WO2010079465A2 - Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer - Google Patents
Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer Download PDFInfo
- Publication number
- WO2010079465A2 WO2010079465A2 PCT/IB2010/050940 IB2010050940W WO2010079465A2 WO 2010079465 A2 WO2010079465 A2 WO 2010079465A2 IB 2010050940 W IB2010050940 W IB 2010050940W WO 2010079465 A2 WO2010079465 A2 WO 2010079465A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- consumer
- credential
- verifiable
- authentication
- numbers
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
Definitions
- This invention belongs to the field of anti-duplication mechanism for non-electronic consumer products verifiable by end consumer. This invention is applicable to products those doesn't get transferred or sold as second-hand item and thus starts and finishes its life-cycle with single end-consumer.
- Non-electronic consumer products may employ methods like bar- coding, holograms or special packaging.
- Duplication of known brands continues, despite the fact that companies invest in marketing network to gather intelligence and all. Sometimes duplication also continues due to connivance of an insider. In all cases of duplication, companies, government and consumers all three parties suffer. While duplication of bar-coding and holograms is one concern, most important factor is that end consumer doesn't have any verifiable way to determine originality of product. Consumer needs to be educated about verifying holograms of every product, he uses in regular life. Further holograms and such methods are not unique per-piece and can be duplicated.
- Motivation of this invention is to propose a simple seamless method using which an end consumer can verifiably determine the originality of product all by himself without depending on efficiency of company marketing intelligence network or integrity of any insider. This will also enhance the trust in known brand, contain black economy and consumer can spend the money with conviction.
- This invention proposes set of 3 unique credentials generation per-piece of product that needs to be protected against counterfeiting. These credentials are labelled inside the packaging such that consumer can see those credentials and try verification only after packaging is opened following item is billed.
- Invention proposes mobile SMS channel for purpose of communication as auditing and tracking based on mobile numbers are easier.
- Unique credential-set per-piece of product has 3 numbers (for illustration). Customer needs to send first two numbers in authentication request. First number in authentication request is unique-ID (64 bit) and second one is its digest. Digest is required to mitigate any possibility of wrong human input hitting wrong entry in database. Authentication request is processed and third number is sent to consumer for his self- verification.
- Second number is digest of first one
- third number is cryptographic output of first number.
- database will store only first number and one cryptographic key.
- Block Diagram 1 Block diagram of credential set consisting of 3 numbers and description of their role in authentication and storage on database
- Block Diagram 2 Block diagram of credential set label with foldable portion around perforated edge to hide alpha-numeric human readable numbers.
- Block diagram 3 Block diagram of credential set label with foldable portion locked with tamper-evident/ self-destroyable label strip such that alpha-numeric credentials can be seen only after item is billed. Bar-coded form of first unique-Id is exposed and thus logged in point-of-sale system and communicated to database and is leveraged to implement item-theft and mitigating threat of credential- set replacement by junk numbers.
- Block diagram 4 Authentication request processing stages for filtering and analysis of multiple authentication request
- Block diagram 5 Block diagram of scheme to track store-theft and mitigate threat of intentional replacement of credentials by junk numbers.
- Block diagram 6 Block diagram of graphical representation for detection if particular credential-set has been replicated on fake products depending on by what amount the repeated authentication request from different mobile devices for same credential- set is exceeds the average sale rate of product.
- Consumer verifiability Consumer should get a verifiable mathematical data (002) in authentication-response, rather than simply being informed about successful authentication in response to his authentication request. It is shown as third unique-id in diagram 1.
- Automated authentication request filtering If platform detects that same mobile number is firing authentication request for random number using inter-request intervals being same or intelligently altered, it issues certain heuristic instruction understandable only by human. If subsequent authentication request are not following those instructions it ignores all authentication-request sent by particular number. Also from mobile number offender can easily be traced.
- Honey-trap for duplicators Analysis of multiple authentication requests for false positives and false negatives is done.
- typical things to be analysed is multiple authentication request for same credential from different mobile devices to detect replication of credential on fake products and generate system alert (011) if rate of authentication request (from different mobile devices) exceeds average rate of product-sale.
- System alert is accompanied by actionable field intelligence (mobile numbers). Call centre can now enquire from consumers about the purchase-point of items and pass this input to appropriate agency to trace the duplicators.
- Un-intentional multiple authentication request Since unique credentials can be seen after item is billed and packaging is opened and hence there can be multiple authentication-request for same piece (done from same family either for sake of fun or curiosity). Platform applies heuristic method likes authentication requests coming from same set of mobile numbers, inter-request intervals or volume of such request to filter it as un-intentional multiple authentication request.
- Storage optimization Since this platform deals with fast moving consumer goods, database size will be huge. Hence it is proposed that only first unique-ID will be stored and rest two numbers should be mathematically deduced from first one. It is proposed that second number is digest of first unique-ID and third one is cryptographic output of first unique-ID.
- Credential-container Credentials should not be visible and hence labelled in such a way (003) preferably inside the packaging that unless item is billed and packaging is opened authentication cannot be attempted. All 3 alpha-numeric human readable credentials are hidden behind portion of label folded around perorated edge. This folding is protected by tamper-evident self-destroyable locking strip. Product code is exposed to avoid human error and ensure that right label is planted on right product. Bar-coded form of first unique-ID is also exposed to implement item-theft prevention and credential-replacement prevention as described in following sections.
- Credential-set replacement and alternation detection and prevention Disputes can be created by replacement of credential-set by junk numbers after item is billed. This is mitigated by exposing only first number in its bar-coded format (010) such that first unique-ID (64 bit) is recorded in PoS (point of sale) once item is billed and recorded on PoS (point of sale) receipt. Replacement of other two numbers is not possible because those are mathematically deduced from first one. Also authentication request cannot be launched before item is billed as only first number is exposed and second number is still hidden.
- Item-theft prevention and detection Extend this technology to implement store theft mechanism due to insider connivance wherein First number in its bar-coded format can remain exposed (010) such that PoS (point of sale) system records this and send notification to database, once item is billed. If database gets authentication request from particular mobile number for non-billed item then alert is generated to store and appropriate field action can be taken.
- This replicated server can contain the credential- set, which becomes a common knowledge once item is billed and thus credential-set can be replicated on multiple fake units.
- This replicated authentication- server can keep responding with third number without being detectable and authentication being successful.
- One easy way to address this threat is using end- to-end encryption but which may not be possible or costly.
- Another new way to address this threat mode that this invention proposes is that authentication server regularly audits the SMS hit at SMS gateway and does software certification of SMS gateway. Authentication server keeps a copy of binary image of SMS gateway software. It challenges SMS gateway to report its software hash by appending a random nonce at random offset. In case the SMS hit at SMS-gateway and authentication server is significantly different it raises a alert and whole channel can be audited.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This invention proposes a consumer verifiable seamless mechanism of anti-counterfeiting especially applicable to non-electronic consumer products. Known methods like bar-code, holograms, RFID, nano-fingerprinting or special packaging are either not consumer verifiable in tangible manner OR not able to address elaborate threat-model. The invention proposes set of 3 unique credentials generation per-piece of product that needs to be protected against counterfeiting. Once the product is billed, the package is opened customer needs to send first two numbers in authentication request. Authentication request is processed at the authentication server end and third number is sent to consumer end for his self- verification. For storage scalability purposes, invention proposes that both second number and third number should be deduced from first one and thus only first number needs storage. Another important attribute that this invention proposes that it should be technically and tangibly verifiable that a junk credential is not generated by authentication server. Despite being technically replicable, this method becomes full-proof as it is supported by heuristic analysis engine which acts like honey-trap for counterfeiters and this becomes its biggest strength.
Description
Description
Title of Invention: ANTI-DUPLICATION MECHANISM FOR NON-ELECTRONIC CONSUMER PRODUCTS VERIFIABLE BY
END CONSUMER
[1] Claim of Priority
[2] This application claims the priority benefit of Indian Provisional application
No.41/CHE/2009 filed on 7th January 2009 and titled ' ANTI-DUPLICATION MECHANISM FOR NON ELECTRONIC CONSUMER PRODUCTS VERIFIABLE BY END CONSUMER'
[3] DESCRIPTION
[4] The following specification describes the nature of this invention:-
[5] Technical field of invention
[6] This invention belongs to the field of anti-duplication mechanism for non-electronic consumer products verifiable by end consumer. This invention is applicable to products those doesn't get transferred or sold as second-hand item and thus starts and finishes its life-cycle with single end-consumer.
[7] Background & prior art
[8] There are known methods to prevent duplication in computation enabled electronic consumer product. Non-electronic consumer products may employ methods like bar- coding, holograms or special packaging. Duplication of known brands continues, despite the fact that companies invest in marketing network to gather intelligence and all. Sometimes duplication also continues due to connivance of an insider. In all cases of duplication, companies, government and consumers all three parties suffer. While duplication of bar-coding and holograms is one concern, most important factor is that end consumer doesn't have any verifiable way to determine originality of product. Consumer needs to be educated about verifying holograms of every product, he uses in regular life. Further holograms and such methods are not unique per-piece and can be duplicated. Motivation of this invention is to propose a simple seamless method using which an end consumer can verifiably determine the originality of product all by himself without depending on efficiency of company marketing intelligence network or integrity of any insider. This will also enhance the trust in known brand, contain black economy and consumer can spend the money with conviction.
[9] Disclosed is an improved way of anti-duplication test for non-electronic consumer products in a manner verifiable by consumers with end-to-end detectability for any intentional misuse of mechanism.
[10] Summary of the Invention
[11] The following description describes methods and design of invention.
[12] This invention proposes set of 3 unique credentials generation per-piece of product that needs to be protected against counterfeiting. These credentials are labelled inside the packaging such that consumer can see those credentials and try verification only after packaging is opened following item is billed. Invention proposes mobile SMS channel for purpose of communication as auditing and tracking based on mobile numbers are easier. Unique credential-set per-piece of product has 3 numbers (for illustration). Customer needs to send first two numbers in authentication request. First number in authentication request is unique-ID (64 bit) and second one is its digest. Digest is required to mitigate any possibility of wrong human input hitting wrong entry in database. Authentication request is processed and third number is sent to consumer for his self- verification. Since invention talks about fast moving consumer goods or drugs the database size will be huge and hence for scalability purpose, invention proposes that both second number and third number should be deduced from first one and thus only first number needs storage. Second number is digest of first one and third number is cryptographic output of first number. Thus database will store only first number and one cryptographic key.
[13] Niche attributes are listed below,
[14] • • Consumer verifiability
[15] • • 360 degree accountability and auditability for insiders as well
[16] • • Multiple authentication request detection
[17] • • Detection and prevention for replicating credential- set on fake products
[18] • • Automated authentication request flooding detection and prevention
[19] • • False positive and false negative analysis of authentication request
[20] • • Database storage optimization
[21] • • Credential container designed to avoid intentional misuse and un-intentional error
[22] • • Real-time business value data generation for strategic importance
[23] • • Detection and prevention of credential-set replacement
[24] • • Item-theft detection
[25] • • Credential- set replication count to mitigate insider information leakage
[26] • • In-built protection to avoid volume copy of credential- set by insider's system operator
[27] Brief description of the drawings
[28] The invention described herein is illustrated by way of example and not by way of limitation in the accompanying figures. For simplicity and clarity of illustration, elements illustrated in the figures are not necessarily drawn to scale. For example, the dimensions of some elements may be exaggerated relative to other elements for clarity.
[29] Block Diagram 1 : Block diagram of credential set consisting of 3 numbers and description of their role in authentication and storage on database
[30] Block Diagram 2: Block diagram of credential set label with foldable portion around perforated edge to hide alpha-numeric human readable numbers.
[31] Block diagram 3: Block diagram of credential set label with foldable portion locked with tamper-evident/ self-destroyable label strip such that alpha-numeric credentials can be seen only after item is billed. Bar-coded form of first unique-Id is exposed and thus logged in point-of-sale system and communicated to database and is leveraged to implement item-theft and mitigating threat of credential- set replacement by junk numbers.
[32] Block diagram 4: Authentication request processing stages for filtering and analysis of multiple authentication request
[33] Block diagram 5: Block diagram of scheme to track store-theft and mitigate threat of intentional replacement of credentials by junk numbers.
[34] Block diagram 6: Block diagram of graphical representation for detection if particular credential-set has been replicated on fake products depending on by what amount the repeated authentication request from different mobile devices for same credential- set is exceeds the average sale rate of product.
[35] Detailed specification of the invention
[36] The following description describes methods and apparatus for consumer verifiable method. In the following description, numerous specific details such as implementations, types and interrelationships of system components, are set forth in order to provide a more thorough understanding of the present invention. It will be appreciated, however, by one skilled in the art that the invention may be practiced without such specific details. Various low level details which are not directly related to invention or full instruction sequence have not been shown in detail in order not to obscure the invention. Those of ordinary skill in the art, with the included descriptions, will be able to implement appropriate functionality without undue experimentation.
[37] References in the specification to 'embodiment', indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure or characteristic in connection with other embodiments whether or not explicitly described.
[38] In the following description and claims, the terms 'cryptographic' should not be understood to be a specific nature like asymmetric or symmetric cryptography unless
mentioned otherwise the particular kind of algorithm either RSA, AES, 3DES or ECC. Also while the invention is more applicable to non-electronic consumer goods, it can be applicable to electronic products as well. Similarly though this embodiment is described for 3 number system but using a method with 2 number or 4 number system can also be used to implement appropriate functionality with very slight obvious modifications without undue experimentation. It is mentioned in expressed form that while 3 number system proposed in this application is an necessary enhancement over 2 number system and 4 number system does not offer any additional feature that can not be achieved with 3 number system. Hence 3 number- system is an optimal choice. Similarly it is recommended in this application that credential- set should be visible only after item is billed and packaging is opened but even though in alternative simpler packaging it can be labelled or printed such that it remains visible even before item is billed.
[39] Embodiments of the invention is described below,
[40] Consumer verifiability: Consumer should get a verifiable mathematical data (002) in authentication-response, rather than simply being informed about successful authentication in response to his authentication request. It is shown as third unique-id in diagram 1.
[41] Automated authentication request filtering: If platform detects that same mobile number is firing authentication request for random number using inter-request intervals being same or intelligently altered, it issues certain heuristic instruction understandable only by human. If subsequent authentication request are not following those instructions it ignores all authentication-request sent by particular number. Also from mobile number offender can easily be traced.
[42] Honey-trap for duplicators: Analysis of multiple authentication requests for false positives and false negatives is done. At this stage (007) typical things to be analysed is multiple authentication request for same credential from different mobile devices to detect replication of credential on fake products and generate system alert (011) if rate of authentication request (from different mobile devices) exceeds average rate of product-sale. System alert is accompanied by actionable field intelligence (mobile numbers). Call centre can now enquire from consumers about the purchase-point of items and pass this input to appropriate agency to trace the duplicators.
[43] Un-intentional multiple authentication request: Since unique credentials can be seen after item is billed and packaging is opened and hence there can be multiple authentication-request for same piece (done from same family either for sake of fun or curiosity). Platform applies heuristic method likes authentication requests coming from same set of mobile numbers, inter-request intervals or volume of such request to filter it as un-intentional multiple authentication request.
[44] Storage optimization: Since this platform deals with fast moving consumer goods, database size will be huge. Hence it is proposed that only first unique-ID will be stored and rest two numbers should be mathematically deduced from first one. It is proposed that second number is digest of first unique-ID and third one is cryptographic output of first unique-ID.
[45] Credential-container: Credentials should not be visible and hence labelled in such a way (003) preferably inside the packaging that unless item is billed and packaging is opened authentication cannot be attempted. All 3 alpha-numeric human readable credentials are hidden behind portion of label folded around perorated edge. This folding is protected by tamper-evident self-destroyable locking strip. Product code is exposed to avoid human error and ensure that right label is planted on right product. Bar-coded form of first unique-ID is also exposed to implement item-theft prevention and credential-replacement prevention as described in following sections.
[46] Credential-set replacement and alternation detection and prevention: Disputes can be created by replacement of credential-set by junk numbers after item is billed. This is mitigated by exposing only first number in its bar-coded format (010) such that first unique-ID (64 bit) is recorded in PoS (point of sale) once item is billed and recorded on PoS (point of sale) receipt. Replacement of other two numbers is not possible because those are mathematically deduced from first one. Also authentication request cannot be launched before item is billed as only first number is exposed and second number is still hidden.
[47] Item-theft prevention and detection: Extend this technology to implement store theft mechanism due to insider connivance wherein First number in its bar-coded format can remain exposed (010) such that PoS (point of sale) system records this and send notification to database, once item is billed. If database gets authentication request from particular mobile number for non-billed item then alert is generated to store and appropriate field action can be taken.
[48] Insider threat Mitigation: Information leakage should be prevented by inherent checks and balances in system. Volume copy of credential-set even before product is being labelled is identified as one threat. To prevent this platform implements replication-count for unique credential set. This means that one unique credential set can be per-piece or can be replicated on certain number of pieces. Replication-count remains a privileged information of system and not known to outsiders or insiders and is maintained inside hardware rooted trust protected vault. Insider does not have knowledge of replication count for particular credential-set and hence they cannot pass a definitive data to duplicators for manufacturing certain number of fake product with credential- set replicated on each and still remain un-detected. This mitigates possibility of dispute created with malaise intention in connivance with insiders by getting de-
liberately replicating unique credentials, as replication-count is privileged information. Process of printing credentials on label or packaging should be optimally secured (required, if printing is not done directly from number generating secured and audited server) and system operator should be able to see data in its usable form. It is proposed to maintain credential-set in enciphered form and only during label printing it gets printed in its clear text formation to avoid volume copy of credentials. [49] Authentication-server replication: It is possible that by doing a hack in SMS- gateway the authentication request is re-directed to a different server. This replicated server can contain the credential- set, which becomes a common knowledge once item is billed and thus credential-set can be replicated on multiple fake units. This replicated authentication- server can keep responding with third number without being detectable and authentication being successful. One easy way to address this threat is using end- to-end encryption but which may not be possible or costly. Another new way to address this threat mode that this invention proposes is that authentication server regularly audits the SMS hit at SMS gateway and does software certification of SMS gateway. Authentication server keeps a copy of binary image of SMS gateway software. It challenges SMS gateway to report its software hash by appending a random nonce at random offset. In case the SMS hit at SMS-gateway and authentication server is significantly different it raises a alert and whole channel can be audited.
Claims
[Claim 1] 1. A method of consumer verifiable seamlessly applicable, anti- counterfeiting mechanism for non-electronic consumer goods, wherein per-unit credential is a set of 3 unique random numbers.
2. A method of consumer verifiable anti-counterfeiting as in claim 1 wherein, credential set contains 3 unique number per-unit such that three numbers are mathematically co-related such that from first number other two numbers can be deduced and hence it can be technically proven that a valid credential is generated by the authentication-server and a junk credential is not generated by authentication- server.
3. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 2, wherein the final stage of authentication steps involves sending third number as unique response for human verification at consumer and optionally product-specific details like batch number, manufacturing date is sent either in this step or in next step.
4. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 3, wherein after item is billed and packaging is opened the credential- set of three numbers become visible, first two numbers are used to launch authentication-request and after processing at authentication-server, third number is deduced and sent back for consumer- end human verification and thus third number as unique response is used for consumer-side human verification and thus installing public trust and maximum transparency.
5. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 4, wherein one of its embodiments may expose first number of the credential- set of three numbers, for the purpose of accounting in the point-of-sale system and this information can be leveraged to audit whether authentication request is coming for a unbilled stolen item.
6. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 5, wherein to optimize the storage requirement second and third number is mathematically deduced from first one and hence only first number needs to be stored in database.
7. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 6, wherein second number being mathematically co- related with first number is used to mitigate possibilities of error in human input of first number and thus authentication request hitting different entry and polluting database.
8. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 7, wherein, multiple authentication request are routed to heuristic engine for analysis such as multiple authentication requests coming for same credential- set or different credential- set from same or different mobile devices, inter-request timing and locational analysis to determine and generate alert in case system heuristic concludes that particular credential has been replicated on multiple fake product.
9. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 8, wherein, mobile numbers launching authentication request are archived with product-wise and geography- wise information in order to include consumer database for market analysis, returning customer analysis and strategic market decisions.
10. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 9, wherein multiple authentication request are analysed for system alert for field action and alert is generated, when multiple authentication requests from a particular region for a particular credential- set exceeds average sale rate of product in that region.
11 . A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 10, wherein system randomly replicates unique credential- set on random number of units as per a system heuristics and replication-counts for credential is privileged system information.
12. A method of consumer verifiable anti-counterfeiting mechanism as in claim 1 to 11, wherein the authentication server in order to keep transit channel safe, even without end-to-end encryption keeps audit of SMS hit at SMS gateway and itself and regularly does software audit of SMS gateway to verify that SMS-gateway has not been compromised, to avoid possibilities of re-directing the SMS traffic to a different server which might respond to users with third unique number associated with credential- set, that has been replicated on multiple fake products.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN41CH2009 | 2009-01-07 | ||
| IN41/CHE/2009 | 2009-01-07 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| WO2010079465A2 true WO2010079465A2 (en) | 2010-07-15 |
| WO2010079465A3 WO2010079465A3 (en) | 2011-05-05 |
| WO2010079465A9 WO2010079465A9 (en) | 2011-06-23 |
Family
ID=42316913
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2010/050940 Ceased WO2010079465A2 (en) | 2009-01-07 | 2010-03-04 | Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2010079465A2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103732430A (en) * | 2011-08-10 | 2014-04-16 | 丰田自动车株式会社 | Drive device for hybrid vehicle |
| US8740076B2 (en) | 2012-07-11 | 2014-06-03 | Linksmart Technologies Pvt. Ltd. | Label for enabling verification of an object |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2342743B (en) * | 1998-10-17 | 2003-05-14 | Nicholas Paul Elliot | Verification method |
| JP2005517323A (en) * | 2001-10-25 | 2005-06-09 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Method and system for authenticating packaged goods |
| US20070075125A1 (en) * | 2005-09-30 | 2007-04-05 | Muscat Robert G | Packaging and process of authenticating packaging |
-
2010
- 2010-03-04 WO PCT/IB2010/050940 patent/WO2010079465A2/en not_active Ceased
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9122971B2 (en) | 2010-03-10 | 2015-09-01 | Linksmart Technologies Pvt. Ltd. | Label for enabling verification of an object |
| US9361532B2 (en) | 2010-03-10 | 2016-06-07 | Linksmart Technologies Pvt. Ltd. | Label for enabling verification of an object |
| CN103732430A (en) * | 2011-08-10 | 2014-04-16 | 丰田自动车株式会社 | Drive device for hybrid vehicle |
| US8740076B2 (en) | 2012-07-11 | 2014-06-03 | Linksmart Technologies Pvt. Ltd. | Label for enabling verification of an object |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2010079465A3 (en) | 2011-05-05 |
| WO2010079465A9 (en) | 2011-06-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101036152B (en) | Methods and systems for making, tracking and authentication of products | |
| EP2810402B1 (en) | A method and database system for secure storage and communication of information | |
| US10972264B2 (en) | Method for realizing network electronic identity identification information protection based on key dispersion calculation | |
| Delgado-Mohatar et al. | Blockchain-based semi-autonomous ransomware | |
| Karaduman et al. | Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand. | |
| Saputra | A survey of cyber crime in Indonesia | |
| CN109447809A (en) | A kind of video active identification method of combination block chain | |
| CN102622624B (en) | A kind of commodity counterfeit prevention identification system and method | |
| WO2010079465A2 (en) | Anti-duplication mechanism for non-electronic consumer products verifiable by end consumer | |
| Mayes et al. | Transport ticketing security and fraud controls | |
| US20080281759A1 (en) | System and Method for Registration Control | |
| Wang et al. | The evolutional view of the types of identity thefts and online frauds in the era of the internet | |
| Rzaieva et al. | Methods of Personal Data Protection in Retail: Practical Solutions | |
| CN116192469A (en) | Security anti-theft method for electronic card transaction or transmission | |
| CN116091190A (en) | Bank physical management method, device and computer readable storage medium | |
| Mayes et al. | Information security best practices | |
| Hsiang | A secure and efficient authentication scheme for m-coupon systems | |
| US20250378145A1 (en) | System for linking physical products to blockchain-connected digital entities and authentication of the physical products | |
| US20070192589A1 (en) | System and method for encrypting webpage logs | |
| Rani et al. | Blockchain Technology for Safeguarding Against Counterfeits | |
| KR20130037790A (en) | Method and system of brokering real estate transactions using smart portable devices | |
| Goh et al. | Blockchain-based online virtual store (BOVS): A secure framework for managing machine-created elements in business process management | |
| Kumar et al. | Using Blockchain in IoT for Pharmaceutical Drug Supply | |
| Karuppiah | Blockchain for digital rights management | |
| Seto et al. | Ensuring document security and privacy in transpromo printing |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10729137 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10729137 Country of ref document: EP Kind code of ref document: A2 |