WO2020102688A2 - Systèmes informatiques pour authentifier des produits à l'aide de marqueurs et procédés et dispositifs associés - Google Patents

Systèmes informatiques pour authentifier des produits à l'aide de marqueurs et procédés et dispositifs associés Download PDF

Info

Publication number
WO2020102688A2
WO2020102688A2 PCT/US2019/061752 US2019061752W WO2020102688A2 WO 2020102688 A2 WO2020102688 A2 WO 2020102688A2 US 2019061752 W US2019061752 W US 2019061752W WO 2020102688 A2 WO2020102688 A2 WO 2020102688A2
Authority
WO
WIPO (PCT)
Prior art keywords
product
marker
encoded
installer
stores
Prior art date
Application number
PCT/US2019/061752
Other languages
English (en)
Other versions
WO2020102688A3 (fr
Inventor
Wilfred P. SO
Lindsay SPARKS
Koichi Nishimura
Stuart Ogawa
Original Assignee
Facet Labs, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Facet Labs, Llc filed Critical Facet Labs, Llc
Publication of WO2020102688A2 publication Critical patent/WO2020102688A2/fr
Publication of WO2020102688A3 publication Critical patent/WO2020102688A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the following generally relates to computing systems for authenticating products, including the related methods and devices.
  • Labeling technologies are used to help improve the confirmation of authorship and originality. These approaches include adding a barcode or RFID tag onto the product.
  • FIGs. 1 A and 1 B is a schematic diagram of a product authentication system and data flow, according to an example embodiment.
  • FIG. 2 is a flow diagram of executable instructions for providing an encoded ID for a given product, according to an example embodiment.
  • FIG. 3 is a flow diagram of executable instructions for determining authenticity of a given product, according to an example embodiment.
  • FIGs. 4A and 4B are schematic diagrams of installing a marker with an encoded ID during the a product build process, according to different example embodiments.
  • FIGs. 5A and 5B are schematic diagrams of a dispenser that dispenses markers into product, and the dispenser is in data communication with an authentication platform, according to different example embodiments.
  • FIG. 6 is a flow diagram of a process for providing markers for product authentication, and the markers include DNA, according to an example embodiment.
  • FIG. 7 is a schematic diagram showing components and operations for integrally incorporating an encoded ID while 3D printing a product, according to an example embodiment.
  • FIG. 8 is a schematic diagram showing various owners and their user devices, and the flow of data to facilitate transfer of ownership, according to an example embodiment.
  • FIG. 1 A shows an example embodiment of a system for marking a product with an encoded ID, which can be later used to authenticate the product.
  • the system includes an authentication platform 101 , which is implemented by one or more server machines.
  • the authentication platform resides on cloud computing infrastructure.
  • the authentication platform is also herein called an authentication server system.
  • the authentication platform 101 includes, amongst other things, a product ID datastore 102, an ID encoder and decoder module 103, and an encoder and decoder library 104.
  • the product ID datastore 102 stores data about each product.
  • the library 104 stores different encoding algorithms, decoding algorithms, or parameters, or a combination thereof, which are associated with a given product ID or a given client entity, or both. It will be appreciated that a client entity is an organization, person, or other that wishes to have their product marked with an encoded ID using the authentication platform.
  • the system also includes one or more upstream client devices 105, which act on behalf of one or more client entities. These one or more upstream client devices 105 are in data communication with the authentication platform 101.
  • the authentication platform 101 is also in data communication an ID installer 106.
  • the ID installer 106 installs or incorporates the encoded ID into one or more products 108, 109.
  • the encoded ID is installed or incorporated into a physical marker 107, which is part of the product.
  • the ID installer is a physical system that writes an encoded ID into a marker.
  • the ID installer is also herein called an ID installer system.
  • the ID installer wirelessly transmits the encoded ID into a marker that has the ability to wirelessly receive write commands.
  • the ID installer transmits write commands by wire to a marker, and the marker has a wired connection with the ID installer.
  • the ID installer includes physical mechanisms for building a marker and, in the process of building the marker, encodes the encoded ID into the marker.
  • the upstream client device 105 sends data about a given product to the authentication platform 101 , and the platform 101 stores this data in the product ID datastore 102.
  • the authentication platform selects the appropriate encoding algorithm or parameters (or both) from the library 104 and then computes an encoded ID that represents the product.
  • the authentication platform 101 sends the encoded ID to the ID installer 106.
  • the ID installer 106 installs the encoded ID into a marker 107 that is attached to or part of a given product (e.g. Product-1 108). This operation occurs during the manufacturing, assembly, or predelivery process.
  • FIG. 1 B shows a downstream process after Product-1 108 has been delivered.
  • This person or entity uses a downstream client device or devices 1 10 to (i) identify itself with the authentication platform and (ii) read the encoded ID from the marker 107 (operation D). These operations within operation D can be done in different sequences, or at the same time.
  • the downstream client device 1 10 sends the read encoded ID to the authentication platform 101 , and the authentication platform confirms whether or not the product is authentic or not based on received encoded ID.
  • the client downstream device receives and outputs the confirmation about the authenticity or inauthenticity of the product 108.
  • the downstream device 1 10 is provided permission to take action, such as read data from or write data to the product ID store 102 in association with the identified product 108.
  • a third-party device 1 1 1 data interacts with the downstream client device 110 (operation G).
  • the device 1 1 1 is responsive to the downstream client device 1 10 confirming whether the product is authentic or not authentic.
  • the response for example includes displaying an image, showing a light, emitting a sound, etc.
  • the device 1 1 1 is further only responsive when it is in sufficiently close proximity to the marker 107.
  • the marker 107 includes a visual output device (e.g. a display, one or more lights) or an audio output device (e.g. a speaker), or both, and the marker provides a visual output or an audio output that confirms whether or not the product is authentic.
  • a visual output device e.g. a display, one or more lights
  • an audio output device e.g. a speaker
  • a data network such as the Internet or a private network, or a combination thereof.
  • FIG. 2 describes an example process for installing or incorporating the encoded ID into a given product.
  • Block 201 An Upstream Client Entity (via Client Device(s) 105) provides input information to the Authentication Platform 101 .
  • input information include one or more of: product ID, product data, authorship data, media content, ownership data, digital signatures, encryption keys, etc.
  • the data could include images, videos, audio data, etc. showing the building of the product.
  • the data also includes, for example, care and maintenance instructions.
  • the data also includes authorship data or ownership data, or both, with data formats including one or more of: name, birthdate, contact information (e.g. phone number, email address, messaging account, etc.), video data, audio data, image data, and biological data (e.g. DNA sample, fingerprint data, eye scan or retinal scan data, etc.). This is provided during the manufacturing process of the product.
  • Block 202 Authentication Platform 101 selects the encoding algorithm or parameters or both that are associated with the given Client Entity. This selection is made from a library 104 of different encoding algorithms or parameters, or both.
  • different client entities are associated with different encoding and decoding algorithms or parameters, or both, which are proprietary to the respective client entities. For example, a first client entity is associated with a first encoding and decoding algorithm, or parameters, or both; a second client entity is associated with a second encoding and decoding algorithm, or parameters, or both; and these associations and encoding and decoding information are stored in the library 104. These associations are kept secret on the authentication platform so that other parties can attempt to replicate the encoding process.
  • an encoding algorithm is randomly selected from a set of encoding algorithms in the library, and the randomly selected encoding algorithm and the corresponding decoding algorithm identifiers are stored in relation to the encoded ID on the authentication platform.
  • Block 203 Authentication Platform 101 generates an encoded ID using the selected encoding algorithm or parameters, or both.
  • the product ID or other related product data is encoded to generate the encoded ID. For example, this computation is executed by the module 103.
  • Block 204 Authentication Platform 101 commands the ID installer 106 to install the encoded ID into the product.
  • Block 205 The ID installer 106 installs the encoded ID into the product.
  • Block 206 The product is shipped.
  • the marker 107 is a chip (e.g. a tiny edge device) or a radio frequency ID (RFID) tag that stores the encoded ID.
  • the ID installer wirelessly flashes the marker with the encoded ID.
  • the marker itself is, for example, placed in a hard- to-reach position on or in the product. For example, the marker is installed or incorporated into the product first, and then the encoded ID is wirelessly written onto the marker.
  • the marker is purposely limited to wirelessly communicate over a very short distance to a device (e.g. 10 centimeters or less, or the device and the marker must be almost touching).
  • the marker uses near field communication (NFC) to transmit and receive data. In this way, wireless interaction between the marker and the device proves that the device is physically close to the marker.
  • NFC near field communication
  • the marker is 107 is a chip or a RFID tag that has stored on it the encoded ID. After the encoded ID is stored on the marker, the marker is installed or incorporated into the product.
  • the marker 107 is a DNA sample, or DNA more generally.
  • the marker can be encoded with DNA to represent the encoded ID.
  • the DNA is first digitally characterized, and then the digital characterization of the DNA is used to represent the encoded ID that is associated with the product.
  • the DNA marker is, for example, installed or incorporated into the product.
  • the DNA marker material is produced as one or more fibers, and these fibers embedded with DNA are woven into the product.
  • the DNA marker material is encapsulated and attached to or installed on the product.
  • the ID installer includes mechanism that place the DNA or incorporate the DNA into a marker.
  • the marker 107 is a computing chip or memory chip that is 3D printed directly into the product, and the design of the chip is representative of the encoded ID.
  • the 3D printer is an ID installer.
  • the marker 107 is an RFID tag that is 3D printed directly into the product, and the design of the RFID tag is representative of the encoded ID.
  • the 3D printer is an ID installer.
  • the marker 107 is a marker structure that is 3D printed directly into the product, and the design of the structure is representative of the encoded ID.
  • the 3D printer is an ID installer.
  • Block 301 Downstream client device and Authentication Platform communicate with each other to identify and authenticate the Downstream Client Device
  • Block 302 Downstream Client Device interacts with marker at the given product to read the encoded ID.
  • the mode of interaction depends on the marker. For example, if the marker is a chip or an RFID tag, the downstream client device digitally interacts with the marker. If the marker includes DNA material or biological material, then the downstream client device uses a biological sensing device to read the marker.
  • Block 303 Downstream Client Device sends the read encoded ID to the Authentication Platform
  • Block 304 Authentication Platform selects a decoding algorithm / parameters / both associated with the identified Downstream Client Device
  • Block 305 Authentication Platform decodes the read encoded ID using a selected decoding algorithm / parameters / both, and executes comparison against Product ID Datastore
  • Block 306 The Authentication Platform determines: Are both the decoding process and the comparison process successful? If so, the process continues to block 307. If not, the process continues to 310.
  • Block 307 includes operation 308 or 309, or both
  • Block 308 Authentication Platform sends message that the product is authentic to the Downstream Client Device
  • Block 309 Authentication Platform permits the Downstream Client Device to take one or more actions in relation to the data of the given product in the Product ID Datastore
  • Examples of one or more actions, as per block 309, include: displaying the product data (e.g. text, audio, video, images, etc.) that is associated with the authenticated product; recording as part of the product data, observational data; recording as part of the product data, a transfer of ownership; triggering another third-party device 1 1 1 to take action.
  • product data e.g. text, audio, video, images, etc.
  • a third-party device includes lights that glow in a certain way (e.g. certain color, shape, brightness, etc.) after the client device 1 10 receives confirmation that the product is authentic.
  • the third-party device includes a display (e.g. LED display, e-ink display, projector display, etc.) that shows a certain image after the client device 1 10 receives confirmation that the product is authentic.
  • the third-party device includes an audio speaker that outputs a certain sound after the client device 1 10 receives confirmation that the product is authentic.
  • Block 310 includes operation 31 1 or 312, or both
  • Block 31 1 Authentication Platform sends message that product is not authentic to Downstream Client Device
  • Block 312 Authentication Platform denies Downstream Client Device to take action with respect to the data of the given product in the Product ID Datastore
  • FIG. 4A shows an example of one or more upstream client devices transmitting recorded data that was recorded during the product’s build process to the authentication platform.
  • This recorded data for example, is evidence of the details about the building of the product.
  • Recorded data includes, for example, images, video, manufacturing details, time stamps, machine identifiers, part numbers, composition details, batch numbers, involved personnel, etc.
  • Different types of recorded data can be obtained along different phases of the build process, and this recorded data is associated with the encoded ID.
  • this recorded data forms part of the product related data.
  • the marker and the encoded ID are together installed into the product.
  • FIG. 4B is similar to FIG. 4A. However, the marker is installed or incorporated into the product first, and at a later time the encoded ID is installed or incorporated into the marker.
  • FIG. 5A shows an ID installer that is in the form of a tiny edge device (TED) dispenser 505 (e.g. an apparatus) is herein provided that dispenses or deploys TEDs.
  • the TED dispenser deploys the TEDs like particles or granules.
  • a TED herein refers to very small computers with communication capabilities.
  • a TED is a type of loT device.
  • a TED is also sometimes called a mote or smart dust.
  • a TED is sized similar to a coin (e.g. 5cm X 5cm).
  • a TED is sized at approximately 1 cm x 1cm. In an example embodiment, a TED is sized at approximately 1 mm x 1 mm. In another example embodiment, a TED is sized at less than 0.5mm x 0.5mm. In an example embodiment, a TED is micro-sized. In another example embodiment, a TED is nano-sized. It will be appreciated that various dimensions of TEDs are applicable to the principles described herein. Smaller TEDs or larger TEDs may be desired to suit the application in which the TEDs operate.
  • a TED dispenser 505 includes a container 506 that stores the TEDs, which are the markers 107.
  • the dispenser also includes a computing element 509 and a dispensing mechanism 508.
  • the authentication platform 101 is in data communication with the respective computing elements of the dispenser.
  • the platform 101 then sends the encoded ID to the computing element 509, and the computing element in turn wirelessly flashes one or more TEDs with the encoded ID(s). These one or more TEDs, which have stored thereon the encoded ID(s), are then dispensed by the dispensing mechanism for installation into the product.
  • the dispensing mechanism 508 is just an example. It will be appreciated that the mechanical form and types of dispensing mechanisms can vary from what is shown.
  • FIG. 5B shows a similar embodiment, but a separate data writer 510 installs the encoded ID into the TED at a later time (t2).
  • FIG. 6 shows a process in which DNA material is obtained from a person (block 601 ). A portion of this DNA material is stored in an Authentication Storage (block 602), which can be optionally used for later comparison. The Authentication Platform 101 also stores the digitized profile of the obtained DNA in association with the product ID (block 603). The DNA material itself is also stored into one or more markers (block 604). For example, the markers 107 shown in FIG. 6 include the DNA material. These markers are then installed or incorporated into the product (block 605).
  • the DNA is from another natural source (e.g. a human, an animal, a plant, etc.).
  • the DNA is synthesized or modified DNA to provide a unique identifier.
  • a chemical material with a customized chemical composition is stored into one or more markers.
  • a chemical analyzer is used to identify the chemical composition of the chemical material in the marker.
  • FIG. 7 shows the authentication platform 101 generating a computer design file (e.g. a CAD filed) for a marker structure that represents an encoded ID (block 702).
  • This computer design file is a derivative of the encoded ID.
  • the ID installer includes a 3D printer 701 , and the computer design file is sent to the 3D printer 701 .
  • the 3D printer prints this marker structure, based on the file 702, while the product is being produced. For example, a component of the product or the entire product itself is 3D printed and, during the 3D printing process, the marker structure is 3D printed to be integral with the component of the product or with the entire product itself.
  • the marker structure (which is the marker 107) is 3D printed to be positioned within the body of the product, so that it is inaccessible to others.
  • the marker structure is within an internal cavity of the product.
  • the marker structure is positioned onto an outer surface of the product.
  • the product itself is 3D printed and this process 703 is part of the 3D printing process of the product.
  • the authentication platform 101 sends the encoded ID to the 3D printer 701 , and the 3D printer 701 uses the encoded ID to generate three-dimensional computer design data of the marker structure. This computer design data is then used to 3D print the marker structure.
  • the marker structure is a unique physical design to identify the encoded ID.
  • the marker structure reflects or emits radio waves, and is printed to reflect or emit a radio wave signal that corresponds to an encoded ID.
  • the marker structure includes metal material.
  • the marker structure is an RFID tag that stores the encoded ID.
  • the RFID tag can be a passive RFID tag, an active RFID tag, or a semi-active RFID tag.
  • the marker structure includes an electronic circuit that stores the encoded ID.
  • the marker structure includes a computer chip that stores the encoded ID.
  • FIG. 8 shows a downstream process, in which the product originator 801 transfers ownership to a first owner 803, and the first owner later transfers ownership of the product to a second owner 805.
  • the transfer of ownership to the first owner 803, takes places between the originator account 802 and the first owner account 804, and the recordation of transfer is made with the authentication platform 101.
  • the transfer of ownership to the second owner takes place between the first owner account 804 and the second owner account 806, and the recordation of this later transfer is made with the authentication platform 101 .
  • the present owner (@t2 it is the first owner 803) is able to communicate with the originator 801 over a private communication channel (e.g. send messages back and forth to increase engagement about the product).
  • the present owner is the second owner 805 and now the second owner 805 is able to communicate with the originator 801 over a private communication channel.
  • the first owner 803 and the originator 801 are no longer able to communicate over the private communication channel, since the first owner is no longer an owner of the product.
  • observers 809 can interact with the product, such as by confirming authentication and associating media content with the product (block 81 1 a,
  • media content obtained by the observer 809 is sent to the platform 101 for storage in association with the given product.
  • a person sees or observes the product in question authenticates the product by obtaining the encoded ID from the marker (e.g. wirelessly interacting with the marker if it is a wireless device or RFID), and then transmits the encoded ID to the authentication platform using an app or a website.
  • the marker e.g. wirelessly interacting with the marker if it is a wireless device or RFID
  • a recorded observation taken using the person’s smartphone is sent back to the authentication platform and stored thereon as an authentic observation in association with the product ID of the product in question.
  • the recorded observations from the person’s smartphone can include one or more of: videos of the product in question, pictures of the product in question, and messages (or other forms of social media) confirming that they have interacted with the product in question, which has been confirmed to be authentic. These observations are time stamped. In another example aspect, these observations are also location stamped (e.g. using local positioning services or GPS). These observations from other people form part of a digital ledger stored on the authentication platform with the product ID.
  • the authentication platform 813 is in data communication with a social media platform 813 (e.g. Facebook, Linkedln, Instagram, Pinterest, or the like).
  • the authenticated observation is automatically turned into a social posting 812 that is posted from the authentication platform 101 to the social media platform 813.
  • the social posting 812 includes a confirmation that the person observed an authentic product and includes the person’s recorded picture or video of the product.
  • the social posting 812 also include the person’s details (e.g. their social media name) and the observation details (e.g. the time of the observation, the location of the observation, etc.).
  • a system includes an authentication server system that stores a given product ID, an ID encoder and decoder, and an encoder and decoder library that stores multiple encoder and decoder algorithms.
  • the system also includes an ID installer system that is in data communication with the authentication server system.
  • the authentication server system selects an encoding algorithm from the encoder and decoder library, uses the encoding algorithm and the given product ID to generate an encoded ID, and sends the encoded ID to the ID installer system.
  • the ID installer system wirelessly flashes the encoded ID into a marker in a product, wherein the marker comprises a TED, wherein the TED has wireless communication ability.
  • the ID installer system wirelessly writes the encoded ID into the marker.
  • the ID installer system wirelessly writes the encoded ID into the marker before the marker is installed into the product.
  • the authentication server system responsive to receiving the encoded ID and observation data from a downstream device, decodes the encoded ID to confirm the authenticity of the marker and stores the observation data in relation to the given product ID.
  • the observation data comprises video or a picture recorded by the downstream device.
  • the authentication platform is in data communication with a social media platform and the authentication platform automatically generates a social posting that comprises the observation data and an indication that the observation data provided by the downstream device is authentic.
  • the wireless communication ability is near field communication (NFC).
  • NFC near field communication
  • the TED is approximately 5 cm x 5 cm or less.
  • the TED is approximately 1 cm x 1 cm or less.
  • the TED is approximately 0.5 cm x 0.5 cm or less.
  • the ID installer system includes: a container that stores multiple markers that each comprise a TED, including the marker; a computing element that receives the encoded ID from the authentication platform and then wirelessly flashes at least the marker; and a dispenser mechanism that deploys the marker after it has been wirelessly flashed by the computing element.
  • a system in another example embodiment, includes an authentication server system that stores thereon at least a given product ID, an ID encoder and decoder, and an encoder and decoder library that stores multiple encoder and decoder algorithms.
  • the system also includes an ID installer system that is in data communication with the authentication server system.
  • the authentication server system selects an encoding algorithm from the encoder and decoder library, uses the encoding algorithm and the given product ID to generate an encoded ID, and sends the encoded ID or a derivative of the encoded ID to the ID installer system, and the ID installer system 3D prints a marker structure into a product, the marker structure representing the encoded ID.
  • the marker structure reflects or emits radio waves, and the marker structure reflects or emits a radio wave signal that corresponds to the encoded ID.
  • the marker structure is a radio frequency ID tag that stores the encoded ID.
  • the marker structure comprises an electronic circuit that stores the encoded ID.
  • the marker structure is 3D printed to be positioned within a cavity of the product.
  • the marker structure is 3D printed to be positioned on outward surface of the product.
  • the authentication platform sends the derivative of the encoded ID to the ID installer system, wherein the derivative of the encoded ID comprises a computer design file of the marker structure, and the ID installer system uses the computer design file to 3D print the marker structure.
  • the authentication platform sends the encoded ID to the ID installer system, and the ID installer system uses the encoded ID to generate a digital three-dimensional structure of the marker structure for 3D printing into the product.
  • a system for authentically marking a product.
  • the system includes an authentication server system that stores a digitized profile of DNA material in association with a product ID, the product ID identifying a product.
  • the system also includes an ID installer system that stores the DNA material into a physical marker that is incorporated into the product.
  • the physical marker comprises one or more fibers, and the one or more fibers are woven into the product.
  • the physical marker comprises a capsule that stores the DNA material, and the capsule is embedded or attached to the product.
  • any module or component exemplified herein that executes instructions may include or otherwise have access to computer readable media such as storage media, computer storage media, or data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape.
  • Computer storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by an application, module, or both. Any such computer storage media may be part of the servers or devices or accessible or connectable thereto. Any application or module herein described may be implemented using computer readable/executable instructions that may be stored or otherwise held by such computer readable media.

Abstract

Un système d'authentification de produit comprend une plateforme d'authentification qui stocke des données d'identifiant (ID) de produit et un installateur d'ID en communication de données avec la plateforme d'authentification. La plateforme d'authentification envoie des données D'ID codées à l'installateur d'ID et l'installateur d'ID installe l'ID codé dans un marqueur placé dans un produit.
PCT/US2019/061752 2018-11-16 2019-11-15 Systèmes informatiques pour authentifier des produits à l'aide de marqueurs et procédés et dispositifs associés WO2020102688A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862768629P 2018-11-16 2018-11-16
US62/768,629 2018-11-16

Publications (2)

Publication Number Publication Date
WO2020102688A2 true WO2020102688A2 (fr) 2020-05-22
WO2020102688A3 WO2020102688A3 (fr) 2020-08-13

Family

ID=70730898

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2019/061752 WO2020102688A2 (fr) 2018-11-16 2019-11-15 Systèmes informatiques pour authentifier des produits à l'aide de marqueurs et procédés et dispositifs associés

Country Status (1)

Country Link
WO (1) WO2020102688A2 (fr)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6724895B1 (en) * 1998-06-18 2004-04-20 Supersensor (Proprietary) Limited Electronic identification system and method with source authenticity verification
US20050058483A1 (en) * 2003-09-12 2005-03-17 Chapman Theodore A. RFID tag and printer system
US8789746B2 (en) * 2009-01-31 2014-07-29 Solexir Technology Inc. Product authentication using integrated circuits
WO2011159337A1 (fr) * 2010-06-14 2011-12-22 Trutag Technologies, Inc. Etiquetage et vérification d'un article ayant un identifiant
US20160012498A1 (en) * 2012-09-12 2016-01-14 Chachi Prasad System and method for identifying, verifying and communicating about oem products using unique identifiers
US9575156B2 (en) * 2013-01-15 2017-02-21 Disney Enterprises, Inc. Spatial recognition of RFID tag placement using antenna multiplexing
WO2014172630A1 (fr) * 2013-04-18 2014-10-23 Applied Dna Sciences Inc. Marquage laser pour authentification et suivi
US9269236B2 (en) * 2013-10-22 2016-02-23 8D Technologies Inc. RFID tag dispenser
US9744726B2 (en) * 2013-11-25 2017-08-29 Xerox Corporation 3D print manufacturing of packages with personalized labeling technology
US9092651B2 (en) * 2013-12-20 2015-07-28 Play Ventures Limited System and method for authenticity verification
CA2959312A1 (fr) * 2014-08-28 2016-03-03 Apdn (B.V.I.) Inc. Procedes d'extraction, de detection et d'authentification de l'adn sur le terrain, et systemes associes

Also Published As

Publication number Publication date
WO2020102688A3 (fr) 2020-08-13

Similar Documents

Publication Publication Date Title
US11321751B2 (en) Systems and techniques for computer-enabled geo-targeted product reservation for secure and authenticated online reservations
JP7387596B2 (ja) 安全タグ
EP3304431B1 (fr) Registre ouvert pour l'identité d'objets
US10152720B2 (en) Authentication tags and systems for golf clubs
US20180032759A1 (en) Open registry for human identification
US9449294B2 (en) Method and apparatus for managing user devices and contents by using quick response codes
US7606557B2 (en) Mobile communication terminal having a function of reading out information from contactless type communication tag and method for providing information of whether an article is genuine or not
TW201001295A (en) RFID tag and managing method thereof
US20160358158A1 (en) Open registry for identity of things including item location feature
WO2018075403A1 (fr) Registre ouvert pour la provenance et le suivi de marchandises dans la chaîne d'approvisionnement
JP6498123B2 (ja) サプライ・チェーン製品用のデジタル的に保護された電子タイトル
AU2014268621B2 (en) Method and system for product authentication
CN112689979B (zh) 物品身份管理方法、终端、微处理单元、标识设备和系统
WO2018067974A1 (fr) Registre ouvert pour identification humaine
WO2019036910A1 (fr) Procédé, dispositif et système de vérification d'identité, et support de stockage lisible par machine
JP7235258B2 (ja) 正規品認証コンテンツの生成装置およびこれを用いる統合認証システム
US20160379157A1 (en) System and Method for Secure Proximity-Based Signatures for Parcel Delivery
CN108763937A (zh) 一种配送单据生成、配送及推广信息处理方法及装置
EP3794475A1 (fr) Génération de signatures électroniques
WO2020102688A2 (fr) Systèmes informatiques pour authentifier des produits à l'aide de marqueurs et procédés et dispositifs associés
CN106415588A (zh) 数据记录方法、装置和系统、计算机存储介质
US10332062B2 (en) Seal delivery tracking system
US8967458B1 (en) Messages associated with unopened delivered packages
JP3229446U (ja) Nfcタグ付名刺
WO2014049622A1 (fr) Système et procédé pour authentifier et partager des produits, tels que des produits et/ou des services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19884318

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19884318

Country of ref document: EP

Kind code of ref document: A2