WO2006020989A2 - Procede et appareil de permettant de lutter contre les produits de contrefaçon via une interaction entre les consommateurs - Google Patents

Procede et appareil de permettant de lutter contre les produits de contrefaçon via une interaction entre les consommateurs Download PDF

Info

Publication number
WO2006020989A2
WO2006020989A2 PCT/US2005/029110 US2005029110W WO2006020989A2 WO 2006020989 A2 WO2006020989 A2 WO 2006020989A2 US 2005029110 W US2005029110 W US 2005029110W WO 2006020989 A2 WO2006020989 A2 WO 2006020989A2
Authority
WO
WIPO (PCT)
Prior art keywords
authenticating
product
password
authentication
devices
Prior art date
Application number
PCT/US2005/029110
Other languages
English (en)
Other versions
WO2006020989A3 (fr
Inventor
Timocin Hikmet Pervane
Ding-Ming Simon Poon
Lucia Hoi-Ning Mok
Lui Yen Henry Tan
Original Assignee
Authenta, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Authenta, Inc. filed Critical Authenta, Inc.
Publication of WO2006020989A2 publication Critical patent/WO2006020989A2/fr
Publication of WO2006020989A3 publication Critical patent/WO2006020989A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • This invention relates to the field of product authentication and anti- counterfeiting.
  • a method and system taught herein seeks to combat counterfeiting from another perspective: reducing demand for the counterfeit by implementing a social dynamic that discourages the customer himself or herself from buying or using counterfeits.
  • This approach is particularly suited for products in the high-end fashion and luxury goods markets, where the status of having the authorized original, trademarked (branded) product may prevail over the cost-savings available by purchasing a look-alike counterfeit, provided others know one has the real, trademarked product.
  • the method and apparatus taught herein provides a particularly easy-to-use tool for investigators, Customs inspectors and others to use to distinguish authentic from counterfeit goods, assuming that counterfeiters do not also counterfeit the employed apparatus. If a counterfeiter should counterfeit such apparatus, then in addition to incurring liability for trademark infringement and/or copyright or industrial design or design patent infringement, and counterfeiting, they also run the risk of utility patent infringement.
  • a device or devices embedded within the product allows one authentic product or a sensor employed by a Customs inspector or other investigator to sense when an or another authentic product is nearby and produce a signal noticeable to the user (and possibly surroundings) - a human perceivable signal - that indicates authenticity of the other product.
  • the presence of this signal indicates to each of the products or to the investigator's sensor that the other product is authentic.
  • Lack of receipt of a signal indicates that the product is counterfeit. This may be a private or a public notification. It is anticipated that this human-perceivable signaling, or fear of negative human- perceivable signaling, will lead to a reluctance by at least some customers and merchants to purchase, use and sell counterfeit products.
  • This methodology may also give rise to the development of an industry standard or certification for anti-counterfeiting. It is envisaged that equipping a particular product with this anti-counterfeiting system may increase the customer's trust in the product's authenticity and therefore create a preference to purchase it over another product that is not equipped with the system. This could be especially true with consumer products where there is a potential health risk from using counterfeits and in this case a societal benefit could also be realized. Market forces suggest that value could be created from the presence of a widely recognized anti-counterfeiting standard.
  • Value would be created for the consumer as he or she would gain information and need to learn to recognize only one standard way of signaling authenticity, value would be created for the product producers as they would be able to communicate the authenticity of their product to consumers and value would be created for the administrator of said standard. It is envisaged that the eventual implementation of the method and apparatus described herein could include the development and administration of such a standard.
  • apparatus for generating a corresponding non-human-perceivable signal and for communicating that signal via a channel such as the Internet or a radio link to a system that can process the signal to some advantage.
  • the invention provides a method for deterring the use of counterfeit products by product users by encouraging consumers to buy and use genuine, non-counterfeit products.
  • Such method comprises providing a product to be authenticated with a first authenticating device including an authentication data generator, a data transmitter for transmitting authentication data from the authentication data generator and a data receiver abilities for receiving authentication data transmissions from compatible second authenticating devices, operating the first authenticating device so as to identify when a compatible second authenticating device is in close proximity, thus authenticating the second authenticating device; and causing at least one of said first and second authenticating devices to signal to its respective user that it has authenticated another product.
  • a first authenticating device including an authentication data generator, a data transmitter for transmitting authentication data from the authentication data generator and a data receiver abilities for receiving authentication data transmissions from compatible second authenticating devices, operating the first authenticating device so as to identify when a compatible second authenticating device is in close proximity, thus authenticating the second authenticating device; and causing at least one of said first and second authenticating devices to signal to its respective user that
  • the transmitter may be wireless (i.e., radio) or optical (e.g., infrared) and preferably transmits the authentication data only over a short range.
  • the transmitter and receiver may be selected from among the group consisting of Bluetooth devices; IEEE 802.1 IA, B, and/or G devices; and other radio frequency devices.
  • the first authenticating device may, optionally, be operated so as to identify a compatible second authenticating device by comparing a password generated in the first authenticating device with a password received from the second authenticating device.
  • the authenticating devices also have other uses.
  • a method of limiting access to an event or area to users of only selected products comprising using an authenticating device to authenticate products and only allowing access to persons presenting an authenticated selected product, a product to be authenticated as a selected product having a transmitter which transmits authentication data, and the authentication device having a receiver for receiving authentication data transmitted by the product transmitter and a signaling device which signals validation to a user of the authentication device.
  • the received authentication data may be authenticated in the authentication device or outside of it, for example, via a private network.
  • the authentication data in this or the previous aspect includes a password which changes as a function of time.
  • the data transmitted between the authenticating devices may include one or more of a device-specific identifier, a manufacturer-specific identifier, customer information and a product interaction history.
  • the signal may be produced continuously while a receiver receives authentication data from another device or it may be produced for a predetermined interval after another device is authenticated.
  • At least one authenticating device may transmit a device-specific identifier and at least one other authenticating device may include a memory cache and each received authenticating device-specific identifier is stored for a set period of time within the cache to allow the device to determine whether an authenticating device within range is a new authenticating device or has been recently authenticated.
  • At least some of the authenticating devices can be set to act in different modes.
  • Transmit Mode an authenticating device is configured to enable the device to transmit its authentication data at a regular interval and receive authentication information or queries transmitted from other authenticating devices, and respond thereto.
  • Sleep Mode an authenticating device is configured to not transmit its authentication data but does receive authentication information transmitted or queries from other authentication devices, and to respond thereto.
  • a first authenticating device may be constructed so as to automatically switch to a mode wherein that device is configured to transmit its authentication data at a regular interval and to receive authentication information or queries transmitted from other authenticating devices, and respond, for a predetermined interval.
  • the invention includes a product authentication device comprising (1) an internal clock, (2) a password generator which generates a same password, common across all of said authenticating devices, using a password generation formula based on the time from said internal clock, (3) a transmitter, (4) a receiver, (5) a signaling device which can, when activated, emit a human-perceivable signal, and (6) a processor adapted to retrieve a password from the password generator, pass the password to the transmitter, receive a password from the receiver, and determine whether the received password is valid by comparing the received password with the retrieved password, and, if the received password is valid, activating the signaling device.
  • the device may further include a memory adapted to retain data from interactions between authenticated products.
  • the device may also include a switch operable to selectively cause all the device's elements to function except for the transmitter, for implementing a sleep mode.
  • the password generator may be external to the authentication device in some embodiments.
  • the device may further include memory which stores a device-specific identifier and wherein the transmitter is adapted to transmit the device-specific identifier as part of a transmission of authentication information.
  • the authentication device preferably is permanently embedded in the product as by sewing, gluing, encasing, etc., to make removal difficult. However, in some instances the authentication device may be separate from the product but attached thereto.
  • the human-perceivable signal emitted by the authenticating device may be provided in many forms or combinations of forms, including one or a combination of the following types of signals: visible signals, audible signals, tactile signals, olfactory signals, signals dependent on the sense of taste, signals made evident by temperature change and legible signals.
  • the invention provides a system for increasing attractiveness of non-counterfeit products to consumers comprising each such product including an authentication device as described above, whereby through interaction of said devices, products associated with those devices are authenticated to their users by human-perceivable signals when any two or more of said products are in close proximity to each other.
  • a method for deterring the use of counterfeit products and encouraging use of non-counterfeit products by product users comprising providing a product to be authenticated with a first authenticating wireless device which is able to send and receive data used to recognize compatible second authenticating devices, the first authenticating device identifying when a compatible second authenticating device is in close proximity; and the first authenticating devices signaling to its user that it has authenticated another product.
  • the first authenticating device may communicate received second product identification information to a database of stolen product identification numbers, so that appropriate action can be taken if the second product has been stolen.
  • the first authenticating device may be operated at at least one of a supply chain point, customs clearance location or retail store.
  • a still further aspect of the invention is an interrogator system comprising, in addition to the apparatus elements recited above, the following additional elements: a user interface on the AU adapted to allow the user to transmit a standard authentication password or a special code query requesting silent authentication, an input/output terminal adapted to allow the uploading of data from the device and allow the downloading of data to the device and allow the manipulation of data before or after uploading or downloading; a database adapted to store the data uploaded to the input/output terminal and to interface with other corporate databases such as those used for customer relationship management and with third party databases such as those used by customs agents or police forces.
  • the interrogator transmitter may have the ability to transmit a special code instructing an authentic second device to switch from a Full Off Mode to allow the authentic second device to transmit its authentication information to the interrogator.
  • the interrogator device or functionality may be incorporated within another device or system (for example, an airport security x-ray machine)
  • FIG. 1 is a diagram illustrating, in storyboard fashion, one way the inventive method and apparatus might typically be used
  • FIG. 2 is a block diagram illustrating an exemplary system incorporating various aspects of the invention.
  • FIG. 3 is a block diagram showing the components of one exemplary authenticating unit as taught herein, interacting with another such device.
  • substantially identical devices are implanted or placed in each product or type of product to be authenticated.
  • These devices which we call authentication units or AUs, have the ability to recognize and authenticate each other wirelessly within a short (possibly adjustable) range.
  • AUs authentication units
  • the lack of said signal is also noticeable and if a product user or others can see the other product, indicates to the user that the other product is counterfeit while indicating to bystanders that at least one of the products is counterfeit.
  • interrogator unit to authenticate goods and to identify counterfeits.
  • a customs inspector or commercial investigator can employ an AU (referred to herein as an "interrogator” unit) to authenticate goods and to identify counterfeits.
  • AU referred to herein as an "interrogator” unit
  • the mere advertisement of a product having obtained certification from the standard administrator may have the combined effect of discouraging would-be counterfeiters and allowing consumers to make an informed purchase by looking for the anti-counterfeiting apparatus' signal before making a purchase.
  • Fig. 1 depicts one way the inventive method and apparatus might be used, using a luxury handbag as an object to be authenticated.
  • luxury handbags (some costing thousands of dollars) are prominent targets for counterfeiting, and the manufacturer in the Fig. 1 scenario has chosen to use the inventive method and apparatus taught herein to dampen the market for counterfeit goods.
  • the panels of Fig. 1 are intended to illustrate the social dynamic that is introduced by the inventive method and apparatus, and illustrate its daily impact on customers.
  • Panel (A) of Fig. 1 illustrates that the customer is given confidence that he/she is purchasing genuine merchandise.
  • the example customer visits the store to purchase an article (i.e., a handbag in the example) and is confident that she is not buying a fake due to the presence of more than one AU-equipped handbags 40 and their consequent signaling of authenticity (here depicted as a warmly glowing logo 50).
  • Panel (B) of Fig. 1 illustrates the ability to implement a positive social dynamic in the sense of customer community building, and at the same time, the threat of a negative social dynamic if a counterfeit were used. Mrs.
  • Panel (C) of Fig. 1 illustrates that the inventive method and apparatus can be used across product lines and to contribute to a brand's expression of community and personality.
  • Mrs. Ainsworth's husband uses a genuine briefcase 52 that the manufacturer has equipped with a similar AU 54 and signal.
  • Mrs. Ainsworth places her handbag 40 next to her husband's briefcase 52 both signal authenticity for a few minutes. This is confirmation of the articles' authenticity and a pleasing effect for the customer.
  • the possibility of such a situation not occurring with a counterfeit handbag is motivation for potential customers not to purchase counterfeit merchandise as gifts. This is another aspect of the social dynamic.
  • Panel (D) of Fig. 1 illustrates the inventive method and apparatus' alignment with a typical luxury goods customer's needs.
  • Many luxury goods customers purchase luxury items as symbols of their own status. This visible representation of status is often a driving force behind the purchase of counterfeit luxury goods, as well.
  • Mr. and Mrs. Ainsworth meet new friends for dinner and both ladies are carrying AU-equipped handbags that signal authenticity.
  • This signaling of authenticity confirms each customer's status as a purchaser of genuine merchandise.
  • one of the ladies been using a counterfeit product that fact would have been immediately evident and likely would have destroyed any increase in status hoped to be gained by using the counterfeit item (whether she was aware of the situation or not). This possibility provides a disincentive to purchase counterfeit products.
  • Panel (E) of Fig. 1 illustrates the inventive method and apparatus exposing a counterfeit handbag.
  • Mrs. Ainsworth meets two friends for drinks after dinner and though all three are carrying handbags that seem to be from the same luxury brand, only two are genuine and therefore signal authenticity with their warmly glowing logos when their AU's interact.
  • the third ladies' bag does not signal authenticity, indicating that she has acquired a fake, likely causing her embarrassment.
  • the presence of the inventive method and apparatus in the real articles causes exposure of the counterfeit article and the corresponding negative social dynamic for its user. (See the discussion in following sections regarding security and anti-counterfeiting of the inventive method and apparatus itself.)
  • Panel (E) of Fig. 1 illustrates the inventive method and apparatus being used for the purposes of effectuating genuine customer identification and customer relationship enhancement.
  • Mrs. Ainsworth enters a store that has been equipped with an interrogator.
  • the interrogator authenticates Mrs. Ainsworth's genuine handbag and it signals that to the salespeople via its warmly glowing logo. She is then recognized as a valued high-end customer.
  • the social dynamic created by the inventive method and apparatus both enhances the customer's shopping experience and is a deterrent to the purchase of counterfeit merchandise. Should a customer enter the store with a counterfeit handbag, the interrogator would not authenticate the handbag and it would not signal authenticity.
  • FIG. 2 an exemplary system is illustrated wherein several AU devices interact with one or more of an interrogator, an input/output terminal, and a database. A detailed description of each of these aspects can be found below.
  • Fig. 3 an example is shown of an individual Authentication Unit device with the following components: Password Generator, Embedded Processor, Signaling Mechanism, Memory Storage, Power Source, Switch, Receiver/Transmitter, Motion-Sensitive Switch, and Central Administration Database. A detailed description of each of these components can be found below.
  • Password Generator Embedded Processor
  • Signaling Mechanism Memory Storage
  • Power Source Power Source
  • Switch Receiver/Transmitter
  • Motion-Sensitive Switch Motion-Sensitive Switch
  • Central Administration Database Central Administration Database
  • the AU device can be permanently or removably embedded in or attached to the product in a variety of ways. Preferably it is embedded or attached in such a way that removal is likely to damage the product unacceptably. For example, it may be glued into the product or affixed with rivets or sewn into a portion of the product.
  • An exemplary AU 300 consists of a few simple components, shown in the block diagram of Fig. 3 and detailed below:
  • a password generator 302 is used to generate a unique identifying number at predetermined intervals (e.g., every several minutes, days or weeks). Each password generator is synchronized with each other password generator (using a conventional synchronization mechanism, not shown) such that all password generators will be generating the same code at the same time (e.g., employing the same mechanism as an RSA SecurID token). For example, all the devices may run on the same clock-speed and at each distinct time, all devices preferably will generate the same random number based on a common preset password generation algorithm. The device then broadcasts this password to nearby products using the transmitter and receives the broadcast passwords from nearby devices using the receiver.
  • a conventional synchronization mechanism not shown
  • the password generator has its own internal long-term power supply to ensure continuous functionality and is encased in a tamper-resistant case (not shown) to combat reverse-engineering (just as with an RSA SecurID token, preferably most tampering with the case will cause a memory- wipe, rendering the password generator useless to would-be counterfeiters).
  • a tamper-resistant case not shown
  • Some timing drift is expected from the individual clocks over time, resulting in potentially unsynchronized passwords from different AUs.
  • This risk can be reduced in at least two ways: (1) increasing the time interval between password generation (e.g., to one week) to reduce the chances of a mismatch, and (2) allowing AU's to accept a defined number of cached historic passwords (e.g., the last one or two, depending on the time interval) to compensate for the foreseen timing drift.
  • a counterfeit product providing a valid password in it when it leaves the store
  • a counterfeit product having the ability to autonomously generate the right password at the right time.
  • the first threat is counteracted by having the password in a "real" AU change at some point or points in time.
  • a fairly sophisticated password sniffer would be needed in a counterfeit product to "steal" a password from an authentic product, and (unless the generation formula was stolen or reverse-engineered) password theft would also require complicit action from the counterfeit customer (such as stopping by the real store to sniff the password every day). But these steps are expensive and time-consuming, and therefore not a huge threat. If when designing for a specific product application a significant threat is "perceived,” other means may be employed to increase security.
  • a processor 304 performs several tasks, including control, security, clocking and internal processing.
  • Control Logic implemented by processor 304 compares the internally generated passwords with the password received from another device (which could be a current password or an historical password(s) embedded in the memory). If the passwords match, it then instructs a Signaling Mechanism 306 to signal authenticity. If the passwords do not match, it does not instruct the Signaling Mechanism to signal authenticity.
  • events may be logged in memory 308, with accompanying time stamps.
  • the processor may perform one more task, that of determining the tagged article (the one doing the interrogating) that recently had interacted with the interrogated article. This can be done, for example, by providing each AU with a device-specific identifier (e.g., burned into a read-only memory), and transmitting that identifier along with the password (though not necessarily one-for-one).
  • the identifier can be compared with a small cache of (most recently) authenticated device-specific identifiers. Authenticated device-specific identifiers preferably will only remain in the cache for a predetermined amount of time. Therefore, if a match is found in the memory, the processor would know that the two products had likely already interacted (and were still sitting next to each other) and would not instruct the Signaling Mechanism to signal authenticity a second time.
  • Security Logic 310 may be implemented by processor 304, for applications requiring high security.
  • the processor may also contain an encryption/decryption key to encrypt the password before it is transmitted, and to decrypt the password when it is received. This reduces the possibility of a correct password being obtained from the wireless transmission by a malignant third party.
  • the processor could also be housed in a (not shown) tamper-proof casing (which erases the encryption/decryption key code when opened), for further security.
  • Locking Logic 312 which may be implemented by processor 304, may include a clock-speed system capable of instructing the password generator 302 to generate a new password at a regular time interval, in a light security implementation. Optionally, it can also function as a timed-switch, in that it can instruct the AU to turn into "sleep mode" under programmable scenarios.
  • Internal Logic 31 typically implemented in processor 304, instructs the various components within the AU when and how to perform and how to interact with one another. Programming such logic is a matter of design choice well within the skills of an experienced programmer or software engineer.
  • Processor 304 is also, typically, at the heart of the signaling operation. Upon authenticating with a nearby device using a typical so-called "handshake" process and password comparison, which is essentially the mutual authentication of each other's transmitted passwords and is well-known in the data communications field, processor 304 will direct a signaling mechanism 316 to emit a human-perceivable signal, which can be in any form (e.g., glowing light, vibration, sonic tone, etc.) and can take any frequency (e.g., being visible or audible in a regular pattern such as every 10 seconds for a minute, or randomly).
  • a human-perceivable signal can be in any form (e.g., glowing light, vibration, sonic tone, etc.) and can take any frequency (e.g., being visible or audible in a regular pattern such as every 10 seconds for a minute, or randomly).
  • This signal could be personalized, such as, for example, by providing a switch or other mechanism by which the customer can select which of several available signals the user wants the device to emit.
  • a custom signaling mechanism can be designed for individual customers or groups of customers, to further personalize the product and increase exclusivity.
  • the AU may also be implemented with the ability to send a silent, non-visible (e.g., infra-red) or barely visible signal, for example, in responding to interrogator queries. This will permit an inspector in a store to perform an inventory or a customs inspector to check goods, without attracting attention.
  • a special interrogator may be employed, emitting a signal that is interpreted by the AU as such, and to which the AU responds with the aforementioned "silent" response which is reserved to that usage.
  • the AU may include a receiver to detect an inspection query (it may be a special, dedicated receiver) and a special transmitter or transmit mode that is activated only when an inspection query signal is detected.
  • the signal remains on so long as an authentic AU is within communication range.
  • the signal remains on for a predetermined period of time after an authentic AU is first authenticated, then does not signal again until a new AU is authenticated. Note that this requires a small memory cache to save the AU device-specific identifiers authenticated in a predetermined time interval (e.g., the last 10 minutes) and to permit determination of whether a detected AU is new or already authenticated.
  • a predetermined time interval e.g., the last 10 minutes
  • the user has the ability to turn the signal on or off, typically either through a control switch or by blocking the signal physically.
  • this could be a flap of leather that can be fastened over a luminous signal emitter. It should be noted, though, that an embodiment of this type may lessen the impact of the AU, as it would be possible to make a counterfeit with the signal blocker permanently in place.
  • Memory 308 or another memory is used, in part, to save relevant data with respect to the product being tagged (e.g., a device-specific identifier or product serial number) or the customer using the product (e.g., customer unique identification number, date of purchase, number of bags purchased, etc.).
  • the memory can be rewritable and adapted to contain changeable data such as the customer's recent purchase records, historical passwords generated, etc. or it can be non-rewritable and contain permanent data such as a product serial number or device-specific identifier; or a combination of the two.
  • the rewritable data may be recorded from interrogators at stores or factories, or by external devices controlled either by company operators or customers, and that can communicate with the embedded processor via a or the receiver/transmitter.
  • a power source 318 is required to power all the components within the device.
  • the password generator preferably has its own power supply.
  • a typical implementation is a long-life battery (e.g., 8-10 years' life) that can only be replaced by the maker or retailer.
  • An alternative implementation is a kinetic automatic power source that charges itself from movement, much like those used in high-end wristwatches.
  • the device could also use a battery that is replaceable or rechargeable by customers. Fuel cells and other alternative power sources may be options also. Implementation choice will depend on the features desired for a particular product application, and the cost of obtaining those features.
  • a switch 320 is employed to turn the device from "transmit mode" to "sleep mode” and back again.
  • the AU In transmit mode, the AU proactively transmits its authentication information. In sleep mode, the AU acts only as a receiver and transmits its authentication information only after receiving information from another AU or interrogator. While custom-designed switches certainly can be employed, it is contemplated that in most instances a designer will select a switch from among readily available commercial products. Implementation of the switch is dependent on the product application and budget but one typical type of switch is a motion-sensitive switch (e.g., tip, tilt or vibration variety) that turns the AU to "transmit mode" for a set period of time (e.g., 10 minutes) when triggered by movement. That is, the processor or dedicated circuitry does so in response to input from the motion-sensitive switch.
  • a motion-sensitive switch e.g., tip, tilt or vibration variety
  • the AU After the set period of time, the AU typically returns to "sleep mode.” This allows the AU to conserve power (e.g., when stored in the closet with other AUs) and minimizes distraction during lengthy customer interactions such as a dinner.
  • Alternative implementation of the switch includes a user-controlled switch to switch the device between modes at the user's discretion.
  • a "Full Off Mode” could be included, turning off the entire device, both transmission and reception (except the password generator which preferably remains on always and preferably is powered by its own source as described above). For example, they may wish to turn off the device during business meetings or in movie theaters.
  • Receiver/transmitter 322 transmits a signal to and receives signals from the "outside" world (i.e., other such devices within close proximity or interrogators (readers) at the manufacturing sites or in retail stores, used by customs agents or other inspectors or investigators, etc.).
  • the transmitter can be programmed to stop sending a signal when it remains idle for a prolonged period of time.
  • the motion sensor can trigger the transmitter to actively send out signals again, when necessary, depending on the product configuration and situation.
  • a central administration database 324 may be employed to keep track of the AUs, the password generation formula and the clock-setting. This database may be expanded to include further product or customer information. Its details are a matter of design choice.
  • a network of interrogators could be disposed in retail stores, customs clearance points or along supply chains or at other places, to facilitate verification of merchandise authenticity. Exemplary functionality of this system is described in Fig. 2 and detailed below:
  • Interrogator 330 is a reader which transmits and receives signals from AUs within an effective range proximity.
  • the interrogator can authenticate an AU (i.e., is able to generate the same set of password numbers as the password generator in the AU), and thus identify the product attached to the AU, when a device enters/leaves the retail store or manufacturing site (assuming deployment at appropriate locations).
  • the interrogator could also input data (from an input/output terminal) to an AU by communicating with an individual AU via the receiver/transmitter and the AU' s embedded processor.
  • the interrogator and AUs could be implemented such that the interrogator can transmit a signal to the AU instructing it to transmit authentication information itself, but not activate its signal. This may be useful in environments, such as customs clearance or stores, where discreet activity is preferred.
  • Another alternative is to provide an interrogator with multiple password generators, allowing it to be usable to authenticate multiple products.
  • Input/output terminal 332 can be in the form of any electronic device, such as a computer, PDA, cell phone, etc. In use, it will be operatively connected to the interrogator and be able to receive/interpret the data from the interrogator. The user of the terminal can then identify the product/customer (based on the information stored on a database) and perform appropriate actions (e.g., personalized greetings and mentioning special promotions). The user of the terminal can also input specific data at the terminal, which transmits it to the customer's AU via the interrogator.
  • Database 324 may be used to store customer- and product-specific information
  • identification/authentication unit i.e., device
  • Transmit Mode the device (i.e., AU) transmits its authentication information at a (preferably configurable) interval and also receives authentication information transmitted from other AUs or queries transmitted from interrogators, and signals appropriately.
  • Sleep Mode the device does not transmit its authentication information. It does receive authentication transmitted from other AUs or queries transmitted from interrogators.
  • the device Upon receiving authentication information from a real AU, the device will transmit its own authentication information and signal appropriately (and/or may switch to Transmit Mode for a specified time period, depending on product design).
  • the device Upon receiving an authenticated query from an interrogator, the device will transmit its own authentication information and signal appropriately.
  • a third mode called “Full Off Mode”
  • the device does not transmit its authentication information and also does not receive information transmitted from other AUs or queries transmitted from interrogators.
  • the only part of the device that remains active is the password generator (which has its own power source and is constructed such that it is not possible for a user to turn it off).
  • This "Full Off Mode” may be required in some applications for customer privacy or other considerations.
  • the Full Off Mode could be implemented so as to still recognize and respond to queries from an Interrogator. This may be necessary depending on application and specific supply chain or customs concerns.
  • switch embodiments can be made available for switching the AU between modes of operation. Four are described below. For any application, one, two, three or all four embodiments, and/or some other embodiments, may be implemented.
  • the simplest embodiment does not contain switching ability, and the AU remains in Transmit Mode at all times. This embodiment is viable when the human-perceivable signal from the AU is unobtrusive enough, and of sufficiently low power that it can remain active at all times when another authentic product is within range.
  • the AU switches itself from Transmit Mode to Sleep Mode after a specified duration of time following contact with another AU (e.g., 10 minutes). It then remains in Sleep Mode for a specified duration of time (e.g.
  • the AU's default mode is Sleep Mode, and it only switches to Transmit Mode when movement is sensed by the motion-sensitive switch. It then remains in Transmit Mode for a specified duration of time (e.g., 10 minutes) before switching back to Sleep Mode if no further movement is sensed. This embodiment reduces power consumption.
  • the user has the ability to switch the AU from mode to mode at his or her discretion.
  • a physical mechanical switch perhaps designed in such a way as to be harmonious with a luxury item like a handbag, e.g., designed with similar feeling to a fine watch's crown latch, or the switches in a classic automobile
  • a voice-controlled or other sensory-enabled switching device In this embodiment, the user has the ability not just to switch the device between Transmit and Sleep Modes but also to switch to Full Off
  • an AU may be designed to respond to an interrogator despite otherwise being "off."
  • the customer When intending to make a purchase, the customer enters the store, where the handbags are on display. If the handbags on display are in Transmit Mode then they are signaling and the customer is assured of authenticity. If the handbags are in Sleep Mode or Full Off Mode (and they were not made to respond to an interrogation in those modes) then the sales assistant can provide a demonstration of the signaling and verification of authenticity by activating two authentic handbags, using whichever switching embodiment has been implemented (for example, moving a handbag to trigger the motion-sensitive switch, or bringing a new handbag into range to restart the timed switch).
  • the customer may encounter another customer with a handbag appearing to be from the same maker.
  • authentic handbags emit the encoded wireless message telling the other bag "I am authentic.”
  • the two handbags are within range (range being determined at manufacture by selecting transmit power, etc.) if both are authentic they will recognize each others' messages, authenticate them and then display the signal (e.g., a warmly glowing backlit logo) that means both customers are owners of authentic handbags. If one of the handbags is counterfeit, no message will be received by the authentic handbag and no signal will be displayed. This may lead to the embarrassment of the owner of the counterfeit handbag and discourage her from purchasing or using counterfeit goods in the future.
  • handbags stored in close proximity to others would continue to interact and signal, raising concern for running down the battery.
  • the handbags In the second, Timed Switch embodiment, the handbags would interact for a period of time, and then go into Sleep Mode for a period of time until the device-specific identifier memory cycles through.
  • the handbags In the third, motion-sensitive switch embodiment, the handbags would interact when placed in the closet and then remain in Sleep Mode until moved. This is seen as the best implementation as it conserves the most battery power. If a kinetic power source is used, some solution should be included for preventing wind- down, such as a backup battery.
  • the customer should be advised to turn off the signal before storing the handbag for long periods of time.
  • Some possible alternate ways to deal with the problem of battery discharge during storage include providing a special storage bag or box into which the handbag should be placed for storage, and placing in the bag or box a transmitter that tells the handbag to turn off.
  • the storage bag or box could be made to include a wireless transmission shield (assuming the transmitter emits a radio-frequency signal instead of, for example, an optical signal) so that transmission from other handbags does not activate the signal.
  • a simpler solution would be to advise the customer against long storage in proximity to another equipped handbag or to simply implement the AU with the ability to turn itself off (through inclusion of a timed switch or a motion-sensitive switch).
  • the authentication mechanism is based upon a self-generating password generator and the transmission of the time-unique password. So, upon the generation of the password and its transmission by the transmitter, other authentic products within the specified distance will pick up the signal and trigger the authentication mechanism. Due to the fact that passwords are self-generated by a device, encryption is optional but may be employed to increase security, potentially in the form of transmitting partial question and answer passwords or by key-type encryption. Especially in cases where a non self- changing password generator is employed and where other customers' information is being transmitted, encryption may be desirable and even necessary.
  • a product manufacturer may wish an AU to be activated either at or after manufacture. Most likely the AU will be embedded in the product (e.g., a handbag) in such a way that it is inaccessible to the user (e.g., stitched in). If no user-accessible switch is provided, the AU probably should remain active from the point of manufacture onwards. Alternatively, as noted above, a switch can be incorporated or the battery can be deactivated or disconnected until a commissioning procedure is followed (e.g., by personnel at the retail store).
  • a commissioning procedure e.g., by personnel at the retail store.
  • the password generator Several components in the device need power: the password generator, the processor, the transmitter/receiver and likely the signaling mechanism.
  • power to the password generator is expected to be provided via a long-term battery contained within a tamper-proof casing housing that generator, and powering only the password generator.
  • a non-kinetic/automatic power source be used to power the rest of the device, e.g., a battery, it will need to be replaced at some point. It is possible to make the battery chargeable or replaceable by the customer, but the most secure implementations are expected to require full concealment of the device within the product; therefore, customers will have to bring or send the product back to a store or service center for maintenance.
  • the maker may send the customer a communication to let the customer know to bring the handbag back into the store (perhaps with some special promotion as incentive), where the battery can be replaced/recharged.
  • the customer can bring the bag in for "servicing" when the AU stops signaling.
  • the retail channel may proactively test bags when customers return to the store. It is commonplace in portable devices (e.g., cell phones) to include means for reading battery condition, and to communicate that data to other devices or systems.
  • the handbag to give a differentiated signal when the battery charge is low. This could be through a different colored signal or through a different frequency glowing pattern or other indicator. The customer would be educated to recognize this as a signal to take the product back to the store for battery replacement or recharging.
  • the potential uses for the AU device are numerous and are not limited to the point of sale. Indeed, they could also be employed in the inventory management process. Since the device can transmit any information stored in its memory, including device- specific information, such as product serial number, it could help the company, distributor, shipper or retailer monitor its inventory.
  • loading points can be installed with information readers to receive signals from the products and identify both the quantity, ad models of products and specific units being shipped.
  • the device can also be employed to keep track of inventory in stock in the warehouse. For example, by being able to identify the serial number of the product, one can easily locate the products in the warehouse and determine authenticity or lack thereof throughout the supply chain.
  • the device is also capable of transmitting data such as unique serial number
  • Interrogators can be installed in locations such as premium shopping malls or high-traffic shopping areas, where the AUs can be triggered by said interrogators to emit signals (and thus indicate authenticity), without the proximity of another authentic article.
  • This information has commercial value and can be used in various ways. For example, at time of purchase (or later), a customer may be asked if he/she would like to receive special offers via cell phone or e-mail. A customer can choose to receive promotional messages on his/her cell phone or portable e-mail reader and provide voice and text numbers/addresses, as appropriate.
  • the interrogator upon detecting the presence of such customer, can send out or cause to be sent promotional messages to the customer's pre-disclosed e-mail address or cell phone number (voice or text). Given that the interrogator can identify the location of such customer within close proximity (only several feet), the promotional messages can be very customized and tailored to the given whereabouts of the customer and his/her profile on a database.
  • Prestige is a social status that many people pursue.
  • the human-perceivable signal sent out by the device not only serves to tell counterfeits apart from authentic products, but also helps to create the sense of exclusivity that appeals to many customers of luxury goods. This follows the old saying that "Nothing appears true until it can appear false. "
  • a customer with an equipped handbag not only shows that he or she has an authentic bag, but also is to be afforded such privileges as VIP entrance or other special services. Such special services could be selectively used to enhance the mystique, community and exclusivity of a luxury brand.
  • an RFID tag (as we know it today) can serve as the generator of the authentication signal.
  • the AU in a first product or probe would activate an RFID tag in the other product.
  • RFID tags typically derive their power from the probe signal and this means that either an independent, battery-powered password generator will be needed or the use of a password will have to be limited to a single password burned into the RFID tag.
  • Another way to marry the invention with RFID tags would be to separate the functions - put some kind of secure RFID tag in all the products, and then sell an additional probe/reader (maybe in the form of a necklace or bracelet - an additional revenue stream) that does the authenticating.
  • Interrogators need not be limited to stores and government agencies, Interrogators may be sold to private customers, also.
  • An interrogator might either be stationed in the home (e.g., in the bathroom cabinet or dressing area), carried with the consumer on shopping trips or provided by the retailer (e.g., integrated with a shopping cart). Having positioned the interrogator in locations with proximity to purchased articles or having carried the interrogator in proximity to items being considered for purchase, the consumer can verify the authenticity of a product that is equipped with an AU. The consumer need do nothing more than recognize the signal proactively demonstrated by the product (e.g., a glowing logo) or recognize the lack of said signal.
  • an interrogator may include means to connect to the Internet or to a cellular phone, to communicate with the manufacturer and/or to receive updates and issue reports.
  • AUs In Conjunction with a Widely Recognized Standard
  • the use of AUs need not be confined to high-end, luxury goods.
  • an inexpensive but often counterfeited or shoplifted product such as men's razor blades.
  • the consumer probably is aware of the counterfeit problem and has been educated through the media to recognize the "standard" or genuine branded product (for example through the presence of a widely recognized logo on the packaging of the product).
  • the consumer looks for the product, identifies the standard logo and understands that the product is equipped with an AU. The consumer then verifies the authenticity of the product through the AU. Presence of the human- perceivable AU signal assures the consumer of authenticity and the purchase is made confidently.
  • a "processor” is any suitable information processing element(s), programmable or non-programmable.
  • Non-exhaustive examples include programmable general or special purpose microprocessors and controllers, hard-wired logic, application-specific integrated circuits, neural networks, and so forth.
  • Those examples that include programmable elements may be programmed in any suitable fashion by any kind of code in any computer language. Examples include, but are not limited to microcode and application-level programs written in procedural or object-oriented or other kinds of programming languages and environments.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention concerne un procédé (et un appareil destiné à mettre en oeuvre ce procédé) destiné à décourager l'utilisation de produits de contrefaçon par des utilisateurs de produits et à encourager l'achat et l'utilisation de produits authentiques non contrefaits. Ce procédé consiste à prendre un produit à authentifier avec un premier dispositif d'authentification comprenant un générateur de données d'authentification, un émetteur de données destiné à émettre des données d'authentification à partir du générateur de données d'authentification et un récepteur de données destiné à recevoir des émissions de données d'authentification en provenance de seconds dispositifs d'authentification compatibles, à faire fonctionner le premier dispositif d'authentification de façon à identifier lorsqu'un second dispositif d'authentification compatible est à proximité étroite, authentifiant ainsi le second dispositif d'authentification, et à faire en sorte que le premier et/ou le second dispositif d'authentification signale à son utilisateur respectif (avec un signal perceptible par des personnes) qu'il a authentifié un autre produit.
PCT/US2005/029110 2004-08-13 2005-08-15 Procede et appareil de permettant de lutter contre les produits de contrefaçon via une interaction entre les consommateurs WO2006020989A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60154504P 2004-08-13 2004-08-13
US60/601,545 2004-08-13

Publications (2)

Publication Number Publication Date
WO2006020989A2 true WO2006020989A2 (fr) 2006-02-23
WO2006020989A3 WO2006020989A3 (fr) 2006-06-08

Family

ID=35908236

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/029110 WO2006020989A2 (fr) 2004-08-13 2005-08-15 Procede et appareil de permettant de lutter contre les produits de contrefaçon via une interaction entre les consommateurs

Country Status (1)

Country Link
WO (1) WO2006020989A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018002884A1 (fr) * 2016-06-30 2018-01-04 Munemann Jean Alexandera Réseau social exclusif basé sur la consommation de produits de luxe
US20220147783A1 (en) * 2006-06-09 2022-05-12 Dominic M. Kotab Starting a vehicle using a device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020129251A1 (en) * 2001-03-01 2002-09-12 Yukio Itakura Method and system for individual authentication and digital signature utilizing article having DNA based ID information mark
US20030037240A1 (en) * 2001-08-14 2003-02-20 Hitachi Electronic Service Co. Ltd. System for providing authentication service of brand-name product with identification chip
US20030123050A1 (en) * 1999-01-18 2003-07-03 Selinfreund Richard L. Portable product authentication device
US20040088231A1 (en) * 2002-01-04 2004-05-06 Davis Tommy L. System and method for tracking authenticated items

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030123050A1 (en) * 1999-01-18 2003-07-03 Selinfreund Richard L. Portable product authentication device
US6707539B2 (en) * 1999-01-18 2004-03-16 Verification Technologies, Inc. Portable product authentication device
US20020129251A1 (en) * 2001-03-01 2002-09-12 Yukio Itakura Method and system for individual authentication and digital signature utilizing article having DNA based ID information mark
US20030037240A1 (en) * 2001-08-14 2003-02-20 Hitachi Electronic Service Co. Ltd. System for providing authentication service of brand-name product with identification chip
US20040088231A1 (en) * 2002-01-04 2004-05-06 Davis Tommy L. System and method for tracking authenticated items

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220147783A1 (en) * 2006-06-09 2022-05-12 Dominic M. Kotab Starting a vehicle using a device
US11803724B2 (en) * 2006-06-09 2023-10-31 Dominic M. Kotab Starting a vehicle using a device
WO2018002884A1 (fr) * 2016-06-30 2018-01-04 Munemann Jean Alexandera Réseau social exclusif basé sur la consommation de produits de luxe

Also Published As

Publication number Publication date
WO2006020989A3 (fr) 2006-06-08

Similar Documents

Publication Publication Date Title
US11170620B2 (en) Wireless dual-mode identification tag
US11551537B2 (en) Wireless dual-mode identification tag
AU2010295352B2 (en) Retail product tracking system, method, and apparatus
US8378826B2 (en) Key device for monitoring systems
CN102741893B (zh) 零售产品跟踪系统、方法和装置
CN101305385B (zh) 用于产品认证的数字标签
US7652573B2 (en) Object presence analysis system and method
US20140351098A1 (en) Retail product tracking system, method, and apparatus
US20160036786A1 (en) System and method facilitating enhanced inter-object and human-object interactivity using networked electronic devices
Albrecht et al. Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watc h Your Every Move
US6639513B2 (en) Anti-pilferage system
Bohn et al. Disappearing Computers Everywhere œ Living in a World of Smart Everyday Objects
WO2006020989A2 (fr) Procede et appareil de permettant de lutter contre les produits de contrefaçon via une interaction entre les consommateurs
US20080055083A1 (en) Personal Articles Having Wireless Proximity Detectors

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC (EPO FORM 1205A, DATED 26-06-2007).

122 Ep: pct application non-entry in european phase

Ref document number: 05790113

Country of ref document: EP

Kind code of ref document: A2