GB2619599A - System and method for generating an authenticity record for an article - Google Patents

System and method for generating an authenticity record for an article Download PDF

Info

Publication number
GB2619599A
GB2619599A GB2305380.4A GB202305380A GB2619599A GB 2619599 A GB2619599 A GB 2619599A GB 202305380 A GB202305380 A GB 202305380A GB 2619599 A GB2619599 A GB 2619599A
Authority
GB
United Kingdom
Prior art keywords
article
image
camera
mobile phone
camera system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GB2305380.4A
Other versions
GB202305380D0 (en
Inventor
Cooke Steve
Carr Christopher
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Pages Ltd
Original Assignee
Electric Pages Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Pages Ltd filed Critical Electric Pages Ltd
Publication of GB202305380D0 publication Critical patent/GB202305380D0/en
Publication of GB2619599A publication Critical patent/GB2619599A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/80Analysis of captured images to determine intrinsic or extrinsic camera parameters, i.e. camera calibration

Abstract

A system and method for generating an authenticity record for an article comprises a first camera system that captures a microscopic image of at least part of an article, and a second camera system that captures a further image that evidences the capture of the microscopic image by the first system. An article authentication system generates a data record linking both images. This allows for a location of the microscopic image on the article to be associated with a location on the article. Both camera systems may be part of the same device, which may comprise a mobile phone, and the camera systems may be the same systems operating under different modes of operation. The mobile phone may comprise a biometric reader for authenticating the user prior to image captures, and the system may further comprise a cryptographic key for generating a non-fungible token (NFT) evidencing the authenticity of the article.

Description

System and Method for generating an authenticity record for an article The present invention relates to a system and method for generating an authenticity record for an article and in preferably an authenticity record that is verifiable, location-aware and enables identification of physical assets Embodiments of the present invention seeks to address widespread issues of authenticity relating to the sale of physical assets e.g. artworks etc and especially where those sales are conducted through digital channels. For the sake of a few
limited examples:
* bad actors can 'mint' NFTs (Non Fungible Tokens) that represent bona-fide physical artworks and trade them via online markets, without the necessary permissions; * many kinds of physical artworks (eg prints) can easily be counterfeited and sold as the genuine article, either on the High Street or online; * high value goods -fashion clothing, high-end electronics and white goods -may come with guarantees that are non-transferable, but it may be difficult for the supplier -especially if conducting business online -to tell if the warranty applies to the item in question or to another one of the same kind.
Previous attempts to solve these problems mostly focus on the addition of unique identifiers to the assets. Companies have offered solutions based around NFC (Near Field Communication) chips embedded in articles; others have developed various types of tamper-proof or taggant-printed labels and so forth.
All these solutions tend to have drawbacks. For example, various degrees of incompatibility between the asset and the identifier. This might be physical (the label might damage or fail to adhere properly to the substrate, or it might simply come off in the wash) or aesthetic (there is no acceptable location to apply the label).
Even supposing a unique identifier could be permanently and inextricably associated with an asset, there remain other issues. For example: Security: 1. Who created the association -were they entitled to? And how can we be sure it was really them who created it? 2. Was the association that was created genuine? (e.g. in the factory/studio or elsewhere) as a common cause of fraud is employee theft of materials, products, and identification materials (tags, labels etc) for assembly elsewhere.
Verification: 1. How is the association verified? Does that require physical access to the asset by a verifying agent which may be expensive or impossible? How is the identifier located on the asset and can it defeat attempts at removal or transfer to another asset? 2. What does a verifying agent do when told that the association has been destroyed (e.g. a label removed, or an asset substantially remodelled)? 3. How do we ensure that the information relating to the association is immutable -that it or some key associated data hasn't been changed? 4. How do we ensure that the association correctly links the right identifier with the right asset? 5. How do we do all the above quickly, cheaply and easily so that the solution is easily 20 adopted?
Statement of Invention
According to an aspect of the present invention, there is provided a system for generating an authenticity record for an article comprising a first camera system configured to capture a microscopic image of at least part of an article; and, a second camera system configured to capture a further image that evidences the capture of the microscopic image by the first camera system, wherein the article authentication system is arranged to generate a data record linking the microscopic image and the further image.
The first and second camera systems may be part of the same device.
The first and second camera systems may be the same camera system operating under different modes of operation, and/or with different lenses or and/or different magnification settings.
The device may comprise a mobile phone.
The second camera system may be part of a mobile phone, the first camera system being configured to communicate with the mobile phone, one of the first camera system and the mobile phone being operative to trigger, by said communication, capture of an image by the other.
The mobile phone may further comprise a biometric reader configured to authenticate the user prior to capturing of the images.
The article authentication system may be configured to include data on the authentication of the user in the data record.
The system may further comprise a cryptographic key, the article authentication system being configured to sign the data record with the cryptographic key and generate a non-fungible token evidencing the authenticity of the article.
According to another aspect of the present invention, there is provided a method for generating an authenticity record for an article comprising capturing, via a first camera system, a microscopic image of at least part of an article; capturing, via a second camera system, a further image that evidences the capture of the microscopic image by the first camera system, generating a data record linking the microscopic image and the further image.
The second camera system may be part of a mobile phone, the first camera system being configured to communicate with the mobile phone, one of the first camera system and the mobile phone triggering, by said communication, capture of an image by the other.
The method may further comprise biometrically authenticating the user prior to capturing of the images.
The method may further comprise including data on the authentication of the user in the data record.
The method may further comprise signing. with a cryptographic key, the data record and generating a non-fungible token evidencing the authenticity of the article.
Embodiments of the present invention are directed to a system and method for generating an authenticity record for an article. Preferred embodiments take one or more highly detailed microphotographs of the article (asset). Preferably, a local system (such as an application running on a mobile phone or other device) securely coordinates operations such that each image is automatically and simultaneously: * associated with one or more exact location(s) on the asset, so that the imaged area can easily be located later for verification purposes * taken only when triggered by an authorised user, using an authorised device * (optionally) repeated with respect to adjacent, randomly selected areas of the asset * Preferably encrypted using quantum resistant public key cryptography and stored alongside the other asset data in an immutable record e.g. on a blockchain, in some form of verifiable, immutable physical record or otherwise * signed by the verified user using quantum resistant public key cryptography to prove authorship and stored in an immutable data structure, such as a blockchain The location on the asset can be obtained, for example, by a further image with a different field of view such that the location the microscopic image was taken can be later recovered for taking of a further image and/or other means (such as manual inspection) to verify that the location on the article matches the microscopic image.
In one embodiment, two images are captured substantially simultaneously. A user points their mobile phone at wireless digital microscope A, positioned on the work, and press a button on their phone that simultaneously: - takes a picture from the phone of A on the artwork - triggers A to take its microscopic image of the bit of the artwork it's positioned on/over.
Preferably, the system can only be used by an authorised user, for example, by authentication via a biometric reader.
Preferably, the system is configured to substantially immediately communicate the images and data record to the remote server C. Preferably, the device which actually takes the microscopic picture -or the mobile B -has its own private 'key' which signs the data and via communication with the remote device C immediately 'mints' an NET referencing the data.
Detailed Description
Preferred embodiments include: [A] One or more devices incorporating one or more imaging units where: * in the event that are multiple imaging units, at least one imaging unit is in communication with the others via a wired, wireless or other connection * at least one imaging unit has a magnifying lens or a combination of lenses for resolving details of the subject too small to be seen or too small to be seen distinctly and in detail by the unaided eye * in the event that there are multiple devices or imaging units, one device or imaging unit may, on being triggered to capture an image, simultaneously trigger one or more of the other devices/units to capture an image * at least one device/unit is optionally in wireless or wired communication with....
[B] a local unit for the sake of example only a mobile phone, which is configured to: * accept user input for the purposes of authentication and optionally for triggering the device(s) specified in [A] and * optimally for communicating with [Ali for the purposes of acquiring, displaying and processing image data e.g. for preview purposes and * presenting information to a user acquired either locally or from a remote system (eg an online database) that will enable the user to trigger the device(s) to capture data for association with a specific asset dataset and * exchanging some or all of the above in communication with...
[C]) a remote system e.g. a server connected to public networks which can be used to carry out further processing of the data generated by [A] and/or [B] above eg storing in a database, committing to a blockchain, minting an NET etc. [A] could optionally come pre-installed with a tamper-resistant chip, containing a unique hard coded private key, used to sign the data. Operations carried out by [A] and/or [B] could include: * recording the data * including entity identification information * signing all data * storing the data in a local storage e.g. a ssd card * optionally sending either directly or via [B] the data along with the signature to [C] for further processing and operations optionally including the storage of the information in a tamper resistant data structure This process guarantees that all data that has been passed through [A] and/or [B] is signed by the appropriate key, and it can be verifiably checked that this process has taken place.
Verification To verify that an authorised user has used an authorised device any person or entity could: -Look up the data on the public immutable record -Using the registered public keys of the entity or entities operating all or part of the system above: Verify that all signatures are included o Cryptographically verify that all signatures are valid o Check that no keys have been revoked Revocation -As a security measure, it is possible to publicly announce keys that have been compromised, and from what period of time.
- This can be recorded on a public immutable data structure Attestation and authorisation of keys that can no longer be trusted / used can be provided by a set of master keys held by trusted stakeholders When a key is deemed revoked, the master key stakeholders could sign a message to, for example, a public immutable data structure which might contain by way of example: o The key being revoked o The date at which the key should be considered invalid for o The signatures of a pre-determined threshold of master key holders, for e.g. 3 out of 4 master key holders The revocation procedure allows for the governing entity to effectively withdraw the authorisation of any entity or device to attest to the authenticity of any item. It would also be possible for the entities linked to [A] or [B] to provide authorisation or confirmation relating to a revocation process. Notes
To increase the effectiveness of the above, the devices in [A] and/or [B] can be considered as and/or could operate in a manner similar to a 'cold wallet', incorporating the necessary keys to create records, tokens or other entities on a remote system.
One embodiment could incorporate some or all of the functions ascribed to [A] and [B] into a single unit, for direct communication with [C]. For example only, a dual-imaging unit as described above with an integral 'cold wallet' function, user input interface (either physical buttons etc or other eg audio, graphical or light-triggered eg via IR or managed camera flash pattern), and communications capability.
One issue with microphotography is that it is difficult to determine exactly which part of the asset was imaged -since it may not be possible with the naked eye to locate the location that matches the image. To address this: [A] could be a single imaging device, triggered by an application running on [B]. [B] could use its imaging device to scan the position of [A] and of the asset relative to each other, for the purpose of determining through subsequent image analysis the exact position of [A] with respect to the asset. The accuracy of the determination, achieved for example through ray tracing and other image analysis techniques, may depend on: * Index markings on [A] within the field of view of the imaging device on [B] to facilitate calculations relating to angle of view, relative scale etc * Requirements for the user of [B] to be within a certain range or angle of view of [A]; this may be facilitated by feedback from [B]'s application, depending on visual information captured through [B]'s camera * Use of a separate imaging device ['scanner] in [A] showing a wide angle view of [A]'s position.
* Knowledge of the physical dimensions of the asset and of [A] * Use buy [B] of a flash integral to [B] or separately, rendering visible a shadow cast by [A] and possibly also used to trigger [A]'s image capture * The possible use of [B]'s application to trigger the simultaneous capture of images by both [A] and [B]'s imaging devices. This is necessary to reduce the chance of [A] being moved after [B] has captured the image required for determining its location.
[A] could be equipped with a positional detection system, for example as used in an 'optical mouse' where a light source, typically a light-emitting diode (LED), and a light detector, such as an array of photodiodes, detects movement relative to the surface of the asset. This would enable the recording of multiple microphotograph locations relative to a fixed point e.g. the location of the initial image, the printed area of a label or other mark on the asset.
In addition to [A] and [B] (or those two modules combined), there could be one or more further units [D] which would provide low-power Bluetooth 'beacon' or similar technology, where either or both of [A] and [B] are configured to communicate with [D], to assist in verifying * the location/position of the operation using signal strength and/or triangulation * distances involved between for example [A], [B] and [C].
For example, a user might be unable to trigger an imaging process using [A] and/or [B] if the presence of [D] and any authentication exchange or position/distance check was not completed, or was completed with errors.
As a possible example of a commercial service: 1 The customer goes to the shop and purchases device A: a digital microscope with two built-in cameras, wired or wireless communication, and built-in private key technology.
2 The customer downloads an app onto his mobile phone -device [B] -and opens a secure account.
3 [B] connects to [A] for the first time, acquiring unique identifying data from [A], which enables the customer to use the app on [B] to 'register' [A] to his account.
From now on, [A] will only respond to [B], with the app running and when authenticated by the customer 4 The customer places [A] onto an artwork.
The customer opens the app on [B] and selects the asset data record for the artwork in question and selects an option to 'phototag' the artwork.
6 The app on [B] communicates with [A] to verify its presence, and optionally carries out other verification checks e.g. to a local device [D].
7 The customer points the phone's camera at A. On the mobile screen, the customer can see [A] and its positional relationship to the work.
8 The application on [B] may carry out initial checks at this stage by using [B]'s imaging device for recognition of index marks on [A] and/or carrying out communication with [A] and/or [D].
9 With the image of [A] in view via the imaging device on [B], with possible onscreen delineation of the angles/viewpoint required (e.g. similar to ID verification systems creating an outline of a face within which the user must position their face) the customer presses a button in the app, triggering [A] and [B] to take one or more images simultaneously via one or more of its imaging devices. The image(s) taken by [B] can be used later to determine the exact position of [A] on the artwork, optionally assisted by additional images taken by [A] eg using its scanner.
10. The customer may at this point optionally slide [A] around, taking more photos. The relative position is determined by an optical mouse circuit in the widget and [A] may provide feedback e.g. a flashing light and/or sound to indicate when an image may be captured, or has been captured automatically by [A] e.g. after a specific distance has been created between the locations of successive images.
11 The data acquired can then be signed and used by the system to 'mint an N FT' with an embedded, cryptographically signed microphotograph, showing detail of the artwork that cannot be replicated (eg the pattern of fibres in a paper stock).

Claims (13)

  1. Claims 1. A system for generating an authenticity record for an article comprising a first camera system configured to capture a microscopic image of at least part of an article; and, a second camera system configured to capture a further image that evidences the capture of the microscopic image by the first camera system, wherein the article authentication system is arranged to generate a data record linking the microscopic image and the further image.
  2. 2. The system of claim 1, wherein the first and second camera systems are part of the same device.
  3. 3. The system of claim 1 or 2, wherein the first and second camera systems are the same camera systems operating under different modes of operation, and/or with different lenses or and/or different magnification settings.
  4. 4. The system of claim 2 or 3, wherein the device comprises a mobile phone.
  5. 5. The system of claim 1, wherein the second camera system is part of a mobile 20 phone, the first camera system being configured to communicate with the mobile phone, one of the first camera system and the mobile phone being operative to trigger, by said communication, capture of an image by the other.
  6. 6. The system of claim 4 or 5, the mobile phone further comprising a biometric reader configured to authenticate the user prior to capturing of the images.
  7. 7. The system of claim 6, wherein the article authentication system is configured to include data on the authentication of the user in the data record.
  8. 8. The system of any preceding claim, further comprising a cryptographic key, the article authentication system being configured to sign the data record with the cryptographic key and generate a non-fungible token evidencing the authenticity of the article.
  9. 9. A method for generating an authenticity record for an article comprising capturing, via a first camera system, a microscopic image of at least part of an article; capturing, via a second camera system, a further image that evidences the capture of the microscopic image by the first camera system, generating a data record linking the microscopic image and the further image.
  10. 10. The method of claim 9, wherein the second camera system is part of a mobile phone, the first camera system being configured to communicate with the mobile phone, one of the first camera system and the mobile phone triggering, by said communication, capture of an image by the other.
  11. 11. The method of claim 9 or 10, further comprising biometrically authenticating the user prior to capturing of the images.
  12. 12. The method of claim 11, further comprising including data on the authentication of the user in the data record.
  13. 13. The method of any of claim 9 to 12, further comprising signing, with a cryptographic key, the data record and generating a non-fungible token evidencing the authenticity of the article.
GB2305380.4A 2022-04-12 2023-04-12 System and method for generating an authenticity record for an article Pending GB2619599A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB2205401.9A GB202205401D0 (en) 2022-04-12 2022-04-12 A system and method for the verifiable, location-aware identification of physical assets

Publications (2)

Publication Number Publication Date
GB202305380D0 GB202305380D0 (en) 2023-05-24
GB2619599A true GB2619599A (en) 2023-12-13

Family

ID=81653261

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB2205401.9A Ceased GB202205401D0 (en) 2022-04-12 2022-04-12 A system and method for the verifiable, location-aware identification of physical assets
GB2305380.4A Pending GB2619599A (en) 2022-04-12 2023-04-12 System and method for generating an authenticity record for an article

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB2205401.9A Ceased GB202205401D0 (en) 2022-04-12 2022-04-12 A system and method for the verifiable, location-aware identification of physical assets

Country Status (1)

Country Link
GB (2) GB202205401D0 (en)

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
GB202305380D0 (en) 2023-05-24
GB202205401D0 (en) 2022-05-25

Similar Documents

Publication Publication Date Title
US10915749B2 (en) Authentication of a suspect object using extracted native features
AU2016100419A4 (en) Instrument and document authentication system
US8334757B2 (en) Controlling data access to and from an RFID device
US7065645B2 (en) System, method, and apparatus for visual authentication
ES2890833T3 (en) Method, system, device and software program product for the remote authorization of a user of digital services
US20040049401A1 (en) Security methods employing drivers licenses and other documents
EA023501B1 (en) Univocal label, method for producing the same and method for verifying the originality of a product provided therewith
US20020021001A1 (en) Biometric authentication card, system and method
US20150188706A1 (en) Method for Unambiguous Marking of an Object
JP2009521039A (en) Optical authentication
JP2004171109A (en) Device authentication system
GB2619599A (en) System and method for generating an authenticity record for an article
KR20200142834A (en) A forgery judging application system and its reading method for a randomized encryption printed image
TWM637228U (en) Transfer system of sign data
US20220027912A1 (en) Cryptographic physical random object
JP2013030889A (en) Individual identification device, individual identification object, individual identification method and program
JP2005352879A (en) System and method for information verification by two-dimensional code
AU2021243749B2 (en) Mechanically stamped unique features for authenticity and provenance tracking
KR102507696B1 (en) Electronic access control system using qr code
CN115315734B (en) Unique features of mechanical imprinting for plausibility and origin tracking
RU2205452C1 (en) Method for authenticating musical instruments
CN112766006B (en) RFID article identification system
US20230394856A1 (en) Method for determining a manipulation or forgery of an object and system therefor
RU2206122C1 (en) Method for authenticating natural uniques
KR101298224B1 (en) Authentication method using 2-dimensional code