WO2017116303A1 - Secure dual-mode anti-counterfeit product authentication methodology and system - Google Patents

Secure dual-mode anti-counterfeit product authentication methodology and system Download PDF

Info

Publication number
WO2017116303A1
WO2017116303A1 PCT/SG2015/050513 SG2015050513W WO2017116303A1 WO 2017116303 A1 WO2017116303 A1 WO 2017116303A1 SG 2015050513 W SG2015050513 W SG 2015050513W WO 2017116303 A1 WO2017116303 A1 WO 2017116303A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
tag
authenticity
authentication client
client
Prior art date
Application number
PCT/SG2015/050513
Other languages
French (fr)
Inventor
Liyu Liu
Kok Leong TOH
Original Assignee
Egide Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Egide Pte Ltd filed Critical Egide Pte Ltd
Priority to PCT/SG2015/050513 priority Critical patent/WO2017116303A1/en
Publication of WO2017116303A1 publication Critical patent/WO2017116303A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles

Abstract

An anti-counterfeit product identification system and method for determining the authenticity of a product using Near Field Communication (NFC) technologies, Smartcard technology, mobile devices and integrated software applications. The manufactured product contains a manufacturer identification code included during the manufacturing process, from the manufacturer. The same product is embedded with a tag enabled with NFC technology and marked with a unique identification number and an encrypted secret code. An authentication client contains an authentication software application which will be activated to read the manufacturer identification code and the data found in the said tag. The authentication client and the said tag will undertake a series of mutual authentication processes before verifying the authenticity of the product. Thereafter, the first-level authenticity result will be transmitted to the user. The user can proceed to authenticate further by going online and being connected to a secure encrypted authentication server. By going online, the user will engage the configured application in the authentication client to communicate with the encrypted authentication server and compare the paired data from the first-level authenticity step with the secured code in the server, thereby fully authenticating the product and which the second-level authenticity result is transmitted to the user through the authentication client.

Description

SECURE DUAL-MODE ANTI-COUNTERFEIT PRODUCT AUTHENTICATION
METHODOLOGY AND SYSTEM
FIELD OF THE INVENTION
[0001 ] The present invention relates to a system and method of verifying the authenticity of products. In particular, the present invention utilises Near Field Communication (NFC) technologies, Smartcard technology, mobile devices and integrated software applications to confirm the authenticity of the product.
BACKGROUND AND/OR RELATED AND/OR PRIOR ART
[0002] Counterfeiting remains a serious problem for businesses all over the world. The manufacture and production of counterfeit branded products have increased steeply over the years costing hundreds of millions of dollars each year.
[0003] According to the Global Impact Study Report entitled "Estimating the global economic and social impacts of counterfeiting and piracy" - a report commissioned by "Business Action To Stop Counterfeiting and Piracy" or "BASCAP" (February 201 1 ), by 2015, the International Chamber of Commerce (ICC) expects the value of counterfeit goods globally to exceed USD 1 .7 trillion. Based on the figures above, it appears that counterfeiters are no longer limited to simple peddlers of cheap imitations sold on the black market, but is a substantial, and sophisticated if illegitimate business.
[0004] Since the onset of globalisation and outsourcing, counterfeits are given opportunities to now infiltrate worldwide distribution chains and supply chains. The difficulty for distributors and manufacturers in identifying these counterfeits further exposes them to liability claims, whereby the counterfeits cause harm to consumers, product recalls and expensive lawsuits.
[0005] Today, the deluge of counterfeits extends to a wide variety of goods ranging from software and medicine to luxury goods and detergent to car parts. Nevertheless, watches, bags, clothing, jewellery and perfume continue to make up the bulk of the goods seized at borders. [0006] Existing ways of detecting counterfeits rely on holograms, Radio Frequency
Identification (RFID) tags, QR codes and tamper-proof labels at the manufacturing or shipping stages. After these initial stages, the products are subsequently verified at the retail end. Unfortunately, even though these products have been tagged with the necessary anti- counterfeit tags, counterfeit goods continue to enter into high-end retail stores. This shows that the existing ways of utilising holograms, RFID tags and QR codes are not sufficient in preventing counterfeit products from entering the market and are therefore unreliable to that extent.
[0007] Further, existing technologies relying on RFID tags, QR codes and tamper-proof labels require specialised readers to read the information on the product. If these readers fall into the wrong hands, counterfeiters will easily be able to manipulate the system and duplicate its own RFID tags and QR codes such that customers will not be able to tell a counterfeit from an original. When this happens, customers will not also not be able to track and trace the product through its original distribution line and therefore, will not be able to tell if the store- bought product is genuine or otherwise.
[0008] It should also be noted that most of the time, these RFID tags, QR codes and tamper-proof labels are visible to the human eye. As a result of this, counterfeiters can easily duplicate the tags and codes and forge them accordingly. Customers who are not savvy will therefore not be able to tell if an RFID tag or a QR code are indeed authentic or have been tampered with if not duplicated.
[0009] However, even if consumers and manufactures are able to track and trace the products via the said tags and generally detect a counterfeit, the state of existing technologies today still require a more robust, sophisticated, holistic and multi-layered approach to authenticate products in the market.
[0010] In this regard, there are still many loopholes that can be manipulated by a counterfeit at different stages of a product's distribution and supply chain, after which the customer will not be able to look out for ways to ascertain the product's authenticity. [001 1 ] US Patent No. 8,108,309 discloses a method and system for protecting an item from counterfeiting. Each item is marked with an identifier, such as a serial number along with a code generator that has secret functions and data for generating verification codes. The item is subsequently supplied along with the corresponding code generator. Relying heavily on various types of code generators such as a hardware device, a software installed in the manufactured item and software installed in a device that is associated with the manufactured item, this patent may be potentially complicated for manufacturers and customers of the like. Even though the patent explains the functions of each type of code generator, it does not clearly explain the circumstances where each code generator might be best applied in. Simply put, there is no definite way to tell which type of code generator is preferred in relation to authenticating manufactured items.
[0012] Moreover, US Patent No. 8,108,309 involves providing an authentication method similar to that of the 2 factor authentication (2FA) which is dependent on a separate hardware which does not have a physical security layer, and authentication needs to be carried out within a very short period of time or it will not be successful. Further, out of the 3 authentication processes mentioned, only the authentication process done remotely over the desktop is relatively the most secure out of the 3, as the others involve the introduction of another entity which can compromise the overall security.
[0013] Further, this invention also teaches that the manufacturer is the main provider of the verification service. Under this authentication process, an item is first associated with an item identifier. Thereafter, the item identifier is associated with the code generator secrets. This process should be seen as a limitation of the invention because the authentication and verifiability is controlled by one single entity - that is the manufacturer. This is dangerous because the manufacturer should not be placed as the ultimate verifier of the product as he / she would be able to manipulate the code generator secrets and thereby, manipulating the authentication process. When this happens, customers will not be able to verify again whether the authentication process is legitimate.
[0014] Other leading authentication technologies that are currently available but does not address the current problems are as follows: 1 . Barcode/QR Code Authentication- While scanning can be done by most smartphones today, it is common knowledge that the source is vulnerable to duplication and more often than not are duplicated as there is no security feature to the barcode or QR Code authentication technology. Unlike barcode/QR, the current invention uses Smartchip technology which has a physical security layer and cannot be duplicated due to its unique identity.
2. RFID Authentication- There are many solutions in the market which depict RFID being used as an anti-counterfeit solution as RFID is said to be able to track and trace and provide asset visibility. However, it is common knowledge that RFID does not offer any form of physical security on a tag as it can be easily replicated given that the Electronic Product Code (EPC) can be duplicated by a counterfeiter. The only form of security lies mainly in the back-end system, such as the Asset Management System, Inventory Control System, amongst others.
3. Holographic Authentication- It is a common belief that holograms cannot be counterfeited. However, the truth is that it is easy to counterfeit the holograms that are commonly used today in security applications, and studies have shown that holograms have been counterfeited more than once. Methods of duplicating hologram includes, mechanical copying, contact printing, 2 step copying, remastering and simulation amongst others (Hologram Counterfeiting: Problems and Solutions, Proc. SPIE Vol. 1210, pp. 66-76, Optical Security and Anti-counterfeiting Systems, William F. Fagan; Ed. (SPIE Homepage) April 1990).
Biometric Authentication- Biometric identification is a statistical process. Variations in conditions between enrolment and acquisition as well as bodily changes (temporary or permanent) mean that there is never a 100% match. Fraudulent reproduction of biometric data is possible; this depends heavily on the modality, application and resources being considered and availability of the data to be reproduced (John R. Vacca, Biometric Technologies and Verification Systems, Chapter 27, pp. 451 - 452, (2007, Elsevier, Inc.).
[0015] This invention therefore seeks to address and solve the abovementioned gaps which currently plague the use of existing anti-counterfeiting technologies.
SUMMARY OF THE INVENTION [0016] The present invention relates to a dual-mode authentication system whereby each product is marked with a unique combination of a manufacturer identification code, and a physical tag-enabled Near Field Communication ("NFC") technology ("NFC-enabled tag") at the production stage. The information on the tag is encrypted and a secret code is randomly generated. This information is stored in an authentication server. In the preferred embodiment, the authentication server can be a physical server located with the manufacturers. It other embodiments, it is envisaged that the server can also be cloud-based and maintained by the service providers (inventors) or the manufacturers may also choose to locate the physical servers with the same service providers (inventors).
[0017] Under the offline authentication mode, the authentication client validates the authenticity of the NFC-enabled tag without connecting to the internet network. In this instance, the user will first use the authentication client to read and/or input the manufacturer identification code (which is visible to the user) into the authentication client. Thereafter, the user will scan the NFC-enabled tag using the authentication client, thereby reading the secret code. A mutual product authentication process is thus initialised between the authentication client and the NFC- enabled tag and eventually the product is authenticated. Once authenticated, there will be a series of information displayed on the screen of the authentication client, confirming that the product is genuine. In the preferred embodiment, the displayed information would include the authentication success logo, product item name, manufacturing date, manufacturing location, product serial number and the product batch number, although a different combination of the same and other related product data may be displayed in other embodiments.
[0018] Under the online authentication mode, product authentication is further established by connecting to an encrypted authentication server through an authentication network. The authentication client requires the customer to input the manufacturer identification code of the product to the authentication client either manually or by scanning the manufacturer identification code with the authentication client. By doing so, the unique encrypted secret code of the NFC-enabled tag will be matched with the unique manufacturer identification code of the product ("Paired Data"). The authentication client reads the Paired Data whilst the authentication server later processes the Paired Data, thereby, matching the Paired Data with the data stored in the database. BRIEF DESCRIPTON OF THE DRAWINGS
[0019] The following descriptions, considered together with the accompanying drawings will provide more clarity and comprehension of the present invention, wherein:
FIG. 1 shows an overview of the dual-mode product authentication system. FIG. 2 shows an illustration of the offline authentication process. FIG. 3 shows an illustration of the online authentication process. FIG. 4 shows a diagram of the mutual authentication sequence.
DETAILED DESCRIPTION OF THE INVENTION
[0020] The present invention relates to a system and method for determining the authenticity of goods. The following description of the present invention will be described in relation to the general features of the method and system and subsequently, in 2 embodiments, an offline method and an online method.
[0021 ] The present invention is not limited to luxury goods but also applies to any other type of product that is not listed here. Therefore, the reference to product herein refers to any kind of manufactured product or item, unless stated otherwise.
[0022] FIG. 1 provides a general overview of the dual-mode product authentication system. The dual-mode product authentication system comprises of an authentication server 10, an authentication client 11 , and a product 12, embedded with a NFC-enabled tag. Each product 12 has a unique manufacture identification code 13, which is visible and is assigned by the original manufacturer at the initial stage of manufacture. The unique manufacture identification code 13, can be represented in the following forms: 1 ) product serial number or an identification number printed on another product label affixed to the product which is visible to the human eye; 2) a product serial number or an identification number printed on a product label which contains the said tag affixed to the product which is visible to the human eye; and 3) a product serial number or an identification number printed on a warranty card or guarantee certificate accompanied with the product. The unique manufacture identification code can be in the form of alphanumeric characters a barcode or even a QR code.
[0023] The product is also equipped with a NFC-enabled tag which contains an encrypted secret code 14 which is covert and invisible to the human eye. The NFC-enabled tag can be authenticated repeatedly by the authentication client 11 , as long as the tag is not damaged.
[0024] The authentication client 11 consists of a platform which delivers authentication service in the form of software applications that have been pre-configured using an algorithm that is able to authenticate the encrypted secret code found in the said tag. The authentication client 11 which is connected to a secure network 15 comprises of a portable data processing device, which may include an Android-based smart phone, a Windows portable handheld and/or an iOS-enabled device. In the preferred embodiment, the user uses his or her own mobile device or handheld as the authentication client for greater security, although the user may also rely on other third party's devices if so desired.
[0025] The encrypted authentication server 10 is configured to receive authentication request from the authentication client 11 in order to further verify the product 12. The authentication server 10 can be in the form of a physical server connected to a database 16, containing a list of the Paired Data of the manufacturer identification code 13 and the tag's encrypted secret code 14, and other relevant data.
[0026] In one embodiment, a customer who wishes to purchase the product 12 from the retailer, has the option to register for a user account on the product using a designated PC system. After registration of the product is complete, a web link will be provided so that the customer can install the authentication client application 11 onto the customer's mobile device. Once the said authentication client application 11 has been installed, the customer's mobile device is now an authentication client that can be used to verify the authenticity of the product.
[0027] In another embodiment, customers can also register and carry out authentication at his / her own convenience by self-downloading and installing the encrypted authentication client application 11 onto his / her mobile devices. This can be done before or after the purchase of the product 12.
[0028] One main advantage of this present invention is that it is also available for brand owners or authorised regulatory bodies (e.g. custom officials or enforcement agencies). Like the customers, brand owners and regulatory bodies can also use the authentication client application 11 to perform random checks of products that are released in the market, or when required at custom checkpoints, warehouses, stores etc. This authentication client application 11 is anticipated to be especially useful for enforcement agencies to investigate and verify in the event of customer complaints and/or reports of "suspected" or known counterfeit products.
[0029] FIG. 2 shows an illustration of the offline authentication method. The customer uses the authentication client 20 to scan the NFC-enabled tag and execute mutual authentication process with the tag. Upon communicating with the NFC-enabled tag, an authentication response consisting of a self-generated challenge "A" data 25 is generated and sent to the authentication client 20. The authentication client 20 processes the self-generated challenge "A" data and responds appropriately, and sends a further self-generated challenge "B" data 26 back to the NFC-enabled tag. The NFC-enabled tag then verifies the said challenge "A" data received and process the said challenge "B" data 26 before responding back to the authentication client 20. Upon receiving the response, the authentication client 20 verifies the challenge "B" data.
[0030] If the product is authentic, a success message, along with product details including date of manufacture and source of manufacturing, are displayed on the screen of the authentication client, thereby, identifying the authenticity of the product instantly. However, if the product is not identified as authentic, a failure message is displayed on the screen of the authentication client 20, thereby, identifying that the product is questionable and ought to be returned to the vendor selling the product. The customer should subsequently notify the brand and/or relevant authorities of the questionable product.
[0031 ] FIG. 3 shows an illustration of the online authentication process. Under the online authentication process, product authenticity is carried out by the authentication client 32 connecting to an encrypted authentication server 30. The authentication client 32 requests the customer to input the unique manufacturer identification code of the product 34 manually or by scanning the unique manufacturer identification code using the authentication client 32. The unique manufacturer identification code of the product can be in the form of certificate, warranty card or invoice generated at the point of purchase of the product 33.
[0032] The authentication client 32 pairs the encrypted secret code 35 and the unique identification number of the tag with the unique manufacture identification code of the product 34 and stores this Paired Data accordingly. The authentication client 32 then makes a product authentication request and delivers the Paired Data to the encrypted authentication server 30 through a secure network 36 for processing and verification.
[0033] The communication between the authentication client 32 and the encrypted authentication server 30 shall involve the use of at the very least, industry standards, in order to protect the privacy of the communication, thereby assuring that communication is carried out in a secure manner. This will prevent any form of data-tampering and eavesdropping. The authentication client 32 shall start the Secure Socket Layers ("SSL")/ Transport Layer Security ("TLS") negotiation protocol with the authentication server 30 to establish a SSL/TLS session. Once the secure session is duly established, data exchanged shall be in encrypted form and can only be decrypted by the authentication client 32 and the encrypted authentication server 30. Once the relevant data exchange is complete, the secure session is terminated.
[0034] The encrypted authentication server 30 then processes and compares the encrypted secret code 35 with the manufacturer identification code. The encrypted authentication server 30 then provides the authentication response back to the authentication client 32 in a secure manner. When both data matches, the product 33 is said to be authenticated.
[0035] When the product 33 is identified as authentic, a success message, along with product details including date of manufacture, source of manufacturing and an image of the product are displayed on the screen of the authentication client 32, thereby identifying and confirming the authenticity of the product. [0036] When the product 33 is not identified by the authentication client 32 as authentic, a failure message is displayed on the screen of the authentication client 32, and thereby confirming that the authenticity of the product 33 is questionable and ought to be returned to the vendor selling the product 33. In the preferred embodiment, the failure message will indicate that the authentication is invalid, although the failure message may also feature other representations depicting an unsuccessful attempt. The customer should subsequently notify the brand owner and relevant authorities of the questionable product.
[0037] FIG. 4 shows a flowchart of the preferred embodiment of the proposed mutual authentication process sequence of this present invention. The mutual authentication process, available in the offline method, involves 2 entities whereby the authentication client 40 sends an authentication request to commence communication between the authentication client and the NFC-enabled tag 41. The NFC-enabled tag 41 responds with a self-generated challenge "A" data 43 and sends it to the authentication client 40. The authentication client 40 processes the self-generated challenge "A" data 43 and subsequently, sends the correct response to "A" and another self-generated challenge "B" data 42 to the NFC-enabled tag 41.
[0038] The NFC-enabled tag 41 verifies both sets of data to authenticate the product. If verification of the product is successful, the NFC-enabled tag 41 processes the self-generated challenge "B" data 42 to the authentication client 40 for further verification. If the verification passes, the mutual authentication is said to be successful. However, if the verification fails, the authentication client 40 will terminate the communication with the NFC-enabled tag 41. In this regard, mutual authentication has then failed accordingly.

Claims

CLAIMS We claim:-
1 . An anti-counterfeit product authentication system for determining the authenticity of goods, the system comprising: at least one product having a unique manufacturer identification code which may be a product serial number or identification number, containing either alphanumeric characters, barcode or a QR code; a tag using the Near Field Communication (NFC) technology which contains a unique identification number and an encrypted secret code, which tag is invisible to the human eye; and an authentication client such as a mobile device configured to communicate with the tag; wherein the user is able to initialise the series of steps in the authentication process without having to be connected to the internet or any online network.
2. The anti-counterfeit product authentication system in Claim 1 , wherein said tag can be embedded in the product label, the product and/or adhered to the surface of the product.
3. The anti-counterfeit product authentication system in Claim 2 wherein said tag can be used in the authentication process repeatedly without any limit to the number of times it is read by the authentication client, as long as the tag is not damaged.
4. The anti-counterfeit product authentication system in Claim 1 , wherein said authentication client consists of applications that have been pre-configured using an algorithm to be able to authenticate the encrypted secret code found in said tag.
5. The anti-counterfeit product authentication system in Claim 1 , wherein said authentication client is securely protected to prevent it from being decompiled and/or reversed engineered and/or tampered with.
6. The anti-counterfeit product authentication system in Claim 1 , wherein said authentication client comprises a portable data processing device.
7. The anti-counterfeit product authentication system as claimed in Claim 1 wherein in the event said product is identified by the authentication client as authentic, a success message, along with product details including date of manufacture and source of manufacturing, are displayed by the software application, and thereby confirming the authenticity of the product instantly.
8. The anti-counterfeit product authentication system as claimed in Claim 1 wherein in the event said product is not identified by the authentication client as authentic, a failure message is displayed by the mobile application, and thereby identifying that the authenticity of the product is questionable and ought to be returned to the vendor selling the product for further investigation.
9. An anti-counterfeit product authentication system for determining authenticity of goods, the system comprising: at least one product having a manufacturer identification code which may be a product serial number or identification number, containing either alphanumeric characters, barcode or QR code; a tag using the Near Field Communication (NFC) technology which contains a unique identification number and an encrypted secret code, which tag is invisible to the human eye; and an authentication client such as a mobile device configured to communicate with the tag; and an authentication server; wherein the user is able to connect with the internet network and thereby receive the second-level authentication results.
10. The anti-counterfeit product authentication system in Claim 9, wherein said encrypted authentication server is configured to receive the authentication request from said authentication client in order to conduct a further validation of the product.
1 1 . The anti-counterfeit product authentication system as claimed in Claim 10, wherein said encrypted authentication server is in the form of a physical server containing a stored list of said manufacturer identification code and said tag's encrypted secret code, along with other related data.
12. The anti-counterfeit product authentication system as claimed in Claim 10, wherein said encrypted authentication server comprises a virtual server connected to a database containing a stored list of said manufacturer identification code and said tag's encrypted secret code, along with other related data.
13. The anti-counterfeit product authentication system as claimed in Claim 9 wherein in the event said product is identified by the authentication client as authentic, a success message, along with product details including the image of the product, date of manufacture and source of manufacturing, are displayed by the software application, and thereby confirming the authenticity of the product instantly.
14. The anti-counterfeit product authentication system as claimed in Claim 9 wherein in the event said product is not identified by the authentication client as authentic, a failure message is displayed by the mobile application, and thereby identifying that the authenticity of the product is questionable and ought to be returned to the vendor selling the product for further investigation.
15. A method for identifying the authenticity of a manufactured item when offline, the method comprising the steps of: embedding the product with a tag enabled with Near Field Communication (NFC) technology, containing a unique identification number and an encrypted secret code; activating an authentication application in the authentication client; establishing a communication link between the tag enabled with the Near Field Communication (NFC) technology and the authentication client; authenticating all the gathered data by making mutual product authentication requests and verification, specifically by reading the unique identification number and encrypted secret code of the tag, and verifying with the data stored in the authentication client; and transmitting the first level authenticity result and other product-related data to the user.
16. The method as claimed in Claim 15, wherein said tag enabled with the Near Field Communication (NFC) technology provides an authentication response consisting of a self-generated challenge query once said communication link is established.
17. The method as claimed in Claim 16, wherein said challenge query is met with a response and a second challenge query, which is met by a final response.
18. The method as claimed in Claim 17 wherein in the event said product is identified by the authentication client as authentic, a success message, along with product details including date of manufacture and source of manufacturing, are displayed on the screen of the authentication client, and thereby identifying the authenticity of the product instantly.
19. The method as claimed in Claim 17 wherein in the event said product is not identified by the authentication client as authentic, a failure message is displayed on the screen of the authentication client, and thereby identifying that the authenticity of the product is questionable and ought to be returned to the vendor selling the product for further investigation.
20. A method for identifying the authenticity of a manufactured item when online, the method comprising the steps of: connecting to the encrypted authentication server if the first level authenticity result of the verification is successful, through an encrypted network; requesting for the user to input the unique secure code of the product to the authentication client either manually or by scanning the unique secure code using the mobile device; pairing the encrypted secret code and the unique identification number of the tag with the unique secure code of the product itself; storing the paired data in the authentication client; authenticating the product by reading the unique identification number and encrypted secret code of the tag, and verifying with the data stored in the authentication client; authenticating all the verified data and delivering said verified data from both the authentication client and the tag enabled with the Near Field Communication (NFC) technology to the encrypted authentication server through a secure network for processing; and transmitting the second level authenticity result and other product-related data result to the user.
21 . The method as claimed in Claim 20, wherein the encrypted authentication server processes and compares the encrypted secret code with the unique code provided and recorded by the original manufacturer of the product, before comparing with the set of paired data stored in the encrypted authentication server database.
22. The method as claimed in Claim 21 , wherein the encrypted authentication server further provides the authentication response back to the authentication client in a secure manner.
23. The method as claimed in Claim 22, wherein the encrypted authentication server further verifies the authentication information that passes through the secure network that will only respond when the paired data is indeed matched and authenticated.
24. The method as claimed in Claim 20, wherein said second level authenticity result is in the form of an image to be displayed on the screen of the authentication client.
25. The method as claimed in Claim 20, wherein in the event said product is identified by the authentication client as authentic, a success message, along with product details including date of manufacture, source of manufacturing, and an image of the product are displayed on the screen of the authentication client, thereby identifying the authenticity of the product instantly. The method as claimed in Claim 20, wherein in the event said product is not identified by the authentication client as authentic, a failure message is displayed on the screen of the authentication client, and thereby identifying that the authenticity of the product is questionable and ought to be returned to the vendor selling the product for further investigation.
PCT/SG2015/050513 2015-12-29 2015-12-29 Secure dual-mode anti-counterfeit product authentication methodology and system WO2017116303A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SG2015/050513 WO2017116303A1 (en) 2015-12-29 2015-12-29 Secure dual-mode anti-counterfeit product authentication methodology and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2015/050513 WO2017116303A1 (en) 2015-12-29 2015-12-29 Secure dual-mode anti-counterfeit product authentication methodology and system

Publications (1)

Publication Number Publication Date
WO2017116303A1 true WO2017116303A1 (en) 2017-07-06

Family

ID=55174694

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2015/050513 WO2017116303A1 (en) 2015-12-29 2015-12-29 Secure dual-mode anti-counterfeit product authentication methodology and system

Country Status (1)

Country Link
WO (1) WO2017116303A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364182A (en) * 2017-11-21 2018-08-03 阿里巴巴集团控股有限公司 A kind of commodity antifake check method, device and equipment
EP3503001A1 (en) * 2017-12-20 2019-06-26 Mastercard International Incorporated Authentication of goods
WO2019237096A1 (en) * 2018-06-09 2019-12-12 Sneaker Con Digital Inc. Systems, methods, and devices for authentication of a product
WO2021037905A1 (en) * 2019-08-27 2021-03-04 Thales System and method for identifying a user terminal forming part of an entertainment system for a mobile passenger-transport apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2065849A1 (en) * 2007-11-30 2009-06-03 Sap Ag Detection of counterfeited products based on sensor measurements
US20100001840A1 (en) * 2008-07-07 2010-01-07 You Sung Kang Method and system for authenticating rfid tag
US8108309B2 (en) 2007-05-29 2012-01-31 Provalidate Protecting a manufactured item from counterfeiting
US20130320079A1 (en) * 2012-06-01 2013-12-05 Panduit Corp. Anti-Counterfeiting Methods
US20150106113A1 (en) * 2012-02-13 2015-04-16 Tresbu Technologies Pvt. Ltd. Near Field Communication (NFC) Based Counterfeit Product Identification System

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8108309B2 (en) 2007-05-29 2012-01-31 Provalidate Protecting a manufactured item from counterfeiting
EP2065849A1 (en) * 2007-11-30 2009-06-03 Sap Ag Detection of counterfeited products based on sensor measurements
US20100001840A1 (en) * 2008-07-07 2010-01-07 You Sung Kang Method and system for authenticating rfid tag
US20150106113A1 (en) * 2012-02-13 2015-04-16 Tresbu Technologies Pvt. Ltd. Near Field Communication (NFC) Based Counterfeit Product Identification System
US20130320079A1 (en) * 2012-06-01 2013-12-05 Panduit Corp. Anti-Counterfeiting Methods

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Proc. SPIE", vol. 1210, April 1990, article "Hologram Counterfeiting: Problems and Solutions", pages: 66 - 76
JOHN R. VACCA: "Biometric Technologies and Verification Systems", 2007, ELSEVIER, INC., pages: 451 - 452

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364182A (en) * 2017-11-21 2018-08-03 阿里巴巴集团控股有限公司 A kind of commodity antifake check method, device and equipment
TWI729857B (en) * 2017-11-21 2021-06-01 開曼群島商創新先進技術有限公司 Commodity anti-counterfeiting verification method, device and equipment
EP3503001A1 (en) * 2017-12-20 2019-06-26 Mastercard International Incorporated Authentication of goods
US11151579B2 (en) 2017-12-20 2021-10-19 Mastercard International Incorporated Authentication of goods
WO2019237096A1 (en) * 2018-06-09 2019-12-12 Sneaker Con Digital Inc. Systems, methods, and devices for authentication of a product
WO2021037905A1 (en) * 2019-08-27 2021-03-04 Thales System and method for identifying a user terminal forming part of an entertainment system for a mobile passenger-transport apparatus
FR3100413A1 (en) * 2019-08-27 2021-03-05 Thales System and method for identifying a user terminal forming part of an entertainment system for a mobile passenger vehicle

Similar Documents

Publication Publication Date Title
US9256881B2 (en) Authenticating and managing item ownership and authenticity
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
JP5149909B2 (en) Data access control with RFID devices
EP3241303B1 (en) Methods, systems and apparatus for recognizing genuine products
JP5139415B2 (en) Article information acquisition method and apparatus
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
US20190347888A1 (en) Document authentication system
JP2004252621A (en) Product authentication system preventing market distribution of fake
WO2016019456A1 (en) Id tag authentication system and method
CN104992335A (en) Full-circulation type two-dimensional code anti-counterfeiting system and realization method thereof
JP2009211448A (en) Product certification system
KR101527582B1 (en) System for verifying product genuineness using double security key and method thereof
CN105849739B (en) Authentication system and authentication method
TW202040432A (en) Verification system and method thereof capable of preventing the imitation of wireless identification tags
KR101192972B1 (en) An authenti cation system for anti-forgery using the smart card chip and method of thereof
GB2564543A (en) Product or document authentication system
WO2018002945A1 (en) Anti-counterfeiting system and method thereof
KR101298224B1 (en) Authentication method using 2-dimensional code
CN110728524A (en) Article tracing method, electronic device and readable storage medium
CN111951032A (en) Third-party article anti-counterfeiting authentication method
TW201503005A (en) A system and method for authentication
GB2520801A (en) Method for protecting the authenticity of an article from imitation and counterfeit

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15825975

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15825975

Country of ref document: EP

Kind code of ref document: A1