WO2008078328A2 - Item authentication system and method - Google Patents
Item authentication system and method Download PDFInfo
- Publication number
- WO2008078328A2 WO2008078328A2 PCT/IL2007/001618 IL2007001618W WO2008078328A2 WO 2008078328 A2 WO2008078328 A2 WO 2008078328A2 IL 2007001618 W IL2007001618 W IL 2007001618W WO 2008078328 A2 WO2008078328 A2 WO 2008078328A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- item
- tagged
- central database
- owner
- items
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
Definitions
- the present invention relates to a system and method for authenticating items, and in particular to a system and method for authenticating luxury and high- value brand-name items from multiple brands and companies, tagged with RFID tags.
- Counterfeit products include any product bearing an unauthorized representation of a manufacturer's trademark or trade name.
- Examples of products which have been counterfeited include prescription and over-the-counter drugs, clothing, credit cards, watches, pacemakers, and machine and automobile replacement parts. Because counterfeit products are often of sub-standard quality, there are potential safety risks which may cause personal injury as well as economic loss".
- a customer knows that he's buying a fake brand imitation when for example, he's buying a luxury look-alike from a street vendor, for a fraction of the original product real price.
- fake products find themselves to normal stores, where a customer may purchase them for a full price, not knowing that he's getting an illegal imitation.
- the damage to the original brand is twofold in this case.
- a system for authenticating tagged items from multiple brands and manufacturers comprising:
- a tag reader adapted for reading the tags of the tagged items and retrieving item identification data stored in each tag of the tagged items, the tag reader being further adapted for reading tags in a plurality of formats;
- a central database for storing item records associated with tagged items, wherein each item record corresponds to one of the tagged items, the item record including a plurality of fields comprising the item ID, product name, information about item shipment destination, and item owner's ID after a sale has been registered in the central database;
- an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfaces adapted for interacting with the owner of the tagged item; and (iv) an authentication unit for authenticating a tagged item according to the item identification data read from the tagged item's tag and the item record stored in the central database.
- the system further comprises a registration interface for registration in the central database of the sale of a tagged item.
- the sale registration comprises registering a tagged item owner's details in the central database, the tagged item owner being associated with at least one item record in the central database.
- the registration interface can be implemented in software and / or hardware.
- the tagged item owner is assigned personal identification password.
- authentication of the tagged item requires providing the assigned personal identification password.
- the decision to authenticate a tagged item considers at least one of the following fields in the central database: batch number, shipment date, shipment destination, the serial number, the date of purchase, and the location of the purchase.
- the interactive kiosk is located at the place of purchase or in a public location.
- the input / output interface comprises equipment and/or programs which enable a user to communicate with a computerized system, for example, a keyboard, a mouse, a monitor, a touch screen, a microphone, speakers and other common means available in the industry.
- the authentication unit can be implemented in software and/or hardware.
- the authentication unit authenticates a tagged item by reading the tag of the tagged item and comparing it to the item record stored in the central database.
- a method for authentication tagged items from multiple brands and manufacturers comprising the steps of:
- FIG. 1 is a block diagram of an embodiment of the authentication system including a central database connected via wired and wireless means to interactive kiosks, enterprise databases, an administrative console and to an Internet station.
- Fig. 2 is a schematic illustrating a method for authenticating tagged items from multiple brands and companies.
- the present invention is adapted to authenticate items from multiple brands and manufacturers, and is particularly useful for luxury and high-value brand-name items which are frequently forged.
- Each manufacturer tags its own items independently according to its own requirements and practice.
- the tag reader of the invention is adapted to read tags from a plurality of common protocols and ISO standards. These tags can range from Radio Frequency Identification (RFID) low-frequency (LF) tags at 125Khz or 134.2 Khz; RPID high-frequency (HF) tags at 13.56 Mhz; RFID ultra-high frequencies (UHF) Electronic Product Code (EPC) Generation (Gen) 2; and optically-read barcodes.
- RFID Radio Frequency Identification
- LF low-frequency
- HF high-frequency
- UHF Electronic Product Code
- Gen Electronic Product Code
- Each item's tag needs to be unique in order to identify the specific item amid similar items of the same product.
- the item tag's thus stores item identification data, which includes at least the item's unique identification (ID) number and very often the batch number in which the item was produced. Additional, optional information such as product name, date of manufacture, place of manufacture, expiration date and such, may also be placed on the item ' s tag according to the requirements of the manufacturer or distributor of the item.
- Fig. 1 is a block diagram of an embodiment of the authentication system of the invention.
- Interactive kiosks 10 are connected to tag readers 20 on one hand and to a central database 30 on the other hand via communication lines 40.
- the communication lines 40 can be wired, wireless or both.
- the central database 30 of the invention contains item records associated with products from multiple brands and companies. Each item record typically contains at least the following fields: item identification (ID) code; item validation code; item batch number; item production date; item shipment destination including country and city; item distributor name and address; and related products and advertisement information. Only the item ID code and the item shipment destination are mandatory fields.
- database does not refer only to a single database, but encompasses other database implementations such as a cluster of databases, a collection of local and remote databases connected between them, an implementation using a file system and similar implementations.
- the central database 30 is also connected to enterprise databases 50 of different manufacturers, in order to receive updates about item records.
- the updates can be addition, deletion or modification of item records.
- the tagged item's owner can use an interactive kiosk 10 of the invention in order to authenticate the tagged item.
- the interactive kiosk 10 is typically placed either at the place of purchase or in publicly accessible locations such as a mall, shopping center, airport etc.
- the interactive kiosk 10 is connected to both the tag reader 20 and to the central database 30.
- the communication line 40 to the tag reader 20 is typically a local wired or wireless connection. Alternatively, the tag reader 20 can also be built as part of the interactive kiosk 10 unit.
- the communication line 40 to the central database 30 is typically a remote wired or wireless connection such as through the Internet or through a dedicated communication line.
- the central database 30 communication line 40 may be either a permanent connection, or only activated on- demand.
- the interactive kiosk 10 uses input/output interfaces known in the art in order to communicate with the tagged item owner.
- Such interfaces include a display screen, a touch screen, a keyboard, a mouse, a joystick, a microphone, speakers, printer or similar interfaces capable of communicating with a user.
- the central database 30, is also connected to an administrative console 70 so that the operator of the service can engage in maintenance, administrative and reporting activities with the central database 30.
- an administrative console 70 so that the operator of the service can engage in maintenance, administrative and reporting activities with the central database 30.
- a manufacturer it can be interesting for a manufacturer to request a report regarding how many tagged items were authenticated and registered in a given type period, and break the results by products, brands, geographical regions etc.
- Fig. 2 is a schematic illustrating a method for authenticating tagged items from multiple brands and companies, according to another embodiment of the present invention.
- step 100 the tagged item owner presents the tagged item to the tag reader 20.
- the tag reader 20 then reads the content of the tag, according to the type and technology of the tag, for example different protocols of RPID tags, barcode tags etc.
- the tagged item owner interacts with the interactive kiosk 10.
- Step 110 enables the owner to type an item personal code if available. This step is only required when a tagged item is provided with an additional item personal code that needs to be entered in order to authenticate the tagged item.
- Step 130 tests to see if the item's ID read from the item's tag is present in the central database 30. If the tag ID is not located in the central database 30, step 140 tests to see if the item's tag contained a batch number and if the batch number can be located in the central database 30. If an appropriate batch number cannot be located in the central database 30, step 150 is executed and the authentication failure is registered. Typically, a system administrator is notified of the authentication failure.
- step 160 tests if the interactive kiosk's 10 location is identical to the city and country where the tagged item was shipped to for sale, as registered in the central database 30.
- step 170 If the city and country where the tagged item was offered for sale, are different from the city and country where the tagged item was presented to the interactive kiosk 10, the owner is given a chance in step 170 to enter the city and country where the item was bought. Failure to authenticate the item's place of purchase location leads to an item authentication failure in step 150.
- step 190 tests if the tagged item is already registered in the central database 30 as a tagged item that has been sold and authenticated before.
- step 200 proceeds to register the tagged item and the owner in the central database 30.
- step 210 the owner is requested to enter the buyer personal code that was generated in the registration process.
- the buyer personal code is another authentication layer in order to associate the owner with the tagged item.
- step 220 that is reached either after the tagged item registration in the central database 30 or after the owner successfully entered the buyer personal code, the owner can receive warranty information, update the owner's personal details and receive promotional information about related products, accessories and services.
- the first step of the process is to read the tagged item's tag by the tag reader 20.
- the interactive kiosk 10 then communicates to the central database 30 the item ID code read from the tag along with identifying information about the interactive kiosk 10 in order to identify its location.
- the interactive kiosk 10 also communicates to the central database 30 the nature of the request: authentication, service/warranty information or general information. Some items may require an additional item personal code provided at the time of purchase, in order to authenticate the tagged item. In such case, the tagged item's owner must also provide the item personal code to the interactive kiosk 10.
- the central database 30 retrieves the tagged item's record using the provided item ID code, and proceeds to handle the request.
- 1 st time authentication request - if the item ID is found in the central database 30, the location of the interactive kiosk 10 is compared to the item's shipment destination as stored in the central database 30. If the location of purchase does not match the location of the interactive kiosk 10, the item's owner needs to specify the place of purchase in order to authenticate the item. If an item personal code is registered in the central database 30, the central database 30 checks that it receives the same code from the interactive kiosk 10. If the item's ID, place of purchase location, item personal code (when required), as provided by the interactive kiosk 10, all match those of the central database 30, the item is considered to be authentic.
- the central database 30 proceeds with the registration procedure as defined and required by each manufacturer. For example, the central database 30 may create and send the interactive kiosk 10 an authentication number or the interactive kiosk 10 can print an authentication certification along with warranty information.
- the authenticated tagged item owner is then invited to register relevant personal details such as name, address, electronic address, telephone etc. and also to create a personal identification code to be used in the future.
- the personal identification code can be generated by the central database 30 or by the owner, and may optionally be modifiable later by the owner.
- An item's owner can be associated with more than one tagged item in the central database 30. In this case, the owner does not need to enter the personal details more than once.
- Warranty / service requests - after an item has been authenticated the owner may access warranty information relating the item, and can place a request to service the tagged item.
- General information requests - after an item has been authenticated the owner can access general information such as the item's user manual, available accessories, available upgrades or promotional offers.
- the item's owner can also update his/hers personal details as well as register a new person or entity as the owner of the tagged item, if ownership of the item has changed.
- the personal identification password associated with a tagged item owner includes identification methods known in the art.
- the owner can be assigned a personal user identification (PID) and a password, or his name, telephone number, email address can serve as a PID. In case the owner cannot recall the chosen password, it can be sent to the email address registered in the central database 30.
- PID personal user identification
- the owner can identify itself, and be able to define another password. Examples of common personal questions as used in the art include "mother's maiden name", "the name of the elementary school attended", "name of a favorite pet” etc.
- the owner can define both the question to be asked and the answer to be given.
- the password can be implemented in association with a hardware device, for example, a USB disk-on- key memory device and the term "password" as used herein also includes such hardware implementation of a security code.
- a hardware device for example, a USB disk-on- key memory device
- the term "password" as used herein also includes such hardware implementation of a security code.
- additional products and/or services are offered to the owner of a tagged item when interacting with the interactive kiosk 10.
- the system may offer item's accessories, upgrades, complementary products, special promotions, extended warranty etc.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A system for authenticating tagged items from multiple brands and manufacturers, comprising: a tag reader adapted for reading the tags of the tagged items and retrieving item identification data stored in each tag of the tagged items, the tag reader being further adapted for reading tags in a plurality of formats; a central database for storing item records associated with tagged items, wherein each item record corresponds to one of the tagged items; an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfaces adapted for interacting with the owner of the tagged item; and a device for authenticating a tagged item according to the item identification data read from the tagged item's tag and the item record stored in the central database.
Description
ITEM AUTHENTICATION SYSTEM AND METHOD
FIELD OF THE INVENTION
The present invention relates to a system and method for authenticating items, and in particular to a system and method for authenticating luxury and high- value brand-name items from multiple brands and companies, tagged with RFID tags.
BACKGROUND OF THE INVENTION
According to U.S. Office of Consumer Affairs: "Counterfeit products include any product bearing an unauthorized representation of a manufacturer's trademark or trade name. Examples of products which have been counterfeited include prescription and over-the-counter drugs, clothing, credit cards, watches, pacemakers, and machine and automobile replacement parts. Because counterfeit products are often of sub-standard quality, there are potential safety risks which may cause personal injury as well as economic loss".
Illegal copying of products, and especially of luxury products, is a major problem in the industry, causing considerable financial damage to original product manufacturers. In the past, many fake products were of low quality and were immediately recognizable as fake imitations. In recent years, due to technological progress and sophistication on behalf of the fake product producers, many fake products are not easily recognizable by an innocent, non-expert public.
In some cases, a customer knows that he's buying a fake brand imitation when for example, he's buying a luxury look-alike from a street vendor, for a fraction of the original product real price. In many other cases, fake products find themselves to normal stores, where a customer may purchase them for a full price, not knowing that he's getting an illegal imitation. The damage to the original brand is twofold in this case. On one hand, the financial damage caused by the fake product and on the other hand, the image damage when a customers purchases a fake product of uncertain quality
thinking it is the real brand. If the product deteriorates or does not satisfy his quality expectations, the purchaser may think that the quality of the brand has come down, and thus stop purchasing other products of the brand, file complaints, tell his friends about it or take similar actions against the brand. It has been a continuing race between original product manufactures and illegal product copiers to add authentication means on side, and to bypass these authentication means for the other side. Examples of used authentication means include special seals, holographic marks etc.
SUMMARY OF THE INVENTION It is an object of the present invention to provide a novel system for authenticating purchased items from multiple brands and manufacturers.
In accordance with the present invention, there is thus provided a system for authenticating tagged items from multiple brands and manufacturers, comprising:
(i) a tag reader adapted for reading the tags of the tagged items and retrieving item identification data stored in each tag of the tagged items, the tag reader being further adapted for reading tags in a plurality of formats;
(ii) a central database for storing item records associated with tagged items, wherein each item record corresponds to one of the tagged items, the item record including a plurality of fields comprising the item ID, product name, information about item shipment destination, and item owner's ID after a sale has been registered in the central database;
(iii) an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfaces adapted for interacting with the owner of the tagged item; and (iv) an authentication unit for authenticating a tagged item according to the item identification data read from the tagged item's tag and the item record stored in the central database.
In one preferred embodiment of the present invention, the system further comprises a registration interface for registration in the central database of the sale of a tagged item. Preferably, the sale registration comprises registering a tagged
item owner's details in the central database, the tagged item owner being associated with at least one item record in the central database. The registration interface can be implemented in software and / or hardware.
In another preferred embodiment of the present invention, the tagged item owner is assigned personal identification password. Preferably, after registration in the central database of the sale of a tagged item, authentication of the tagged item requires providing the assigned personal identification password.
In a further preferred embodiment of the present invention, the decision to authenticate a tagged item considers at least one of the following fields in the central database: batch number, shipment date, shipment destination, the serial number, the date of purchase, and the location of the purchase.
Preferably, the interactive kiosk is located at the place of purchase or in a public location.
The input / output interface comprises equipment and/or programs which enable a user to communicate with a computerized system, for example, a keyboard, a mouse, a monitor, a touch screen, a microphone, speakers and other common means available in the industry.
The authentication unit can be implemented in software and/or hardware. The authentication unit authenticates a tagged item by reading the tag of the tagged item and comparing it to the item record stored in the central database.
In accordance with another aspect of the present invention, there is provided a method for authentication tagged items from multiple brands and manufacturers. The method comprising the steps of:
(i) placing a unique tag on each of the items that require authentication; (ii) maintaining a central database for storing item records associated with tagged items, wherein each item record corresponds to one of the tagged items, the item record including a plurality of fields;
(iii) reading item identification data stored in each tag of said tagged items by a tag reader capable of reading tags in a plurality of formats;
(iv) providing an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfaces adapted for interacting with the owner of said tagged item; and
(v) authenticating a tagged item according to item identification data read from the tagged item's tag and the corresponding item record stored in the central database.
BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a block diagram of an embodiment of the authentication system including a central database connected via wired and wireless means to interactive kiosks, enterprise databases, an administrative console and to an Internet station.
Fig. 2 is a schematic illustrating a method for authenticating tagged items from multiple brands and companies.
DETAILED DESCRIPTION OF THE INVENTION
In the following detailed description of various embodiments, reference is made to the accompanying drawings that form a part thereof, and in which are shown by way of illustration specific embodiments in which the invention may be practiced. It is understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present invention.
The present invention is adapted to authenticate items from multiple brands and manufacturers, and is particularly useful for luxury and high-value brand-name items which are frequently forged. Each manufacturer tags its own items independently according to its own requirements and practice. In order for the system of the invention to be able to recognize and authenticate items tagged with different commercially available technologies, the tag reader of the invention is adapted to read tags from a plurality of common protocols and ISO standards. These tags can range from Radio Frequency Identification (RFID) low-frequency (LF)
tags at 125Khz or 134.2 Khz; RPID high-frequency (HF) tags at 13.56 Mhz; RFID ultra-high frequencies (UHF) Electronic Product Code (EPC) Generation (Gen) 2; and optically-read barcodes.
Each item's tag needs to be unique in order to identify the specific item amid similar items of the same product. The item tag's thus stores item identification data, which includes at least the item's unique identification (ID) number and very often the batch number in which the item was produced. Additional, optional information such as product name, date of manufacture, place of manufacture, expiration date and such, may also be placed on the item's tag according to the requirements of the manufacturer or distributor of the item.
Fig. 1 is a block diagram of an embodiment of the authentication system of the invention. Interactive kiosks 10 are connected to tag readers 20 on one hand and to a central database 30 on the other hand via communication lines 40. The communication lines 40 can be wired, wireless or both. The central database 30 of the invention contains item records associated with products from multiple brands and companies. Each item record typically contains at least the following fields: item identification (ID) code; item validation code; item batch number; item production date; item shipment destination including country and city; item distributor name and address; and related products and advertisement information. Only the item ID code and the item shipment destination are mandatory fields.
The term "database" as used herein does not refer only to a single database, but encompasses other database implementations such as a cluster of databases, a collection of local and remote databases connected between them, an implementation using a file system and similar implementations.
The central database 30 is also connected to enterprise databases 50 of different manufacturers, in order to receive updates about item records. The updates can be addition, deletion or modification of item records.
After the purchase of a tagged item, the tagged item's owner can use an interactive kiosk 10 of the invention in order to authenticate the tagged item. The
interactive kiosk 10 is typically placed either at the place of purchase or in publicly accessible locations such as a mall, shopping center, airport etc.
The interactive kiosk 10 is connected to both the tag reader 20 and to the central database 30. The communication line 40 to the tag reader 20 is typically a local wired or wireless connection. Alternatively, the tag reader 20 can also be built as part of the interactive kiosk 10 unit. The communication line 40 to the central database 30 is typically a remote wired or wireless connection such as through the Internet or through a dedicated communication line. The central database 30 communication line 40 may be either a permanent connection, or only activated on- demand.
The interactive kiosk 10 uses input/output interfaces known in the art in order to communicate with the tagged item owner. Such interfaces include a display screen, a touch screen, a keyboard, a mouse, a joystick, a microphone, speakers, printer or similar interfaces capable of communicating with a user. Once a tagged item is authenticated and registered in the central database 30, its owner can use an Internet station 60 in order to connect and login to the central database 30, and view relevant information regarding the tagged item or the owner's account.
The central database 30, is also connected to an administrative console 70 so that the operator of the service can engage in maintenance, administrative and reporting activities with the central database 30. For example, it can be interesting for a manufacturer to request a report regarding how many tagged items were authenticated and registered in a given type period, and break the results by products, brands, geographical regions etc. Reference is now made to Fig. 2 which is a schematic illustrating a method for authenticating tagged items from multiple brands and companies, according to another embodiment of the present invention.
In step 100, the tagged item owner presents the tagged item to the tag reader 20. The tag reader 20 then reads the content of the tag, according to the type and technology of the tag, for example different protocols of RPID tags, barcode tags
etc. In all the following steps, the tagged item owner interacts with the interactive kiosk 10.
Step 110 enables the owner to type an item personal code if available. This step is only required when a tagged item is provided with an additional item personal code that needs to be entered in order to authenticate the tagged item.
Step 130 tests to see if the item's ID read from the item's tag is present in the central database 30. If the tag ID is not located in the central database 30, step 140 tests to see if the item's tag contained a batch number and if the batch number can be located in the central database 30. If an appropriate batch number cannot be located in the central database 30, step 150 is executed and the authentication failure is registered. Typically, a system administrator is notified of the authentication failure.
After either the tag ID or batch number were located in the central database 30, step 160 tests if the interactive kiosk's 10 location is identical to the city and country where the tagged item was shipped to for sale, as registered in the central database 30.
If the city and country where the tagged item was offered for sale, are different from the city and country where the tagged item was presented to the interactive kiosk 10, the owner is given a chance in step 170 to enter the city and country where the item was bought. Failure to authenticate the item's place of purchase location leads to an item authentication failure in step 150.
After the items place of purchase location is authenticated, either by comparing the interactive kiosk's 10 location or by letting the owner enter the address manually, step 190 tests if the tagged item is already registered in the central database 30 as a tagged item that has been sold and authenticated before.
If the tagged item has not been authenticated before, step 200 proceeds to register the tagged item and the owner in the central database 30.
If the tagged item is already registered in the central database 30, as identified in step 190, the in step 210 the owner is requested to enter the buyer personal code that was generated in the registration process. The buyer personal
code is another authentication layer in order to associate the owner with the tagged item.
In step 220, that is reached either after the tagged item registration in the central database 30 or after the owner successfully entered the buyer personal code, the owner can receive warranty information, update the owner's personal details and receive promotional information about related products, accessories and services.
When a tagged item owner uses the interactive kiosk 10, the first step of the process is to read the tagged item's tag by the tag reader 20. The interactive kiosk 10 then communicates to the central database 30 the item ID code read from the tag along with identifying information about the interactive kiosk 10 in order to identify its location. The interactive kiosk 10 also communicates to the central database 30 the nature of the request: authentication, service/warranty information or general information. Some items may require an additional item personal code provided at the time of purchase, in order to authenticate the tagged item. In such case, the tagged item's owner must also provide the item personal code to the interactive kiosk 10.
The central database 30 retrieves the tagged item's record using the provided item ID code, and proceeds to handle the request.
1st time authentication request - if the item ID is found in the central database 30, the location of the interactive kiosk 10 is compared to the item's shipment destination as stored in the central database 30. If the location of purchase does not match the location of the interactive kiosk 10, the item's owner needs to specify the place of purchase in order to authenticate the item. If an item personal code is registered in the central database 30, the central database 30 checks that it receives the same code from the interactive kiosk 10. If the item's ID, place of purchase location, item personal code (when required), as provided by the interactive kiosk 10, all match those of the central database 30, the item is considered to be authentic.
If the item ID is not found in the central database 30, it is still possible to authenticate the tagged item, if the tag provided the item's batch number, and the
item's batch number is matched in the central database 30. The central database 30 then proceeds with the registration procedure as defined and required by each manufacturer. For example, the central database 30 may create and send the interactive kiosk 10 an authentication number or the interactive kiosk 10 can print an authentication certification along with warranty information.
The authenticated tagged item owner is then invited to register relevant personal details such as name, address, electronic address, telephone etc. and also to create a personal identification code to be used in the future. The personal identification code can be generated by the central database 30 or by the owner, and may optionally be modifiable later by the owner.
An item's owner can be associated with more than one tagged item in the central database 30. In this case, the owner does not need to enter the personal details more than once.
Subsequent authentication requests - once a tagged item is already registered in the central database 30 as (sold and) authenticated, subsequent authentication requests must provide the item ID along with the personal identification code of the tagged item's owner.
Warranty / service requests - after an item has been authenticated, the owner may access warranty information relating the item, and can place a request to service the tagged item.
General information requests - after an item has been authenticated, the owner can access general information such as the item's user manual, available accessories, available upgrades or promotional offers. The item's owner can also update his/hers personal details as well as register a new person or entity as the owner of the tagged item, if ownership of the item has changed.
The personal identification password associated with a tagged item owner includes identification methods known in the art. For example, the owner can be assigned a personal user identification (PID) and a password, or his name, telephone number, email address can serve as a PID. In case the owner cannot recall the chosen password, it can be sent to the email address registered in the central
database 30. Alternatively, if the owner has provided an answer to a personal question beforehand, than by answering the question the owner can identify itself, and be able to define another password. Examples of common personal questions as used in the art include "mother's maiden name", "the name of the elementary school attended", "name of a favorite pet" etc. Alternatively, the owner can define both the question to be asked and the answer to be given. Alternatively, the password can be implemented in association with a hardware device, for example, a USB disk-on- key memory device and the term "password" as used herein also includes such hardware implementation of a security code. In another preferred embodiment of the present invention, additional products and/or services are offered to the owner of a tagged item when interacting with the interactive kiosk 10. For example, the system may offer item's accessories, upgrades, complementary products, special promotions, extended warranty etc.
Although the invention has been described in detail, nevertheless changes and modifications, which do not depart from the teachings of the present invention, will be evident to those skilled in the art. Such changes and modifications are deemed to come within the purview of the present invention and the appended claims.
Claims
1. A system for authenticating tagged items from multiple brands and manufacturers, comprising:
(i) a tag reader adapted for reading the tags of said tagged items and retrieving item identification data stored in each tag of said tagged items, the tag reader being further adapted for reading tags in a plurality of formats;
(ii) a central database for storing item records associated with tagged items, wherein each item record corresponds to one of said tagged items, the item record including a plurality of fields comprising the item ID, product name, information about item shipment destination, and item owner's ID after a sale has been registered in the central database;
(iii) an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfacess adapted for interacting with the owner of said tagged item; and
(iv) an authentication unit for authenticating a tagged item according to the item identification data read from the tagged item's tag and the item record stored in the central database.
2. A system according to claim 1, further comprising a registration interface for registration in the central database of the sale of a tagged item.
3. A system according to claims 1 or 2, wherein said registration comprises registering a tagged item owner's details in the central database, the tagged item owner being associated with at least one item record in the central database.
4. A system according to any of claims 1 to 3, wherein the tagged item owner is assigned personal identification password.
5. A system according to any of claims 1 to 4, wherein after registration in the central database of the sale of a tagged item, authentication of the tagged item requires providing the assigned personal identification password.
6. A system according to any of claims 1 to 5, wherein a decision to authenticate a tagged item considers at least one of the following fields in the central database: item ID, batch number, shipment date, shipment destination, the date of purchase, and the location of the purchase.
7. A system according to any of claims 1 to 6, wherein the interactive kiosk is located at the place of purchase or in a public location.
8. A system according to any of claims 1 to 7, wherein the tagged item owner receives warranty and/or service information.
9. A system according to any of claims 1 to 8, wherein additional products and/or services are offered to the owner of a tagged item when interacting with the kiosk.
10. A method for authenticating tagged items from multiple brands and manufacturers, the method comprising the steps of:
(i) placing a unique tag on each of the items that require authentication;
(ii) maintaining a central database for storing item records associated with tagged items, wherein each item record corresponds to one of said tagged items, the item record including a plurality of fields; (iii) reading item identification data stored in each tag of said tagged items by a tag reader capable of reading tags in a plurality of formats;
(iv) providing an interactive kiosk connected to the tag reader and to the central database, the kiosk comprising input/output interfaces adapted for interacting with the owner of said tagged item; and
(v) authenticating a tagged item according to item identification data read from the tagged item's tag and the corresponding item record stored in the central database.
11. A method according to claim 10, further comprising the step of registering in the central database the sale of a tagged item.
12. A method according to claim 10, wherein registering in the central database the sale of a tagged item further comprises the step of registering an item owner in the central database, the item owner being associated with at least one item in the central database.
13. A method according to claim 11, further including the step of assigning the tagged item owner with personal identification password.
14. A method according to claim 10, wherein after registering in the central database the sale of a tagged item, authentication of the tagged item requires providing the assigned personal identification password.
15. A method according to claim 10, wherein a decision to authenticate a tagged item considers at least one of the following fields in the central database: item ID, batch number, shipment date, shipment destination, the date of purchase, and the location of the purchase.
16. A method according to claim 10, wherein the tag reader is located at the place of purchase or in a public location.
17. A method according to claim 10, further including the step of providing the tagged item owner with warranty and/or service information.
18. A method according to claim 10, further including the step of offering the item owner to purchase additional products and/or services.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IL180387A IL180387A0 (en) | 2006-12-27 | 2006-12-27 | Item authentication system and method |
| IL180387 | 2006-12-27 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2008078328A2 true WO2008078328A2 (en) | 2008-07-03 |
| WO2008078328A3 WO2008078328A3 (en) | 2009-04-16 |
Family
ID=39563041
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IL2007/001618 Ceased WO2008078328A2 (en) | 2006-12-27 | 2007-12-27 | Item authentication system and method |
Country Status (2)
| Country | Link |
|---|---|
| IL (1) | IL180387A0 (en) |
| WO (1) | WO2008078328A2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
| US11630675B2 (en) | 2018-04-30 | 2023-04-18 | Hewlett-Packard Development Company, L.P. | Service kiosk device configuration |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020143624A1 (en) * | 2001-03-31 | 2002-10-03 | Koninklijke Philips Electronics N.V. | Machine readable label for tokens and method of use |
| US6938002B2 (en) * | 2001-06-20 | 2005-08-30 | International Business Machines Corporation | System and method for product evaluation |
-
2006
- 2006-12-27 IL IL180387A patent/IL180387A0/en unknown
-
2007
- 2007-12-27 WO PCT/IL2007/001618 patent/WO2008078328A2/en not_active Ceased
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
| US11630675B2 (en) | 2018-04-30 | 2023-04-18 | Hewlett-Packard Development Company, L.P. | Service kiosk device configuration |
Also Published As
| Publication number | Publication date |
|---|---|
| IL180387A0 (en) | 2007-10-31 |
| WO2008078328A3 (en) | 2009-04-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6498123B2 (en) | Digitally protected electronic titles for supply chain products | |
| US20160358187A1 (en) | Open registry for identity of things including social record feature | |
| US20070187266A1 (en) | Method, apparatus, and system for tracking unique items | |
| CN119338481A (en) | Safety Labels | |
| US20160358158A1 (en) | Open registry for identity of things including item location feature | |
| CN105894304B (en) | Product anti-counterfeiting method | |
| WO2019062377A1 (en) | Product anti-counterfeiting management system and method | |
| CN105931056A (en) | Commodity anti-counterfeiting method and device | |
| JP2004501417A (en) | Information system and method | |
| KR20000054665A (en) | Apparatus for and method of preventing illegal reproduction/distribution of digital goods by use of physical goods | |
| KR101487430B1 (en) | Smart a/s system for goods | |
| US20210287227A1 (en) | Method for checking the authenticity of goods or services | |
| CN104899775A (en) | Product anti-counterfeit method and product anti-counterfeit examining method as well as anti-counterfeit package | |
| JP6042367B2 (en) | Asset management server, asset management method, and asset management server program | |
| US20010053949A1 (en) | Secure tracking of articles | |
| JP2018055149A (en) | Shipping product authentication system and server apparatus | |
| US12373981B2 (en) | System and methods for automatically registering and distributing modular computer component information and services through a network | |
| WO2008078328A2 (en) | Item authentication system and method | |
| US20240403868A1 (en) | System and method for managing product ownership | |
| KR20130108022A (en) | System for discriminating a counterfeit and method thereof | |
| JP2001222734A (en) | Merchandise recognition card and its authenticating method | |
| US20210217028A1 (en) | Method and system for the certification of a product to be shipped | |
| JP4476693B2 (en) | Product information provision device | |
| US9652775B2 (en) | System, method, procedure and components for preparing an article for authentication and tracking | |
| JP2004213617A (en) | Electronic guarantee issuing system, electronic guarantee issuing method and electronic guarantee issuing program |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07849644 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 07849644 Country of ref document: EP Kind code of ref document: A2 |