US20080046263A1 - Methods and Systems for Making, Tracking and Authentication of Products - Google Patents
Methods and Systems for Making, Tracking and Authentication of Products Download PDFInfo
- Publication number
- US20080046263A1 US20080046263A1 US11/664,841 US66484105A US2008046263A1 US 20080046263 A1 US20080046263 A1 US 20080046263A1 US 66484105 A US66484105 A US 66484105A US 2008046263 A1 US2008046263 A1 US 2008046263A1
- Authority
- US
- United States
- Prior art keywords
- code
- secret
- checking centre
- codes
- item
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0282—Rating or review of business operators or products
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- This invention relates to the marking, tracking and authentication of goods, in particular, but not exclusively, of packaged goods, for example packs or cartons of cigarettes and other tobacco products.
- the invention also relates to production control.
- Contraband and counterfeiting cause significant loss of revenue to producers of traded goods as well as for national authorities. Moreover, the illegal sale of counterfeited goods of inferior quality is detrimental to the customer and to the manufacturer.
- Legally produced goods may also be illegally imported or traded, for example in order to evade taxes or national regulations. It is therefore a major concern in several trade areas to detect and avoid unauthorized parallel import channels.
- contraband and counterfeiting are particularly acute for goods subject to special taxation, like tobacco products. They also exist for many other kinds of traded products carrying a strong brand value, in particular for internationally traded products, such as perfumes, alcohols, watches and luxury goods in general.
- a limitation of this practice is that the interpretation and validation of these production codes can be time-consuming and cumbersome. For example, authentication may require every production code impressed on a manufactured item to be recorded in a database and/or the transfer of a large amount of confidential data from the manufacturing site to a central database. These requirements may jeopardize reliability and safety.
- the present invention aims to address the deficiencies in the prior art approaches described above.
- a method of marking manufactured items comprising: providing a plurality of secret codes to a checking centre and to a production line for the manufactured items; generating an ID code for each manufactured item; digitally signing each ID code by means of a secret derived from the plurality of secret codes and known to the checking centre; and marking each manufactured item with said signed ID code.
- the present invention also provides a method of authenticating an item marked according to the method above comprising transmitting the said signed ID code to said checking centre; and authenticating the ID code at the checking centre.
- the invention also provides a system for marking manufactured items comprising: a generator, for generating collections of secret codes; a production line for manufacturing the items to be marked, the production line comprising: a code generator for generating an ID code for each manufactured item; a digital Signor for signing the ID codes with a secret derived from the secret codes; a data transmitter for transmitting the secret to a checking centre; and a marker for marking each manufactured item with the signed ID code.
- the invention also provides a method of authenticating a manufactured item, comprising: generating a code and signing said code with a digital signature within a code generator; marking the item with the signed code; transmitting the signed code to a checking centre over a public network; authenticating the digital signature by the checking centre; retrieving the significance of the code at the checking centre; and transmitting the significance to a user over the public network.
- a further aspect of the invention resides in a method of controlling the volume of manufactured items marked the marking method above, comprising: gathering manufacturing volume information at the checking centre; and providing the manufacturing volume information to a user.
- the invention also provides a method of tracking an item marked by to the marking method above, comprising: transmitting the signed ID code to the checking centre; authenticating the ID code by the checking centre; and retransmitting the tracking information related to the ID code to a user.
- Embodiments of the various aspects of the invention have the advantage that marking and authentication can be accessed and interrogated remotely by an ordinary network, such as a land or mobile telephone.
- the marking and authentication has the further advantage that it may not be violated by counterfeiters.
- the genuineness of a manufactured item on sale can be checked easily, for example within a few seconds at the point of sale.
- Embodiments of aspects of the invention have the further advantage that cloned codes and unauthorized code duplications may be identified, and that the production volume, for example of a given manufacturer, manufacturing site or manufacturing line, may be controlled.
- Embodiments of aspects of the invention have the further advantage that they may be used to replace the system of fiscal stickers that is used in many countries to collect taxes, for example on tobacco products.
- FIG. 1 is a schematic view of a marking and authentication system embodying the invention
- FIG. 2 shows schematically a marking code format embodying the invention
- FIG. 3 is a flow chart showing a code generation scheme embodying the invention.
- FIG. 4 is a flow chart showing a code authentication scheme embodying the invention.
- each production line represents a production facility for one or more manufactured items.
- a production line may be a cigarette making and packaging line, with the manufactured items being, for example, cigarette packs and cartons of at least one brand.
- the production may be organized in batches, each batch being dedicated to the production of a certain amount of identical manufactured items, for example cigarette packs and cartons of a particular brand and type.
- these lines may be physically located at one manufacturing site 10 , or at different production centres 10 having various geographical locations.
- Each production line comprises a code generator 106 arranged to generate and encrypt an identification code for each item manufactured on the production line 101 .
- the production line 101 also comprises a marker 107 .
- Any suitable marking means may be used such as a continuous inkjet printer, a drop-on-demand inkjet printer, a laser printer, or any other printer or marker that allows the marking of variable information, to impress or print the identification code on each manufactured item.
- the identification codes can be impressed on each item, on an external package, on labels or in any other convenient way.
- the identification code is printed on adhesive tags, or labels, to be applied to the manufactured items, preferably non-removably.
- the identification code is printed by a laser beam on a layer of laser-sensitive material deposited on the item or on the item's package. This method allows the code to be impressed through a transparent wrapping layer.
- identification code examples include holographic printing, for example using the HoloSpot® format.
- Embodiments of the invention may also include radio, electronic or magnetic recording of the identification code, for example using an RFID transponder, EMID® tags or any other tagging means.
- the system has means to count and report the number of codes generated and printed codes in each production batch or in a given production period, as will now be described in detail.
- the production lines 101 include a code generation system 106 which generates a unique encrypted identification code SUPI for each item produced.
- the code generation system 106 is a fully autonomous computer or microcontroller dedicated to a particular production line 101 .
- the code generation system 106 can communicate with a checking centre 30 via a secure internet connection 34 , a local central server 15 , or any other suitable data communication means.
- the checking centre 30 receives and centralizes production data and processes queries from users 80 , 70 .
- several levels of packaging such as packs and cartons comprising several packs, which are manufactured on the same manufacturing line 101 , may be marked using common hardware resources.
- the code generation system 106 may comprise different or shared software modules, loaded on a computer common to several production lines, and serve several production lines at the same time.
- the code generation system 106 may be remotely located, for example in the checking centre, and communicate the generated codes to the production lines, as required, by appropriate network means.
- the code generation system performs a number of functions, as described below, including the generation of ID codes for the items and the signing of those ID codes.
- the unique identification code SUPI is obtained by processing data in a Production Information Code PIC.
- the PIC combines various data related to the manufacture of the item, such as a code MC identifying a manufacturing centre 10 , a code PL identifying a particular production line 101 within a manufacturing centre 10 , and codes YR, DY, HR identifying the year, day and hour, respectively, when a particular item was manufactured.
- the PIC may include a code generator ID instead of the manufacturing centre and production line codes MC, PL.
- the individual data elements can be combined by decimal or binary digit juxtaposition, by algebraic composition, by applying a predefined shift value each data element and adding all the shifted values together, or by any other computational means.
- the composition function is invertible, to allow decomposition of the PIC into the original elements MC, PL, YR, DY, I-IR.
- an additional element may be introduced into the PIC to ensure uniqueness.
- a production line fabricates a large number of items 43 .
- Each item 43 is identified, within a production hour, by an individual number TI, for example a progressive number corresponding to the chronological production sequence. Other manners of generating or assigning individual numbers are possible.
- each UPI is unique to an item, for example to a single cigarette pack or cigarette carton.
- the invention is not limited to this case, and includes variants with non-unique UPI numbers, distinguishable from each other by their different digital signatures.
- the structure of the UPI code and the significance of the various fields composing the UPI code are exemplary and are not limiting. Any code suitable as item identifier code, having any arbitrary structure and significance, may be employed in the frame of the present invention.
- a pseudorandom noise value code is combined with the UPI to authenticate the code generator 106 that produces the code.
- the noise value acts as a digital signature for the code marked on each manufactured item produced by a particular manufacturing line 101 applied by the code generator 106 which can be verified by the checking centre 30 .
- the pseudorandom noise code may obtained by encrypting a copy of the UPI code with a secret shared by the code generator and the checking centre.
- secret designates any data used for generation or authentication of a digital signature.
- Other ways of adding a digital signature to the UPI code are possible, for example by using asymmetric cryptography, and are included within the scope of the invention.
- the secret is derived from secret codes, which may be regarded as static secret codes.
- a centralized salt generator centre 20 generates a large collection of secret codes, hereinafter designated as a ‘salt matrix’ containing a large number of precalculated random or pseudorandom data.
- Each salt matrix is preferably unique and is transmitted, in duplicate, to the intended manufacturing line 101 and to the checking centre 30 .
- Each manufacturing line 101 receives a unique salt matrix.
- the salt matrices transmitted to the checking centre are stored in a database 31 accessible to the checking centre 30 and preferably included in the checking centre 30 , with identification of the production lines 101 , 102 to which they belong.
- the salt matrices are used to generate secret keys used to encrypt the UPI and to generate an electronic signature, as it will be explained later.
- the matrix is preferably not transferred over a network connection, but rather recorded on non-volatile data carriers 50 such as CD-ROMs (Compact Disc Read-Only Memory), DVD-ROMs (Digital Versatile Disc Read-Only Memory), removable hard disks, magneto-optical devices or any suitable non-volatile memory device.
- non-volatile data carriers 50 such as CD-ROMs (Compact Disc Read-Only Memory), DVD-ROMs (Digital Versatile Disc Read-Only Memory), removable hard disks, magneto-optical devices or any suitable non-volatile memory device.
- the data carriers are physically transferred to the checking centre 30 and to the production lines 101 , 102 .
- the salt matrices are encrypted and digitally signed by the salt generator 20 , using a suitable encryption and authentication technique, such as DES (Digital Encryption Standard), RSA (Rivest, Shamir, and Adelman algorithm), and the like.
- DES Digital Encryption Standard
- RSA Rivest Cipher, GTE
- the salt matrices are not sent to the checking centre as part of the checking process for items as will be discussed.
- a salt file contains the following components:
- the code generator of every production line 101 must register with the checking centre 30 . This registration occurs only whenever a new salt matrix is used, or at prescribed intervals. The system does not require constant communication between the code generators and the checking centre.
- the registration procedure comprises the following steps:
- the registration procedure is arranged such that the salt matrix is never transferred over the internet. Only a one-use decryption key is transmitted from the checking centre 30 to the code generator 106 .
- the salt matrix is made available to the code generator only after a valid registration with the checking centre. This prevents unauthorized use of the code generator as no valid code can be generated.
- the decrypted salt matrix is deleted when the code generator is put out of service to prevent a malicious user from gaining access to the salt matrix without proper registration. Additional means for disabling the code generator and preventing unauthorized use of the code generator and the production line may be provided.
- the operation of the code generator 106 will now be described with reference to FIG. 3 .
- the code generator 106 At each production line 101 , 102 at the beginning of each production batch, the code generator 106 generates a random salt index alpha, which it transmits to the checking centre 30 , with various information related to the item to be manufactured such as, for example, brand, intended market of destination, packaging.
- a new salt index alpha is generated at every change of production batch.
- the checking centre acknowledges successful receipt of the index alpha to the code generator.
- the index alpha may be regarded as a dynamic secret code.
- the UPI code of the first item to be produced in the batch is transmitted with the index alpha to the checking centre 30 .
- the salt index alpha is stored in database 31 related to various information about the item to be manufactured. This enables the checking centre 30 , upon receipt of a request to check a particular SUPI code, to retrieve the particular alpha and knowing the salt matrix used by the code generator 106 to sign that SUPI code, validate the signature.
- the salt index alpha does not need to be communicated in real time to the checking centre 30 , at the beginning of each production batch. Once a value of alpha has been chosen, the code generator can immediately start to generate valid codes and the value of alpha can be communicated after a delay of some hours, or more depending on the availability of the network connection.
- the random salt index alpha, the salt matrix and the UPI code are used by the code generator for generating a noise code (step 301 ) which is safe from cryptographic attacks. It does not allow the reconstruction of the original values of alpha, salts matrix and UPI.
- a variety of known techniques are available for generating the noise code including, but not limited to, table substitution, indexing, hashing, and variations thereof.
- the noise code so generated is unequivocally calculated from the UPI, yet the inverse operation is computationally impossible.
- the noise code is used as a digital signature, allowing validation of the UPI code.
- the alpha code and the salt matrix are combined in a different way for each manufactured item, in order to render the digital signatures robust against decryption attempts.
- the salt matrix and the alpha code are known only by the code generator and by the checking centre. Together they constitute a secret allowing the code generator to generate signed codes which the checking centre can subsequently verify.
- the UPI number and the calculated noise code are combined at step 302 and, preferably, the resulting code is obfuscated step 303 , destroying correlations between successive codes.
- the obfuscation operation is reversible, allowing the checking centre to retrieve the original UPI and noise value.
- Several known obfuscation techniques are possible. The particular obfuscation algorithm chosen is preferably not published.
- the result of the obfuscation is the unique SUPI code, which is printed on the manufactured items by the printer 107 .
- Each of the items 43 is marked with a unique digitally signed SUPI code, allowing identification of the production batch in which it has been manufactured.
- data relating to the production batch e.g. product type, brand, intended market of destination, packaging is stored in the database 31 with the index alpha at the start of the batch.
- This data is accessible to the checking centre.
- the SUPI code can be printed on the manufactured item by a variety of printing and marking techniques, for example continuous inkjet printing, drop-on-demand printing, laser, etc.
- the SUPI code may be printed in a human readable format, or a machine-readable formats such as 1-D or 2-D barcodes or characters suitable for OCR (Optical Character Recognition).
- the SUPI code is printed or recorded by a printing or recording means comprising a device such as a code counter or a register, for counting the exact number of marked items, either during a production batch or in a given time interval.
- a printing or recording means comprising a device such as a code counter or a register, for counting the exact number of marked items, either during a production batch or in a given time interval.
- the exact number of marked items may be stored in the database 31 accessible to the checking centre and used for production volume control.
- the SUPI code is printed with an ink containing a covert taggant, to allow a quick validity check without querying the checking centre.
- the production line 101 may have a sensor to detect the presence of the SUPI (either using a vision system and/or by detecting the covert taggant, if applicable).
- the sensor can be connected to the controller of the production line, thus enabling the rejection of items not properly marked.
- the controller can be set to prevent the production line from operating if the sensor unit is disconnected, faulty or on rejection of a defined number of items.
- a history of rejections may be logged in the Code Generator and communicated to the Checker for monitoring purposes by authorized users.
- the production information code (PIC code) may be repeated on the manufactured item, in plain format without encryption or obfuscation, allowing the user to verify the answer provided by the checking centre 30 and useful for management and monitoring of the supply chain.
- the manufactured items 43 are distributed and commercialized in the usual way.
- the authenticity of the item can be verified by sending a query containing the SUPI code of the package to the checking centre.
- Such verification may be requested for example by generic users, such as retailers, consumers, or customs agents, and by privileged users, for example employees of the manufacturers, or organizations having a privileged agreement with the manufacturer.
- the SUPI codes may also be employed for tracking the manufacturing items along the distribution and commercialization chain.
- FIG. 4 shows the processing of a request to validate a SUPI code in the checking centre.
- the received SUPI code is first de-obfuscated at step 402 , by applying the inverse of the obfuscation function described above.
- the original UPI and noise component are extracted.
- the checking centre performs a first level authentication at step 404 on the manufacturing centre MC and the production line PL. If PL is found to correspond to an existing production line of manufacturing centre MC, the authentication proceeds to the next level, otherwise a response is generated at 420 that the SUPI code is invalid, and the item is counterfeit.
- the checking centre 30 uses the secret salt matrix received by the salt generator 20 and the alpha code transmitted at the beginning of a production batch.
- the checking centre retrieves the information related to the production batch corresponding to the received UPI code from the database 31 . If the retrieval is successful, the retrieved salt matrix and the alpha code are used at 411 to reconstruct the noise code from the received UPI code and to verify the validity of the signature. If the received noise and the reconstructed noise do not match, or if no data corresponding to the PIC is present in the database, the SUPI code is identified as invalid and the checking centre responds at 420 that the item is counterfeit.
- a third level of authentication at step 412 the checking centre verifies whether queries for the same SUPI code have been submitted more than a predefined number of times. In this case, there is then a suspicion that the SUPI code may be a clone of a valid code, identically printed on a large number of counterfeits. The checking centre then issues a reply at step 430 specifying, that the submitted code is valid, but the item is likely to be counterfeit.
- the discovery of cloned codes can be refined by making use of other information, for example the origin of the query, which can be determined if the query originated from a phone, or the elapsed time between queries.
- ‘cloning’ means multiple copying of a valid production code, for example for tagging counterfeited articles. If the code has been found valid (step 440 ), the checking centre retrieves the significance of the code and transmits it to the user, preferably in natural language, for example: “your code corresponds to a pack of brand XYZ, intended market of retail Switzerland”, or another appropriate formulation.
- the information returned by the checking centre may allow the tracking of the production information for each item, for example information about the production unit, the production line, the date and time of production. Such information can be returned in encoded form, or in natural language.
- the checking centre can formulate the significance of the codes into several languages, and choose the most appropriate language for the reply, according to the origin or language of the query.
- the public interface to the checking centre includes a SMS (Short Message Service) or USSD (Unstructured Supplementary Services Data) portal 60 of a public radio communication network, for example a telephone network supporting text or numeric messages like GSM, TDMA, CDMA, PDC, or UMTS standard networks, through which the users 80 can send queries to the checking centre 30 in form of text messages, or SMS, from their own cell phone 82 , and receive the reply from the checking centre in the same way or by another channel, for example by a voice call. In this way the user 80 can verify an item 43 directly at the point of sale 77 .
- SMS Short Message Service
- USSD Unstructured Supplementary Services Data
- the communication may alternatively or additionally be over the internet 32 by a web server at the checking centre 30 , by an email server or a WAP (Wireless Application Protocol) server.
- a web server at the checking centre 30 by an email server or a WAP (Wireless Application Protocol) server.
- WAP Wireless Application Protocol
- the communication may be to a telephone voice server, able to interpret voice commands or DTMF (Dual-Tone Multi-Frequency) signals generated by a telephone keyboard.
- DTMF Dual-Tone Multi-Frequency
- Embodiments of the present invention allow a generic unidentified user to authenticate a manufactured item over a public network, such as the internet 32 , a telephone network or a mobile telephone network.
- a public network such as the internet 32 , a telephone network or a mobile telephone network.
- the user need not identify himself, nor has he to have access to any secret code or sensitive information.
- each item can be identified in a cryptographically safe way.
- a privileged user 70 may have a preferred access to the checking centre 30 and retrieve additional privileged information, unavailable to generic users, for example production volume information, or statistical information on the access to the checking centre.
- a privileged user may query information on a particular SUPI without marking it as cloned for successive queries from ordinary customers 80 .
- the privileged user may communicate with the checking centre 30 by a public network, or an intranet connection 33 .
- the checking centre may provide, to generic or privileged users, additional information to which it has access, which are not contained in the UPI code, for example expiry date, warranty information, address of local support, or previous trade steps, importation routes and so forth.
- checking centre may gather and store information on production volumes, for example the number of items produced in each production batch by each production line, as well as statistical production data per brand and per intended market. Such production volume information may be used for production management, or for official purpose, and may be available to selected users.
- Identification steps may be provided to identifying known privileged users, for example by passwords, cookies, voice or biometric data, or by any suitable identification means.
- the checker may include, or have access to, a user rights database for storing the profiles of various users, and determining to which information each user has access.
- embodiments of the present invention do not require a permanent connection between the manufacturing lines and the checking centre, nor that all the SUPIs be individually stored in a database.
- no identification code is stored.
- the digital signature ensures that each item can be verified with a minimal transfer of confidential data, providing a high level of reliability and safety. Moreover production volume can be exactly accounted for.
- the database required by the checking centre is relatively small compared to that which would be needed if the codes were stored.
- the checking centre 30 may be maintained by a trusted third party independent from the producer of the manufactured items 43 .
- the embodiments described may be used to replace the system of fiscal stickers that is used in many countries to collect taxes, for example on tobacco products.
Abstract
The invention foresees the labeling of each manufactured good with a digitally verified unique numeric identifier, and a central checking center allowing users to verify the authenticity of a particular cigarette pack or case by means of a cell phone interface. A system of secret key sharing allows secure authentication of each item and prevents code breaking or misuse.
Description
- This invention relates to the marking, tracking and authentication of goods, in particular, but not exclusively, of packaged goods, for example packs or cartons of cigarettes and other tobacco products. The invention also relates to production control.
- Contraband and counterfeiting cause significant loss of revenue to producers of traded goods as well as for national authorities. Moreover, the illegal sale of counterfeited goods of inferior quality is detrimental to the customer and to the manufacturer.
- Legally produced goods may also be illegally imported or traded, for example in order to evade taxes or national regulations. It is therefore a major concern in several trade areas to detect and avoid unauthorized parallel import channels.
- The problems of contraband and counterfeiting are particularly acute for goods subject to special taxation, like tobacco products. They also exist for many other kinds of traded products carrying a strong brand value, in particular for internationally traded products, such as perfumes, alcohols, watches and luxury goods in general.
- It is a major concern of the manufacturers of such products to develop methods for reliably marking genuine products such as to enable the unequivocal identification of non-genuine products and the detection of illegal imports.
- It is common practice to identify traded goods by a production code, or serial number, impressed or printed on the package, for example a cigarette pack or carton. Such a code, under certain conditions, enables identification of the production site, and the tracking of the trade chain for a particular item. Such knowledge is useful in identifying smuggled items.
- A limitation of this practice is that the interpretation and validation of these production codes can be time-consuming and cumbersome. For example, authentication may require every production code impressed on a manufactured item to be recorded in a database and/or the transfer of a large amount of confidential data from the manufacturing site to a central database. These requirements may jeopardize reliability and safety.
- Another limitation of this practice is that the production codes can easily be imitated or cloned. To partially obviate this limitation, it is known to add a covert taggant to the ink used to print the production code on the package. Counterfeit items carrying clones of valid codes can be thus detected by the absence of the covert taggant. The security provided by this method depends entirely on the ability to control the sources and the availability of the taggant.
- The present invention aims to address the deficiencies in the prior art approaches described above.
- According to the invention, there is provided a method of marking manufactured items, comprising: providing a plurality of secret codes to a checking centre and to a production line for the manufactured items; generating an ID code for each manufactured item; digitally signing each ID code by means of a secret derived from the plurality of secret codes and known to the checking centre; and marking each manufactured item with said signed ID code.
- The present invention also provides a method of authenticating an item marked according to the method above comprising transmitting the said signed ID code to said checking centre; and authenticating the ID code at the checking centre.
- The invention also provides a system for marking manufactured items comprising: a generator, for generating collections of secret codes; a production line for manufacturing the items to be marked, the production line comprising: a code generator for generating an ID code for each manufactured item; a digital Signor for signing the ID codes with a secret derived from the secret codes; a data transmitter for transmitting the secret to a checking centre; and a marker for marking each manufactured item with the signed ID code.
- The invention also provides a method of authenticating a manufactured item, comprising: generating a code and signing said code with a digital signature within a code generator; marking the item with the signed code; transmitting the signed code to a checking centre over a public network; authenticating the digital signature by the checking centre; retrieving the significance of the code at the checking centre; and transmitting the significance to a user over the public network.
- A further aspect of the invention resides in a method of controlling the volume of manufactured items marked the marking method above, comprising: gathering manufacturing volume information at the checking centre; and providing the manufacturing volume information to a user.
- The invention also provides a method of tracking an item marked by to the marking method above, comprising: transmitting the signed ID code to the checking centre; authenticating the ID code by the checking centre; and retransmitting the tracking information related to the ID code to a user.
- Embodiments of the various aspects of the invention have the advantage that marking and authentication can be accessed and interrogated remotely by an ordinary network, such as a land or mobile telephone. The marking and authentication has the further advantage that it may not be violated by counterfeiters. Moreover, the genuineness of a manufactured item on sale can be checked easily, for example within a few seconds at the point of sale.
- Embodiments of aspects of the invention have the further advantage that cloned codes and unauthorized code duplications may be identified, and that the production volume, for example of a given manufacturer, manufacturing site or manufacturing line, may be controlled.
- Embodiments of aspects of the invention have the further advantage that they may be used to replace the system of fiscal stickers that is used in many countries to collect taxes, for example on tobacco products.
- Embodiments of the invention will now be described, by way of example only, and with reference to the accompanying drawings in which:
-
FIG. 1 is a schematic view of a marking and authentication system embodying the invention; -
FIG. 2 shows schematically a marking code format embodying the invention; -
FIG. 3 is a flow chart showing a code generation scheme embodying the invention; -
FIG. 4 is a flow chart showing a code authentication scheme embodying the invention. - Referring to
FIG. 1 , the items to be marked are produced on one ormore production lines - If there are two or more production lines, these lines may be physically located at one
manufacturing site 10, or atdifferent production centres 10 having various geographical locations. - Each production line comprises a
code generator 106 arranged to generate and encrypt an identification code for each item manufactured on theproduction line 101. Theproduction line 101 also comprises amarker 107. Any suitable marking means may be used such as a continuous inkjet printer, a drop-on-demand inkjet printer, a laser printer, or any other printer or marker that allows the marking of variable information, to impress or print the identification code on each manufactured item. Depending on the nature of the packaging, the identification codes can be impressed on each item, on an external package, on labels or in any other convenient way. In one embodiment, the identification code is printed on adhesive tags, or labels, to be applied to the manufactured items, preferably non-removably. - In one embodiment the identification code is printed by a laser beam on a layer of laser-sensitive material deposited on the item or on the item's package. This method allows the code to be impressed through a transparent wrapping layer.
- Other possible supports for the identification code include holographic printing, for example using the HoloSpot® format.
- Embodiments of the invention may also include radio, electronic or magnetic recording of the identification code, for example using an RFID transponder, EMID® tags or any other tagging means.
- Preferably the system has means to count and report the number of codes generated and printed codes in each production batch or in a given production period, as will now be described in detail. The
production lines 101 include acode generation system 106 which generates a unique encrypted identification code SUPI for each item produced. Preferably, thecode generation system 106 is a fully autonomous computer or microcontroller dedicated to aparticular production line 101. Preferably thecode generation system 106 can communicate with a checkingcentre 30 via asecure internet connection 34, a localcentral server 15, or any other suitable data communication means. - The checking
centre 30 receives and centralizes production data and processes queries fromusers - In one embodiment of the invention, several levels of packaging, such as packs and cartons comprising several packs, which are manufactured on the
same manufacturing line 101, may be marked using common hardware resources. - In one embodiment the
code generation system 106 may comprise different or shared software modules, loaded on a computer common to several production lines, and serve several production lines at the same time. Thecode generation system 106 may be remotely located, for example in the checking centre, and communicate the generated codes to the production lines, as required, by appropriate network means. The code generation system performs a number of functions, as described below, including the generation of ID codes for the items and the signing of those ID codes. - In the embodiment of
FIG. 2 , the unique identification code SUPI is obtained by processing data in a Production Information Code PIC. The PIC combines various data related to the manufacture of the item, such as a code MC identifying amanufacturing centre 10, a code PL identifying aparticular production line 101 within amanufacturing centre 10, and codes YR, DY, HR identifying the year, day and hour, respectively, when a particular item was manufactured. In one alternative embodiment, the PIC may include a code generator ID instead of the manufacturing centre and production line codes MC, PL. - To obtain the PIC, the individual data elements can be combined by decimal or binary digit juxtaposition, by algebraic composition, by applying a predefined shift value each data element and adding all the shifted values together, or by any other computational means. Preferably the composition function is invertible, to allow decomposition of the PIC into the original elements MC, PL, YR, DY, I-IR. In the case of a non-reversible composition function, an additional element may be introduced into the PIC to ensure uniqueness.
- During each production hour, a production line fabricates a large number of
items 43. Eachitem 43 is identified, within a production hour, by an individual number TI, for example a progressive number corresponding to the chronological production sequence. Other manners of generating or assigning individual numbers are possible. - The production information code PIC and the individual number TI are combined to provide an item identifier UPI. In the following description, each UPI is unique to an item, for example to a single cigarette pack or cigarette carton. However the invention is not limited to this case, and includes variants with non-unique UPI numbers, distinguishable from each other by their different digital signatures.
- The structure of the UPI code and the significance of the various fields composing the UPI code are exemplary and are not limiting. Any code suitable as item identifier code, having any arbitrary structure and significance, may be employed in the frame of the present invention.
- A pseudorandom noise value code is combined with the UPI to authenticate the
code generator 106 that produces the code. The noise value acts as a digital signature for the code marked on each manufactured item produced by aparticular manufacturing line 101 applied by thecode generator 106 which can be verified by the checkingcentre 30. To ensure verifiability by the checking centre, the pseudorandom noise code may obtained by encrypting a copy of the UPI code with a secret shared by the code generator and the checking centre. ‘Secret’ designates any data used for generation or authentication of a digital signature. Other ways of adding a digital signature to the UPI code are possible, for example by using asymmetric cryptography, and are included within the scope of the invention. The secret is derived from secret codes, which may be regarded as static secret codes. - In one embodiment of
FIG. 1 , a centralizedsalt generator centre 20 generates a large collection of secret codes, hereinafter designated as a ‘salt matrix’ containing a large number of precalculated random or pseudorandom data. Each salt matrix is preferably unique and is transmitted, in duplicate, to the intendedmanufacturing line 101 and to thechecking centre 30. Eachmanufacturing line 101 receives a unique salt matrix. The salt matrices transmitted to the checking centre are stored in adatabase 31 accessible to thechecking centre 30 and preferably included in thechecking centre 30, with identification of theproduction lines - In the production lines, 101, 102, the salt matrices are used to generate secret keys used to encrypt the UPI and to generate an electronic signature, as it will be explained later.
- To ensure authenticity, confidentiality and integrity of the salt matrix, the matrix is preferably not transferred over a network connection, but rather recorded on
non-volatile data carriers 50 such as CD-ROMs (Compact Disc Read-Only Memory), DVD-ROMs (Digital Versatile Disc Read-Only Memory), removable hard disks, magneto-optical devices or any suitable non-volatile memory device. The data carriers are physically transferred to thechecking centre 30 and to theproduction lines - Preferably, to further increase safety, the salt matrices are encrypted and digitally signed by the
salt generator 20, using a suitable encryption and authentication technique, such as DES (Digital Encryption Standard), RSA (Rivest, Shamir, and Adelman algorithm), and the like. The salt matrices are not sent to the checking centre as part of the checking process for items as will be discussed. - Preferably, a salt file contains the following components:
-
- (i) A unique salt file identifier. (ii) The salt matrix encrypted using a strong cipher, such as triple-DES, or AES (Advanced Encryption Standard), according to a key generated in the
salt generator 20. A salt matrix may be, for example, a long string of random or pseudorandom digits or characters. - (iii) The encrypted key needed to decode the salt matrix, encrypted with a public-key cipher, for example RSA, using a public key of the
checking centre 30. This component is requested in the salt file sent to thechecking centre 30 and may be omitted in the file destined to theproduction line 101. - (iv) A digital signature of the salt generator, obtained for example by encoding a digest of the full message with a salt generator private key, whose public counterpart is known to the checking centre.
- (i) A unique salt file identifier. (ii) The salt matrix encrypted using a strong cipher, such as triple-DES, or AES (Advanced Encryption Standard), according to a key generated in the
- In this embodiment, the code generator of every
production line 101 must register with the checkingcentre 30. This registration occurs only whenever a new salt matrix is used, or at prescribed intervals. The system does not require constant communication between the code generators and the checking centre. - The registration procedure comprises the following steps:
-
- (i) The
code generator 106 of theproduction line 101 connects to thechecking centre 30 via a secure internet connection, or via a local central server connected to the internet, and initiates the registration by identifying itself. - (ii) A CD-
ROM 50, containing a salt file, is loaded into the code generator, its integrity is verified by its electronic signature, and its unique identifier is transmitted to thechecking centre 30. - (iii) The checking centre retrieves its own copy of the salt file, locally or remotely stored, by means of the unique identifier.
- (iv) If the salt file has been already used, the checking centre stops the registration and requests another salt file, or initiates appropriate action, for example issuing a warning to the user or logging it in a security journal.
- (v) If the salt file has not yet been used, and the identification of the code generator is satisfactory, the checking centre decrypts the secret key of the salt file with its private key, and transmits it to the code generator over the
secure internet connection 34. In the case where the salt file is not unique this step takes place regardless of whether or not the salt file has already been used. - (vi) The code generator decrypts the salt matrix.
- (i) The
- The registration procedure is arranged such that the salt matrix is never transferred over the internet. Only a one-use decryption key is transmitted from the checking
centre 30 to thecode generator 106. The salt matrix is made available to the code generator only after a valid registration with the checking centre. This prevents unauthorized use of the code generator as no valid code can be generated. - Preferably the decrypted salt matrix is deleted when the code generator is put out of service to prevent a malicious user from gaining access to the salt matrix without proper registration. Additional means for disabling the code generator and preventing unauthorized use of the code generator and the production line may be provided. The operation of the
code generator 106 will now be described with reference toFIG. 3 . - At each
production line code generator 106 generates a random salt index alpha, which it transmits to thechecking centre 30, with various information related to the item to be manufactured such as, for example, brand, intended market of destination, packaging. A new salt index alpha is generated at every change of production batch. Preferably the checking centre acknowledges successful receipt of the index alpha to the code generator. The index alpha may be regarded as a dynamic secret code. - In an embodiment the UPI code of the first item to be produced in the batch is transmitted with the index alpha to the
checking centre 30. The salt index alpha is stored indatabase 31 related to various information about the item to be manufactured. This enables thechecking centre 30, upon receipt of a request to check a particular SUPI code, to retrieve the particular alpha and knowing the salt matrix used by thecode generator 106 to sign that SUPI code, validate the signature. - The salt index alpha does not need to be communicated in real time to the
checking centre 30, at the beginning of each production batch. Once a value of alpha has been chosen, the code generator can immediately start to generate valid codes and the value of alpha can be communicated after a delay of some hours, or more depending on the availability of the network connection. - Backup procedures such as telephone or fax may be used to communicate the alpha to the checking centre, in case the network connection is unavailable. The random salt index alpha, the salt matrix and the UPI code are used by the code generator for generating a noise code (step 301) which is safe from cryptographic attacks. It does not allow the reconstruction of the original values of alpha, salts matrix and UPI. A variety of known techniques are available for generating the noise code including, but not limited to, table substitution, indexing, hashing, and variations thereof. The noise code so generated is unequivocally calculated from the UPI, yet the inverse operation is computationally impossible.
- The noise code is used as a digital signature, allowing validation of the UPI code. Preferably the alpha code and the salt matrix are combined in a different way for each manufactured item, in order to render the digital signatures robust against decryption attempts.
- The salt matrix and the alpha code are known only by the code generator and by the checking centre. Together they constitute a secret allowing the code generator to generate signed codes which the checking centre can subsequently verify.
- The UPI number and the calculated noise code are combined at
step 302 and, preferably, the resulting code is obfuscatedstep 303, destroying correlations between successive codes. The obfuscation operation is reversible, allowing the checking centre to retrieve the original UPI and noise value. Several known obfuscation techniques are possible. The particular obfuscation algorithm chosen is preferably not published. - The result of the obfuscation, is the unique SUPI code, which is printed on the manufactured items by the
printer 107. Each of theitems 43 is marked with a unique digitally signed SUPI code, allowing identification of the production batch in which it has been manufactured. - Preferably, data relating to the production batch, e.g. product type, brand, intended market of destination, packaging is stored in the
database 31 with the index alpha at the start of the batch. This data is accessible to the checking centre. The SUPI code can be printed on the manufactured item by a variety of printing and marking techniques, for example continuous inkjet printing, drop-on-demand printing, laser, etc. The SUPI code may be printed in a human readable format, or a machine-readable formats such as 1-D or 2-D barcodes or characters suitable for OCR (Optical Character Recognition). - Preferably the SUPI code is printed or recorded by a printing or recording means comprising a device such as a code counter or a register, for counting the exact number of marked items, either during a production batch or in a given time interval. The exact number of marked items may be stored in the
database 31 accessible to the checking centre and used for production volume control. - In one preferred embodiment, the SUPI code is printed with an ink containing a covert taggant, to allow a quick validity check without querying the checking centre.
- The
production line 101 may have a sensor to detect the presence of the SUPI (either using a vision system and/or by detecting the covert taggant, if applicable). The sensor can be connected to the controller of the production line, thus enabling the rejection of items not properly marked. The controller can be set to prevent the production line from operating if the sensor unit is disconnected, faulty or on rejection of a defined number of items. A history of rejections may be logged in the Code Generator and communicated to the Checker for monitoring purposes by authorized users. The production information code (PIC code) may be repeated on the manufactured item, in plain format without encryption or obfuscation, allowing the user to verify the answer provided by the checkingcentre 30 and useful for management and monitoring of the supply chain. - After leaving the
production centre 10, the manufactureditems 43 are distributed and commercialized in the usual way. At each stage of the distribution and commercialization process, the authenticity of the item can be verified by sending a query containing the SUPI code of the package to the checking centre. Such verification may be requested for example by generic users, such as retailers, consumers, or customs agents, and by privileged users, for example employees of the manufacturers, or organizations having a privileged agreement with the manufacturer. The SUPI codes may also be employed for tracking the manufacturing items along the distribution and commercialization chain. -
FIG. 4 shows the processing of a request to validate a SUPI code in the checking centre. The received SUPI code is first de-obfuscated atstep 402, by applying the inverse of the obfuscation function described above. Atstep 402 the original UPI and noise component are extracted. The checking centre performs a first level authentication atstep 404 on the manufacturing centre MC and the production line PL. If PL is found to correspond to an existing production line of manufacturing centre MC, the authentication proceeds to the next level, otherwise a response is generated at 420 that the SUPI code is invalid, and the item is counterfeit. In the second level of authentication, the checkingcentre 30 uses the secret salt matrix received by thesalt generator 20 and the alpha code transmitted at the beginning of a production batch. At 410 the checking centre retrieves the information related to the production batch corresponding to the received UPI code from thedatabase 31. If the retrieval is successful, the retrieved salt matrix and the alpha code are used at 411 to reconstruct the noise code from the received UPI code and to verify the validity of the signature. If the received noise and the reconstructed noise do not match, or if no data corresponding to the PIC is present in the database, the SUPI code is identified as invalid and the checking centre responds at 420 that the item is counterfeit. - In a third level of authentication at
step 412, the checking centre verifies whether queries for the same SUPI code have been submitted more than a predefined number of times. In this case, there is then a suspicion that the SUPI code may be a clone of a valid code, identically printed on a large number of counterfeits. The checking centre then issues a reply atstep 430 specifying, that the submitted code is valid, but the item is likely to be counterfeit. - The discovery of cloned codes can be refined by making use of other information, for example the origin of the query, which can be determined if the query originated from a phone, or the elapsed time between queries.
- Here, ‘cloning’ means multiple copying of a valid production code, for example for tagging counterfeited articles. If the code has been found valid (step 440), the checking centre retrieves the significance of the code and transmits it to the user, preferably in natural language, for example: “your code corresponds to a pack of brand XYZ, intended market of retail Switzerland”, or another appropriate formulation.
- The information returned by the checking centre may allow the tracking of the production information for each item, for example information about the production unit, the production line, the date and time of production. Such information can be returned in encoded form, or in natural language.
- Optionally the checking centre can formulate the significance of the codes into several languages, and choose the most appropriate language for the reply, according to the origin or language of the query. In a preferred embodiment, the public interface to the checking centre includes a SMS (Short Message Service) or USSD (Unstructured Supplementary Services Data)
portal 60 of a public radio communication network, for example a telephone network supporting text or numeric messages like GSM, TDMA, CDMA, PDC, or UMTS standard networks, through which theusers 80 can send queries to thechecking centre 30 in form of text messages, or SMS, from theirown cell phone 82, and receive the reply from the checking centre in the same way or by another channel, for example by a voice call. In this way theuser 80 can verify anitem 43 directly at the point ofsale 77. - The communication may alternatively or additionally be over the
internet 32 by a web server at thechecking centre 30, by an email server or a WAP (Wireless Application Protocol) server. - Alternatively or additionally, the communication may be to a telephone voice server, able to interpret voice commands or DTMF (Dual-Tone Multi-Frequency) signals generated by a telephone keyboard.
- Embodiments of the present invention allow a generic unidentified user to authenticate a manufactured item over a public network, such as the
internet 32, a telephone network or a mobile telephone network. The user need not identify himself, nor has he to have access to any secret code or sensitive information. However, each item can be identified in a cryptographically safe way. - In a preferred embodiment, a
privileged user 70, for example an employee of the manufacturer, may have a preferred access to thechecking centre 30 and retrieve additional privileged information, unavailable to generic users, for example production volume information, or statistical information on the access to the checking centre. In this case, a privileged user may query information on a particular SUPI without marking it as cloned for successive queries fromordinary customers 80. - The privileged user may communicate with the checking
centre 30 by a public network, or anintranet connection 33. - In a further embodiment the checking centre may provide, to generic or privileged users, additional information to which it has access, which are not contained in the UPI code, for example expiry date, warranty information, address of local support, or previous trade steps, importation routes and so forth.
- Additionally the checking centre may gather and store information on production volumes, for example the number of items produced in each production batch by each production line, as well as statistical production data per brand and per intended market. Such production volume information may be used for production management, or for official purpose, and may be available to selected users.
- Identification steps may be provided to identifying known privileged users, for example by passwords, cookies, voice or biometric data, or by any suitable identification means. The checker may include, or have access to, a user rights database for storing the profiles of various users, and determining to which information each user has access.
- It will be appreciated that embodiments of the present invention do not require a permanent connection between the manufacturing lines and the checking centre, nor that all the SUPIs be individually stored in a database. In fact, no identification code is stored. The digital signature ensures that each item can be verified with a minimal transfer of confidential data, providing a high level of reliability and safety. Moreover production volume can be exactly accounted for. As no identification code is stored at the checking centre, the database required by the checking centre is relatively small compared to that which would be needed if the codes were stored.
- In some situations, particularly if the manufactured goods are subject to special tax regulations, official government bodies may submit requests to the checking centre to obtain the appropriate production data, for example production volumes. In such cases, the checking
centre 30 may be maintained by a trusted third party independent from the producer of the manufactureditems 43. The embodiments described may be used to replace the system of fiscal stickers that is used in many countries to collect taxes, for example on tobacco products.
Claims (40)
1. A method of marking manufactured items, comprising:
providing a plurality of secret codes to a checking centre and to a production line for the manufactured items;
generating an ID code for each manufactured item;
digitally signing each ID code by means of a secret derived from the plurality of secret codes and known to the checking centre; and
marking each manufactured item with said signed ID code.
2. A method of claim 1 , comprising using a covert taggant or a laser device in the marking step.
3. A method according to claim 1 , wherein said plurality of secret codes are precalculated random codes.
4. A method according to claim 1 , providing the plurality of secret codes includes physical transfer of a non-volatile data support, on which the secret codes are recorded.
5. A method according to claim 1 , wherein said secret derived from said plurality of secret codes is derived at each of a plurality of production lines.
6. A method according to claim 1 , wherein part of said secret is transmitted by a code generator to the checking centre via a secure network connection.
7. A method according to claim 1 , wherein the plurality of secret codes is a collection of random codes, and comprising:
generating an index relating to the manufacture of one or more items;
transmitting the index to the checking centre;
deriving the secret by a code generator, from the collection of random codes and from the index; and
digitally signing each ID code for each manufactured item with a noise code derived by encrypting a copy of the ID code with the secret.
8. A method according to claim 7 , wherein the secret is further derived from the ID code.
9. A method according to claim 1 , comprising transmitting additional information concerning the manufactured items to the checking centre.
10. A method according to claim 1 , wherein said checking centre is managed by a trusted third party, independent from the manufacturer of the manufactured item.
11. A method according to claim 1 , wherein said marking is performed on packaging of said manufacturing article.
12. A method according to claim 1 , wherein the ID code comprises at least one of:
a production site identifier;
a production line identifier;
a code generator identifier;
a product identifier; and
time information.
13. A method according to claim 1 , comprising encrypting the ID code.
14. A method according to claim 1 , wherein said item is a cigarette pack or a cigarette carton.
15. A manufactured item marked by the method according to claim 1 .
16. A method of authenticating an item marked according to the method of claim 1 comprising:
transmitting the signed ID code to the checking centre; and
authenticating the signed ID code at the checking centre.
17. A method according to claim 1 , comprising:
marking on each manufactured item part of the information contained in the ID code for that item; and
verifying the consistency of information with processed information retransmitted by the checking centre.
18. A method according to claim 16 , comprising retransmitting additional information related to the transmitted ID code by the checking centre.
19. A method according to claim 16 , comprising detecting cloned 40 codes at the checking centre.
20. A checking centre for authenticating an item by the method of claim 16 .
21. A system for marking manufactured items comprising
a generator for generating collections of secret codes;
a production line for manufacturing the items to be marked, the production line comprising:
a code generator for generating an ID code for each manufactured item;
a digital signor, for signing the ID codes with a secret derived from the secret codes;
a data transmitter, for transmitting the secret to a checking centre; and
a marker for marking each manufactured item with the signed ID code.
22. A system according to claim 21 , wherein said marker comprises a printer or a laser device.
23. A system according to claim 21 , wherein the production line is arranged for the production of tobacco products.
24. A system according to claim 21 , wherein the generator comprises a data recorder, for recording the collection of secret codes on a non-volatile data support.
25. A system according to claim 21 , wherein the checking centre comprises an interface for accepting text or numeric queries from a network and for transmitting answers via the network.
26. A system according to claim 21 , wherein the generator for generating collections of secret codes is a salt generator.
27. A system according to claim 21 , wherein the production line comprises a sensor to detect the marked signed ID code.
28. A method of authenticating a manufactured item, comprising:
generating a code and signing said code with a digital signature within a code generator;
marking the item with the signed code;
transmitting the signed code to a checking centre over a public network for authentication;
authenticating the digital signature by the checking centre;
retrieving the significance of the code at the checking centre; and
transmitting the significance to a user over the public network.
29. A method according to claim 28 , wherein codes generated by the code generator are not stored.
30. A method according to claim 28 , wherein the code is signed with a secret shared by the code generator and the checking centre.
31. A method according to claim 30 , wherein the secret is extracted from a collection of secret codes shared by the code generator and the checking centre and is modified during operation of the code generator.
32. A method according to claim 30 , wherein said secret is different for each manufactured item.
33. A method of controlling the volume of manufactured items marked according to the method of claim 1 , comprising:
gathering manufacturing volume information at the checking centre; and
providing the manufacturing volume information to a user.
34. A method according to claim 33 , wherein the manufacturing volume information is obtained from ID codes transmitted to the checking centre.
35. A method of tracking an item marked according to the method of claim 1 comprising:
transmitting the signed ID code to the checking centre;
authenticating the signed ID code by the checking centre; and
retransmitting the tracking information related to the ID code to a user.
36. A method according to claim 34 , wherein the tracking information is obtained from the ID codes of manufactured items transmitted to the checking centre.
37. A method according to claim 32 , comprising identifying the user.
38. A method according to claim 33 , comprising a step of denying information to users not belonging to a predefined group of privileged users.
39. A method of authenticating manufactured items, comprising marking the items by:
providing a plurality of secret codes to a checking centre and to a production line for the manufactured items;
generating an ID code for each manufactured item;
digitally signing each ID code by means of a secret derived from the plurality of secret codes and known to the checking centre; and
marking each manufactured item with said signed ID code; and
authenticating a manufactured item on request by validating the secret at the checking centre.
40. A system for authenticating manufactured items, comprising:
a system for marking manufactured items comprising:
a generator for generating collections of secret codes;
a production line for manufacturing the items to be marked, the production line comprising:
a code generator for generating an ID code for each manufactured item;
a digital signor, for signing the ID codes with a secret derived from the secret codes;
a data transmitter, for transmitting the secret to a checking centre; and
a marker for marking each manufactured item with the signed ID code; the authentication system further comprising a checking centre for authenticating a manufactured item on request by validating the secret.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04104954A EP1645992A1 (en) | 2004-10-08 | 2004-10-08 | Methods and systems for marking, tracking and authentication of products |
EP04104954.5 | 2004-10-08 | ||
PCT/IB2005/003103 WO2006038114A1 (en) | 2004-10-08 | 2005-09-29 | Methods and systems for making, tracking and authentication of products |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2005/003103 A-371-Of-International WO2006038114A1 (en) | 2004-10-08 | 2005-09-29 | Methods and systems for making, tracking and authentication of products |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/839,166 Continuation US8671062B2 (en) | 2004-10-08 | 2010-07-19 | Methods and systems for making, tracking and authentication of products |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080046263A1 true US20080046263A1 (en) | 2008-02-21 |
Family
ID=34929681
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/664,841 Abandoned US20080046263A1 (en) | 2004-10-08 | 2005-09-29 | Methods and Systems for Making, Tracking and Authentication of Products |
US12/839,166 Active 2026-11-23 US8671062B2 (en) | 2004-10-08 | 2010-07-19 | Methods and systems for making, tracking and authentication of products |
US14/144,829 Active 2028-07-26 US11080719B2 (en) | 2004-10-08 | 2013-12-31 | Methods and systems for making, tracking and authentication of products |
US15/606,343 Active 2028-03-25 US11379854B2 (en) | 2004-10-08 | 2017-05-26 | Methods and systems for making, tracking and authentication of products |
US17/839,993 Pending US20220309517A1 (en) | 2004-10-08 | 2022-06-14 | Methods and systems for making, tracking and authentication of products |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/839,166 Active 2026-11-23 US8671062B2 (en) | 2004-10-08 | 2010-07-19 | Methods and systems for making, tracking and authentication of products |
US14/144,829 Active 2028-07-26 US11080719B2 (en) | 2004-10-08 | 2013-12-31 | Methods and systems for making, tracking and authentication of products |
US15/606,343 Active 2028-03-25 US11379854B2 (en) | 2004-10-08 | 2017-05-26 | Methods and systems for making, tracking and authentication of products |
US17/839,993 Pending US20220309517A1 (en) | 2004-10-08 | 2022-06-14 | Methods and systems for making, tracking and authentication of products |
Country Status (32)
Country | Link |
---|---|
US (5) | US20080046263A1 (en) |
EP (2) | EP1645992A1 (en) |
JP (1) | JP5546728B2 (en) |
KR (1) | KR101127327B1 (en) |
CN (1) | CN101036152B (en) |
AR (1) | AR050035A1 (en) |
AT (1) | ATE430342T1 (en) |
AU (1) | AU2005290920B2 (en) |
BR (1) | BRPI0516532B1 (en) |
CA (1) | CA2581358C (en) |
CR (1) | CR9101A (en) |
CY (1) | CY1109805T1 (en) |
DE (1) | DE602005014202D1 (en) |
DK (1) | DK1719070T3 (en) |
EA (1) | EA011327B1 (en) |
EG (1) | EG24713A (en) |
ES (1) | ES2326090T3 (en) |
HK (1) | HK1096179A1 (en) |
HR (1) | HRP20090409T1 (en) |
IL (1) | IL181786A (en) |
MA (1) | MA28938B1 (en) |
MX (1) | MX2007004024A (en) |
NZ (1) | NZ553844A (en) |
PL (1) | PL1719070T3 (en) |
PT (1) | PT1719070E (en) |
RS (1) | RS50850B (en) |
SI (1) | SI1719070T1 (en) |
TN (1) | TNSN07128A1 (en) |
UA (1) | UA91031C2 (en) |
UY (1) | UY29156A1 (en) |
WO (1) | WO2006038114A1 (en) |
ZA (1) | ZA200702120B (en) |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060180661A1 (en) * | 2005-02-03 | 2006-08-17 | Elliott Grant | Method and system for deterring product counterfeiting, diversion and piracy |
US20070175974A1 (en) * | 2006-02-02 | 2007-08-02 | Matthew Self | System and method of code generation and authentication |
US20080062803A1 (en) * | 2006-09-08 | 2008-03-13 | Daniele Fronte | System and method for encrypting data |
US20090065579A1 (en) * | 2007-09-07 | 2009-03-12 | Elliott Grant | Attributing Harvest Information with Unique Identifiers |
US20090230190A1 (en) * | 2008-03-17 | 2009-09-17 | Philip Morris Usa Inc. | Method and apparatus for identifying, authenticating, tracking and tracing manufactured items |
US20090249081A1 (en) * | 2008-03-31 | 2009-10-01 | Kabushiki Kaisha Toshiba-1 Shibaura 1-Chomominatoku | Storage device encryption and method |
US20090265560A1 (en) * | 2008-03-20 | 2009-10-22 | Semiconductor Energy Laboratory Co., Ltd. | Numbering Method, Numbering Device, and Laser Direct Drawing Apparatus |
US20100017330A1 (en) * | 2007-05-29 | 2010-01-21 | Moxie Proxy | Protecting a manufactured item from counterfeiting |
US7766240B1 (en) | 2008-07-19 | 2010-08-03 | Yottamark, Inc. | Case-Level Traceability without the need for inline printing |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US20110084127A1 (en) * | 2009-10-08 | 2011-04-14 | Elliott Grant | Voice Code for Distribution Centers |
US20110154046A1 (en) * | 2009-12-22 | 2011-06-23 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US20110208634A1 (en) * | 2010-02-23 | 2011-08-25 | Jpmorgan Chase Bank, N.A. | System and method for optimizing order execution |
US20110208670A1 (en) * | 2010-02-19 | 2011-08-25 | Jpmorgan Chase Bank, N.A. | Execution Optimizer |
WO2011134891A1 (en) | 2010-04-26 | 2011-11-03 | International Business Machines Corporation | Generating unique identifiers |
US8155313B2 (en) | 2005-02-03 | 2012-04-10 | Yottamark, Inc. | Systems and methods for employing duo codes for product authentication |
US8152063B1 (en) | 2009-05-22 | 2012-04-10 | Yottamark, Inc. | Case labeling for field-packed produce |
US8196827B1 (en) | 2009-05-22 | 2012-06-12 | Yottamark, Inc. | Case labeling for field-packed produce |
US8210430B1 (en) | 2011-02-24 | 2012-07-03 | Yottamark, Inc. | Methods for assigning traceability information to and retrieving traceability information from a store shelf |
US8240564B2 (en) | 2008-07-11 | 2012-08-14 | Yottamark, Inc. | Mobile table for implementing clamshell-to-case association |
US8300806B2 (en) | 2005-02-03 | 2012-10-30 | Yottamark, Inc. | Duo codes for product authentication |
EA017178B1 (en) * | 2010-06-08 | 2012-10-30 | Олег Михайлович ЛИ | Uniform system of identification of articles, production or services "original" and method for identification thereof |
US8342393B2 (en) | 2007-09-07 | 2013-01-01 | Yottamark, Inc. | Attributing harvest information with unique identifiers |
US8428773B1 (en) | 2008-02-12 | 2013-04-23 | Yottamark, Inc. | Systems and methods of associating individual packages with harvest crates |
US8447987B1 (en) | 2008-11-20 | 2013-05-21 | Katerina Polonsky | Authentication of brand name product ownership using public key cryptography |
US8538844B1 (en) | 1998-12-23 | 2013-09-17 | Jpmorgan Chase Bank, N.A. | System and method for integrating trading operations including the generation, processing and tracking of and trade documents |
US8560698B2 (en) | 2010-06-27 | 2013-10-15 | International Business Machines Corporation | Allocating unique identifiers using metadata |
US20130320079A1 (en) * | 2012-06-01 | 2013-12-05 | Panduit Corp. | Anti-Counterfeiting Methods |
US8649512B2 (en) | 2005-02-03 | 2014-02-11 | Yottamark, Inc. | Duo codes for product authentication |
JP2014504110A (en) * | 2010-12-30 | 2014-02-13 | デジタル・コーディング・アンド・トラッキング・アソシエイション | Method and apparatus for marking manufactured articles |
WO2014062914A1 (en) * | 2012-10-18 | 2014-04-24 | Nutec Systems, Inc. | Method and system for verifying a product packaging label |
US8887990B2 (en) | 2007-09-07 | 2014-11-18 | Yottamark, Inc. | Attributing harvest information with unique identifiers |
US20160092812A1 (en) * | 2014-09-30 | 2016-03-31 | International Business Machines Corporation | End-to-End Commodity and Commodity Marking Tracking |
WO2016179220A1 (en) | 2015-05-05 | 2016-11-10 | Celanese International Corporation | Marking methods for combatting illicit trade |
US10068111B2 (en) | 2014-06-23 | 2018-09-04 | Inexto Sa | Method and system for marking manufactured items to detect unauthorized refilling |
US10121151B2 (en) | 2012-12-17 | 2018-11-06 | Inexto S.A. | Method and apparatus for marking manufactured items using physical characteristic |
US20190213604A1 (en) * | 2014-02-13 | 2019-07-11 | The Procter & Gamble Company | Validated Article of Commerce |
EP3540664A1 (en) * | 2018-03-14 | 2019-09-18 | Tetra Laval Holdings & Finance S.A. | Providing unique codes on packages for liquid food |
US10579889B2 (en) | 2015-08-25 | 2020-03-03 | Inexto Sa | Verification with error tolerance for secure product identifiers |
US10587403B2 (en) | 2015-08-13 | 2020-03-10 | Inexto Sa | Enhanced obfuscation or randomization for secure product identification and verification |
US10594494B2 (en) | 2015-08-25 | 2020-03-17 | Inexto Sa | Multiple authorization modules for secure production and verification |
US10607181B2 (en) | 2012-12-17 | 2020-03-31 | Inexto Sa | Method and apparatus for storage of data for tracking manufactured items |
US10680826B2 (en) | 2015-01-31 | 2020-06-09 | Inexto Sa | Secure product identification and verification |
CN112106324A (en) * | 2018-06-25 | 2020-12-18 | Auth9股份有限公司 | Methods, computer program products and devices for creating, registering and verifying digitally stamped assets |
US10984370B2 (en) | 2015-01-28 | 2021-04-20 | Inexto Sa | Method and apparatus for unit and container identification and tracking |
US11176561B2 (en) | 2017-05-12 | 2021-11-16 | Artashes Valeryevich Ikonomov | Method for checking the authenticity of goods or services |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11288683B2 (en) | 2014-11-06 | 2022-03-29 | Altria Client Services Llc | Methods and products for product tracing and authentication using conductive inks |
US11777744B2 (en) | 2018-06-25 | 2023-10-03 | Auth9, Inc. | Method, computer program product and apparatus for creating, registering, and verifying digitally sealed assets |
Families Citing this family (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7752137B2 (en) * | 2003-11-03 | 2010-07-06 | Meyers Printing Company | Authentication and tracking system |
EP1645992A1 (en) | 2004-10-08 | 2006-04-12 | Philip Morris Products S.A. | Methods and systems for marking, tracking and authentication of products |
CN101375284B (en) | 2004-10-25 | 2012-02-22 | 安全第一公司 | Secure data parser method and system |
FR2900486A1 (en) * | 2006-04-28 | 2007-11-02 | Hafshejani Abdollah Sadeghi | Original product or detached part individualizing method for Internet, involves associating confidential code and identifying codes in database on server connected to Internet, and verifying authenticity of product via connection to server |
DE102006060065A1 (en) * | 2006-12-19 | 2008-06-26 | Giesecke & Devrient Gmbh | Method for authenticating product by verification of product code, fixed at product and generated with cryptographic code, involves storing multiple codes for generating or for verifying different product code by central office |
EP2172882A1 (en) | 2008-10-06 | 2010-04-07 | JT International S.A. | Method of cigarette packaging and cigarette packaging system |
SE0802123A2 (en) | 2008-10-09 | 2010-07-20 | Tetra Laval Holdings & Finance | Method, device and system for information registration and information conversion |
GB2470900B (en) | 2009-06-08 | 2017-06-14 | Kezzler As | Method and system for storage and retrieval of track and trace information |
ES2620962T3 (en) | 2009-11-25 | 2017-06-30 | Security First Corporation | Systems and procedures to ensure moving data |
WO2011112702A2 (en) * | 2010-03-09 | 2011-09-15 | Cummins Filtration Ip, Inc. | Apparatus, system and method for detecting the presence of genuine serviceable product components |
TWI490146B (en) * | 2010-03-26 | 2015-07-01 | Jt Int Sa | Method of cigarette packaging and cigarette packaging system |
CN103038750A (en) | 2010-03-31 | 2013-04-10 | 安全第一公司 | Systems and methods for securing data in motion |
EP2577936A2 (en) | 2010-05-28 | 2013-04-10 | Lawrence A. Laurich | Accelerator system for use with secure data storage |
EP2428925A1 (en) * | 2010-08-27 | 2012-03-14 | JT International | Product authentication method |
DE102010045571A1 (en) * | 2010-09-16 | 2012-03-22 | Giesecke & Devrient Gmbh | Traceable marking of a security feature |
CN103609059B (en) | 2010-09-20 | 2016-08-17 | 安全第一公司 | The system and method shared for secure data |
US8526743B1 (en) | 2010-11-01 | 2013-09-03 | Raf Technology, Inc. | Defined data patterns for object handling |
US9152862B2 (en) | 2011-09-15 | 2015-10-06 | Raf Technology, Inc. | Object identification and inventory management |
US9443298B2 (en) | 2012-03-02 | 2016-09-13 | Authentect, Inc. | Digital fingerprinting object authentication and anti-counterfeiting system |
US8774455B2 (en) | 2011-03-02 | 2014-07-08 | Raf Technology, Inc. | Document fingerprinting |
RU2467392C1 (en) * | 2011-06-24 | 2012-11-20 | Федеральное государственное унитарное предприятие "Государственный научно-исследовательский институт авиационных систем" | Method of providing information support on state of objects |
EP2850557A4 (en) * | 2012-05-18 | 2016-01-06 | Sri Internat Inc | System and method for authenticating a manufactured product with a mobile device |
US9721259B2 (en) * | 2012-10-08 | 2017-08-01 | Accenture Global Services Limited | Rules-based selection of counterfeit detection techniques |
WO2014060797A1 (en) * | 2012-10-18 | 2014-04-24 | Cook Innovation Solutions Ltd. | Method and system for verifying the correspondence of a declaration and/or the authenticity of a good put on the market |
WO2014078400A1 (en) | 2012-11-13 | 2014-05-22 | Tracelink, Inc. | Digitally secured electronic titles for products in supply chains |
TW201443802A (en) | 2012-12-21 | 2014-11-16 | Sicpa Holding Sa | Method and system for marking an item, an item so marked and a method and system for authenticating a marked item |
US10482471B2 (en) | 2013-01-16 | 2019-11-19 | Amazon Technologies, Inc. | Unauthorized product detection techniques |
US9473303B2 (en) * | 2013-05-23 | 2016-10-18 | Rosemount Inc. | Method and system for product authentication |
JP2015022314A (en) * | 2013-07-16 | 2015-02-02 | 大日本印刷株式会社 | Authenticity determination system, authenticity determination method, log management server, and program |
EP2854332A1 (en) * | 2013-09-27 | 2015-04-01 | Gemalto SA | Method for securing over-the-air communication between a mobile application and a gateway |
ES2686292T3 (en) * | 2014-05-20 | 2018-10-17 | I.Car S.R.L. | Improved system to identify a vehicle |
WO2016018244A1 (en) | 2014-07-29 | 2016-02-04 | Hewlett-Packard Development Company, L.P. | Transmit an authentication mark |
US9741012B2 (en) * | 2014-11-05 | 2017-08-22 | HURU Systems Ltd. | Systems for secure tracking code generation, application, and verification |
US10102532B2 (en) * | 2014-11-17 | 2018-10-16 | Amazon Technologies, Inc. | Tracking and verifying authenticity of items |
US10318962B2 (en) | 2014-11-17 | 2019-06-11 | Amazon Technologies, Inc. | Authenticity label for items |
MDS20170076U2 (en) * | 2014-12-01 | 2017-11-30 | Ирина МИРОЧНИК | Method for authentication of consumer goods |
WO2016202827A1 (en) | 2015-06-18 | 2016-12-22 | Hicof Inc. | Authentication feature in a barcode |
FR3039911B1 (en) * | 2015-08-07 | 2017-08-04 | Arjowiggins Solutions | METHOD FOR GENERATING AN IDENTIFICATION CODE OF AN OBJECT, AND SECURITY EQUIPMENT MODULE |
US10061980B2 (en) | 2015-08-20 | 2018-08-28 | Accenture Global Services Limited | Digital verification of modified documents |
US20180374102A1 (en) * | 2015-09-23 | 2018-12-27 | Inexto Sa | Container and content serialization for secure product identifiers |
US10037537B2 (en) | 2016-02-19 | 2018-07-31 | Alitheon, Inc. | Personal history in track and trace system |
EP3236401A1 (en) | 2016-04-18 | 2017-10-25 | Alitheon, Inc. | Authentication-triggered processes |
US10614302B2 (en) | 2016-05-26 | 2020-04-07 | Alitheon, Inc. | Controlled authentication of physical objects |
US10740767B2 (en) | 2016-06-28 | 2020-08-11 | Alitheon, Inc. | Centralized databases storing digital fingerprints of objects for collaborative authentication |
US10915612B2 (en) | 2016-07-05 | 2021-02-09 | Alitheon, Inc. | Authenticated production |
EP4131039B1 (en) | 2016-08-03 | 2024-03-20 | Hewlett-Packard Development Company, L.P. | Digitally signed data |
US10902540B2 (en) | 2016-08-12 | 2021-01-26 | Alitheon, Inc. | Event-driven authentication of physical objects |
US10839528B2 (en) | 2016-08-19 | 2020-11-17 | Alitheon, Inc. | Authentication-based tracking |
US10116830B2 (en) | 2016-09-15 | 2018-10-30 | Accenture Global Solutions Limited | Document data processing including image-based tokenization |
BR112017001012A2 (en) * | 2016-12-12 | 2020-10-27 | Sicpa Holding Sa | system and method for tracking a product item on a production line |
US11062118B2 (en) | 2017-07-25 | 2021-07-13 | Alitheon, Inc. | Model-based digital fingerprinting |
WO2019118654A1 (en) * | 2017-12-13 | 2019-06-20 | Siemens Aktiengesellschaft | Integrated automatic production planning and procurement |
EP3514715A1 (en) | 2018-01-22 | 2019-07-24 | Alitheon, Inc. | Secure digital fingerprint key object database |
US10664811B2 (en) | 2018-03-22 | 2020-05-26 | Bank Of America Corporation | Automated check encoding error resolution |
US20190378144A1 (en) * | 2018-06-09 | 2019-12-12 | Sneaker Con Digital Inc. | Systems, devices and methods for providing a digital experience |
CN109102049B (en) * | 2018-08-17 | 2021-08-27 | 田亚龙 | Product information tracing method |
JP6741802B2 (en) * | 2019-01-25 | 2020-08-19 | Dmg森精機株式会社 | Pallet transfer system, pallet transfer method, and pallet transfer program |
US10963670B2 (en) | 2019-02-06 | 2021-03-30 | Alitheon, Inc. | Object change detection and measurement using digital fingerprints |
EP3734506A1 (en) | 2019-05-02 | 2020-11-04 | Alitheon, Inc. | Automated authentication region localization and capture |
EP3736717A1 (en) | 2019-05-10 | 2020-11-11 | Alitheon, Inc. | Loop chain digital fingerprint method and system |
US11238146B2 (en) | 2019-10-17 | 2022-02-01 | Alitheon, Inc. | Securing composite objects using digital fingerprints |
DE102019134196A1 (en) * | 2019-12-12 | 2021-06-17 | Mayr-Melnhof Karton Ag | Filter unit for a smokable tobacco product and disposal of a used filter unit |
EP3859603A1 (en) | 2020-01-28 | 2021-08-04 | Alitheon, Inc. | Depth-based digital fingerprinting |
EP3885982A3 (en) | 2020-03-23 | 2021-12-22 | Alitheon, Inc. | Hand biometrics system and method using digital fingerprints |
EP3885984A1 (en) | 2020-03-23 | 2021-09-29 | Alitheon, Inc. | Facial biometrics system and method of using digital fingerprints |
US11948377B2 (en) | 2020-04-06 | 2024-04-02 | Alitheon, Inc. | Local encoding of intrinsic authentication data |
US11663849B1 (en) | 2020-04-23 | 2023-05-30 | Alitheon, Inc. | Transform pyramiding for fingerprint matching system and method |
US11700123B2 (en) | 2020-06-17 | 2023-07-11 | Alitheon, Inc. | Asset-backed digital security tokens |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4463250A (en) * | 1981-07-11 | 1984-07-31 | Mcneight David L | Method and apparatus for use against counterfeiting |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5930215A (en) * | 1993-10-06 | 1999-07-27 | Sony Corporation | CD-Rom with machine-readable I.D. code |
US6069955A (en) * | 1998-04-14 | 2000-05-30 | International Business Machines Corporation | System for protection of goods against counterfeiting |
US6122403A (en) * | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US6212638B1 (en) * | 1997-12-02 | 2001-04-03 | George C. Lee | Method for generating unpredictable authentication identification symbols |
US6226619B1 (en) * | 1998-10-29 | 2001-05-01 | International Business Machines Corporation | Method and system for preventing counterfeiting of high price wholesale and retail items |
US6260029B1 (en) * | 1999-08-11 | 2001-07-10 | Pitney Bowes Inc. | Postage meter that provides on a mailpiece evidence of postage paid together with cryptographically secured, third party certified, non-shipping information about the sender of the mailpiece |
US6442276B1 (en) * | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
US20030074223A1 (en) * | 2001-09-24 | 2003-04-17 | Scott Laboratories, Inc. | Methods and apparatuses for assuring quality and safety of drug administration and medical products and kits |
US20050234823A1 (en) * | 2004-04-20 | 2005-10-20 | Rainer Schimpf | Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution. |
US7188258B1 (en) * | 1999-09-17 | 2007-03-06 | International Business Machines Corporation | Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects |
US7497379B2 (en) * | 2004-02-27 | 2009-03-03 | Microsoft Corporation | Counterfeit and tamper resistant labels with randomly occurring features |
Family Cites Families (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4035615A (en) * | 1976-05-20 | 1977-07-12 | Sperry Rand Corporation | System for accepting wide ranges of universal product code system |
US4094244A (en) * | 1976-12-22 | 1978-06-13 | Dymo Industries, Inc. | Hand-held bar code label marking device |
US4354101A (en) * | 1977-04-15 | 1982-10-12 | Msi Data Corporation | Method and apparatus for reading and decoding a high density linear bar code |
US4529871A (en) * | 1982-09-29 | 1985-07-16 | Loblaw Companies Limited | Price marking system |
US4860226A (en) * | 1986-09-09 | 1989-08-22 | Martin Edward L | Method and apparatus for bar code graphics quality control |
US4963719A (en) * | 1989-11-01 | 1990-10-16 | Spectra-Physics | Bar code scanner and method of scanning |
JPH07501757A (en) * | 1991-11-22 | 1995-02-23 | エンジニアード データ プロダクツ,インコーポレイティド | label generator |
US5483624A (en) * | 1992-03-27 | 1996-01-09 | Monarch Marking Systems, Inc. | Programmable hand held labeler |
US5467433A (en) * | 1992-04-15 | 1995-11-14 | Monarch Marking Systems, Inc. | Label printing and data collection program generator |
US5382779A (en) * | 1993-05-07 | 1995-01-17 | Digicomp Research Corporation | Shelf price label verification apparatus and method |
BG61241B1 (en) | 1995-02-16 | 1997-03-31 | Живко ЖЕЛЕВ | Method and device for recording and reading of multistage multi-media protection |
US5978773A (en) * | 1995-06-20 | 1999-11-02 | Neomedia Technologies, Inc. | System and method for using an ordinary article of commerce to access a remote computer |
US5850080A (en) * | 1995-08-03 | 1998-12-15 | Barcode Graphics Inc. | Verification of barcodes |
US6886748B1 (en) * | 1996-01-02 | 2005-05-03 | Steven Jerome Moore | Apparatus and method for purchased product security |
US5837983A (en) * | 1996-06-10 | 1998-11-17 | Psc, Inc. | Readability monitoring system for optical codes |
US6272634B1 (en) * | 1996-08-30 | 2001-08-07 | Regents Of The University Of Minnesota | Digital watermarking to resolve multiple claims of ownership |
US5767498A (en) * | 1996-09-17 | 1998-06-16 | Ncr Corporation | Bar code error scanner |
US7797164B2 (en) * | 1996-10-02 | 2010-09-14 | Nintendo Of America, Inc. | Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection |
US7904333B1 (en) * | 1996-10-25 | 2011-03-08 | Ipf, Inc. | Web-based electronic commerce (EC) enabled shopping network configured to allow members of a consumer product management team and authorized parties to communicate directly with consumers shopping at EC-enabled websites along the world wide web (WWW), using multi-mode virtual kiosks (MMVKS) driven by server-side components and managed by product team members |
US7516094B2 (en) * | 1996-10-25 | 2009-04-07 | Ipf, Inc. | Internet-based system for managing and delivering consumer product information to consumers at web-based retailer store sites on the world wide web (WWW), using consumer product information (CPI) requesting and graphical user interface (GUI) display subsystems, driven by server-side components embodying universal product numbers (UPNs) and driven by UPN/URL links managed by product manufacturer team members and/or their agents |
US20010011276A1 (en) * | 1997-05-07 | 2001-08-02 | Robert T. Durst Jr. | Scanner enhanced remote control unit and system for automatically linking to on-line resources |
US6134561A (en) * | 1997-12-29 | 2000-10-17 | Pitney Bowes Inc. | System for tracking the receipt and internal delivery of items such as packages |
BG63519B1 (en) | 1998-10-21 | 2002-03-29 | ЖЕЛЕВ Живко | Device for telecommunication testing of one- and multi-stage multi-medfia encoded wrapper marking on products |
US6963846B1 (en) * | 2000-07-17 | 2005-11-08 | Kelly Registration Systems, Inc. | System and method of managing registration, sale, distribution and use of regulated agricultural products and the licensing/certification of dealers and applicators of agricultural products |
US6217966B1 (en) * | 1999-02-26 | 2001-04-17 | Ncr Corporation | Desensitized price label |
BG63518B1 (en) | 1999-06-28 | 2002-03-29 | Живко ЖЕЛЕВ | Device for recording one and several one- and multi-stage, two- and three-dimensional multimedia encoded markings on documents, securities and other similar |
US7113922B2 (en) * | 2000-11-02 | 2006-09-26 | Living Naturally, Llc | Electronic inventory movement and control device |
US20020053796A1 (en) * | 2000-11-07 | 2002-05-09 | Mccann Mark | Graphical label and method of manufacturing |
DE10100248A1 (en) * | 2001-01-05 | 2002-07-11 | Focke & Co | Process and device for identifying cigarette packets stamps the packet with centrally controlled numerical code |
US6497367B2 (en) * | 2001-04-26 | 2002-12-24 | International Business Machines Corporation | Providing a location and item identification data to visually impaired shoppers in a site having barcode labels |
US20020158137A1 (en) * | 2001-04-30 | 2002-10-31 | William Grey | Systems and methods wherein a machine-readable item code is substantially invisible to a human |
US6729603B1 (en) * | 2001-06-08 | 2004-05-04 | Psc Scanning, Inc. | Add-on capture rate in a barcode scanning system |
JP4181812B2 (en) | 2001-07-25 | 2008-11-19 | 松下電器産業株式会社 | A method for manufacturing a decryption device having an element for encryption processing and information used for the encryption processing, a supply system for supplying information and elements included in the decryption device, and a decryption device manufactured by the manufacturing method. |
US6616056B2 (en) * | 2001-08-31 | 2003-09-09 | International Business Machines Corporation | Method and system of capturing and reading consumer-oriented responses through consumer-appended bar codes |
US20030051767A1 (en) * | 2001-09-19 | 2003-03-20 | Unilever Home And Personal Care Usa | Package and system |
US8209226B2 (en) * | 2001-11-15 | 2012-06-26 | Nintendo Of America Inc. | Non-serialized electronic product registration system and method of operating same |
US20030179902A1 (en) | 2002-01-04 | 2003-09-25 | Ambrogio F Carl | Authentication and anti-counterfeit tracking system |
WO2003093961A2 (en) * | 2002-05-02 | 2003-11-13 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
EP1525541A2 (en) * | 2002-07-26 | 2005-04-27 | Ron Everett | Data management architecture associating generic data items using references |
JP2004094510A (en) | 2002-08-30 | 2004-03-25 | Inst Of Physical & Chemical Res | False display preventing method in merchandise circulation and alternation preventing function added label writing device used for the same |
US20040117265A1 (en) * | 2002-12-12 | 2004-06-17 | Paul Hoffman | Method and system for labeling and managing the sale of manufactured concrete blocks |
US6712275B1 (en) * | 2003-02-10 | 2004-03-30 | Targus Fly And Feather, Llc | UPC identification device |
US7028901B2 (en) * | 2003-07-17 | 2006-04-18 | Symbol Technologies, Inc. | System and method for reading and decoding optical codes using multiple color illumination |
US6892947B1 (en) * | 2003-07-30 | 2005-05-17 | Hewlett-Packard Development Company, L.P. | Barcode embedding methods, barcode communication methods, and barcode systems |
US20050075900A1 (en) * | 2003-10-02 | 2005-04-07 | Arguimbau Vincent C. | Method and apparatus for bulk food marking and tracking with supplier rating system |
US8543411B2 (en) * | 2003-11-05 | 2013-09-24 | United Parcel Service Of America, Inc. | Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale |
US7246748B1 (en) * | 2004-06-30 | 2007-07-24 | Adobe Systems Incorporated | Enabling the use of machine-readable codes |
US20060011726A1 (en) * | 2004-07-14 | 2006-01-19 | Culture.Com Technology (Macau) Ltd. | Micro bar code and recognition system and method thereof |
EP1645992A1 (en) | 2004-10-08 | 2006-04-12 | Philip Morris Products S.A. | Methods and systems for marking, tracking and authentication of products |
JP2005216316A (en) * | 2005-02-02 | 2005-08-11 | Hitachi Ltd | Reader and discrimination method |
JP2006229881A (en) | 2005-02-21 | 2006-08-31 | Toshiba Corp | Key management system and key management method |
FR2900486A1 (en) | 2006-04-28 | 2007-11-02 | Hafshejani Abdollah Sadeghi | Original product or detached part individualizing method for Internet, involves associating confidential code and identifying codes in database on server connected to Internet, and verifying authenticity of product via connection to server |
-
2004
- 2004-10-08 EP EP04104954A patent/EP1645992A1/en not_active Withdrawn
-
2005
- 2005-07-29 AR ARP050103178A patent/AR050035A1/en active IP Right Grant
- 2005-09-29 US US11/664,841 patent/US20080046263A1/en not_active Abandoned
- 2005-09-29 MX MX2007004024A patent/MX2007004024A/en active IP Right Grant
- 2005-09-29 WO PCT/IB2005/003103 patent/WO2006038114A1/en active Application Filing
- 2005-09-29 AT AT05792643T patent/ATE430342T1/en active
- 2005-09-29 CN CN2005800343087A patent/CN101036152B/en active Active
- 2005-09-29 DE DE602005014202T patent/DE602005014202D1/en active Active
- 2005-09-29 EA EA200700814A patent/EA011327B1/en not_active IP Right Cessation
- 2005-09-29 SI SI200530680T patent/SI1719070T1/en unknown
- 2005-09-29 NZ NZ553844A patent/NZ553844A/en unknown
- 2005-09-29 DK DK05792643T patent/DK1719070T3/en active
- 2005-09-29 AU AU2005290920A patent/AU2005290920B2/en active Active
- 2005-09-29 BR BRPI0516532-6A patent/BRPI0516532B1/en active IP Right Grant
- 2005-09-29 KR KR1020077009864A patent/KR101127327B1/en active IP Right Grant
- 2005-09-29 EP EP05792643A patent/EP1719070B1/en not_active Revoked
- 2005-09-29 JP JP2007535270A patent/JP5546728B2/en active Active
- 2005-09-29 PL PL05792643T patent/PL1719070T3/en unknown
- 2005-09-29 ES ES05792643T patent/ES2326090T3/en active Active
- 2005-09-29 RS RSP-2009/0260A patent/RS50850B/en unknown
- 2005-09-29 PT PT05792643T patent/PT1719070E/en unknown
- 2005-09-29 UA UAA200704331A patent/UA91031C2/en unknown
- 2005-09-29 CA CA2581358A patent/CA2581358C/en active Active
- 2005-10-06 UY UY29156A patent/UY29156A1/en not_active Application Discontinuation
-
2007
- 2007-03-07 IL IL181786A patent/IL181786A/en active IP Right Grant
- 2007-03-13 ZA ZA200702120A patent/ZA200702120B/en unknown
- 2007-03-14 HK HK07102764.3A patent/HK1096179A1/en unknown
- 2007-04-04 EG EGNA2007000338 patent/EG24713A/en active
- 2007-04-06 TN TNP2007000128A patent/TNSN07128A1/en unknown
- 2007-04-18 MA MA29835A patent/MA28938B1/en unknown
- 2007-05-04 CR CR9101A patent/CR9101A/en unknown
-
2009
- 2009-05-15 CY CY20091100519T patent/CY1109805T1/en unknown
- 2009-07-20 HR HR20090409T patent/HRP20090409T1/en unknown
-
2010
- 2010-07-19 US US12/839,166 patent/US8671062B2/en active Active
-
2013
- 2013-12-31 US US14/144,829 patent/US11080719B2/en active Active
-
2017
- 2017-05-26 US US15/606,343 patent/US11379854B2/en active Active
-
2022
- 2022-06-14 US US17/839,993 patent/US20220309517A1/en active Pending
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4463250A (en) * | 1981-07-11 | 1984-07-31 | Mcneight David L | Method and apparatus for use against counterfeiting |
US5930215A (en) * | 1993-10-06 | 1999-07-27 | Sony Corporation | CD-Rom with machine-readable I.D. code |
US6122403A (en) * | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7283630B1 (en) * | 1997-07-21 | 2007-10-16 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
US6442276B1 (en) * | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
US6212638B1 (en) * | 1997-12-02 | 2001-04-03 | George C. Lee | Method for generating unpredictable authentication identification symbols |
US6996543B1 (en) * | 1998-04-14 | 2006-02-07 | International Business Machines Corporation | System for protection of goods against counterfeiting |
US6069955A (en) * | 1998-04-14 | 2000-05-30 | International Business Machines Corporation | System for protection of goods against counterfeiting |
US6226619B1 (en) * | 1998-10-29 | 2001-05-01 | International Business Machines Corporation | Method and system for preventing counterfeiting of high price wholesale and retail items |
US6260029B1 (en) * | 1999-08-11 | 2001-07-10 | Pitney Bowes Inc. | Postage meter that provides on a mailpiece evidence of postage paid together with cryptographically secured, third party certified, non-shipping information about the sender of the mailpiece |
US7188258B1 (en) * | 1999-09-17 | 2007-03-06 | International Business Machines Corporation | Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects |
US20030074223A1 (en) * | 2001-09-24 | 2003-04-17 | Scott Laboratories, Inc. | Methods and apparatuses for assuring quality and safety of drug administration and medical products and kits |
US7497379B2 (en) * | 2004-02-27 | 2009-03-03 | Microsoft Corporation | Counterfeit and tamper resistant labels with randomly occurring features |
US20050234823A1 (en) * | 2004-04-20 | 2005-10-20 | Rainer Schimpf | Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution. |
Cited By (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8538844B1 (en) | 1998-12-23 | 2013-09-17 | Jpmorgan Chase Bank, N.A. | System and method for integrating trading operations including the generation, processing and tracking of and trade documents |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US9240089B2 (en) | 2002-03-25 | 2016-01-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for time variable financial authentication |
US8500015B2 (en) | 2005-02-03 | 2013-08-06 | Yottamark, Inc. | Method and system for deterring product counterfeiting, diversion and piracy |
US20100299263A1 (en) * | 2005-02-03 | 2010-11-25 | Elliott Grant | Method and System for Deterring Product Counterfeiting, Diversion and Piracy |
US8245927B2 (en) | 2005-02-03 | 2012-08-21 | Yottamark, Inc. | Method and system for deterring product counterfeiting, diversion and piracy |
US20070170241A1 (en) * | 2005-02-03 | 2007-07-26 | Infinity Coding Solutions, Inc. | Method and system to provide security information when authenticating product code |
US8300806B2 (en) | 2005-02-03 | 2012-10-30 | Yottamark, Inc. | Duo codes for product authentication |
US8155313B2 (en) | 2005-02-03 | 2012-04-10 | Yottamark, Inc. | Systems and methods for employing duo codes for product authentication |
US7614546B2 (en) | 2005-02-03 | 2009-11-10 | Yottamark, Inc. | Method and system for deterring product counterfeiting, diversion and piracy |
US7992772B2 (en) * | 2005-02-03 | 2011-08-09 | Yottamark, Inc. | Method and system for deterring product counterfeiting, diversion and piracy on a single system |
US8649512B2 (en) | 2005-02-03 | 2014-02-11 | Yottamark, Inc. | Duo codes for product authentication |
US7770783B2 (en) | 2005-02-03 | 2010-08-10 | Yottamark, Inc. | Method and system to provide security information when authenticating product code |
US20070170240A1 (en) * | 2005-02-03 | 2007-07-26 | Infinity Coding Solutions, Inc. | Method and system for deterring product counterfeiting, diversion and piracy on a single system |
US20060180661A1 (en) * | 2005-02-03 | 2006-08-17 | Elliott Grant | Method and system for deterring product counterfeiting, diversion and piracy |
US20070175974A1 (en) * | 2006-02-02 | 2007-08-02 | Matthew Self | System and method of code generation and authentication |
US7823768B2 (en) | 2006-02-02 | 2010-11-02 | Yottamark, Inc. | System and method of code generation and authentication |
US8301905B2 (en) * | 2006-09-08 | 2012-10-30 | Inside Secure | System and method for encrypting data |
US20080062803A1 (en) * | 2006-09-08 | 2008-03-13 | Daniele Fronte | System and method for encrypting data |
US20100017330A1 (en) * | 2007-05-29 | 2010-01-21 | Moxie Proxy | Protecting a manufactured item from counterfeiting |
US8108309B2 (en) * | 2007-05-29 | 2012-01-31 | Provalidate | Protecting a manufactured item from counterfeiting |
US7909239B2 (en) | 2007-09-07 | 2011-03-22 | Yottamark, Inc. | Attributing harvest information with unique identifiers |
US20090065579A1 (en) * | 2007-09-07 | 2009-03-12 | Elliott Grant | Attributing Harvest Information with Unique Identifiers |
US8342393B2 (en) | 2007-09-07 | 2013-01-01 | Yottamark, Inc. | Attributing harvest information with unique identifiers |
US8825516B2 (en) | 2007-09-07 | 2014-09-02 | Yottamark, Inc. | Methods for correlating first mile and last mile product data |
US8887990B2 (en) | 2007-09-07 | 2014-11-18 | Yottamark, Inc. | Attributing harvest information with unique identifiers |
US8428773B1 (en) | 2008-02-12 | 2013-04-23 | Yottamark, Inc. | Systems and methods of associating individual packages with harvest crates |
US11120387B2 (en) * | 2008-03-17 | 2021-09-14 | Philip Morris Usa Inc. | Method and apparatus for identifying, authenticating, tracking and tracing manufactured items |
US11144863B2 (en) * | 2008-03-17 | 2021-10-12 | Philip Morris Usa Inc. | Method and apparatus for identifying, authenticating, tracking and tracing manufactured items |
US20170270467A1 (en) * | 2008-03-17 | 2017-09-21 | Philip Morris Usa Inc. | Method and Apparatus for Identifying, Authenticating, Tracking and Tracing Manufactured Items |
US20090230190A1 (en) * | 2008-03-17 | 2009-09-17 | Philip Morris Usa Inc. | Method and apparatus for identifying, authenticating, tracking and tracing manufactured items |
US11710091B2 (en) | 2008-03-17 | 2023-07-25 | Philip Morris Usa Inc. | Method and apparatus for identifying, authenticating, tracking and tracing manufactured items |
US20090265560A1 (en) * | 2008-03-20 | 2009-10-22 | Semiconductor Energy Laboratory Co., Ltd. | Numbering Method, Numbering Device, and Laser Direct Drawing Apparatus |
US20090249081A1 (en) * | 2008-03-31 | 2009-10-01 | Kabushiki Kaisha Toshiba-1 Shibaura 1-Chomominatoku | Storage device encryption and method |
US8240564B2 (en) | 2008-07-11 | 2012-08-14 | Yottamark, Inc. | Mobile table for implementing clamshell-to-case association |
US8573476B2 (en) | 2008-07-11 | 2013-11-05 | Yottamark, Inc. | Mobile table for implementing clamshell-to-case association |
US8261973B2 (en) | 2008-07-11 | 2012-09-11 | Yottamark, Inc. | Mobile table for implementing clamshell-to-case association |
US7766240B1 (en) | 2008-07-19 | 2010-08-03 | Yottamark, Inc. | Case-Level Traceability without the need for inline printing |
US8447987B1 (en) | 2008-11-20 | 2013-05-21 | Katerina Polonsky | Authentication of brand name product ownership using public key cryptography |
US8286869B1 (en) | 2009-05-22 | 2012-10-16 | Yottamark, Inc. | Case labeling for field-packed produce |
US8152063B1 (en) | 2009-05-22 | 2012-04-10 | Yottamark, Inc. | Case labeling for field-packed produce |
US8196827B1 (en) | 2009-05-22 | 2012-06-12 | Yottamark, Inc. | Case labeling for field-packed produce |
US20110084127A1 (en) * | 2009-10-08 | 2011-04-14 | Elliott Grant | Voice Code for Distribution Centers |
US20110154046A1 (en) * | 2009-12-22 | 2011-06-23 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US9058584B2 (en) | 2009-12-22 | 2015-06-16 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US20170235976A1 (en) * | 2009-12-22 | 2017-08-17 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US11797512B2 (en) * | 2009-12-22 | 2023-10-24 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US9665847B2 (en) | 2009-12-22 | 2017-05-30 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US10380095B2 (en) * | 2009-12-22 | 2019-08-13 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US10019606B2 (en) * | 2009-12-22 | 2018-07-10 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US10083197B2 (en) | 2009-12-22 | 2018-09-25 | Philip Morris Usa Inc. | Method and apparatus for storage of data for manufactured items |
US20110208670A1 (en) * | 2010-02-19 | 2011-08-25 | Jpmorgan Chase Bank, N.A. | Execution Optimizer |
US8352354B2 (en) | 2010-02-23 | 2013-01-08 | Jpmorgan Chase Bank, N.A. | System and method for optimizing order execution |
US20110208634A1 (en) * | 2010-02-23 | 2011-08-25 | Jpmorgan Chase Bank, N.A. | System and method for optimizing order execution |
WO2011134891A1 (en) | 2010-04-26 | 2011-11-03 | International Business Machines Corporation | Generating unique identifiers |
US8375066B2 (en) | 2010-04-26 | 2013-02-12 | International Business Machines Corporation | Generating unique identifiers |
EA017178B1 (en) * | 2010-06-08 | 2012-10-30 | Олег Михайлович ЛИ | Uniform system of identification of articles, production or services "original" and method for identification thereof |
US8560698B2 (en) | 2010-06-27 | 2013-10-15 | International Business Machines Corporation | Allocating unique identifiers using metadata |
JP2014504110A (en) * | 2010-12-30 | 2014-02-13 | デジタル・コーディング・アンド・トラッキング・アソシエイション | Method and apparatus for marking manufactured articles |
US9721260B2 (en) | 2010-12-30 | 2017-08-01 | Inexto Sa | Method and apparatus for marking manufactured items |
US8210430B1 (en) | 2011-02-24 | 2012-07-03 | Yottamark, Inc. | Methods for assigning traceability information to and retrieving traceability information from a store shelf |
US9384460B1 (en) | 2011-02-24 | 2016-07-05 | Trimble Navigation Limited | Methods for assigning traceability information to and retrieving traceability information from a store shelf |
US8474714B1 (en) | 2011-02-24 | 2013-07-02 | Yottamark, Inc. | Methods for assigning traceability information to and retrieving traceability information from a store shelf |
US20130320079A1 (en) * | 2012-06-01 | 2013-12-05 | Panduit Corp. | Anti-Counterfeiting Methods |
US9047499B2 (en) * | 2012-06-01 | 2015-06-02 | Panduit Corp. | Anti-counterfeiting methods |
WO2014062914A1 (en) * | 2012-10-18 | 2014-04-24 | Nutec Systems, Inc. | Method and system for verifying a product packaging label |
US10607181B2 (en) | 2012-12-17 | 2020-03-31 | Inexto Sa | Method and apparatus for storage of data for tracking manufactured items |
US10121151B2 (en) | 2012-12-17 | 2018-11-06 | Inexto S.A. | Method and apparatus for marking manufactured items using physical characteristic |
US20190213604A1 (en) * | 2014-02-13 | 2019-07-11 | The Procter & Gamble Company | Validated Article of Commerce |
US10621392B2 (en) | 2014-06-23 | 2020-04-14 | Inexto Sa | Method and system for marking manufactured items to detect unauthorized refilling |
US10068111B2 (en) | 2014-06-23 | 2018-09-04 | Inexto Sa | Method and system for marking manufactured items to detect unauthorized refilling |
US20160092812A1 (en) * | 2014-09-30 | 2016-03-31 | International Business Machines Corporation | End-to-End Commodity and Commodity Marking Tracking |
US11328237B2 (en) * | 2014-09-30 | 2022-05-10 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | End-to-end commodity and commodity marking tracking |
US11288683B2 (en) | 2014-11-06 | 2022-03-29 | Altria Client Services Llc | Methods and products for product tracing and authentication using conductive inks |
US10984370B2 (en) | 2015-01-28 | 2021-04-20 | Inexto Sa | Method and apparatus for unit and container identification and tracking |
US10680826B2 (en) | 2015-01-31 | 2020-06-09 | Inexto Sa | Secure product identification and verification |
WO2016179220A1 (en) | 2015-05-05 | 2016-11-10 | Celanese International Corporation | Marking methods for combatting illicit trade |
US10587403B2 (en) | 2015-08-13 | 2020-03-10 | Inexto Sa | Enhanced obfuscation or randomization for secure product identification and verification |
US10579889B2 (en) | 2015-08-25 | 2020-03-03 | Inexto Sa | Verification with error tolerance for secure product identifiers |
US10594494B2 (en) | 2015-08-25 | 2020-03-17 | Inexto Sa | Multiple authorization modules for secure production and verification |
US10917245B2 (en) | 2015-08-25 | 2021-02-09 | Inexto Sa | Multiple authorization modules for secure production and verification |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
US11176561B2 (en) | 2017-05-12 | 2021-11-16 | Artashes Valeryevich Ikonomov | Method for checking the authenticity of goods or services |
EP3540664A1 (en) * | 2018-03-14 | 2019-09-18 | Tetra Laval Holdings & Finance S.A. | Providing unique codes on packages for liquid food |
US11669927B2 (en) | 2018-03-14 | 2023-06-06 | Tetra Laval Holdings & Finance, S.A. | Providing unique codes on packages for liquid food |
WO2019175003A1 (en) * | 2018-03-14 | 2019-09-19 | Tetra Laval Holdings & Finance S.A. | Providing unique codes on packages for liquid food |
US11777744B2 (en) | 2018-06-25 | 2023-10-03 | Auth9, Inc. | Method, computer program product and apparatus for creating, registering, and verifying digitally sealed assets |
CN112106324A (en) * | 2018-06-25 | 2020-12-18 | Auth9股份有限公司 | Methods, computer program products and devices for creating, registering and verifying digitally stamped assets |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220309517A1 (en) | Methods and systems for making, tracking and authentication of products | |
US10121151B2 (en) | Method and apparatus for marking manufactured items using physical characteristic | |
KR101922739B1 (en) | Method and apparatus for marking manufactured items | |
US20080011841A1 (en) | System and Method of Detecting Product Code Duplication and Product Diversion | |
US20070215685A1 (en) | System and Method of Product Identification Using a URL | |
WO2010015906A2 (en) | Apparatus, systems and methods for authentication of objects having multiple components |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PHILIP MORRIS USA INC., VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAGER, ALAIN;CHATELAIN, PHILIPPE;FRADET, ERWAN;AND OTHERS;REEL/FRAME:019496/0270;SIGNING DATES FROM 20070501 TO 20070506 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |