AU767698B2 - Verification method - Google Patents

Verification method Download PDF

Info

Publication number
AU767698B2
AU767698B2 AU61152/99A AU6115299A AU767698B2 AU 767698 B2 AU767698 B2 AU 767698B2 AU 61152/99 A AU61152/99 A AU 61152/99A AU 6115299 A AU6115299 A AU 6115299A AU 767698 B2 AU767698 B2 AU 767698B2
Authority
AU
Australia
Prior art keywords
goods
public data
security code
verification
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU61152/99A
Other versions
AU6115299A (en
Inventor
David William Elliott
Nicholas Paul Elliott
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of AU6115299A publication Critical patent/AU6115299A/en
Application granted granted Critical
Publication of AU767698B2 publication Critical patent/AU767698B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/42Coin-freed apparatus for hiring articles; Coin-freed facilities or services for ticket printing or like apparatus, e.g. apparatus for dispensing of printed paper tickets or payment cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Description

1 VERIFICATION METHOD The present invention relates to a verification method and in particular, but not exclusively, to a method of verifying products to ensure that they are genuine and not counterfeit. The invention also relates to a method of marking goods for verification purposes and to goods marked for verification purposes.
The problem of counterfeiting is enormous and affects a wide range of goods including, for example, pharmaceuticals and spare parts for aircraft. Counterfeiting is not only bad for the producer of genuine goods, resulting in lost sales and possible damage to reputation and goodwill, but can also result in danger to the public ifthe counterfeit goods are not up to the quality of the genuine goods. For example, counterfeit pharmaceuticals may be ineffective or contain harmful substances and counterfeit aircraft parts may fail during use.
The sophistication of counterfeiting methods is such that it is often difficult or impossible for the consumer, wholesaler, retailer, importer or distributor to tell whether the goods are genuine or counterfeit, and usually there is no way of verifying the authenticity of the goods.
WO 80/02757 describes a process for protecting sound recordings against counterfeiting.
The sound recording carriers are marked with a first data set and a second data set that is related to the first data set An inspection device is provided, which determines whether the required relationship between the data sets applies.
US 5,768,384 describes a system for identifying, authenticating and tracking manufactured articles. A label containing information relating to the articles is printed with an encrypted bar code developed from some or all of that information. In order to ascertain whether the article is genuine, the bar code is scanned and the encrypted information is retrieved and compared against information on the associated documents.
It is an object of the invention to provide a verification method and a method of marking goods for verification purposes that mitigates at least some of the aforesaid problems.
2 According to the present invention there is provided a method ofverifying the authenticity of goods, wherein a set of public data and a security code are applied to the goods, said security code having been derived by means ofapredetermined encryption algorithm from said public data applied to the goods and a plurality ofprivate data sets held by a verifier and, upon receiving a request for verification, each private data set is entered into said predetermined encryption algorithm together with the public data applied to the goods to generate a list of verificafion codes, and said list of verification codes is compared with the security code applied to the goods to assess the authenticity of goods.
The set of public data and the security code may be applied to the goods themselves or to packaging for the goods and the invention as defined by claim 1 is intended to include both of these possibilities.
The method allows the authenticity of the goods to be verified very quickly and simply, for example by means of a telephone call to the verifier. Counterfeiting of the goods is made very difficult bythe fact that each goods item carries a unique security code number.
The security code can be applied to the goods by ordinary printing processes at minial cost. The need for expensive security devices such as holograms is avoided.
The verifier may be either the manufacturer or any other body authorised by the manufacturer and the term "verifier" as used in the claims is intended to include any such body.
The private data may be related to public data, for example to batch number, so enabling the verifier to assign different sets ofprivate data to different batches ofproducts. Then, when a request for verification is received, the verifier can select the appropriate set of private data for the particular goods for which verification has been requested.
The use of private data in addition to the public data applied to the goods increases the security of the encryption process, making it more difficult to counterfeit the goods.
Each set ofprivate data may be unique for each goods item, enabling the item number to be identified. This can help the verifier to track the activities of counterfeiters.
1.4 3 The public data may include a batch number and/or date information, for example the expiry date or the manu fhauring date and time.
The private data may include an item number, allowing the verifier to identify the goods item in question, or it may be a random or pseudo-random number.
Advantageously, the public data and the security code is applied to the goods by means of a digital printing process and is incorporated into the design printed onto the goods.
This makes it more difficult for the goods to be counterfeited using plate-based printing techniques.
Advantageously, the public data and the security code is incorporated into the design printed onto the goods as reversed out characters, blends or tints. This makes it more difficult for the goods to be counterfeited using over-printing or over-coding techniques.
According to a fuirther aspect of the invention there is provided a method marking goods to enable the authenticity of those goods to be verified, wherein a set of public data and a security code are applied to the goods, said security code having been derived by means of a predetermined encryption algorithm from said public data applied to the goods and a plurality of private data sets held by a verifier.
According to a further aspect of the invention there are provided goods marked for verification purposes, each of said goods including a set of public data and a security code applied to the goods, said security code having been derived by means of a predetermined encryption algorithm from said public data applied to the goods and a plurality of private data sets held by a verifier.
Embodiments of the invention will now be described by way of examplIe with reference to the accompanying drawings, in which.
Fig. 1 is a perspective view of a medicine packet that has been marked for verification purposes, Fig. 2 represents schematically a method of marking goods for verification purposes, and WO 00/23954 PCT/GB99/03377 4 Fig. 3 represents schematically a method of verifying the marked goods.
An example of a product, in this case a medicine packet 2, that has been marked for verification purposes is shown in Fig. 1. In the usual way, the packet has been marked by the manufacturer with information such as the expiry date 4, which in this case includes both the date and a time, and a lot or batch number. This information, which is printed on the packet in such a way that it can be read by the public, will be referred to hereinafter as the "public data" 8. This public data 8 may be either unique to each packet (for example, an item number may be included or the expiry date may include a time code based on the exact time of manufacture), or alternatively all packets manufactured in the same batch may carry identical public data.
In addition, the packet carries a security code 10. The security code 10 is unique to that packet and every packet therefore carries a different security code. The provision of a unique security code provides a first obstacle to counterfeiting, since printing different codes on each pack demands adaptable printing techniques and the provision of identical security codes on any two packets will immediately indicate that the goods are not genuine.
The usual method of marking packets with information that varies from pack to pack, or from batch to batch, is to stamp or print that variable information onto pre-printed packets in a separate printing process. This process is known as over-coding. This method can be copied relatively easily by counterfeiters.
In the packet shown in Fig. 1, counterfeiting is made more difficult by using digital printing techniques to print both the design of the packet (including the product trade mark, any descriptive matter and any graphical elements) and the variable information in a single step. Many well known digital printing techniques may be employed, including for example the INDIGO XEIKON (TM) and SCITEX (TM) processes. The advantage of using a digital printing process is that because printing takes place under digital electronic control, the printed image can be varied for each individual packet and can be incorporated into the overall design of the pack. This cannot readily be achieved WO 00/23954 PCT/GB99/03377 with traditional plate-based printing processes, since a separate set of printing plates must be prepared for each different image.
Preferably, the variable information including the public data and the security code is incorporated into the design in such a way that would affect as many plates of a conventional printing process as possible. For example, in the packet shown in Fig. 1 the security code number 10 has been positioned to overlap areas oftwo different background colours. Further, the variable information has been incorporated into the design as "reversed out" characters, i.e. characters produced by leaving the shapes of those characters unprinted against a background of solid colour so that the base material shows through. This helps to prevent that information being added in a subsequent over-coding process. The effect of this process is illustrated in Fig. I. the variable information 8,10 being shown as white characters on a coloured background. Alternatively, the characters may be printed as blends or tints, which are also difficult to reproduce using conventional printing processes.
The security code 10 applied to each packet is derived directly from unique information associated with each pack by means of a secret encryption algorithm. The security code may be derived either from a combination of the public data 8 printed on the packet 2 and private data held by the manufacturer or an authorised verifying organisation, or alternatively it may be derived solely from the public data, if that data is unique. The processes for deriving and verifying the security codes applied to the packets are described below with reference to Figs. 2 and 3.
Fig. 2 illustrates schematically a process for deriving the security codes and applying them to the packets using a combination of the public data 8 printed on the packet 2 and private data 12 held by the manufacturer or an authorised verifying organisation. The public data 8 consists for example of the batch number 6 and the expiry date 4. This data need not be unique. The private data 12 is not printed on the packet and is held either by the manufacturer or an authorised verifying organisation. The private data 12 is unique and may represent, for example, the item number of each packet in a given batch, or may be a random or pseudo-random number.
WO 00/23954 PCT/GB99/03377 6 The security code 10 for each packet is derived automatically during the printing process by subjecting the private data 12 and the public data 8 to an encryption process 14, such as a one-way hash function or a merge digest, as described in Applied Cryptography, second edition by Bruce Schneier, page 30, section 2.4 "one-way hash functions" (John Wiley Sons, Inc., 1996) ISBN 0471117091. This generates a unique security code which is printed onto the packet 2 together with the public data 8 by means of a digital printer 18.
No record is kept of the security codes 10. However, a data record 20 is kept of the public data 8 and the associated private data 12 used in the encryption process. This data record 20 is supplied to the verifying authority, for example on a floppy disk or by electronic data transfer.
The verification process is illustrated schematically in Fig. 3. The verifying authority, which may the manufacturer or an outside body authorised by the manufacturer, uses an identical encryption algorithm 14 to that used during printing and is supplied with the data record 20 of public data 8 and private data 12. When the verifying authority receives a request for verification, for example from a member of the public who has purchased the goods, the requester is asked to provide the public data 8 printed on the packet 2. This public data 8 is entered into the encryption algorithm 14 together with the private data 12 associated with that public data 8, as retrieved from the data record 20. This generates a list 24 of possible verification codes and the private data associated with each of those codes.
The requester is then asked to provide the security code 10 printed on the packet 2 and this code 10 is compared 26 with the list 24 of verification codes generated by the encryption algorithm 14. If that security code 10 matches a verification code on the list 24, the authenticity of the goods is verified 28: if a match is not found, the authenticity of the goods is denied.
The verifier may keep a log 30 of all requests for verification, which stores the public and private data for each item that has been verified. During the verification step, the log may be checked to see whether a request for verification has been received previously in WO 00/23954 PCT/GB99/03377 7 respect of that item. If so, verification may be denied since this suggests that the item has been copied.
The log 30 may also contain other information 32, for example the date and time of the request and the identity and geographical location of the requester. If two requests for verification are made for the same item, it may be possible to discount any likelihood of the item being counterfeit, for example if the requests are made first by a retail pharmacist and subsequently by a customer of that pharmacist.
A request for verification may be made by post, fax or telephone or electronically, for example by accessing a Web Site.
As mentioned above, the security code 10 applied to each packet 2 may be derived solely firom the public data 8 printed on the packet 2, if that data is unique. For example, the public data may include a unique item number, the exact production time or a random number in addition to the normal batch number 6 and expiry date information 4. The security code 10 is derived directly fromthis combination of unique and non-unique data and by means of the encryption algorithm 14.
During the verification process, the requester provides the public data 8 printed on the pack and this is entered into the encryption algorithm by the verifier, thereby generating a verification code. The requester then provides the security code 10 printed on the pack and, if this matches the verification code generated by the verifier, the authenticity of the goods is confirmed. If the security code provided by the requester does not match the verification code, authenticity is denied. As in the process described above, a log may be kept of requests for verification and details of the requester.
The verification process is not limited to pharmaceuticals or to goods sold in printed packs and is equally applicable to goods such as aircraft parts, on which the public data 8 and the security code 10 may be marked directly, for example by stamping. In the case of goods sold in printed packs, the use of digital printing methods is not essential, although it is preferred as this provides certain additional advantages as discussed above.
WO 00/23954 PCT/GB99/03377 8 It is not essential that the public data from which the security code is derived includes either the product batch number or date information. The public data may be entirely random or pseudo-random, or may be derived from the batch and item numbers, for example by means of a two-way algorithm.
The public data and the security code can also be amalgamated into a single number according to a predetermined algorithm. In order to verify the authenticity of the goods, the requester only has to provide that number. The verifier can automatically separate the public data from the security code and then use the public data extracted from that number to generate a verification code, which can then be compared with the security code extracted from the number provided on the goods. Verification can thus be achieved in a single step.

Claims (14)

1. A method of verifying the authenticity of goods wherein a set of public data is applied to the goods and, upon receiving a request for verification, the public data applied to the goods is entered into a predetermined encryption algorithm to generate a verification code; characterised in that: a security code (10) is applied to the goods, said security code (10) having been derived by means of a predetermined encryption algorithm (14) from said public data (8) applied to the goods and a plurality of private data sets (12) held by a verifier, and, upon receiving a request for verification, each private data set (12) is entered into said predetermined encryption algorithm (14) together with the public data (8) applied to the goods to generate a list of verification codes and said list of verification codes (24) is compared with the security code (10) applied to the goods to assess the authenticity of goods.
2. A method according to claim 1, wherein the verifier maintains a log (30) of requests for verification and, upon receiving a request for verification, compares the public data applied to the goods with the data held in the log (30) to assess the authenticity of goods.
3. A method according to claim 1 or claim 2, wherein the public data includes a batch number.
4. A method according to any one of the preceding claims, wherein the public data includes date information.
A method according to any one of the preceding claims, wherein the private data (12) includes an item number.
6. A method according to any one of the preceding claims, wherein said public data and said security code (10) is incorporated into the design printed onto the goods as reversed out characters, blends or tints. 3
7. A method of marking goods to enable the authenticity of those goods to be verified, wherein a set of public data is applied to the goods for use in a subsequent verification process; characterised in that a security code (10) is applied to the goods, said security code (10) having been derived by means ofa predetermined encryption algorithm (14) from said public data applied to the goods and a plurality ofprivate data sets.(12) held by a verifier.
8. A method according to claim 7, wherein the public data includes a batch number.
9. A method according to claim 7 or claim 8, wherein the public data includes date information.
A method according to any one of claims 7 to 9, wherein said public data and' said security code (10) is incorporated into the design printed onto the goods as reversed out characters, blends or tints.
11. Goods marked for verification purposes, each of said goods including a set of public data applied to the goods for use in a subsequent verification process; characterised in that each of said goods includes a security code (10) applied to the goods, said security code (10) having been derived by means of a predetermined encryption algorithm from said public data applied to the goods and a plurality of private data (12) sets held by a verifier.
12. Goods according to claim 11, whereinthe public data includes abatch number.
13. Goods according to claim 11 or claim 12, whereinthe public data includes date information.
14. Goods according to any one of claims 11 to 13, wherein said public data and said security code (10) is incorporated into the design printed onto the goods as reversed out characters, blends or tints.
AU61152/99A 1998-10-17 1999-10-11 Verification method Ceased AU767698B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB9822626 1998-10-17
GB9822626A GB2342743B (en) 1998-10-17 1998-10-17 Verification method
PCT/GB1999/003377 WO2000023954A1 (en) 1998-10-17 1999-10-11 Verification method

Publications (2)

Publication Number Publication Date
AU6115299A AU6115299A (en) 2000-05-08
AU767698B2 true AU767698B2 (en) 2003-11-20

Family

ID=10840711

Family Applications (1)

Application Number Title Priority Date Filing Date
AU61152/99A Ceased AU767698B2 (en) 1998-10-17 1999-10-11 Verification method

Country Status (7)

Country Link
EP (1) EP1121670A1 (en)
JP (1) JP2002528933A (en)
CN (1) CN1149515C (en)
AU (1) AU767698B2 (en)
CA (1) CA2346956A1 (en)
GB (1) GB2342743B (en)
WO (1) WO2000023954A1 (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001015097A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Method for product assurance
GB0015147D0 (en) * 2000-06-21 2000-08-09 Jacobs Michael Tracking system
WO2002039397A1 (en) * 2000-11-07 2002-05-16 Zhivko Georgiev Zhelev A device for recording multi-dimensional coded markings upon products for protection and verification purposes
JP2002226047A (en) * 2001-01-31 2002-08-14 National Food Research Institute Identifier for information disclosure in distribution network
DE10124442A1 (en) * 2001-05-18 2002-11-21 Bosch Gmbh Robert Identifying products to determine authenticity involves using second marking encoded depending on first marking varying from product to product on product/packaging element(s)
EP1316925A1 (en) * 2001-12-01 2003-06-04 Scheidt & Bachmann Gmbh Method for protecting permits against falsification
FR2835128B1 (en) * 2002-01-21 2005-03-04 Patricia Etienne METHOD AND DEVICE FOR PROTECTING AND USING THE METHOD IN TRACKING A PRODUCT OBJECT
DE10222569A1 (en) * 2002-05-17 2003-12-04 Aventis Pharma Gmbh Method for counterfeit-proof labeling of products
GB2390703A (en) 2002-07-02 2004-01-14 Ascent Group Ltd Storage and authentication of data transactions
DE10305430A1 (en) * 2003-02-04 2004-08-19 Dietrich Heinicke Product assurance system and procedures therefor
DE10328328B4 (en) 2003-06-25 2015-06-03 TÜV Rheinland Holding AG Product protection portal and method for checking the authenticity of products
US20060005027A1 (en) * 2004-06-15 2006-01-05 Userstar Information System Co., Ltd Method and system for verifying authenticity of an object
GB0420682D0 (en) * 2004-09-17 2004-10-20 Elliot David W Method for marking goods and packaging
JP2006229852A (en) * 2005-02-21 2006-08-31 Dainippon Printing Co Ltd Product authentication system, server, program, and recording medium
ATE349052T1 (en) * 2005-03-22 2007-01-15 Userstar Information System Co METHOD AND SYSTEM FOR CHECKING THE AUTHENTICITY OF AN OBJECT
US9076188B2 (en) * 2005-04-13 2015-07-07 Hewlett-Packard Development Company, L.P. Method and system for shipment authentication
FI119530B (en) * 2005-06-10 2008-12-15 Trackway Oy Product tag verification
GB0601700D0 (en) * 2006-01-27 2006-03-08 Claricom Ltd Printing Method
KR20070103993A (en) * 2006-04-21 2007-10-25 김성수 Imitation prevention system
CA2655173C (en) * 2006-06-12 2013-11-19 The Procter & Gamble Company A lotioned wipe product comprising an anti-stick agent and a performance enhancing agent
DE102006060065A1 (en) * 2006-12-19 2008-06-26 Giesecke & Devrient Gmbh Method for authenticating product by verification of product code, fixed at product and generated with cryptographic code, involves storing multiple codes for generating or for verifying different product code by central office
US8108309B2 (en) 2007-05-29 2012-01-31 Provalidate Protecting a manufactured item from counterfeiting
DE102008016435A1 (en) * 2008-03-31 2009-10-15 Siemens Aktiengesellschaft Adhesive label and method for identifying and authenticating an article with adhesive labels
US8140852B2 (en) 2008-06-16 2012-03-20 International Business Machines Corporation Authenticating serialized commodities
WO2010079465A2 (en) * 2009-01-07 2010-07-15 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer
DE102009022233A1 (en) * 2009-05-20 2010-11-25 Feustel, Dietmar Use of a character string in systems of cryptography, statistics, simulation, randomization, slot machines and the like.
GB2470900B (en) 2009-06-08 2017-06-14 Kezzler As Method and system for storage and retrieval of track and trace information
EP2306377A1 (en) 2009-09-24 2011-04-06 Kezzler AS Method and system for providing secure codes for marking on items
US8423770B2 (en) 2009-09-24 2013-04-16 Kezzler As Method and system for providing secure codes for marking on items
US8532506B2 (en) * 2010-11-29 2013-09-10 Xerox Corporation Multiple market consumable ID differentiation and validation system
EP2472451A1 (en) * 2010-12-30 2012-07-04 Philip Morris Products S.A. Method and apparatus for marking manufactured items
US20150278487A1 (en) * 2014-03-28 2015-10-01 Enceladus IP Holdings, LLP Security scheme for authenticating digital entities and aggregate object origins
US9619706B2 (en) * 2014-03-28 2017-04-11 Enceladus Ip Holdings Llc Security scheme for authenticating object origins
US10102532B2 (en) * 2014-11-17 2018-10-16 Amazon Technologies, Inc. Tracking and verifying authenticity of items
US10318962B2 (en) 2014-11-17 2019-06-11 Amazon Technologies, Inc. Authenticity label for items
EP3051469A1 (en) 2015-01-28 2016-08-03 Philip Morris Products S.A. Method and apparatus for unit and container identification and tracking
ES2728680T3 (en) 2015-01-31 2019-10-28 Inexto Sa Secure product identification and verification
US20180205543A1 (en) 2015-08-13 2018-07-19 Inexto Sa Enhanced obfuscation or randomization for secure product identification and verification
US10579889B2 (en) 2015-08-25 2020-03-03 Inexto Sa Verification with error tolerance for secure product identifiers
US10594494B2 (en) 2015-08-25 2020-03-17 Inexto Sa Multiple authorization modules for secure production and verification
CN107657457B (en) * 2016-08-10 2018-11-23 沈洪德 The method, apparatus and system of multi-level two-dimension code anti-counterfeit Internet-based

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1980002757A1 (en) * 1979-06-06 1980-12-11 H Winderlich Process for protecting sound recording carrier and the labels and/or packages thereof against counterfeiting
US5432506A (en) * 1992-02-25 1995-07-11 Chapman; Thomas R. Counterfeit document detection system
US5768384A (en) * 1996-03-28 1998-06-16 Pitney Bowes Inc. System for identifying authenticating and tracking manufactured articles

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL37456A (en) * 1971-08-05 1975-10-15 Elscint Ltd Method and means for numbering and/or ascertaining the authenticity of serially numbered objects
DE2350418A1 (en) * 1973-10-08 1975-04-10 Gretag Ag PROCEDURE AND EQUIPMENT FOR CREATING AND EVALUATING FALSE-PROOF MACHINELY READABLE PAYMENT RECEIPTS
JPS5239346A (en) * 1975-09-23 1977-03-26 Fujitsu Ltd Ballot processor
GB2101376B (en) * 1981-07-11 1986-05-21 John Gordon Lawrence Method and apparatus for use against counterfeiting
US4626669A (en) * 1983-12-28 1986-12-02 Fairview Partners Intercept system for intercepting stolen, lost and fraudulent cards
US5388158A (en) * 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same
WO1994019770A1 (en) * 1993-02-19 1994-09-01 Her Majesty In Right Of Canada, As Represented By The Minister Of Communications Secure personal identification instrument and method for creating same
US5384846A (en) * 1993-04-26 1995-01-24 Pitney Bowes Inc. System and apparatus for controlled production of a secure identification card
US5505494B1 (en) * 1993-09-17 1998-09-29 Bell Data Software Corp System for producing a personal id card
US6005960A (en) * 1994-04-14 1999-12-21 Moore; Lewis J. Anti-counterfeiting system
US6904525B1 (en) * 1997-07-01 2005-06-07 Pitney Bowes Inc. Method for preventing counterfeiting of articles of manufacture

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1980002757A1 (en) * 1979-06-06 1980-12-11 H Winderlich Process for protecting sound recording carrier and the labels and/or packages thereof against counterfeiting
US5432506A (en) * 1992-02-25 1995-07-11 Chapman; Thomas R. Counterfeit document detection system
US5768384A (en) * 1996-03-28 1998-06-16 Pitney Bowes Inc. System for identifying authenticating and tracking manufactured articles

Also Published As

Publication number Publication date
GB9822626D0 (en) 1998-12-09
AU6115299A (en) 2000-05-08
JP2002528933A (en) 2002-09-03
GB2342743B (en) 2003-05-14
CN1326578A (en) 2001-12-12
EP1121670A1 (en) 2001-08-08
CN1149515C (en) 2004-05-12
WO2000023954A1 (en) 2000-04-27
CA2346956A1 (en) 2000-04-27
GB2342743A (en) 2000-04-19

Similar Documents

Publication Publication Date Title
AU767698B2 (en) Verification method
EP0996928B1 (en) Verification of authenticity of goods by use of random numbers
US10621392B2 (en) Method and system for marking manufactured items to detect unauthorized refilling
CA2892566C (en) Method and apparatus for marking manufactured items using physical characteristic
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
JP5739876B2 (en) Unique identifiers, methods for providing unique identifiers, and use of unique identifiers
KR101127327B1 (en) Methods and systems for marking, tracking and authentication of products
EP0889448B1 (en) Method for preventing counterfeiting of articles of manufacture
US9721260B2 (en) Method and apparatus for marking manufactured items
US8123126B2 (en) Anti-counterfeit packaging
WO2019068893A1 (en) A system and method for authenticating a product
CN101356538A (en) Method of authentication of items put into circulation field
WO2009013078A1 (en) Method and system for identifying a product as an original product of a product manufacturer
RU2787209C2 (en) Method and system for marking finished products to detect unauthorized refilling
JP2003137348A (en) Product with authenticity determination information, printing method and printer for authenticity determination, and authenticity determination device

Legal Events

Date Code Title Description
SREP Specification republished
FGA Letters patent sealed or granted (standard patent)