[go: up one dir, main page]

WO2020044373A1 - System and method for preventing counterfeiting of a product - Google Patents

System and method for preventing counterfeiting of a product Download PDF

Info

Publication number
WO2020044373A1
WO2020044373A1 PCT/IN2019/050625 IN2019050625W WO2020044373A1 WO 2020044373 A1 WO2020044373 A1 WO 2020044373A1 IN 2019050625 W IN2019050625 W IN 2019050625W WO 2020044373 A1 WO2020044373 A1 WO 2020044373A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature
identifiers
product
label
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IN2019/050625
Other languages
French (fr)
Inventor
Sharique ALI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2020044373A1 publication Critical patent/WO2020044373A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • G06V10/225Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition based on a marking or identifier characterising the area
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns

Definitions

  • the present disclosure relates to preventing counterfeiting of a product, and more particularly, relates to a method and a system for automatic detection of a counterfeit product by a stakeholder in a supply chain.
  • Counterfeiting happens when a manufacturer makes a product that is an illegal or unauthorized copy of a genuine product. Counterfeiting is a global problem and is prevalent across almost all industries such as apparels, accessories, leather items, handbags, footwear, pharmaceuticals, personal care, perfumes, jewelry, optical media, consumer electronics, automobile parts, watches, toys, tobacco products, and fast moving consumer goods. Sometimes, consumers knowingly buy counterfeit or pirated products as they are cheaper. Whereas, sometimes consumers are unaware that they are purchasing counterfeit or pirated products.
  • Counterfeiting is a concern to the consumers, business and the government.
  • the government is concerned because counterfeiting has a negative effect on innovation and threatens the welfare of consumers.
  • the money mobilized from the sale of the counterfeit products may be channelized towards funding criminal activities, and organized crimes, thereby leading to loss of jobs and loss on account of unpaid taxes.
  • the businesses are concerned because counterfeit products leads to decreased sales of genuine product, dilution of brand value and thereby firm reputation. Further, it makes difficult for the companies to invest in research and development for a new product development.
  • the consumers are concerned because the use of the counterfeit products puts their health at risk as such products are unsafe to use. Also, the use of such products makes them a party to a criminal activity.
  • a method for preventing counterfeiting of a product includes creating a first signature by forming a unique random pattern on an input surface by using one or more colorful liquids and one or more brushes, associating one or more first identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
  • a method for preventing counterfeiting of a product includes creating a first signature by forming a unique random pattern on an input surface using fibers present in one or more materials, associating one or more first identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
  • a method for preventing counterfeiting of a product includes creating a first signature by forming a unique random pattern on an input surface by attaching one or more materials thereto, associating one or more identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
  • a system for preventing counterfeiting of a product includes a pattern creation unit for creating a first signature by forming a unique random pattern on an input surface by using one or more materials, and a printing unit for associating one or more first identifiers to the first signature to form a first label.
  • the system further includes a capturing unit for capturing an image of the first label, a signature database for storing the image of the first label, and a verification server.
  • the verification server receives an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checks if the one or more second identifiers are present in the signature database, compares the second signature with a signature stored corresponding to the one or more second identifiers in a signature database using machine learning methods, when the one or more second identifiers are present in the signature database, and labels the product as authentic, when the comparison is successful.
  • the present disclosure describes a method of creating a unique signature that is difficult and costly to copy.
  • the unique signature is created by forming random patterns on an input surface.
  • the input surface include, but not limited to, paper, plastic, metal, cotton or any other solid surface.
  • the pattern may be formed on the input surface by painting one or more colorful liquids with the use of one or more brushes, by dropping one or more colorful liquids, or by spraying one or more colorful liquids through a random motion of one or more brushes.
  • the pattern may be created by using fibers present in natural materials or synthetic materials.
  • fibers present in natural materials or synthetic materials When certain fibers are used to make a paper or any other similar sheet, the finished product is left with random impressions, which are impossible to replicate or reproduce.
  • paper prepared from a banana plant material, a mango plant material, or other such high fiber material contains unique marks, which are impossible or very difficult to copy.
  • the pattern may be created by dispersing and/or randomly pasting one or more materials on an input surface.
  • a signature created in this manner is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable. Also, if shinny materials are used, the signature appears to be different when viewed from various angles, thereby making it more robust.
  • FIG.1 illustrates a system for preventing counterfeiting of a product, in accordance with an embodiment of the present disclosure
  • FIG. 2A illustrates a first pattern creation unit and signatures generated thereby, in accordance with an embodiment of the present disclosure
  • FIG. 2B illustrates association of exemplary identifiers to the signatures created by the first pattern creation unit
  • FIGs. 3A and 3B illustrate a second pattern creation unit and signatures generated thereby, in accordance with an embodiment of the present disclosure
  • FIG. 3C illustrates association of exemplary identifiers to the signatures generated by the second pattern creation unit
  • FIG. 4A illustrates a third pattern creation unit, in accordance with an embodiment of the present disclosure
  • FIG. 4B illustrates exemplary signatures created by the third pattern creation unit, in accordance with an embodiment of the present disclosure
  • FIGS. 4C illustrates a different glow or color that appear when a signature is viewed at different angles
  • FIG. 4D illustrates association of exemplary identifiers to the signatures generated by the third pattern creation unit
  • FIG. 5 illustrates exemplary products that bear signatures generated by the pattern creation unit
  • FIG. 6 illustrates an exemplary process of verifying if a product is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure
  • FIG. 7 is a flowchart illustrating a method for creating a signature and associating the signature with one or more identifiers, in accordance with an embodiment of the present disclosure
  • FIG. 8 is a flowchart illustrating a method for verifying if a product is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure.
  • FIG. 9 is a flowchart illustrating a method for verifying if a product is an original product or a counterfeit product, in accordance with another embodiment of the present disclosure
  • Counterfeiting is an ever-increasing problem. Counterfeiting is possible when it’s easy to copy features of an original product with a precision that makes it difficult for a common user to differentiate between the original and the counterfeit product. For items, where there is little scope for product differentiation, such as medicines, tobacco product etc., and product packaging is the only way to identify a genuine and fake product, counterfeiting is even easier. While most existing solutions based on QR code, Barcode, etc. are unique for each product, they are still easy to copy. The present embodiments overcome these problems by creating a unique signature that is very difficult to copy.
  • FIG.1 illustrates a system 100 for preventing counterfeiting of a product, in accordance with an embodiment of the present disclosure.
  • the system 100 includes a pattern creation unit 102 for forming a unique random pattern on an input surface to create a signature corresponding to the unique random pattern.
  • the input surface may be any surface on which a unique signature may be created. Examples of the input surface include, but are not limited to, paper, plastic, metal, cardboard, cotton or any other solid surface.
  • the signatures created by the pattern creation unit 102 may be in the form of stickers that may be easily pasted on the products.
  • the signatures created by the pattern creation unit 102 may be in the form of tags that may be attached to the products.
  • the system further includes a printing unit 104.
  • the printing unit 104 receives the signature from the pattern creation unit 102 and associates one or more identifiers with the signature to generate a label.
  • the printing unit 104 may print the one or more identifiers next to the signature to generate the label.
  • the identifier may be a number, a QR code, a Barcode, a decimal number, an alphanumeric number, etc.
  • the system further includes an image capturing unit 106 for capturing an image of the label and storing in a signature database 108.
  • the signature database 108 stores the image of the label and periodically transmits the image to a verification server 112 through a network 110.
  • the verification server 112 parses the received image of the label and stores the parsed image in a database for future reference.
  • the image capturing unit 106 may include a camera, a scanner, a smart phone, a tabloid, or any other device capable of capturing images.
  • the network 110 may be any suitable wired network, wireless network, a combination of these or any other conventional network, without limiting the scope of the present disclosure. Few examples may include a Local Area Network (LAN), wireless LAN connection, an Internet connection, a point-to-point connection, or other network connection and combinations thereof.
  • LAN Local Area Network
  • wireless LAN connection an Internet connection
  • point-to-point connection or other network connection and combinations thereof.
  • FIG. 2A illustrates a first pattern creation unit 204 (an example of the pattern creation unit 102) and few signatures 206 till 212 generated by the first pattern creation unit 204.
  • the first pattern creation unit 204 includes brushes and colorful liquids to create patterns on a plain first input surface 202 and generate signatures 206 till 212.
  • the signatures 206 and 208 are created by dropping one or more colorful liquids on the first input surface 202.
  • the signatures 210 and 212 are created by spraying one or more colorful liquids through a random motion of one or more brushes on the first input surface 202.
  • each of the signatures 206 till 212 is unique, and difficult to copy.
  • each of the signatures 206 till 212 may be fixed on a product to represent a unique signature.
  • the product may be from any industry like footwear, designer wear, apparels, watches, leather items, pharmaceutical, jewelry items, etc.
  • FIG. 2B illustrates association of exemplary identifiers to the signatures 206 and 212 by the printing unit 104.
  • the printing unit 104 prints the identifiers next to the signatures 206 and 212.
  • the printing unit 104 prints a QR code 222 and a random number 224 next to the signature 206 to form a label 225.
  • the QR code 222 and the random number 224 are unique to the signature 206, thereby making the signature 206 difficult to copy.
  • the printing unit 104 prints a QR code 226 and a random number 228 next to the signature 212 to form another label 229.
  • the printing unit 104 prints a bar code 230 and a number 232 next to the signature 206 to form yet another label 233.
  • the image capturing unit 106 then captures the images of all the labels 225, 229 and 233.
  • the images of the labels 225, 229 and 233 are then saved in the signature database 108 and periodically sent to the verification server 112.
  • the verification server 112 parses the received images of the labels 225, 229 and 233 and stores the parsed image in a database for future reference.
  • the verification server 112 parses the signature as well as the one or more identifiers and stores them in the database.
  • FIGs. 3A and 3B illustrate a second pattern creation unit 304 (an example of the pattern creation unit 102) and few signatures 306 till 330 generated by the second pattern creation unit 304.
  • the second pattern creation unit 304 creates a signature on a second input surface 302 with the use of fibers present in naturally occurring materials.
  • the second input surface 302 may be a paper.
  • the second input surface 302 may be any surface on which fibers may be applied.
  • the second input surface 302 may be any fibrous material such as plant leaves, plant stems, synthetic fibers, etc.
  • the second pattern creation unit 304 may create a random pattern on the second input surface 302 by pasting the natural or synthetic fibers on the second input surface 302. In another embodiment, the second pattern creation unit 304 may create a random pattern on the second input surface 302 by embedding the natural or synthetic fibers on the second input surface 302. In yet another embodiment, the second pattern creation unit 304 may create a random pattern by creating a sheet out of the natural or synthetic fibers. Moreover, during the process of such sheet preparation (for example paper), the pattern creation unit 304 may add certain fibers (natural or synthetic) to the natural or synthetic fibers so that the finished product is left with unique and random marks.
  • signatures 308, 310, 312 and 314 are created by applying banana plant fibers on the second input surface 302.
  • signatures 316, 318, 320 and 322 are created by applying mango plant fibers on the second input surface 302.
  • signatures 324, 326, 328 and 330 are created by adding first form of fibers (natural or synthetic) to a second form of natural or synthetic fibers, and applying the combination on the second input surface 302.
  • FIG. 3C illustrates association of exemplary identifiers to the signature 312 by the printing unit 104.
  • the printing unit associates the identifiers with the signature 312 by printing the identifiers next to the signature 312.
  • the printing unit 104 prints a unique number 332 next to the signature 312 to form a label 333.
  • the printing unit 104 prints another unique number 334 next to the signature 312 to form another label 335.
  • the number 334 is unique to the signature 312, thereby making the signature 312 difficult to copy.
  • the images of the labels 333 and 335 are then saved in the signature database 108.
  • the signature database 108 periodically sends the images to the verification server 112.
  • the verification server 112 parses the received images of the labels 333 and 335 and stores the parsed image in a database for future reference.
  • the verification server 112 parses the signatures as well as the one or more identifiers.
  • FIG. 4A illustrate a third pattern creation unit 402 (an example of the pattern creation unit 102) for generating unique random patterns on a third input surface 404 by dispersing and/or randomly pasting one or more materials on the third input surface 404.
  • the one or more materials include, but are not limited to, granular threads, granular sheets, granular particles, glowing materials, shiny 3D materials, and any other material having texture different from the input surface.
  • the unique patterns on the third input surface 404 form a unique signature that is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with an uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable.
  • FIG. 4B illustrates exemplary signatures created by the third pattern creation unit 402 on the third input surface 404.
  • signatures 410 and 412 are created by randomly dispersing fine hair like threads on the third input surface 402.
  • signatures 418 and 420 are created by randomly dispersing shinny granular threads on the third input surface 402.
  • signatures 414 and 416 are created by randomly dispersing shinny granular sheets on the third input surface 402.
  • FIG. 4C illustrate a different glow or color that appear when a signature is viewed at different angles.
  • a first signature 422 till 428 looks different, when viewed through different angles.
  • a second signature 430 till 436 looks different when viewed through different angles.
  • the signature created in the process is unique and not easy to copy.
  • the signature has a different texture that may be easily felt with the movement of the hands on the signature.
  • the color on the signature appears to be different when viewed at different angles.
  • FIG. 4D illustrates association of exemplary identifiers to the signatures 448, 452, and 456 by the printing unit 104.
  • the printing unit 104 prints a number 450 next to a signature 448 to form a label 451 , a bar code 454 next to a signature 452 to form another label 455, and a QR code 458 next to a signature 456 to form a label 459.
  • the images of each of the labels 451 , 455 and 459 are captured by the image capturing unit 106 and saved in the signature database 108.
  • the signature database 108 sends the images to the verification server 112 periodically.
  • the verification server 112 parses the received image of the label and stores the parsed image in a database for future reference.
  • FIG. 5 illustrates exemplary products 502 and 508 that bear signatures generated by the pattern creation unit 102, in accordance with an embodiment of the present disclosure.
  • the products 502 and 508 may be from any industry like footwear, designer wear, apparels, watches, leather items, pharmaceutical, jewelry items, etc.
  • the product 502 bears a signature 504 and a corresponding identifier 506 (collectively referred to as a label 507).
  • the label 507 may be attached to the product 502 by pasting, tagging, embedding, air drying using hot air dryers, LED (light emitting diode) dryers, UV (ultra violet) dryers.
  • a label 513 may be attached on the product 508.
  • the labels may be attached to all the products in a supply chain by a vendor to distinguish the products from each other. All the products in a supply chain are attached with a label.
  • the signature and the one or more identifiers associated with the signature are unique to that product only. No two products may have similar signatures. Further, no two similar signatures may have similar patterns, thereby making the signature more robust and difficult to copy.
  • the signatures and their identifiers help in distinguishing a product from other products in a supply chain. Further, the signatures and their identifiers help a costumer to verify if a product in the supply chain is an original product or a counterfeit product.
  • FIG. 6 illustrates an exemplary process 600 of verifying if a product 602 is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure.
  • the product 602 includes a signature 604 and identifiers 606 and 608 printed thereto.
  • the signature 604 and identifiers 606 and 608 are collectively referred to as a label 609.
  • the signature 604 is created by pasting shinny granular sheets on an input surface.
  • the input surface bears the granular sheets on one side and self-adhesive film on the other side, thereby making the signature 604 an easy to use sticker.
  • the identifier 606 and the identifier 608 are then printed with the signature 604 to form the label 609.
  • the label 609 may then be easily pasted on a surface of the product 602.
  • the identifier 606 is a QR code and the identifier 608 is a unique number.
  • a user 612 also referred as client or client site
  • the user 612 may scan the QR code 606 using a scanning device 610 and send it to the verification server 112 through the network 110.
  • the verification server 112 has a repository of images of labels which are received by the verification server 112 from the signature database 108 on timely basis.
  • the scanning device 610 may be a smart phone.
  • the scanning device 610 may be a tabloid.
  • the scanning device 610 may be any other device capable of scanning codes.
  • the user device 610 runs an application of the verification server 112 for quick verification of the signatures of the product 602.
  • the verification server 112 Upon receiving the QR code 606, the verification server 112 checks in its database, if the received QR code is present in the database. On verifying the QR code, the verification server 112 further checks if a signature corresponding to the QR code 606 is stored therein. The image retrieved from the database of the verification server 112 is displayed at user device 610. The user may then manually compare the image of the signature received with the signature 604 present on the product 602. If both the images match, then the product 602 is an original product, else the product 602 is a counterfeit product.
  • the user may send the number 608 to a third party through messaging, email, instant messaging or calling.
  • the user may enter the number 608 on a web interface.
  • the third party may send the number 608 to the verification server 112 for verification of the signature 604.
  • the user 612 may capture an image of the label 609 (signature 604, the QR code 606 and number 608) and share the image with the verification server 112.
  • the image may be shared via specific chat bot, a smartphone application, a web interface or any third party applications such as WhatsApp, Facebook, Messenger, etc.
  • the verification server 112 may parse the signature 604, the QR code 606 and the number 608 and compare using machine learning algorithm the parsed image of the signature 604 with the original saved image corresponding to the given identifier. If the two images match, then the product is verified or genuine and this information (referred as response) may be communicated to the user 612.
  • the product is unverified or fake and this information may also be communicated to the user 612.
  • the verification server 112 is not able to determine with a reasonable certainty whether the two images are same or different, the original image of the signature 604 is sent to the user device 610. The user 610 may then manually check if the original image of signature received is same as the signature 604 on the product 602.
  • any user may check for the authenticity of a product/documents/item using above solution, information like location, contact number etc. may be gathered (in concurrence with the user) when a user contacts the verification server 112 to check for the authenticity of the product 602.
  • the collected information corresponding to each product may be stored at the server 112 and may be used to track the flow of the product in the entire supply chain.
  • the application available at the user end may be used to engage with the user at the point of sale. The engagement may in the form of feedback, rating or any other marketing communication. All this information gathered may be analyzed and be used by companies in order to strategize better.
  • FIG. 7 is a flowchart illustrating a method 700 for creating a signature and associating the signature with one or more identifiers, in accordance with an embodiment of the present disclosure.
  • an input surface is received on which a signature is to be created.
  • the input surface 101 include, but not limited to, paper, plastic, metal, cotton or any other solid surface.
  • a unique random pattern is created on the input surface to form a signature.
  • the pattern on the first input surface may be created by using one or more colorful liquids and one or more brushes.
  • the colorful liquids may include painting colors, dyes, inks, natural fruit colors, etc.
  • the pattern may be created on the input surface by using fibers present in natural materials or synthetic materials.
  • fibers present in natural materials or synthetic materials When certain fibers are used to make a paper or any other similar sheet, the finished product is left with random fingerprints, which are impossible to replicate or reproduce.
  • paper prepared from a banana plant material, a mango plant material, or other such high fiber material contains unique marks, which are impossible or very difficult to copy.
  • a pattern may be created by dispersing and/or randomly pasting one or more materials on the input surface.
  • the one or more materials include, but not limited to, granular threads, granular sheets, granular particles, glowing materials, shiny 3D materials, any other material having texture different from the input surface, etc.
  • a signature created in this manner is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable.
  • the output signature is associated with one or more identifiers by printing the one or more identifiers next to the signature to form a label.
  • the one or more identifiers may be a decimal number, an alphanumeric number, a QR code, a Barcode, etc.
  • Each identifier is unique and corresponds to the signature.
  • FIG. 8 is a flowchart illustrating a method 800 for verifying if a product is original product or a counterfeit product, in accordance with an embodiment of the present disclosure. All the products in a supply chain are attached with a label corresponding to a signature and one or more identifiers associated with the signature. Each signature is unique and the one or more identifiers correspond to the unique signature.
  • a label (a signature and one or more identifiers) attached to a product are identified by a customer willing to buy the product.
  • the one or more identifiers are sent to a verification server by the customer.
  • the customer may scan the one or more identifiers and send them to the server through a corresponding application running on their computing device.
  • the customer may send the one or more identifiers to a third party. The third party may further send the identifiers to the server.
  • the verification server checks if the received one or more identifiers are present in a database.
  • the verification server checks for an image of a signature corresponding to the one or more identifiers. Each time a signature is created, an image of that signature with the associated identifiers is stored at the server (as describes in FIG. 1). The verification checks for that original image of the signature on receiving the one or more identifiers.
  • the verification server sends the original image of the signature to the costumer, either directly or through the third party, on his/her phone or any other device. The user may then manually compare the original image of the signature received with the signature present on the product. If both the images match then the product is an original product, else the product is a counterfeit product.
  • FIG. 9 is a flowchart illustrating a method 900 for verifying if a product is an original product or a counterfeit product, in accordance with another embodiment of the present disclosure.
  • a label (a signature and one or more identifiers) attached to a product is identified by a customer willing to buy the product.
  • an image of the label is sent to a verification server by the customer.
  • the verification server parses the received image of the label.
  • the server parses the image of the signature as well as the one or more identifiers.
  • the server compares the parsed image of the signature with an original image of a signature corresponding to the one or more identifiers.
  • the verification server uses machine learning tools to compare the two images.
  • the verification server notifies the costumer whether the product is an original product or a counterfeit product.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The present disclosure relates to a system for preventing counterfeiting of a product. The system includes a pattern creation unit for creating a first signature by forming a unique random pattern on an input surface by using one or more materials, a printing unit for associating one or more first identifiers to the first signature to form a first label, a capturing unit for capturing an image of the first label, a signature database for storing the image of the first label, and a verification server. The verification server receives an image of a second label that is attached to the product, and includes a second signature and a second identifier, checks if the second identifier is present in the signature database, compares the second signature with a signature stored corresponding to the second identifier using machine learning algorithms, and labels the product as authentic, when the comparison is successful.

Description

System and method for preventing counterfeiting of a product
FIELD OF THE INVENTION
[0001] The present disclosure relates to preventing counterfeiting of a product, and more particularly, relates to a method and a system for automatic detection of a counterfeit product by a stakeholder in a supply chain.
BACKGROUND
[0002] Counterfeiting happens when a manufacturer makes a product that is an illegal or unauthorized copy of a genuine product. Counterfeiting is a global problem and is prevalent across almost all industries such as apparels, accessories, leather items, handbags, footwear, pharmaceuticals, personal care, perfumes, jewelry, optical media, consumer electronics, automobile parts, watches, toys, tobacco products, and fast moving consumer goods. Sometimes, consumers knowingly buy counterfeit or pirated products as they are cheaper. Whereas, sometimes consumers are unaware that they are purchasing counterfeit or pirated products.
[0003] Counterfeiting is a concern to the consumers, business and the government. The government is concerned because counterfeiting has a negative effect on innovation and threatens the welfare of consumers. Also, the money mobilized from the sale of the counterfeit products may be channelized towards funding criminal activities, and organized crimes, thereby leading to loss of jobs and loss on account of unpaid taxes. The businesses are concerned because counterfeit products leads to decreased sales of genuine product, dilution of brand value and thereby firm reputation. Further, it makes difficult for the companies to invest in research and development for a new product development. The consumers are concerned because the use of the counterfeit products puts their health at risk as such products are unsafe to use. Also, the use of such products makes them a party to a criminal activity.
[0004] Counterfeiting and piracy are longstanding problems that are growing in both scope and magnitude. As per the Global Brand Counterfeiting Report 2018, the amount of total counterfeiting globally was 1.2 Trillion USD in 2017 and is bound to reach 1.82 Trillion USD by the year 2020. The report also estimates that the losses suffered due to online counterfeiting globally have amounted to 323 Billion USD in the year 2017. With increased international trade and more online purchases by consumers each year, the value of global counterfeit product through online sales is expected to increase significantly in future years. Besides direct economic losses, counterfeiting also puts legitimate business activities at risk of closure and leads to millions of job losses every year. There is also a concern that counterfeiting is related to other criminal activities, such as trade in narcotics, money laundering and terrorism as often money generated from sales of counterfeit products is used to funds such activities.
[0005] While various measures are being taken by business, government and consumer to avert the sale and purchase of counterfeit products, none of the existing measures seems to solve the problem of counterfeiting completely. Companies safeguard themselves by seeking intellectual property protection, while Government tries to safeguard through use of enforcement authorities.
[0006] A number of technologies, such as QR code, holograms, smart cards, biometric markers and online reviews, have been employed to protect and authenticate genuine products. These devices vary considerably in the degree of sophistication and cost. However, none of the available technologies have solved the problem completely, since most solutions are either easy to copy or too costly to implement.
[0007] In light of the above-mentioned issues, there is a need for a system and method for counterfeit detection that makes it impossible to copy a genuine product, is resistant and durable, is cost-effective, and is compatible with corresponding product and distribution chain.
SUMMARY OF THE INVENTION
[0008] This summary is provided to introduce a selection of concepts, in a simple manner, which are further described in detailed description of the invention. This summary is neither intended to identify the key or essential inventive concept of the subject matter, nor to determine the scope of the invention.
[0009] In one aspect of the present disclosure, there is provided a method for preventing counterfeiting of a product. The method includes creating a first signature by forming a unique random pattern on an input surface by using one or more colourful liquids and one or more brushes, associating one or more first identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
[0010] In another aspect of the present disclosure, there is provided a method for preventing counterfeiting of a product. The method includes creating a first signature by forming a unique random pattern on an input surface using fibers present in one or more materials, associating one or more first identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
[0011] In yet another aspect of the present disclosure, there is provided a method for preventing counterfeiting of a product. The method includes creating a first signature by forming a unique random pattern on an input surface by attaching one or more materials thereto, associating one or more identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
[0012] In yet another aspect of the present disclosure, there is provided a system for preventing counterfeiting of a product. The system includes a pattern creation unit for creating a first signature by forming a unique random pattern on an input surface by using one or more materials, and a printing unit for associating one or more first identifiers to the first signature to form a first label. The system further includes a capturing unit for capturing an image of the first label, a signature database for storing the image of the first label, and a verification server. The verification server receives an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checks if the one or more second identifiers are present in the signature database, compares the second signature with a signature stored corresponding to the one or more second identifiers in a signature database using machine learning methods, when the one or more second identifiers are present in the signature database, and labels the product as authentic, when the comparison is successful.
[0013] The present disclosure describes a method of creating a unique signature that is difficult and costly to copy. The unique signature is created by forming random patterns on an input surface. Examples of the input surface include, but not limited to, paper, plastic, metal, cotton or any other solid surface. In an embodiment of the present disclosure, the pattern may be formed on the input surface by painting one or more colorful liquids with the use of one or more brushes, by dropping one or more colorful liquids, or by spraying one or more colorful liquids through a random motion of one or more brushes.
[0014] In another embodiment of the present disclosure, the pattern (signature) may be created by using fibers present in natural materials or synthetic materials. When certain fibers are used to make a paper or any other similar sheet, the finished product is left with random impressions, which are impossible to replicate or reproduce. For example, paper prepared from a banana plant material, a mango plant material, or other such high fiber material, contains unique marks, which are impossible or very difficult to copy.
[0015] In yet another embodiment, the pattern (signature) may be created by dispersing and/or randomly pasting one or more materials on an input surface. A signature created in this manner is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable. Also, if shinny materials are used, the signature appears to be different when viewed from various angles, thereby making it more robust.
[0016] The invention is just exemplarily described with respect to the attached figures in the following.
BRIEF DESCRIPTION OF DRAWINGS
[0017] The invention will be described and explained with additional specificity and detail with the accompanying figures in which:
[0018] FIG.1 illustrates a system for preventing counterfeiting of a product, in accordance with an embodiment of the present disclosure;
[0019] FIG. 2A illustrates a first pattern creation unit and signatures generated thereby, in accordance with an embodiment of the present disclosure;
[0020] FIG. 2B illustrates association of exemplary identifiers to the signatures created by the first pattern creation unit;
[0021] FIGs. 3A and 3B illustrate a second pattern creation unit and signatures generated thereby, in accordance with an embodiment of the present disclosure;
[0022] FIG. 3C illustrates association of exemplary identifiers to the signatures generated by the second pattern creation unit;
[0023] FIG. 4A illustrates a third pattern creation unit, in accordance with an embodiment of the present disclosure;
[0024] FIG. 4B illustrates exemplary signatures created by the third pattern creation unit, in accordance with an embodiment of the present disclosure; [0025] FIGS. 4C illustrates a different glow or color that appear when a signature is viewed at different angles;
[0026] FIG. 4D illustrates association of exemplary identifiers to the signatures generated by the third pattern creation unit;
[0027] FIG. 5 illustrates exemplary products that bear signatures generated by the pattern creation unit;
[0028] FIG. 6 illustrates an exemplary process of verifying if a product is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure;
[0029] FIG. 7 is a flowchart illustrating a method for creating a signature and associating the signature with one or more identifiers, in accordance with an embodiment of the present disclosure;
[0030] FIG. 8 is a flowchart illustrating a method for verifying if a product is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure; and
[0031] FIG. 9 is a flowchart illustrating a method for verifying if a product is an original product or a counterfeit product, in accordance with another embodiment of the present disclosure
[0032] Furthermore, the figures may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION OF INVENTION [0033] For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as would normally occur to those skilled in the art are to be construed as being within the scope of the present invention.
[0034] It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
[0035] The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more sub-systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other, sub-systems, elements, structures, components, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
[0036] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this invention belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
[0037] Embodiments of the present invention will be described below in detail with reference to the accompanying figures. [0038] Counterfeiting is an ever-increasing problem. Counterfeiting is possible when it’s easy to copy features of an original product with a precision that makes it difficult for a common user to differentiate between the original and the counterfeit product. For items, where there is little scope for product differentiation, such as medicines, tobacco product etc., and product packaging is the only way to identify a genuine and fake product, counterfeiting is even easier. While most existing solutions based on QR code, Barcode, etc. are unique for each product, they are still easy to copy. The present embodiments overcome these problems by creating a unique signature that is very difficult to copy.
[0039] FIG.1 illustrates a system 100 for preventing counterfeiting of a product, in accordance with an embodiment of the present disclosure.
[0040] The system 100 includes a pattern creation unit 102 for forming a unique random pattern on an input surface to create a signature corresponding to the unique random pattern. The input surface may be any surface on which a unique signature may be created. Examples of the input surface include, but are not limited to, paper, plastic, metal, cardboard, cotton or any other solid surface. In an embodiment, the signatures created by the pattern creation unit 102 may be in the form of stickers that may be easily pasted on the products. In another embodiment, the signatures created by the pattern creation unit 102 may be in the form of tags that may be attached to the products.
[0041] The system further includes a printing unit 104. The printing unit 104 receives the signature from the pattern creation unit 102 and associates one or more identifiers with the signature to generate a label. In an embodiment of the present disclosure, the printing unit 104 may print the one or more identifiers next to the signature to generate the label. Further, the identifier may be a number, a QR code, a Barcode, a decimal number, an alphanumeric number, etc. [0042] The system further includes an image capturing unit 106 for capturing an image of the label and storing in a signature database 108. The signature database 108 stores the image of the label and periodically transmits the image to a verification server 112 through a network 110. The verification server 112 parses the received image of the label and stores the parsed image in a database for future reference. The image capturing unit 106 may include a camera, a scanner, a smart phone, a tabloid, or any other device capable of capturing images. The network 110 may be any suitable wired network, wireless network, a combination of these or any other conventional network, without limiting the scope of the present disclosure. Few examples may include a Local Area Network (LAN), wireless LAN connection, an Internet connection, a point-to-point connection, or other network connection and combinations thereof.
[0043] A first example of the pattern creation unit 102 and corresponding signature has been explained with reference to FIG.2A. FIG. 2A illustrates a first pattern creation unit 204 (an example of the pattern creation unit 102) and few signatures 206 till 212 generated by the first pattern creation unit 204. The first pattern creation unit 204 includes brushes and colorful liquids to create patterns on a plain first input surface 202 and generate signatures 206 till 212. In an embodiment of the present disclosure, the signatures 206 and 208 are created by dropping one or more colorful liquids on the first input surface 202.
[0044] It may be noted, that the formation of a random pattern of any liquid on a solid surface is dependent on a number of factors such as gravity (g), liquid viscosity (v), pressure (p) and pressure difference (dp), liquid density (d), compressibility (c), surface tension of solid (st), initial momentum of liquid (m), surface tension (s), temperature (t), wind flow (w), and shape of solid surface (sp). Any liquid when dropped on any platform, may take infinite number of unique shapes for each unique combination of above factors. Any variation in any one of the factors may lead to a different pattern. If S is the random pattern a liquid may take, then S is a function of below factors:
S= F (g, v, p, dp, m, c, s, t, w, st, d, sp, k); k signifies any other factor [0045] Therefore, with a slight variation in the above-mentioned factors and with different permutation and combinations, it’s possible to get infinite different random patterns on the first input surface 202 and corresponding signatures. With two or more than two liquids of same or different properties, but of different colors, an even more visually different output may be obtained.
[0046] According to another embodiment of the disclosure, the signatures 210 and 212 are created by spraying one or more colorful liquids through a random motion of one or more brushes on the first input surface 202.
[0047] Thus, each of the signatures 206 till 212 is unique, and difficult to copy. In an embodiment of the present disclosure, each of the signatures 206 till 212 may be fixed on a product to represent a unique signature. The product may be from any industry like footwear, designer wear, apparels, watches, leather items, pharmaceutical, jewelry items, etc.
[0048] FIG. 2B illustrates association of exemplary identifiers to the signatures 206 and 212 by the printing unit 104. In order to associate identifiers with the signatures 206 and 212, the printing unit 104 prints the identifiers next to the signatures 206 and 212.
[0049] In an example, the printing unit 104 prints a QR code 222 and a random number 224 next to the signature 206 to form a label 225. The QR code 222 and the random number 224 are unique to the signature 206, thereby making the signature 206 difficult to copy. In a further example, the printing unit 104 prints a QR code 226 and a random number 228 next to the signature 212 to form another label 229. In a furthermore example, the printing unit 104 prints a bar code 230 and a number 232 next to the signature 206 to form yet another label 233. The image capturing unit 106 then captures the images of all the labels 225, 229 and 233. The images of the labels 225, 229 and 233 are then saved in the signature database 108 and periodically sent to the verification server 112. The verification server 112 parses the received images of the labels 225, 229 and 233 and stores the parsed image in a database for future reference. The verification server 112 parses the signature as well as the one or more identifiers and stores them in the database.
[0050] A second example of the pattern creation unit 102 and corresponding signature has been explained with reference to FIG.3A.
[0051] FIGs. 3A and 3B illustrate a second pattern creation unit 304 (an example of the pattern creation unit 102) and few signatures 306 till 330 generated by the second pattern creation unit 304. The second pattern creation unit 304 creates a signature on a second input surface 302 with the use of fibers present in naturally occurring materials. In an embodiment, the second input surface 302 may be a paper. In another embodiment, the second input surface 302 may be any surface on which fibers may be applied. In yet another embodiment, the second input surface 302 may be any fibrous material such as plant leaves, plant stems, synthetic fibers, etc.
[0052] It may be noted, that when certain fibers are used to make a paper or any other similar sheet, the finished product is left with random fingerprints, which are impossible to replicate or reproduce. For example, paper prepared from a banana plant material, a mango plant material, or other such high fiber material, contains unique marks, which are impossible or very difficult to copy.
[0053] In an embodiment of the present disclosure, the second pattern creation unit 304 may create a random pattern on the second input surface 302 by pasting the natural or synthetic fibers on the second input surface 302. In another embodiment, the second pattern creation unit 304 may create a random pattern on the second input surface 302 by embedding the natural or synthetic fibers on the second input surface 302. In yet another embodiment, the second pattern creation unit 304 may create a random pattern by creating a sheet out of the natural or synthetic fibers. Moreover, during the process of such sheet preparation (for example paper), the pattern creation unit 304 may add certain fibers (natural or synthetic) to the natural or synthetic fibers so that the finished product is left with unique and random marks. [0054] In an example, signatures 308, 310, 312 and 314 are created by applying banana plant fibers on the second input surface 302. In another example, signatures 316, 318, 320 and 322 are created by applying mango plant fibers on the second input surface 302. In yet another example, signatures 324, 326, 328 and 330 are created by adding first form of fibers (natural or synthetic) to a second form of natural or synthetic fibers, and applying the combination on the second input surface 302.
[0055] FIG. 3C illustrates association of exemplary identifiers to the signature 312 by the printing unit 104. The printing unit associates the identifiers with the signature 312 by printing the identifiers next to the signature 312.
[0056] In an example, the printing unit 104 prints a unique number 332 next to the signature 312 to form a label 333. In a further example, the printing unit 104 prints another unique number 334 next to the signature 312 to form another label 335. The number 334 is unique to the signature 312, thereby making the signature 312 difficult to copy. The images of the labels 333 and 335 are then saved in the signature database 108. The signature database 108 periodically sends the images to the verification server 112. The verification server 112 parses the received images of the labels 333 and 335 and stores the parsed image in a database for future reference. The verification server 112 parses the signatures as well as the one or more identifiers.
[0057] FIG. 4A illustrate a third pattern creation unit 402 (an example of the pattern creation unit 102) for generating unique random patterns on a third input surface 404 by dispersing and/or randomly pasting one or more materials on the third input surface 404. The one or more materials include, but are not limited to, granular threads, granular sheets, granular particles, glowing materials, shiny 3D materials, and any other material having texture different from the input surface. The unique patterns on the third input surface 404 form a unique signature that is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with an uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable.
[0058] FIG. 4B illustrates exemplary signatures created by the third pattern creation unit 402 on the third input surface 404. In an example, signatures 410 and 412 are created by randomly dispersing fine hair like threads on the third input surface 402. In a further example, signatures 418 and 420 are created by randomly dispersing shinny granular threads on the third input surface 402. In a furthermore example, signatures 414 and 416 are created by randomly dispersing shinny granular sheets on the third input surface 402.
[0059] FIG. 4C illustrate a different glow or color that appear when a signature is viewed at different angles. In an example, a first signature 422 till 428 looks different, when viewed through different angles. Similarly, a second signature 430 till 436 looks different when viewed through different angles. The signature created in the process is unique and not easy to copy. Also, the signature has a different texture that may be easily felt with the movement of the hands on the signature. Moreover, if the signature is made with shinny material, the color on the signature appears to be different when viewed at different angles.
[0060] FIG. 4D illustrates association of exemplary identifiers to the signatures 448, 452, and 456 by the printing unit 104. In an example, the printing unit 104 prints a number 450 next to a signature 448 to form a label 451 , a bar code 454 next to a signature 452 to form another label 455, and a QR code 458 next to a signature 456 to form a label 459. The images of each of the labels 451 , 455 and 459 are captured by the image capturing unit 106 and saved in the signature database 108. The signature database 108 sends the images to the verification server 112 periodically. The verification server 112 parses the received image of the label and stores the parsed image in a database for future reference.
[0061] FIG. 5 illustrates exemplary products 502 and 508 that bear signatures generated by the pattern creation unit 102, in accordance with an embodiment of the present disclosure. The products 502 and 508 may be from any industry like footwear, designer wear, apparels, watches, leather items, pharmaceutical, jewelry items, etc. The product 502 bears a signature 504 and a corresponding identifier 506 (collectively referred to as a label 507). In an embodiment of the present disclosure, the label 507 may be attached to the product 502 by pasting, tagging, embedding, air drying using hot air dryers, LED (light emitting diode) dryers, UV (ultra violet) dryers. Similarly, a label 513 may be attached on the product 508.
[0062] Thus, the labels, as described in the above embodiments, may be attached to all the products in a supply chain by a vendor to distinguish the products from each other. All the products in a supply chain are attached with a label. When a label is attached to a product, the signature and the one or more identifiers associated with the signature are unique to that product only. No two products may have similar signatures. Further, no two similar signatures may have similar patterns, thereby making the signature more robust and difficult to copy. Thus, the signatures and their identifiers help in distinguishing a product from other products in a supply chain. Further, the signatures and their identifiers help a costumer to verify if a product in the supply chain is an original product or a counterfeit product.
[0063] FIG. 6 illustrates an exemplary process 600 of verifying if a product 602 is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure.
[0064] The product 602 includes a signature 604 and identifiers 606 and 608 printed thereto. The signature 604 and identifiers 606 and 608 are collectively referred to as a label 609. In an example, the signature 604 is created by pasting shinny granular sheets on an input surface. The input surface bears the granular sheets on one side and self-adhesive film on the other side, thereby making the signature 604 an easy to use sticker. The identifier 606 and the identifier 608 are then printed with the signature 604 to form the label 609. The label 609 may then be easily pasted on a surface of the product 602. The identifier 606 is a QR code and the identifier 608 is a unique number. In an embodiment of the present disclosure, a user 612 (also referred as client or client site) may verify if the product 602 is original or counterfeit product before buying the product 602.
[0065] In an embodiment, the user 612 may scan the QR code 606 using a scanning device 610 and send it to the verification server 112 through the network 110. The verification server 112 has a repository of images of labels which are received by the verification server 112 from the signature database 108 on timely basis. In an example, the scanning device 610 may be a smart phone. In another embodiment, the scanning device 610 may be a tabloid. In yet another embodiment, the scanning device 610 may be any other device capable of scanning codes. In an embodiment of the present disclosure, the user device 610 runs an application of the verification server 112 for quick verification of the signatures of the product 602.
[0066] Upon receiving the QR code 606, the verification server 112 checks in its database, if the received QR code is present in the database. On verifying the QR code, the verification server 112 further checks if a signature corresponding to the QR code 606 is stored therein. The image retrieved from the database of the verification server 112 is displayed at user device 610. The user may then manually compare the image of the signature received with the signature 604 present on the product 602. If both the images match, then the product 602 is an original product, else the product 602 is a counterfeit product.
[0067] In another embodiment of the present disclosure, the user may send the number 608 to a third party through messaging, email, instant messaging or calling. In yet another embodiment of the present disclosure, the user may enter the number 608 on a web interface. Upon receiving the number 608, the third party may send the number 608 to the verification server 112 for verification of the signature 604.
[0068] In yet another embodiment of the present disclosure, the user 612 may capture an image of the label 609 (signature 604, the QR code 606 and number 608) and share the image with the verification server 112. The image may be shared via specific chat bot, a smartphone application, a web interface or any third party applications such as WhatsApp, Facebook, Messenger, etc. Upon receiving the image, the verification server 112 may parse the signature 604, the QR code 606 and the number 608 and compare using machine learning algorithm the parsed image of the signature 604 with the original saved image corresponding to the given identifier. If the two images match, then the product is verified or genuine and this information (referred as response) may be communicated to the user 612. However, if the two images do not match, the product is unverified or fake and this information may also be communicated to the user 612. In case, the verification server 112 is not able to determine with a reasonable certainty whether the two images are same or different, the original image of the signature 604 is sent to the user device 610. The user 610 may then manually check if the original image of signature received is same as the signature 604 on the product 602.
[0069] Since, any user may check for the authenticity of a product/documents/item using above solution, information like location, contact number etc. may be gathered (in concurrence with the user) when a user contacts the verification server 112 to check for the authenticity of the product 602. The collected information corresponding to each product may be stored at the server 112 and may be used to track the flow of the product in the entire supply chain. Moreover, the application available at the user end may be used to engage with the user at the point of sale. The engagement may in the form of feedback, rating or any other marketing communication. All this information gathered may be analyzed and be used by companies in order to strategize better.
[0070] FIG. 7 is a flowchart illustrating a method 700 for creating a signature and associating the signature with one or more identifiers, in accordance with an embodiment of the present disclosure. At step 702, an input surface is received on which a signature is to be created. Examples of the input surface 101 include, but not limited to, paper, plastic, metal, cotton or any other solid surface. At step 704, a unique random pattern is created on the input surface to form a signature. In an embodiment, the pattern on the first input surface may be created by using one or more colorful liquids and one or more brushes. The colorful liquids may include painting colors, dyes, inks, natural fruit colors, etc.
[0071] In another embodiment, the pattern may be created on the input surface by using fibers present in natural materials or synthetic materials. When certain fibers are used to make a paper or any other similar sheet, the finished product is left with random fingerprints, which are impossible to replicate or reproduce. For example, paper prepared from a banana plant material, a mango plant material, or other such high fiber material, contains unique marks, which are impossible or very difficult to copy.
[0072] In yet another embodiment, a pattern may be created by dispersing and/or randomly pasting one or more materials on the input surface. The one or more materials include, but not limited to, granular threads, granular sheets, granular particles, glowing materials, shiny 3D materials, any other material having texture different from the input surface, etc. A signature created in this manner is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable.
[0073] At step 706, the output signature is associated with one or more identifiers by printing the one or more identifiers next to the signature to form a label. The one or more identifiers may be a decimal number, an alphanumeric number, a QR code, a Barcode, etc. Each identifier is unique and corresponds to the signature.
[0074] At step 708, an image of the label is captured. At step 710, the image of the label is stored in a signature database for future reference. [0075] FIG. 8 is a flowchart illustrating a method 800 for verifying if a product is original product or a counterfeit product, in accordance with an embodiment of the present disclosure. All the products in a supply chain are attached with a label corresponding to a signature and one or more identifiers associated with the signature. Each signature is unique and the one or more identifiers correspond to the unique signature.
[0076] At step 802, a label (a signature and one or more identifiers) attached to a product are identified by a customer willing to buy the product. At step 804, the one or more identifiers are sent to a verification server by the customer. In an embodiment, the customer may scan the one or more identifiers and send them to the server through a corresponding application running on their computing device. In another embodiment, the customer may send the one or more identifiers to a third party. The third party may further send the identifiers to the server.
[0077] At step 806, the verification server checks if the received one or more identifiers are present in a database. At step 808, the verification server checks for an image of a signature corresponding to the one or more identifiers. Each time a signature is created, an image of that signature with the associated identifiers is stored at the server (as describes in FIG. 1). The verification checks for that original image of the signature on receiving the one or more identifiers. At step 810, the verification server sends the original image of the signature to the costumer, either directly or through the third party, on his/her phone or any other device. The user may then manually compare the original image of the signature received with the signature present on the product. If both the images match then the product is an original product, else the product is a counterfeit product.
[0078] FIG. 9 is a flowchart illustrating a method 900 for verifying if a product is an original product or a counterfeit product, in accordance with another embodiment of the present disclosure. [0079] At step 902, a label (a signature and one or more identifiers) attached to a product is identified by a customer willing to buy the product. At step 904, an image of the label is sent to a verification server by the customer. At step 906, the verification server parses the received image of the label. The server parses the image of the signature as well as the one or more identifiers. The server then compares the parsed image of the signature with an original image of a signature corresponding to the one or more identifiers. Each time a signature is created, an image of that signature with the associated identifiers is stored at a signature database and periodically sent to the server (as describes in FIG. 1). If both the images match, then the product is an original product, else the product is a counterfeit product. In an embodiment of the present disclosure, the verification server uses machine learning tools to compare the two images. At step 908, the verification server notifies the costumer whether the product is an original product or a counterfeit product.
[0080] While specific language has been used to describe the invention, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
[0081] The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Claims

Claims:
1. A method for preventing counterfeiting of a product, comprising:
creating a first signature by forming a unique random pattern on an input surface by using one or more colourful liquids and one or more brushes;
associating one or more first identifiers to the first signature to form a first label; capturing an image of the first label using an image capturing device;
storing the image of the first label in a signature database;
receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers;
checking if the one or more second identifiers are present in the signature database;
comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database; and
labelling the product as authentic, when the comparison is successful.
2. The method of claim 1 , wherein the unique random pattern is formed by painting the input surface with one or more colourful liquids and brushes.
3. The method of claim 1 , wherein the unique random pattern is formed by spraying the one or more colourful liquids through a random motion of the one or more brushes on the input surface.
4. The method of claim 1 , wherein the unique random pattern is formed based on a gravity, a liquid viscosity, a pressure, a pressure difference, a liquid density, a compressibility, a surface tension, an initial momentum of liquid, a temperature, a wind flow, and a shape of the input surface.
5. The method of claim 1 , wherein the one or more first and second identifiers are selected from a group consisting of: a QR code, a bar code, an alphanumeric number, and a decimal number.
6. The method of claim 1 , wherein the input surface is selected from at least one of: paper, plastic, metal, cardboard, cotton and a solid surface.
7. A method for preventing counterfeiting of a product, comprising:
creating a first signature by forming a unique random pattern on an input surface using fibers present in one or more materials;
associating one or more first identifiers to the first signature to form a first label; capturing an image of the first label using an image capturing device;
storing the image of the first label in a signature database;
receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers;
checking if the one or more second identifiers are present in the signature database;
comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database; and
labelling the product as authentic, when the comparison is successful.
8. The method of claim 7, wherein the one or more first and second identifiers are selected from a group consisting of: a QR code, a bar code, an alphanumeric number, and a decimal number.
9. The method of claim 7, wherein the unique random pattern is formed using fibers present in naturally occurring materials and a naturally occurring material is selected from at least one of: a plant stem, and a plant leave.
10. The method of claim 7, wherein the one or more materials are synthetic fibrous materials.
1 1. The method of claim 7, wherein the input surface is selected from at least one of: a paper, a cardboard, cotton, a mango leave, a banana leave and a synthetic fiber.
12. The method of claim 7, wherein the unique random pattern is formed on the input surface by pasting natural and synthetic fibers thereon.
13. The method of claim 7, wherein the unique random pattern is formed on the input surface by embedding natural and synthetic fibers thereon.
14. A method for preventing counterfeiting of a product, comprising:
creating a first signature by forming a unique random pattern on an input surface by attaching one or more materials thereto;
associating one or more identifiers to the first signature to form a first label;
capturing an image of the first label using an image capturing device;
storing the image of the first label in a signature database;
receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers;
checking if the one or more second identifiers are present in the signature database;
comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database; and
labelling the product as authentic, when the comparison is successful.
15. The method of claim 14, wherein the unique random pattern is formed by dispersing one or more materials on the input surface.
16. The method of claim 14, wherein the unique random pattern is formed by pasting one or more materials on the input surface.
17. The method of claim 14, wherein the one or more materials are selected from a group consisting of: granular threads, fine hair like threads, granular sheets, granular particles, glowing materials, shiny 3D materials, shiny granular threads, shiny granular sheets, and other material having a texture different from the input surface.
18. The method of claim 14, wherein the one or more first and second identifiers are selected from a group consisting of: a QR code, a bar code, an alphanumeric number, and a decimal number.
19. A system for preventing counterfeiting of a product, comprising:
a pattern creation unit for creating a first signature by forming a unique random pattern on an input surface by using one or more materials; a printing unit for associating one or more first identifiers to the first signature to form a first label;
a capturing unit for capturing an image of the first label;
a signature database for storing the image of the first label; and
a verification server for:
receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers;
checking if the one or more second identifiers are present in the signature database;
comparing the second signature with a signature stored corresponding to the one or more second identifiers in a signature database using machine learning algorithms, when the one or more second identifiers are present in the signature database; and labelling the product as authentic, when the comparison is successful.
20. The system of claim 19, wherein the pattern creation unit forms the unique random pattern by painting the input surface with one or more colourful liquids and brushes.
21. The system of claim 19, wherein the pattern creation unit forms the unique random pattern by spraying the one or more colourful liquids through a random motion of the one or more brushes on the input surface.
22. The system of claim 19, wherein the pattern creation unit forms the unique random pattern by using fibers present in one or more materials.
23. The system of claim 19, wherein the pattern creation unit forms the unique random pattern by pasting one or more granular materials on the input surface.
24. The system of claim 19, wherein the one or more first and second identifiers are selected from a group consisting of: a QR code, a bar code, an alphanumeric number, and a decimal number.
PCT/IN2019/050625 2018-09-01 2019-08-28 System and method for preventing counterfeiting of a product Ceased WO2020044373A1 (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
IN201811032886 2018-09-01
IN201811032886 2018-09-01
IN201811034077 2018-09-11
IN201811034077 2018-09-11
IN201911010352 2019-03-18
IN201911010352 2019-03-18

Publications (1)

Publication Number Publication Date
WO2020044373A1 true WO2020044373A1 (en) 2020-03-05

Family

ID=69643494

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2019/050625 Ceased WO2020044373A1 (en) 2018-09-01 2019-08-28 System and method for preventing counterfeiting of a product

Country Status (1)

Country Link
WO (1) WO2020044373A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1029651B1 (en) * 2021-08-17 2023-10-25 Zebra Technologies OBJECT IDENTIFICATION USING SURFACE OPTICAL ARTIFACTS

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170193525A1 (en) * 2015-12-31 2017-07-06 Salim Shah System and Method for Detecting Counterfeit Products
WO2018058847A1 (en) * 2016-09-13 2018-04-05 江苏图码信息科技有限公司 Color code product with hand drawn pattern or text and application component
WO2018143059A1 (en) * 2017-01-31 2018-08-09 日本ゼオン株式会社 Authenticity inquiry server, authenticity inquiry system, authenticity inquiry method, and authenticity inquiry program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170193525A1 (en) * 2015-12-31 2017-07-06 Salim Shah System and Method for Detecting Counterfeit Products
WO2018058847A1 (en) * 2016-09-13 2018-04-05 江苏图码信息科技有限公司 Color code product with hand drawn pattern or text and application component
WO2018143059A1 (en) * 2017-01-31 2018-08-09 日本ゼオン株式会社 Authenticity inquiry server, authenticity inquiry system, authenticity inquiry method, and authenticity inquiry program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1029651B1 (en) * 2021-08-17 2023-10-25 Zebra Technologies OBJECT IDENTIFICATION USING SURFACE OPTICAL ARTIFACTS

Similar Documents

Publication Publication Date Title
CN113454635B (en) Anti-counterfeiting system and method
US20220050982A1 (en) Systems and methods to Authenticate a Security Device
CN109345264B (en) A blockchain-based traceability and anti-counterfeiting system and method for alcohol products
CN109146024B (en) Artwork anti-counterfeiting electronic tag system and method based on block chain
Popović et al. A novel solution for counterfeit prevention in the wine industry based on IoT, smart tags, and crowd-sourced information
CN204375008U (en) A kind of marketed material tracing management identification system
CN111401809A (en) Product quality safety block chain traceability system
US20080128496A1 (en) Method and apparatus for verification of items
CN102722824A (en) Method for distinguishing authenticity of goods by using bar codes
CN102542469A (en) Commodity barcode anti-fake system and method based on cloud computing mode
CN101887570A (en) Method and system for deterring product counterfeiting, diversion and piracy
CN105654316A (en) NFC product anti-counterfeiting traceability system and anti-counterfeiting traceability method thereof
CN109784951A (en) A kind of anti-fake traceability system of product whole process based on block chain technology
WO2011077459A2 (en) A method of extracting naturally encrypted features from a natural surface of a product
CN103489121A (en) Anti-counterfeiting off-site commodity transaction method and system
CN105046500A (en) Anti-counterfeiting and logistics monitoring method based on commodity track
CN101556599A (en) Article anti-counterfeit system with two-dimension code coupled with key
CN109657766A (en) A kind of antifalsification label and its anti-counterfeiting system
CN103577996B (en) Online verification method and system
WO2005083644A1 (en) Method and system for verifying the authenticity of goods
CN103903040A (en) Product identity verification anti-counterfeiting label and verification method
CN105976003A (en) Anti-counterfeiting anti-destruction tape and anti-counterfeiting method
HK1245973A1 (en) Product diversion management
CN111882327A (en) Anti-counterfeiting tracing method with identity characteristics and capable of actively feeding back information to system
CA2339894A1 (en) Authentication technology of digital barcode & numerical coding system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19853518

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19853518

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19853518

Country of ref document: EP

Kind code of ref document: A1