WO2003036556A2 - Method and system for authenticating a packaged good - Google Patents

Method and system for authenticating a packaged good Download PDF

Info

Publication number
WO2003036556A2
WO2003036556A2 PCT/IB2002/004358 IB0204358W WO03036556A2 WO 2003036556 A2 WO2003036556 A2 WO 2003036556A2 IB 0204358 W IB0204358 W IB 0204358W WO 03036556 A2 WO03036556 A2 WO 03036556A2
Authority
WO
WIPO (PCT)
Prior art keywords
code
client
good
database
packaged
Prior art date
Application number
PCT/IB2002/004358
Other languages
French (fr)
Other versions
WO2003036556A3 (en
Inventor
Xiao J. Zhu
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to JP2003538972A priority Critical patent/JP2005517323A/en
Priority to EP02775133A priority patent/EP1509887A2/en
Priority to US10/493,173 priority patent/US20040267711A1/en
Priority to KR10-2004-7006041A priority patent/KR20040044555A/en
Priority to AU2002341319A priority patent/AU2002341319A1/en
Publication of WO2003036556A2 publication Critical patent/WO2003036556A2/en
Publication of WO2003036556A3 publication Critical patent/WO2003036556A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • the invention relates to a method of establishing the authenticity of a packaged good.
  • the invention further relates to a system for authenticating a packaged good.
  • the packaging of a good for instance a lamp
  • the replaced good may be of a lesser quality than the good which was initially contained in the packaging.
  • the technical quality of the replacement good may be substantially lower than that of the original good.
  • the lifetime of the replacement or faked good may be considerably shorter than that of the original good.
  • the replacement good may constitute a safety risk for the user. If such a good causes injuries or any other damage, the company whose brand name is on the packaging of the good may be confronted with claims for damages.
  • This object is achieved according to the invention in a method comprising the following steps: receiving from a client a first code identifying the good, receiving from the client a second code identifying the packaging, and verifying a correlation between said first and said second code, the packaged good being authenticated if the first and the second code co ⁇ elate with a pre-selected combination.
  • the first code is applied on the good, for example, by the manufacturer of the good.
  • the second code is applied on the packaging, for example, by the manufacturer of the package.
  • the codes may be applied during the manufacturing of the good and of the packaging but may alternatively be applied later on.
  • On a list which is preferably contained in a computer database management system or which comprises a simple list (on paper), the codes identifying the good and the packaging are stored together (for example in pairs) in such a manner that a correlation between said first and second codes can be established at a later moment in time.
  • the first code comprises, for example, a number of bits (for example, a whole number) (uniquely) identifying the good.
  • the second code comprises, for example, a further number of bits (for example, a further whole number) (uniquely) identifying the packaging.
  • the number on the good (substantially) differs from the further number on the packaging.
  • pre-selected combinations of first and second codes enable the authentication of the packaged good.
  • the client Upon verifying the authenticity of the packaged good, the client provides the first code and the second code and it is checked whether the first and the second code correspond to the data entered on the above-mentioned list.
  • the client Upon verifying the correlation between the first and the second code, the client is informed that the packaged good is authenticated if the first and the second code correlate with a pre-selected combination.
  • the measure according to the invention provides a so-called anti-fake system for packaged goods.
  • verifying the correlation comprises using the first code as an input key for a database query resulting in an output key from the database, comparing said output key with the second code, the correlation being established if the output key matches with the second code.
  • An advantage of this embodiment is that the verification of the authenticity of the packaged good is straightforward, fast, and simple.
  • said first code is used as the input key for the database, preferably a computer database management system.
  • the database is searched for the occurrence of the first code. If there is no match for the input key, the first code received from the client is wrong. This may imply that the client made an error in providing the first code or that the good is provided with a code which does not correspond to a first code on the list, thereby invalidating the good as not made by the original manufacturer.
  • the database provides the corresponding output key. This output key is compared with the second code received from the client.
  • the method further comprises a step of providing said input key and/or said output key with flags in the database when the correlation has been established.
  • the database may deliver a warning key that the combination has been checked before.
  • a memory function has the advantage that another type of fake packaged goods can be detected. If a further manufacturer should, for example, produce packaged goods with a first code on the goods and with a second code on the packaging, which first and second codes co ⁇ espond to or have been copied from a packaged good manufactured by the original manufacturer, only the client who first checked the validity of the codes on the packaged good is informed that he has bought an authentic product.
  • the authenticity of the packaged good is invalidated upon reception of a first code corresponding to an input key in the database provided with a flag and/or reception a second code corresponding to an output key in the database provided with a flag.
  • Said measure detects any fake copies of the packaged goods made by any further manufacturer. Said measure, however, enables the client to check the validity of the packaged good only once. To enable a certain client to check the authenticity of the packaged good he has purchased for a second or subsequent time, the client may be provided with a verification code. In another embodiment of the invention, the method further comprises a step of providing the client with a verification code upon authenticating the packaged good, enabling further verification of the authenticity upon reception from the client of the first code, the second code, and the verification code.
  • the method further comprises a step of providing the client with a certificate (on paper or electronically) comprising the first and the second code and/or a statement relating to the authenticity of the packaged good. In this way there is no need for the client to check the validity of the first and the second code for a second or subsequent time.
  • a certificate on paper or electronically
  • verifying of the correlation comprises looking up the pair of the first code and the second code in a list. This is a simple method and does not require a computer database management system. It is a further object of the invention to provide a system for authenticating a packaged good.
  • a system for authenticating a packaged good comprising: receiving means for receiving from a client a first code identifying the good and a second code identifying the packaging, and a database management system for verifying a correlation between said first and said second code, the packaged good being authenticated if the first and the second code correlate with a pre-selected combination.
  • a checking system enables the authenticity of a packaged good to be established in a straightforward, fast, and simple manner.
  • the system comprises a device coupled to the internet, comprises a device coupled to a telephone, or comprises a customer service entity.
  • a device coupled to the internet comprises a device coupled to a telephone, or comprises a customer service entity.
  • Such devices provide a convenient checking facility for the client.
  • FIG. 1 schematically shows an embodiment of a system according to the invention
  • Fig. 2 schematically shows the organization of the information in a computer database management system in an embodiment of the system
  • Fig. 3 is a diagram of the information flow between the client, the server, and the database of a computer database management system in an embodiment of the system.
  • Fig. 1 schematically shows an embodiment of a system comprising a client 1 , a network 2, a server 3, and two types of databases, i.e. a (simple) list 4 (for example on paper) or a database 5.
  • the client 1 contacts the database via the server 3 and the network 2.
  • This contact may be established in various ways.
  • the client contacts the database via a device coupled to the internet, for example a personal computer.
  • the client contacts the database via a device coupled to a telephone or other means of (tele)communication.
  • the client contacts the database via a customer service entity.
  • the various devices mentioned provide a convenient checking facility for the client.
  • the authenticity of the packaged good is checked by a computer database management system. Alternatively the checking is done by hand.
  • the first code provided by the client 1 is used as an input key for the list 4.
  • the list is sorted with respect to the first input key. If said input key is detected on the list, the corresponding output key may be read out and compared with the second code provided by the client 1. If a match is found, the packaged good is authenticated. If desired, the input key or the output key is flagged or marked in some way to enable checking whether a packaged good with the same input key has been checked by a client.
  • Fig. 2 schematically shows the organization of the information in a computer database management system in to an embodiment of the system.
  • Fig. 3 is a diagram of the information flow between the client, the server, and the database of a computer database management system in an embodiment of the system.
  • the client (denoted “C” in Fig. 3) sends the first code Ci identifying the good provided and the second code C 2 identifying the packaging to the server 2 (denoted "S” in Fig. 3).
  • the first code Ci from the client 1 is used as the input key Ii for the database 5 (denoted "DB” in Fig. 3).
  • DB database query
  • Q(C ⁇ ) the occurrence of the input key Ii is checked in the database 5.
  • the input key Ii , I 2 , ... or the output key Oi , O 2 , ... may be flagged with a flag Fi, F 2 , ... (see Fig. 2) to enable checking whether a packaged good with the same input key has been checked by a client 1.
  • the client 1 may be provided with a verification code Ni, N 2 , ... upon receiving the message that the packaged good is authentic. Said verification code enables the client 1 to verify the authenticity of the packaged good more than once. In that case the client and is asked by the computer database management system for the verification code in addition to the first code second code.
  • the client may be provided with a certificate (on paper or electronically) with the first and the second code and/or a statement relating to the authenticity of the packaged good. In this way there is no need for the client to check the validity of the first and second codes for a second or subsequent time.
  • the checking system may be free of charge (charge free telephone call), one out of a certain number of clients may be provided with a prize upon verifying the authenticity of the packaged good, or the client may be rewarded in some other way.

Landscapes

  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method of and system for establishing the authenticity of packaged goods. The method comprises the following steps: receiving from a client (1) a first code identifying the good, receiving from the client (1) a second code identifying the packaging, and verifying a correlation between said first and said second code, the packaged good being authenticated if the first and the second code correlate with a pre-selected combination. The codes identifying the good and the packaging are stored together on a list (4) or in a computer database (5) management system. The systems render possible a reliable detection of fake copies of the packaged goods.

Description

Method and system for authenticating a packaged good
The invention relates to a method of establishing the authenticity of a packaged good.
The invention further relates to a system for authenticating a packaged good.
There is an increasing trend in the world that customers who buy packaged goods provided with a well-known and/or established brand name are confronted with fake. For example, the packaging of a good, for instance a lamp, may be reused by another company for selling another a similar good, for example a similar lamp. The replaced good may be of a lesser quality than the good which was initially contained in the packaging. In particular, the technical quality of the replacement good may be substantially lower than that of the original good. By way of example, the lifetime of the replacement or faked good may be considerably shorter than that of the original good. In another example, the replacement good may constitute a safety risk for the user. If such a good causes injuries or any other damage, the company whose brand name is on the packaging of the good may be confronted with claims for damages.
It is an object of the invention to provide a method and system for authenticating a packaged good which substantially alleviates the above problem and which is easy to use. This object is achieved according to the invention in a method comprising the following steps: receiving from a client a first code identifying the good, receiving from the client a second code identifying the packaging, and verifying a correlation between said first and said second code, the packaged good being authenticated if the first and the second code coπelate with a pre-selected combination.
The first code is applied on the good, for example, by the manufacturer of the good. The second code is applied on the packaging, for example, by the manufacturer of the package. The codes may be applied during the manufacturing of the good and of the packaging but may alternatively be applied later on. On a list, which is preferably contained in a computer database management system or which comprises a simple list (on paper), the codes identifying the good and the packaging are stored together (for example in pairs) in such a manner that a correlation between said first and second codes can be established at a later moment in time. The first code comprises, for example, a number of bits (for example, a whole number) (uniquely) identifying the good. The second code comprises, for example, a further number of bits (for example, a further whole number) (uniquely) identifying the packaging. Preferably, the number on the good (substantially) differs from the further number on the packaging. On a list made in the above-described manner pre-selected combinations of first and second codes enable the authentication of the packaged good. Upon verifying the authenticity of the packaged good, the client provides the first code and the second code and it is checked whether the first and the second code correspond to the data entered on the above-mentioned list. Upon verifying the correlation between the first and the second code, the client is informed that the packaged good is authenticated if the first and the second code correlate with a pre-selected combination. The measure according to the invention provides a so-called anti-fake system for packaged goods.
In an embodiment of the invention, verifying the correlation comprises using the first code as an input key for a database query resulting in an output key from the database, comparing said output key with the second code, the correlation being established if the output key matches with the second code.
An advantage of this embodiment is that the verification of the authenticity of the packaged good is straightforward, fast, and simple. Upon reception from a client, said first code is used as the input key for the database, preferably a computer database management system. The database is searched for the occurrence of the first code. If there is no match for the input key, the first code received from the client is wrong. This may imply that the client made an error in providing the first code or that the good is provided with a code which does not correspond to a first code on the list, thereby invalidating the good as not made by the original manufacturer. If the input key is found in the database, the database provides the corresponding output key. This output key is compared with the second code received from the client. If the output key from the database and the second code received from the client do not match, this implies that the packaging is provided with a code which does not correspond to the first code on the good in the packaging, thereby invalidating the good as not made by the original manufacturer. In this manner the authenticity of a packaged good can be easily and reliably established. In a prefeπed embodiment of the invention, the method further comprises a step of providing said input key and/or said output key with flags in the database when the correlation has been established. By adding flags to the input key and/or the output key in the database upon establishing the correlation between the input key and the output key in the database, the database is provided with a so-called memory for checking that particular combination of input key and output key. When a combination of an input key and an output key is checked for the second or any subsequent time, the database may deliver a warning key that the combination has been checked before. Such a memory function has the advantage that another type of fake packaged goods can be detected. If a further manufacturer should, for example, produce packaged goods with a first code on the goods and with a second code on the packaging, which first and second codes coπespond to or have been copied from a packaged good manufactured by the original manufacturer, only the client who first checked the validity of the codes on the packaged good is informed that he has bought an authentic product. In a further preferred embodiment of the invention, the authenticity of the packaged good is invalidated upon reception of a first code corresponding to an input key in the database provided with a flag and/or reception a second code corresponding to an output key in the database provided with a flag.
Said measure detects any fake copies of the packaged goods made by any further manufacturer. Said measure, however, enables the client to check the validity of the packaged good only once. To enable a certain client to check the authenticity of the packaged good he has purchased for a second or subsequent time, the client may be provided with a verification code. In another embodiment of the invention, the method further comprises a step of providing the client with a verification code upon authenticating the packaged good, enabling further verification of the authenticity upon reception from the client of the first code, the second code, and the verification code.
In an alternative, preferred embodiment of the invention, the method further comprises a step of providing the client with a certificate (on paper or electronically) comprising the first and the second code and/or a statement relating to the authenticity of the packaged good. In this way there is no need for the client to check the validity of the first and the second code for a second or subsequent time.
In an alternative embodiment of the invention, verifying of the correlation comprises looking up the pair of the first code and the second code in a list. This is a simple method and does not require a computer database management system. It is a further object of the invention to provide a system for authenticating a packaged good.
This object is achieved according to the invention in a system for authenticating a packaged good comprising: receiving means for receiving from a client a first code identifying the good and a second code identifying the packaging, and a database management system for verifying a correlation between said first and said second code, the packaged good being authenticated if the first and the second code correlate with a pre-selected combination. Such a checking system enables the authenticity of a packaged good to be established in a straightforward, fast, and simple manner.
In an embodiment, the system comprises a device coupled to the internet, comprises a device coupled to a telephone, or comprises a customer service entity. Such devices provide a convenient checking facility for the client.
The invention and additional features, which may be optionally used to implement the invention, are apparent from and will be elucidated with reference to embodiments shown in the drawing, in which: Fig. 1 schematically shows an embodiment of a system according to the invention;
Fig. 2 schematically shows the organization of the information in a computer database management system in an embodiment of the system; and
Fig. 3 is a diagram of the information flow between the client, the server, and the database of a computer database management system in an embodiment of the system.
Throughout the Figures, similar or corresponding features have been given the same reference numerals. Some of the features indicated in the drawings are typically implemented in software, and as such represent software entities, such as software modules or objects.
Fig. 1 schematically shows an embodiment of a system comprising a client 1 , a network 2, a server 3, and two types of databases, i.e. a (simple) list 4 (for example on paper) or a database 5. In this example, the client 1 contacts the database via the server 3 and the network 2. This contact may be established in various ways. Preferably, the client contacts the database via a device coupled to the internet, for example a personal computer. In an alternative embodiment, the client contacts the database via a device coupled to a telephone or other means of (tele)communication. In a further embodiment, the client contacts the database via a customer service entity. The various devices mentioned provide a convenient checking facility for the client. Preferably, the authenticity of the packaged good is checked by a computer database management system. Alternatively the checking is done by hand.
If the database is a simple list, the first code provided by the client 1 is used as an input key for the list 4. Preferably, the list is sorted with respect to the first input key. If said input key is detected on the list, the corresponding output key may be read out and compared with the second code provided by the client 1. If a match is found, the packaged good is authenticated. If desired, the input key or the output key is flagged or marked in some way to enable checking whether a packaged good with the same input key has been checked by a client.
Fig. 2 schematically shows the organization of the information in a computer database management system in to an embodiment of the system. In addition, Fig. 3 is a diagram of the information flow between the client, the server, and the database of a computer database management system in an embodiment of the system. The client (denoted "C" in Fig. 3) sends the first code Ci identifying the good provided and the second code C2 identifying the packaging to the server 2 (denoted "S" in Fig. 3). The first code Ci from the client 1 is used as the input key Ii for the database 5 (denoted "DB" in Fig. 3). Via a database query, denoted "Q(Cι)" in Fig. 3, the occurrence of the input key Ii is checked in the database 5. If the input key Ii is detected in the database 5, the corresponding output key Oi is read out from the database 5, denoted R(Oι) in Fig. 3, and is subsequently compared with the second code C2 received from the client 1 , denoted "C2=Oι?" in Fig. 3. If the answer denoted "A" in Fig. 3 to this question is yes, the client is informed that packaged good is authentic.
If desired, the input key Ii , I2, ... or the output key Oi , O2, ... may be flagged with a flag Fi, F2, ... (see Fig. 2) to enable checking whether a packaged good with the same input key has been checked by a client 1. The client 1 may be provided with a verification code Ni, N2, ... upon receiving the message that the packaged good is authentic. Said verification code enables the client 1 to verify the authenticity of the packaged good more than once. In that case the client and is asked by the computer database management system for the verification code in addition to the first code second code.
Upon authenticating the packaged good, the client may be provided with a certificate (on paper or electronically) with the first and the second code and/or a statement relating to the authenticity of the packaged good. In this way there is no need for the client to check the validity of the first and second codes for a second or subsequent time.
In order to stimulate the client to verify the authenticity of the packaged good, the checking system may be free of charge (charge free telephone call), one out of a certain number of clients may be provided with a prize upon verifying the authenticity of the packaged good, or the client may be rewarded in some other way.
Any fake copies of the packaged goods made by any further manufacturer can be reliably detected by the measures according to the embodiments of the invention.
The drawings and their description hereinbefore illustrate rather than limit the invention. It will be evident that there are numerous alternatives which fall within the scope of the appended claims. In this respect, the following closing remarks are made.
Any reference sign in a claim should not be construed as limiting the claim. The word "comprising" does not exclude the presence of other elements or steps than those listed in a claim. The word "a" or "an" preceding an element or step does not exclude the presence of a plurality of such elements or steps.

Claims

CLAIMS:
1. A method of establishing the authenticity of a packaged good comprising the following steps: receiving from a client (1) a first code (Ci) identifying the good, receiving from the client (1) a second code ( ) identifying the packaging, and verifying a correlation between said first and said second code (Ci ; C2), the packaged good being authenticated if the first and the second code (d; C2) correlate with a pre-selected combination (Ii, I2, ...; Oi, O2, ...).
2. A method as claimed in claim 1, wherein verifying of the correlation comprises the steps of: using the first code (Q) as an input key (Ii, I2, ...) for a database query- resulting in an output key (Oi, O2, ...) from the database (5), comparing said output key (Oi, O2, ...) with the second code (C2), the correlation being established if the output key (Oi, O2, ...) matches with the second code (C2).
3. A method as claimed in to claim 2, further comprising a step of providing said input key (Ii, I2, ...) and/or said output key (Oi, O2, ...) with flags (Fi, F2, ...) in the database (5) when the correlation has been established.
4. A method as claimed in to claim 3, wherein the authenticity of the packaged good is invalidated upon reception a first code (Ci) corresponding to an input key (Ii, I2, ...) in the database (5) provided with a flag (Fi, F2, ...) and/or reception of a second code (C2) corresponding to an output key in the database provided with a flag (Fi, F2, ...).
5. A method as claimed in claim 1, 2, or 3, further comprising a step of providing the client (1) with a verification code (Ni, V2, ...) upon authenticating the packaged good, enabling a further verification of the authenticity upon reception from the client of the first code (Ci), the second code (C2), and the verification code (Vi, N2, ...).
6. A method as claimed in claim 1, 2, or 3, further comprising a step of providing the client (1) with a certificate comprising the first and the second code (d, C2, ...) and/or a statement relating to the authenticity of the packaged good.
7. A method as claimed in to claim 1, 2, or 3, wherein verifying of the correlation comprises a step of looking up the pair of the first code (Ci) and the second code (C2) in a list (4).
8. A system for authenticating a packaged good comprising: receiving means for receiving from a client a first code identifying the good and a second code identifying the packaging, and a database management system for verifying a correlation between said first and said second code, the packaged good being authenticated if the first and the second code correlate with a pre-selected combination.
9. A system as claimed in to claim 8, wherein the system comprises a device coupled to the internet, comprises a device coupled to a telephone, or comprises a customer service entity.
PCT/IB2002/004358 2001-10-25 2002-10-17 Method and system for authenticating a packaged good WO2003036556A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2003538972A JP2005517323A (en) 2001-10-25 2002-10-17 Method and system for authenticating packaged goods
EP02775133A EP1509887A2 (en) 2001-10-25 2002-10-17 Method and system for authenticating a packaged good
US10/493,173 US20040267711A1 (en) 2001-10-25 2002-10-17 Method and system for authenticating a package good
KR10-2004-7006041A KR20040044555A (en) 2001-10-25 2002-10-17 Method and system for authenticating a packaged good
AU2002341319A AU2002341319A1 (en) 2001-10-25 2002-10-17 Method and system for authenticating a packaged good

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP01204085 2001-10-25
EP01204085.3 2001-10-25

Publications (2)

Publication Number Publication Date
WO2003036556A2 true WO2003036556A2 (en) 2003-05-01
WO2003036556A3 WO2003036556A3 (en) 2004-12-29

Family

ID=8181143

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2002/004358 WO2003036556A2 (en) 2001-10-25 2002-10-17 Method and system for authenticating a packaged good

Country Status (7)

Country Link
US (1) US20040267711A1 (en)
EP (1) EP1509887A2 (en)
JP (1) JP2005517323A (en)
KR (1) KR20040044555A (en)
CN (1) CN1606763A (en)
AU (1) AU2002341319A1 (en)
WO (1) WO2003036556A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008056105A1 (en) * 2006-11-07 2008-05-15 Claricom Limited Verification method
WO2010079465A2 (en) * 2009-01-07 2010-07-15 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7752137B2 (en) * 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
EP1727096A1 (en) * 2005-05-23 2006-11-29 Philippe Marneth Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor
WO2006125757A1 (en) * 2005-05-23 2006-11-30 Fabian Leroo Information security method and system for deterring counterfeiting of articles.
GB0622164D0 (en) * 2006-11-07 2006-12-20 Claricom Ltd Verification method
GB0710467D0 (en) * 2007-06-01 2007-07-11 Simons Bright A Universal unique product authentication protocol & supply chain validation system
TWI407360B (en) * 2009-09-23 2013-09-01 Egalax Empia Technology Inc Method and device for position detection
US8839459B2 (en) 2010-09-22 2014-09-16 Qualcomm Incorporated Product authentication using end-to-end cryptographic scheme

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
WO1999004364A1 (en) * 1997-07-21 1999-01-28 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles
WO2001015097A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Method for product assurance
WO2001020604A1 (en) * 1999-09-14 2001-03-22 Martyn Eric Levett Data storage apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5128520A (en) * 1989-08-11 1992-07-07 Spectra-Physics, Inc. Scanner with coupon validation
US6055509A (en) * 1997-02-11 2000-04-25 Ken R. Powell System and method for transferring identification information between portable cards in a computerized retail store having communication among a plurality of computers

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
WO1999004364A1 (en) * 1997-07-21 1999-01-28 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles
WO2001015097A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Method for product assurance
WO2001020604A1 (en) * 1999-09-14 2001-03-22 Martyn Eric Levett Data storage apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008056105A1 (en) * 2006-11-07 2008-05-15 Claricom Limited Verification method
WO2010079465A2 (en) * 2009-01-07 2010-07-15 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer
WO2010079465A3 (en) * 2009-01-07 2011-05-05 Ashish Anand Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer

Also Published As

Publication number Publication date
KR20040044555A (en) 2004-05-28
JP2005517323A (en) 2005-06-09
CN1606763A (en) 2005-04-13
EP1509887A2 (en) 2005-03-02
WO2003036556A3 (en) 2004-12-29
US20040267711A1 (en) 2004-12-30
AU2002341319A1 (en) 2003-05-06

Similar Documents

Publication Publication Date Title
KR101637868B1 (en) Financial institution document verification system that is based on the block chain
CN1172224C (en) Method and device for authenticating a program code
WO2015118519A1 (en) System for authenticating items
US20070179978A1 (en) Systems and methods for anti-counterfeit authentication
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
US20090319797A1 (en) Method and computer system for ensuring authenticity of an electronic transaction
CN1998019A (en) System and method for securely authorizing and distributing stored-value card data
KR102058159B1 (en) Method and program for managing goods transaction using activation code
CZ11597A3 (en) Method of safe use of digital designation in a commercial coding system
EA011327B1 (en) Methods and system for making, tracking and authentication of products
EA006395B1 (en) System and method for secure credit and debit card transactions
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
CN110232574A (en) Product Validation method, apparatus, equipment and storage medium based on block chain
US20010053949A1 (en) Secure tracking of articles
US20040267711A1 (en) Method and system for authenticating a package good
WO2005083644A1 (en) Method and system for verifying the authenticity of goods
WO2006100581A2 (en) System and method for the analysis of security strings to be associated to goods such as products or services
JP2009211448A (en) Product certification system
CN112488261B (en) Method and system for identifying authenticity of article based on information storage of blockchain
CN115622703A (en) Static code sending and checking method, equipment and storage medium
JP6963872B1 (en) Currency management system
RU2223544C1 (en) System for identifying marked product and device for verifying genuineness of mark
CN111737707B (en) Block chain based verification package generation and verification method, server and electronic equipment
CN115002074B (en) Information acquisition method, device, equipment and storage medium
RU24744U1 (en) SYSTEM OF IDENTIFICATION OF OBJECTS WITH IDENTIFIER AND DEVICE FOR CHECKING THE AUTHENTICITY OF THE IDENTIFIER

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003538972

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2002775133

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10493173

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 20028211871

Country of ref document: CN

Ref document number: 1020047006041

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 2002775133

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2002775133

Country of ref document: EP