device 230 via the communication network 220.
Referring now to fig. 3, the overt and covert codes may be applied to the consumer products 610, 620 in any of a variety of ways. For example, as a two-layer adhesive security tag as described in more detail with reference to fig. 4. Or, alternatively, the code pairs are applied on a product line including a unit composed of a three-head inline printer 650 facing the moving conveyor 630. As the consumer product passes the associated print head on the conveyor 630, the print heads 640a, 640b, 640c are commanded to print covert, and overt codes on the cover portions or elsewhere on the consumer product 610, 620. The cover-over component can be, for example, sloppy ink that shows evidence of tampering when removed. The code generation module 660 is associated with the printer 650 such that the code pair is either supplied to the printer or generated in the field and communicated to the certification authority via the communication network 670.
As described earlier, there may be a need for a purchaser to register some personal details in order to use an authentication service when the purchaser first uses the authentication service. For example, at check-in, the purchaser may be required to provide one or more items of personal data, such as a full name, an email address, a telephone number, a street address, a date of birth, and the like. This data may be further supplemented with location data, for example, the location of a smartphone that provides scanning capabilities determined by integrating a GPS component. This personal data is stored in the secondary database 250. The data stored in secondary database 250 has various market research and targeted market applications because personal details can be linked with consumer purchase history.
For example, as part of the verification process, the purchaser can be provided marketing materials related to the consumer product in question. For example, in the case of infant formula, the purchaser can be provided general information and reminders regarding the health of the infant, advertisements regarding whether other infant products are other infant food products or other infant products such as clothing or toys, and marketing materials of a more general nature as well.
The consumer product may also be a functional food and therapy for use by persons who wish to manage chronic diseases (such as diabetes), or who wish to reduce the risk of disease or disease progression. Consumers can gain benefits not only by using the product, but also by making lifestyle changes, such as making more sports. After authentication, there is a range that includes "boost" to promote improved health results in the information provided to the consumer. For consumers registered with the system, "boosting" can be aggregated, directed, and tailored to individual consumers based on historical data and analysis of interactions.
The certification authority may run a series of rewards and loyalty programs. For example, a retrospective reward scheme provides rewards to consumers based on products purchased prior to declaring the reward scheme. The purpose of the retrospective reward scheme is to stimulate the consumer to become a registered scanner (i.e., initialize the smartphone application). Other reward schemes may be brand/manufacturer specific.
The covert code is a machine readable code, such as a bar code. Barcodes are two-dimensional barcodes, sometimes referred to as QR or "quick response" codes. A two-dimensional barcode reader is provided within an application provided on a smartphone or similar handheld communication device associated with a purchaser.
The covert code may be hidden from view by a removable covering member. That is, the covert code may not be readable until the removable cover portion is removed. The covert code being covert provides an additional measure of security in that the covert code cannot be seen and therefore is transmitted to a certification authority without the packaging being visibly tampered with. The covert code may be concealed by a removable covering component carrying the covert code. That is, the overt code is preferably overt and available for scanning throughout the dispensing cycle (including scanning by the distributor and by the consumer prior to purchasing the product), while the covert code is only available for scanning by the consumer after purchase, i.e. by removing the upper layer carrying the overt code to reveal the covert code.
Accordingly, the overt code may be interchangeably referred to herein as the first code, the overt code, or the multi-scan code. The hidden code may be interchangeably referred to as a second code, a hidden code, or a single scan code.
In the case where an additional level of security is deemed necessary, the code pair is encrypted by the certification authority. The database operates only with encrypted data and the only place where the cryptographic pairs can be resolved is inside the database. Accordingly, in the event that the database is to be accessed by an adversary or counterfeiter, the unique data that will be returned in relation to the code and code pair will be indistinguishable. All transmissions between the certification authority and external parties, including the manufacturer and consumer, may also be encrypted using communication channel encryption
The code pair may be secured by encryption or hashing using a known encryption and/or hashing algorithm (e.g., the standard SHA1 hashing algorithm). This has the advantage that the database of hashed code pairs cannot be "decoded" to their original form, since the hashing process is one-way. Accordingly, any intended counterfeiter cannot decode the overt and covert codes, and more particularly, the code pair. The order of the code values may also be changed. Additionally, hashing the data to a fixed size can significantly improve the speed of classifying the data. This results in particular advantages where potentially hundreds of millions of active security tags may be present in the database. Hashing of the code in the database is particularly useful if the database itself is compromised-stolen overt/covert code data cannot be reversed to the actual code that needs to appear on the product, i.e. the stolen set of code data from the database is useless. Other known encryption techniques may also be applied.
Referring now to fig. 3, an example consumer product provided in a can-like package 310 is shown with an overt code 320 and a covert code 330 applied to the exterior surfaces thereof. Preferably, physical removal of the upper layer of a two-layer security tag including the overt code will result in overt evidence of tampering (i.e., damage) to the security tag. This will avoid the occurrence of the hidden code being exposed and re-covered. This may be accomplished, for example, by providing a dual layer security tag that includes perforations for removing the upper overt code, such that removal of the overt code via the perforations exposes the underlying covert code while physically destroying the overt code. Alternatively, printing the overt code on a removable surface (such as being scratch-off, printed over a covert code) would also be evidence tampering, as the covert code would only be revealed by removing (by scratching or the like) the overt code.
Because the covert code 330 should only be accessed by a purchaser after purchase and revoked after a first attempt to verify the authenticity of a consumer product using the covert code, it provides an improved level of security over known verification methods and systems. Any attempt to scan the covert code prior to purchase will result in significant tampering.
The overt code 320 illustrated in fig. 3 is a two-dimensional barcode, preferably readable by a barcode scanning application installed on a mobile communication device such as a smartphone. This overt code 320 is overt and is preferably placed over the covert code 330. Covert code 330 is also a two-dimensional bar code. Preferably, the code does not contain useful information such as a URL, a recognizable item identifier or product details and/or manufacturer attributes.
In the event that a two-layer security tag is not desired, such as for example not allowing their use for a particular consumer product due to regulatory requirements, something is printed on the consumer product of the first example that will become a covert code. Another printer then prints an ink surface removable by scratching over the "hidden" code to cover the "hidden" code. Yet another printer then prints an overt code over the ink surface. Alternatively, the overt code is printed elsewhere on the consumer product.
A computing device in communication with the printer may generate the code "on-demand", e.g., at a production line, and securely encrypt and upload the code pair to a certification authority (likely in a batch process, e.g., after every 10,000 applications of the code).
Referring back to FIG. 2, system 200 may be implemented using hardware, software, or a combination thereof, and system 200 may be implemented in one or more computer systems or processing systems. In particular, the functionality of the host server 210 may be provided by one or more computer servers capable of performing the functionality described above.
Such a computer system is illustrated in fig. 4. In this figure, exemplary computer system 400 includes one or more processors, such as processor 410. The processor 410 is connected to a communication fabric 420. Computer system 400 can include a display interface 430 that forwards graphics, text, and other data from communication fabric 420 for supply to a display unit 440. Computer system 400 may also include a main memory 450, preferably random access memory, and may also include a secondary memory 460.
Secondary memory 460 may include, for example, a hard disk drive/Solid State Drive (SSD)470, a tape drive, an optical disk drive, and the like. Removable storage drive 480 reads from and/or writes to removable storage unit 490 in a known manner. Removable storage unit 490 represents a floppy disk, magnetic tape, optical disk, USB, etc.
As will be appreciated, the removable storage unit 490 includes a computer usable storage medium having stored therein computer software in the form of a sequence of instructions that cause the processor 410 to perform desired functions. In alternative embodiments, secondary memory 460 may include other similar components for allowing computer programs or instructions to be loaded into computer system 400. Such components may include, for example, a removable storage unit 500 and an interface 510.
Computer system 400 may also include a communications interface 520. Communications interface 520 allows software and data to be transferred between computer system 400 and external devices. Examples of communication interface 520 may include a modem, a network interface, a communication port, a PCMIA slot and card, and so forth. Software and data transferred via communications interface 520 are in the form of signals 530, which signals 530 may be electromagnetic, electrical, optical or other signals capable of being received by communications interface 520. Signals are provided to communications interface 520 via a communications path 540, such as wire or cable, fiber optics, a phone line, a cellular phone link, radio frequency, or other communications channel.
An advantage of the method and system of the present invention is that the two-tier, two-code authentication system allows for partial validation of consumer products prior to sale, such that any potential purchaser considering purchasing the consumer product can scan the overt code and obtain information about the identity of the consumer product. Furthermore, the overt code can be used for scanning throughout the distribution cycle. However, the final verification is only done once for the actual purchaser who exposes the covert code. Exposing the covert code should leave at least some evidence of tampering. Scanning of this covert code results in an authentication signal being transmitted to the purchaser-provided that the covert code can be verified. Once an attempt is made to verify the covert code, the code pair is cancelled so that the covert code is no longer operable for authentication purposes. This feature increases the robustness and security level of the method and system of the present invention.
Furthermore, manufacturing code pairs of high capacity is technically easy to implement at low cost. The replication of code pairs requires not only the knowledge and ability to generate individual overt and covert codes in the appropriate format, but also the association or linkage between known code pairs. Since the association of the overt and covert codes as code pairs occurs securely and then encrypted into the database, it is virtually impossible for an intended counterfeiter to generate a code pair that is identical to a code pair generated by the certification authority.
Furthermore, providing the purchaser with the opportunity to interact with the certification authority provides the purchaser with a high degree of confidence that the system is robust and trusted. An opportunity is also provided to interact with the buyer to collect valuable data related to statistics and purchasing behavior that can be used for targeted marketing campaigns and in the event of product recalls.
Although in the above described embodiments the invention is implemented primarily using computer software, in other embodiments the invention may be implemented primarily in hardware, for example using hardware components such as Application Specific Integrated Circuits (ASICs). It will be apparent to those skilled in the art that a hardware state machine may be implemented to perform the functions described herein. In other implementations, the invention may be implemented using a combination of both hardware and software.
While the invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate that many alternatives, modifications, and variations are possible in light of the above description. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that may fall within the spirit and scope of the disclosed invention.
Claims (25)
1. A method for verifying the authenticity of a consumer product, the method comprising the steps of:
a. providing an overt code on the consumer product, the overt code being readable prior to sale of the consumer product;
b. providing a covert code on a consumer product, the covert code revealed after sale of the consumer product;
c. receiving a transmission of the covert code from a purchaser of a consumer product;
d. verifying the covert code with reference to a database;
e. transmitting an authentication signal to the purchaser if the covert code verifies authenticity of the consumer product; and
f. canceling the covert code and the overt code once the covert code has been used to verify the authenticity of a consumer product.
2. A method for verifying of the authenticity of a consumer product according to claim 1, further comprising the steps of:
a. information is communicated regarding one or more discernable product attributes of the consumer product to enable a purchaser to verify that the consumer product matches the one or more discernable product attributes.
3. A method for verifying of the authenticity of a consumer product according to claim 2, wherein a first set of one or more discernible product attributes are associated with the overt code and a second set of one or more discernible product attributes are associated with the covert code.
4. A method for verifying of the authenticity of a consumer product according to claim 3, wherein the second set of one or more discernible product attributes includes the first set of one or more discernible product attributes and additionally includes at least one other discernible product attribute.
5. A method for verifying of the authenticity of a consumer product according to any one of claims 1-4, wherein the method follows the steps of generating overt and covert codes and associating pairs of codes comprising one overt and one covert code in a database.
6. A method for verifying of the authenticity of a consumer product according to any one of claims 1-4, further comprising the steps of: the association comprises a code pair of an overt code and a covert code to be applied to the same consumer product.
7. A method for verifying of the authenticity of a consumer product according to claim 5 or 6, wherein the step of associating the pair of codes occurs at a secondary location remote from the primary location or locations where the overt and covert codes are generated.
8. A method for verifying of the authenticity of a consumer product according to claim 7, wherein the secondary location is associated with a certification authority.
9. A method for verifying of the authenticity of a consumer product according to any one of claims 1-8, further comprising the steps of:
a. if the covert code does not verify the authenticity of the consumer product, an unauthenticated signal is transmitted to the purchaser along with a request for information relating to the acquisition of the consumer product.
10. A method for verifying of the authenticity of a consumer product according to any one of claims 1-8, further comprising the steps of:
a. receiving a registration request from a purchaser;
wherein the registration request is received prior to receiving the transmission of the covert code.
11. A method for verifying of the authenticity of a consumer product according to any one of claims 1-10, further comprising the steps of:
a. information regarding the product recall affecting the authenticated consumer product is transmitted to the purchaser.
12. A method for verifying of the authenticity of a consumer product according to any one of claims 1-10, further comprising the steps of:
a. at least one lot code is provided for a collection of consumer products, the lot code associated with data identifying the collection of consumer products prior to sale.
13. A method for verifying of the authenticity of a consumer product according to claim 12, further comprising the steps of:
a. information about product recalls affecting consumer products is communicated to a distribution channel intermediary.
14. A method for verifying of the authenticity of a consumer product according to any one of claims 1 to 13, wherein the consumer product is a perishable product.
15. A system for verifying the authenticity of a consumer product, the system comprising:
a. one or more code generation modules to provide an overt code and a covert code, wherein both the overt code and the covert code are to be applied to a consumer product;
b. a database for associating the overt code with data identifying the consumer product and the covert code with data usable for authenticating the consumer product;
c. a receiving and transmitting module for receiving a transmission of a covert code from a communication device associated with a purchaser of a consumer product and transmitting an authentication signal to the communication device via a network if the covert code verifies authenticity of the consumer product; and
d. a code cancellation module for canceling the covert code and the overt code once the covert code has been used to verify the authenticity of the consumer product.
16. A system for verifying of the authenticity of a packaged consumer product according to claim 15, further comprising a code linking module for associating a code pair comprising an overt code and a covert code in a database.
17. A system for verifying of the authenticity of a packaged consumer product according to claim 16, wherein the code linking module resides at a secondary location remote from the one or more primary locations where the one or more code generating modules reside.
18. A system for verifying of the authenticity of a packaged consumer product according to claim 16 or 17, wherein the associated code pairs are physically linked.
19. A system for verifying of the authenticity of a packaged consumer product according to any one of claims 15 to 18, wherein the overt code comprises a machine readable code.
20. A system for verifying of the authenticity of a packaged consumer product according to any one of claims 15 or 19, wherein the covert code comprises a machine-readable code.
21. A system for verifying of the authenticity of a consumer product according to any one of claims 15 to 20, wherein the covert code is concealed under the overt code.
22. A system for verifying of the authenticity of a consumer product according to claim 21, wherein the overt code is removed by a purchaser after purchase of the consumer product to reveal the covert code.
23. A system for verifying of the authenticity of a packaged consumer product according to any one of claims 15 to 22, wherein the machine readable code is read by a scanner associated with the communication device.
24. A system for verifying of the authenticity of a packaged consumer product according to claim 23, wherein the communications device is a smart phone or other device connected to a communications network.
25. A system for verifying of the authenticity of a packaged consumer product according to any one of claims 15 to 24, further comprising a database storing information relating to consumer products, the information relating to the consumer products being transmitted to the communication device together with the covert code.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2013904931 | 2013-12-17 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK1224787A1 true HK1224787A1 (en) | 2017-08-25 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2017100056A4 (en) | Method and system for verifying of the authenticity of a consumer product | |
| US12067440B2 (en) | Systems and methods for generating secure tags | |
| JP4728327B2 (en) | Trading terminal | |
| US7917443B2 (en) | Authentication and tracking system | |
| US7770783B2 (en) | Method and system to provide security information when authenticating product code | |
| US20170032382A1 (en) | System and Method for Product Authentication | |
| US20160027021A1 (en) | Product Authenticator | |
| JP2016512675A (en) | Secure trading system and method | |
| CN102236779A (en) | Use at least two anti-counterfeiting methods with different encodings | |
| CN104995656A (en) | Unauthorized product detection techniques | |
| CN104899775A (en) | Product anti-counterfeit method and product anti-counterfeit examining method as well as anti-counterfeit package | |
| CN105894303A (en) | Product anti-counterfeiting method, product anti-counterfeit examination method and anti-counterfeit package | |
| US7581242B1 (en) | Authenticating products | |
| CN108985431B (en) | Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark | |
| Stein | Supply chain with blockchain—showcase RFID | |
| HK1224787A1 (en) | Method and system for verifying of the authenticity of a consumer product | |
| CN115668214A (en) | Method for authenticating an item | |
| JP2020144797A (en) | Information management device and its program |