GB2342743A - Verification method - Google Patents

Verification method Download PDF

Info

Publication number
GB2342743A
GB2342743A GB9822626A GB9822626A GB2342743A GB 2342743 A GB2342743 A GB 2342743A GB 9822626 A GB9822626 A GB 9822626A GB 9822626 A GB9822626 A GB 9822626A GB 2342743 A GB2342743 A GB 2342743A
Authority
GB
United Kingdom
Prior art keywords
goods
public data
verification
security code
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9822626A
Other versions
GB2342743B (en
GB9822626D0 (en
Inventor
Nicholas Paul Elliot
David William Elliott
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB9822626A priority Critical patent/GB2342743B/en
Publication of GB9822626D0 publication Critical patent/GB9822626D0/en
Priority to EP99947787A priority patent/EP1121670A1/en
Priority to PCT/GB1999/003377 priority patent/WO2000023954A1/en
Priority to CA002346956A priority patent/CA2346956A1/en
Priority to CNB998133981A priority patent/CN1149515C/en
Priority to JP2000577626A priority patent/JP2002528933A/en
Priority to AU61152/99A priority patent/AU767698B2/en
Publication of GB2342743A publication Critical patent/GB2342743A/en
Application granted granted Critical
Publication of GB2342743B publication Critical patent/GB2342743B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/42Coin-freed apparatus for hiring articles; Coin-freed facilities or services for ticket printing or like apparatus, e.g. apparatus for dispensing of printed paper tickets or payment cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method of verifying the authenticity of goods is provided, wherein a set of public data (4,6,8) and security code (10) are applied to the goods (2), said security code having been derived from said public data by means of a predetermined encryption algorithm. Upon receiving a request for verification, the public data (4,6,8) applied to the goods (2) is entered into the predetermined encryption algorithm to generate a verification code. The verification code is then compared with the security code (10) applied to the goods to assess the authenticity of goods.

Description

2342743 VERIFICATION METHOD The present invention relates to a
verification method and in particular, but not exclusively, to a method of verifying products to ensure that they are genuine and not counterfeit. The invention also relates to a method of marking goods for verification purposes and to goods marked for verification purposes.
The problem of counterfeiting is enormous and affects a wide range of goods including, for example, pharmaceuticals and spare parts for aircraft. Counterfeiting is not only bad for the producer of genuine goods, resulting in lost sales and possible damage to reputation and goodwill, but can also result in danger to the public if the counterfeit goods are not up to the quality of the genuine goods. For example, counterfeit pharmaceuticals may be ineffective or contain harmful substances and counterfeit aircraft parts may fail during use.
The sophistication of counterfeiting methods is such that it is often difficult or impossible for the consumer, wholesaler, retailer, importer or distributor to tell whether the goods are genuine or counterfeit, and usually there is no way of verifying the authenticity of the goods.
It is an object of the invention to provide a verification method and a method of marking goods for verification purposes that mitigates at least some of the aforesaid problems.
According to the present invention there is provided a method of verifying the authenticity of goods, wherein:
a set of public data and a security code are applied to the goods, said security code having been derived from said public data by means of a predetermined encryption algorithm; - and, upon receiving a request for verification, the public data applied to the goods is entered into said predetermined encryption algorithm to generate a verification code, and said verification code is compared with the security code applied to the goods to assess the authenticity of goods.
2 The set of public data and the security code may be applied to the goods themselves or to packaging for the goods and the invention as defined by claim 1 is intended to include both of these possibilities.
The method allows the authenticity of the goods to be verified very quickly and simply, for example by means of a telephone call to the verifier. Counterfeiting of the goods is made very difficult by the fact that each goods item carries a unique security code number. The security code can be applied to the goods by ordinary printing processes at minimal cost. The need for expensive security devices such as holograms is avoided.
16 Advantageously, said security code is derived from said public data applied to the goods and private data held by the verifier and, upon receiving a request for verification, the public data applied to the goods and private data held by the verifier are entered into said predetermined encryption algorithm to generate a verification code, and said verification code is compared with the security code applied to the goods to assess the authenticity of goods.
The verifier may be either the manufacturer or any other body authorised by the manufacturer and the term "verifier" as used in the claims is intended to include any such body.
The private data may be related to public data, for example to batch number, so enabling the verifier to assign different sets of private data to different batches of products. Then, when a request for verification is received, the verifier can select the appropriate set of private data for the particular goods for which verification has been requested.
The use of private data in, addition to the public data applied to the goods increases the security of the encryption process, making it more difficult to counterfeit the goods.
Advantageously, said private data includes a plurality of private data sets and, upon receiving a request for verification, each private data set is entered into said predetermined encryption algorithm together with the public data applied to the goods 3 to generate a list of verification codes, and said list of verification codes is compared with the security code applied to the goods to assess the authenticity of goods.
Each set of private data may be unique for each goods item, enabling the item number to be identified. This can help the verifier to track the activities of counterfeiters.
The public data may include a batch number and/or date information, for example the expiry date or the manufacturing date and time.
The private data may include an item number, allowing the verifier to identify the goods item in question, or it may be a random or pseudorandom number.
Advantageously, the public data and the private data is applied to the goods by means of a digital printing process and is incorporated into the design printed onto the goods. This makes it more difficult for the goods to be counterfeited using plate-based printing techniques.
Advantageously, the public data and the private data is incorporated into the design printed onto the goods as reversed out characters, blends or tints. This makes it more difficult for the goods to be counterfeited using over-printing or over- coding techniques.
According to a further aspect of the invention there is provided a method of marking goods to enable the authenticity of those goods to be verified, wherein a set of public data and a security code are applied to the goods, said security code having been derived from said public data by means of a predetermined encryption algorithm.
According to a further aspect of the invention there are provided goods marked for verification purposes, each of said goods including a set of public data and a security code applied to the goods, said security code having been derived from said public data by means of a predetermined encryption algorithm.
Embodiments of the invention will now be described by way of example with reference to the accompanying drawings, in which:
4 Fig. I is a perspective view of a medicine packet that has been marked for verification purposes, Fig. 2 represents schematically a method of marking goods for verification purposes, and Fig. 3 represents schematically a method of verifying the marked goods.
An example of a product, in this case a medicine packet 2, that has been marked for verification purposes is shown in Fig. 1. In the usual way, the packet has been marked by the manufacturer with information such as the expiry date 4, which in this case includes both the date and a time, and a lot or batch number. This information, which is printed on the packet in such a way that it can be read by the public, will be referred to hereinafter as the "public data" 8. This public data 8 may be either unique to each packet (for example, an item number may be included or the expiry date may include a time code based on the exact time of manufacture), or alternatively all packets manufactured in the same batch may carry identical public data.
In addition, the packet carries a security code 10. The security code 10 is unique to that packet and every packet therefore carries a different security code. The provision of a unique security code provides a first obstacle to counterfeiting, since printing different codes on each pack demands adaptable printing techniques and the provision of identical security codes on any two packets will immediately indicate that the goods 20 are not genuine.
The usual method of marking packets with information that varies from pack to pack, or from batch to batch, is to stamp or print that variable information onto pre-printed packets in a separate printing process. This process is known as over-coding. This method can be copied relatively easily by counterfeiters.
In the packet shown in Fig. 1, counterfeiting is made more difficult by using digital printing techniques to print both the design of the packet (including the product trade mark, any descriptive matter and any graphical elements) and the variable information in a single step. Many well known digital printing techniques may be employed, including for example the INDIGO (TM), XEIKON JM) and SCITEX (TM) processes. The advantage of using a digital printing process is that because printing takes place under digital electronic control, the printed image can be varied for each individual packet and can be incorporated into the overall design of the pack. This cannot readily be achieved with traditional plate-based printing processes, since a separate set of printing plates must be prepared for each different image.
Preferably, the variable information including the public data and the security code is incorporated into the design in such a way that would affect as many plates of a conventional printing process as possible. For example, in the packet shown in Fig. 1 the security code number 10 has been positioned to overlap areas of two different background colours. Further, the variable information has been incorporated into the design as "reversed out" characters, i.e. characters produced by leaving the shapes of those characters unprinted against a background of solid colour so that the base material shows through. This helps to prevent that information being added in a subsequent over-coding process. The effect of this process is illustrated in Fig. 1, the variable information 8, 10 being shown as white characters on a coloured background. Alternatively, the characters may be printed as blends or tints, which are also difficult to reproduce using conventional printing processes.
The security code 10 applied to each packet is derived directly from unique information associated with each pack by means of a secret encryption algorithm. The security code 10 may be derived either from a combination of the public data 8 printed on the packet 2 and private data held by the manufacturer or an authorised verifying organisation, or alternatively it may be derived solely from the public data, if that data is unique. The processes for deriving and verifying the security codes applied to the packets are described below with reference to Figs. 2 and 3.
Fig. 2 illustrates schematically a process for deriving the security codes and applying them to the packets using a combination of the public data 8 pfinted on the packet 2 and private data 12 held by the manufacturer or an authofised vefifying organisation. The public data 8 consists for example of the batch number 6 and the expiry date 4. This data need not be unique. The private data 12 is not pfinted on the packet and is held either by the manufacturer or an authorised vefifying organisation. The 6 private data 12 is unique and may represent, for example, the item number of each packet in a given batch, or may be a random or pseudo-random number.
The security code 10 for each packet is derived automatically during the printing process by subjecting the private data 12 and the public data 8 to an encryption process 14, such as a one-way hash function or a merge digest, as described in Applied Cryptography, second edition by Bruce Schneier, page 30, section 2.4 "oneway hash functions" (John Wiley & Sons, Inc., 1996) ISBN 0471117091. This generates a unique security code 10, which is printed onto the packet 2 together with the public data 8 by means of a digital printer 18.
No record is kept of the security codes 10. However, a data record 20 is kept of the public data 8 and the associated private data 12 used in the encryption process. This data record 20 is supplied to the verifying authority, for example on a floppy disk or by electronic data transfer.
The verification process is illustrated schematically in Fig. 3. The verifying 15 authority, which may the manufacturer or an outside body authorised by the manufacturer, uses an identical encryption algorithm 14 to that used during printing and is supplied with the data record 20 of public data 8 and private data 12. When the verifg authority receives a request for verification, for example from a member of the public who has purchased the goods, the requester is asked to provide the public data 8 printed on the packet 2. This public data 8 is entered into the encryption algorithm 14 together with the private data 12 associated with that public data 8, as retrieved from the data record 20. This generates a list 24 of possible verification codes and the private data associated with each of those codes.
The requester is then asked to provide the security code 10 printed on the packet 2 and this code 10 is compared 26 with the list 24 of verification codes generated by the encryption algorithm 14. If that security code 10 matches a verification code on the list 24, the authenticity of the goods is verified 28: if a match is not found, the authenticity of the goods is denied.
7 The verifier may keep a log 30 of all requests for verification, which stores the public and private data for each item that has been verified. During the verification step, the log 30 may be checked to see whether a request for verification has been received previously in respect of that item. If so, verification may be denied since this suggests that the item has been copied.
The log 30 may also contain other information 32, for example the date and time of the request and the identity and geographical location of the requester. If two requests for verification are made for the same item, it may be possible to discount any likelihood of the item being counterfeit, for example if the requests are made first by a retail pharmacist and subsequently by a customer of that pharmacist.
A request for verification may be made by post, fax or telephone or electronically, for example by accessing a Web Site.
As mentioned above, the security code 10 applied to each packet 2 may be derived solely from the public data 8 printed on the packet 2, if that data is unique. For example, the public data may include a unique item number, the exact production time or a random number in addition to the normal batch number 6 and expiry date information 4. The security code 10 is derived directly from this combination of unique and non-unique data and by means of the encryption algorithm 14.
During the verification process, the requester provides the public data 8 printed on the pack and this is entered into the encryption algorithm by the verifier, thereby generating a verification code. The requester then provides the security code 10 printed on the pack and, if this matches the verification code generated by the verifier, the authenticity of the goods is confirmed. If the security code provided by the requester does not match the verification code, authenticity is denied. As in the process described above, a log may be kept of requests for verification and details of the requester.
The verification process is not limited to pharmaceuticals or to goods sold in printed packs and is equally applicable to goods such as aircraft parts, on which the public data 8 and the security code 10 may be marked directly, for example by stamping.
8 In the case of goods sold in printed packs, the use of digital printing methods i,-, not essential, although it is preferred as this provides certain additional advantages as discussed above.
It is not essential that the public data from which the security code is derived includes either the product batch number or date information. The public data may be entirely random or pseudo-random, or may be derived from the batch and item numbers, for example by means of a two-way algorithm.
The public data and the security code can also be amalgamated into a single number according to a predetermined algorithm. In order to verify the authenticity of the goods, the requester only has to provide that number. The verifier can automatically separate the public data from the security code and then use the public data extracted from that number to generate a verification code, which can then be compared with the security code extracted from the number provided on the goods. Verification can thus be achieved in a single step.
9

Claims (22)

  1. Claims
    I A method of verifying the authenticity of goods, wherein:
    a set of public data and a security code are applied to the goods, said security code having been derived from said public data by means of a predetermined encryption algorithm; and, upon receiving a request for verification, the public data applied to the goods is entered into said predetermined encryption algorithm to generate a verification code, and said verification code is compared with the security code applied to the goods to assess the authenticity of goods.
  2. 2. A method according to claim 1, wherein said security code is derived from said public data applied to the goods and private data held by the verifier and, upon receiving a request for verification, the public data applied to the goods and private data held by the verifier are entered into said predetermined encryption algorithm to generate a verification code, and said verification code is compared with the security code applied to the goods to assess the authenticity of goods.
  3. 3. A method according to claim 2, wherein said private data includes a plurality of private data sets and, upon receiving a request for verification, each private data set is entered into said predetermined encryption algorithm together with the public data applied to the goods to generate a list of verification codes, and said list of verification codes is compared with the security code applied to the goods to assess the authenticity of goods.
  4. 4. A method according to any one of the preceding claims, wherein the verifier maintains a log of requests for verification and, upon receiving a request for verification, compares the public data applied to the goods with the data held in the log to assess the authenticity of goods.
  5. 5. A method according to any one of the preceding claims, wherein the public data includes a batch number.
  6. 6. A method according to any one of the preceding claims, wherein the public data includes date information.
  7. 7. A method according to any one of the preceding claims, wherein the private data includes an item number.
  8. 8. A method according to any one of the preceding claims, wherein said public data and said private data is applied to the goods by means of a digital printing process and is incorporated into the design printed onto the goods.
  9. 9. A method according to claim 8, wherein said public data and said private data is incorporated into the design printed onto the goods as reversed out characters, blends or tints.
  10. 10. A method marking goods to enable the authenticity of those goods to be verified, wherein a set of public data and a security code are applied to the goods, said security code having been derived from said public data by means of a predetermined encryption algorithm.
  11. 11. A method according to claim 10, wherein the public data includes a batch number.
  12. 12. A method according to claim 10 or claim 11, wherein the public data includes date information.
  13. 13. A method according to any one of claims 10 to 12, wherein said public data and said private data is applied to the goods by means of a digital printing process and is incorporated into the design printed onto the goods.
  14. 14. A method according to any one of claims 10 to 13, wherein said public data and said private data is incorporated into the design printed onto the goods as reversed out characters, blends or tints.
  15. 15. Goods marked for verification purposes, each of said goods including a set of public data and a security code applied to the goods, said security code having been derived from said public data by means of a predetermined encryption algorithm.
    11
  16. 16. Goods according to claim 15, wherein the public data includes a batch number.
  17. IT Goods according to claim 15 or claim 16, wherein the public data includes date information.
  18. 18. Goods according to any one of claims 15 to 17, wherein said public data and said private data is applied to the goods by means of a digital printing process and is incorporated into the design printed onto the goods.
  19. 19. Goods according to any one of claims 15 to 18, wherein said public data and said private data is incorporated into the design printed onto the goods as reversed out characters, blends or tints.
  20. 20. A method of verifying the authenticity of goods, said method being substantially as described herein with reference to and as illustrated by the accompanying drawings.
  21. 21. A method marking goods to enable the authenticity of those goods to be verified, said method being substantially as described herein with reference to and as illustrated by the accompanying drawings.
  22. 22. Goods marked for verification purposes, said goods being substantially as described herein with reference to and as illustrated by the accompanying drawings.
GB9822626A 1998-10-17 1998-10-17 Verification method Expired - Fee Related GB2342743B (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
GB9822626A GB2342743B (en) 1998-10-17 1998-10-17 Verification method
EP99947787A EP1121670A1 (en) 1998-10-17 1999-10-11 Verification method
PCT/GB1999/003377 WO2000023954A1 (en) 1998-10-17 1999-10-11 Verification method
CA002346956A CA2346956A1 (en) 1998-10-17 1999-10-11 Verification method
CNB998133981A CN1149515C (en) 1998-10-17 1999-10-11 Verification method
JP2000577626A JP2002528933A (en) 1998-10-17 1999-10-11 Confirmation method
AU61152/99A AU767698B2 (en) 1998-10-17 1999-10-11 Verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9822626A GB2342743B (en) 1998-10-17 1998-10-17 Verification method

Publications (3)

Publication Number Publication Date
GB9822626D0 GB9822626D0 (en) 1998-12-09
GB2342743A true GB2342743A (en) 2000-04-19
GB2342743B GB2342743B (en) 2003-05-14

Family

ID=10840711

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9822626A Expired - Fee Related GB2342743B (en) 1998-10-17 1998-10-17 Verification method

Country Status (7)

Country Link
EP (1) EP1121670A1 (en)
JP (1) JP2002528933A (en)
CN (1) CN1149515C (en)
AU (1) AU767698B2 (en)
CA (1) CA2346956A1 (en)
GB (1) GB2342743B (en)
WO (1) WO2000023954A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007085841A1 (en) * 2006-01-27 2007-08-02 Claricom Limited Printing method
WO2008147422A1 (en) * 2007-05-29 2008-12-04 Provalidate Incorporated Protecting a manufactured item from counterfeiting
EP2136312A1 (en) * 2008-06-16 2009-12-23 International Business Machines Corporation Authenticating serialized commodities
WO2010079465A2 (en) * 2009-01-07 2010-07-15 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer
EP2306377A1 (en) 2009-09-24 2011-04-06 Kezzler AS Method and system for providing secure codes for marking on items
EP2472451A1 (en) * 2010-12-30 2012-07-04 Philip Morris Products S.A. Method and apparatus for marking manufactured items
US8423770B2 (en) 2009-09-24 2013-04-16 Kezzler As Method and system for providing secure codes for marking on items
DE112006000872B4 (en) * 2005-04-13 2014-04-03 Hewlett-Packard Development Co., L.P. Method for goods shipment authentication
EP2924916A1 (en) * 2014-03-28 2015-09-30 Enceladus IP Holdings LLC Security scheme for authenticating digital entities and aggregate object origins
EP2924915A1 (en) * 2014-03-28 2015-09-30 Enceladus IP Holdings LLC Security scheme for authenticating object origins
US10579889B2 (en) 2015-08-25 2020-03-03 Inexto Sa Verification with error tolerance for secure product identifiers
US10587403B2 (en) 2015-08-13 2020-03-10 Inexto Sa Enhanced obfuscation or randomization for secure product identification and verification
US10594494B2 (en) 2015-08-25 2020-03-17 Inexto Sa Multiple authorization modules for secure production and verification
US10680826B2 (en) 2015-01-31 2020-06-09 Inexto Sa Secure product identification and verification
US10984370B2 (en) 2015-01-28 2021-04-20 Inexto Sa Method and apparatus for unit and container identification and tracking

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001015097A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Method for product assurance
GB0015147D0 (en) 2000-06-21 2000-08-09 Jacobs Michael Tracking system
EP1402485A1 (en) * 2000-11-07 2004-03-31 Zhivko Georgiev Zhelev A device for recording multi-dimensional coded markings upon products for protection and verification purposes
JP2002226047A (en) * 2001-01-31 2002-08-14 National Food Research Institute Identifier for information disclosure in distribution network
DE10124442A1 (en) * 2001-05-18 2002-11-21 Bosch Gmbh Robert Identifying products to determine authenticity involves using second marking encoded depending on first marking varying from product to product on product/packaging element(s)
EP1316925A1 (en) * 2001-12-01 2003-06-04 Scheidt & Bachmann Gmbh Method for protecting permits against falsification
FR2835128B1 (en) * 2002-01-21 2005-03-04 Patricia Etienne METHOD AND DEVICE FOR PROTECTING AND USING THE METHOD IN TRACKING A PRODUCT OBJECT
DE10222569A1 (en) * 2002-05-17 2003-12-04 Aventis Pharma Gmbh Method for counterfeit-proof labeling of products
GB2390703A (en) 2002-07-02 2004-01-14 Ascent Group Ltd Storage and authentication of data transactions
DE10305430A1 (en) * 2003-02-04 2004-08-19 Dietrich Heinicke Product assurance system and procedures therefor
DE10328328B4 (en) 2003-06-25 2015-06-03 TÜV Rheinland Holding AG Product protection portal and method for checking the authenticity of products
US20060005027A1 (en) * 2004-06-15 2006-01-05 Userstar Information System Co., Ltd Method and system for verifying authenticity of an object
GB0420682D0 (en) * 2004-09-17 2004-10-20 Elliot David W Method for marking goods and packaging
JP2006229852A (en) * 2005-02-21 2006-08-31 Dainippon Printing Co Ltd Product authentication system, server, program, and recording medium
EP1705618B1 (en) * 2005-03-22 2006-12-20 Userstar Information System Co., Ltd. Method and system for verifying authenticity of an object
FI119530B (en) * 2005-06-10 2008-12-15 Trackway Oy Product tag verification
KR20070103993A (en) * 2006-04-21 2007-10-25 김성수 Imitation prevention system
EP2029087A1 (en) * 2006-06-12 2009-03-04 The Procter and Gamble Company A lotioned wipe product comprising an anti-stick agent and a performance enhancing agent
DE102006060065A1 (en) * 2006-12-19 2008-06-26 Giesecke & Devrient Gmbh Method for authenticating product by verification of product code, fixed at product and generated with cryptographic code, involves storing multiple codes for generating or for verifying different product code by central office
DE102008016435A1 (en) * 2008-03-31 2009-10-15 Siemens Aktiengesellschaft Adhesive label and method for identifying and authenticating an article with adhesive labels
DE102009022233A1 (en) * 2009-05-20 2010-11-25 Feustel, Dietmar Use of a character string in systems of cryptography, statistics, simulation, randomization, slot machines and the like.
GB2470900B (en) 2009-06-08 2017-06-14 Kezzler As Method and system for storage and retrieval of track and trace information
US8532506B2 (en) * 2010-11-29 2013-09-10 Xerox Corporation Multiple market consumable ID differentiation and validation system
US10318962B2 (en) 2014-11-17 2019-06-11 Amazon Technologies, Inc. Authenticity label for items
US10102532B2 (en) * 2014-11-17 2018-10-16 Amazon Technologies, Inc. Tracking and verifying authenticity of items
US9652644B2 (en) * 2015-07-29 2017-05-16 Palo Alto Research Center Incorporated Printable, writeable article for tracking counterfeit and diverted products
US9646310B2 (en) * 2015-07-29 2017-05-09 Palo Alto Research Center Incorporated Printable, writeable article for tracking counterfeit and diverted products
CN107657457B (en) * 2016-08-10 2018-11-23 沈洪德 The method, apparatus and system of multi-level two-dimension code anti-counterfeit Internet-based

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1484042A (en) * 1973-10-08 1977-08-24 Gretag Ag Apparatus for preparing and assessing documents such as cheques
GB1554585A (en) * 1975-09-23 1979-10-24 Japan Racing Ass Apparatus for processing betting tickets
GB2101376A (en) * 1981-07-11 1983-01-12 John Gordon Lawrence Method and apparatus for use against counterfeiting
US4626669A (en) * 1983-12-28 1986-12-02 Fairview Partners Intercept system for intercepting stolen, lost and fraudulent cards
WO1994019770A1 (en) * 1993-02-19 1994-09-01 Her Majesty In Right Of Canada, As Represented By The Minister Of Communications Secure personal identification instrument and method for creating same
US5384846A (en) * 1993-04-26 1995-01-24 Pitney Bowes Inc. System and apparatus for controlled production of a secure identification card
US5635012A (en) * 1993-09-17 1997-06-03 Bell Data Software System for producing a personal ID card
GB2312307A (en) * 1996-04-17 1997-10-22 Lewis John Moore Anti-counterfeiting system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL37456A (en) * 1971-08-05 1975-10-15 Elscint Ltd Method and means for numbering and/or ascertaining the authenticity of serially numbered objects
DE2922882A1 (en) * 1979-06-06 1980-12-11 Stockburger H METHOD FOR SECURING CARTRIDGES AND THEIR LABELS AND / OR PACKAGING AGAINST IMITATION
US5432506A (en) * 1992-02-25 1995-07-11 Chapman; Thomas R. Counterfeit document detection system
US5388158A (en) * 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same
US5768384A (en) * 1996-03-28 1998-06-16 Pitney Bowes Inc. System for identifying authenticating and tracking manufactured articles
US6904525B1 (en) * 1997-07-01 2005-06-07 Pitney Bowes Inc. Method for preventing counterfeiting of articles of manufacture

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1484042A (en) * 1973-10-08 1977-08-24 Gretag Ag Apparatus for preparing and assessing documents such as cheques
GB1554585A (en) * 1975-09-23 1979-10-24 Japan Racing Ass Apparatus for processing betting tickets
GB2101376A (en) * 1981-07-11 1983-01-12 John Gordon Lawrence Method and apparatus for use against counterfeiting
US4626669A (en) * 1983-12-28 1986-12-02 Fairview Partners Intercept system for intercepting stolen, lost and fraudulent cards
WO1994019770A1 (en) * 1993-02-19 1994-09-01 Her Majesty In Right Of Canada, As Represented By The Minister Of Communications Secure personal identification instrument and method for creating same
US5384846A (en) * 1993-04-26 1995-01-24 Pitney Bowes Inc. System and apparatus for controlled production of a secure identification card
US5635012A (en) * 1993-09-17 1997-06-03 Bell Data Software System for producing a personal ID card
US5635012B1 (en) * 1993-09-17 1999-08-24 Gifford Krass Groh Sprinkle Pa System for producing a personal id card
GB2312307A (en) * 1996-04-17 1997-10-22 Lewis John Moore Anti-counterfeiting system

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9076188B2 (en) * 2005-04-13 2015-07-07 Hewlett-Packard Development Company, L.P. Method and system for shipment authentication
DE112006000872B4 (en) * 2005-04-13 2014-04-03 Hewlett-Packard Development Co., L.P. Method for goods shipment authentication
WO2007085841A1 (en) * 2006-01-27 2007-08-02 Claricom Limited Printing method
EP2600324A3 (en) * 2006-01-27 2013-11-06 Videojet Technologies, Inc. Printing method
EP2600324A2 (en) * 2006-01-27 2013-06-05 Videojet Technologies, Inc. Printing method
WO2008147422A1 (en) * 2007-05-29 2008-12-04 Provalidate Incorporated Protecting a manufactured item from counterfeiting
US8108309B2 (en) 2007-05-29 2012-01-31 Provalidate Protecting a manufactured item from counterfeiting
US8140852B2 (en) 2008-06-16 2012-03-20 International Business Machines Corporation Authenticating serialized commodities
EP2136312A1 (en) * 2008-06-16 2009-12-23 International Business Machines Corporation Authenticating serialized commodities
WO2010079465A2 (en) * 2009-01-07 2010-07-15 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer
WO2010079465A3 (en) * 2009-01-07 2011-05-05 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer
US8423770B2 (en) 2009-09-24 2013-04-16 Kezzler As Method and system for providing secure codes for marking on items
EP2306377A1 (en) 2009-09-24 2011-04-06 Kezzler AS Method and system for providing secure codes for marking on items
RU2591010C2 (en) * 2010-12-30 2016-07-10 Диджитал Коудинг Энд Трэкинг Ассоушиэйшн Method and device for marking of manufactured objects
EP2472451A1 (en) * 2010-12-30 2012-07-04 Philip Morris Products S.A. Method and apparatus for marking manufactured items
WO2012089582A1 (en) * 2010-12-30 2012-07-05 Philip Morris Products Sa Method and apparatus for marking manufactured items
US9721260B2 (en) 2010-12-30 2017-08-01 Inexto Sa Method and apparatus for marking manufactured items
CN103460230A (en) * 2010-12-30 2013-12-18 数字编码和跟踪协会 Method and apparatus for marking manufactured items
EP2924915A1 (en) * 2014-03-28 2015-09-30 Enceladus IP Holdings LLC Security scheme for authenticating object origins
US9619706B2 (en) 2014-03-28 2017-04-11 Enceladus Ip Holdings Llc Security scheme for authenticating object origins
EP2924916A1 (en) * 2014-03-28 2015-09-30 Enceladus IP Holdings LLC Security scheme for authenticating digital entities and aggregate object origins
US10320567B2 (en) 2014-03-28 2019-06-11 Signet Ip Holdings Llc Security scheme for authenticating object origins
US10984370B2 (en) 2015-01-28 2021-04-20 Inexto Sa Method and apparatus for unit and container identification and tracking
US10680826B2 (en) 2015-01-31 2020-06-09 Inexto Sa Secure product identification and verification
US10587403B2 (en) 2015-08-13 2020-03-10 Inexto Sa Enhanced obfuscation or randomization for secure product identification and verification
US10579889B2 (en) 2015-08-25 2020-03-03 Inexto Sa Verification with error tolerance for secure product identifiers
US10594494B2 (en) 2015-08-25 2020-03-17 Inexto Sa Multiple authorization modules for secure production and verification
US10917245B2 (en) 2015-08-25 2021-02-09 Inexto Sa Multiple authorization modules for secure production and verification

Also Published As

Publication number Publication date
EP1121670A1 (en) 2001-08-08
CN1149515C (en) 2004-05-12
CA2346956A1 (en) 2000-04-27
AU767698B2 (en) 2003-11-20
WO2000023954A1 (en) 2000-04-27
AU6115299A (en) 2000-05-08
JP2002528933A (en) 2002-09-03
GB2342743B (en) 2003-05-14
CN1326578A (en) 2001-12-12
GB9822626D0 (en) 1998-12-09

Similar Documents

Publication Publication Date Title
AU767698B2 (en) Verification method
US6442276B1 (en) Verification of authenticity of goods by use of random numbers
US10621392B2 (en) Method and system for marking manufactured items to detect unauthorized refilling
US10121151B2 (en) Method and apparatus for marking manufactured items using physical characteristic
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
JP5739876B2 (en) Unique identifiers, methods for providing unique identifiers, and use of unique identifiers
US9721260B2 (en) Method and apparatus for marking manufactured items
NZ553844A (en) Methods and systems for marking, tracking and authentication of products
JP2009524128A (en) Authentication method for products placed in circulation
WO2014014401A2 (en) Authentication of a product
WO2009013078A1 (en) Method and system for identifying a product as an original product of a product manufacturer
HU226286B1 (en) Attestation label system for marking and checking the legally correct nature of products and method for indicating the legalized status of such products brought into commerce
JP2003137348A (en) Product with authenticity determination information, printing method and printer for authenticity determination, and authenticity determination device

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20071017