WO2016135682A1 - An anti-counterfeiting method in which a product code is associated to a dynamic code - Google Patents

An anti-counterfeiting method in which a product code is associated to a dynamic code Download PDF

Info

Publication number
WO2016135682A1
WO2016135682A1 PCT/IB2016/051056 IB2016051056W WO2016135682A1 WO 2016135682 A1 WO2016135682 A1 WO 2016135682A1 IB 2016051056 W IB2016051056 W IB 2016051056W WO 2016135682 A1 WO2016135682 A1 WO 2016135682A1
Authority
WO
WIPO (PCT)
Prior art keywords
code
product
static
dynamic
server
Prior art date
Application number
PCT/IB2016/051056
Other languages
French (fr)
Inventor
Luigi Menghini
Original Assignee
M.V.H. S.R.L.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by M.V.H. S.R.L. filed Critical M.V.H. S.R.L.
Priority to EP16724969.7A priority Critical patent/EP3262579A1/en
Publication of WO2016135682A1 publication Critical patent/WO2016135682A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Definitions

  • the invention refers Lc an innovative method that, allows not only to acquire information on the product, and check the authenticity thereof, but also to impede the further counterfeiting of products destined to the market.
  • the e exist systems that", foresee, for example, the use of Q CODE, or bi -dimensional codes which can be read through a palmtop and that allow to check if the product on which such, a QR_CODE is placed is original or not.
  • This is possible Lhanks to the fact LhaL the QR CODt; allows to transport. with itself multiple in ormation Lhut resid s in electronic form on a server to which the access is mace following the T r eading of the QR_CODE itse1f .
  • a QR Code can be photographed and copied ithfully to be then applied to a fake product, therefore deceiving the consumer although the access Lo the web age shows the originality of the product.
  • the removal of the covering varnish allows o bring the code to light and to bo able zo read it to chock Lhe authenticity of the product.
  • the remov l of the varnish in order to briny the code to Lig L, is an immediate i.ndi cation of the fact that such a code has ready been read and therefore is an indicator of a sort of possi le manumission of the product that wants to be. purchased.
  • an ant i-counterfe i. t ing system sim lar Lo the ones cited above is, for example, described in Lhe applioati on US2004 /034579.
  • the present method comprises the operations of:
  • Each identification static code of the product be it a QR_Codo or another code, can obviously be copied arid duplicated easily to be then applied on fakes to place on the ma ket..
  • the server (3) contains; a data-base in which said static codes (1) are included and, for each static code (1) , the algorithm of generation of the dynamic code associated to it.
  • the server system gives immediately back the resul of the check.
  • the dynamic code inserted or re d in/by the device (2) s created by a specific, processing device programmed with a specific algorithm, the same algorithm of generation of the dynamic code being present In the server that makes the compa- i on .
  • the static code (1) of identific tion of the product can be a bi-dimensi nal code (QR_Code) .
  • QR_Code i.s capable of providing mul iple ' in orma ion, creating a direct .link: with an Internet page.
  • Advant geously such a st tic code (1) of ident f . cation of the product, can be applied di ectly on the product .
  • a central server (3) requesting the insertion of the dynamic code (10) and checking the oompat ibili y between the dynami code inserted and the static code (1) of identification of the producr.
  • the central server (3) having a data-base in which said static codes ( 1. ) are included and, for each static code (1) , the algorithm of generation of the dynamic code associated to it i such a way as to check the compa i lity thereof.
  • said device (2) is a mobile telephony device, the access to the server being made automatically through the reading of the static code (1) with said mobile telephony device.
  • Advant.agcou.jly the reading of said static code (1) foresees the acquisition of the image of the static code (1) , preferably a Q _Code , through said mobile telephony devi c; .
  • the access to the server can be done manually through said do vice (2) and, subsequently, the manual insertion of the static code (1) and of the dynamic code (10) is requested.
  • the server opens a session that foresees the option of purchase of the product.
  • the server sends a second code (Password) to said e-mail address, eliminating the association between the dynamic code (10) and the static code ( 1 ) .
  • Password a second code
  • an operation of geo-localizat ion is foreseen of the reading/inser ion made, the server ha vine:) in memory the positions of the products and generating an alarm when the reading localization does not coincide with one memorized .
  • the device 2 that reads or in which the static code is inserted, if in fact provided with a GPS, allows to send to the server the position where the read ing or the insertion of the static code has been made .
  • the server is programmed to generate a third static code that is associated Lo the combined product.
  • a dynamic code (10) for the generation of a dynamic code (10) .Conned by a variable sequence of codes generated in accordance with a pre-detertnincd algorithm, the dynamic code (10) being associ a ted to said stat c code (I) of identification of the product;
  • a central server (3) is foreseen accessible through the internet and programmed to operate a comparison between the static code (1) of identification of the product and the dynamic code (10) generated by the device (60) in such a way as to check the correct- association of s id two codes and i e a result of comparison back when sa i d codes are i nserted.
  • said central server contains a data-base i which said static codes (1 ) are included and, for each static code (1), the algo ithm of generation of the dynamic code associated to it in such a way as to check the correct association when it receives a comparison request, between two codes inserted.
  • Figure 1 shows schematically an example of QR_Code
  • Figure 2 ows a mobile telephony device (for example, an I -Phone or a smartphone) which reads a QR__Code to then create a connection to a dedicated server 3;
  • a mobile telephony device for example, an I -Phone or a smartphone
  • Figure 3 shows an association of a QR__Code with a dynamic code
  • FIG. 4 and figure b show an example ot plate applicable to a product to place on the market and an example of a bottle on which such a plate is applied;
  • igure 7 and iigure 8 show flowcharts with relation Lo the check of authenti i y of the product and w th relation Lo the purchase of the product.
  • Figure 1 shows schematically a QR_code.
  • Tile QR_code technology (bi-dimens onal code) is well known in the state of the art.
  • Lhe bi-dimensional bar codes present themselves in quadrangular form and are suitable to be framed, for example, with normal palmtops or amartphon.es , already of common use (see, lor example, figure 2) - F.ach code is different, from the others, since its bt-dimensional combination allows an infinity of combin tions, all d ferent one from the other. It is enough to install on the own palmtop 2 a specifi.n application, frcc of charge, which permits the purchase o£ the mage and the subsequent translation of the same, obtaining a connection on the internet to a specific server 3.
  • the server will open one or more specific pages, visible on the palmtop and rel tive to the electro ic address of the QR Code.
  • Figure 2 shows schematically, as a way of example, Lhe acquisition o£ Lhe code through a palmtop 2 and the subsequent protected connection to a server 3 that, allows the openi. rig directly on the palmtop of one or more dedicated pages, corresponding to the address crypt ographed by the code.
  • the QR Code i a first elemen tha i s used to check e authenticit f the product. It is now, however, coupled to a dynamic code ,
  • the dynamic code is per se known and widely used in other technical fields but, naturally, not .lasociated to a code, such as a specific QR Code.
  • the dynaiL.ic code is based on an algorithm that allows to generate a sequence of code, for example numerical, every time differenI but whose generation is not casual, and follows a specific logic.
  • An electronic device is therefore foreseen which has processor programmed to generate such a code (numerical or of another type) on the basis o£ the specific algor hm foreseen. It. is then foresee a receiving server, i turn progra:rimed with the same algor thm.
  • the server is capable of checking if the code received is compatible with the algorithm of generation, therefore checking the authenticity of the code itself.
  • the technology of the dynamic code its, for example, widely used i the banking field, in particular in Home- Banki g .
  • the br nch of the bank gives to each current: account holder an electronic key that generates every time the numerical code that is continuously modif ed on the basis of a pre-determ ned lgo ithm.
  • the access to the private areas of the bank' websit is therefore allowed to the client not only through the insertion of a password and of a user ID, but also through the insertion oi the dynamic code that is generated by the electronic key provided.
  • the user inserts the dynamic code that appears at that moment displayed, on the key and the server of the bank checks if the code inserted corresponds to he correc code and to do this, il cheek.a if such a code .received is compatible with the algorithm foreseen. II Lhe code results to be correct access is given to the private area .
  • each client has an own key which has an own algoriLhm associated to the subject in question.
  • the subject X does not have access to the reserved area of Lhe subject Y if he inser-S the dynamic code of the own key and not that generated by the key provided to the subject. Y .
  • the generation of the code every time different, can take place, for example, at the moment. of the activation of the key or there can exist keys that generate at a continuous cycle such codes and with a battery that has them active 24/24 hours for several ye s .
  • each QR Code is therefore associated to a specific dynamic- code.
  • Figure 3 therefore shows, just as a way of example, a plurality of QR _Codes, each one of which is associated to a specific dynamic code 10. This means that, once a QR_Code has been produced for a certain product or a. range o.t products, to t is QR_Code is coupled w th a specific algorithm of genera Lion of a dynamic code.
  • QR Code (Type 1 - fig. 3) can, for example, be associated a dynamic code. (Type 1 ⁇ fig. 3) whose algoriLhm foresees that the sum of the numbers that compose i f. results Lo bo always the same as a certain pre-fixed number .
  • the server 3 will check if the dynamic code inserted is comp tible, or corresponding, with Ihe one foreseen for said QR Code (therefore check if the atsaociation foreseen is correct by checking if the code received, on the basis of the algorithm, has a sum of the numbers that compose it equal to said pre-fixed. number) .
  • the server 3 therefore, contains a data-base in which all the static codes of the products are contained (for example, the QR Code) and. has a processor programmed w th the algorithms to check the correctness of the dynamic codes associated to the static codes.
  • the device of generation o£ the dynamic code provided, with the product will naturally have a processor that contains the same algorithm of generation contained, in the central .server.
  • the product can, for example, be furnished with such a QR_Code, together wi h a device that generates a dynamic code for such a specific product.
  • Figure 4 schematizes, therefore, in a possible solution, a device that, can be applied to the product, for example in the form ol a plate .1 00 , which contains a. display 110 for the visualization of the dynamic code and the QR Code associated, to it.
  • the device that generates the dynamic code could be furnished separately, for example ir. the form of a key, while the QR_Code can be printed on a classic label, for example in paper or in any other material, and appl ied or anyway appli ab e to the product. to be placed on the market .
  • both the QR Code and the dynamic code could. be furnished separately and not nccoasarily applied directly on the product.
  • the entire functioning system of the .same, as clarified below, is managed by a central server 3 to which a connection can be made via Internet for a check.
  • multi le QR Code (static codes) are printed, each one of which is then appli d or associated to a- series of products that are furnished to the market, for am le to enc or more re-s llera.
  • a re-seller 50 is represented, therefore a first subject (X) , to which a plurality of products tha. he. will sell, are provided.
  • the server 3 to which there can be a connect on through the reading of such codes QR Code (QUI, ...QRn), w ll have in menory the associ tion between said QR Codes arid the algorithm relative to the dynamic code that can be generated every time by the device 60 provided to the specific re-sell r 50.
  • QR Code QUI, ...QRn
  • the purchaser itself reads with the ow.i sniartphone the QR Code applied to the product that wants to be purchased (for exam le, the watch of iigu e 6 indicated with pi) .
  • the reading of the QR_Code is simulated in figure 2.
  • Such a reading gives access, through the Internet, to the Internet page managed by Lho server 3 where it will be requested to insert, in a specif ⁇ c section, the dynami code.
  • the dynamic code is generated and inserted in the specific request area, in such a way that the server receives it and checks _t, activating the check 1gorithm.
  • the algorithm will check that the dynamic code is correct, as wel X as that the association of t to the. relative QR Code is correct.
  • the system checks that the dynamic- code (n) generated is correct and compatible with the QR__Code (n) associated to it.
  • the server 3 in fact, has in memory the associat on between the QR_Cede (QH ' I, ...QRn) of the products of the reseller 50 and the specific dynamic code (that is the correct algorithm) that can be generated by the device 60 l ays in possession of the re -seller 50. Tn that sense, coming the dynamic code from the correct device 60 associated, the check in. thi case will give but an exact correspondonce .
  • the access to the specific page in which the insertion of the dynamic code is requested can eventually provide one or more generic pieces of inforir.at i. on on :he product that is goinq to foe purchased.
  • an alarm of any type can be generated, for example a sound alarm, which indicates the non-originality of the product.
  • the systen is very efficient because, by associating two distinct elements, that is (JR_Codc and dynamic code, it results to be difficult to place on the market, copied products. In fact, when a product is exposed, it would be possible for an ill- ntentioned pe-son to take pictures of the; QR_Code in order to reproduce it in great quantities and apply It on fake products to be placed in the commero i a 1 network.
  • the purchase of the product allows to formalize, in an electronic manner, a change of ownership.
  • a window w l open that requests if the purchase of the product wants to be completed.
  • the server 3 requests the insertion of an electronic e-mail address of the sub ect-purchaser and to which a new Password will be Sent .
  • the server when this purchase! operation ';akt?s place, memorizes the .tact that the QR_Code of the purchased product, (in this case QR1, of the watch) is not associated anymore to the dynamic code generated by the device 60 but rather to the new fixed password, generated. T.n this way, the. subject X (the shop owner) is not memorized anymore as owner and the new owner (the purchaser) will have its recognition password as owner associated to the QR1.
  • the server 3 has in memory for each QR Code a specific algori.-hm. of dynamic: code associated to it and that can be generated y the own specific device.
  • the produc L 200 results to be associated to the QR_Code 201 and to the dynamic code 20 and the whole i s memorized in the memory of the server 3.
  • the QR Code is read and then the dynamic code which appears on the plate 100 is inserted.
  • the di f rence with respect, to the preceding case, is that in this case the ' -e exists a device that generates the own dynamic code for each QR Code, that. is for each object, put on sale.
  • the procedure of change of ownership may be updated without sending the password but updating the personal data of the new owner.
  • the server 3 can be in fact contained he information that indicates tor each QR_ ode who is tiie subjec that owns it (this is obviously updated, as described, also in case of change? of ownership) .
  • the QR1 is associated to the watch f figure 6 and the same QR1 is copied and applied on a fake that is given to a re-seller who ignores the situation.
  • the unaware rev-seller uses the own dynamic code (in ease he is in possession of a dynamic, code) the result will be ,3 fake since that QRl cannot, correspond to dynamic codes belonging to other subjects.
  • the server in that case, may be able to arrive to the information o the person who i s in possession of the original bject, corresponding to said QRl .
  • the readings of the QR_Code being done every time through mobile devices that arc connected to the Internet, llow every time to memorize where su h a reading has been done (through the geo-iocalizator) , when it has been done and also by whom it has been done.
  • a historical archive can thus be created of the readings done.
  • the central server memorizeii for each QR Code read the position in which the reading has been done.
  • This aspect reinforces the safety since it is possible to update every time the data-base of the acrver not only by loading the various QR_Cod.es and relative dynamic codes lor the products placed on the market but the geographical coordinates can also be inserted of the place where destined for saie/distribution. Therefore, if a reading is done in positions that do not correspond to those memorized, then the server can generate an alarm.
  • the example can be a boat, engine and relative boat.
  • the re-seller purchases the two products and assembles them for the sale it i s possible to make a specific request to the server that, automatic lly, generates a univocal oryptographcd Q _Code that jroupa the two codes QR previously associated, thus creating a further univocal QR Code in addition to the two preceding ones that remain valid.
  • the new QR Code. generated represents the authentic ty of the combined product, engine and boat, and with an associated dynamic code that can be one of the previous two dynam c codes.
  • the present invention with any type of code, be it QR___0ode, which have the advantage of being able to memorize a lot of pieces of information, different, one from the o he , and. allow a connection au omatically to the server through the image acquisition, but also o h codes such as the bar codes,
  • the access to the server 3 is done manually through an electronic processor that can obviously coitipr.se also a normal mobile telephony device such s preciscy the said I-Phone or smartphone .
  • an electronic processor that can obviously coitipr.se also a normal mobile telephony device such s preciscy the said I-Phone or smartphone .
  • Ones the ' internet address has been in erted and. we have had access to the dedicated page, then the manual insertion of the bar code (or other code) and of the dynamic code is done.

Abstract

The present invention concerns a method for checking the authenticity of a product, and that comprises the operations of : - Generation of an identification code (1) of a product; - Arrangement of a dynamic code (10) which is associated to said identification code (1) of the product; - Comparison between the identification code (1) of the product and the dynamic code (10); - In case of positive result of said comparison, then the product results to be original and, on the contrary, it will be a fake.

Description

TITLE
AN ANTI-COUNTERFEITING METHOD IN WHICH A PRODUCT
CODE IS ASSOCIATED TO A DYNAMIC CODE
"Pechn a 1 field
l'he present invention concerns the technical field concerning Iho methods for chocking the authen icity of consumer products laced on the m rk t.
in particular, the invention refers Lc an innovative method that, allows not only to acquire information on the product, and check the authenticity thereof, but also to impede the further counterfeiting of products destined to the market.
Background art
Some ant i -counterfoiling systems have long been known that serve to check the authenticity of the product, and that in pari try to inhibit the reproduction of fakes.
Nowadays, in fact, it is no I enough anymore to put an own logo or trademark on the product itself since counterfei.ti ng is so diffused and products are copied in such a precise manner that it results to be difficult for the consumer to distinguish a real product from a lake. It is in fact something common to find in the market products that a e apparently ..Identical to the original ones but thai are actually realized in a fraudulent m nn .
Ail this affect all commerci l sectors from clothing to the food industry and, apart, from implying a big economic loss, in some cases ~hes© products can also result to be dangerous for people's safety and health. This is because, obviously, during the productive phase of fake products poor materials are generally employed which are not complian wi h the law and, therefore, the minimum safety standards imposed by the various norms in force are not respected.
Cases are ot rare? of, for example, purchase of fake ilemii of clothing thai are then the cause; of health problems because they cause irritations and allorgies due to the use of materials that do not comply with the law.
In order to solve such a technical problem, some anti-counterfei i g systems have been ideated that arc of support to check if the product, purchased is really an original one or a fake.
In that sense, the e exist systems that", foresee, for example, the use of Q CODE, or bi -dimensional codes which can be read through a palmtop and that allow to check if the product on which such, a QR_CODE is placed is original or not. This is possible Lhanks to the fact LhaL the QR CODt; allows to transport. with itself multiple in ormation Lhut resid s in electronic form on a server to which the access is mace following the Treading of the QR_CODE itse1f .
Nevertheless, Lho QR_COl.')! cr any oLhor code, for exampl the bar code, is anyway a somehow reproducible elemeriL, copyable and applicable to counterfeit. produeLs .
In that, sense, a QR Code can be photographed and copied ithfully to be then applied to a fake product, therefore deceiving the consumer although the access Lo the web age shows the originality of the product..
In other cases Lhe codes used {for example, the bar codes) are covered with a covering varnish.
The removal of the covering varnish allows o bring the code to light and to bo able zo read it to chock Lhe authenticity of the product. The remov l of the varnish, in order to briny the code to Lig L, is an immediate i.ndi cation of the fact that such a code has ready been read and therefore is an indicator of a sort of possi le manumission of the product that wants to be. purchased.
Nevertheless, nothing impedes the counterfci Lor to purchase the product, remove the varni sh and copy the code that will then be reproduced in great quantity and applied on fakes once covered with the covering varnish.
In all said cases, therefore, alt.hoi.iqh. such known methods put a stop to the copying o the products, i is not excluded that the product that is being purchased is a fake that. reproduces faithfully ail, also a possible Q COHF", or a code covered with covering varnish.
For example, an ant i-counterfe i. t ing system sim lar Lo the ones cited above is, for example, described in Lhe applioati on US2004 /034579.
Disc1oaure o invonLion
It is therefore felt the need to have a method that allows to give precise and sale informa ion on the orig nality of the oduct purchased and, at the s me time, impedes o inhibits beforehand the realization oi counterfe.it products .
These and f rther ims are reached with the present method to check the au henticity of a product, in accordance with claim 1.
The present method comprises the operations of:
- Generation of a static code (I), of identification of a product;
Arrangement of a dynamic code (10) which is associated to said static code (1) of identi.fi cat ion of the product, said dynamic code being a. variable sequence of codes generated i accordance with a pro-determined algorithm;
- Association ol said two codes (1, 10), static and dynamic, to a product or group of products;
At the moment. of the check of authenticity, connec ion of & specific: device (2) Lo a server (3) and sending Lo the server (3) , through said device (2), of said Lwo odes (1. , 1.0) , 3 La Lie and dynam c, associaled to the product nd;
Comparison in the server (3) between the static code (Ί) and the dynamic code (10) , the server (3) being programmed in such a way as to check the correct association of said two codes and give a result of c.ompa ri son back .
In accordance with such a method, all said technical inconveniences are solved.
in particular, thanks to such univocal association between a static code of identification of the product, for example a QR_Code or a bar codes, and. a dynamic code, it is possible to render extremely more difficult the placement in the market of counterfeit products, therefore inh bi ting the counterfeiting, and allowing also at the same Lime a certain and quick check of the originality of the product that wants to be purchased,
Each identification static code of the product, be it a QR_Codo or another code, can obviously be copied arid duplicated easily to be then applied on fakes to place on the ma ket..
The univocal association of such a static code with a dynamic code exceeds such a limit and impedes, in an efficient manner, to duplicate fak.es.
Any one, in fact, who tried to place on the market fakes to which lake static codes 1 have been, applied, will not be able to follow his intentions since he does not know t.'ie dynamic codes associated to each static code of the product that has illegally copied and, therefore, i totally impeded from being able to produce and pl ce fakes on the market.
Advantageou ly, the server (3) contains; a data-base in which said static codes (1) are included and, for each static code (1) , the algorithm of generation of the dynamic code associated to it.
In this manner, once the two codes e inserted at the moment ol the purchase, the server system gives immediately back the resul of the check.
Advan ageously, the dynamic code inserted or re d in/by the device (2) s created by a specific, processing device programmed with a specific algorithm, the same algorithm of generation of the dynamic code being present In the server that makes the compa- i on .
Advantageously, the static code (1) of identific tion of the product can be a bi-dimensi nal code (QR_Code) .
The. advantage of using a QR_Code is that it i.s capable of providing mul iple ' in orma ion, creating a direct .link: with an Internet page.
It; is therefore idoneous for :he pre-fixed ims since it is connected to the central server that manages the check and the way of functioning of the present method.
Advant geously , such a st tic code (1) of ident f . cation of the product, can be applied di ectly on the product .
More specifically, advantageously, an access through the Internet, to a central server (3) is foreseen, the server requesting the insertion of the dynamic code (10) and checking the oompat ibili y between the dynami code inserted and the static code (1) of identification of the producr., the central server (3) having a data-base in which said static codes ( 1. ) are included and, for each static code (1) , the algorithm of generation of the dynamic code associated to it i such a way as to check the compa i lity thereof.
AdvariLagcousiy, said device (2) is a mobile telephony device, the access to the server being made automatically through the reading of the static code (1) with said mobile telephony device.
Advant.agcou.jly, the reading of said static code (1) foresees the acquisition of the image of the static code (1) , preferably a Q _Code , through said mobile telephony devi c; .
Alternatively, advantageously, the access to the server can be done manually through said do vice (2) and, subsequently, the manual insertion of the static code (1) and of the dynamic code (10) is requested.
Advantageously, once the comparison of compatibility has been made between the static code (1.) and the dynamic code (10), the server opens a session that foresees the option of purchase of the product.
Advantageously, in case of purchase o.f the product, the insertion of an e-mail address of the purchaser is requested and subsequently, the server sends a second code (Password) to said e-mail address, eliminating the association between the dynamic code (10) and the static code ( 1 ) .
Advantageously, as a consequence of the reading of the static code with saJd device (2) , or anyway or the insertion thereof, an operation of geo-localizat ion is foreseen of the reading/inser ion made, the server ha vine:) in memory the positions of the products and generating an alarm when the reading localization does not coincide with one memorized .
The device 2 that reads or in which the static code is inserted, if in fact provided with a GPS, allows to send to the server the position where the read ing or the insertion of the static code has been made .
Advantageously, in case of combination of two products to which, two distinct static codes are associated with rela ive; dynamic codes associated, the server is programmed to generate a third static code that is associated Lo the combined product.
It is also described here an assembly to check the authenticity of a product and comprising:
A static code (1) of identi cation of the product;
- Ά device (60) for the generation of a dynamic code (10) .Conned by a variable sequence of codes generated in accordance with a pre-detertnincd algorithm, the dynamic code (10) being associ a ted to said stat c code (I) of identification of the product;
- And wherein a central server (3) is foreseen accessible through the internet and programmed to operate a comparison between the static code (1) of identification of the product and the dynamic code (10) generated by the device (60) in such a way as to check the correct- association of s id two codes and i e a result of comparison back when sa i d codes are i nserted.
Further, advantageously, said central server contains a data-base i which said static codes (1 ) are included and, for each static code (1), the algo ithm of generation of the dynamic code associated to it in such a way as to check the correct association when it receives a comparison request, between two codes inserted.
Brief descri t ion of drawiiigs
Further features and advantages of the present method, accord ng to the invention, will result, to be clearer with ~he description that follows of some cmbudinents , .made to illustr te hut not to limit, with reference to the annexed drawings, wherein:
Figure 1 shows schematically an example of QR_Code;
Figure 2 ows a mobile telephony device (for example, an I -Phone or a smartphone) which reads a QR__Code to then create a connection to a dedicated server 3;
Figure 3 shows an association of a QR__Code with a dynamic code;
- Figure 4 and figure b show an example ot plate applicable to a product to place on the market and an example of a bottle on which such a plate is applied;
- Ficure 6 schematizes .n assembly of products identified by a QR Code to wh ch a dynamic code released to a Bu ject is associ t d ;
igure 7 and iigure 8 show flowcharts with relation Lo the check of authenti i y of the product and w th relation Lo the purchase of the product.
De c tion of some pr fe r red embodimonl s
Figure 1 shows schematically a QR_code.
Tile QR_code technology (bi-dimens onal code) is well known in the state of the art. In fact, Lhe bi-dimensional bar codes present themselves in quadrangular form and are suitable to be framed, for example, with normal palmtops or amartphon.es , already of common use (see, lor example, figure 2) - F.ach code is different, from the others, since its bt-dimensional combination allows an infinity of combin tions, all d ferent one from the other. It is enough to install on the own palmtop 2 a specifi.n application, frcc of charge, which permits the purchase o£ the mage and the subsequent translation of the same, obtaining a connection on the internet to a specific server 3. The server will open one or more specific pages, visible on the palmtop and rel tive to the electro ic address of the QR Code.
Figure 2 shows schematically, as a way of example, Lhe acquisition o£ Lhe code through a palmtop 2 and the subsequent protected connection to a server 3 that, allows the openi. rig directly on the palmtop of one or more dedicated pages, corresponding to the address crypt ographed by the code.
in accordance with the invention, in a first possible embodiment: of -.he inven:.ion, the QR Code i a first elemen tha i s used to check e authenticit f the product. It is now, however, coupled to a dynamic code ,
The dynamic code is per se known and widely used in other technical fields but, naturally, not .lasociated to a code, such as a specific QR Code.
The dynaiL.ic code is based on an algorithm that allows to generate a sequence of code, for example numerical, every time differenI but whose generation is not casual, and follows a specific logic.
An electronic device is therefore foreseen which has processor programmed to generate such a code (numerical or of another type) on the basis o£ the specific algor hm foreseen. It. is then foresee a receiving server, i turn progra:rimed with the same algor thm. In such a manner, when a user sends a dynam c code generated by the own device, the server is capable of checking if the code received is compatible with the algorithm of generation, therefore checking the authenticity of the code itself.
The technology of the dynamic code its, for example, widely used i the banking field, in particular in Home- Banki g .
In fact, the br nch of the bank gives to each current: account holder an electronic key that generates every time the numerical code that is continuously modif ed on the basis of a pre-determ ned lgo ithm. The access to the private areas of the bank' websit is therefore allowed to the client not only through the insertion of a password and of a user ID, but also through the insertion oi the dynamic code that is generated by the electronic key provided. The user inserts the dynamic code that appears at that moment displayed, on the key and the server of the bank checks if the code inserted corresponds to he correc code and to do this, il cheek.a if such a code .received is compatible with the algorithm foreseen. II Lhe code results to be correct access is given to the private area .
Naturally, each client has an own key which has an own algoriLhm associated to the subject in question. In that sense, the subject X does not have access to the reserved area of Lhe subject Y if he inser-S the dynamic code of the own key and not that generated by the key provided to the subject. Y . This is because the access to Lhe own private area implies an dentification ol the subject. X or Y and therefore codes associated to it.
The generation of the code, every time different, can take place, for example, at the moment. of the activation of the key or there can exist keys that generate at a continuous cycle such codes and with a battery that has them active 24/24 hours for several ye s .
Having said that, therefore, in accordance with the invention, each QR Code is therefore associated to a specific dynamic- code.
That allows to inhibit strongly the counterf iting of the product because, although the QR_Code is copyable and applicable en fakes, the correct dynamic code ssociated to it is no rep oducible or known.
Figure 3 therefore shows, just as a way of example, a plurality of QR _Codes, each one of which is associated to a specific dynamic code 10, This means that, once a QR_Code has been produced for a certain product or a. range o.t products, to t is QR_Code is coupled w th a specific algorithm of genera Lion of a dynamic code.
Thus, just as a way of example, to the QR Code (Type 1 - fig. 3) can, for example, be associated a dynamic code. (Type 1 fig. 3) whose algoriLhm foresees that the sum of the numbers that compose i f. results Lo bo always the same as a certain pre-fixed number .
ΛΙ LiiQ moment in which the QR _ ode ±8 read and, as clarified below, the insertion of the dynamic code is requested, the server 3 will check if the dynamic code inserted is comp tible, or corresponding, with Ihe one foreseen for said QR Code (therefore check if the atsaociation foreseen is correct by checking if the code received, on the basis of the algorithm, has a sum of the numbers that compose it equal to said pre-fixed. number) .
The server 3 , therefore, contains a data-base in which all the static codes of the products are contained (for example, the QR Code) and. has a processor programmed w th the algorithms to check the correctness of the dynamic codes associated to the static codes.
The device of generation o£ the dynamic code provided, with the product will naturally have a processor that contains the same algorithm of generation contained, in the central .server.
As per the scheraati zation ci figure 4, therefore, the product can, for example, be furnished with such a QR_Code, together wi h a device that generates a dynamic code for such a specific product.
Figure 4 schematizes, therefore, in a possible solution, a device that, can be applied to the product, for example in the form ol a plate .1 00 , which contains a. display 110 for the visualization of the dynamic code and the QR Code associated, to it.
Always figure 4 schemaLi-.es a button 120 for activating the genera ion of the dynamic code, while figure 5 schematizes the application of the plate .1. 00 to a bottle to place on the market, for example a bottle of oil, wine or an lcoholic be erage, just to m ke an example . Such a plate can therefore! be applied dirocLly on the product before being placed on the market.
Naturally, various equivalen al ernatives can be fo eseen .
For example, the device that generates the dynamic code could be furnished separately, for example ir. the form of a key, while the QR_Code can be printed on a classic label, for example in paper or in any other material, and appl ied or anyway appli ab e to the product. to be placed on the market .
In a further variant both the QR Code and the dynamic code could. be furnished separately and not nccoasarily applied directly on the product.
The entire functioning system of the .same, as clarified below, is managed by a central server 3 to which a connection can be made via Internet for a check.
In fi rst. example of use the functioning is the followi g :
First of all, multi le QR Code (static codes) are printed, each one of which is then appli d or associated to a- series of products that are furnished to the market, for am le to enc or more re-s llera.
As per figure 6, thereiora, a re-seller 50 is represented, therefore a first subject (X) , to which a plurality of products tha. he. will sell, are provided.
Kach one of such products (pi, ...pii) will show a QR_ ode (QR1, ...QRn) or is anyway associated to such a QR_Code . To the re-seller is then, given the device to generate the dynamic code. 60 associated to such QR_Codes,
The server 3, to which there can be a connect on through the reading of such codes QR Code (QUI, ...QRn), w ll have in menory the associ tion between said QR Codes arid the algorithm relative to the dynamic code that can be generated every time by the device 60 provided to the specific re-sell r 50.
In this manner, every time a purchaser wants to chock the authenticity of the product, he can do it in. the following manner.
As per the diagram of figure 7, for example the purchaser itself reads with the ow.i sniartphone the QR Code applied to the product that wants to be purchased (for exam le, the watch of iigu e 6 indicated with pi) . The reading of the QR_Code is simulated in figure 2. Such a reading gives access, through the Internet, to the Internet page managed by Lho server 3 where it will be requested to insert, in a specif \c section, the dynami code.
At this point, through the sey 60 in possession of the seller (subject X), the dynamic code is generated and inserted in the specific request area, in such a way that the server receives it and checks _t, activating the check 1gorithm.
The algorithm will check that the dynamic code is correct, as wel X as that the association of t to the. relative QR Code is correct.
In particular, the system checks that the dynamic- code (n) generated is correct and compatible with the QR__Code (n) associated to it.
The server 3, in fact, has in memory the associat on between the QR_Cede (QH'I, ...QRn) of the products of the reseller 50 and the specific dynamic code (that is the correct algorithm) that can be generated by the device 60 l ays in possession of the re -seller 50. Tn that sense, coming the dynamic code from the correct device 60 associated, the check in. thi case will give but an exact correspondonce .
Naturally, the access to the specific page in which the insertion of the dynamic code is requested can eventually provide one or more generic pieces of inforir.at i. on on :he product that is goinq to foe purchased.
In case of positive check reault, then the originality of the product is confirmed, whi le, on the contrary, an alarm of any type can be generated, for example a sound alarm, which indicates the non-originality of the product.
In this way, the user can check, from the beginning that the product that is going to purchase Is original.
The systen is very efficient because, by associating two distinct elements, that is (JR_Codc and dynamic code, it results to be difficult to place on the market, copied products. In fact, when a product is exposed, it would be possible for an ill- ntentioned pe-son to take pictures of the; QR_Code in order to reproduce it in great quantities and apply It on fake products to be placed in the commero i a 1 network.
Never heless, the ill-intentioned person is not aware of the dynamic code associated to the Q _Codo. In that sense, when he tries to place it on. the market- proposing it, for example, to unaware businessmen, he cannot provide a dynamic code ard further, even if he tried _o give a fake dynamic code Ihe correspondence would not be recognized.
As per ths flowchart of figure 8, the purchase of the product allows to formalize, in an electronic manner, a change of ownership.
Once the dynamic code that will give a positive result has been inserted (for example, the purchase of the watch of the above case) a window w l , open that requests if the purchase of the product wants to be completed.
In the affirmative case ther. the server 3 requests the insertion of an electronic e-mail address of the sub ect-purchaser and to which a new Password will be Sent .
With such a Password the user will have access to a specific area of the purchased product in which the authenticity of tho product is shown.
in this case, the gener tion of a new password is necessary ( ot of the dynamic type anymore but simply numerical ox- al. --numerical ) , since, obviously, the device 60 remains in possession of the shop owner.
The server, when this purchase! operation ';akt?s place, memorizes the .tact that the QR_Code of the purchased product, (in this case QR1, of the watch) is not associated anymore to the dynamic code generated by the device 60 but rather to the new fixed password, generated. T.n this way, the. subject X (the shop owner) is not memorized anymore as owner and the new owner (the purchaser) will have its recognition password as owner associated to the QR1.
Further changes ol ownership will, require the same procedure with a generation every time of u new password for the new owner to which the object purchased and dis i nguished by its QH_Code its associated .
In a variant of the invention, l aving as it is all. that has been described so far, it can be thought oi' selling products in general provided w h a plate themselves that includes a QR Code and a device to generate a dy airic code, as shown in the example of figure b.
in this case), the server 3 has in memory for each QR Code a specific algori.-hm. of dynamic: code associated to it and that can be generated y the own specific device.
Theref re, wi th roterence to figu.re , the produc L 200 (in this case of example the wine bottle) results to be associated to the QR_Code 201 and to the dynamic code 20 and the whole i s memorized in the memory of the server 3.
At the mcment. in which a potential, purchaser wants to check Lh authenticity of the product. 200 before the purchase thereof, then the same stops of the previous example are followed.
Tn particular, the QR Code is read and then the dynamic code which appears on the plate 100 is inserted.
The di f rence, with respect, to the preceding case, is that in this case the'-e exists a device that generates the own dynamic code for each QR Code, that. is for each object, put on sale.
In this case, then, the procedure of "change of ownershi "' will no longer be necessary, since the purchase of the product implies inevitably also the transfer of the device itself that generates the dynamic code.
In this case, the procedure of change of ownership may be updated without sending the password but updating the personal data of the new owner.
In all the cases described, in the server 3 can be in fact contained he information that indicates tor each QR_ ode who is tiie subjec that owns it (this is obviously updated, as described, also in case of change? of ownership) .
t'his has a further advantage in the fight against counterfei ing.
For example, the QR1 is associated to the watch f figure 6 and the same QR1 is copied and applied on a fake that is given to a re-seller who ignores the situation. Clearly, if the unaware rev-seller uses the own dynamic code (in ease he is in possession of a dynamic, code) the result will be ,3 fake since that QRl cannot, correspond to dynamic codes belonging to other subjects.
The server, in that case, may be able to arrive to the information o the person who i s in possession of the original bject, corresponding to said QRl .
The readings of the QR_Code, being done every time through mobile devices that arc connected to the Internet, llow every time to memorize where su h a reading has been done (through the geo-iocalizator) , when it has been done and also by whom it has been done. A historical archive can thus be created of the readings done.
In particular, the central server memorizeii for each QR Code read the position in which the reading has been done. This aspect reinforces the safety since it is possible to update every time the data-base of the acrver not only by loading the various QR_Cod.es and relative dynamic codes lor the products placed on the market but the geographical coordinates can also be inserted of the place where destined for saie/distribution. Therefore, if a reading is done in positions that do not correspond to those memorized, then the server can generate an alarm.
In further variant of the .invention, leaving as it is what has already been described, we can have a sal ease of two distinct objects, each one of which is furnished with iLs own QR Code and relative dynamic code. The example can be a boat, engine and relative boat. At the moment the re-seller purchases the two products and assembles them for the sale it i s possible to make a specific request to the server that, automatic lly, generates a univocal oryptographcd Q _Code that jroupa the two codes QR previously associated, thus creating a further univocal QR Code in addition to the two preceding ones that remain valid. The new QR Code. generated represents the authentic ty of the combined product, engine and boat, and with an associated dynamic code that can be one of the previous two dynam c codes.
The present invention with any type of code, be it QR___0ode, which have the advantage of being able to memorize a lot of pieces of information, different, one from the o he , and. allow a connection au omatically to the server through the image acquisition, but also o h codes such as the bar codes,
for example, in the case of bar codes, the access to the server 3 is done manually through an electronic processor that can obviously coitipr.se also a normal mobile telephony device such s preciscy the said I-Phone or smartphone . Ones the 'internet address has been in erted and. we have had access to the dedicated page, then the manual insertion of the bar code (or other code) and of the dynamic code is done.

Claims

Λ method for checking the au h n icity of a product and that comprises the operations oi:
- Generation of a sialic code (1), of ideritif .cat-.on of a product;
Arrangement of a dynamic code (10) which is associated to said static code (1) of ident f cation of Ihe product, said dynamic code being a variable sequence of codes generated in accordance Willi u predetermined algorithm;
Association of said two codesis (1, 10), static and dynamic, to a product or group of products;
At the moment of the authenticity check, connection to a specific device (2) to a server (3) and sending to the server (3), through said device
(2) , of said, two codes (1, 10) , static and dynamic, assoc a ed to the product and;
- Comparison in the server (3) between the static code (1) and the dynamic code (10) , the server (3) being programmed In such a way as to check the correct association of said two codes and give a result of the compa r i. son ta ck .
A method, as per claim 1, wherein said server
(3) contains a data -base in which sa d static codes ( 1 ) are included and, for each static code (1), the alqorithm of generation of the dynamic; code associated o i b .
A method, as per claim 1 or ?. , wherein the static code, (i; of. identification o£ l.'ie product is a bi- diincnsional code (QR Code) .
4. A method as per one or more of the preceding claims from 1 f.o 3/ . whorein the s La Lie code (1) of ident t fi.cation of the product is applied di rect_y on the product.
5. A method, as per one or more ot the preceding claims, wherein an access through the Internet to the central server (3) is foreseen, the server requesting the insertion of the dynamic code (10) and checking the compatibility between the dynamic code inserted and the static code (1) of identification of the product, the central server (3) having a data-base in which said static codes (1) are included and, for each static code (1), the algorithm of generation ol the dynamic code associated to it in such a way as to check the ccmpatib1 lily ther of-
6. A method, as per one or more of the preced ng claims, wherein uuid device (2) is a mobile telephony device, the access to the server being made automatically through, the reading of the static code (1) with said mobile telephony device.
7. A nieLhod/ as per claim 6, wherein said reading of said static code (1) foresees the acquisition of the image of the static code (1), preferably a R_Oode, through sa id mobi1e he1ephony dovice .
S. A method, as per once or more o£ the preceding claims from 1 to 5, wherein the access to the server is done manually through said device (2) and, subsequently, the manual insertion oi the static code (1) and of the d namic cod (10) is r q ested.
9. A method, as per* one or more, of the preceding claims, wherein, once the comparison ci compatibility is made between the .static code (1) and the dynamic code (10) Lhs server opens a session that foresee.'.; the option of purchase of the product .
10. A method, as per claim 9, wherein, in case of purchase of the product the inserti n of an c-mail address o£ the purchaser is requested and subsequently, the .server sending a second code (Password) to said e-mail address by el minati g the assoc ation between the dynamic code (10) and the static code (1) .
11. A method, as per one or more of the preceding claims, wherein the dynamic code inserted in the device (2) is created by a specific device p og ammed with said algorithm, :.he same algorithm of generation of the dynamic code being present in the server that makes the comparison .
12. A ate hod, as per one or more of the pr eding claims, wherein as a consequence of the reading of the code with said device (P.) an operation of geo-iocaliz tion of the reading done is foreseen, the server having in memory the positions of the products and generating an alarm when Lite locali ation of reading does not coincide with the one memorised.
13. Λ othod, as per one or more of the preceding claims, wherein in case of combination of two roducts to which two distinct static codes are associated with relative associated dynamic codes, the server is programmed to generate a third static code. , An assembly for checking the authen icity of a product and campris."_n :
- A static code (1) of ideal: ification of the product ;
A device (60) lor the generation o.L a dynamic code (10) formed by a var able scqu^n o of codes generated. in accordance with a pre-dete mined algorithm, Lhe dynamic code (10) being associated to said code (1) of identification of the product;
- And wherein a central server (3) is foreseen, accessible through f.he Internet and programmed to operate a compa ison between the static code (1) of identification oi the product and the dynamic code (ID) generated by the devi.ee (60) in .such a. way as to check the correct associ ion of said two codes and give a esul of comparison back when said code:; are inserted . An assembly, as e claim 11, wherein said central, se:.:ver conts ins a da ta-base in wh ich said static codes (li are included and, for each static code Π), the algo ithm oi generation o the dynamic code a ociated to it in such a way as to be able to check the correct- association when i receives a request of comparison between two codes inserted.
PCT/IB2016/051056 2015-02-27 2016-02-26 An anti-counterfeiting method in which a product code is associated to a dynamic code WO2016135682A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16724969.7A EP3262579A1 (en) 2015-02-27 2016-02-26 An anti-counterfeiting method in which a product code is associated to a dynamic code

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITFI2015A000053A ITFI20150053A1 (en) 2015-02-27 2015-02-27 AN ANTI-COUNTERFEITING METHOD IN WHICH A PRODUCT CODE IS ASSOCIATED WITH A DYNAMIC CODE
ITFI2015A000053 2015-02-27

Publications (1)

Publication Number Publication Date
WO2016135682A1 true WO2016135682A1 (en) 2016-09-01

Family

ID=52727226

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2016/051056 WO2016135682A1 (en) 2015-02-27 2016-02-26 An anti-counterfeiting method in which a product code is associated to a dynamic code

Country Status (3)

Country Link
EP (1) EP3262579A1 (en)
IT (1) ITFI20150053A1 (en)
WO (1) WO2016135682A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120187185A1 (en) * 2011-01-20 2012-07-26 Eugene Sayan System and method for detecting counterfeit products and documents, and tracking and authenticating documents
US20130346314A1 (en) * 2007-10-02 2013-12-26 American Express Travel Related Services Company Inc. Dynamic security code push
US20140067675A1 (en) * 2012-09-06 2014-03-06 American Express Travel Related Services Company, Inc. Authentication using dynamic codes
WO2015009900A1 (en) * 2013-07-17 2015-01-22 Wood Stephen M Systems and methods for authenticating goods

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130346314A1 (en) * 2007-10-02 2013-12-26 American Express Travel Related Services Company Inc. Dynamic security code push
US20120187185A1 (en) * 2011-01-20 2012-07-26 Eugene Sayan System and method for detecting counterfeit products and documents, and tracking and authenticating documents
US20140067675A1 (en) * 2012-09-06 2014-03-06 American Express Travel Related Services Company, Inc. Authentication using dynamic codes
WO2015009900A1 (en) * 2013-07-17 2015-01-22 Wood Stephen M Systems and methods for authenticating goods

Also Published As

Publication number Publication date
EP3262579A1 (en) 2018-01-03
ITFI20150053A1 (en) 2016-08-27

Similar Documents

Publication Publication Date Title
CN109345264B (en) Wine product traceability anti-counterfeiting system and method based on block chain
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
US7387249B2 (en) Product verification and authentication system and method
CN101410853B (en) Method and device for obtaining item information using RFID tags
US20020178363A1 (en) System and method for authentication of items
US20190347888A1 (en) Document authentication system
US20120310848A1 (en) Anti-counterfeiting marking with asymmetrical concealment
US20050234823A1 (en) Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution.
CN103797475A (en) Anti-counterfeiting marking with asymmetrical concealment
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
US20140324716A1 (en) Method and system for deterring product counterfeiting
CN104680226A (en) Method For Protecting The Authenticity Of An Article From Imitation And Counterfeit
CN108629603B (en) Commodity anti-counterfeiting method based on two-dimensional code
CN101356538A (en) Method of authentication of items put into circulation field
US20080253560A1 (en) Duo Codes for Product Authentication
CN109359983B (en) Multi-code mutual correction method and system
US10599898B2 (en) Warranty tracking method for a consumer product
EP3262579A1 (en) An anti-counterfeiting method in which a product code is associated to a dynamic code
RU2608240C2 (en) Method of protecting products from forgery and checking authenticity of counterfeit-protected products
CN112308683A (en) Block chain-based steel quality guarantee book generation and management method and system
TW201923674A (en) A warranty tracking method for a consumer product
RU2787209C2 (en) Method and system for marking finished products to detect unauthorized refilling
WO2023105041A1 (en) Method for assigning information referring to a physical object to a nonfungible token
AU2013101090A4 (en) Secure Object System
WO2022101386A1 (en) Document authenticity assessment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16724969

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2016724969

Country of ref document: EP