WO2019068893A1 - Système et procédé d'authentification de produit - Google Patents

Système et procédé d'authentification de produit Download PDF

Info

Publication number
WO2019068893A1
WO2019068893A1 PCT/EP2018/077186 EP2018077186W WO2019068893A1 WO 2019068893 A1 WO2019068893 A1 WO 2019068893A1 EP 2018077186 W EP2018077186 W EP 2018077186W WO 2019068893 A1 WO2019068893 A1 WO 2019068893A1
Authority
WO
WIPO (PCT)
Prior art keywords
code
product
ucd
blockchain database
manufacturing facility
Prior art date
Application number
PCT/EP2018/077186
Other languages
English (en)
Inventor
Charlie Sherlock
Original Assignee
Im8 Data Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB1716249.6A external-priority patent/GB2567186A/en
Priority claimed from GBGB1803583.2A external-priority patent/GB201803583D0/en
Application filed by Im8 Data Limited filed Critical Im8 Data Limited
Publication of WO2019068893A1 publication Critical patent/WO2019068893A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This invention relates to a system and method for authenticating a product.
  • Counterfeit goods are a major threat to both producers and consumers alike. From a customer's perspective, the counterfeit goods may present a material risk to their health and safety. From a producer's perspective, the counterfeit goods may present a significant risk to their financial security and reputation. Accordingly, there is interest from both the producers and the consumers to tackle the dissemination of counterfeit goods.
  • counterfeiters target high value goods in industries such as, but not limited to, pharmaceuticals, aviation/automotive parts, luxury goods and medical devices. It is immediately apparent how counterfeit goods that are not manufactured to the required exacting specifications in the pharmaceutical, aviation/automotive parts and medical devices fields could have catastrophic consequences for the consumer. It is also evident how counterfeit goods may have a damaging affect on the reputation of genuine producers when products thought to originate from them are found to be deficient.
  • a system for authenticating a product comprising: a blockchain database having a plurality of QR codes and associated product records stored thereon, and a QR code generator; a product manufacturing facility having a QR code printer; a secure communication channel between the blockchain database and the product manufacturing facility; a user communication device (UCD) having a user interface, a verification application (APP) and a camera for capturing a QR code; and a two-way communication channel between the UCD and the blockchain database.
  • UCD user communication device
  • APP verification application
  • the UCD is one of a mobile telephone, a smartphone, a tablet, and a phablet. These are seen as useful devices for the consumer to use to authenticate the products. Further specialized equipment will not be required at their end.
  • the product manufacturing facility comprises a memory for storage of a batch of QR codes issued by the blockchain database and a product record associated with each of the QR codes.
  • a method of authenticating a product in a system comprising: a blockchain database having a QR code generator; a product manufacturing facility having a QR code printer; a secure communication channel between the blockchain database and the product manufacturing facility; a user communication device (UCD) having a user interface, a verification application (APP), a memory having product records associated with QR codes thereon, and a camera; and a communication channel between the UCD and the blockchain database; the method comprising the initial steps of: the blockchain database transmitting a unique QR code to the product manufacturing facility; the product manufacturing facility marking a product with the unique QR code and transmitting a product record to the blockchain database; and the blockchain database storing the QR code and the associated product record in the blockchain database; and thereafter, upon a user wishing to authenticate the product, the method comprising the steps of: the user capturing the QR code with the camera on their UCD; the APP performing an offline authentication challenge on the QR code; the APP displaying an authentication result to the offline authentication challenge on the user interface
  • a method that is more secure and more accessible than previously solutions.
  • the product's authenticity may be checked by the end user provided they have a user communication device such as a smartphone.
  • a smartphone As the smartphone is practically a ubiquitous device even in many third world areas, this is seen as a particularly suitable method to allow consumers themselves to authenticate the goods, thereby making the method more accessible.
  • the user will be able to compare the product with the product record to see if the product matches the product record.
  • the initial authentication of the QR code is performed on the UCD by the APP by reading the QR code and authenticating the QR code. This allows offline authentication which can be enabled for specific products or specific markets, again making the method more accessible than known methods.
  • the method is relatively inexpensive to implement and will not require expensive equipment to set up or substantial alteration to manufacturing processes. This will help to promote manufacturers to implement the technology and will keep the cost of the end product down.
  • the QR code and the associated product record are stored in a blockchain database thereby making the product information accessible to certain third parties while at the same time making the information practically impervious to attack and corruption, thereby providing a more secure solution than was heretofore the case.
  • the QR code is encrypted and the method comprises the intermediate step of the APP decrypting the QR code.
  • the offline authentication challenge comprises the step of the APP decrypting the QR code to determine code authenticity. This is a simple way of determining whether or not the code is authentic. If the code cannot be decrypted, this is indicative that it is not a valid code.
  • the method upon receipt of the QR code from the UCD, if the decryption of the QR code by the APP fails, the method comprises the step of the APP displaying an authentication result including a counterfeit warning message to the UCD. This is seen as a particularly useful implementation of the present invention. In this way, it will be relatively simple to identify whether or not the QR code and by extension the product is authentic or not.
  • the offline authentication challenge comprises the step of the APP retrieving a digital signature from the QR code. This is seen as another simple way of determining whether or not the QR code is authentic.
  • the digital signature may be retrieved after decryption if the QR code was encrypted.
  • the offline authentication challenge comprises the step of the APP retrieving embedded product details from the QR code. Again, this may be done after decryption if the QR code was encrypted.
  • the product details may be used in the offline authentication challenge by presenting the product details on the user interface of the UCD and thereafter allowing the user to compare the details displayed on screen with the details of the product.
  • the method upon receipt of the QR code from the UCD, if there is no product record associated with the QR code in the APP, the method comprises the step of the APP displaying an authentication response including a counterfeit warning message to the UCD.
  • the digital signature is sent with the QR code to the blockchain database as part of the online authentication request.
  • the method comprises the step of the blockchain database transmitting a plurality of unique QR codes to the product manufacturing facility for subsequent use by the manufacturing facility to mark a plurality of products.
  • the QR codes can be supplied in batches and the manufacturing process will be able to work effectively in an off-line mode.
  • the manufacturing facility transmits a plurality of product records along with the QR codes associated with each of the product records to the blockchain database.
  • a method in which the blockchain database maintains a record of the location of a UCD issuing a multiple failed authentication requests comprises the step of the blockchain database notifying this instance to a third party indicating multiple counterfeit warning messages.
  • this will be an effective way of detecting counterfeit produce. It may be common for manufactured produce to be destined for a certain geographical location and if a request is made to validate that QR code from an entirely disparate location, it will be reasonable to assume that the produce to which the QR code that has been read is applied is fake and should be reported as such.
  • this will be an effective way of detecting counterfeit produce. It may be common for manufactured produce to be destined for a certain geographical location and if a request is made to validate that QR code from an entirely disparate location, it will be reasonable to assume that the produce to which the QR code that has been read is applied is fake and should be reported as such.
  • the step of the manufacturing facility marking a product with the unique QR code and transmitting a product record to the blockchain database further comprises the manufacturing facility marking a batch of products containing a finite predetermined number of products with the unique QR code and transmitting a product record for the batch of products to the blockchain database.
  • the manufacturing facility marking a batch of products containing a finite predetermined number of products with the unique QR code and transmitting a product record for the batch of products to the blockchain database.
  • a method of authenticating a product in a system comprising a blockchain database and a user communication device (UCD) having a camera, a verification application (APP), and a user interface, the method comprising the steps of: capturing a QR code marked on the product with the camera of the UCD;
  • UCD user communication device
  • APP verification application
  • the APP displaying an authentication result to the offline authentication challenge on the user interface of the UCD; and, on the QR code passing the offline authentication challenge, the method comprising the steps of:
  • the user comparing the product with the product record displayed on the user interface of the UCD to determine the authenticity of the product.
  • the QR code is encrypted and the QR code is decrypted and if the decryption of the QR code by the APP fails, the method comprises the step of the APP displaying an authentication result including a counterfeit warning message to the UCD.
  • a method in which upon capture of the QR code by the UCD, a digital signature is retrieved from the QR code for verification and if the verification of the digital signature by the APP fails, the method comprises the step of the APP displaying an authentication result including a counterfeit warning message to the UCD.
  • the method comprises the step of the UCD receiving an authentication response including a counterfeit warning message.
  • the UCD transmits its location as part of the authentication request and upon the remote blockchain server identifying that the location of the UCD issuing the authentication request does not match a location in the product record, the method comprises the step of the UCD receiving an authentication response including a counterfeit warning message.
  • a system for authenticating a product comprising: a blockchain database having a plurality of QR codes and associated product records stored thereon;
  • a user communication device having a user interface, a verification application (APP) for displaying a product record and a camera for capturing a QR code; and
  • APP verification application
  • the UCD is one of a mobile telephone, a smartphone, a tablet, and a phablet.
  • a method of generating a product authentication system comprising the steps of: a blockchain database generating a unique QR code and transmitting the unique QR code to a product manufacturing facility;
  • the product manufacturing facility marking a product with the unique QR code and transmitting a product record associated with that product and that QR code to the blockchain database;
  • the blockchain database storing the QR code and the associated product record in the blockchain database.
  • the method comprises the product manufacturing facility marking a batch of products with the unique QR code and transmitting a product record associated with that QR code and the batch of products to the blockchain database.
  • a product authentication system comprising: a blockchain database having a plurality of QR codes and associated product records stored thereon, and an encrypted QR code generator;
  • a user communication device having a user interface, a camera and a validation application (APP) on the UCD which has means to decrypt the QR code, and means to verify that the QR code is a valid QR code associated with this verification system.
  • UCD user communication device
  • APP validation application
  • a product authentication system comprising: a blockchain database having a plurality of QR codes and associated product records stored thereon, and a QR code generator;
  • a product manufacturing facility having a QR code printer; a user communication device (UCD) having a user interface, a camera and a validation application (APP) on the UCD which has means to verify a digital signature contained within the QR code thereby verifying that the QR code is a valid QR code associated with this verification system.
  • UCD user communication device
  • APP validation application
  • a blockchain database having a plurality of QR codes and associated product records stored thereon, and a QR code generator;
  • a user communication device having a user interface, a camera, a validation application (APP) and an APP database on the UCD, the APP having means to verify the digital signature contained within the QR code thereby verifying that the QR code pertains to a valid product held within the APP database.
  • UCD user communication device
  • APP validation application
  • APP database on the UCD
  • a blockchain database having a plurality of QR codes and associated product records stored thereon, and a QR code generator;
  • a secure communication channel between the blockchain database and the product manufacturing facility for transmitting a QR code from the blockchain database to the product manufacturing facility and for transmitting a product record associated with that QR code and a product from the product manufacturing facility to the blockchain database.
  • Figure 1 is diagrammatic representation of a system for authenticating a product
  • Figure 2 is a diagrammatic representation of an alternative system according to the present invention.
  • FIG. 1 there is shown a system for authenticating a product, indicated generally by the reference numeral 1 , comprising a blockchain database 3 having a Quick Response (QR) code generator 5, a product manufacturing facility 7 having a QR code printer 9, and a user communication device (UCD), in this instance a smartphone 1 1 having a user interface 13, a camera and a verification application (APP) including an APP database with QR codes and corresponding product records contained therein.
  • QR Quick Response
  • UCD user communication device
  • APP verification application
  • the blockchain database is illustrated as a single component however it will be understood that the blockchain database will be spread over a plurality of computing devices.
  • an operator in the product manufacturing facility 7 requests a QR code from the blockchain database over the secure communication channel 15. It is envisaged that communications over the secure communication channel 15 will be encrypted with a proprietary or other encryption method.
  • the product manufacturing facility 7 thereafter sends the QR code to the QR code printer 9 and the QR code 19 is applied to the product 21.
  • the printer is shown as a standard label printer however as well as labels, it will be understood that the QR code could be printed onto the product directly or could be etched or laser cut into the product, depending on the nature of the product itself and the specific requirements of the manufacturer.
  • the product manufacturing facility 7 sends a product record to the blockchain database.
  • the blockchain database saves the product record and the associated QR code 19 in the blockchain database.
  • the APP will verify a digital signature retrieved from the QR code against its own internal database on the UCD. Failure of this secondary verification will return a counterfeit message on the user interface of the UCD.
  • the APP will validate the QR code 19 against the list of 'blacklisted QR codes' held within the APP database on the UCD. The failure of this third level verification will return a counterfeit message on the user interface of the UCD.
  • the APP will decode the product details (contained within the QR code 19) and will verify against its own database.
  • the APP will display the product details on the UCD, or the failure of this third level verification will return a counterfeit message on failure on the UCD.
  • the user then transmits the QR code 19 to the blockchain database.
  • the blockchain database receives and reviews the QR code and determines if there is a product record in the blockchain database that corresponds to the QR code. If there is a product record in memory that corresponds to the scanned QR code, the blockchain database returns the product record to the UCD.
  • the user of the UCD then inspects the product record on the user interface of the UCD and compares the product record with the physical product, thereby verifying the authenticity of the product. In this way, the user is able to ascertain with certainty whether or not the product is genuine or counterfeit.
  • the QR codes may be provided in batches and each QR code could be applied to a product before a batch of product records were returned to the blockchain database.
  • the QR codes have been described as unique however it is envisaged that for some goods, it may be possible to provide a QR code on a particular batch of products.
  • the same QR code may be applied to a batch of 50 packets of a particular medicament.
  • the blockchain database may operate in online or offline mode if desired. Another useful embodiment of the present invention would require multiple QR codes to be validated before the product could be authenticated.
  • the successful authentication process would require the validation of a plurality of associated QR codes (pertaining to an individual product), e.g. successful validation of the QR code on the product box, successful validation of the second QR code on the product leaflet and successful validation of the third QR code from the foil seal on the product itself.
  • a plurality of associated QR codes pertaining to an individual product
  • the user communication device is a smartphone however other types of device could be used instead including a mobile phone, a tablet, a phablet and the like. What is important is that the UCD can capture the QR code, send the QR code to the blockchain database, receive a product record and display that product record to the user of the UCD.
  • the user record may comprise a pictorial representation of the goods and indeed may include a plethora of information relating to the product that will enable the product to be identified with ease. This information may include a product description, the expiry date, the number of contents in the pack, the batch number printed on the pack, the manufacturing data printed on the pack or other identification information that may be used to identify the contents of the pack.
  • the product is fraudulent and a message may be transmitted back to the customer warning them that the product is fraudulent and may cause them harm.
  • the local police services may be alerted.
  • the product may be deemed fraudulent even if the QR code is a valid QR code.
  • an unscrupulous individual may take a valid QR code and apply that to their counterfeit goods.
  • there may be a number of additional measures undertaken to determine whether or not the product is valid.
  • the UCD may transmit location information to the blockchain database. If the location is outside an expected location for that product (e.g. the United Kingdom), an alarm is raised that the product is counterfeit.
  • QR code there may be a limit on the number of times a QR code may be authenticated. For example, if the QR code is authenticated more than 5 times, it is deemed that the QR code in question has been copied and is being used on multiple goods and the QR code can be marked in memory as fraudulent. In those cases (where the QR code is deemed fraudulent) a message is returned to the UCD indicating that the product is fraudulent. It will be understood that other additional functionality may be added to the system and method without departing from the scope of the present invention. For example, the system and method may also be used to warn a customer that the product is past its "best before" and/or "use-by" date.
  • the product has passed its use-by date, its efficacy may be reduced or indeed it may represent a danger to the consumer. If the consumer scans a QR code on the product, a suitable warning message may be presented to them on the user interface of the UCD. Similarly, if the product was part of a product recall, the information in the database may be updated with that information so that if the customer scans a code on a product that has been recalled, the customer will be warned that the product is part of the recall and should not be used/consumed. The message may also provide details of where the product is to be returned.
  • a QR code may be applied to a valuable item such as, but not limited to, an expensive watch.
  • the QR code may be etched into the metal surface of the watch for example. If the watch is stolen, the owner may report it as stolen and it may be marked in the database as stolen. If the thief then tries to sell or pawn the watch, the purchaser may check the item in the database and will determine from the returned record that the watch is stolen and that the police should be alerted. Alternatively, if the watch was not stolen but is being sold after the ownership has been verified, the ownership details may be updated in the database.
  • the QR code may be used to log delivery of the item in that delivery company personnel may deliver the item, the recipient may scan a QR code upon receipt and the delivery is verified, the item location is updated and the ownership information may be updated.
  • FIG. 2 there is shown an alternative embodiment of system according to the invention, indicated generally by the reference numeral 31 , where like parts have been given the same reference numeral as before.
  • the system 31 differs from the system 1 in that there is further provided a communication channel 33 between the user's UCD 1 1 and the product manufacturing facility 7.
  • the goods are marked with QR codes and recorded in the system in the manner described above.
  • the user operates their UCD in the same manner as described before to authenticate the goods with the block chain database 3.
  • the user will be provided with the opportunity to register their goods with the manufacturer (represented by the product manufacturing facility 7 however could be a separate but related entity).
  • the verification app (APP) on the UCD will prompt the user whether or not they wish to register their product purchase with the manufacturer.
  • This registration may provide a number of benefits to the user including, for example, initiating a warranty period, initiating an extended warranty period, qualifying the user for additional deals, discounts on future purchases or upgrades to the product and the like.
  • the manufacturer has the opportunity to engage with their customer.
  • the APP will transmit a user-specific registration token from the UCD to the manufacturer over the communication channel 33, the registration token being capable of identifying the user of the UCD.
  • the registration token may comprise a number of different formats.
  • the registration token may comprise a QR code specific to the user of the UCD stored in the APP on the UCD.
  • the QR code may be encrypted if desired.
  • the product manufacturing facility 7 may have means to read (and, if necessary, decrypt) the QR code received from the UCD and extract the information pertinent to the customer from the QR code or alternatively, the product manufacturing facility may transmit the user-specific QR code received from the UCD to the blockchain database 3 over the secure communication channel 15.
  • the blockchain database may contain a plurality of records with user- specific QR codes corresponding to the users of the system and the details corresponding to those users and on receipt of the user-specific QR code from the product manufacturing facility, the blockchain database may retrieve the record corresponding to that user-specific QR code and transmit the information to the product manufacturing facility.
  • the user and the product will be registered with the product manufacturing facility 7 with the minimum of customer interaction, time and effort.
  • the user of the UCD will not have to register their purchases with each of the individual manufacturers by entering all of their details on each of the manufacturer's websites. Instead, they can be registered in a seamless fashion.
  • the user is polled whether or not they wish to send their data to the third party product manufacturing facility.
  • this sending the UCD user's details
  • sending the UCD user's details may be done automatically rather than prompting the user and requiring a response each time.
  • automatic transmission of the data and the nature of the data to be transmitted may be established by the user in their APP settings.
  • a QR code is seen as useful, it is not necessarily the only way in which the user's details may be transmitted to the product manufacturing facility as the registration token. For example, a data packet with the user's details may be sent instead as the registration token.
  • the communications between the UCD and the product manufacturing facility will be encrypted particularly if personally identifiable information (PI I) is being sent over the communication channel 33.
  • PI I personally identifiable information
  • the QR code i.e. the "label”
  • the QR code used in the methods and systems of the present invention is often referred to as a "dynamic label”. This is due to the fact that unlike other labels typically associated with goods, the information conveyed by the label may vary over time. More specifically, the information conveyed to the individual scanning the label may vary over time.
  • an item may have a status of "in distribution" when it has been produced and sent to the distribution channel.
  • the status of the item in the blockchain database may be updated to "received by retailer”. If the item is scanned during distribution, the "in distribution" status will be displayed along with pertinent data such as, for example, batch number, date of manufacture and/or intended destination. If the item is scanned in the shop, before being sold, the "received by retailer” status will be displayed, along with relevant data.
  • the item status can be updated by the retailer to "sold" with the purchaser's details being appended to the record of the item in the Blockchain database. If the item is subsequently stolen, the purchaser can report the theft and the item status in the blockchain database can be updated to "stolen”. Should a potential purchaser of the item scan the label then the status of stolen will be displayed, along with relevant data (e.g. to contact law enforcement, details of how to reunite the item with the true owner and the like).
  • the dynamic label has been described in terms of a QR code however it will be understood that although a printed, etched, laser engraved or woven-into-fabric QR code is seen as a particularly useful way to implement the present invention, it will be understood that the dynamic label could also be provided by way of an NFC chip or indeed an RFID chip or the like. Many modern mobile phones are equipped with NFC reading technology and the mobile telephone could be used to poll the chip.
  • the RFID chip may however require more specialised equipment however the end user and or intermediaries may be retailers, distributers, manufacturers or the like with access to RFID reading devices. In this way, they would be able to implement the invention.
  • a manufacturer may manufacture t-shirts in batches of 10,000.
  • the t-shirts are boxed in boxes each containing 100 t-shirts. Therefore, a pallet of t-shirts contains 10,000 individual items, in 100 boxes of 100 items each.
  • each and every single t-shirt is labelled with a dynamic label.
  • Each dynamic label is unique and is linked to the exact details of each t-shirt in the blockchain database. In the present example however, the statuses of the t-shirt labels can be updated in bulk.
  • each box of 100 t-shirts also has a dynamic label and the pallet (of 100 boxes) also has its own dynamic label.
  • the status of the pallet in the record associates with the pallet's label is changed in the blockchain database. Once this is done, the statuses of each box in the pallet is automatically updated, as is the status of each label on each t-shirt in each box.
  • the status of the label on the pallet could be set to 'Ready for Transportation', with relevant location details etc. being displayed when the pallet label is scanned. If, at this stage, the boxes are opened and the labels on the t-shirts are scanned, their status could read 'Item not available for Sale', denoting that the t-shirt has not been shipped to a genuine retailer yet.
  • the boxes (of 100 t-shirts) are ready for distribution to their respective retailers.
  • the status of the pallet label is updated to 'Batch with Distributor' and hence the labels on the boxes become 'live' in that their status is updated to read 'In Distributor'.
  • a scan of one of the t-shirt labels at this stage of the process would reveal that the status of this item is still set to 'Item not available for Sale'. It is only when the boxes arrive at the retailer will the t-shirt labels become 'live', with the status of each t-shirt label updated to 'Available for Sale'. Should the standard distribution process be interrupted, the status of the labels can be changed.
  • the system and method could in addition be used for authenticating an individual/employee.
  • the individual could be allocated a QR code (or other identifier as described herein) and they could store that QR code on their person or on a digital device such as a telephone that they carry.
  • the third party could scan the QR code using their UCD and the third party would be returned a record corresponding to the QR code from the blockchain database.
  • This might be an employee record or could contain other information including but not limited to a photograph of the individual. It will be appreciated that the device could be used in a plethora of disparate fields to good effect.
  • a blockchain database It will be understood that this is the preferred mode of implementation of the present invention due to the security advantages associated with blockchain database technology.
  • other databases or other data storage systems could be used including, but not solely limited to an SQL database, a flat file structure or like data storage structure.
  • a proprietary encryption method This could entail symmetric or asymmetric encryption techniques. Indeed, the encryption method may not be proprietary.
  • the computer program may be stored on or in a carrier, in other words a computer program product, including any computer readable medium, including but not limited to a floppy disc, a CD, a DVD, a memory stick, a tape, a RAM, a ROM, a PROM, an EPROM or a hardware circuit.
  • a transmissible carrier such as a carrier signal when transmitted either wirelessly and/or through wire and/or cable could carry the computer program in which cases the wire and/or cable constitute the carrier.
  • the present invention may be performed on two, three or more devices with certain parts of the invention being performed by one device and other parts of the invention being performed by another device.
  • the devices may be connected together over a communications network.
  • the present invention and claims are intended to also cover those instances where the system is operated across two or more devices or pieces of apparatus located in one or more locations / jurisdictions.
  • the claims are intended to cover those instances where one part of the system is located in one jurisdiction and one or more other parts of the system are located in one or more other jurisdictions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente invention porte sur un procédé et un système d'authentification d'un produit. Le système peut comprendre une base de données de chaîne de blocs ayant un générateur de code QR ; une installation de fabrication de produit ayant une imprimante de code QR ; un canal de communication sécurisé entre la base de données de chaîne de blocs et l'installation de fabrication de produit ; un dispositif de communication d'utilisateur (UCD) ayant une interface utilisateur, une application de vérification (APP) et une caméra ; et un canal de communication entre l'UCD et la base de données de chaîne de blocs. Lors de l'utilisation, l'installation de fabrication demande un code QR en provenance de la base de données de chaîne de blocs. Lors de la réception dudit code QR, l'installation de fabrication marque un produit avec le code QR et envoie un enregistrement de produit relatif au produit et associé audit code QR à la base de données de chaîne de blocs pour le stockage. Un consommateur avec un téléphone intelligent ou un dispositif similaire peut capturer le code QR et extraire un enregistrement de produit de telle sorte que l'enregistrement de produit peut être comparé au produit physique pour vérifier l'authenticité.
PCT/EP2018/077186 2017-10-05 2018-10-05 Système et procédé d'authentification de produit WO2019068893A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB1716249.6A GB2567186A (en) 2017-10-05 2017-10-05 A method and system for authenticating a product
GB1716249.6 2017-10-05
GB1803583.2 2018-03-06
GBGB1803583.2A GB201803583D0 (en) 2018-03-06 2018-03-06 A method and system for authenticating a product

Publications (1)

Publication Number Publication Date
WO2019068893A1 true WO2019068893A1 (fr) 2019-04-11

Family

ID=63832403

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2018/077186 WO2019068893A1 (fr) 2017-10-05 2018-10-05 Système et procédé d'authentification de produit

Country Status (1)

Country Link
WO (1) WO2019068893A1 (fr)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111127037A (zh) * 2019-12-19 2020-05-08 盐城工学院 一种基于区块链账户体系的商品通用防伪方法
WO2021024023A1 (fr) * 2019-08-07 2021-02-11 Roshanzamir Amirhossein Système intelligent pour l'authentification d'un tapis fait à la main
RU2754036C1 (ru) * 2020-05-14 2021-08-25 Общество с ограниченной ответственностью "ВАРРАНТ АЙТИ МЕНЕДЖМЕНТ" Система обеспечения подлинности продукции, способ идентификации подлинной продукции и радиочастотная идентификационная метка, используемая при этом
CN113765674A (zh) * 2021-09-02 2021-12-07 杭州溪塔科技有限公司 一种基于区块链的跨平台注册方法及装置
WO2022094635A1 (fr) * 2020-10-30 2022-05-05 Nguyen Khuong Tuan Support anti-falsification, système d'authentification anti-falsification et procédé de détection de falsification
CN114492690A (zh) * 2022-01-24 2022-05-13 芯电智联(北京)科技有限公司 防伪溯源系统对绑定的nfc标签及发行设备的管理方法
FR3117259A1 (fr) * 2020-12-08 2022-06-10 Bpce Procédé de fourniture d’informations sanitaires sur un lieu de vie au moyen d’un terminal portable et d’une chaîne de blocs
US11516014B2 (en) 2020-06-15 2022-11-29 Nick Walker Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
US11855842B1 (en) * 2022-03-15 2023-12-26 Avalara, Inc. Primary entity requesting from online service provider (OSP) to produce a resource and to prepare a digital exhibit that reports the resource, receiving from the OSP an access indicator that leads to the digital exhibit, and sending the access indicator to secondary entity
US12008549B2 (en) * 2019-07-22 2024-06-11 Visa International Service Association Federated custodian

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
WO2016120826A2 (fr) * 2015-01-30 2016-08-04 Enrico Maim Systèmes et procédés pour la gestion d'engagements en réseau d'entités sécurisées
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
WO2016120826A2 (fr) * 2015-01-30 2016-08-04 Enrico Maim Systèmes et procédés pour la gestion d'engagements en réseau d'entités sécurisées
US20170232300A1 (en) * 2016-02-02 2017-08-17 Bao Tran Smart device

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12008549B2 (en) * 2019-07-22 2024-06-11 Visa International Service Association Federated custodian
US20220253562A1 (en) * 2019-08-07 2022-08-11 Amirhossein Roshanzamir Intelligent system for authentication of handmade carpet
WO2021024023A1 (fr) * 2019-08-07 2021-02-11 Roshanzamir Amirhossein Système intelligent pour l'authentification d'un tapis fait à la main
CN111127037B (zh) * 2019-12-19 2024-01-05 盐城工学院 一种基于区块链账户体系的商品通用防伪方法
CN111127037A (zh) * 2019-12-19 2020-05-08 盐城工学院 一种基于区块链账户体系的商品通用防伪方法
RU2754036C1 (ru) * 2020-05-14 2021-08-25 Общество с ограниченной ответственностью "ВАРРАНТ АЙТИ МЕНЕДЖМЕНТ" Система обеспечения подлинности продукции, способ идентификации подлинной продукции и радиочастотная идентификационная метка, используемая при этом
US11516014B2 (en) 2020-06-15 2022-11-29 Nick Walker Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
WO2022094635A1 (fr) * 2020-10-30 2022-05-05 Nguyen Khuong Tuan Support anti-falsification, système d'authentification anti-falsification et procédé de détection de falsification
FR3117259A1 (fr) * 2020-12-08 2022-06-10 Bpce Procédé de fourniture d’informations sanitaires sur un lieu de vie au moyen d’un terminal portable et d’une chaîne de blocs
WO2022122758A1 (fr) * 2020-12-08 2022-06-16 Bpce Procédé de fourniture d'informations sanitaires sur un lieu de vie au moyen d'un terminal portable et d'une chaîne de blocs
CN113765674A (zh) * 2021-09-02 2021-12-07 杭州溪塔科技有限公司 一种基于区块链的跨平台注册方法及装置
CN113765674B (zh) * 2021-09-02 2024-02-09 杭州溪塔科技有限公司 一种基于区块链的跨平台注册方法及装置
CN114492690A (zh) * 2022-01-24 2022-05-13 芯电智联(北京)科技有限公司 防伪溯源系统对绑定的nfc标签及发行设备的管理方法
CN114492690B (zh) * 2022-01-24 2023-05-12 芯电智联(北京)科技有限公司 防伪溯源系统对绑定的nfc标签及发行设备的管理方法
US11855842B1 (en) * 2022-03-15 2023-12-26 Avalara, Inc. Primary entity requesting from online service provider (OSP) to produce a resource and to prepare a digital exhibit that reports the resource, receiving from the OSP an access indicator that leads to the digital exhibit, and sending the access indicator to secondary entity
US12107729B1 (en) * 2022-03-15 2024-10-01 Avalara, Inc. Primary entity requesting from online service provider (OSP) to produce a resource and to prepare a digital exhibit that reports the resource, receiving from the OSP an access indicator that leads to the digital exhibit, and sending the access indicator to secondary entity

Similar Documents

Publication Publication Date Title
WO2019068893A1 (fr) Système et procédé d'authentification de produit
US12106311B2 (en) Methods and systems for making, tracking and authentication of products
JP6189454B2 (ja) 無認可製品検出技法
US7770783B2 (en) Method and system to provide security information when authenticating product code
US9473303B2 (en) Method and system for product authentication
US20170032382A1 (en) System and Method for Product Authentication
CA2891654A1 (fr) Mecanisme d'authentification d'elements
US11810179B2 (en) Method for tracking products using distributed, shared registration bases and random numbers generated by quantum processes
WO2013086017A1 (fr) Système et procédé de vérification et de gestion de la distribution de produits
US9202194B1 (en) Tracking the distribution of a product or package through a supply chain to determine authenticity and detect breaches
US20060053025A1 (en) Method of labeling and authenticating products
WO2017180479A1 (fr) Système et procédé d'authentification de produit et de contrefaçon
GB2495480A (en) Product authentication using unique code
GB2567186A (en) A method and system for authenticating a product
UA136798U (uk) Спосіб верифікації продукції та захисту її від фальсифікації
TH1703000378C3 (th) ระบบตรวจสอบความเป็นของแท้และการจัดการสินค้า
WO2015174947A1 (fr) Système et procédé de protection contre les contrefaçons et d'identification de produit

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18785312

Country of ref document: EP

Kind code of ref document: A1