WO2005083644A1 - Method and system for verifying the authenticity of goods - Google Patents

Method and system for verifying the authenticity of goods Download PDF

Info

Publication number
WO2005083644A1
WO2005083644A1 PCT/NL2004/000156 NL2004000156W WO2005083644A1 WO 2005083644 A1 WO2005083644 A1 WO 2005083644A1 NL 2004000156 W NL2004000156 W NL 2004000156W WO 2005083644 A1 WO2005083644 A1 WO 2005083644A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
code
exposable
authenticity
authentication server
Prior art date
Application number
PCT/NL2004/000156
Other languages
French (fr)
Inventor
Jeroen Mayers
Bernardus Johannes Paulus Kleinherenbrink
Original Assignee
Stikker.Com Bv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stikker.Com Bv filed Critical Stikker.Com Bv
Priority to PCT/NL2004/000156 priority Critical patent/WO2005083644A1/en
Publication of WO2005083644A1 publication Critical patent/WO2005083644A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Definitions

  • the invention relates to a method and system for verifying the authenticity of goods.
  • a considerable need has been recognized for anti-counterfeiting methods and systems for use on a variety of articles or goods. Many of these methods and systems rely on special product features.
  • an approach wherein the complexity of features goods is increased will only work for a limited period of time, as the large profits from counterfeiting gives counterfeiters access to advanced resources.
  • complex features are not always appreciated by customers and may require advanced education or knowledge of these customers. Further, such an approach raises manufacturing costs.
  • Authenticity of products is particularly relevant for valuable items, items with a reputation of qual- ity or products for which the quality is critical. Examples of such goods comprise jewellery, proprietary products, pharmaceutical products or spare parts for e.g. cars.
  • WO 99/04364 discloses a method and system for verifying the authenticity of goods by marking these goods with random numbers and providing users with access to a database with codes of authentic goods. Comparing means are provided to compare the random number of a good with the codes in the da- tabase in order to verify the authenticity of the goods. If the database indicates that the code has previously been used, it is indicated to the user that the code is a duplicate, being evidence of illegal counterfeiting.
  • a disadvantage of this method and system is, inter alia, that such an approach still allows counterfeiting.
  • the numbers attached to the goods may e.g. be copied from the products and attached to counterfeited goods.
  • This object is achieved by providing a method for verifying the authenticity of one or more goods, each good having at least one associated user-exposable code, in a system comprising at least one authentication server at least arranged to have access to unique codes for authentic goods and to verify said user-exposable code, and at least one user device connectable to said authentication server via a data transmission network, comprising the steps of: receiving one or more data-strings comprising said user- exposable code and an exposure state of said user- exposable code at said authentication server; determining the authenticity of said good in dependence on said user-exposable code and said exposure state.
  • This object is further achieved by providing a system for verifying the authenticity of one or more goods, each having at least one associated user-exposable code, comprising at least one authentication server arranged to have access to unique codes for authentic goods and to verify said user- exposable code and at least one user device connectable to said authentication server via a data transmission network, said authentication server being arranged to determine the authenticity of said good in dependence on said user-exposable code and said exposure state .
  • the method comprises the steps of: if said user-exposable code does not match with said unique codes, transmitting at least a first non- authenticity message to said user device; or else, determining whether said user-exposable code has previously been received; and, if said user-exposable code has not previously been received, transmitting a first authenticity message to said user device; or else, providing a query on said user device relating to said exposure state; receiving in response to said query said one or more data-strings comprising said exposure state at said au- thentication server; transmitting a second non-authenticity message or a second authenticity message to said user device, depending on said exposure state.
  • the exposure state may also relate to other characteristics of the code, e.g. the environmental circumstances wherein the code is readable. It may e.g. be so that after exposure of the code, the code becomes unreadable after a particular period of time and may only be made visible once more by heating the label. In such a case, the exposure state relates to how the code was made visible again. It is noted that the method and system for verifying the authenticity of goods may be combined with other measures to distinguish counterfeited and authentic goods.
  • the invention further relates to a computer program product with computer executable code portions for performing the method and to an authentication server arranged to perform this method.
  • Some further embodiments of the invention are presented in the dependent claims and described in more detail below.
  • the invention will be further illustrated with reference to the attached drawings, which schematically show a preferred embodiment according to the invention. It will be understood that the invention is not in any way restricted to this specific and preferred embodiment.
  • Figs. 1A and IB respectively show a good with a non- exposed code and an exposed code
  • Fig. 2 shows a system for verifying the authenticity of goods according to an embodiment of the invention
  • Fig. 3 shows a flow chart for a part of the method for verifying the authenticity of goods according to an embodiment of the invention.
  • Figs. 1A and IB respectively show a good with a non- exposed code and an exposed code
  • Fig. 2 shows a system for verifying the authenticity of goods according to an embodiment of the invention
  • Fig. 3 shows a flow chart for a part of
  • the good 1A and IB show a good, article, product or item 1, such as jewellery, a mobile phone, a theatre ticket or a pharmaceutical product.
  • the good 1 has an associated user- exposable code 2, that is covered by a code cover 3 in Fig. 1A and exposed, i.e. the cover is removed, in Fig. IB.
  • the cover may e.g. be removed by peeling off the cover or by scratching it away.
  • the cover 3 cannot easily be reattached over the code 2.
  • the code may be attached to the product in various ways, such as by means of labels, tags or stickers.
  • the code 2 may be applied directly to the product, e.g. by printing or engraving, thereby reducing the chance that the good 1 and code 2 are separated.
  • the good 1 may have multiple codes 2 that are e.g. applied on top of each other, such that only a single code cover 3 is required.
  • the codes 2 may e.g. be applied on stickers that can be removed by different users in a distribution chain in order to verify the authenticity of the good 1.
  • the label, tag, sticker or good itself further comprises an address 4 for verifying the authenticity over a data transmission network as will be described below.
  • the label, tag, sticker or good itself may further comprise information on the manner in which one should proceed to verify the au- thenticity. The user should e.g. be prompted to remove the code cover 3.
  • Fig. 2 shows a system 10 for verifying the authenticity of one or more goods 1, wherein each good 1 has at least one user-exposable code 2, as was shown in Figs 1A and IB.
  • the system 10 comprises a data transmission network 11 comprising a wired data transmission network 11A, such as e.g. the internet, and a wireless data transmission network 11B that is communicatively connected to the wired network 11A via a gateway 12.
  • the system 10 comprises a first user device 13, e.g. a computer arrangement, and a second user device 14, e.g. a mobile phone.
  • the system 10 comprises an authentication server 15 communicatively connected with network 11 and having access to a database 16, comparing means 17, a counter 18 and a query generator 19.
  • the database 16 comprises unique codes identifying authentic goods 1. Measures are taken to avoid hacking of the database 16.
  • the operation of the system 10 displayed in Fig. 2 is described with reference to Fig. 3 illustrating an embodiment of the method for verifying the authenticity of goods 1 according to the invention.
  • a data-string is received from the user device 14 over the data transmission network 11 at the authentication server 15.
  • the data-string comprises the user-exposable code 2, e.g. 12345 67890 00141, of the good 1.
  • the code preferably has over ten positions to enhance the scalability of the method and system and to minimize chances of guessing correct codes.
  • al- phanumeric codes which is a preferred embodiment of the invention.
  • the user may check the authenticity of the good 1 at the purchase point.
  • the code is entered on a web page with the address pro- vided on or with the good 1 and is e.g. a URL.
  • a URL is always unique and cannot therefore reasonably be duplicated thereby enhancing the safety of the system.
  • the authentication server 15 may provide a confirmation query at the user device 14 to check whether the code entered by the user is correct. If the code is incorrect, the user is requested to enter the correct code; else the user confirms that he entered the correct code and the method proceeds to 23. This confirmation procedure reduces the chance of incorrect assessment of the authenticity of the good 1.
  • the comparing means 17 of the authentication server 15 compares the received code 2 with the unique codes for authentic goods 1 in the database 16. If the received code 2 does not match a unique code of the database 16, a first non-authenticity message 24 is transmitted to the user device 14. Accordingly it is determined that the good 1 is not authentic. Subsequently further information can be gathered on the good 1 at 25, e.g. by transmitting further queries to the user device 14, to identify and flag a counterfeit at 26. This further information provides valuable intelligence of these illegal activity. If the received code 2 matches with a unique code for an authentic good 1 of the database 16, in 27 it is determined whether the code 2 was received previously. If the code 2 is received for the first time, a first authenticity message 28 is transmitted to the user device 14.
  • the good 1 to which the code 2 is associated is an authentic good.
  • the query generator 19 may provide a query 30 relating to the exposure state of the user-exposable code 2.
  • the query may e.g. read: "did you expose this code yourself?" .
  • If the response to the query 30 is negative (“no") an authenticity message 31 is transmitted to the user device 14.
  • the authenticity message 31 may e.g. read: "This product is probably genuine” .
  • alternative verification may be applied, wherein the user may be guided through the alternative verification route.
  • the label or tag may comprise unique other features to which the user can be pointed and queried. The user may e.g.
  • a non-authenticity message 34 is transmitted to the user de- vice 14.
  • the non-authenticity message 34 may e.g. read: "This product is probably fake”. In such a case the code 2 may e.g. have been copied or covered again.
  • further information can be gathered on the good 1 at 35, e.g. by transmitting further queries to the user device 14, to iden- tify and flag a counterfeit at 36. This further information provides valuable intelligence of these illegal activity.
  • a further step is the provision of the counter 18 allowing not only the determination of whether the code 2 was previously received but also the determination of the actual number of times the code 2 was received.
  • the method may thus further involve the definition of a threshold for the number of times a code is received and performing an appropriate action is such a threshold is achieved or exceeded. If e.g. the code 2 of a good 1 is received more than three times at the authentication server 15, the alternative verification 32 may be more detailed.
  • Another modification of the method involves the input at the user device 13, 14 and receipt of the user-exposable code 2 as well as the exposure state at the authentication server 15 in step 21, i.e.
  • the query 30 is made independent of the fact whether the code 2 was received before. In this case only a single input, involving both the code 2 and the exposure state, is necessary at the user device 13, 14. Other modifications or combinations of steps can be envisaged as well.
  • the system provides a source for valuable information on both legal and illegal activities. The system establishes a direct contact with the end-user of the good 1 which can be valuable for other commercial purposes, such as advertising or updates. Illegal goods can be traced.

Abstract

The invention relates to a method and system for verifying the authenticity of one or more goods (1), each good (1) having at least one associated user-exposable code (2). The system comprises at least one authentication server (15) arranged to have access to unique codes for authentic goods and to verify said user-exposable code (2). A user device (13,14) is connected to said authentication server (15) via a data transmission network (11). A user of a user device (13,14) may transmit the user-exposable code (2) and an exposure state of said user-exposable code (2) to said authentication server (15). The authentication server (15) is arranged to determine the authenticity of said good (1) in dependence on said user-exposable code (2) and said exposure state. By considering the exposure state of the user-exposable code (2), counterfeit goods are more reliably identified.

Description

Method and system for verifying the authenticity of goods
The invention relates to a method and system for verifying the authenticity of goods. In recent years, a considerable need has been recognized for anti-counterfeiting methods and systems for use on a variety of articles or goods. Many of these methods and systems rely on special product features. However, an approach wherein the complexity of features goods is increased will only work for a limited period of time, as the large profits from counterfeiting gives counterfeiters access to advanced resources. Moreover, complex features are not always appreciated by customers and may require advanced education or knowledge of these customers. Further, such an approach raises manufacturing costs. Authenticity of products is particularly relevant for valuable items, items with a reputation of qual- ity or products for which the quality is critical. Examples of such goods comprise jewellery, proprietary products, pharmaceutical products or spare parts for e.g. cars. Further such methods and systems may be useful for products with a weak distribution control. WO 99/04364 discloses a method and system for verifying the authenticity of goods by marking these goods with random numbers and providing users with access to a database with codes of authentic goods. Comparing means are provided to compare the random number of a good with the codes in the da- tabase in order to verify the authenticity of the goods. If the database indicates that the code has previously been used, it is indicated to the user that the code is a duplicate, being evidence of illegal counterfeiting. A disadvantage of this method and system is, inter alia, that such an approach still allows counterfeiting. The numbers attached to the goods may e.g. be copied from the products and attached to counterfeited goods. If the copied number is verified at the database before the original number, the consumer of the original good is wrongly informed that his good is forged if he checks the authenticity afterwards. If bar codes are used, the consumer needs a scanner or code reader to verify the authenticity of the goods. It is an object of the invention to provide an improved method and system for verifying the authenticity of goods . This object is achieved by providing a method for verifying the authenticity of one or more goods, each good having at least one associated user-exposable code, in a system comprising at least one authentication server at least arranged to have access to unique codes for authentic goods and to verify said user-exposable code, and at least one user device connectable to said authentication server via a data transmission network, comprising the steps of: receiving one or more data-strings comprising said user- exposable code and an exposure state of said user- exposable code at said authentication server; determining the authenticity of said good in dependence on said user-exposable code and said exposure state. This object is further achieved by providing a system for verifying the authenticity of one or more goods, each having at least one associated user-exposable code, comprising at least one authentication server arranged to have access to unique codes for authentic goods and to verify said user- exposable code and at least one user device connectable to said authentication server via a data transmission network, said authentication server being arranged to determine the authenticity of said good in dependence on said user-exposable code and said exposure state . By providing the goods with non-exposed codes that can be exposed by the user or consumer of the goods, chances of illegal copying of codes in stores or at other stages in the production and distribution process, are significantly reduced. Further by considering the exposure state of the code in the authenticity verification process, chances of abuse are further reduced. The user can establish the authenticity of the good prior to using it. The system is self-explanatory and therefore simple for the user. In a particularly advantageous embodiment of the invention, the method comprises the steps of: if said user-exposable code does not match with said unique codes, transmitting at least a first non- authenticity message to said user device; or else, determining whether said user-exposable code has previously been received; and, if said user-exposable code has not previously been received, transmitting a first authenticity message to said user device; or else, providing a query on said user device relating to said exposure state; receiving in response to said query said one or more data-strings comprising said exposure state at said au- thentication server; transmitting a second non-authenticity message or a second authenticity message to said user device, depending on said exposure state. Contrary to the prior art, the fact that a code was previously used does not necessarily result in a non- authenticity message. Instead a further query is presented to the user to establish the exposure state, e.g. evaluating whether the originally non-exposed code was exposed by the user himself. If the user did expose the code himself while the code has already been received and/or checked, there is a good chance counterfeiters have exposed original codes and covered these or copied codes again, indicating that a forged article is at stake. In this case a non-authenticity message reading e.g. "this product is probably fake" or "this code is suspect" is presented to the user. If the good of the user has attached an already exposed code, probably a genuine product is resold. Accordingly an authenticity message is presented to the user, reading e.g. "this product is probably genuine". It should be appreciated that the order of the steps is irrele- vant as long as this effect is achieved. The exposure state may also relate to other characteristics of the code, e.g. the environmental circumstances wherein the code is readable. It may e.g. be so that after exposure of the code, the code becomes unreadable after a particular period of time and may only be made visible once more by heating the label. In such a case, the exposure state relates to how the code was made visible again. It is noted that the method and system for verifying the authenticity of goods may be combined with other measures to distinguish counterfeited and authentic goods. The invention further relates to a computer program product with computer executable code portions for performing the method and to an authentication server arranged to perform this method. Some further embodiments of the invention are presented in the dependent claims and described in more detail below. The invention will be further illustrated with reference to the attached drawings, which schematically show a preferred embodiment according to the invention. It will be understood that the invention is not in any way restricted to this specific and preferred embodiment. In the drawings : Figs. 1A and IB respectively show a good with a non- exposed code and an exposed code ; Fig. 2 shows a system for verifying the authenticity of goods according to an embodiment of the invention, and Fig. 3 shows a flow chart for a part of the method for verifying the authenticity of goods according to an embodiment of the invention. Figs. 1A and IB show a good, article, product or item 1, such as jewellery, a mobile phone, a theatre ticket or a pharmaceutical product. The good 1 has an associated user- exposable code 2, that is covered by a code cover 3 in Fig. 1A and exposed, i.e. the cover is removed, in Fig. IB. The cover may e.g. be removed by peeling off the cover or by scratching it away. Preferably, the cover 3 cannot easily be reattached over the code 2. The code may be attached to the product in various ways, such as by means of labels, tags or stickers. Alternatively the code 2 may be applied directly to the product, e.g. by printing or engraving, thereby reducing the chance that the good 1 and code 2 are separated. It is noted that the good 1 may have multiple codes 2 that are e.g. applied on top of each other, such that only a single code cover 3 is required. In that case the codes 2 may e.g. be applied on stickers that can be removed by different users in a distribution chain in order to verify the authenticity of the good 1. The label, tag, sticker or good itself further comprises an address 4 for verifying the authenticity over a data transmission network as will be described below. The label, tag, sticker or good itself may further comprise information on the manner in which one should proceed to verify the au- thenticity. The user should e.g. be prompted to remove the code cover 3. Codes 2 or batches of such codes can be sold to parties having interests in reducing counterfeiting in one or more markets, such a manufacturers of distributors of pharma- ceutical products. Fig. 2 shows a system 10 for verifying the authenticity of one or more goods 1, wherein each good 1 has at least one user-exposable code 2, as was shown in Figs 1A and IB. The system 10 comprises a data transmission network 11 comprising a wired data transmission network 11A, such as e.g. the internet, and a wireless data transmission network 11B that is communicatively connected to the wired network 11A via a gateway 12. The system 10 comprises a first user device 13, e.g. a computer arrangement, and a second user device 14, e.g. a mobile phone. Further the system 10 comprises an authentication server 15 communicatively connected with network 11 and having access to a database 16, comparing means 17, a counter 18 and a query generator 19. The database 16 comprises unique codes identifying authentic goods 1. Measures are taken to avoid hacking of the database 16. The operation of the system 10 displayed in Fig. 2 is described with reference to Fig. 3 illustrating an embodiment of the method for verifying the authenticity of goods 1 according to the invention. In 21 a data-string is received from the user device 14 over the data transmission network 11 at the authentication server 15. The data-string comprises the user-exposable code 2, e.g. 12345 67890 00141, of the good 1. The code preferably has over ten positions to enhance the scalability of the method and system and to minimize chances of guessing correct codes. This feature can be further enhanced by employing al- phanumeric codes, which is a preferred embodiment of the invention. As the code can be transmitted wirelessly, the user may check the authenticity of the good 1 at the purchase point. The code is entered on a web page with the address pro- vided on or with the good 1 and is e.g. a URL. A URL is always unique and cannot therefore reasonably be duplicated thereby enhancing the safety of the system. In 22, the authentication server 15 may provide a confirmation query at the user device 14 to check whether the code entered by the user is correct. If the code is incorrect, the user is requested to enter the correct code; else the user confirms that he entered the correct code and the method proceeds to 23. This confirmation procedure reduces the chance of incorrect assessment of the authenticity of the good 1. In 23 the comparing means 17 of the authentication server 15 compares the received code 2 with the unique codes for authentic goods 1 in the database 16. If the received code 2 does not match a unique code of the database 16, a first non-authenticity message 24 is transmitted to the user device 14. Accordingly it is determined that the good 1 is not authentic. Subsequently further information can be gathered on the good 1 at 25, e.g. by transmitting further queries to the user device 14, to identify and flag a counterfeit at 26. This further information provides valuable intelligence of these illegal activity. If the received code 2 matches with a unique code for an authentic good 1 of the database 16, in 27 it is determined whether the code 2 was received previously. If the code 2 is received for the first time, a first authenticity message 28 is transmitted to the user device 14. Accordingly it is established that the good 1 to which the code 2 is associated is an authentic good. In 29 further information can be provided for the user. If it is determined in 27 that the code 2 has been received previously, the query generator 19 may provide a query 30 relating to the exposure state of the user-exposable code 2. The query may e.g. read: "did you expose this code yourself?" . If the response to the query 30 is negative ("no") an authenticity message 31 is transmitted to the user device 14. The authenticity message 31 may e.g. read: "This product is probably genuine" . In 32 alternative verification may be applied, wherein the user may be guided through the alternative verification route. As an example, the label or tag may comprise unique other features to which the user can be pointed and queried. The user may e.g. be asked to provide information on certain characteristics of a hologram provided on the label . Again urther information can be provided to the user device 14 in 33. If the response to the query 30 is positive ("yes"), a non-authenticity message 34 is transmitted to the user de- vice 14. The non-authenticity message 34 may e.g. read: "This product is probably fake". In such a case the code 2 may e.g. have been copied or covered again. Subsequently further information can be gathered on the good 1 at 35, e.g. by transmitting further queries to the user device 14, to iden- tify and flag a counterfeit at 36. This further information provides valuable intelligence of these illegal activity. It should be appreciated that further steps may be added to the method or steps may be performed in a different sequence. An example of a further step is the provision of the counter 18 allowing not only the determination of whether the code 2 was previously received but also the determination of the actual number of times the code 2 was received. The method may thus further involve the definition of a threshold for the number of times a code is received and performing an appropriate action is such a threshold is achieved or exceeded. If e.g. the code 2 of a good 1 is received more than three times at the authentication server 15, the alternative verification 32 may be more detailed. Another modification of the method involves the input at the user device 13, 14 and receipt of the user-exposable code 2 as well as the exposure state at the authentication server 15 in step 21, i.e. the query 30 is made independent of the fact whether the code 2 was received before. In this case only a single input, involving both the code 2 and the exposure state, is necessary at the user device 13, 14. Other modifications or combinations of steps can be envisaged as well. The system provides a source for valuable information on both legal and illegal activities. The system establishes a direct contact with the end-user of the good 1 which can be valuable for other commercial purposes, such as advertising or updates. Illegal goods can be traced.

Claims

1. Method for verifying the authenticity of one or more goods (1) , each good (1) having at least one associated user-exposable code (2) , in a system (10) comprising at least one authentication server (15) at least arranged to have ac- cess to unique codes for authentic goods and to verify said user-exposable code (2), and at least one user device (13,14) connectable to said authentication server (15) via a data transmission network (11), comprising the steps of: receiving one or more data-strings comprising said user- exposable code (2) and an exposure state of said user- exposable code (2) at said authentication server (15) ; determining the authenticity of said good (1) in dependence on said user-exposable code (2) and said exposure state .
2. Method according to claim 1, comprising the steps of: if said user-exposable code (2) does not match with said unique codes, transmitting at least a first non- authenticity message (24) to said user device (13,14); - or else, determining (27) whether said user-exposable code (2) has previously been received; and, if said user-exposable code has not previously been received, transmitting a first authenticity message (28) to said user device (13,14); - or else, providing a query (30) on said user device (13,14) relating to said exposure state; receiving in response to said query (30) one or more of said data-strings comprising said exposure state at said authentication server; - transmitting a second authenticity message (31) or a second non-authenticity message (34) to said user device (13,14), depending on said exposure state.
3. Method according to claim 1 or 2 , wherein said query (30) evaluates whether said user-exposable code (2) was exposed by the user of said good (1) and, if a positive response is received, transmitting said second non-authenticity message (34) , or else, transmitting said second authenticity message (31) .
4. Method according to one or more of the preceding claims, wherein said method further comprises the step of counting the number of times said user-exposable code (2) is received.
5. Method according to claim 4, wherein a threshold is defined for the number of times said user-exposable code (2) is received and, if said threshold is reached or exceeded, one or more alternative verification steps (32) are triggered.
6. Method according to one or more of the preceding claims, wherein said method further comprises the steps of: - providing a confirmation query (22) on said user device (13,14) relating to the correctness of said received user-exposable code (2); checking (23) said user-exposable code (2) against said unique codes only after receiving a confirmation message from said user device (13,14) confirming the correctness of said user-exposable code (2) .
7. Method according to one or more of the preceding claims, wherein said good (1) further comprises an access address of said authentication server (15) , enabling a user to verify the authenticity of said good (1) over said data transmission network (11) .
8. Method according to one or more of the preceding claims, wherein a plurality of codes (2) is associated with said good (1) and said authentication server (15) receives said codes (2) from a plurality of users in a distribution channel and compares said codes (2) with said unique codes.
9. Method according to one or more of the preceding claims, wherein said users expose said one or more user- exposable codes (2) by peeling off or scratching away a code cover (3) .
10. Method according to one or more of the preceding claims, wherein said non-authenticity messages (24,34) and/or said authenticity messages (28,31) are accompanied by or followed by further information for said user device (13,14) or a user of said user device (13,14) .
11. Method according to one or more of the preceding claims, wherein one or more of said queries (22,30) and/or messages (24,28,31,34) are transmitted or received at least partly over a wireless data transmission network (11B) .
12. Computer program product for verifying the authenticity of one or more goods (1) , each good (1) having at least one associated user-exposable code (2), in a system (10) comprising at least one authentication server (15) at least arranged to have access to unique codes for authentic goods and to verify said user-exposable code (2) , and at least one user device (13,14) connectable to said authentication server (15) via a data transmission network (11) , at least including computer executable code portions for: receiving one or more data-strings comprising said user- exposable code (2) and an exposure state of said user- exposable code (2) at said authentication server (15); - determining the authenticity of said good (1) in dependence on said user-exposable code (2) and said exposure state .
13. Computer program product according to claim 12, further comprising software code portions for performing the method of at least one of the claims 2-6, 8 and 10.
14. System (10) for verifying the authenticity of one or more goods (1), each good (1) having at least one associated user-exposable code (2) , comprising at least one authentication server (15) arranged to have access to unique codes for authentic goods and to verify said user-exposable code (2) and at least one user device (13,14) connectable to said authentication server (15) via a data transmission network (11) , said authentication server (15) being arranged to determine the authenticity of said good (1) in dependence on said user-exposable code (2) and said exposure state.
15. System according to claim 14, wherein said system (10) further comprises a query generator (19) for providing a query (30) on said user device (13,14) relating to the exposure state of said user-exposable code (2) .
16. Authentication server (15) for verifying the authenticity of one or more goods (1) , each good (1) having at least one associated user-exposable code (2) , said authentication server (15) being arranged to: receive one or more data-strings comprising said user- exposable code (2) and an exposure state of said user- exposable code (2) , and - determine the authenticity of said good (1) in dependence on said user-exposable code (2) and said exposure state.
17. Authentication server (15) according to claim 16, wherein said authentication server (15) further comprises a query generator (19) arranged to provide a query (30) to said user device (13,14) relating to said exposure state of said user-exposable code (2) .
18. Authentication server (15) according to claim 16 or 17, wherein said authentication server (15) is further arranged to transmit authenticity messages (28,31) and non- authenticity messages (24,34) to said user device (13,14).
PCT/NL2004/000156 2004-03-02 2004-03-02 Method and system for verifying the authenticity of goods WO2005083644A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/NL2004/000156 WO2005083644A1 (en) 2004-03-02 2004-03-02 Method and system for verifying the authenticity of goods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/NL2004/000156 WO2005083644A1 (en) 2004-03-02 2004-03-02 Method and system for verifying the authenticity of goods

Publications (1)

Publication Number Publication Date
WO2005083644A1 true WO2005083644A1 (en) 2005-09-09

Family

ID=34910132

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NL2004/000156 WO2005083644A1 (en) 2004-03-02 2004-03-02 Method and system for verifying the authenticity of goods

Country Status (1)

Country Link
WO (1) WO2005083644A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1837813A1 (en) * 2006-03-15 2007-09-26 Sap Ag System and method for verification of identifiers
FR2900486A1 (en) * 2006-04-28 2007-11-02 Hafshejani Abdollah Sadeghi Original product or detached part individualizing method for Internet, involves associating confidential code and identifying codes in database on server connected to Internet, and verifying authenticity of product via connection to server
WO2008056105A1 (en) * 2006-11-07 2008-05-15 Claricom Limited Verification method
WO2008136785A1 (en) * 2007-05-07 2008-11-13 Volodymyr Volodymyrovych Kolmychek Method for protecting goods with the aid of a mobile code system
EP2003607A1 (en) * 2007-05-23 2008-12-17 CERTILOGO S.p.A. System and computer process for checking and monitoring the circulation of products and services
EP2104067A1 (en) * 2008-03-17 2009-09-23 Philip Morris Products S.A. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US7752137B2 (en) 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
US8615470B2 (en) 2003-11-03 2013-12-24 Verify Brand Authentication and tracking system
US10579889B2 (en) 2015-08-25 2020-03-03 Inexto Sa Verification with error tolerance for secure product identifiers
US10587403B2 (en) 2015-08-13 2020-03-10 Inexto Sa Enhanced obfuscation or randomization for secure product identification and verification
US10594494B2 (en) 2015-08-25 2020-03-17 Inexto Sa Multiple authorization modules for secure production and verification
US10607181B2 (en) 2012-12-17 2020-03-31 Inexto Sa Method and apparatus for storage of data for tracking manufactured items
US10680826B2 (en) 2015-01-31 2020-06-09 Inexto Sa Secure product identification and verification
US10984370B2 (en) 2015-01-28 2021-04-20 Inexto Sa Method and apparatus for unit and container identification and tracking
CN113592407A (en) * 2021-08-10 2021-11-02 深圳职业技术学院 Commodity selling and distributing method and system
US11797512B2 (en) 2009-12-22 2023-10-24 Philip Morris Usa Inc. Method and apparatus for storage of data for manufactured items

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
US5768384A (en) * 1996-03-28 1998-06-16 Pitney Bowes Inc. System for identifying authenticating and tracking manufactured articles
WO1999004364A1 (en) * 1997-07-21 1999-01-28 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
US5768384A (en) * 1996-03-28 1998-06-16 Pitney Bowes Inc. System for identifying authenticating and tracking manufactured articles
WO1999004364A1 (en) * 1997-07-21 1999-01-28 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7996319B2 (en) 2003-11-03 2011-08-09 Verify Brand Llc Authentication and tracking system
US8615470B2 (en) 2003-11-03 2013-12-24 Verify Brand Authentication and tracking system
US7752137B2 (en) 2003-11-03 2010-07-06 Meyers Printing Company Authentication and tracking system
US8280817B2 (en) 2003-11-03 2012-10-02 Verify Brand Llc Authentication and tracking system
US7917443B2 (en) 2003-11-03 2011-03-29 Verify Brand Llc Authentication and tracking system
EP1837813A1 (en) * 2006-03-15 2007-09-26 Sap Ag System and method for verification of identifiers
FR2900486A1 (en) * 2006-04-28 2007-11-02 Hafshejani Abdollah Sadeghi Original product or detached part individualizing method for Internet, involves associating confidential code and identifying codes in database on server connected to Internet, and verifying authenticity of product via connection to server
WO2008056105A1 (en) * 2006-11-07 2008-05-15 Claricom Limited Verification method
WO2008136785A1 (en) * 2007-05-07 2008-11-13 Volodymyr Volodymyrovych Kolmychek Method for protecting goods with the aid of a mobile code system
EP2003607A1 (en) * 2007-05-23 2008-12-17 CERTILOGO S.p.A. System and computer process for checking and monitoring the circulation of products and services
EA021132B1 (en) * 2008-03-17 2015-04-30 Филип Моррис Продактс С.А. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US11120387B2 (en) 2008-03-17 2021-09-14 Philip Morris Usa Inc. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
WO2009115207A1 (en) * 2008-03-17 2009-09-24 Philip Morris Products S.A. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
EP2752800A1 (en) * 2008-03-17 2014-07-09 Philip Morris Products S.A. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
EP2104067A1 (en) * 2008-03-17 2009-09-23 Philip Morris Products S.A. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
CN101978385B (en) * 2008-03-17 2016-04-06 菲利普莫里斯生产公司 For identifying, verifying, follow the tracks of and follow the trail of the method and apparatus of manufactured items
US11710091B2 (en) 2008-03-17 2023-07-25 Philip Morris Usa Inc. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US11144863B2 (en) 2008-03-17 2021-10-12 Philip Morris Usa Inc. Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
CN101978385A (en) * 2008-03-17 2011-02-16 菲利普莫里斯生产公司 Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US11797512B2 (en) 2009-12-22 2023-10-24 Philip Morris Usa Inc. Method and apparatus for storage of data for manufactured items
US10607181B2 (en) 2012-12-17 2020-03-31 Inexto Sa Method and apparatus for storage of data for tracking manufactured items
US10984370B2 (en) 2015-01-28 2021-04-20 Inexto Sa Method and apparatus for unit and container identification and tracking
US10680826B2 (en) 2015-01-31 2020-06-09 Inexto Sa Secure product identification and verification
US10587403B2 (en) 2015-08-13 2020-03-10 Inexto Sa Enhanced obfuscation or randomization for secure product identification and verification
US10917245B2 (en) 2015-08-25 2021-02-09 Inexto Sa Multiple authorization modules for secure production and verification
US10594494B2 (en) 2015-08-25 2020-03-17 Inexto Sa Multiple authorization modules for secure production and verification
US10579889B2 (en) 2015-08-25 2020-03-03 Inexto Sa Verification with error tolerance for secure product identifiers
CN113592407A (en) * 2021-08-10 2021-11-02 深圳职业技术学院 Commodity selling and distributing method and system

Similar Documents

Publication Publication Date Title
US7996319B2 (en) Authentication and tracking system
US8615470B2 (en) Authentication and tracking system
US8352744B2 (en) Product authentication method
US10152720B2 (en) Authentication tags and systems for golf clubs
US7277601B2 (en) Remote authentication system
CN103093359B (en) Method and system for deterring product counterfeiting, diversion and piracy
WO2005083644A1 (en) Method and system for verifying the authenticity of goods
CN106897891B (en) Method and system for checking authenticity of commodity
US20080128496A1 (en) Method and apparatus for verification of items
US8872622B2 (en) Authentication of “source” for brands
CA2891654A1 (en) System for authenticating items
US20180240129A1 (en) Method and a system of electronic verification of reliability of goods introduced to the trade turnover and of transmission of data concerning the origin of goods
JP2006518073A (en) Product authentication system to prevent counterfeit goods from being marketed
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
JP2016522948A (en) Product authentication system and product authentication method
RU2199781C1 (en) Method for branding commodity, or part, or structure for its identification (alternatives) and system for identifying commodity, of part, or structure branded by this method (alternatives)
JP2017511548A (en) Product counterfeit prevention verification system
US20130024387A1 (en) Systems and Methods for Tracking Assigned Code Strings
JP2009524128A (en) Authentication method for products placed in circulation
US20130317996A1 (en) Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings
WO2014014401A2 (en) Authentication of a product
CN108985431B (en) Anti-counterfeit label and method for detecting and identifying genuine goods of registered trademark
CN103065244A (en) Two-dimensional barcode anti-counterfeiting, checking and service method
CN1283829A (en) Method for checking antiforge bar code of commodities over network
EP4242950A1 (en) A system and a computer-implemented method for detecting counterfeit items or items which have been produced illicitly

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC EPO FORM 1205A DATED 08.12.06

122 Ep: pct application non-entry in european phase