GB2522189A - Authentication system, method and label - Google Patents

Authentication system, method and label Download PDF

Info

Publication number
GB2522189A
GB2522189A GB1400419.6A GB201400419A GB2522189A GB 2522189 A GB2522189 A GB 2522189A GB 201400419 A GB201400419 A GB 201400419A GB 2522189 A GB2522189 A GB 2522189A
Authority
GB
United Kingdom
Prior art keywords
label
visual pattern
machine readable
readable code
item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1400419.6A
Other versions
GB201400419D0 (en
Inventor
Philip Wainwright
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AUTHENTICATE NOW Ltd
Original Assignee
AUTHENTICATE NOW Ltd
AUTHENTICATE NOW Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AUTHENTICATE NOW Ltd, AUTHENTICATE NOW Ltd filed Critical AUTHENTICATE NOW Ltd
Priority to GB1400419.6A priority Critical patent/GB2522189A/en
Publication of GB201400419D0 publication Critical patent/GB201400419D0/en
Priority to PCT/GB2015/050044 priority patent/WO2015104561A1/en
Publication of GB2522189A publication Critical patent/GB2522189A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0297Forms or constructions including a machine-readable marking, e.g. a bar code

Abstract

The label (2) comprises a surface upon which a machine readable code (6) is provided. The machine readable code is indicative of an address in a database. A visual pattern (4) is also provided on the surface and is unique to the label. An image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated. The machine readable code may be read by a mobile communications device. An image is captured by the mobile communications device and sent to the server for authorisation. The visual pattern may comprise a one or more graphic symbols, alphanumeric characters or particles suspended in a lacquer.

Description

AUTHENTICATION SYSTEM, METHOD AND LABEL
FIELD OF THE INVENTION
This invention relates to the authentication of items.
BACKGROUND OF THE INVENTION
Numerous approaches to detecting and/or preventing the sale of counterfeit products have been attempted. These approaches are often expensive and complex. Examples include the use of RFID technology micro printing, holograms and photo-reactive inks. All of these systems can fail due to one or more of the reasons discussed below.
A general aim of existing verification systems is consistency. For example, in some systems, many identical labels are produced and attached to items to confirm their authenticity. The presence of a label or tag that has characteristics consistent with those of a genuine tag is taken as proof of the authenticity of an item to which the label is attached.
These characteristics can include size, shape, colour, or the use of the same materials, artwork, ink, or watermarks. A key weakness is systems of this kind is that by copying the common characteristics of the genuine labels, counterfeiters can circumvent the security that the system provides, allowing fake goods to be presented as genuine.
Another reason for the failure of known systems is that systems that use an algorithm to produce apparently random numbers have to have an underlying equation in order that a calculation can be carried out to produce a verification code. Again, as all the labels or product applications have to follow the same algorithms, this gives the counterfeiters time to work out the algorithm and produce their own counterfeit codes.
A ifirther problem with known systems is that they can be prohibitively expensive.
This simple problem means that an otherwise successful authentication system may be out of reach for many manufacturers. For cxample, if protective artwork provided as part of an authentication system is expensive, then it may not be financially viable for many smaller companies to use the system to protect their products. Equally if the security mark costs are greater than the unit profit on the protected items, then these systems cannot be used.
Therefore brands associated with high-volume, low margin goods may be prohibited from protecting themselves. Similarly, if the equipment needed to detect a counterfeit item is also expensive, then this too may prevent widespread adoption of the system.
Accordingly, there is a need for an alternative approach to the authentication of an item.
SUMMARY OF THE INVENTION
Aspects of the invention are set out in the accompanying independent and dependent claims. Combinations of features from the dependent claims may be combined with features of the independent claims as appropriate and not merely as explicitly set out in the claims.
According to an aspect of the invention, there is provided an authentication label. The label includes a surface. A machine readable code is provided on the surface. The machine readable code is indicative of an address in a database. A visual pattern is also provided on the surface. The visual pattern is unique to the label. An image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.
Embodiments of this invention can thus provide labels that can be used to confirm the authenticity of an item. The security provided by the label is enhanced by the provision of the visual pattern that is unique to the label. Comparison of the visual pattern with an image of the visual pattern previously stored in a database (e.g. by the manufacturer or distributor of the item) can be used to prevent attempts to make unauthorised copies of the label.
According to another aspect of the invention, there is provided a method of authenticating an item. The method includes a mobile communications device reading a machine readable code provided on a surface of an authentication label associated with the item. The machine readable code is indicative of an address in a database. The method also includes the mobile communications device capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label.
The method further includes the mobile communications device sending data associated with the machine readable code and the captured image to a server. The method also includes the mobile communications device receiving from the server data relating to the authenticity of the item.
A method of authenticating an item according to an embodiment of this invention can thus be conveniently implemented by a user of a mobile communications device such as a smart phone or tablet. The mobile communications device can include a camera for capturing the image of the visual pattern and an antenna or other data connection for sending data associated with the machine readable code and the captured image to the server.
According to a further aspect of the invention, there is provided a computer program product comprising program instructions for implementing the method defined above on a mobile communications device.
According to another aspect of the invention, there is provided a mobile communications device. The mobile communications device is operable to authenticate an item by: reading a machine readable code provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database; capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label; sending data associated with the machine readable code and the captured image to a server; and receiving from the server data relating to the authenticity of the item.
According to a further aspect of the invention, there is provided a method of authenticating an item. The method includes a server: receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label; accessing the address in the database to retrieve data relating to the visual pattern; comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
According to embodiments of this invention therefore, a database can be used to store data relating to the visual patterns of labels to be used to authenticate items. As part of the authentication method, the image can be retrieved and compared with an image received from a mobile communications device. If it is determined that the captured image received from the mobile communications device matches the image stored in the database, information regarding the item can be sent by the server to the mobile communications device. This information can be used to confirm the authenticity of the item and to provide other information relating to the item itself (e.g. manufacturer, manufacturing date, geographical origin and so forth).
According to another aspect of the invention, there is provided a computer program product comprising program instmctions for implementing the method defined above on a sewer.
According to a further aspect of the invention, there is provided a server. The server is operable to authenticate an item by: receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label; accessing the address in the database to retrieve data relating to the visual pattern; comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
According to another aspect of the invention, there is provided a method of preparing an item for authentication. The method includes: providing an item; providing an authentication label comprising: a surface; a machine readable code provided on the surface, wherein the machine readable code is indicative of an address in a database; and a visual pattern provided on the surface, wherein the visual pattern is unique to the label, and associating the label with the item by: capturing an image of the visual pattern; and storing data relating to captured image of the visual pattern in the database at the address indicated by the machine readable code.
Accordingly, items can be prepared for authentication by, for example, a manufacturer or distributor.
The visual pattern can take a number of forms. For example, the visual pattern may be printed on the surface of the label, providing a low-cost implementation. The visual pattern can include one or more graphic symbols such as alphanumeric characters, which are easily printable. In an alternative embodiment, the visual pattern can include coloured particulates suspended in a lacquer. In this way, the visual pattern itself can take a form that is difficult or even impossible to replicate, adding to the security of the system.
One or more parts of the machine readable code on the label can define the position of an imaging region on the label. The visual pattern can be located in the imaging region. In this way, the location of the machine readable code itself can be used to determine the parts of a captured image that are to be processed for comparison with a corresponding image or other data stored in the database. For example, in embodiments where the machine readable code comprises QR codes, corners of the QR code can be used to define the location of the visual pattern.
Conveniently, the label can be attached to the item to be authenticated. For example, the label can be a tag or sticker that is attached to the item. The item may include packaging to which the tag is attached or incorporated. In some examples, the label can be incorporated into the product itself For example, the surface on which machine readable code and visual pattern is provided may be a surface or part of a surface of the product itself This implementation is particularly suitable for products that are not typically sold in separate packaging.
In some examples, the captured image includes the machine readable code. In this way, the captured image of the visual pattern can conveniently be used to extract the database address.
In some examples, the sending of the data associated with the machine readable code and the captured image to the server can include simply sending the captured image itself to the server. The server can, in such examples, perform the processing of the image for extracting the database address and for comparing the image with an image stored at the database address. In an alternative example, the database address may be extracted locally, by the mobile communications address and sent to the server, along with at least part of the captured image to the server.
The data retrieved from the database can comprise a previously stored image of the visual pattern. This image can be compared to the data associated with the captured image of the visual pattern from the mobile communications device. The latter may itself be a copy of the captured image captured by the mobile communications device and sent to the server, At the server, comparing these data can include comparing the previously stored image and the captured image, using an image processing algorithm.
A computer program product according to an embodiment of the invention can be stored on a carrier medium such as CD, DVD, Blu-Ray disc, memory stick, solid state memory or hard disk drive.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the present invention will be described hereinafter, by way of example only, with reference to the accompanying drawings in which like reference signs relate to like elements and in which: Figure 1 shows a first example of an authentication label in accordance with an embodiment of the invention; Figure 2 shows a second example of an authentication label in accordance with an embodiment of the invention; Figure 3 shows an overview of the various components of an authentication system in accordance with an embodiment of the invention; Figure 4 shows the steps in a method of authenticating an item in accordance with an embodiment of the invention; Figure 5 an example of a GUI that may be displayed on a display of a mobile communications device for implementing the method described in relation to Figure 4; Figure 6 shows the steps in a method of authenticating an item in accordance with an embodiment of the invention; and Figure 7 shows the steps in a method preparing an item for authentication in accordance with an embodiment of the invention.
DETAILED DESCRIPTION
Embodiments of the present invention are described in the following with reference to the accompanying drawings.
Embodiments of this invention can provide an authentication label. The authentication label can be used in conjunction with methods for authenticating an item to which the label can be attached. As described herein, the label can be attached by a manufacturer or distributor of an item before the item is distributed to retailers. Customers of the retailers may use a method involving capturing an image of the label or a part thereof using a mobile communications device. Information collected by the mobile communications device in this way can be used to access an entry in a database containing an image of the label and optionally also other information prepared by the manufacturer or distributor of the item. This information can be used for authenticating the item to which the label is attached.
Figures 1 and 2 show first and second embodiments of an authentication label 2. The label 2 can be provided as a tag that can be attached to the item to be authenticated. The item may include packaging, whereby the label can be attached to the packaging. In other examples, the label may be provided on a surface of the packaging or otherwise incorporated into the packaging itself Note that in some embodiments, the label can be a part of the product itself For example, the surface on which machine readable code is provided may be a surface or part of a surface of the product. This can be achieved, for example, by application of inks or dyes, or dot peen marking of steel components for example. As noted above, this implementation is particularly suitable for products that are not typically sold in separate packaging.
The label 2 has a surface on which a number of features are provided. The surface can include a logo 8. The logo can be associated with the provider of security system described herein. In other examples, alternative logos such as those associated with the distributor or manufacturer of the item can be provided.
The surface also includes a machine readable code 6. In the examples shown in Figures 1 and 2, the machine readable code comprises a plurality of QR (Quick Response) codes. The use of QR codes is not essential however and it is envisaged that alternative machine readable codes may be used instead. For example, one dimensional barcodes could be used.
In the examples of Figures 1 and 2, the label 2 is provided with four QR codes provided in a square array configuration.
The label 2 also includes a visual pattern 4. In the example of Figure 2, the visual pattern 4 includes one or more graphic symbols such as alphanumeric characters 64. A visual pattern 4 of this kind provides, as described below, a high degree of security while minimising the cost associated with producing a label 2. For example, a label of the kind shown in Figure 2 can be printed either directly onto the packaging of an item, onto a separate tag that can be attached to the item or packaging, or onto a surface of the product itself. A label of the kind shown in Figure 2 can, for example, easily be printed using a simple inkjet printer.
The label 2 in Figure 1 has a visual pattern 4 that is produced by mechanically mixing coloured particulates (for example, coloured powders or glitters) in a lacquer. The lacquer can be a clear lacquer. After mixing, the lacquer can be deposited onto the surface of the label 2 to form the visual pattern 4. The security provided by a label of the kind shown in Figure 1 is somewhat stronger than the security provided by the label of Figure 2, since it is extremely difficult or even impossible to reproduce, by copying, the random pattern formed by the coloured particulates in the lacquer.
In the examples of Figures 1 and 2, the visual pattern 4 is provided adjacent the machine readable code 6. This allows the machine readable code to be read by a mobile communications device including a camera while also allowing an image of the visual pattern to be captured without the need to direct the camera of the mobile communications device at more than one portion of the label. In the examples of Figures 1 and 2, the visual pattern 4 is provided centrally with respect to the four QR codes. This is however not essential and it is envisaged that an alternative arrangement of the QR codes and an adjacent visual pattern 4 may be used.
In accordance with embodiments of this invention, portions of the machine readable code can be used to determine the correct alignment of the visual pattern in an image captured by the mobile communications device. For example, the QR codes shown in Figures 1 and 2 include portions 66 that can be recognised by image processing algorithms for determining a correct portion and orientation of the visual pattern 4 in the captured image.
By providing labels having the visual portion 4 in a predetennined position with respect to the portions 66 of the QR codes, an image processing algorithm can determine which part of the image should subsequently be analysed for comparison with a second image stored in a database as described below.
Figure 3 schematically illustrates the various components of an authentication system in accordance with an embodiment of this invention. The components of the system can be interconnected through the internet 100.
The authentication system includes a server 20. The server includes a database 22.
The database 22 can store data entries corresponding to the authentication labels 2 to be used by the system. As described in further detail below, the machine readable code 6 on each label 2 is uniquely associated with an address of an entry in the database 22. Each entry in the database 22 can include a previously captured image of the visual pattern 4 on the label 2.
As described in further detail below, comparison of the previously captured image held in the database 22 with an image of the visual pattern 4 captured by the mobile communications device of a person wishing to authenticate an item to which the label 2 is attached provides a high degree of security and reliability at relatively low cost.
The authentication system can also include an enforcement portion 50. The enforcement portion 50 can include one or more terminals 52. The terminal 52 can be used to receive messages relating to items that have been identified as not being authentic and may also be used to access the server 20 and the database 22. The enforcement portion 50 may be operated by law enforcement. In one example, where the mobile communications device includes is GPS enabled or includes alternative location determining means, the authorities can be directed to the location of the mobile communications device in the event that counterfeit items are detennined to be present by the methods described herein.
The authentication system further includes a manufacturer or distributor portion 30.
The portion 30 can include a camera 32 which is used during manufacture, packaging and/or distribution processing of the item to be authenticated. The camera 32 can provide images that are captured of the visual pattern 4 of each label 2 to an uploader 34. The uploader 34 can also receive information from the systems 36 of the manufacturer or distributor including data associated with the item to which the label 2 is attached. The information including the manufacturer or distributor information and the captured image is collated by the uploader 34 and then uploaded to the database 22 of the server 20 as described in further detail below.
While in the present example the database 22 is provided at a separate server 20, whereby the uploader 34 would connect to the server 20 via the internet 100, it is also envisaged that the database 22 may be physically located at the manufacturer or distributor portion 30.
The authentication system further includes a retailer portion 40. The retailer portion can include a EPOS (Electronic Point of Sale) terminal 42. The EPOS terminal 42 can include a camera for capturing an image of the label 2 and/or can include means for reading the machine readable code 6 of the label 2. The EPOS terminal 42 can connect to the server for accessing the database 22 via the internet 100. For this purpose, the retailer portion 40 can be provided with a modem 46 and/or a wireless router 44 connected to the modem 46.
The authentication system further includes a customer portion 10. The customer can use a mobile communications device 12 to capture an image of the visual pattern 4 and for reading the machine readable code 6 of a label 2. As described in further detail below, the information relating to the visual pattern 4 and the machine readable code 6 can be sent to the server 20 via the internet 100. The mobile communications device 12 can send this information either via a wireless router 14 (which may be provided as part of the retailer portion 40) or can access the server 20 via a mobile cellular network including one or more masts 102. The samc means by which the mobile communication device 12 sends the aforementioned information can be used to return information to the mobile communications device 12 from the server 20.
Figure 4 illustrates a first example of an authentication method according to an embodiment of this invention. The method can be performed by a user of a mobile communications device 12. The user may be a person (e.g. a customer of the retailer) wishing to purchase the item to which. an authentication label 2 of the kind described above in relation to Figures 1 and 2 is attached. The person can use the method to determine whether the item itself is genuine and not, for example, stolen or counterfeited.
In a first step 60 of the method of Figure 4, the mobile communications device reads a machine readable code 6 that is provided on a surface of an authentication label 2 of the kind described above. The authentication label 2 is associated with the item to be authenticated.
For example, the label 2 can be attached to, or included in the packaging of the item. The machine readable code 6 indicates an address in the database 22. In the example of Figure 1, the address is formed from four portions. Each portion is taken from one of the four respective QR codes making up the machine readable code 6. The portions can be concatenated to fonn the address in the database 22 as described in more detail below.
In a next step 62 of the method of Figure 4 an image of the visual pattern 4 on the label 2 is captured using the mobile communications device 12. For this purpose, the mobile communications device 12 should include a camera. The mobile communications device can include, for example, a smart phone or tablet. The visual pattern 4 is unique to the label 2 on which it is provided. For example, as described above, the provision of a visual pattern 4 including coloured particulates contained in a lacquer is generally unique and impossible to reproduce. Alternatively, in an authentication system using a visual pattern 4 that comprises alphanumeric characters 64 as shown in Figure 2, the characters provided on each label should be provided only on that label and not on any other labels.
The order of the steps 60 and 62 is also not essential to this invention, and can be reversed. Also, it is noted that steps 60 and 62 can be performed in conjunction with each other. For example, in some embodiments a single image of at least part of the label can be captured and the machine readable code 6 can be read from a first part of the image while the visual pattern is contained in a second part of the image.
In a next step 64 of the method of Figure 4, the mobile communications device 12 sends data associated with the machine readable code 6 and the captured image to the server 20. This step can be implemented in a number of ways.
In some examples, the mobile communications device may simply send an image including the machine readable code 6 and the visual pattern 4 directly to the server 20. In these examples, the server 20 can perform the necessary processing of the captured image for determining the address in the database 22 to be accessed and for processing the captured S image of the visual pattern 4.
In alternative examples, the mobile communications device can determine the database address locally and send the address to the server along with the captured image of the visual pattern 4.
In some examples, an image that is captured of the label 2 can be processed to crop out portions of the image that are not needed for the performance of the method. For example, features outside an area of the surface of the label 2 containing the machine readable code 6 and the visual pattern 4 can be cropped out. In other examples, in particular where the mobile communications device 12 reads the machine readable code and determines the database address locally, it is not necessary to send an image of the machine readable code 6 to the server and in these examples the captured image can be cropped to include only the visual pattern 4. In each of the above-described cases, cropping of the captured image can reduce the amount of data that is to be sent to the server 20.
As described above in relation to Figure 3, the data associated with the machine readable code (including either an image of the machine readable code or an address that has been determined from the machine readable code) and the captured image (including at least the visual pattern 4) can be sent to the server via the internet 100.
In a further step 66 of the rnethod of Figure 4, the mobile communications device 12 receives a response from the server 20. The response can include data relating to the authenticity of the items to which the label 2 is attached. This data can include a number of portions.
A first portion can indicate whether or not an entry in the database 22 addressed by the machine readable code 6 contains an image of the visual pattern 4 that matches the image of the visual pattern 4 captured by the mobile communications device 12.
Other portions can relate to manufacturer and/or distributor infonnation for the item such as the brand, model, serial number, or date of manufacture. This data can provide an indication as to whether the item is authentic in the sense that the information in the entry in the database 22 of the server 20 either matches or does not match the item that the user of the mobile communications device 12 is attempting to authenticate.
Figure 5 illustrates an example of a GUI that can be displayed on the screen of a mobile communications device 12 in accordance with an embodiment of this invention. The interface 90 includes a number of data fields 92. These data fields can be used to display the information noted above relating to the manufacturer and!or distributor (brand, model, serial number, etc.). Indicators 96 and 98 can be used to indicate whether the item can be considered to be authentic. For example, if the label does not match any label that is contained in the database 22, the indicator 98 can be highlighted to warn the user that the item cannot be authenticated by the label 2.
Indicator 94 can also be provided in some embodiments. On accessing the database 22, it may be determined that the label attached to the item may already have previously been associated with an earlier item that has been sold, This would indicate that the label 2 has been subsequently reattached to a thrther item which may be similar to the earlier-sold item.
Alternatively, it may be determined that the item to which the label 2 is presently attached has already been sold.
The above-described method can be implemented by a user downloading a software application to the mobile communications device 12. The software application can take the form of a computer program product including instructions, The use of QR codes in accordance with embodiments of this invention provides a very large address space for the database 22. Normally, QR codes indicate a web address that can be scanned by a mobile communications device for accessing the address to present information contained at the address to a user of the device. However, in accordance with embodiments of the present invention, the QR codes are each instead used to indicate part of the address in the database 22 to be accessed. For example, a QR code can typically indicate a maximum of 1025 different numbers. By using four separate QR codes and concatenating each of the numbers indicated by each QR code, 10104 unique addresses can be provided.
This huge address space enhances the security of the system since it is very unlikely that a random set of QR codes produced by a potential counterfeiter for producing fake labels will include the correct addresses presently used in the database 22. As mentioned above, the use of the visual pattern 4 and the comparison of captured images of the visual pattern 4 adds to the security provided by the present invention since in addition to providing the correct address in the database 22, the label must also bear the correct visual pattern in order for successful authentication of the item.
An entry in the database can take the form: a$;b$;c$;d$;(IMG)$,(x, A)$;(x, B)$;(x, C$) where a$ is the number stored in first QR code, b$ is the number stored in second QR code, c$ is the number stored in third QR code, d$ is the number stored in fourth QR code, (IMG)$ is the image file from the attached label.
Here, x is a hexadecimal character string. This sets the file record name by use of a data table of the kind shown in table 1, where A, B, C, etc. are the required data entries of the manufacturer or distributor.
1 Manufacturer 2 Model 3 Serial Number 4 Colour Voltage Table 1 -Data Table.
Accordingly, table 2 shows examples of data entries in the database using the above described syntax: aS b$ c$ d$ (IMG)S (x, A)$ (x, B)$ (x, C)S (x, D)$ 21 34 67 23 * 1, Samsung 2, Galaxy 3, 1234567 4, White Ace 24 5 64 64 * 1, Samsung 2, Galaxy 4, White 3, 1234568 Ace 24 56 3 5 * 2, Galaxy Ace 1, Samsung 3, 1234569 5,220 Table 2-Examples of Database Entries.
As can be seen, the x component means the database is very flexible. No fixed file headings are required. Note that the syntax described here is only an example of the layout that can be used. Depending on which database structure is used, other syntaxes could be used to resolve the data string.
Figure 6 schematically illustrates the steps in an authentication method to be performed at the server 20 in accordance with an embodiment of this invention. As noted above, a user of a mobile communications device 12 can capture an image of the label 2 and send data associated with the machine readable code 6 and a captured image of the visual pattern 4 to a server. A first step 80 in the method of Figure 6 includes the server 20 receiving this data from the mobile communications device 12. The data can be received via the internet 100.
In a next step 82, the server 20 accesses the database 22. In particular, the server 20 accesses an address in the database 22 indicated by the machine readable code 6 on the label 2. As noted above, the information received from the mobile communications device 12 can include in some examples the address itself or in other examples the information can be an image file received from the mobile communications device 12 which includes the machine readable code 6 in addition to the visual pattern 4. In the latter example, the server 20 can process the received image to determining the address to be accessed in the database 22. On accessing the address in the database 22, the server 20 retrieves data relating to the visual pattern 4. As dcscribed below in relation to Figure 7, the previously captured image of the visual pattern 4 can be stored in the database 22 by a manufacturer and/or distributor before the item itself is shipped.
In a ftirther step 84 of the method of Figure 6, the server 20 compares the data relating to the visual pattern 4 that is retrieved from the database 22 at the address indicated by the machine readable code 6 with the captured image of the visual pattern that is received from the mobile communications device 12. This comparison can be performed using conventional image processing algorithms. If the image previously stored in the database 22 is determined to be a match of the captured image of the visual pattern 4 received from the mobile communications device 12, it can be determined that the label itself is not a fake label.
However, if the address indicated by the machine readable code 6 either does not exist in the database 22 or contains an image of a visual pattern 4 that does not match the visual pattern on the label 2, the server 20 can thereby determine that the label is false and therefore that an item to which the label is attached may well be counterfeited.
On the other hand, if the label 2 is a genuine label, which is confirmed by a match of the stored image of the visual pattern 4 and the captured image of the visual pattern 4 that is received from the mobile communications device 12, it may still be the case that the genuine label is now attached to a counterfeit item. The server therefore also retrieves from the database 22 the aforementioned manufacturer and/or distributor information for comparison with the item at the retailer portion 40 or the custom portion 10.
In a next step 86 of the method of Figure 6, the server 20 responds to the aforementioned comparison by sending data relating to the authenticity of the item to the mobile communications device 12.
This data can include a confirmation of whether the visual pattern 4 on the label 2 matches the stored image of the visual pattern in the address of the database 22 indicated by the machine readable code 6 on the label 2. This information can be displayed to the user of the mobile conm-munications device 12 using, for example, the indicators 96 and 98 shown in Figure 5.
The data sent by the server 20 to the mobile communications device 12 can also include the aforementioned manufacturer and/or distributor information that retrieved from the database entry 22 indicated by the machine readable code 6. This information can be
shown in the data fields 92 shown in Figure 5.
S
A computer program product in accordance with an embodiment of this invention can comprise program instructions to be implemented by a server 20 for performing the method described above. The computer program product described here or describcd above in relation to the mobile communications device 12 can be provided on a carrier medium such as a CD, DVD, Blu-Ray disc or a memory stick or other solid state memory device.
A further method in accordance with an embodiment of this invention is illustrated in Figure 7. The method of Figure 7 can be used to prepare an item for authentication, The method of Figure 7 may typically be performed by a manufacturer of an item and/or a distributor of the item before the item is shipped for retail.
In a first step 70 of the method of Figure 7, an item to be authenticated is provided.
The item can, for example, be a product that is subsequently to be sold at the retailer portion 40. The product can be any kind of product such as food, beverages, consumer electronics, furniture, cigarettes or indeed any other kind of product to which a label of the kind described herein can be attached.
In a next step 72 of the method of Figure 7, an authentication label 2 of the kind described above in relation to Figures 1 and 2 is provided. In some examples, the label can be prepared by the manufacturer and/or distributor. For example, the label shown in Figure 2 can easily be printed by the manufacturer and/or distributor and either attached to or included on a surface of the packaging of the item. In other examples, the label is incorporated into the product itself, and the manufacturer and/or distributor can fonn the label by providing the machine readable code and visual pattern directly on a surface of the product. Alternatively, the labels may be manufactured separately and supplied to the manufacturer and/or distributor. For example, the entity responsible for maintaining the database 22 at the server can prepare the labels 2 in advance and supply them to the manufacturer and/or distributor.
In a next step 74 of the method of Figure 7, the label 2 is associated with the item.
This step 74 includes two parts 74A and 74B. In part 74A, an image is captured of the visual pattern 4 on the label 2. The image can be captured using the device 32 described above in relation to Figure 3. In a next part 74B, data relating to the captured image of the visual pattern is stored in the database 22 at the address indicated by the machine readable code 6.
As noted in relation to Figure 3, the storage of the captured image can include the uploader 34 sending the captured image to the server 20. In this step, manufacturer and/or distributor information of the kind described above can also be stored at the database address along with the captured image of the visual pattern 4. The uploading of the captured image and any manufacturer and/or distributor information to the server 20 for storage in the database 22 can be performed in a secure manner using conventional encryption techniques to scnd the information securely via the internet 100. In one embodiment, this can be implemented using a registration process which includes the manufacturer name, and the approved brand names being logged into a user profile. This profile also includes the relevant firmware ID (mac address for example) coupled with the IP address and network fingerprint to provide resilient security for the data upload system. This is a manual data entry process to ensure verification of company details. Filters can be used to check for duplication of brand names and can automatically alert the operator when found. Similarly, the method described above to be performed by the mobile communications device 12 can include sending and receiving information to the server 20 using a secure connection.
After the performance of the above-described method, the manufacturer or distributor is able to ship the item with the label associated therewith to the retailer 40 for sale.
Subsequently, a user of a mobile communications device 12 can perform the above described method for accessing the information stored in the database 22 for authenticating the item.
Accordingly, there has been described an authentication label. The label comprises a surface. A machine readable code is provided on the surface. The machine readable code is indicative of an address in a database. A visual pattern is also provided on the surface. The visual pattern is unique to the label. An image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.
Although particular embodiments of the invention have been described, it will be appreciated that many modifications/additions and/or substitutions may be made within the scope of the claimed invention.

Claims (38)

  1. CLAIMS1. An authentication label comprising: a surface; a machine readable code provided on the surface, wherein the machine readable code is indicative of an address in a database; and a visual pattern provided on the surface, wherein the visual pattern is unique to the label, wherein an image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.
  2. 2. The authentication label of claim 1, wherein the visual pattern is printed on the surface.
  3. 3. The authentication label of claim I or claim 2, wherein the visual pattern comprises one or more graphic symbols.
  4. 4. The authentication label of claim 3, wherein the graphic symbols comprise alphanumeric characters.
  5. 5. The authentication label of claim 1, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
  6. 6. The authentication label of any preceding claim, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
  7. 7. The authentication label of any preceding claim, wherein the label is attached to the item to be authenticated.
  8. 8. A method of authenticating an item, the method comprising a mobile communications device: reading a machine readable code provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database; capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label; sending data associated with the machine readable code and the captured image to a server; and receiving from the server data relating to the authenticity of the item.
  9. 9. The method of claim 8, wherein the visual pattern comprises one or more graphic symbols.
  10. 10. The method of claim 9, wherein the graphic symbols comprise alphanumeric characters.
  11. 11. The method of claim 8, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
  12. 12. The method of any of claims 8 to 11, wherein the captured image includes the machine readable code.
  13. 13. The method of claim 12, wherein said reading the machine readable code comprises processing the captured image to extract the database address.
  14. 14. The method of claim 12, wherein said sending data associated with the machine readable code and the captured image to the server comprises sending the captured image to the server.
  15. 15. The method of any of claims 12 to 14, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
  16. 16. A computer program product comprising program instructions for implementing the method of any of claims 8 to 15 on a mobile communications device.
  17. 17. A mobile communications device operable to authenticate an item by: reading a machine readable code provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database; capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label; sending data associated with the machine readable code and the captured image to a server; and receiving from the server data relating to the authenticity of the item.
  18. 18. A method of authenticating an item, the method comprising a sewer: receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattem is unique to the label; accessing the address in the database to retrieve data relating to the visual pattern; comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
  19. 19. The method of claim 18, wherein the visual pattern comprises one or more graphic symbols.
  20. 20. The method of claim 19, wherein the graphic symbols comprise alphanumeric characters.
  21. 21. The method of claim 18, wherein the visual pattern comprises coloured particulatcs suspended in a lacquer.
  22. 22. The method of any of claims 18 to 21, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
  23. 23. The method of any of claims 18 to 22, wherein the data retrieved from the database comprises a previously stored image of the visual pattern, wherein the data associated with the captured image of the visual pattern from the mobile communications device comprises a copy of the captured image, and wherein said comparing comprises comparing the previously stored image and the captured image.
  24. 24. A computer program product comprising program instructions for implementing the method of any of claims 18 to 23 on a server.
  25. 25. The computer program product of claim 16 or claim 24 on a can-icr medium.
  26. 26. A server operable to authenticate an item by: receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label; accessing the address in the database to retrieve data relating to the visual pattern; comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
  27. 27. A method of preparing an item for authentication, the method comprising: providing an item; providing an authentication label comprising: a surface; a machine readable code provided on the surface, wherein the machine readable code is indicative of an address in a database; and a visual pattern provided on the surface, wherein the visual pattern is unique to the label, and associating the label with the item by: capturing an image of the visual pattern; and storing data relating to captured image of the visual pattern in the database at the address indicated by the machine readable code.
  28. 28. The method of claim 27, wherein the visual pattern is printed on the label.
  29. 29. The method of claim 27 or claim 28, wherein the visual pattern comprises one or more graphic symbols.
  30. 30. The method of claim 29, wherein the graphic symbols comprise alphanumeric characters.
  31. 31. The method of claim 30, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
  32. 32. The method of any of claims 27 to 31, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
  33. 33. The method of any of claims 27 to 32, further comprising attaching the label to the item.
  34. 34. An authentication label substantially as hereinbefore described, with reference to the accompanying drawings.
  35. 35. A method of authenticating an item substantially as hereinbefore described, with reference to the accompanying drawings.
  36. 36. A method of preparing an item for authentication substantially as hereinbefore described, with reference to the accompanying drawings.
  37. 37. A computer program product substantially as hereinbefore described, with reference to the accompanying drawings.
  38. 38. A server substantially as hereinbefore described, with reference to the accompanying drawings.
GB1400419.6A 2014-01-10 2014-01-10 Authentication system, method and label Withdrawn GB2522189A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB1400419.6A GB2522189A (en) 2014-01-10 2014-01-10 Authentication system, method and label
PCT/GB2015/050044 WO2015104561A1 (en) 2014-01-10 2015-01-09 Authentication system, method and label

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1400419.6A GB2522189A (en) 2014-01-10 2014-01-10 Authentication system, method and label

Publications (2)

Publication Number Publication Date
GB201400419D0 GB201400419D0 (en) 2014-02-26
GB2522189A true GB2522189A (en) 2015-07-22

Family

ID=50191152

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1400419.6A Withdrawn GB2522189A (en) 2014-01-10 2014-01-10 Authentication system, method and label

Country Status (2)

Country Link
GB (1) GB2522189A (en)
WO (1) WO2015104561A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919276A (en) * 2019-01-13 2019-06-21 湖南省农业信息与工程研究所 A kind of method for anti-counterfeit based on product surface texture image feature

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2783077A1 (en) * 1998-09-07 2000-03-10 Renaud Blavignac Labelling system for genuine merchandise includes self-adhesive label with visible and machine-readable sections which must tally to provide evidence of validity
WO2012175878A1 (en) * 2011-06-21 2012-12-27 Advanced Track & Trace Method and device for authenticating a tag
EP2565818A1 (en) * 2010-04-27 2013-03-06 Hans Jerry Urban Pettersson Anti-counterfeiting method using at least two different codes
WO2013168962A1 (en) * 2012-05-07 2013-11-14 Cho Han Yong Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
CN103489109A (en) * 2013-08-26 2014-01-01 郑国义 Three-dimensional entity secret mark anti-counterfeiting system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9082062B2 (en) * 2011-10-10 2015-07-14 Zortag, Inc. Method of, and system and label for, authenticating objects in situ
US8903181B2 (en) * 2011-12-28 2014-12-02 Venkatesh Gangadharan Low cost unique identification generation using combination of patterns and unique code images

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2783077A1 (en) * 1998-09-07 2000-03-10 Renaud Blavignac Labelling system for genuine merchandise includes self-adhesive label with visible and machine-readable sections which must tally to provide evidence of validity
EP2565818A1 (en) * 2010-04-27 2013-03-06 Hans Jerry Urban Pettersson Anti-counterfeiting method using at least two different codes
WO2012175878A1 (en) * 2011-06-21 2012-12-27 Advanced Track & Trace Method and device for authenticating a tag
WO2013168962A1 (en) * 2012-05-07 2013-11-14 Cho Han Yong Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
CN103489109A (en) * 2013-08-26 2014-01-01 郑国义 Three-dimensional entity secret mark anti-counterfeiting system and method

Also Published As

Publication number Publication date
GB201400419D0 (en) 2014-02-26
WO2015104561A1 (en) 2015-07-16

Similar Documents

Publication Publication Date Title
US9449325B2 (en) System and method for authenticity verification
US9010654B2 (en) Monitoring moving articles
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
KR101795196B1 (en) Unauthorized product detection techniques
US7684652B2 (en) Remote authentication system
US7770783B2 (en) Method and system to provide security information when authenticating product code
US9076024B2 (en) Anti-counterfeiting system and method
CN104428798B (en) Method for clear and definite tagged object
US20050049979A1 (en) Method, apparatus, and system for determining a fraudulent item
US20070215685A1 (en) System and Method of Product Identification Using a URL
US20130170758A1 (en) Low cost unique identification generation using combination of patterns and unique code images
US20020146146A1 (en) Using digital watermarks to facilitate counterfeit inspection and inventory management
JP2012528499A (en) RFID tag authentication method using asymmetric encryption method
US20150151560A1 (en) Method for protecting the authenticity of an article from imitation and counterfeit
JP2017532696A (en) Method and authentication system for registering random security functions
CN101356538A (en) Method of authentication of items put into circulation field
US20100188709A1 (en) Variable data addition method and system
US20130317996A1 (en) Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings
WO2015104561A1 (en) Authentication system, method and label
GB2524558A (en) Authentication system, method and label
US20190156090A1 (en) Warranty tracking method for a consumer product
CN106448441B (en) Method for generating anti-counterfeit label and anti-counterfeit label
JP2009184754A (en) Goods authenticity determination system, goods authenticity determination program, and recording medium
Stein Supply chain with blockchain—showcase RFID
CN110503437A (en) Based on the article anti-counterfeit method more identified and its system

Legal Events

Date Code Title Description
COOA Change in applicant's name or ownership of the application

Owner name: AUTHENTICATE NOW LIMITED

Free format text: FORMER OWNER: INDEPENDENT TECHNICAL SERVICES (UK) LTD

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)