EP1727096A1 - Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor - Google Patents
Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor Download PDFInfo
- Publication number
- EP1727096A1 EP1727096A1 EP05104325A EP05104325A EP1727096A1 EP 1727096 A1 EP1727096 A1 EP 1727096A1 EP 05104325 A EP05104325 A EP 05104325A EP 05104325 A EP05104325 A EP 05104325A EP 1727096 A1 EP1727096 A1 EP 1727096A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- article
- certificate
- owner
- electronic
- electrical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000004891 communication Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 230000014509 gene expression Effects 0.000 description 2
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000010432 diamond Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000002068 genetic effect Effects 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 210000000554 iris Anatomy 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/127—Card verification in which both online and offline card verification can take place
Definitions
- the invention relates to a method for deterring counterfeiting of articles, for instance valuable articles, including the steps of providing each article with an article reference affixed or attached thereto; providing each article with a certificate; providing each certificate with a certificate reference affixed or attached thereto; and providing data storing means with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
- the invention also relates to a system for deterring counterfeiting of articles, for instance valuable articles, including articles and certificates, wherein each article is provided with an article reference affixed or attached thereto; each article is provided with a certificate; each certificate is provided with a certificate reference affixed or attached thereto; and further including data storing means provided with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
- EP 0 957 459 A1 discloses a system for verifying ownership of articles, based on attributing a unique article number and a certificate to each article.
- the certificate carries an individual certification number different from the article number.
- a central computer with a storage contains a list of matching pairs of article and certification numbers. The system can be queried by entering both the article and certification numbers. The system then returns an indication of whether the two numbers match or not. If they match, the article is considered to be authentic.
- a storage for storing a current owner or an owner history for each article. Additionally, access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database.
- the method further includes the steps of receiving, through electrical, electronic or computer means, a query including an article reference, a certificate reference and an owner reference; checking, through electrical, electronic or computer means, whether the article reference, the certificate reference and the owner reference match in the data storing means; and if they match, returning, through electrical, electronic or computer means, a first signal.
- the article When the first signal is returned, the article may be said to be authentic or identified as authentic.
- the expressions "the first signal is returned” or "the article is identified as authentic” are used indifferently to refer to what results from the situation in which the article reference, the certificate reference and the owner reference match.
- access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database. This does not alter the fact that if a pair of article and certificate numbers match in the data base, the system returns an indication that the article is authentic.
- the method according to the invention when the method according to the invention is put into operation, three references are required to obtain the first signal, i.e. a signal indicating that the article is authentic. Receiving two of the three references does not make it possible to obtain information regarding an article's authenticity.
- a party purchases an authentic article from a trusted retailer, he receives a certificate and a owner reference (or password).
- a certificate and a owner reference or password
- the party may do so, in the presence of the potential purchaser, by sending a query to the data storing means.
- the first signal would then be returned, indicating that the article is deemed to be authentic.
- the purchaser would then be confident that the article is authentic and he would then substitute the current password (the current owner reference) with his own password (his own owner reference).
- the owner reference is indeed capable of being substituted in the data storing means.
- the counterfeiter would be left with no means anymore to prove that a pair of article and certificate references are authentic. In other words, the counterfeiter would have no means anymore to indicate an article's authenticity by sending a query to the data storing means.
- the counterfeiter would be left with no possibility to utter yet another forged article with the same pair of article reference and certificate reference. An in the event the counterfeiter had bought an original article to forge the copy, the counterfeiter would further be left with no means to identify the original article as an authentic article through the use of the method according to the invention.
- the method of the invention more efficiently deters counterfeiting of articles.
- the method disclosed in European patent EP 1 204 078 solves the same above-described problem in view of the prior art, i.e. providing a method which is more efficient in deterring counterfeiting of articles.
- the proposed solution is different.
- the method disclosed in EP 1 204 078 consists in adding a geographical verification by comparing the article's position to the area attributed to the article. This prior art solution is based on the assumption according to which, if an authentication query relating to a given article comes from an area far away from the predetermined area associated with the article, this is likely to indicate fraud activities carried out in relation with the article, i.e. counterfeiting.
- the method according to the invention deters counterfeiting of articles wherever counterfeiting is carried out, and not only far away from a predetermined area.
- the method according to the invention deters counterfeiting and constitutes a technical tool that leads to an improved atmosphere of mutual confidence amongst the actors on the luxury goods market, i.e. brand owners, manufacturers, importers, retailers, buyers, sellers, etc.
- the method according to the invention may be used to deter insurance fraud and false insurance claims.
- an insurance company may require the article owner to provide the certificate (and the certificate reference) as well as the owner reference as a condition for receiving any compensation. If the claimant does not provide a valid triplet, the insurer would not award him any compensation. If the claimant is able to do so, the insurer may change the owner reference and may award the claimant with a compensation while being reassured that the article cannot be sold anymore as an authentic article.
- prestige and values of goods may be improved thanks to the method and system according to the invention.
- the certificate is provided with conventional security features, such as holograms, fine printed patterns, magnetic strips, to make it difficult to copy.
- security features such as holograms, fine printed patterns, magnetic strips, to make it difficult to copy.
- the data storing means according to the invention is secure in such a manner as to make it impossible, or very difficult at least, to obtain a valid triplet consisting of an article reference, a certificate reference and an owner reference, without the required permissions.
- the invention also relates to an above-described system for deterring counterfeiting further including electrical, electronic or computer receiving means for receiving a query including an article reference, a certificate reference and an owner reference; electrical, electronic or computer checking means for checking whether the article reference, the certificate reference and the owner reference match in the database; and electrical, electronic or computer returning means for returning, if the article reference, the certificate reference and the owner reference match, a first signal.
- the article reference and its corresponding certificate reference are not derivable or substantially not derivable for one another. To this end, they may be randomly chosen.
- Fig. 1 a schematic flow chart representation
- Fig. 3 a schematic view of the inputs.
- the method for deterring counterfeiting of articles 24 may be applied to any kind of articles, objects, items, products, merchandises, consumer goods, trademarked goods or branded luxury goods which are transferable and capable of being owned, in particular valuable articles, such as handbags, purses, luggages, watches, pens, garments, jewelry, belts, bracelets, pendants, chains, diamonds, art objects, paintings, sport collectibles, autograph memorabilities, accessories, bottles of wine, or the like.
- the method includes the steps of providing 2 each article 24 with an article reference 26; providing 4 each article 24 with a certificate 28; and providing 6 each certificate 28 with a certificate reference 30. These steps need not necessarily be carried out according to the sequence illustrated in Fig. 1.
- the article reference 26, certificate reference 30 and owner reference 32 (see below), whatever the names by which they are called, for instance respectively "product code” or “product key”, “certification code” or “private key” and “password”, may be numbers, words, alphanumeric expressions, keys, codes or any string or combination of signs, characters, letters, digits or ideograms.
- the article reference 26 and certificate reference 30 may also be patterns such as bar code, two-dimensional or three-dimensional patterns capable of being recognized by mechanical, electrical, electronic or computer means. They are affixed or attached respectively to the article 24 or certificate 28, by any kind of fastening means. That is, they may for instance be imprinted, embossed, engraved, directly or indirectly affixed or attached, fastened with an adhesive material, such as glue or tape, with a chain, a cord, clips, staples, magnetic fastening means, or the like. They may also be magnetically, electronically stored on or in the article 24 or certificate 28, or in a integrated circuit or microchip fastened to the article 24 or certificate 28.
- the article reference 26 and certificate reference 30 may physically be provided by the manufacturer or later on by the brand owner or retailer for instance. This may be done through a random number generator algorithm, or through a dedicated algorithm.
- the article reference 26 is attached or affixed to the article 24 so as to mark it in a substantially lasting manner.
- the article reference 26 is not intended to change.
- the certificate 28 serves as a support for the certificate reference 30 and may be a simple voucher or alternatively a more elaborate item.
- the certificate reference 30 is not intended to change, and needs not be kept secret.
- the method further includes the step of providing 8 data storing means 38 with each article reference 26, the corresponding certificate reference 30 and a corresponding substitutable owner reference 32.
- the data storing means 38 may for instance be a database, a computer file or a register, and may for instance be accessible through a computer, a telephone network or any remote communication channel.
- the data storing means 38 may contain further optional fields besides the article reference field, the certificate reference field and the owner reference field.
- Optional fields may include a field indicating whether or not the pair has already been attributed (this is particularly useful if the article and certificate references are attributed prior to the article manufacture), a field describing the article and/or its status.
- Data storing means may be brand-specific or general purpose oriented.
- the owner reference 32 is intended to be kept secret by the owner of the article 24. It may be substituted or modified any number of times. In one embodiment of the invention, the owner reference 32 is conditionally substitutable provided that a matching triplet exists, as illustrated with reference to Fig. 2 (see below).
- Owner references 32 may be memorizable strings of letters, of numbers, of combined letters and numbers, or of any other signs as described above, whatever is the length of the string. They may also be patterns which are not intended to be memorized such as signature patterns, fingerprints, eye retinas and irises, voice patterns, facial patterns, hand measurements, genetic fingerprints or any physical characteristics used to identify individuals in the field of biometrics. They may also be any types of digital signature saved on any type of medium, for instance a digital signature stored on an electronic ID card.
- any party may query the data storing means 38, for instance by sending an HTTP request to a dedicated web server.
- the step of receiving 10 the triplet of references, i.e. the article reference 26, the certificate reference 30 and the owner reference 32, may take place at any time whenever necessary or desired, not only when an article 24 is transferred or sold.
- the method includes a step of checking 12 whether the three references match in the database 38.
- Checking 12 may for instance consist in transforming the HTTP request into a data retrieval operation, beginning a database transaction, executing the query, for instance an SQL SELECT query, and committing the transaction. If a row comprising the three submitted references exists in the corresponding columns of the database, then the references match.
- the step of returning 14 a first signal is carried out. This may prompt a client computer to display a message indicating that the article reference 26 and the certificate reference 30 match, and that the article is deemed to be authentic.
- the step of returning 16 a second signal is carried out. This may prompt a client computer to display a message indicating that the correspondence between the article reference 26 and the certificate reference 30 cannot be verified. Alternatively, returning no signal may be possible.
- Fig. 2 illustrates another embodiment of the method according to the invention, further including a step of returning 18 along with the first signal, or shortly after the first signal is returned or within a given session, a third signal indicating the possibility of replacing the owner reference.
- the method includes the steps of receiving 20 a new owner reference; and a step of substituting 22 the owner reference 32 in the data storing means 38 with the new owner reference.
- An SQL UPDATE query may for instance be used for the substitution.
- the embodiment illustrated in Fig. 2 provides an owner reference substitution method or a new owner reference recording method. As soon as the transfer from a first to a second party has been enacted by the substitution of owner references, only a person knowing the owner reference 32 can verify the correspondence between the article reference 26 and the certificate reference 30, or in other words the article's 24 authenticity.
- Fig. 4 illustrates a schematic representation of an embodiment of the system according to the invention where the receiving means 34, the checking means 36, the data storing means 38 and the returning means 40 are illustrated by black boxes.
- a query containing the triplets of references is transmitted 10 via a network to the receiving means 34.
- the checking means 36 query the data storing means 38, for instance by establishing a transaction database and by executing an SQL SELECT query.
- the returning means 40 transforms the physical bits such that either a first signal or a second signal is returned on the network, according to whether or not the triplet exists in the database 38.
- the receiving means 34, the checking means 36, the data storing means 38 and the returning means 40 may for instance be implemented through a microprocessor with a central processing unit (CPU) and a memory unit.
- CPU central processing unit
- either the system or the method in the cases where several triplets are successively received 10 from the same location or origin, or in the cases said triplets relates to the same pair of article and certificate references, the method and the system may be configured to cause a delay or threshold mechanism to be initiated, in order to deter brute force attacks or the like. Since temporary denial of service in relation to a particular article may occur, this mechanism should only be carried out under certain conditions, for instance if the certificate reference 30 is not public, according to the data storing means' proprietor desire.
- IP addresses are recorded to track a person trying to crack the system.
- each article reference 26 and/or certificate reference 30 are unique, that is, unique in the data storing means 38.
- each certificate reference 30 is different from the corresponding article reference 26. This does not prohibit however an article reference 26 from being identical to a certificate reference 30 which corresponds to another article reference 26.
- the step of providing 8 the data storing means 38 with each article reference 26, the corresponding certificate reference 30 and a corresponding substitutable owner reference 32 further includes providing the data storing means 38 with at least a fourth reference.
- the further steps of receiving 10, checking 12 and returning 14,16 apply mutatis mutandis.
- the nth reference, n being equal or larger than 4 serves to enable the validation of the (n-2)th and (n-1)th references.
- steps of receiving 10, returning 14,16 and checking 12 may be carried through a public or private network, via any transmission protocol, and through a secure communication or not. Data phone communications or SMS messages may also be used.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The invention relates to a method for deterring counterfeiting of articles (24), for instance valuable articles (24), including providing (2) each article (24) with an article reference (26) attached thereto; providing (4) each article (24) with a certificate (28); providing (6) each certificate (28) with a certificate reference (30) attached thereto; and providing (8) a database (38) with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32). The method further includes receiving (10), through electronic or computer means, an article reference (26), a certificate reference (30) and a substitutable owner reference (32); checking (12) whether the article reference (26), the certificate reference (30) and an owner reference (32) match in the database (38); and, if the article reference (26), the certificate reference (30) and the owner reference (32) match, returning (14) a first signal. The invention also relates to a system for deterring counterfeiting of articles (24).
Description
- The invention relates to a method for deterring counterfeiting of articles, for instance valuable articles, including the steps of providing each article with an article reference affixed or attached thereto; providing each article with a certificate; providing each certificate with a certificate reference affixed or attached thereto; and providing data storing means with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
- The invention also relates to a system for deterring counterfeiting of articles, for instance valuable articles, including articles and certificates, wherein each article is provided with an article reference affixed or attached thereto; each article is provided with a certificate; each certificate is provided with a certificate reference affixed or attached thereto; and further including data storing means provided with each article reference, the corresponding certificate reference and a corresponding substitutable owner reference.
- Such methods and systems are known from the art. For instance, the
European patent application EP 0 957 459 A1 discloses a system for verifying ownership of articles, based on attributing a unique article number and a certificate to each article. The certificate carries an individual certification number different from the article number. A central computer with a storage contains a list of matching pairs of article and certification numbers. The system can be queried by entering both the article and certification numbers. The system then returns an indication of whether the two numbers match or not. If they match, the article is considered to be authentic. - In one embodiment of the above-referred prior art system, a storage is provided for storing a current owner or an owner history for each article. Additionally, access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database.
- The methods and systems of the art, such as the system described above, are neither immune to counterfeiting nor are they efficiently deterring counterfeiting. Indeed, a counterfeiter may still copy any number of times both the article and the certificate along with their article and certification numbers. Interrogating the database returns that the two numbers match even though the article and certificate are both forgeries.
- It is an object of the invention to provide a method and a system which more efficiently deter counterfeiting of articles.
- To this end, the method further includes the steps of receiving, through electrical, electronic or computer means, a query including an article reference, a certificate reference and an owner reference; checking, through electrical, electronic or computer means, whether the article reference, the certificate reference and the owner reference match in the data storing means; and if they match, returning, through electrical, electronic or computer means, a first signal.
- When the first signal is returned, the article may be said to be authentic or identified as authentic. In the description, the expressions "the first signal is returned" or "the article is identified as authentic" are used indifferently to refer to what results from the situation in which the article reference, the certificate reference and the owner reference match.
- When the method and device disclosed in
EP 0 957 459 A1 are put into operation on a class of articles, said method and device neither prevent nor deter a counterfeiter from copying both the article and the certificate along with their respective reference, in which case each counterfeited pair of article and certificate are identified as an authentic pair. Indeed, when an article number and a certification number are received, means are provided for verifying in a storage whether said numbers are attributed to the same article. The means indifferently return a signal indicating that the article number and a certification number match whether or not the article and the certificate are genuine, and whoever sends the query to the database. - In the method and device of the prior art, there is no means for deterring counterfeiting of articles in case when both the article and the certificate are copied along with their respective article and certificate numbers. Providing a storage with the current owner or the owner history for each article does not constitute, on the one hand, sufficiently efficient deterring means, and it may raise privacy concerns on the other hand. This feature does not efficiently deter counterfeiting of articles since any person may verify whether a pair of article and certificate numbers match in the database, and said person would then obtain an indication that the article is authentic even though it is actually not. Privacy concerns may also be raise since anyone may obtain information about the owner of a given article and since the owner needs to reveal its identity to prove to a third party that the article is authentic, something which may not be desirable in many situations.
- Additionally, in the prior art system, access privilege is attributed, i.e. only the current owner is allowed to enter a transferral of ownership into the database. This does not alter the fact that if a pair of article and certificate numbers match in the data base, the system returns an indication that the article is authentic.
- In contrast, when the method according to the invention is put into operation, three references are required to obtain the first signal, i.e. a signal indicating that the article is authentic. Receiving two of the three references does not make it possible to obtain information regarding an article's authenticity.
- When a party purchases an authentic article from a trusted retailer, he receives a certificate and a owner reference (or password). In the event the party copies the article and the certificate, he might then be able to sell the forged article and forged certificate as if they were the original authentic article and certificate. The party, who may be called "the counterfeiter", may do so, in the presence of the potential purchaser, by sending a query to the data storing means. The first signal would then be returned, indicating that the article is deemed to be authentic. The purchaser would then be confident that the article is authentic and he would then substitute the current password (the current owner reference) with his own password (his own owner reference). The owner reference is indeed capable of being substituted in the data storing means.
- Once the owner reference has been modified by the purchaser, the counterfeiter would be left with no means anymore to prove that a pair of article and certificate references are authentic. In other words, the counterfeiter would have no means anymore to indicate an article's authenticity by sending a query to the data storing means.
- The counterfeiter would be left with no possibility to utter yet another forged article with the same pair of article reference and certificate reference. An in the event the counterfeiter had bought an original article to forge the copy, the counterfeiter would further be left with no means to identify the original article as an authentic article through the use of the method according to the invention.
- Accordingly, the method of the invention more efficiently deters counterfeiting of articles.
- The method disclosed in
solves the same above-described problem in view of the prior art, i.e. providing a method which is more efficient in deterring counterfeiting of articles. However, the proposed solution is different. The method disclosed inEuropean patent EP 1 204 078 consists in adding a geographical verification by comparing the article's position to the area attributed to the article. This prior art solution is based on the assumption according to which, if an authentication query relating to a given article comes from an area far away from the predetermined area associated with the article, this is likely to indicate fraud activities carried out in relation with the article, i.e. counterfeiting.EP 1 204 078 - The method according to the invention deters counterfeiting of articles wherever counterfeiting is carried out, and not only far away from a predetermined area. The method according to the invention deters counterfeiting and constitutes a technical tool that leads to an improved atmosphere of mutual confidence amongst the actors on the luxury goods market, i.e. brand owners, manufacturers, importers, retailers, buyers, sellers, etc.
- As a further advantage, the method according to the invention may be used to deter insurance fraud and false insurance claims. In case of theft of an article provided with a given article reference, an insurance company may require the article owner to provide the certificate (and the certificate reference) as well as the owner reference as a condition for receiving any compensation. If the claimant does not provide a valid triplet, the insurer would not award him any compensation. If the claimant is able to do so, the insurer may change the owner reference and may award the claimant with a compensation while being reassured that the article cannot be sold anymore as an authentic article.
- As a further advantage, prestige and values of goods may be improved thanks to the method and system according to the invention.
- In one embodiment of the invention, the certificate is provided with conventional security features, such as holograms, fine printed patterns, magnetic strips, to make it difficult to copy. These additional security provisions are not indispensable however, in contrast with the prior art method disclosed in
EP 0 957 459 . The certificate according to the invention may be structurally very simple. - In one embodiment of the invention, the data storing means according to the invention is secure in such a manner as to make it impossible, or very difficult at least, to obtain a valid triplet consisting of an article reference, a certificate reference and an owner reference, without the required permissions.
- The invention also relates to an above-described system for deterring counterfeiting further including electrical, electronic or computer receiving means for receiving a query including an article reference, a certificate reference and an owner reference; electrical, electronic or computer checking means for checking whether the article reference, the certificate reference and the owner reference match in the database; and electrical, electronic or computer returning means for returning, if the article reference, the certificate reference and the owner reference match, a first signal.
- In one embodiment of the invention, the article reference and its corresponding certificate reference are not derivable or substantially not derivable for one another. To this end, they may be randomly chosen.
- These and further aspects of the invention will be explained in greater detail by way of example and with reference to the accompanying drawings in which :
- Fig.1 shows a schematic flow chart representation of an embodiment of the method according to the invention;
- Fig.2 shows a schematic flow chart representation of another embodiment of the method according to the invention;
- Fig.3 shows a schematic view of the inputs of an embodiment of the method according to the invention; and
- Fig.4 shows a schematic representation of an embodiment of the system according to the invention.
- The figures are not drawn to scale. Generally, identical components are denoted by the same reference numerals in the figures.
- An embodiment of the method according to the invention will be now described with reference to both Fig. 1, a schematic flow chart representation, and Fig. 3, a schematic view of the inputs.
- The method for deterring counterfeiting of
articles 24 may be applied to any kind of articles, objects, items, products, merchandises, consumer goods, trademarked goods or branded luxury goods which are transferable and capable of being owned, in particular valuable articles, such as handbags, purses, luggages, watches, pens, garments, jewelry, belts, bracelets, pendants, chains, diamonds, art objects, paintings, sport collectibles, autograph memorabilities, accessories, bottles of wine, or the like. - The method includes the steps of providing 2 each
article 24 with anarticle reference 26; providing 4 eacharticle 24 with acertificate 28; and providing 6 eachcertificate 28 with acertificate reference 30. These steps need not necessarily be carried out according to the sequence illustrated in Fig. 1. Thearticle reference 26,certificate reference 30 and owner reference 32 (see below), whatever the names by which they are called, for instance respectively "product code" or "product key", "certification code" or "private key" and "password", may be numbers, words, alphanumeric expressions, keys, codes or any string or combination of signs, characters, letters, digits or ideograms. - The
article reference 26 andcertificate reference 30 may also be patterns such as bar code, two-dimensional or three-dimensional patterns capable of being recognized by mechanical, electrical, electronic or computer means. They are affixed or attached respectively to thearticle 24 orcertificate 28, by any kind of fastening means. That is, they may for instance be imprinted, embossed, engraved, directly or indirectly affixed or attached, fastened with an adhesive material, such as glue or tape, with a chain, a cord, clips, staples, magnetic fastening means, or the like. They may also be magnetically, electronically stored on or in thearticle 24 orcertificate 28, or in a integrated circuit or microchip fastened to thearticle 24 orcertificate 28. - The
article reference 26 andcertificate reference 30 may physically be provided by the manufacturer or later on by the brand owner or retailer for instance. This may be done through a random number generator algorithm, or through a dedicated algorithm. - The
article reference 26 is attached or affixed to thearticle 24 so as to mark it in a substantially lasting manner. Thearticle reference 26 is not intended to change. - The
certificate 28 serves as a support for thecertificate reference 30 and may be a simple voucher or alternatively a more elaborate item. Thecertificate reference 30 is not intended to change, and needs not be kept secret. - The method further includes the step of providing 8 data storing means 38 with each
article reference 26, the correspondingcertificate reference 30 and a correspondingsubstitutable owner reference 32. The data storing means 38 may for instance be a database, a computer file or a register, and may for instance be accessible through a computer, a telephone network or any remote communication channel. The data storing means 38 may contain further optional fields besides the article reference field, the certificate reference field and the owner reference field. Optional fields may include a field indicating whether or not the pair has already been attributed (this is particularly useful if the article and certificate references are attributed prior to the article manufacture), a field describing the article and/or its status. Data storing means may be brand-specific or general purpose oriented. - The
owner reference 32, or password, is intended to be kept secret by the owner of thearticle 24. It may be substituted or modified any number of times. In one embodiment of the invention, theowner reference 32 is conditionally substitutable provided that a matching triplet exists, as illustrated with reference to Fig. 2 (see below). Owner references 32 may be memorizable strings of letters, of numbers, of combined letters and numbers, or of any other signs as described above, whatever is the length of the string. They may also be patterns which are not intended to be memorized such as signature patterns, fingerprints, eye retinas and irises, voice patterns, facial patterns, hand measurements, genetic fingerprints or any physical characteristics used to identify individuals in the field of biometrics. They may also be any types of digital signature saved on any type of medium, for instance a digital signature stored on an electronic ID card. - Once the four initialization or configuration steps have been performed, any party may query the data storing means 38, for instance by sending an HTTP request to a dedicated web server. The step of receiving 10 the triplet of references, i.e. the
article reference 26, thecertificate reference 30 and theowner reference 32, may take place at any time whenever necessary or desired, not only when anarticle 24 is transferred or sold. - After the step of receiving 10 the triplet, the method includes a step of checking 12 whether the three references match in the
database 38. Checking 12 may for instance consist in transforming the HTTP request into a data retrieval operation, beginning a database transaction, executing the query, for instance an SQL SELECT query, and committing the transaction. If a row comprising the three submitted references exists in the corresponding columns of the database, then the references match. - If the references exist in a row, if they match, the step of returning 14 a first signal is carried out. This may prompt a client computer to display a message indicating that the
article reference 26 and thecertificate reference 30 match, and that the article is deemed to be authentic. - Otherwise, the step of returning 16 a second signal is carried out. This may prompt a client computer to display a message indicating that the correspondence between the
article reference 26 and thecertificate reference 30 cannot be verified. Alternatively, returning no signal may be possible. - Fig. 2 illustrates another embodiment of the method according to the invention, further including a step of returning 18 along with the first signal, or shortly after the first signal is returned or within a given session, a third signal indicating the possibility of replacing the owner reference. In one embodiment, the method includes the steps of receiving 20 a new owner reference; and a step of substituting 22 the
owner reference 32 in the data storing means 38 with the new owner reference. An SQL UPDATE query may for instance be used for the substitution. - In other words, the embodiment illustrated in Fig. 2 provides an owner reference substitution method or a new owner reference recording method. As soon as the transfer from a first to a second party has been enacted by the substitution of owner references, only a person knowing the
owner reference 32 can verify the correspondence between thearticle reference 26 and thecertificate reference 30, or in other words the article's 24 authenticity. - Fig. 4 illustrates a schematic representation of an embodiment of the system according to the invention where the receiving means 34, the checking means 36, the data storing means 38 and the returning
means 40 are illustrated by black boxes. A query containing the triplets of references is transmitted 10 via a network to the receiving means 34. The checking means 36 query the data storing means 38, for instance by establishing a transaction database and by executing an SQL SELECT query. Then the returningmeans 40 transforms the physical bits such that either a first signal or a second signal is returned on the network, according to whether or not the triplet exists in thedatabase 38. - The receiving means 34, the checking means 36, the data storing means 38 and the returning
means 40 may for instance be implemented through a microprocessor with a central processing unit (CPU) and a memory unit. - In one embodiment of the invention, either the system or the method, in the cases where several triplets are successively received 10 from the same location or origin, or in the cases said triplets relates to the same pair of article and certificate references, the method and the system may be configured to cause a delay or threshold mechanism to be initiated, in order to deter brute force attacks or the like. Since temporary denial of service in relation to a particular article may occur, this mechanism should only be carried out under certain conditions, for instance if the
certificate reference 30 is not public, according to the data storing means' proprietor desire. In one embodiment, IP addresses are recorded to track a person trying to crack the system. - In one embodiment, each
article reference 26 and/orcertificate reference 30 are unique, that is, unique in the data storing means 38. - In one embodiment, each
certificate reference 30 is different from thecorresponding article reference 26. This does not prohibit however anarticle reference 26 from being identical to acertificate reference 30 which corresponds to anotherarticle reference 26. - In one embodiment of the method according to the invention, the step of providing 8 the data storing means 38 with each
article reference 26, the correspondingcertificate reference 30 and a correspondingsubstitutable owner reference 32 further includes providing the data storing means 38 with at least a fourth reference. In this embodiment, the further steps of receiving 10, checking 12 and returning 14,16 apply mutatis mutandis. In one embodiment, the nth reference, n being equal or larger than 4, serves to enable the validation of the (n-2)th and (n-1)th references. These embodiments provides increased security guarantees. - It will be clear for the person skilled in the art that the steps of receiving 10, returning 14,16 and checking 12, may be carried through a public or private network, via any transmission protocol, and through a secure communication or not. Data phone communications or SMS messages may also be used.
- It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. The invention resides in each and every novel characteristic feature and each and every combination of characteristic features.
Claims (10)
- Method for deterring counterfeiting of articles (24), including the steps of
providing (2) each article (24) with an article reference (26) affixed or attached thereto;
providing (4) each article (24) with a certificate (28);
providing (6) each certificate (28) with a certificate reference (30) affixed or attached thereto; and
providing (8) data storing means (38) with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32);
characterized in that the method further includes the steps of
receiving (10), through electrical, electronic or computer means, an article reference (26), a certificate reference (30) and an owner reference (32);
checking (12), through electrical, electronic or computer means, whether the article reference (26), the certificate reference (30) and the owner reference (32) match in the data storing means (38); and
if they match, returning (14), through electrical, electronic or computer means, a first signal. - Method according to claim 1, characterized in that the method further includes the steps of
if the article reference (26), the certificate reference (30) and the owner reference (32) do not match, returning (16), through electrical, electronic or computer means, a second signal. - Method according to claim 1 or 2, further including the steps of, if the first signal is returned (14),
returning (18), through electrical, electronic or computer means, along with the first signal, a third signal indicating the possibility of replacing the owner reference (32). - Method according to claim 3, further including the steps of, after returning (18) the third signal,
receiving (20), through electrical, electronic or computer means, a new owner reference;
replacing (22), through electrical, electronic or computer means, the owner reference (32) in the data storing means (38) with the new owner reference. - Method according to any one of preceding claims, wherein each article reference (26) is unique in the data storing means (38).
- Method according to any one of preceding claims, wherein each certificate reference (30) is unique in the data storing means (38).
- Method for deterring counterfeiting of articles (24),
each article (24) being provided with an article reference (26) affixed or attached thereto and further provided with a certificate (28);
each certificate being provided (28) with a certificate reference (30) affixed or attached thereto; and
data storing means (38) being provided with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32);
characterized in that the method includes the steps of
receiving (10), through electrical, electronic or computer means, an article reference (26), a certificate reference (30) and an owner reference (32);
checking (12), through electrical, electronic or computer means, whether the article reference (26), the certificate reference (30) and the owner reference (32) match in the data storing means (38); and
if they match, returning (14), through electrical, electronic or computer means, a first signal. - System for deterring counterfeiting of articles (24), for instance valuable articles (24), including
articles (24) and certificates (30), wherein
each article (24) is provided with an article reference (26) affixed or attached thereto;
each article (24) is provided with a certificate (28);
each certificate (28) is provided with a certificate reference (30) affixed or attached thereto; and
data storing means (38) provided with each article reference (26), the corresponding certificate reference (30) and a corresponding substitutable owner reference (32);
characterized in that the system further includes
electrical, electronic or computer receiving means (34) for receiving an article reference (26), a certificate reference (30) and an owner reference (32);
electrical, electronic or computer checking means (36) for checking whether the article reference (26), the certificate reference (30) and the owner reference (32) match in the data storing means (38); and
electrical, electronic or computer returning means (40) for returning, if they match, a first signal. - System according to claim 8, returning means return, if the article reference (26), the certificate reference (30) and the owner reference (32) do not match, a second signal.
- System according to claim 8 or 9, configured to cause a delay or threshold mechanism to be initiated when several triplets of article reference (26), certificate reference (30) and owner reference (32) are successively received 10 from the same location or origin, or in the cases said triplets relates to the same pair of article and certificate references.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP05104325A EP1727096A1 (en) | 2005-05-23 | 2005-05-23 | Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor |
| PCT/EP2006/062474 WO2006125757A1 (en) | 2005-05-23 | 2006-05-19 | Information security method and system for deterring counterfeiting of articles. |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP05104325A EP1727096A1 (en) | 2005-05-23 | 2005-05-23 | Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP1727096A1 true EP1727096A1 (en) | 2006-11-29 |
Family
ID=34939927
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP05104325A Withdrawn EP1727096A1 (en) | 2005-05-23 | 2005-05-23 | Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor |
Country Status (1)
| Country | Link |
|---|---|
| EP (1) | EP1727096A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0957459A1 (en) * | 1998-05-12 | 1999-11-17 | Orell Füssli Graphische Betriebe AG | Method and device for verifying ownership of articles |
| DE10019721A1 (en) * | 1999-08-25 | 2001-03-01 | Giesecke & Devrient Gmbh | Product assurance procedures |
| WO2002073510A1 (en) * | 2001-03-14 | 2002-09-19 | Orell Füssli Security Documents AG | Method for providing identification codes for articles |
| US20040267711A1 (en) * | 2001-10-25 | 2004-12-30 | Zhu Xiao Jun | Method and system for authenticating a package good |
-
2005
- 2005-05-23 EP EP05104325A patent/EP1727096A1/en not_active Withdrawn
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0957459A1 (en) * | 1998-05-12 | 1999-11-17 | Orell Füssli Graphische Betriebe AG | Method and device for verifying ownership of articles |
| DE10019721A1 (en) * | 1999-08-25 | 2001-03-01 | Giesecke & Devrient Gmbh | Product assurance procedures |
| WO2002073510A1 (en) * | 2001-03-14 | 2002-09-19 | Orell Füssli Security Documents AG | Method for providing identification codes for articles |
| US20040267711A1 (en) * | 2001-10-25 | 2004-12-30 | Zhu Xiao Jun | Method and system for authenticating a package good |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230010172A1 (en) | Tracking apparel items using distributed ledgers | |
| US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
| KR101276902B1 (en) | Method and device for obtaining item information using rfid tags | |
| US8566598B2 (en) | Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication | |
| JP4608014B2 (en) | Article processing method | |
| US20160098730A1 (en) | System and Method for Block-Chain Verification of Goods | |
| US20140095398A1 (en) | Double ID Anti-Counterfeit Method and System | |
| US20210090011A1 (en) | Identifying and Tracking System for Searching Items | |
| CA2891654A1 (en) | System for authenticating items | |
| WO2017116303A1 (en) | Secure dual-mode anti-counterfeit product authentication methodology and system | |
| US20140324716A1 (en) | Method and system for deterring product counterfeiting | |
| US20030179902A1 (en) | Authentication and anti-counterfeit tracking system | |
| US11810179B2 (en) | Method for tracking products using distributed, shared registration bases and random numbers generated by quantum processes | |
| WO1999051445A1 (en) | Method for deterring forgeries and authenticating signatures | |
| WO2005083644A1 (en) | Method and system for verifying the authenticity of goods | |
| US20060020803A1 (en) | Systems and methods for authentication of items or documents | |
| US10599898B2 (en) | Warranty tracking method for a consumer product | |
| EP0957459A1 (en) | Method and device for verifying ownership of articles | |
| JP2009524128A (en) | Authentication method for products placed in circulation | |
| EP1727096A1 (en) | Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor | |
| US20080270306A1 (en) | System and method of theft detection of encoded encrypted software keyed genuine goods | |
| WO2006125757A1 (en) | Information security method and system for deterring counterfeiting of articles. | |
| CN114154997A (en) | Method and system for registering and authenticating items | |
| US20250378145A1 (en) | System for linking physical products to blockchain-connected digital entities and authentication of the physical products | |
| JP3033522B2 (en) | Buyer confirmation method and purchaser service provision method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
| AKX | Designation fees paid | ||
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20070530 |