[go: up one dir, main page]

EP1727096A1 - Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor - Google Patents

Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor Download PDF

Info

Publication number
EP1727096A1
EP1727096A1 EP05104325A EP05104325A EP1727096A1 EP 1727096 A1 EP1727096 A1 EP 1727096A1 EP 05104325 A EP05104325 A EP 05104325A EP 05104325 A EP05104325 A EP 05104325A EP 1727096 A1 EP1727096 A1 EP 1727096A1
Authority
EP
European Patent Office
Prior art keywords
article
certificate
owner
electronic
electrical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05104325A
Other languages
German (de)
French (fr)
Inventor
Philippe Marneth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to EP05104325A priority Critical patent/EP1727096A1/en
Priority to PCT/EP2006/062474 priority patent/WO2006125757A1/en
Publication of EP1727096A1 publication Critical patent/EP1727096A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/127Card verification in which both online and offline card verification can take place

Definitions

  • the invention relates to a method for deterring counterfeiting of articles, for instance valuable articles, including the steps of providing each article with an article reference affixed or attached thereto; providing each article with a certificate; providing each certificate with a certificate reference affixed or attached thereto; and providing data storing means with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
  • the invention also relates to a system for deterring counterfeiting of articles, for instance valuable articles, including articles and certificates, wherein each article is provided with an article reference affixed or attached thereto; each article is provided with a certificate; each certificate is provided with a certificate reference affixed or attached thereto; and further including data storing means provided with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
  • EP 0 957 459 A1 discloses a system for verifying ownership of articles, based on attributing a unique article number and a certificate to each article.
  • the certificate carries an individual certification number different from the article number.
  • a central computer with a storage contains a list of matching pairs of article and certification numbers. The system can be queried by entering both the article and certification numbers. The system then returns an indication of whether the two numbers match or not. If they match, the article is considered to be authentic.
  • a storage for storing a current owner or an owner history for each article. Additionally, access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database.
  • the method further includes the steps of receiving, through electrical, electronic or computer means, a query including an article reference, a certificate reference and an owner reference; checking, through electrical, electronic or computer means, whether the article reference, the certificate reference and the owner reference match in the data storing means; and if they match, returning, through electrical, electronic or computer means, a first signal.
  • the article When the first signal is returned, the article may be said to be authentic or identified as authentic.
  • the expressions "the first signal is returned” or "the article is identified as authentic” are used indifferently to refer to what results from the situation in which the article reference, the certificate reference and the owner reference match.
  • access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database. This does not alter the fact that if a pair of article and certificate numbers match in the data base, the system returns an indication that the article is authentic.
  • the method according to the invention when the method according to the invention is put into operation, three references are required to obtain the first signal, i.e. a signal indicating that the article is authentic. Receiving two of the three references does not make it possible to obtain information regarding an article's authenticity.
  • a party purchases an authentic article from a trusted retailer, he receives a certificate and a owner reference (or password).
  • a certificate and a owner reference or password
  • the party may do so, in the presence of the potential purchaser, by sending a query to the data storing means.
  • the first signal would then be returned, indicating that the article is deemed to be authentic.
  • the purchaser would then be confident that the article is authentic and he would then substitute the current password (the current owner reference) with his own password (his own owner reference).
  • the owner reference is indeed capable of being substituted in the data storing means.
  • the counterfeiter would be left with no means anymore to prove that a pair of article and certificate references are authentic. In other words, the counterfeiter would have no means anymore to indicate an article's authenticity by sending a query to the data storing means.
  • the counterfeiter would be left with no possibility to utter yet another forged article with the same pair of article reference and certificate reference. An in the event the counterfeiter had bought an original article to forge the copy, the counterfeiter would further be left with no means to identify the original article as an authentic article through the use of the method according to the invention.
  • the method of the invention more efficiently deters counterfeiting of articles.
  • the method disclosed in European patent EP 1 204 078 solves the same above-described problem in view of the prior art, i.e. providing a method which is more efficient in deterring counterfeiting of articles.
  • the proposed solution is different.
  • the method disclosed in EP 1 204 078 consists in adding a geographical verification by comparing the article's position to the area attributed to the article. This prior art solution is based on the assumption according to which, if an authentication query relating to a given article comes from an area far away from the predetermined area associated with the article, this is likely to indicate fraud activities carried out in relation with the article, i.e. counterfeiting.
  • the method according to the invention deters counterfeiting of articles wherever counterfeiting is carried out, and not only far away from a predetermined area.
  • the method according to the invention deters counterfeiting and constitutes a technical tool that leads to an improved atmosphere of mutual confidence amongst the actors on the luxury goods market, i.e. brand owners, manufacturers, importers, retailers, buyers, sellers, etc.
  • the method according to the invention may be used to deter insurance fraud and false insurance claims.
  • an insurance company may require the article owner to provide the certificate (and the certificate reference) as well as the owner reference as a condition for receiving any compensation. If the claimant does not provide a valid triplet, the insurer would not award him any compensation. If the claimant is able to do so, the insurer may change the owner reference and may award the claimant with a compensation while being reassured that the article cannot be sold anymore as an authentic article.
  • prestige and values of goods may be improved thanks to the method and system according to the invention.
  • the certificate is provided with conventional security features, such as holograms, fine printed patterns, magnetic strips, to make it difficult to copy.
  • security features such as holograms, fine printed patterns, magnetic strips, to make it difficult to copy.
  • the data storing means according to the invention is secure in such a manner as to make it impossible, or very difficult at least, to obtain a valid triplet consisting of an article reference, a certificate reference and an owner reference, without the required permissions.
  • the invention also relates to an above-described system for deterring counterfeiting further including electrical, electronic or computer receiving means for receiving a query including an article reference, a certificate reference and an owner reference; electrical, electronic or computer checking means for checking whether the article reference, the certificate reference and the owner reference match in the database; and electrical, electronic or computer returning means for returning, if the article reference, the certificate reference and the owner reference match, a first signal.
  • the article reference and its corresponding certificate reference are not derivable or substantially not derivable for one another. To this end, they may be randomly chosen.
  • Fig. 1 a schematic flow chart representation
  • Fig. 3 a schematic view of the inputs.
  • the method for deterring counterfeiting of articles 24 may be applied to any kind of articles, objects, items, products, merchandises, consumer goods, trademarked goods or branded luxury goods which are transferable and capable of being owned, in particular valuable articles, such as handbags, purses, luggages, watches, pens, garments, jewelry, belts, bracelets, pendants, chains, diamonds, art objects, paintings, sport collectibles, autograph memorabilities, accessories, bottles of wine, or the like.
  • the method includes the steps of providing 2 each article 24 with an article reference 26; providing 4 each article 24 with a certificate 28; and providing 6 each certificate 28 with a certificate reference 30. These steps need not necessarily be carried out according to the sequence illustrated in Fig. 1.
  • the article reference 26, certificate reference 30 and owner reference 32 (see below), whatever the names by which they are called, for instance respectively "product code” or “product key”, “certification code” or “private key” and “password”, may be numbers, words, alphanumeric expressions, keys, codes or any string or combination of signs, characters, letters, digits or ideograms.
  • the article reference 26 and certificate reference 30 may also be patterns such as bar code, two-dimensional or three-dimensional patterns capable of being recognized by mechanical, electrical, electronic or computer means. They are affixed or attached respectively to the article 24 or certificate 28, by any kind of fastening means. That is, they may for instance be imprinted, embossed, engraved, directly or indirectly affixed or attached, fastened with an adhesive material, such as glue or tape, with a chain, a cord, clips, staples, magnetic fastening means, or the like. They may also be magnetically, electronically stored on or in the article 24 or certificate 28, or in a integrated circuit or microchip fastened to the article 24 or certificate 28.
  • the article reference 26 and certificate reference 30 may physically be provided by the manufacturer or later on by the brand owner or retailer for instance. This may be done through a random number generator algorithm, or through a dedicated algorithm.
  • the article reference 26 is attached or affixed to the article 24 so as to mark it in a substantially lasting manner.
  • the article reference 26 is not intended to change.
  • the certificate 28 serves as a support for the certificate reference 30 and may be a simple voucher or alternatively a more elaborate item.
  • the certificate reference 30 is not intended to change, and needs not be kept secret.
  • the method further includes the step of providing 8 data storing means 38 with each article reference 26, the corresponding certificate reference 30 and a corresponding substitutable owner reference 32.
  • the data storing means 38 may for instance be a database, a computer file or a register, and may for instance be accessible through a computer, a telephone network or any remote communication channel.
  • the data storing means 38 may contain further optional fields besides the article reference field, the certificate reference field and the owner reference field.
  • Optional fields may include a field indicating whether or not the pair has already been attributed (this is particularly useful if the article and certificate references are attributed prior to the article manufacture), a field describing the article and/or its status.
  • Data storing means may be brand-specific or general purpose oriented.
  • the owner reference 32 is intended to be kept secret by the owner of the article 24. It may be substituted or modified any number of times. In one embodiment of the invention, the owner reference 32 is conditionally substitutable provided that a matching triplet exists, as illustrated with reference to Fig. 2 (see below).
  • Owner references 32 may be memorizable strings of letters, of numbers, of combined letters and numbers, or of any other signs as described above, whatever is the length of the string. They may also be patterns which are not intended to be memorized such as signature patterns, fingerprints, eye retinas and irises, voice patterns, facial patterns, hand measurements, genetic fingerprints or any physical characteristics used to identify individuals in the field of biometrics. They may also be any types of digital signature saved on any type of medium, for instance a digital signature stored on an electronic ID card.
  • any party may query the data storing means 38, for instance by sending an HTTP request to a dedicated web server.
  • the step of receiving 10 the triplet of references, i.e. the article reference 26, the certificate reference 30 and the owner reference 32, may take place at any time whenever necessary or desired, not only when an article 24 is transferred or sold.
  • the method includes a step of checking 12 whether the three references match in the database 38.
  • Checking 12 may for instance consist in transforming the HTTP request into a data retrieval operation, beginning a database transaction, executing the query, for instance an SQL SELECT query, and committing the transaction. If a row comprising the three submitted references exists in the corresponding columns of the database, then the references match.
  • the step of returning 14 a first signal is carried out. This may prompt a client computer to display a message indicating that the article reference 26 and the certificate reference 30 match, and that the article is deemed to be authentic.
  • the step of returning 16 a second signal is carried out. This may prompt a client computer to display a message indicating that the correspondence between the article reference 26 and the certificate reference 30 cannot be verified. Alternatively, returning no signal may be possible.
  • Fig. 2 illustrates another embodiment of the method according to the invention, further including a step of returning 18 along with the first signal, or shortly after the first signal is returned or within a given session, a third signal indicating the possibility of replacing the owner reference.
  • the method includes the steps of receiving 20 a new owner reference; and a step of substituting 22 the owner reference 32 in the data storing means 38 with the new owner reference.
  • An SQL UPDATE query may for instance be used for the substitution.
  • the embodiment illustrated in Fig. 2 provides an owner reference substitution method or a new owner reference recording method. As soon as the transfer from a first to a second party has been enacted by the substitution of owner references, only a person knowing the owner reference 32 can verify the correspondence between the article reference 26 and the certificate reference 30, or in other words the article's 24 authenticity.
  • Fig. 4 illustrates a schematic representation of an embodiment of the system according to the invention where the receiving means 34, the checking means 36, the data storing means 38 and the returning means 40 are illustrated by black boxes.
  • a query containing the triplets of references is transmitted 10 via a network to the receiving means 34.
  • the checking means 36 query the data storing means 38, for instance by establishing a transaction database and by executing an SQL SELECT query.
  • the returning means 40 transforms the physical bits such that either a first signal or a second signal is returned on the network, according to whether or not the triplet exists in the database 38.
  • the receiving means 34, the checking means 36, the data storing means 38 and the returning means 40 may for instance be implemented through a microprocessor with a central processing unit (CPU) and a memory unit.
  • CPU central processing unit
  • either the system or the method in the cases where several triplets are successively received 10 from the same location or origin, or in the cases said triplets relates to the same pair of article and certificate references, the method and the system may be configured to cause a delay or threshold mechanism to be initiated, in order to deter brute force attacks or the like. Since temporary denial of service in relation to a particular article may occur, this mechanism should only be carried out under certain conditions, for instance if the certificate reference 30 is not public, according to the data storing means' proprietor desire.
  • IP addresses are recorded to track a person trying to crack the system.
  • each article reference 26 and/or certificate reference 30 are unique, that is, unique in the data storing means 38.
  • each certificate reference 30 is different from the corresponding article reference 26. This does not prohibit however an article reference 26 from being identical to a certificate reference 30 which corresponds to another article reference 26.
  • the step of providing 8 the data storing means 38 with each article reference 26, the corresponding certificate reference 30 and a corresponding substitutable owner reference 32 further includes providing the data storing means 38 with at least a fourth reference.
  • the further steps of receiving 10, checking 12 and returning 14,16 apply mutatis mutandis.
  • the nth reference, n being equal or larger than 4 serves to enable the validation of the (n-2)th and (n-1)th references.
  • steps of receiving 10, returning 14,16 and checking 12 may be carried through a public or private network, via any transmission protocol, and through a secure communication or not. Data phone communications or SMS messages may also be used.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention relates to a method for deterring counterfeiting of articles (24), for instance valuable articles (24), including providing (2) each article (24) with an article reference (26) attached thereto; providing (4) each article (24) with a certificate (28); providing (6) each certificate (28) with a certificate reference (30) attached thereto; and providing (8) a database (38) with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32). The method further includes receiving (10), through electronic or computer means, an article reference (26), a certificate reference (30) and a substitutable owner reference (32); checking (12) whether the article reference (26), the certificate reference (30) and an owner reference (32) match in the database (38); and, if the article reference (26), the certificate reference (30) and the owner reference (32) match, returning (14) a first signal. The invention also relates to a system for deterring counterfeiting of articles (24).

Description

    Field of the invention
  • The invention relates to a method for deterring counterfeiting of articles, for instance valuable articles, including the steps of providing each article with an article reference affixed or attached thereto; providing each article with a certificate; providing each certificate with a certificate reference affixed or attached thereto; and providing data storing means with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
  • The invention also relates to a system for deterring counterfeiting of articles, for instance valuable articles, including articles and certificates, wherein each article is provided with an article reference affixed or attached thereto; each article is provided with a certificate; each certificate is provided with a certificate reference affixed or attached thereto; and further including data storing means provided with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
  • Description of prior art
  • Such methods and systems are known from the art. For instance, the European patent application EP 0 957 459 A1 discloses a system for verifying ownership of articles, based on attributing a unique article number and a certificate to each article. The certificate carries an individual certification number different from the article number. A central computer with a storage contains a list of matching pairs of article and certification numbers. The system can be queried by entering both the article and certification numbers. The system then returns an indication of whether the two numbers match or not. If they match, the article is considered to be authentic.
  • In one embodiment of the above-referred prior art system, a storage is provided for storing a current owner or an owner history for each article. Additionally, access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database.
  • The methods and systems of the art, such as the system described above, are neither immune to counterfeiting nor are they efficiently deterring counterfeiting. Indeed, a counterfeiter may still copy any number of times both the article and the certificate along with their article and certification numbers. Interrogating the database returns that the two numbers match even though the article and certificate are both forgeries.
  • Summary of the invention
  • It is an object of the invention to provide a method and a system which more efficiently deter counterfeiting of articles.
  • To this end, the method further includes the steps of receiving, through electrical, electronic or computer means, a query including an article reference, a certificate reference and an owner reference; checking, through electrical, electronic or computer means, whether the article reference, the certificate reference and the owner reference match in the data storing means; and if they match, returning, through electrical, electronic or computer means, a first signal.
  • When the first signal is returned, the article may be said to be authentic or identified as authentic. In the description, the expressions "the first signal is returned" or "the article is identified as authentic" are used indifferently to refer to what results from the situation in which the article reference, the certificate reference and the owner reference match.
  • When the method and device disclosed in EP 0 957 459 A1 are put into operation on a class of articles, said method and device neither prevent nor deter a counterfeiter from copying both the article and the certificate along with their respective reference, in which case each counterfeited pair of article and certificate are identified as an authentic pair. Indeed, when an article number and a certification number are received, means are provided for verifying in a storage whether said numbers are attributed to the same article. The means indifferently return a signal indicating that the article number and a certification number match whether or not the article and the certificate are genuine, and whoever sends the query to the database.
  • In the method and device of the prior art, there is no means for deterring counterfeiting of articles in case when both the article and the certificate are copied along with their respective article and certificate numbers. Providing a storage with the current owner or the owner history for each article does not constitute, on the one hand, sufficiently efficient deterring means, and it may raise privacy concerns on the other hand. This feature does not efficiently deter counterfeiting of articles since any person may verify whether a pair of article and certificate numbers match in the database, and said person would then obtain an indication that the article is authentic even though it is actually not. Privacy concerns may also be raise since anyone may obtain information about the owner of a given article and since the owner needs to reveal its identity to prove to a third party that the article is authentic, something which may not be desirable in many situations.
  • Additionally, in the prior art system, access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database. This does not alter the fact that if a pair of article and certificate numbers match in the data base, the system returns an indication that the article is authentic.
  • In contrast, when the method according to the invention is put into operation, three references are required to obtain the first signal, i.e. a signal indicating that the article is authentic. Receiving two of the three references does not make it possible to obtain information regarding an article's authenticity.
  • When a party purchases an authentic article from a trusted retailer, he receives a certificate and a owner reference (or password). In the event the party copies the article and the certificate, he might then be able to sell the forged article and forged certificate as if they were the original authentic article and certificate. The party, who may be called "the counterfeiter", may do so, in the presence of the potential purchaser, by sending a query to the data storing means. The first signal would then be returned, indicating that the article is deemed to be authentic. The purchaser would then be confident that the article is authentic and he would then substitute the current password (the current owner reference) with his own password (his own owner reference). The owner reference is indeed capable of being substituted in the data storing means.
  • Once the owner reference has been modified by the purchaser, the counterfeiter would be left with no means anymore to prove that a pair of article and certificate references are authentic. In other words, the counterfeiter would have no means anymore to indicate an article's authenticity by sending a query to the data storing means.
  • The counterfeiter would be left with no possibility to utter yet another forged article with the same pair of article reference and certificate reference. An in the event the counterfeiter had bought an original article to forge the copy, the counterfeiter would further be left with no means to identify the original article as an authentic article through the use of the method according to the invention.
  • Accordingly, the method of the invention more efficiently deters counterfeiting of articles.
  • The method disclosed in European patent EP 1 204 078 solves the same above-described problem in view of the prior art, i.e. providing a method which is more efficient in deterring counterfeiting of articles. However, the proposed solution is different. The method disclosed in EP 1 204 078 consists in adding a geographical verification by comparing the article's position to the area attributed to the article. This prior art solution is based on the assumption according to which, if an authentication query relating to a given article comes from an area far away from the predetermined area associated with the article, this is likely to indicate fraud activities carried out in relation with the article, i.e. counterfeiting.
  • The method according to the invention deters counterfeiting of articles wherever counterfeiting is carried out, and not only far away from a predetermined area. The method according to the invention deters counterfeiting and constitutes a technical tool that leads to an improved atmosphere of mutual confidence amongst the actors on the luxury goods market, i.e. brand owners, manufacturers, importers, retailers, buyers, sellers, etc.
  • As a further advantage, the method according to the invention may be used to deter insurance fraud and false insurance claims. In case of theft of an article provided with a given article reference, an insurance company may require the article owner to provide the certificate (and the certificate reference) as well as the owner reference as a condition for receiving any compensation. If the claimant does not provide a valid triplet, the insurer would not award him any compensation. If the claimant is able to do so, the insurer may change the owner reference and may award the claimant with a compensation while being reassured that the article cannot be sold anymore as an authentic article.
  • As a further advantage, prestige and values of goods may be improved thanks to the method and system according to the invention.
  • In one embodiment of the invention, the certificate is provided with conventional security features, such as holograms, fine printed patterns, magnetic strips, to make it difficult to copy. These additional security provisions are not indispensable however, in contrast with the prior art method disclosed in EP 0 957 459 . The certificate according to the invention may be structurally very simple.
  • In one embodiment of the invention, the data storing means according to the invention is secure in such a manner as to make it impossible, or very difficult at least, to obtain a valid triplet consisting of an article reference, a certificate reference and an owner reference, without the required permissions.
  • The invention also relates to an above-described system for deterring counterfeiting further including electrical, electronic or computer receiving means for receiving a query including an article reference, a certificate reference and an owner reference; electrical, electronic or computer checking means for checking whether the article reference, the certificate reference and the owner reference match in the database; and electrical, electronic or computer returning means for returning, if the article reference, the certificate reference and the owner reference match, a first signal.
  • In one embodiment of the invention, the article reference and its corresponding certificate reference are not derivable or substantially not derivable for one another. To this end, they may be randomly chosen.
  • Short description of the drawings
  • These and further aspects of the invention will be explained in greater detail by way of example and with reference to the accompanying drawings in which :
    • Fig.1 shows a schematic flow chart representation of an embodiment of the method according to the invention;
    • Fig.2 shows a schematic flow chart representation of another embodiment of the method according to the invention;
    • Fig.3 shows a schematic view of the inputs of an embodiment of the method according to the invention; and
    • Fig.4 shows a schematic representation of an embodiment of the system according to the invention.
  • The figures are not drawn to scale. Generally, identical components are denoted by the same reference numerals in the figures.
  • Detailed description of preferred embodiments
  • An embodiment of the method according to the invention will be now described with reference to both Fig. 1, a schematic flow chart representation, and Fig. 3, a schematic view of the inputs.
  • The method for deterring counterfeiting of articles 24 may be applied to any kind of articles, objects, items, products, merchandises, consumer goods, trademarked goods or branded luxury goods which are transferable and capable of being owned, in particular valuable articles, such as handbags, purses, luggages, watches, pens, garments, jewelry, belts, bracelets, pendants, chains, diamonds, art objects, paintings, sport collectibles, autograph memorabilities, accessories, bottles of wine, or the like.
  • The method includes the steps of providing 2 each article 24 with an article reference 26; providing 4 each article 24 with a certificate 28; and providing 6 each certificate 28 with a certificate reference 30. These steps need not necessarily be carried out according to the sequence illustrated in Fig. 1. The article reference 26, certificate reference 30 and owner reference 32 (see below), whatever the names by which they are called, for instance respectively "product code" or "product key", "certification code" or "private key" and "password", may be numbers, words, alphanumeric expressions, keys, codes or any string or combination of signs, characters, letters, digits or ideograms.
  • The article reference 26 and certificate reference 30 may also be patterns such as bar code, two-dimensional or three-dimensional patterns capable of being recognized by mechanical, electrical, electronic or computer means. They are affixed or attached respectively to the article 24 or certificate 28, by any kind of fastening means. That is, they may for instance be imprinted, embossed, engraved, directly or indirectly affixed or attached, fastened with an adhesive material, such as glue or tape, with a chain, a cord, clips, staples, magnetic fastening means, or the like. They may also be magnetically, electronically stored on or in the article 24 or certificate 28, or in a integrated circuit or microchip fastened to the article 24 or certificate 28.
  • The article reference 26 and certificate reference 30 may physically be provided by the manufacturer or later on by the brand owner or retailer for instance. This may be done through a random number generator algorithm, or through a dedicated algorithm.
  • The article reference 26 is attached or affixed to the article 24 so as to mark it in a substantially lasting manner. The article reference 26 is not intended to change.
  • The certificate 28 serves as a support for the certificate reference 30 and may be a simple voucher or alternatively a more elaborate item. The certificate reference 30 is not intended to change, and needs not be kept secret.
  • The method further includes the step of providing 8 data storing means 38 with each article reference 26, the corresponding certificate reference 30 and a corresponding substitutable owner reference 32. The data storing means 38 may for instance be a database, a computer file or a register, and may for instance be accessible through a computer, a telephone network or any remote communication channel. The data storing means 38 may contain further optional fields besides the article reference field, the certificate reference field and the owner reference field. Optional fields may include a field indicating whether or not the pair has already been attributed (this is particularly useful if the article and certificate references are attributed prior to the article manufacture), a field describing the article and/or its status. Data storing means may be brand-specific or general purpose oriented.
  • The owner reference 32, or password, is intended to be kept secret by the owner of the article 24. It may be substituted or modified any number of times. In one embodiment of the invention, the owner reference 32 is conditionally substitutable provided that a matching triplet exists, as illustrated with reference to Fig. 2 (see below). Owner references 32 may be memorizable strings of letters, of numbers, of combined letters and numbers, or of any other signs as described above, whatever is the length of the string. They may also be patterns which are not intended to be memorized such as signature patterns, fingerprints, eye retinas and irises, voice patterns, facial patterns, hand measurements, genetic fingerprints or any physical characteristics used to identify individuals in the field of biometrics. They may also be any types of digital signature saved on any type of medium, for instance a digital signature stored on an electronic ID card.
  • Once the four initialization or configuration steps have been performed, any party may query the data storing means 38, for instance by sending an HTTP request to a dedicated web server. The step of receiving 10 the triplet of references, i.e. the article reference 26, the certificate reference 30 and the owner reference 32, may take place at any time whenever necessary or desired, not only when an article 24 is transferred or sold.
  • After the step of receiving 10 the triplet, the method includes a step of checking 12 whether the three references match in the database 38. Checking 12 may for instance consist in transforming the HTTP request into a data retrieval operation, beginning a database transaction, executing the query, for instance an SQL SELECT query, and committing the transaction. If a row comprising the three submitted references exists in the corresponding columns of the database, then the references match.
  • If the references exist in a row, if they match, the step of returning 14 a first signal is carried out. This may prompt a client computer to display a message indicating that the article reference 26 and the certificate reference 30 match, and that the article is deemed to be authentic.
  • Otherwise, the step of returning 16 a second signal is carried out. This may prompt a client computer to display a message indicating that the correspondence between the article reference 26 and the certificate reference 30 cannot be verified. Alternatively, returning no signal may be possible.
  • Fig. 2 illustrates another embodiment of the method according to the invention, further including a step of returning 18 along with the first signal, or shortly after the first signal is returned or within a given session, a third signal indicating the possibility of replacing the owner reference. In one embodiment, the method includes the steps of receiving 20 a new owner reference; and a step of substituting 22 the owner reference 32 in the data storing means 38 with the new owner reference. An SQL UPDATE query may for instance be used for the substitution.
  • In other words, the embodiment illustrated in Fig. 2 provides an owner reference substitution method or a new owner reference recording method. As soon as the transfer from a first to a second party has been enacted by the substitution of owner references, only a person knowing the owner reference 32 can verify the correspondence between the article reference 26 and the certificate reference 30, or in other words the article's 24 authenticity.
  • Fig. 4 illustrates a schematic representation of an embodiment of the system according to the invention where the receiving means 34, the checking means 36, the data storing means 38 and the returning means 40 are illustrated by black boxes. A query containing the triplets of references is transmitted 10 via a network to the receiving means 34. The checking means 36 query the data storing means 38, for instance by establishing a transaction database and by executing an SQL SELECT query. Then the returning means 40 transforms the physical bits such that either a first signal or a second signal is returned on the network, according to whether or not the triplet exists in the database 38.
  • The receiving means 34, the checking means 36, the data storing means 38 and the returning means 40 may for instance be implemented through a microprocessor with a central processing unit (CPU) and a memory unit.
  • In one embodiment of the invention, either the system or the method, in the cases where several triplets are successively received 10 from the same location or origin, or in the cases said triplets relates to the same pair of article and certificate references, the method and the system may be configured to cause a delay or threshold mechanism to be initiated, in order to deter brute force attacks or the like. Since temporary denial of service in relation to a particular article may occur, this mechanism should only be carried out under certain conditions, for instance if the certificate reference 30 is not public, according to the data storing means' proprietor desire. In one embodiment, IP addresses are recorded to track a person trying to crack the system.
  • In one embodiment, each article reference 26 and/or certificate reference 30 are unique, that is, unique in the data storing means 38.
  • In one embodiment, each certificate reference 30 is different from the corresponding article reference 26. This does not prohibit however an article reference 26 from being identical to a certificate reference 30 which corresponds to another article reference 26.
  • In one embodiment of the method according to the invention, the step of providing 8 the data storing means 38 with each article reference 26, the corresponding certificate reference 30 and a corresponding substitutable owner reference 32 further includes providing the data storing means 38 with at least a fourth reference. In this embodiment, the further steps of receiving 10, checking 12 and returning 14,16 apply mutatis mutandis. In one embodiment, the nth reference, n being equal or larger than 4, serves to enable the validation of the (n-2)th and (n-1)th references. These embodiments provides increased security guarantees.
  • It will be clear for the person skilled in the art that the steps of receiving 10, returning 14,16 and checking 12, may be carried through a public or private network, via any transmission protocol, and through a secure communication or not. Data phone communications or SMS messages may also be used.
  • It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. The invention resides in each and every novel characteristic feature and each and every combination of characteristic features.

Claims (10)

  1. Method for deterring counterfeiting of articles (24), including the steps of
    providing (2) each article (24) with an article reference (26) affixed or attached thereto;
    providing (4) each article (24) with a certificate (28);
    providing (6) each certificate (28) with a certificate reference (30) affixed or attached thereto; and
    providing (8) data storing means (38) with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32);
    characterized in that the method further includes the steps of
    receiving (10), through electrical, electronic or computer means, an article reference (26), a certificate reference (30) and an owner reference (32);
    checking (12), through electrical, electronic or computer means, whether the article reference (26), the certificate reference (30) and the owner reference (32) match in the data storing means (38); and
    if they match, returning (14), through electrical, electronic or computer means, a first signal.
  2. Method according to claim 1, characterized in that the method further includes the steps of
    if the article reference (26), the certificate reference (30) and the owner reference (32) do not match, returning (16), through electrical, electronic or computer means, a second signal.
  3. Method according to claim 1 or 2, further including the steps of, if the first signal is returned (14),
    returning (18), through electrical, electronic or computer means, along with the first signal, a third signal indicating the possibility of replacing the owner reference (32).
  4. Method according to claim 3, further including the steps of, after returning (18) the third signal,
    receiving (20), through electrical, electronic or computer means, a new owner reference;
    replacing (22), through electrical, electronic or computer means, the owner reference (32) in the data storing means (38) with the new owner reference.
  5. Method according to any one of preceding claims, wherein each article reference (26) is unique in the data storing means (38).
  6. Method according to any one of preceding claims, wherein each certificate reference (30) is unique in the data storing means (38).
  7. Method for deterring counterfeiting of articles (24),
    each article (24) being provided with an article reference (26) affixed or attached thereto and further provided with a certificate (28);
    each certificate being provided (28) with a certificate reference (30) affixed or attached thereto; and
    data storing means (38) being provided with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32);
    characterized in that the method includes the steps of
    receiving (10), through electrical, electronic or computer means, an article reference (26), a certificate reference (30) and an owner reference (32);
    checking (12), through electrical, electronic or computer means, whether the article reference (26), the certificate reference (30) and the owner reference (32) match in the data storing means (38); and
    if they match, returning (14), through electrical, electronic or computer means, a first signal.
  8. System for deterring counterfeiting of articles (24), for instance valuable articles (24), including
    articles (24) and certificates (30), wherein
    each article (24) is provided with an article reference (26) affixed or attached thereto;
    each article (24) is provided with a certificate (28);
    each certificate (28) is provided with a certificate reference (30) affixed or attached thereto; and
    data storing means (38) provided with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32);
    characterized in that the system further includes
    electrical, electronic or computer receiving means (34) for receiving an article reference (26), a certificate reference (30) and an owner reference (32);
    electrical, electronic or computer checking means (36) for checking whether the article reference (26), the certificate reference (30) and the owner reference (32) match in the data storing means (38); and
    electrical, electronic or computer returning means (40) for returning, if they match, a first signal.
  9. System according to claim 8, returning means return, if the article reference (26), the certificate reference (30) and the owner reference (32) do not match, a second signal.
  10. System according to claim 8 or 9, configured to cause a delay or threshold mechanism to be initiated when several triplets of article reference (26), certificate reference (30) and owner reference (32) are successively received 10 from the same location or origin, or in the cases said triplets relates to the same pair of article and certificate references.
EP05104325A 2005-05-23 2005-05-23 Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor Withdrawn EP1727096A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP05104325A EP1727096A1 (en) 2005-05-23 2005-05-23 Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor
PCT/EP2006/062474 WO2006125757A1 (en) 2005-05-23 2006-05-19 Information security method and system for deterring counterfeiting of articles.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP05104325A EP1727096A1 (en) 2005-05-23 2005-05-23 Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor

Publications (1)

Publication Number Publication Date
EP1727096A1 true EP1727096A1 (en) 2006-11-29

Family

ID=34939927

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05104325A Withdrawn EP1727096A1 (en) 2005-05-23 2005-05-23 Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor

Country Status (1)

Country Link
EP (1) EP1727096A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles
DE10019721A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Product assurance procedures
WO2002073510A1 (en) * 2001-03-14 2002-09-19 Orell Füssli Security Documents AG Method for providing identification codes for articles
US20040267711A1 (en) * 2001-10-25 2004-12-30 Zhu Xiao Jun Method and system for authenticating a package good

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles
DE10019721A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Product assurance procedures
WO2002073510A1 (en) * 2001-03-14 2002-09-19 Orell Füssli Security Documents AG Method for providing identification codes for articles
US20040267711A1 (en) * 2001-10-25 2004-12-30 Zhu Xiao Jun Method and system for authenticating a package good

Similar Documents

Publication Publication Date Title
US20230010172A1 (en) Tracking apparel items using distributed ledgers
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
KR101276902B1 (en) Method and device for obtaining item information using rfid tags
US8566598B2 (en) Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication
JP4608014B2 (en) Article processing method
US20160098730A1 (en) System and Method for Block-Chain Verification of Goods
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
US20210090011A1 (en) Identifying and Tracking System for Searching Items
CA2891654A1 (en) System for authenticating items
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
US20140324716A1 (en) Method and system for deterring product counterfeiting
US20030179902A1 (en) Authentication and anti-counterfeit tracking system
US11810179B2 (en) Method for tracking products using distributed, shared registration bases and random numbers generated by quantum processes
WO1999051445A1 (en) Method for deterring forgeries and authenticating signatures
WO2005083644A1 (en) Method and system for verifying the authenticity of goods
US20060020803A1 (en) Systems and methods for authentication of items or documents
US10599898B2 (en) Warranty tracking method for a consumer product
EP0957459A1 (en) Method and device for verifying ownership of articles
JP2009524128A (en) Authentication method for products placed in circulation
EP1727096A1 (en) Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor
US20080270306A1 (en) System and method of theft detection of encoded encrypted software keyed genuine goods
WO2006125757A1 (en) Information security method and system for deterring counterfeiting of articles.
CN114154997A (en) Method and system for registering and authenticating items
US20250378145A1 (en) System for linking physical products to blockchain-connected digital entities and authentication of the physical products
JP3033522B2 (en) Buyer confirmation method and purchaser service provision method

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR LV MK YU

AKX Designation fees paid
REG Reference to a national code

Ref country code: DE

Ref legal event code: 8566

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20070530