GB2520801A - Method for protecting the authenticity of an article from imitation and counterfeit - Google Patents

Method for protecting the authenticity of an article from imitation and counterfeit Download PDF

Info

Publication number
GB2520801A
GB2520801A GB1416460.2A GB201416460A GB2520801A GB 2520801 A GB2520801 A GB 2520801A GB 201416460 A GB201416460 A GB 201416460A GB 2520801 A GB2520801 A GB 2520801A
Authority
GB
United Kingdom
Prior art keywords
code
counterfeit
label
article
authenticity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1416460.2A
Other versions
GB201416460D0 (en
Inventor
Dimitri Marinkin
Aleksandr Volohhonski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB201416460D0 publication Critical patent/GB201416460D0/en
Publication of GB2520801A publication Critical patent/GB2520801A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A method for product authentication comprises attaching a bank note to a product label during the packaging process. The bank note serial number is encoded or encrypted to produce a code which is applied to the outer surface of the label. The code may be an alphanumerical code or a two dimensional code such as a barcode or QR code, and may be decoded or decrypted using a cryptographic key. The decoded or decrypted code may be compared with the serial number in order to authenticate the product. The verification process may utilise a manufacturers website or an app on a user device, and may take place online or offline.

Description

Method for protecting the authenticity of an article from imitation and counterfeit
TECHNICAL FIELD
The invention relates to methods for protecting goods from counterfeit, i.e. to methods for identifying a counterfeit, and can be used by manufacturers for protecting goods manufactured by them, and also for protecting consumers from purchasing goods manufactured by illegal manufacturers (counterfeit goods).
PRIOR ART
At present, methods are known for protecting the authenticity of arUcles from counterfeit. A method for identifying a counterfeit (RU patent No. 2202127 C2) has the technical result of increasing the level of protection from imitation of a product with the aid of the use of an internal random structural pattern of a carrier material as an identified tag. The proposed invention recommends selecting a material with a distinct random structure design as a label and selecting a random structural design of said label as information for identification, which is read by a scanner and then stored in the database of a computer identification system. Consumers can receive corresponding information relating to the structural pattern by telephone, by fax or over the Internet, confirming the authenticity or counterfeit nature of a product.
The disadvantages of this method are as follows: -the difficulty and impossibility of simplifying the process for verifying the identification of a counterfeit; -the low level of accuracy and unreliability of results of the comparison procedure.
The method for protecting goods from counterfeit (RU patent No. 2285954 Cl) is characterized by the fact that the authenticity of goods is established by comparing a digitized image of an identifier with which the goods are provided and which is in the form of a three-dimensional physical body, which comprises randomly distributed optically visible elements, with a digitized image of an identifier stored in an electronic database.
A dedicated feature, for example a registration number which is used to determine precisely which digital image from the plurality of digital images stored in the electronic database needs to be compared with the digital image of the identifier being verified, is assigned to each identifier.
The authenticity of the goods is estabhshed with the involvement of a specialized organization which verifies the rights of the manufacturer and confirms the authenticity of the information presented to the consumer.
The digital image of the identifier which is used for the comparison with the image stored in the database is obtained with the aid of a device in which the functions of the acquisition of a digital image and the reception/transmission of data remotely are combined, wherein said device is a mobile telephone with a built-in digital camera.
The disadvantages of this method are as follows: -the comparatively low level of reliability of the results of the comparison procedure since, if a digitized code on an identifier is copied and an image of the original identifier is attached, the verification will confirm that the digitized code is present in the database and that the image of the identifier corresponds to the original; -the difficulty involved in the processing and maintenance of the database of scanned copies of samples which, over time, will increase constantly; -the impossibility of verifying the goods when there is no connection to the database.
SUMMARY
According to an embodiment, there is provided a method for protecting the authenticity of products from imitation and counterfeiting, comprised of coding the product, said method comprising the steps in the during the packaging process the product is appended label-container containing a banknote which serial number then encrypts as data using a cryptographic algorithm and indicated on the outer surface of the label as a validation code which is decoded using cryptographic keys.
Further embodiments of the invention are set out in the accompanying claims.
DESCRIPTION OF THE INVENTION
The object of the present invention consists in increasing the level of reliability and simplifying the process of verifying the authenticity of an article.
In order to achieve the said object, a method is proposed for protecting the authenticity of an article from imitation and counterfeit which is characterized as follows.
During the packaging process, a container label is affixed to the article, which container label comprises a national bank note having a serial number which is encoded with the aid of a cryptographic algorithm and is shown on the outer surface of the label as a verification code, which is decoded with the aid of cryptographic keys. The verification code is represented in the form of alphanumeric information or in the form of a two-dimensional OR barcode, wherein more than one verification code can be shown on the outer surface of the label.
APPLICATION EXAMPLE
In order to protect a product from imitation and counterfeit, using a cryptographic algorithm with a public key in accordance with the asymmetric encryption method, a private key and a public key are produced. For each serial number of the national bank note, an encoded verification code is produced with the aid of the private key using the above-described cryptographic algorithm. The bank note is packaged in the container label and the corresponding serial number of this national bank note, i.e. the verification code in alphanumeric form or in the form of a two-dimensional OR barcode, is shown on the outer side of the container label.
The container label is affixed to the article so as to make it impossible for said container label to be used illegally without destroying the integrity of the container label, the packaging of the article and the national bank note.
On the manufacturer's website, any consumer of the article wishing to do so will be provided the possibility of manually nputting and decoding the verification code on the label and comparing this code with the serial number of the national bank note. A correspondence of the result of the decoding of the verification code with the serial number of the national bank note from the container label wUl indicate the authenticity of the article being verified. The absence of a national bank note or the replacement of such a national bank note with any other object will constitute a destruction of the integrity of the container label and an indication of counterfeit of the article.
Verification of the authenticity of an article is also performed by means of scanning a two-dimensional OR barcode with the aid of any individual electronic devices in which the functions of the acquisition of a digital image and the reception/transmission of data remotely are combined; in this case said device is a mobile telephone with a built-in digital camera. In this case, on the manufacturer's website the possibility is provided of reading and decoding the verification code from the two-dimensional OR barcode and comparing this verification code with the serial number of the bank note.
The process of verification of the authenticity of an article can also be implemented offline with the aid of appications (programs) for individual electronic devices scanning a two-dimensional QR barcode and performing a process of decoding the verification code with the aid of a public key. As part the operation of these applications (programs), it is also possible to create a special service to which consumers could send information relating to discovered cases of a counterfeit product and receive monetary compensation if the tact of counterfeit is confirmed. Furthermore, a manufacturer can receive operational information relating to a seller where a counterfeit of the manufacturer's product is sold or the use of counterfeit bank notes is discovered.
As additional protection, the value of the national bank note can be varied depending on the price of a unit of goods; the more expensive the article, the higher the value of the national bank note and, as a result, the greater the degree of protection of the note.
ADVANTAGEOUS EFFECT: 1. Enables an increase in the reliability of protection of an article from imitation and counterfeit.
2. Enables a simplification of the process of verification of the authenticity of an article without any loss of quality in the protection.
3. The high level of protection of the article from counterfeit is ensured by cryptographic protection of the transmission of verification data.
4. Enables offline verification of the authenticity of an article when there is no S connection to the Internet or other forms of communication.
5. The cost of an undamaged national bank note remains unchanged after the verification and is not a costly component for the manufacturer.
6. The high level of protection of the article from counterfeit is additionally ensured by the national protection of the national bank note.

Claims (4)

  1. Claims: 1. A method for protecting the authenticity of products from imitation and counterfeiting, comprised of coding the product, said method comprising the steps in the during the packaging process the product is appended label-container containing a banknote which serial number then encrypts as data using a cryptographic algorithm and indicated on the outer surface of the label as a validation code which is decoded using cryptographic keys.
  2. 2. The method of claim 1, wherein said as a verification (verifying) code depicted (represent) two-dimensional bar code QF1.
  3. 3. The method of claim 1, wherein said as a verification (verifying) code depicted (represent) the alphanumeric information.
  4. 4. The method of claim 1, wherein said on an outer (external) surface of the label can be specified more than one verification (verifying) code.
GB1416460.2A 2013-11-29 2013-11-29 Method for protecting the authenticity of an article from imitation and counterfeit Withdrawn GB2520801A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EE2013000094 2013-11-29

Publications (2)

Publication Number Publication Date
GB201416460D0 GB201416460D0 (en) 2014-10-29
GB2520801A true GB2520801A (en) 2015-06-03

Family

ID=51869774

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1416460.2A Withdrawn GB2520801A (en) 2013-11-29 2013-11-29 Method for protecting the authenticity of an article from imitation and counterfeit

Country Status (1)

Country Link
GB (1) GB2520801A (en)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
GB201416460D0 (en) 2014-10-29

Similar Documents

Publication Publication Date Title
JP5837671B2 (en) Methods to protect the authenticity of goods from counterfeit and counterfeit goods
CN105024824B (en) The generation and verification method and system of credible label based on rivest, shamir, adelman
US8249350B2 (en) Brand protection and product autentication using portable devices
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
US9628270B2 (en) Cryptographically-verifiable attestation label
EP2257909B1 (en) Secure item identification and authentication system and method based on unclonable features
US11374756B1 (en) Tracking apparel items using distributed ledgers
US9800408B2 (en) Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
CN102201100A (en) Object anti-counterfeiting method and system
CN111919215A (en) Authentication of packaged products
CN104992335A (en) Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof
EP3353754B1 (en) Package with a unique package identifier based on physical properties of the package and its sub-packages
CN102385710B (en) Method and system for verifying fact or fiction
JP2015526946A (en) A method for unambiguous marking of objects
US8243930B2 (en) Counterfeit prevention system based on random processes and cryptography
CN102004986A (en) Product anti-counterfeiting method based on digital signature and public key system and verifying method
Shaik Preventing counterfeit products using cryptography, qr code and webservice
CA2921944A1 (en) Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
US20150110268A1 (en) Method for coding and decoding information associated with an item
CN115511019A (en) Anti-counterfeiting verification method for binding RFID (radio frequency identification) label and article bar code
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
GB2520801A (en) Method for protecting the authenticity of an article from imitation and counterfeit
WO2012124084A1 (en) Product authentication system and product authentication method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)