WO2008078328A2 - Système et méthode d'authentification d'articles - Google Patents
Système et méthode d'authentification d'articles Download PDFInfo
- Publication number
- WO2008078328A2 WO2008078328A2 PCT/IL2007/001618 IL2007001618W WO2008078328A2 WO 2008078328 A2 WO2008078328 A2 WO 2008078328A2 IL 2007001618 W IL2007001618 W IL 2007001618W WO 2008078328 A2 WO2008078328 A2 WO 2008078328A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- item
- tagged
- central database
- owner
- items
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- the present invention relates to a system and method for authenticating items, and in particular to a system and method for authenticating luxury and high- value brand-name items from multiple brands and companies, tagged with RFID tags.
- Counterfeit products include any product bearing an unauthorized representation of a manufacturer's trademark or trade name.
- Examples of products which have been counterfeited include prescription and over-the-counter drugs, clothing, credit cards, watches, pacemakers, and machine and automobile replacement parts. Because counterfeit products are often of sub-standard quality, there are potential safety risks which may cause personal injury as well as economic loss".
- a customer knows that he's buying a fake brand imitation when for example, he's buying a luxury look-alike from a street vendor, for a fraction of the original product real price.
- fake products find themselves to normal stores, where a customer may purchase them for a full price, not knowing that he's getting an illegal imitation.
- the damage to the original brand is twofold in this case.
- a system for authenticating tagged items from multiple brands and manufacturers comprising:
- a tag reader adapted for reading the tags of the tagged items and retrieving item identification data stored in each tag of the tagged items, the tag reader being further adapted for reading tags in a plurality of formats;
- a central database for storing item records associated with tagged items, wherein each item record corresponds to one of the tagged items, the item record including a plurality of fields comprising the item ID, product name, information about item shipment destination, and item owner's ID after a sale has been registered in the central database;
- an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfaces adapted for interacting with the owner of the tagged item; and (iv) an authentication unit for authenticating a tagged item according to the item identification data read from the tagged item's tag and the item record stored in the central database.
- the system further comprises a registration interface for registration in the central database of the sale of a tagged item.
- the sale registration comprises registering a tagged item owner's details in the central database, the tagged item owner being associated with at least one item record in the central database.
- the registration interface can be implemented in software and / or hardware.
- the tagged item owner is assigned personal identification password.
- authentication of the tagged item requires providing the assigned personal identification password.
- the decision to authenticate a tagged item considers at least one of the following fields in the central database: batch number, shipment date, shipment destination, the serial number, the date of purchase, and the location of the purchase.
- the interactive kiosk is located at the place of purchase or in a public location.
- the input / output interface comprises equipment and/or programs which enable a user to communicate with a computerized system, for example, a keyboard, a mouse, a monitor, a touch screen, a microphone, speakers and other common means available in the industry.
- the authentication unit can be implemented in software and/or hardware.
- the authentication unit authenticates a tagged item by reading the tag of the tagged item and comparing it to the item record stored in the central database.
- a method for authentication tagged items from multiple brands and manufacturers comprising the steps of:
- FIG. 1 is a block diagram of an embodiment of the authentication system including a central database connected via wired and wireless means to interactive kiosks, enterprise databases, an administrative console and to an Internet station.
- Fig. 2 is a schematic illustrating a method for authenticating tagged items from multiple brands and companies.
- the present invention is adapted to authenticate items from multiple brands and manufacturers, and is particularly useful for luxury and high-value brand-name items which are frequently forged.
- Each manufacturer tags its own items independently according to its own requirements and practice.
- the tag reader of the invention is adapted to read tags from a plurality of common protocols and ISO standards. These tags can range from Radio Frequency Identification (RFID) low-frequency (LF) tags at 125Khz or 134.2 Khz; RPID high-frequency (HF) tags at 13.56 Mhz; RFID ultra-high frequencies (UHF) Electronic Product Code (EPC) Generation (Gen) 2; and optically-read barcodes.
- RFID Radio Frequency Identification
- LF low-frequency
- HF high-frequency
- UHF Electronic Product Code
- Gen Electronic Product Code
- Each item's tag needs to be unique in order to identify the specific item amid similar items of the same product.
- the item tag's thus stores item identification data, which includes at least the item's unique identification (ID) number and very often the batch number in which the item was produced. Additional, optional information such as product name, date of manufacture, place of manufacture, expiration date and such, may also be placed on the item ' s tag according to the requirements of the manufacturer or distributor of the item.
- Fig. 1 is a block diagram of an embodiment of the authentication system of the invention.
- Interactive kiosks 10 are connected to tag readers 20 on one hand and to a central database 30 on the other hand via communication lines 40.
- the communication lines 40 can be wired, wireless or both.
- the central database 30 of the invention contains item records associated with products from multiple brands and companies. Each item record typically contains at least the following fields: item identification (ID) code; item validation code; item batch number; item production date; item shipment destination including country and city; item distributor name and address; and related products and advertisement information. Only the item ID code and the item shipment destination are mandatory fields.
- database does not refer only to a single database, but encompasses other database implementations such as a cluster of databases, a collection of local and remote databases connected between them, an implementation using a file system and similar implementations.
- the central database 30 is also connected to enterprise databases 50 of different manufacturers, in order to receive updates about item records.
- the updates can be addition, deletion or modification of item records.
- the tagged item's owner can use an interactive kiosk 10 of the invention in order to authenticate the tagged item.
- the interactive kiosk 10 is typically placed either at the place of purchase or in publicly accessible locations such as a mall, shopping center, airport etc.
- the interactive kiosk 10 is connected to both the tag reader 20 and to the central database 30.
- the communication line 40 to the tag reader 20 is typically a local wired or wireless connection. Alternatively, the tag reader 20 can also be built as part of the interactive kiosk 10 unit.
- the communication line 40 to the central database 30 is typically a remote wired or wireless connection such as through the Internet or through a dedicated communication line.
- the central database 30 communication line 40 may be either a permanent connection, or only activated on- demand.
- the interactive kiosk 10 uses input/output interfaces known in the art in order to communicate with the tagged item owner.
- Such interfaces include a display screen, a touch screen, a keyboard, a mouse, a joystick, a microphone, speakers, printer or similar interfaces capable of communicating with a user.
- the central database 30, is also connected to an administrative console 70 so that the operator of the service can engage in maintenance, administrative and reporting activities with the central database 30.
- an administrative console 70 so that the operator of the service can engage in maintenance, administrative and reporting activities with the central database 30.
- a manufacturer it can be interesting for a manufacturer to request a report regarding how many tagged items were authenticated and registered in a given type period, and break the results by products, brands, geographical regions etc.
- Fig. 2 is a schematic illustrating a method for authenticating tagged items from multiple brands and companies, according to another embodiment of the present invention.
- step 100 the tagged item owner presents the tagged item to the tag reader 20.
- the tag reader 20 then reads the content of the tag, according to the type and technology of the tag, for example different protocols of RPID tags, barcode tags etc.
- the tagged item owner interacts with the interactive kiosk 10.
- Step 110 enables the owner to type an item personal code if available. This step is only required when a tagged item is provided with an additional item personal code that needs to be entered in order to authenticate the tagged item.
- Step 130 tests to see if the item's ID read from the item's tag is present in the central database 30. If the tag ID is not located in the central database 30, step 140 tests to see if the item's tag contained a batch number and if the batch number can be located in the central database 30. If an appropriate batch number cannot be located in the central database 30, step 150 is executed and the authentication failure is registered. Typically, a system administrator is notified of the authentication failure.
- step 160 tests if the interactive kiosk's 10 location is identical to the city and country where the tagged item was shipped to for sale, as registered in the central database 30.
- step 170 If the city and country where the tagged item was offered for sale, are different from the city and country where the tagged item was presented to the interactive kiosk 10, the owner is given a chance in step 170 to enter the city and country where the item was bought. Failure to authenticate the item's place of purchase location leads to an item authentication failure in step 150.
- step 190 tests if the tagged item is already registered in the central database 30 as a tagged item that has been sold and authenticated before.
- step 200 proceeds to register the tagged item and the owner in the central database 30.
- step 210 the owner is requested to enter the buyer personal code that was generated in the registration process.
- the buyer personal code is another authentication layer in order to associate the owner with the tagged item.
- step 220 that is reached either after the tagged item registration in the central database 30 or after the owner successfully entered the buyer personal code, the owner can receive warranty information, update the owner's personal details and receive promotional information about related products, accessories and services.
- the first step of the process is to read the tagged item's tag by the tag reader 20.
- the interactive kiosk 10 then communicates to the central database 30 the item ID code read from the tag along with identifying information about the interactive kiosk 10 in order to identify its location.
- the interactive kiosk 10 also communicates to the central database 30 the nature of the request: authentication, service/warranty information or general information. Some items may require an additional item personal code provided at the time of purchase, in order to authenticate the tagged item. In such case, the tagged item's owner must also provide the item personal code to the interactive kiosk 10.
- the central database 30 retrieves the tagged item's record using the provided item ID code, and proceeds to handle the request.
- 1 st time authentication request - if the item ID is found in the central database 30, the location of the interactive kiosk 10 is compared to the item's shipment destination as stored in the central database 30. If the location of purchase does not match the location of the interactive kiosk 10, the item's owner needs to specify the place of purchase in order to authenticate the item. If an item personal code is registered in the central database 30, the central database 30 checks that it receives the same code from the interactive kiosk 10. If the item's ID, place of purchase location, item personal code (when required), as provided by the interactive kiosk 10, all match those of the central database 30, the item is considered to be authentic.
- the central database 30 proceeds with the registration procedure as defined and required by each manufacturer. For example, the central database 30 may create and send the interactive kiosk 10 an authentication number or the interactive kiosk 10 can print an authentication certification along with warranty information.
- the authenticated tagged item owner is then invited to register relevant personal details such as name, address, electronic address, telephone etc. and also to create a personal identification code to be used in the future.
- the personal identification code can be generated by the central database 30 or by the owner, and may optionally be modifiable later by the owner.
- An item's owner can be associated with more than one tagged item in the central database 30. In this case, the owner does not need to enter the personal details more than once.
- Warranty / service requests - after an item has been authenticated the owner may access warranty information relating the item, and can place a request to service the tagged item.
- General information requests - after an item has been authenticated the owner can access general information such as the item's user manual, available accessories, available upgrades or promotional offers.
- the item's owner can also update his/hers personal details as well as register a new person or entity as the owner of the tagged item, if ownership of the item has changed.
- the personal identification password associated with a tagged item owner includes identification methods known in the art.
- the owner can be assigned a personal user identification (PID) and a password, or his name, telephone number, email address can serve as a PID. In case the owner cannot recall the chosen password, it can be sent to the email address registered in the central database 30.
- PID personal user identification
- the owner can identify itself, and be able to define another password. Examples of common personal questions as used in the art include "mother's maiden name", "the name of the elementary school attended", "name of a favorite pet” etc.
- the owner can define both the question to be asked and the answer to be given.
- the password can be implemented in association with a hardware device, for example, a USB disk-on- key memory device and the term "password" as used herein also includes such hardware implementation of a security code.
- a hardware device for example, a USB disk-on- key memory device
- the term "password" as used herein also includes such hardware implementation of a security code.
- additional products and/or services are offered to the owner of a tagged item when interacting with the interactive kiosk 10.
- the system may offer item's accessories, upgrades, complementary products, special promotions, extended warranty etc.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
L'invention porte sur un système d'authentification d'articles marqués de diverses marques et fabricants, comportant: un lecteur de marqueurs conçu pour lire les marqueurs des articles dans plusieurs formats, récupérer les données d'identification des article marqués présentes dans les marqueurs; une base de données centrale stockant les données respectives des articles marqués; une borne interactive relié au lecteur et à la base de données et munie d'interfaces d'entrée/sortie pouvant interagir avec le propriétaire de l'article marqué; et un dispositif d'authentification des articles marqués en fonction des données d'identification des articles lues sur le marqueur de l'article et des données stockés dans la base de données centrale.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL180387 | 2006-12-27 | ||
IL180387A IL180387A0 (en) | 2006-12-27 | 2006-12-27 | Item authentication system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008078328A2 true WO2008078328A2 (fr) | 2008-07-03 |
WO2008078328A3 WO2008078328A3 (fr) | 2009-04-16 |
Family
ID=39563041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2007/001618 WO2008078328A2 (fr) | 2006-12-27 | 2007-12-27 | Système et méthode d'authentification d'articles |
Country Status (2)
Country | Link |
---|---|
IL (1) | IL180387A0 (fr) |
WO (1) | WO2008078328A2 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11630675B2 (en) | 2018-04-30 | 2023-04-18 | Hewlett-Packard Development Company, L.P. | Service kiosk device configuration |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020143624A1 (en) * | 2001-03-31 | 2002-10-03 | Koninklijke Philips Electronics N.V. | Machine readable label for tokens and method of use |
US20020198788A1 (en) * | 2001-06-20 | 2002-12-26 | International Business Machines Corporation | System and method for product evaluation |
-
2006
- 2006-12-27 IL IL180387A patent/IL180387A0/en unknown
-
2007
- 2007-12-27 WO PCT/IL2007/001618 patent/WO2008078328A2/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020143624A1 (en) * | 2001-03-31 | 2002-10-03 | Koninklijke Philips Electronics N.V. | Machine readable label for tokens and method of use |
US20020198788A1 (en) * | 2001-06-20 | 2002-12-26 | International Business Machines Corporation | System and method for product evaluation |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11630675B2 (en) | 2018-04-30 | 2023-04-18 | Hewlett-Packard Development Company, L.P. | Service kiosk device configuration |
Also Published As
Publication number | Publication date |
---|---|
WO2008078328A3 (fr) | 2009-04-16 |
IL180387A0 (en) | 2007-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12067440B2 (en) | Systems and methods for generating secure tags | |
US10210527B2 (en) | Open registry for identity of things including social record feature | |
US20170053293A1 (en) | System and method for streamlined registration and management of products over a communication network related thereto | |
JP6498123B2 (ja) | サプライ・チェーン製品用のデジタル的に保護された電子タイトル | |
US20090287498A2 (en) | System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto | |
CN105894304B (zh) | 一种产品防伪方法 | |
US20160358158A1 (en) | Open registry for identity of things including item location feature | |
KR100354488B1 (ko) | 물리적 상품을 이용하여 디지털 상품의 복제/배포를방지하는 장치 및 방법 | |
CN107491973A (zh) | 产品防伪管理系统和方法 | |
CN105931056A (zh) | 一种商品防伪的方法及装置 | |
US11176561B2 (en) | Method for checking the authenticity of goods or services | |
JP2004501417A (ja) | 情報システムおよびその方法 | |
KR101487430B1 (ko) | 병행수입품 a/s 관리시스템 | |
CN104899775A (zh) | 一种产品的防伪方法及产品的防伪查验方法及一种防伪包装 | |
CN1520560A (zh) | 呼叫目标专用信息的方法 | |
US20010053949A1 (en) | Secure tracking of articles | |
JP6042367B2 (ja) | 資産管理サーバ、資産管理方法、及び、資産管理サーバ用プログラム | |
KR20220095922A (ko) | 블록체인 기반의 정품인증 서비스 시스템 및 방법 | |
WO2008078328A2 (fr) | Système et méthode d'authentification d'articles | |
US20210217028A1 (en) | Method and system for the certification of a product to be shipped | |
KR20070065852A (ko) | 인증번호를 이용한 제품의 정품 인증 방법 | |
JP2018055149A (ja) | 出荷製品認証システムおよびサーバ装置 | |
JP2001222734A (ja) | 商品認定カード及びその認証方法 | |
JP4536876B2 (ja) | 偽造商品流通防止システム | |
JP4476693B2 (ja) | 商品情報提供装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07849644 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07849644 Country of ref document: EP Kind code of ref document: A2 |