[go: up one dir, main page]

WO2020044373A1 - Système et procédé pour empêcher la contrefaçon d'un produit - Google Patents

Système et procédé pour empêcher la contrefaçon d'un produit Download PDF

Info

Publication number
WO2020044373A1
WO2020044373A1 PCT/IN2019/050625 IN2019050625W WO2020044373A1 WO 2020044373 A1 WO2020044373 A1 WO 2020044373A1 IN 2019050625 W IN2019050625 W IN 2019050625W WO 2020044373 A1 WO2020044373 A1 WO 2020044373A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature
identifiers
product
label
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IN2019/050625
Other languages
English (en)
Inventor
Sharique ALI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2020044373A1 publication Critical patent/WO2020044373A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • G06V10/225Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition based on a marking or identifier characterising the area
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns

Definitions

  • the present disclosure relates to preventing counterfeiting of a product, and more particularly, relates to a method and a system for automatic detection of a counterfeit product by a stakeholder in a supply chain.
  • Counterfeiting happens when a manufacturer makes a product that is an illegal or unauthorized copy of a genuine product. Counterfeiting is a global problem and is prevalent across almost all industries such as apparels, accessories, leather items, handbags, footwear, pharmaceuticals, personal care, perfumes, jewelry, optical media, consumer electronics, automobile parts, watches, toys, tobacco products, and fast moving consumer goods. Sometimes, consumers knowingly buy counterfeit or pirated products as they are cheaper. Whereas, sometimes consumers are unaware that they are purchasing counterfeit or pirated products.
  • Counterfeiting is a concern to the consumers, business and the government.
  • the government is concerned because counterfeiting has a negative effect on innovation and threatens the welfare of consumers.
  • the money mobilized from the sale of the counterfeit products may be channelized towards funding criminal activities, and organized crimes, thereby leading to loss of jobs and loss on account of unpaid taxes.
  • the businesses are concerned because counterfeit products leads to decreased sales of genuine product, dilution of brand value and thereby firm reputation. Further, it makes difficult for the companies to invest in research and development for a new product development.
  • the consumers are concerned because the use of the counterfeit products puts their health at risk as such products are unsafe to use. Also, the use of such products makes them a party to a criminal activity.
  • a method for preventing counterfeiting of a product includes creating a first signature by forming a unique random pattern on an input surface by using one or more colorful liquids and one or more brushes, associating one or more first identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
  • a method for preventing counterfeiting of a product includes creating a first signature by forming a unique random pattern on an input surface using fibers present in one or more materials, associating one or more first identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
  • a method for preventing counterfeiting of a product includes creating a first signature by forming a unique random pattern on an input surface by attaching one or more materials thereto, associating one or more identifiers to the first signature to form a first label, capturing an image of the first label using an image capturing device, storing the image of the first label in a signature database, receiving an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checking if the one or more second identifiers are present in the signature database, comparing the second signature with a signature stored corresponding to the one or more second identifiers in the signature database, when the one or more second identifiers are present in the signature database, and labelling the product as authentic, when the comparison is successful.
  • a system for preventing counterfeiting of a product includes a pattern creation unit for creating a first signature by forming a unique random pattern on an input surface by using one or more materials, and a printing unit for associating one or more first identifiers to the first signature to form a first label.
  • the system further includes a capturing unit for capturing an image of the first label, a signature database for storing the image of the first label, and a verification server.
  • the verification server receives an image of a second label from a user for verifying an authenticity of a product, wherein the second label is attached to the product, and includes a second signature and one or more second identifiers, checks if the one or more second identifiers are present in the signature database, compares the second signature with a signature stored corresponding to the one or more second identifiers in a signature database using machine learning methods, when the one or more second identifiers are present in the signature database, and labels the product as authentic, when the comparison is successful.
  • the present disclosure describes a method of creating a unique signature that is difficult and costly to copy.
  • the unique signature is created by forming random patterns on an input surface.
  • the input surface include, but not limited to, paper, plastic, metal, cotton or any other solid surface.
  • the pattern may be formed on the input surface by painting one or more colorful liquids with the use of one or more brushes, by dropping one or more colorful liquids, or by spraying one or more colorful liquids through a random motion of one or more brushes.
  • the pattern may be created by using fibers present in natural materials or synthetic materials.
  • fibers present in natural materials or synthetic materials When certain fibers are used to make a paper or any other similar sheet, the finished product is left with random impressions, which are impossible to replicate or reproduce.
  • paper prepared from a banana plant material, a mango plant material, or other such high fiber material contains unique marks, which are impossible or very difficult to copy.
  • the pattern may be created by dispersing and/or randomly pasting one or more materials on an input surface.
  • a signature created in this manner is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable. Also, if shinny materials are used, the signature appears to be different when viewed from various angles, thereby making it more robust.
  • FIG.1 illustrates a system for preventing counterfeiting of a product, in accordance with an embodiment of the present disclosure
  • FIG. 2A illustrates a first pattern creation unit and signatures generated thereby, in accordance with an embodiment of the present disclosure
  • FIG. 2B illustrates association of exemplary identifiers to the signatures created by the first pattern creation unit
  • FIGs. 3A and 3B illustrate a second pattern creation unit and signatures generated thereby, in accordance with an embodiment of the present disclosure
  • FIG. 3C illustrates association of exemplary identifiers to the signatures generated by the second pattern creation unit
  • FIG. 4A illustrates a third pattern creation unit, in accordance with an embodiment of the present disclosure
  • FIG. 4B illustrates exemplary signatures created by the third pattern creation unit, in accordance with an embodiment of the present disclosure
  • FIGS. 4C illustrates a different glow or color that appear when a signature is viewed at different angles
  • FIG. 4D illustrates association of exemplary identifiers to the signatures generated by the third pattern creation unit
  • FIG. 5 illustrates exemplary products that bear signatures generated by the pattern creation unit
  • FIG. 6 illustrates an exemplary process of verifying if a product is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure
  • FIG. 7 is a flowchart illustrating a method for creating a signature and associating the signature with one or more identifiers, in accordance with an embodiment of the present disclosure
  • FIG. 8 is a flowchart illustrating a method for verifying if a product is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure.
  • FIG. 9 is a flowchart illustrating a method for verifying if a product is an original product or a counterfeit product, in accordance with another embodiment of the present disclosure
  • Counterfeiting is an ever-increasing problem. Counterfeiting is possible when it’s easy to copy features of an original product with a precision that makes it difficult for a common user to differentiate between the original and the counterfeit product. For items, where there is little scope for product differentiation, such as medicines, tobacco product etc., and product packaging is the only way to identify a genuine and fake product, counterfeiting is even easier. While most existing solutions based on QR code, Barcode, etc. are unique for each product, they are still easy to copy. The present embodiments overcome these problems by creating a unique signature that is very difficult to copy.
  • FIG.1 illustrates a system 100 for preventing counterfeiting of a product, in accordance with an embodiment of the present disclosure.
  • the system 100 includes a pattern creation unit 102 for forming a unique random pattern on an input surface to create a signature corresponding to the unique random pattern.
  • the input surface may be any surface on which a unique signature may be created. Examples of the input surface include, but are not limited to, paper, plastic, metal, cardboard, cotton or any other solid surface.
  • the signatures created by the pattern creation unit 102 may be in the form of stickers that may be easily pasted on the products.
  • the signatures created by the pattern creation unit 102 may be in the form of tags that may be attached to the products.
  • the system further includes a printing unit 104.
  • the printing unit 104 receives the signature from the pattern creation unit 102 and associates one or more identifiers with the signature to generate a label.
  • the printing unit 104 may print the one or more identifiers next to the signature to generate the label.
  • the identifier may be a number, a QR code, a Barcode, a decimal number, an alphanumeric number, etc.
  • the system further includes an image capturing unit 106 for capturing an image of the label and storing in a signature database 108.
  • the signature database 108 stores the image of the label and periodically transmits the image to a verification server 112 through a network 110.
  • the verification server 112 parses the received image of the label and stores the parsed image in a database for future reference.
  • the image capturing unit 106 may include a camera, a scanner, a smart phone, a tabloid, or any other device capable of capturing images.
  • the network 110 may be any suitable wired network, wireless network, a combination of these or any other conventional network, without limiting the scope of the present disclosure. Few examples may include a Local Area Network (LAN), wireless LAN connection, an Internet connection, a point-to-point connection, or other network connection and combinations thereof.
  • LAN Local Area Network
  • wireless LAN connection an Internet connection
  • point-to-point connection or other network connection and combinations thereof.
  • FIG. 2A illustrates a first pattern creation unit 204 (an example of the pattern creation unit 102) and few signatures 206 till 212 generated by the first pattern creation unit 204.
  • the first pattern creation unit 204 includes brushes and colorful liquids to create patterns on a plain first input surface 202 and generate signatures 206 till 212.
  • the signatures 206 and 208 are created by dropping one or more colorful liquids on the first input surface 202.
  • the signatures 210 and 212 are created by spraying one or more colorful liquids through a random motion of one or more brushes on the first input surface 202.
  • each of the signatures 206 till 212 is unique, and difficult to copy.
  • each of the signatures 206 till 212 may be fixed on a product to represent a unique signature.
  • the product may be from any industry like footwear, designer wear, apparels, watches, leather items, pharmaceutical, jewelry items, etc.
  • FIG. 2B illustrates association of exemplary identifiers to the signatures 206 and 212 by the printing unit 104.
  • the printing unit 104 prints the identifiers next to the signatures 206 and 212.
  • the printing unit 104 prints a QR code 222 and a random number 224 next to the signature 206 to form a label 225.
  • the QR code 222 and the random number 224 are unique to the signature 206, thereby making the signature 206 difficult to copy.
  • the printing unit 104 prints a QR code 226 and a random number 228 next to the signature 212 to form another label 229.
  • the printing unit 104 prints a bar code 230 and a number 232 next to the signature 206 to form yet another label 233.
  • the image capturing unit 106 then captures the images of all the labels 225, 229 and 233.
  • the images of the labels 225, 229 and 233 are then saved in the signature database 108 and periodically sent to the verification server 112.
  • the verification server 112 parses the received images of the labels 225, 229 and 233 and stores the parsed image in a database for future reference.
  • the verification server 112 parses the signature as well as the one or more identifiers and stores them in the database.
  • FIGs. 3A and 3B illustrate a second pattern creation unit 304 (an example of the pattern creation unit 102) and few signatures 306 till 330 generated by the second pattern creation unit 304.
  • the second pattern creation unit 304 creates a signature on a second input surface 302 with the use of fibers present in naturally occurring materials.
  • the second input surface 302 may be a paper.
  • the second input surface 302 may be any surface on which fibers may be applied.
  • the second input surface 302 may be any fibrous material such as plant leaves, plant stems, synthetic fibers, etc.
  • the second pattern creation unit 304 may create a random pattern on the second input surface 302 by pasting the natural or synthetic fibers on the second input surface 302. In another embodiment, the second pattern creation unit 304 may create a random pattern on the second input surface 302 by embedding the natural or synthetic fibers on the second input surface 302. In yet another embodiment, the second pattern creation unit 304 may create a random pattern by creating a sheet out of the natural or synthetic fibers. Moreover, during the process of such sheet preparation (for example paper), the pattern creation unit 304 may add certain fibers (natural or synthetic) to the natural or synthetic fibers so that the finished product is left with unique and random marks.
  • signatures 308, 310, 312 and 314 are created by applying banana plant fibers on the second input surface 302.
  • signatures 316, 318, 320 and 322 are created by applying mango plant fibers on the second input surface 302.
  • signatures 324, 326, 328 and 330 are created by adding first form of fibers (natural or synthetic) to a second form of natural or synthetic fibers, and applying the combination on the second input surface 302.
  • FIG. 3C illustrates association of exemplary identifiers to the signature 312 by the printing unit 104.
  • the printing unit associates the identifiers with the signature 312 by printing the identifiers next to the signature 312.
  • the printing unit 104 prints a unique number 332 next to the signature 312 to form a label 333.
  • the printing unit 104 prints another unique number 334 next to the signature 312 to form another label 335.
  • the number 334 is unique to the signature 312, thereby making the signature 312 difficult to copy.
  • the images of the labels 333 and 335 are then saved in the signature database 108.
  • the signature database 108 periodically sends the images to the verification server 112.
  • the verification server 112 parses the received images of the labels 333 and 335 and stores the parsed image in a database for future reference.
  • the verification server 112 parses the signatures as well as the one or more identifiers.
  • FIG. 4A illustrate a third pattern creation unit 402 (an example of the pattern creation unit 102) for generating unique random patterns on a third input surface 404 by dispersing and/or randomly pasting one or more materials on the third input surface 404.
  • the one or more materials include, but are not limited to, granular threads, granular sheets, granular particles, glowing materials, shiny 3D materials, and any other material having texture different from the input surface.
  • the unique patterns on the third input surface 404 form a unique signature that is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with an uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable.
  • FIG. 4B illustrates exemplary signatures created by the third pattern creation unit 402 on the third input surface 404.
  • signatures 410 and 412 are created by randomly dispersing fine hair like threads on the third input surface 402.
  • signatures 418 and 420 are created by randomly dispersing shinny granular threads on the third input surface 402.
  • signatures 414 and 416 are created by randomly dispersing shinny granular sheets on the third input surface 402.
  • FIG. 4C illustrate a different glow or color that appear when a signature is viewed at different angles.
  • a first signature 422 till 428 looks different, when viewed through different angles.
  • a second signature 430 till 436 looks different when viewed through different angles.
  • the signature created in the process is unique and not easy to copy.
  • the signature has a different texture that may be easily felt with the movement of the hands on the signature.
  • the color on the signature appears to be different when viewed at different angles.
  • FIG. 4D illustrates association of exemplary identifiers to the signatures 448, 452, and 456 by the printing unit 104.
  • the printing unit 104 prints a number 450 next to a signature 448 to form a label 451 , a bar code 454 next to a signature 452 to form another label 455, and a QR code 458 next to a signature 456 to form a label 459.
  • the images of each of the labels 451 , 455 and 459 are captured by the image capturing unit 106 and saved in the signature database 108.
  • the signature database 108 sends the images to the verification server 112 periodically.
  • the verification server 112 parses the received image of the label and stores the parsed image in a database for future reference.
  • FIG. 5 illustrates exemplary products 502 and 508 that bear signatures generated by the pattern creation unit 102, in accordance with an embodiment of the present disclosure.
  • the products 502 and 508 may be from any industry like footwear, designer wear, apparels, watches, leather items, pharmaceutical, jewelry items, etc.
  • the product 502 bears a signature 504 and a corresponding identifier 506 (collectively referred to as a label 507).
  • the label 507 may be attached to the product 502 by pasting, tagging, embedding, air drying using hot air dryers, LED (light emitting diode) dryers, UV (ultra violet) dryers.
  • a label 513 may be attached on the product 508.
  • the labels may be attached to all the products in a supply chain by a vendor to distinguish the products from each other. All the products in a supply chain are attached with a label.
  • the signature and the one or more identifiers associated with the signature are unique to that product only. No two products may have similar signatures. Further, no two similar signatures may have similar patterns, thereby making the signature more robust and difficult to copy.
  • the signatures and their identifiers help in distinguishing a product from other products in a supply chain. Further, the signatures and their identifiers help a costumer to verify if a product in the supply chain is an original product or a counterfeit product.
  • FIG. 6 illustrates an exemplary process 600 of verifying if a product 602 is an original product or a counterfeit product, in accordance with an embodiment of the present disclosure.
  • the product 602 includes a signature 604 and identifiers 606 and 608 printed thereto.
  • the signature 604 and identifiers 606 and 608 are collectively referred to as a label 609.
  • the signature 604 is created by pasting shinny granular sheets on an input surface.
  • the input surface bears the granular sheets on one side and self-adhesive film on the other side, thereby making the signature 604 an easy to use sticker.
  • the identifier 606 and the identifier 608 are then printed with the signature 604 to form the label 609.
  • the label 609 may then be easily pasted on a surface of the product 602.
  • the identifier 606 is a QR code and the identifier 608 is a unique number.
  • a user 612 also referred as client or client site
  • the user 612 may scan the QR code 606 using a scanning device 610 and send it to the verification server 112 through the network 110.
  • the verification server 112 has a repository of images of labels which are received by the verification server 112 from the signature database 108 on timely basis.
  • the scanning device 610 may be a smart phone.
  • the scanning device 610 may be a tabloid.
  • the scanning device 610 may be any other device capable of scanning codes.
  • the user device 610 runs an application of the verification server 112 for quick verification of the signatures of the product 602.
  • the verification server 112 Upon receiving the QR code 606, the verification server 112 checks in its database, if the received QR code is present in the database. On verifying the QR code, the verification server 112 further checks if a signature corresponding to the QR code 606 is stored therein. The image retrieved from the database of the verification server 112 is displayed at user device 610. The user may then manually compare the image of the signature received with the signature 604 present on the product 602. If both the images match, then the product 602 is an original product, else the product 602 is a counterfeit product.
  • the user may send the number 608 to a third party through messaging, email, instant messaging or calling.
  • the user may enter the number 608 on a web interface.
  • the third party may send the number 608 to the verification server 112 for verification of the signature 604.
  • the user 612 may capture an image of the label 609 (signature 604, the QR code 606 and number 608) and share the image with the verification server 112.
  • the image may be shared via specific chat bot, a smartphone application, a web interface or any third party applications such as WhatsApp, Facebook, Messenger, etc.
  • the verification server 112 may parse the signature 604, the QR code 606 and the number 608 and compare using machine learning algorithm the parsed image of the signature 604 with the original saved image corresponding to the given identifier. If the two images match, then the product is verified or genuine and this information (referred as response) may be communicated to the user 612.
  • the product is unverified or fake and this information may also be communicated to the user 612.
  • the verification server 112 is not able to determine with a reasonable certainty whether the two images are same or different, the original image of the signature 604 is sent to the user device 610. The user 610 may then manually check if the original image of signature received is same as the signature 604 on the product 602.
  • any user may check for the authenticity of a product/documents/item using above solution, information like location, contact number etc. may be gathered (in concurrence with the user) when a user contacts the verification server 112 to check for the authenticity of the product 602.
  • the collected information corresponding to each product may be stored at the server 112 and may be used to track the flow of the product in the entire supply chain.
  • the application available at the user end may be used to engage with the user at the point of sale. The engagement may in the form of feedback, rating or any other marketing communication. All this information gathered may be analyzed and be used by companies in order to strategize better.
  • FIG. 7 is a flowchart illustrating a method 700 for creating a signature and associating the signature with one or more identifiers, in accordance with an embodiment of the present disclosure.
  • an input surface is received on which a signature is to be created.
  • the input surface 101 include, but not limited to, paper, plastic, metal, cotton or any other solid surface.
  • a unique random pattern is created on the input surface to form a signature.
  • the pattern on the first input surface may be created by using one or more colorful liquids and one or more brushes.
  • the colorful liquids may include painting colors, dyes, inks, natural fruit colors, etc.
  • the pattern may be created on the input surface by using fibers present in natural materials or synthetic materials.
  • fibers present in natural materials or synthetic materials When certain fibers are used to make a paper or any other similar sheet, the finished product is left with random fingerprints, which are impossible to replicate or reproduce.
  • paper prepared from a banana plant material, a mango plant material, or other such high fiber material contains unique marks, which are impossible or very difficult to copy.
  • a pattern may be created by dispersing and/or randomly pasting one or more materials on the input surface.
  • the one or more materials include, but not limited to, granular threads, granular sheets, granular particles, glowing materials, shiny 3D materials, any other material having texture different from the input surface, etc.
  • a signature created in this manner is left with randomly generated fine imprints that are impossible to copy or reproduce. Further, the signature is also left with uneven surface that may be felt by moving fingers across it, thereby making it more distinguishable.
  • the output signature is associated with one or more identifiers by printing the one or more identifiers next to the signature to form a label.
  • the one or more identifiers may be a decimal number, an alphanumeric number, a QR code, a Barcode, etc.
  • Each identifier is unique and corresponds to the signature.
  • FIG. 8 is a flowchart illustrating a method 800 for verifying if a product is original product or a counterfeit product, in accordance with an embodiment of the present disclosure. All the products in a supply chain are attached with a label corresponding to a signature and one or more identifiers associated with the signature. Each signature is unique and the one or more identifiers correspond to the unique signature.
  • a label (a signature and one or more identifiers) attached to a product are identified by a customer willing to buy the product.
  • the one or more identifiers are sent to a verification server by the customer.
  • the customer may scan the one or more identifiers and send them to the server through a corresponding application running on their computing device.
  • the customer may send the one or more identifiers to a third party. The third party may further send the identifiers to the server.
  • the verification server checks if the received one or more identifiers are present in a database.
  • the verification server checks for an image of a signature corresponding to the one or more identifiers. Each time a signature is created, an image of that signature with the associated identifiers is stored at the server (as describes in FIG. 1). The verification checks for that original image of the signature on receiving the one or more identifiers.
  • the verification server sends the original image of the signature to the costumer, either directly or through the third party, on his/her phone or any other device. The user may then manually compare the original image of the signature received with the signature present on the product. If both the images match then the product is an original product, else the product is a counterfeit product.
  • FIG. 9 is a flowchart illustrating a method 900 for verifying if a product is an original product or a counterfeit product, in accordance with another embodiment of the present disclosure.
  • a label (a signature and one or more identifiers) attached to a product is identified by a customer willing to buy the product.
  • an image of the label is sent to a verification server by the customer.
  • the verification server parses the received image of the label.
  • the server parses the image of the signature as well as the one or more identifiers.
  • the server compares the parsed image of the signature with an original image of a signature corresponding to the one or more identifiers.
  • the verification server uses machine learning tools to compare the two images.
  • the verification server notifies the costumer whether the product is an original product or a counterfeit product.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

La présente invention concerne un système pour empêcher la contrefaçon d'un produit. Le système comprend une unité de création de motif pour créer une première signature en formant un motif aléatoire unique sur une surface d'entrée en utilisant un ou plusieurs matériaux, une unité d'impression pour associer un ou plusieurs premiers identificateurs à la première signature afin de former une première étiquette, une unité de capture pour capturer une image de la première étiquette, une base de données de signatures pour stocker l'image de la première étiquette, et un serveur de vérification. Le serveur de vérification reçoit une image d'une seconde étiquette qui est attachée au produit, et comprend une seconde signature et un second identificateur, vérifie si le second identificateur est ou non présent dans la base de données de signatures, compare la seconde signature à une signature stockée correspondant au second identificateur à l'aide d'algorithmes d'apprentissage machine, et étiquette le produit comme produit authentique, lorsque la comparaison est réussie.
PCT/IN2019/050625 2018-09-01 2019-08-28 Système et procédé pour empêcher la contrefaçon d'un produit Ceased WO2020044373A1 (fr)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
IN201811032886 2018-09-01
IN201811032886 2018-09-01
IN201811034077 2018-09-11
IN201811034077 2018-09-11
IN201911010352 2019-03-18
IN201911010352 2019-03-18

Publications (1)

Publication Number Publication Date
WO2020044373A1 true WO2020044373A1 (fr) 2020-03-05

Family

ID=69643494

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2019/050625 Ceased WO2020044373A1 (fr) 2018-09-01 2019-08-28 Système et procédé pour empêcher la contrefaçon d'un produit

Country Status (1)

Country Link
WO (1) WO2020044373A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1029651B1 (nl) * 2021-08-17 2023-10-25 Zebra Technologies Objectidentificatie met behulp van oppervlakte optische artefacten

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170193525A1 (en) * 2015-12-31 2017-07-06 Salim Shah System and Method for Detecting Counterfeit Products
WO2018058847A1 (fr) * 2016-09-13 2018-04-05 江苏图码信息科技有限公司 Produit de code en couleurs avec motif tracé à la main ou texte et composant d'application
WO2018143059A1 (fr) * 2017-01-31 2018-08-09 日本ゼオン株式会社 Serveur d'interrogation d'authenticité, système d'interrogation d'authenticité, procédé d'interrogation d'authenticité et programme d'interrogation d'authenticité

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170193525A1 (en) * 2015-12-31 2017-07-06 Salim Shah System and Method for Detecting Counterfeit Products
WO2018058847A1 (fr) * 2016-09-13 2018-04-05 江苏图码信息科技有限公司 Produit de code en couleurs avec motif tracé à la main ou texte et composant d'application
WO2018143059A1 (fr) * 2017-01-31 2018-08-09 日本ゼオン株式会社 Serveur d'interrogation d'authenticité, système d'interrogation d'authenticité, procédé d'interrogation d'authenticité et programme d'interrogation d'authenticité

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1029651B1 (nl) * 2021-08-17 2023-10-25 Zebra Technologies Objectidentificatie met behulp van oppervlakte optische artefacten

Similar Documents

Publication Publication Date Title
CN113454635B (zh) 防假冒系统和方法
US20220050982A1 (en) Systems and methods to Authenticate a Security Device
CN109345264B (zh) 一种基于区块链的酒类产品溯源防伪系统和方法
CN109146024B (zh) 基于区块链的艺术品防伪电子标签系统与方法
Popović et al. A novel solution for counterfeit prevention in the wine industry based on IoT, smart tags, and crowd-sourced information
CN204375008U (zh) 一种流通物品跟踪管理鉴伪系统
CN111401809A (zh) 一种产品质量安全区块链追溯系统
US20080128496A1 (en) Method and apparatus for verification of items
CN102722824A (zh) 一种利用条形码鉴别商品真伪的方法
CN102542469A (zh) 基于云计算模式实现的商品条形码防伪系统及方法
CN101887570A (zh) 用于阻止产品伪造、转移和盗版的方法和系统
CN105654316A (zh) 一种nfc产品防伪溯源系统及其防伪溯源方法
CN109784951A (zh) 一种基于区块链技术的产品全流程防伪追溯系统
WO2011077459A2 (fr) Procédé d'extraction de caractéristiques naturellement chiffrées d'une surface naturelle d'un produit
CN103489121A (zh) 一种非现场商品的防伪交易方法及系统
CN105046500A (zh) 一种商品轨迹的防伪和物流监控方法
CN101556599A (zh) 二维码和密钥相耦合的物品防伪系统
CN109657766A (zh) 一种防伪标签及其防伪系统
CN103577996B (zh) 在线验证方法和系统
WO2005083644A1 (fr) Procede et systeme permettant de verifier l'authenticite de produits
CN103903040A (zh) 产品身份验证防伪标贴及验证方法
CN105976003A (zh) 一种防伪防破坏胶带及防伪方法
HK1245973A1 (zh) 产品转移管理
CN111882327A (zh) 一种具备身份特征可主动向系统反馈信息的防伪溯源方法
CA2339894A1 (fr) Technologie d'authentification pour systeme numerique a code a barres et a codage des chiffres

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19853518

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19853518

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19853518

Country of ref document: EP

Kind code of ref document: A1