WO2015104561A1 - Authentication system, method and label - Google Patents

Authentication system, method and label Download PDF

Info

Publication number
WO2015104561A1
WO2015104561A1 PCT/GB2015/050044 GB2015050044W WO2015104561A1 WO 2015104561 A1 WO2015104561 A1 WO 2015104561A1 GB 2015050044 W GB2015050044 W GB 2015050044W WO 2015104561 A1 WO2015104561 A1 WO 2015104561A1
Authority
WO
WIPO (PCT)
Prior art keywords
visual pattern
label
machine readable
readable code
item
Prior art date
Application number
PCT/GB2015/050044
Other languages
French (fr)
Inventor
Philip Wainwright
Original Assignee
Authenticate Now Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Authenticate Now Limited filed Critical Authenticate Now Limited
Publication of WO2015104561A1 publication Critical patent/WO2015104561A1/en

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0297Forms or constructions including a machine-readable marking, e.g. a bar code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards

Definitions

  • the information relating to the visual pattern 4 and the machine readable code 6 can be sent to the server 20 via the internet 100.
  • the mobile communications device 12 can send this information either via a wireless router 14 (which may be provided as part of the retailer portion 40) or can access the server 20 via a mobile cellular network including one or more masts 102.
  • the same means by which the mobile communication device 12 sends the aforementioned information can be used to return information to the mobile communications device 12 from the server 20.
  • the data associated with the machine readable code (including either an image of the machine readable code or an address that has been determined from the machine readable code) and the captured image (including at least the visual pattern 4) can be sent to the server via the internet 100.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

An authentication label. The label comprises a surface. A machine readable code is provided on the surface. The machine readable code is indicative of an address in a database. A visual pattern is also provided on the surface. The visual pattern is unique to the label. An image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.

Description

AUTHENTICATION SYSTEM, METHOD AND LABEL
FIELD OF THE INVENTION This invention relates to the authentication of items.
BACKGROUND OF THE INVENTION
Numerous approaches to detecting and/or preventing the sale of counterfeit products have been attempted. These approaches are often expensive and complex. Examples include the use of RFID technology micro printing, holograms and photo -reactive inks. All of these systems can fail due to one or more of the reasons discussed below.
A general aim of existing verification systems is consistency. For example, in some systems, many identical labels are produced and attached to items to confirm their authenticity. The presence of a label or tag that has characteristics consistent with those of a genuine tag is taken as proof of the authenticity of an item to which the label is attached. These characteristics can include size, shape, colour, or the use of the same materials, artwork, ink, or watermarks. A key weakness is systems of this kind is that by copying the common characteristics of the genuine labels, counterfeiters can circumvent the security that the system provides, allowing fake goods to be presented as genuine.
Another reason for the failure of known systems is that systems that use an algorithm to produce apparently random numbers have to have an underlying equation in order that a calculation can be carried out to produce a verification code. Again, as all the labels or product applications have to follow the same algorithms, this gives the counterfeiters time to work out the algorithm and produce their own counterfeit codes.
A further problem with known systems is that they can be prohibitively expensive. This simple problem means that an otherwise successful authentication system may be out of reach for many manufacturers. For example, if protective artwork provided as part of an authentication system is expensive, then it may not be financially viable for many smaller companies to use the system to protect their products. Equally if the security mark costs are greater than the unit profit on the protected items, then these systems cannot be used. Therefore brands associated with high- volume, low margin goods may be prohibited from protecting themselves. Similarly, if the equipment needed to detect a counterfeit item is also expensive, then this too may prevent widespread adoption of the system.
Accordingly, there is a need for an alternative approach to the authentication of an item.
SUMMARY OF THE INVENTION
Aspects of the invention are set out in the accompanying independent and dependent claims. Combinations of features from the dependent claims may be combined with features of the independent claims as appropriate and not merely as explicitly set out in the claims.
According to an aspect of the invention, there is provided an authentication label. The label includes a surface. A machine readable code is provided on the surface. The machine readable code is indicative of an address in a database. A visual pattern is also provided on the surface. The visual pattern is unique to the label. An image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.
Embodiments of this invention can thus provide labels that can be used to confirm the authenticity of an item. The security provided by the label is enhanced by the provision of the visual pattern that is unique to the label. Comparison of the visual pattern with an image of the visual pattern previously stored in a database (e.g. by the manufacturer or distributor of the item) can be used to prevent attempts to make unauthorised copies of the label. According to another aspect of the invention, there is provided a method of authenticating an item. The method includes a mobile communications device reading a machine readable code provided on a surface of an authentication label associated with the item. The machine readable code is indicative of an address in a database. The method also includes the mobile communications device capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label. The method further includes the mobile communications device sending data associated with the machine readable code and the captured image to a server. The method also includes the mobile communications device receiving from the server data relating to the authenticity of the item.
A method of authenticating an item according to an embodiment of this invention can thus be conveniently implemented by a user of a mobile communications device such as a smart phone or tablet. The mobile communications device can include a camera for capturing the image of the visual pattern and an antenna or other data connection for sending data associated with the machine readable code and the captured image to the server.
According to a further aspect of the invention, there is provided a computer program product comprising program instructions for implementing the method defined above on a mobile communications device.
According to another aspect of the invention, there is provided a mobile communications device. The mobile communications device is operable to authenticate an item by: reading a machine readable code provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database; capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label; sending data associated with the machine readable code and the captured image to a server; and receiving from the server data relating to the authenticity of the item.
According to a further aspect of the invention, there is provided a method of authenticating an item. The method includes a server: receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label; accessing the address in the database to retrieve data relating to the visual pattern; comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
According to embodiments of this invention therefore, a database can be used to store data relating to the visual patterns of labels to be used to authenticate items. As part of the authentication method, the image can be retrieved and compared with an image received from a mobile communications device. If it is determined that the captured image received from the mobile communications device matches the image stored in the database, information regarding the item can be sent by the server to the mobile communications device. This information can be used to confirm the authenticity of the item and to provide other information relating to the item itself (e.g. manufacturer, manufacturing date, geographical origin and so forth).
According to another aspect of the invention, there is provided a computer program product comprising program instructions for implementing the method defined above on a server. According to a further aspect of the invention, there is provided a server. The server is operable to authenticate an item by: receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label; accessing the address in the database to retrieve data relating to the visual pattern; comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
According to another aspect of the invention, there is provided a method of preparing an item for authentication. The method includes: providing an item; providing an authentication label comprising: a surface; a machine readable code provided on the surface, wherein the machine readable code is indicative of an address in a database; and a visual pattern provided on the surface, wherein the visual pattern is unique to the label, and associating the label with the item by: capturing an image of the visual pattern; and storing data relating to captured image of the visual pattern in the database at the address indicated by the machine readable code.
Accordingly, items can be prepared for authentication by, for example, a manufacturer or distributor. The visual pattern can take a number of forms. For example, the visual pattern may be printed on the surface of the label, providing a low-cost implementation. The visual pattern can include one or more graphic symbols such as alphanumeric characters, which are easily printable. In an alternative embodiment, the visual pattern can include coloured particulates suspended in a lacquer. In this way, the visual pattern itself can take a form that is difficult or even impossible to replicate, adding to the security of the system.
One or more parts of the machine readable code on the label can define the position of an imaging region on the label. The visual pattern can be located in the imaging region. In this way, the location of the machine readable code itself can be used to determine the parts of a captured image that are to be processed for comparison with a corresponding image or other data stored in the database. For example, in embodiments where the machine readable code comprises QR codes, corners of the QR code can be used to define the location of the visual pattern.
Conveniently, the label can be attached to the item to be authenticated. For example, the label can be a tag or sticker that is attached to the item. The item may include packaging to which the tag is attached or incorporated. In some examples, the label can be incorporated into the product itself. For example, the surface on which machine readable code and visual pattern is provided may be a surface or part of a surface of the product itself. This implementation is particularly suitable for products that are not typically sold in separate packaging.
In some examples, the captured image includes the machine readable code. In this way, the captured image of the visual pattern can conveniently be used to extract the database address.
In some examples, the sending of the data associated with the machine readable code and the captured image to the server can include simply sending the captured image itself to the server. The server can, in such examples, perform the processing of the image for extracting the database address and for comparing the image with an image stored at the database address. In an alternative example, the database address may be extracted locally, by the mobile communications address and sent to the server, along with at least part of the captured image to the server.
The data retrieved from the database can comprise a previously stored image of the visual pattern. This image can be compared to the data associated with the captured image of the visual pattern from the mobile communications device. The latter may itself be a copy of the captured image captured by the mobile communications device and sent to the server. At the server, comparing these data can include comparing the previously stored image and the captured image, using an image processing algorithm.
A computer program product according to an embodiment of the invention can be stored on a carrier medium such as CD, DVD, Blu-Ray disc, memory stick, solid state memory or hard disk drive.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the present invention will be described hereinafter, by way of example only, with reference to the accompanying drawings in which like reference signs relate to like elements and in which:
Figure 1 shows a first example of an authentication label in accordance with an embodiment of the invention;
Figure 2 shows a second example of an authentication label in accordance with an embodiment of the invention;
Figure 3 shows an overview of the various components of an authentication system in accordance with an embodiment of the invention;
Figure 4 shows the steps in a method of authenticating an item in accordance with an embodiment of the invention;
Figure 5 an example of a GUI that may be displayed on a display of a mobile communications device for implementing the method described in relation to Figure 4;
Figure 6 shows the steps in a method of authenticating an item in accordance with an embodiment of the invention; and
Figure 7 shows the steps in a method preparing an item for authentication in accordance with an embodiment of the invention.
DETAILED DESCRIPTION
Embodiments of the present invention are described in the following with reference to the accompanying drawings.
Embodiments of this invention can provide an authentication label. The authentication label can be used in conjunction with methods for authenticating an item to which the label can be attached. As described herein, the label can be attached by a manufacturer or distributor of an item before the item is distributed to retailers. Customers of the retailers may use a method involving capturing an image of the label or a part thereof using a mobile communications device. Information collected by the mobile communications device in this way can be used to access an entry in a database containing an image of the label and optionally also other information prepared by the manufacturer or distributor of the item. This information can be used for authenticating the item to which the label is attached.
Figures 1 and 2 show first and second embodiments of an authentication label 2. The label 2 can be provided as a tag that can be attached to the item to be authenticated. The item may include packaging, whereby the label can be attached to the packaging. In other examples, the label may be provided on a surface of the packaging or otherwise incorporated into the packaging itself. Note that in some embodiments, the label can be a part of the product itself. For example, the surface on which machine readable code is provided may be a surface or part of a surface of the product. This can be achieved, for example, by application of inks or dyes, or dot peen marking of steel components for example. As noted above, this implementation is particularly suitable for products that are not typically sold in separate packaging.
The label 2 has a surface on which a number of features are provided. The surface can include a logo 8. The logo can be associated with the provider of security system described herein. In other examples, alternative logos such as those associated with the distributor or manufacturer of the item can be provided.
The surface also includes a machine readable code 6. In the examples shown in Figures 1 and 2, the machine readable code comprises a plurality of QR (Quick Response) codes. The use of QR codes is not essential however and it is envisaged that alternative machine readable codes may be used instead. For example, one dimensional barcodes could be used. In the examples of Figures 1 and 2, the label 2 is provided with four QR codes provided in a square array configuration.
The label 2 also includes a visual pattern 4. In the example of Figure 2, the visual pattern 4 includes one or more graphic symbols such as alphanumeric characters 64. A visual pattern 4 of this kind provides, as described below, a high degree of security while minimising the cost associated with producing a label 2. For example, a label of the kind shown in Figure 2 can be printed either directly onto the packaging of an item, onto a separate tag that can be attached to the item or packaging, or onto a surface of the product itself. A label of the kind shown in Figure 2 can, for example, easily be printed using a simple inkjet printer.
The label 2 in Figure 1 has a visual pattern 4 that is produced by mechanically mixing coloured particulates (for example, coloured powders or glitters) in a lacquer. The lacquer can be a clear lacquer. After mixing, the lacquer can be deposited onto the surface of the label 2 to form the visual pattern 4. The security provided by a label of the kind shown in Figure 1 is somewhat stronger than the security provided by the label of Figure 2, since it is extremely difficult or even impossible to reproduce, by copying, the random pattern formed by the coloured particulates in the lacquer. In the examples of Figures 1 and 2, the visual pattern 4 is provided adjacent the machine readable code 6. This allows the machine readable code to be read by a mobile communications device including a camera while also allowing an image of the visual pattern to be captured without the need to direct the camera of the mobile communications device at more than one portion of the label. In the examples of Figures 1 and 2, the visual pattern 4 is provided centrally with respect to the four QR codes. This is however not essential and it is envisaged that an alternative arrangement of the QR codes and an adjacent visual pattern 4 may be used. In accordance with embodiments of this invention, portions of the machine readable code can be used to determine the correct alignment of the visual pattern in an image captured by the mobile communications device. For example, the QR codes shown in Figures 1 and 2 include portions 66 that can be recognised by image processing algorithms for determining a correct portion and orientation of the visual pattern 4 in the captured image. By providing labels having the visual portion 4 in a predetermined position with respect to the portions 66 of the QR codes, an image processing algorithm can determine which part of the image should subsequently be analysed for comparison with a second image stored in a database as described below.
Figure 3 schematically illustrates the various components of an authentication system in accordance with an embodiment of this invention. The components of the system can be interconnected through the internet 100. The authentication system includes a server 20. The server includes a database 22.
The database 22 can store data entries corresponding to the authentication labels 2 to be used by the system. As described in further detail below, the machine readable code 6 on each label 2 is uniquely associated with an address of an entry in the database 22. Each entry in the database 22 can include a previously captured image of the visual pattern 4 on the label 2. As described in further detail below, comparison of the previously captured image held in the database 22 with an image of the visual pattern 4 captured by the mobile communications device of a person wishing to authenticate an item to which the label 2 is attached provides a high degree of security and reliability at relatively low cost. The authentication system can also include an enforcement portion 50. The enforcement portion 50 can include one or more terminals 52. The terminal 52 can be used to receive messages relating to items that have been identified as not being authentic and may also be used to access the server 20 and the database 22. The enforcement portion 50 may be operated by law enforcement. In one example, where the mobile communications device includes is GPS enabled or includes alternative location determining means, the authorities can be directed to the location of the mobile communications device in the event that counterfeit items are determined to be present by the methods described herein. The authentication system further includes a manufacturer or distributor portion 30. The portion 30 can include a camera 32 which is used during manufacture, packaging and/or distribution processing of the item to be authenticated. The camera 32 can provide images that are captured of the visual pattern 4 of each label 2 to an uploader 34. The uploader 34 can also receive information from the systems 36 of the manufacturer or distributor including data associated with the item to which the label 2 is attached. The information including the manufacturer or distributor information and the captured image is collated by the uploader 34 and then uploaded to the database 22 of the server 20 as described in further detail below. While in the present example the database 22 is provided at a separate server 20, whereby the uploader 34 would connect to the server 20 via the internet 100, it is also envisaged that the database 22 may be physically located at the manufacturer or distributor portion 30.
The authentication system further includes a retailer portion 40. The retailer portion can include a EPOS (Electronic Point of Sale) terminal 42. The EPOS terminal 42 can include a camera for capturing an image of the label 2 and/or can include means for reading the machine readable code 6 of the label 2. The EPOS terminal 42 can connect to the server 20 for accessing the database 22 via the internet 100. For this purpose, the retailer portion 40 can be provided with a modem 46 and/or a wireless router 44 connected to the modem 46. The authentication system further includes a customer portion 10. The customer can use a mobile communications device 12 to capture an image of the visual pattern 4 and for reading the machine readable code 6 of a label 2. As described in further detail below, the information relating to the visual pattern 4 and the machine readable code 6 can be sent to the server 20 via the internet 100. The mobile communications device 12 can send this information either via a wireless router 14 (which may be provided as part of the retailer portion 40) or can access the server 20 via a mobile cellular network including one or more masts 102. The same means by which the mobile communication device 12 sends the aforementioned information can be used to return information to the mobile communications device 12 from the server 20.
Figure 4 illustrates a first example of an authentication method according to an embodiment of this invention. The method can be performed by a user of a mobile communications device 12. The user may be a person (e.g. a customer of the retailer) wishing to purchase the item to which an authentication label 2 of the kind described above in relation to Figures 1 and 2 is attached. The person can use the method to determine whether the item itself is genuine and not, for example, stolen or counterfeited. In a first step 60 of the method of Figure 4, the mobile communications device reads a machine readable code 6 that is provided on a surface of an authentication label 2 of the kind described above. The authentication label 2 is associated with the item to be authenticated. For example, the label 2 can be attached to, or included in the packaging of the item. The machine readable code 6 indicates an address in the database 22. In the example of Figure 1, the address is formed from four portions. Each portion is taken from one of the four respective QR codes making up the machine readable code 6. The portions can be concatenated to form the address in the database 22 as described in more detail below.
In a next step 62 of the method of Figure 4 an image of the visual pattern 4 on the label 2 is captured using the mobile communications device 12. For this purpose, the mobile communications device 12 should include a camera. The mobile communications device can include, for example, a smart phone or tablet. The visual pattern 4 is unique to the label 2 on which it is provided. For example, as described above, the provision of a visual pattern 4 including coloured particulates contained in a lacquer is generally unique and impossible to reproduce. Alternatively, in an authentication system using a visual pattern 4 that comprises alphanumeric characters 64 as shown in Figure 2, the characters provided on each label should be provided only on that label and not on any other labels.
The order of the steps 60 and 62 is also not essential to this invention, and can be reversed. Also, it is noted that steps 60 and 62 can be performed in conjunction with each other. For example, in some embodiments a single image of at least part of the label can be captured and the machine readable code 6 can be read from a first part of the image while the visual pattern is contained in a second part of the image. In a next step 64 of the method of Figure 4, the mobile communications device 12 sends data associated with the machine readable code 6 and the captured image to the server 20. This step can be implemented in a number of ways. In some examples, the mobile communications device may simply send an image including the machine readable code 6 and the visual pattern 4 directly to the server 20. In these examples, the server 20 can perform the necessary processing of the captured image for determining the address in the database 22 to be accessed and for processing the captured image of the visual pattern 4.
In alternative examples, the mobile communications device can determine the database address locally and send the address to the server along with the captured image of the visual pattern 4.
In some examples, an image that is captured of the label 2 can be processed to crop out portions of the image that are not needed for the performance of the method. For example, features outside an area of the surface of the label 2 containing the machine readable code 6 and the visual pattern 4 can be cropped out. In other examples, in particular where the mobile communications device 12 reads the machine readable code and determines the database address locally, it is not necessary to send an image of the machine readable code 6 to the server and in these examples the captured image can be cropped to include only the visual pattern 4. In each of the above-described cases, cropping of the captured image can reduce the amount of data that is to be sent to the server 20.
As described above in relation to Figure 3, the data associated with the machine readable code (including either an image of the machine readable code or an address that has been determined from the machine readable code) and the captured image (including at least the visual pattern 4) can be sent to the server via the internet 100.
In a further step 66 of the method of Figure 4, the mobile communications device 12 receives a response from the server 20. The response can include data relating to the authenticity of the items to which the label 2 is attached. This data can include a number of portions.
A first portion can indicate whether or not an entry in the database 22 addressed by the machine readable code 6 contains an image of the visual pattern 4 that matches the image of the visual pattern 4 captured by the mobile communications device 12. Other portions can relate to manufacturer and/or distributor information for the item such as the brand, model, serial number, or date of manufacture. This data can provide an indication as to whether the item is authentic in the sense that the information in the entry in the database 22 of the server 20 either matches or does not match the item that the user of the mobile communications device 12 is attempting to authenticate.
Figure 5 illustrates an example of a GUI that can be displayed on the screen of a mobile communications device 12 in accordance with an embodiment of this invention. The interface 90 includes a number of data fields 92. These data fields can be used to display the information noted above relating to the manufacturer and/or distributor (brand, model, serial number, etc.). Indicators 96 and 98 can be used to indicate whether the item can be considered to be authentic. For example, if the label does not match any label that is contained in the database 22, the indicator 98 can be highlighted to warn the user that the item cannot be authenticated by the label 2.
Indicator 94 can also be provided in some embodiments. On accessing the database 22, it may be determined that the label attached to the item may already have previously been associated with an earlier item that has been sold. This would indicate that the label 2 has been subsequently reattached to a further item which may be similar to the earlier-sold item. Alternatively, it may be determined that the item to which the label 2 is presently attached has already been sold.
The above-described method can be implemented by a user downloading a software application to the mobile communications device 12. The software application can take the form of a computer program product including instructions.
The use of QR codes in accordance with embodiments of this invention provides a very large address space for the database 22. Normally, QR codes indicate a web address that can be scanned by a mobile communications device for accessing the address to present information contained at the address to a user of the device. However, in accordance with embodiments of the present invention, the QR codes are each instead used to indicate part of the address in the database 22 to be accessed. For example, a QR code can typically indicate a maximum of 10 different numbers. By using four separate QR codes and concatenating each of the numbers indicated by each QR code, 10104 unique addresses can be provided.
This huge address space enhances the security of the system since it is very unlikely that a random set of QR codes produced by a potential counterfeiter for producing fake labels will include the correct addresses presently used in the database 22. As mentioned above, the use of the visual pattern 4 and the comparison of captured images of the visual pattern 4 adds to the security provided by the present invention since in addition to providing the correct address in the database 22, the label must also bear the correct visual pattern in order for successful authentication of the item.
An entry in the database can take the form: a$;b$;c$;d$;(IMG)$,(x, A)$;(x, B)$;(x, C$) where a$ is the number stored in first QR code, b$ is the number stored in second QR code, c$ is the number stored in third QR code, d$ is the number stored in fourth QR code, (IMG)$ is the image file from the attached label.
Here, x is a hexadecimal character string. This sets the file record name by use of a data table of the kind shown in table 1, where A, B, C, etc. are the required data entries of the manufacturer or distributor.
Figure imgf000017_0001
Table 1 - Data Table.
Accordingly, table 2 shows examples of data entries in the database using the above described syntax: a$ b$ c$ d$ (IMG)$ (x, A)$ (x, B)$ (x, C)$ (x, D)$
21 34 67 23 * 1, Samsung 2, Galaxy 3, 1234567 4, White
Ace
24 5 64 64 * 1, Samsung 2, Galaxy 4, White 3, 1234568
Ace
24 56 3 5 * 2, Galaxy Ace 1, Samsung 3, 1234569 5, 220
Table 2 - Examples of Database Entries. As can be seen, the x component means the database is very flexible. No fixed file headings are required. Note that the syntax described here is only an example of the layout that can be used. Depending on which database structure is used, other syntaxes could be used to resolve the data string. Figure 6 schematically illustrates the steps in an authentication method to be performed at the server 20 in accordance with an embodiment of this invention. As noted above, a user of a mobile communications device 12 can capture an image of the label 2 and send data associated with the machine readable code 6 and a captured image of the visual pattern 4 to a server. A first step 80 in the method of Figure 6 includes the server 20 receiving this data from the mobile communications device 12. The data can be received via the internet 100.
In a next step 82, the server 20 accesses the database 22. In particular, the server 20 accesses an address in the database 22 indicated by the machine readable code 6 on the label 2. As noted above, the information received from the mobile communications device 12 can include in some examples the address itself or in other examples the information can be an image file received from the mobile communications device 12 which includes the machine readable code 6 in addition to the visual pattern 4. In the latter example, the server 20 can process the received image to determining the address to be accessed in the database 22. On accessing the address in the database 22, the server 20 retrieves data relating to the visual pattern 4. As described below in relation to Figure 7, the previously captured image of the visual pattern 4 can be stored in the database 22 by a manufacturer and/or distributor before the item itself is shipped.
In a further step 84 of the method of Figure 6, the server 20 compares the data relating to the visual pattern 4 that is retrieved from the database 22 at the address indicated by the machine readable code 6 with the captured image of the visual pattern that is received from the mobile communications device 12. This comparison can be performed using conventional image processing algorithms. If the image previously stored in the database 22 is determined to be a match of the captured image of the visual pattern 4 received from the mobile communications device 12, it can be determined that the label itself is not a fake label. However, if the address indicated by the machine readable code 6 either does not exist in the database 22 or contains an image of a visual pattern 4 that does not match the visual pattern on the label 2, the server 20 can thereby determine that the label is false and therefore that an item to which the label is attached may well be counterfeited.
On the other hand, if the label 2 is a genuine label, which is confirmed by a match of the stored image of the visual pattern 4 and the captured image of the visual pattern 4 that is received from the mobile communications device 12, it may still be the case that the genuine label is now attached to a counterfeit item. The server therefore also retrieves from the database 22 the aforementioned manufacturer and/or distributor information for comparison with the item at the retailer portion 40 or the custom portion 10.
In a next step 86 of the method of Figure 6, the server 20 responds to the aforementioned comparison by sending data relating to the authenticity of the item to the mobile communications device 12.
This data can include a confirmation of whether the visual pattern 4 on the label 2 matches the stored image of the visual pattern in the address of the database 22 indicated by the machine readable code 6 on the label 2. This information can be displayed to the user of the mobile communications device 12 using, for example, the indicators 96 and 98 shown in Figure 5. The data sent by the server 20 to the mobile communications device 12 can also include the aforementioned manufacturer and/or distributor information that retrieved from the database entry 22 indicated by the machine readable code 6. This information can be shown in the data fields 92 shown in Figure 5.
A computer program product in accordance with an embodiment of this invention can comprise program instructions to be implemented by a server 20 for performing the method described above. The computer program product described here or described above in relation to the mobile communications device 12 can be provided on a carrier medium such as a CD, DVD, Blu-Ray disc or a memory stick or other solid state memory device.
A further method in accordance with an embodiment of this invention is illustrated in Figure 7. The method of Figure 7 can be used to prepare an item for authentication. The method of Figure 7 may typically be performed by a manufacturer of an item and/or a distributor of the item before the item is shipped for retail.
In a first step 70 of the method of Figure 7, an item to be authenticated is provided. The item can, for example, be a product that is subsequently to be sold at the retailer portion 40. The product can be any kind of product such as food, beverages, consumer electronics, furniture, cigarettes or indeed any other kind of product to which a label of the kind described herein can be attached.
In a next step 72 of the method of Figure 7, an authentication label 2 of the kind described above in relation to Figures 1 and 2 is provided. In some examples, the label can be prepared by the manufacturer and/or distributor. For example, the label shown in Figure 2 can easily be printed by the manufacturer and/or distributor and either attached to or included on a surface of the packaging of the item. In other examples, the label is incorporated into the product itself, and the manufacturer and/or distributor can form the label by providing the machine readable code and visual pattern directly on a surface of the product. Alternatively, the labels may be manufactured separately and supplied to the manufacturer and/or distributor. For example, the entity responsible for maintaining the database 22 at the server 20 can prepare the labels 2 in advance and supply them to the manufacturer and/or distributor. In a next step 74 of the method of Figure 7, the label 2 is associated with the item. This step 74 includes two parts 74 A and 74B. In part 74 A, an image is captured of the visual pattern 4 on the label 2. The image can be captured using the device 32 described above in relation to Figure 3. In a next part 74B, data relating to the captured image of the visual pattern is stored in the database 22 at the address indicated by the machine readable code 6.
As noted in relation to Figure 3, the storage of the captured image can include the uploader 34 sending the captured image to the server 20. In this step, manufacturer and/or distributor information of the kind described above can also be stored at the database address along with the captured image of the visual pattern 4. The uploading of the captured image and any manufacturer and/or distributor information to the server 20 for storage in the database 22 can be performed in a secure manner using conventional encryption techniques to send the information securely via the internet 100. In one embodiment, this can be implemented using a registration process which includes the manufacturer name, and the approved brand names being logged into a user profile. This profile also includes the relevant firmware ID (mac address for example) coupled with the IP address and network fingerprint to provide resilient security for the data upload system. This is a manual data entry process to ensure verification of company details. Filters can be used to check for duplication of brand names and can automatically alert the operator when found. Similarly, the method described above to be performed by the mobile communications device 12 can include sending and receiving information to the server 20 using a secure connection.
After the performance of the above-described method, the manufacturer or distributor is able to ship the item with the label associated therewith to the retailer 40 for sale. Subsequently, a user of a mobile communications device 12 can perform the above described method for accessing the information stored in the database 22 for authenticating the item.
Accordingly, there has been described an authentication label. The label comprises a surface. A machine readable code is provided on the surface. The machine readable code is indicative of an address in a database. A visual pattern is also provided on the surface. The visual pattern is unique to the label. An image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.
Although particular embodiments of the invention have been described, it will be appreciated that many modifications/additions and/or substitutions may be made within the scope of the claimed invention.

Claims

1. An authentication label comprising:
a surface;
a machine readable code provided on the surface, wherein the machine readable code is indicative of an address in a database; and
a visual pattern provided on the surface, wherein the visual pattern is unique to the label,
wherein an image of the visual pattern can be stored in the database at the address indicated by the machine readable code for authenticating an item to which the label can be associated.
2. The authentication label of claim 1, wherein the visual pattern is printed on the surface.
3. The authentication label of claim 1 or claim 2, wherein the visual pattern comprises one or more graphic symbols.
4. The authentication label of claim 3, wherein the graphic symbols comprise alphanumeric characters.
5. The authentication label of claim 1, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
6. The authentication label of any preceding claim, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
7. The authentication label of any preceding claim, wherein the label is attached to the item to be authenticated.
8. A method of authenticating an item, the method comprising a mobile communications device: reading a machine readable code provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database;
capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label;
sending data associated with the machine readable code and the captured image to a server; and
receiving from the server data relating to the authenticity of the item.
9. The method of claim 8, wherein the visual pattern comprises one or more graphic symbols.
10. The method of claim 9, wherein the graphic symbols comprise alphanumeric characters.
11. The method of claim 8, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
12. The method of any of claims 8 to 11, wherein the captured image includes the machine readable code.
13. The method of claim 12, wherein said reading the machine readable code comprises processing the captured image to extract the database address.
14. The method of claim 12, wherein said sending data associated with the machine readable code and the captured image to the server comprises sending the captured image to the server.
15. The method of any of claims 12 to 14, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
16. A computer program product comprising program instructions for implementing the method of any of claims 8 to 15 on a mobile communications device.
17. A mobile communications device operable to authenticate an item by:
reading a machine readable code provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database;
capturing an image of a visual pattern provided on the surface of the authentication label, wherein the visual pattern is unique to the label;
sending data associated with the machine readable code and the captured image to a server; and
receiving from the server data relating to the authenticity of the item.
18. A method of authenticating an item, the method comprising a server:
receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label;
accessing the address in the database to retrieve data relating to the visual pattern;
comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and
in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
19. The method of claim 18, wherein the visual pattern comprises one or more graphic symbols.
20. The method of claim 19, wherein the graphic symbols comprise alphanumeric characters.
21. The method of claim 18, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
22. The method of any of claims 18 to 21, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
23. The method of any of claims 18 to 22, wherein the data retrieved from the database comprises a previously stored image of the visual pattern, wherein the data associated with the captured image of the visual pattern from the mobile communications device comprises a copy of the captured image, and wherein said comparing comprises comparing the previously stored image and the captured image.
24. A computer program product comprising program instructions for implementing the method of any of claims 18 to 23 on a server.
25. The computer program product of claim 16 or claim 24 on a carrier medium.
26. A server operable to authenticate an item by:
receiving from a mobile communications device data associated with a machine readable code and a captured image of the visual pattern, wherein the machine readable code and the visual pattern provided on a surface of an authentication label associated with the item, wherein the machine readable code is indicative of an address in a database, and wherein the visual pattern is unique to the label;
accessing the address in the database to retrieve data relating to the visual pattern;
comparing the data relating to the visual pattern retrieved from the database with the data associated with the captured image of the visual pattern received from the mobile communications device; and
in response to said comparison, sending data relating to the authenticity of the item to the mobile communications device.
27. A method of preparing an item for authentication, the method comprising:
providing an item;
providing an authentication label comprising:
a surface;
a machine readable code provided on the surface, wherein the machine readable code is indicative of an address in a database; and
a visual pattern provided on the surface, wherein the visual pattern is unique to the label, and
associating the label with the item by:
capturing an image of the visual pattern; and
storing data relating to captured image of the visual pattern in the database at the address indicated by the machine readable code. 28. The method of claim 27, wherein the visual pattern is printed on the label.
29. The method of claim 27 or claim 28, wherein the visual pattern comprises one or more graphic symbols. 30. The method of claim 29, wherein the graphic symbols comprise alphanumeric characters.
The method of claim 30, wherein the visual pattern comprises coloured particulates suspended in a lacquer.
The method of any of claims 27 to 31, wherein one or more parts of the machine readable code on the label define the position of an imaging region on the label, wherein the visual pattern is located in the imaging region.
The method of any of claims 27 to 32, further comprising attaching the label to the item.
34. An authentication label substantially as hereinbefore described, with reference to the accompanying drawings.
35. A method of authenticating an item substantially as hereinbefore described, with reference to the accompanying drawings.
36. A method of preparing an item for authentication substantially as hereinbefore described, with reference to the accompanying drawings. 37. A computer program product substantially as hereinbefore described, with reference to the accompanying drawings.
38. A server substantially as hereinbefore described, with reference to the accompanying drawings.
PCT/GB2015/050044 2014-01-10 2015-01-09 Authentication system, method and label WO2015104561A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1400419.6 2014-01-10
GB1400419.6A GB2522189A (en) 2014-01-10 2014-01-10 Authentication system, method and label

Publications (1)

Publication Number Publication Date
WO2015104561A1 true WO2015104561A1 (en) 2015-07-16

Family

ID=50191152

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2015/050044 WO2015104561A1 (en) 2014-01-10 2015-01-09 Authentication system, method and label

Country Status (2)

Country Link
GB (1) GB2522189A (en)
WO (1) WO2015104561A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200226772A1 (en) * 2019-01-13 2020-07-16 Hunan Agricultural Information And Engineering Institute Anti-counterfeiting method based on feature of surface texture image of products

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2581860A1 (en) * 2011-10-10 2013-04-17 Zortag, Inc. Method, system, and label for authenticating objects
US20130170758A1 (en) * 2011-12-28 2013-07-04 Venkatesh G Low cost unique identification generation using combination of patterns and unique code images

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2783077B1 (en) * 1998-09-07 2001-09-28 Renaud Blavignac IMPROVED LABEL FOR PRODUCT IDENTIFICATION, AND CORRESPONDING SYSTEM AND IDENTIFICATION METHOD
CN102236779A (en) * 2010-04-27 2011-11-09 汉斯·杰里·乌尔本·彼得森 Anti-counterfeiting method by using two different codes at least
WO2012175878A1 (en) * 2011-06-21 2012-12-27 Advanced Track & Trace Method and device for authenticating a tag
EP2849118B1 (en) * 2012-05-07 2018-01-10 Han Yong Cho Method for generating authentication code of label
CN103489109A (en) * 2013-08-26 2014-01-01 郑国义 Three-dimensional entity secret mark anti-counterfeiting system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2581860A1 (en) * 2011-10-10 2013-04-17 Zortag, Inc. Method, system, and label for authenticating objects
US20130170758A1 (en) * 2011-12-28 2013-07-04 Venkatesh G Low cost unique identification generation using combination of patterns and unique code images

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200226772A1 (en) * 2019-01-13 2020-07-16 Hunan Agricultural Information And Engineering Institute Anti-counterfeiting method based on feature of surface texture image of products

Also Published As

Publication number Publication date
GB2522189A (en) 2015-07-22
GB201400419D0 (en) 2014-02-26

Similar Documents

Publication Publication Date Title
US9449325B2 (en) System and method for authenticity verification
US9010654B2 (en) Monitoring moving articles
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
EP3311336B1 (en) Authentication feature in a barcode
US9076024B2 (en) Anti-counterfeiting system and method
CN104428798B (en) Method for clear and definite tagged object
US8903181B2 (en) Low cost unique identification generation using combination of patterns and unique code images
US20050049979A1 (en) Method, apparatus, and system for determining a fraudulent item
US20080156874A1 (en) Remote Authentication System
JP7342317B2 (en) Method and system for anti-counterfeiting protection of articles
US20020146146A1 (en) Using digital watermarks to facilitate counterfeit inspection and inventory management
US20150151560A1 (en) Method for protecting the authenticity of an article from imitation and counterfeit
CN101356538A (en) Method of authentication of items put into circulation field
KR20140040231A (en) Method and device for authenticating a tag
US20100188709A1 (en) Variable data addition method and system
JP2017208032A (en) Authenticity determination method
US10192299B2 (en) Method of and system for verifying authenticity of packaged items
US10977534B1 (en) Compositions, systems, and methods for unique identifiers embedded in machine verifiable marks having error correction features
WO2015104561A1 (en) Authentication system, method and label
WO2017180479A1 (en) System and method for product authentication and anti-counterfeiting
GB2524558A (en) Authentication system, method and label
US20190156090A1 (en) Warranty tracking method for a consumer product
JP2009184754A (en) Goods authenticity determination system, goods authenticity determination program, and recording medium
CN110503437A (en) Based on the article anti-counterfeit method more identified and its system
CN113743555A (en) Composite two-dimensional code system with calibration function

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15703805

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15703805

Country of ref document: EP

Kind code of ref document: A1