[go: up one dir, main page]

WO2024100444A1 - System and method for anti-counterfeit authentication using a combination of non-fungible token and near-field communication - Google Patents

System and method for anti-counterfeit authentication using a combination of non-fungible token and near-field communication Download PDF

Info

Publication number
WO2024100444A1
WO2024100444A1 PCT/IB2022/062861 IB2022062861W WO2024100444A1 WO 2024100444 A1 WO2024100444 A1 WO 2024100444A1 IB 2022062861 W IB2022062861 W IB 2022062861W WO 2024100444 A1 WO2024100444 A1 WO 2024100444A1
Authority
WO
WIPO (PCT)
Prior art keywords
product
nfc
module
unique identifier
message
Prior art date
Application number
PCT/IB2022/062861
Other languages
French (fr)
Inventor
Manish Gautam
Original Assignee
Manish Gautam
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Manish Gautam filed Critical Manish Gautam
Publication of WO2024100444A1 publication Critical patent/WO2024100444A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Definitions

  • Embodiments of the present disclosure relate to the field of anti-counterfeiting consumer products, and more particularly, an anti-counterfeit system and a method for authenticating a physical item using a combination of non-fungible token (NFT) and near-field communication (NFC).
  • NFT non-fungible token
  • NFC near-field communication
  • NFC near-field communication
  • an anti-counterfeit system for authenticating a product using a combination of non-fungible token and a near-field communication.
  • the anti-counterfeit system comprises a processing subsystem hosted on a server.
  • the processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules.
  • the processing subsystem includes a receiving module is configured to receive a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product.
  • the product is embedded with an NFC tag comprising a unique identifier that is pre-programmed.
  • a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag.
  • the receiving module is also configured to generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module.
  • the NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code
  • the processing subsystem includes a decrypting module operatively coupled to the receiving module wherein the decrypting module is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address.
  • the processing subsystem includes a verifying module operatively coupled to the decoding module wherein the verifying module is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture, and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product.
  • the processing subsystem includes a feedback module operatively coupled to the verifying module wherein the feedback module is configured to send an authenticated message to the user upon verification of the product.
  • an anti-counterfeit method for authenticating a product using a combination of non-fungible token and a near-field communication includes receiving, by a receiving module of a processing subsystem, receive a request from a NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product purchased by a user, wherein the product is embedded with a NFC tag comprising a unique identifier that is preprogrammed and wherein a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag.
  • the method also includes generating, by the receiving module of the processing subsystem, an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag () and the decrypting module. Further, the method includes decrypting, by a decrypting module of the processing subsystem, the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token () on the blockchain address that comprises the NFT link to the physical item.
  • the method includes validating, by a verifying module of the processing subsystem, the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture. Moreover, the method includes matching, by the verifying module of the processing subsystem, the details of the product upon retrieving with the unique identifier to determine the authenticity of the product. The method includes sending, by a feedback module of the processing subsystem, an authenticated message to the user upon verification of the product.
  • FIG. 1 is a block diagram of an anti-counterfeit system for authenticating a product using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure;
  • NFT non-fungible token
  • NFC near-field communication
  • FIG. 2 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure
  • FIG. 3 is a schematic representation of data exchange in an anti-counterfeit system in accordance with an embodiment of the present disclosure
  • FIG. 4 is a schematic representation of access permission in an anti-counterfeit system in accordance with an embodiment of the present disclosure
  • FIG. 5 is a schematic representation of an NFC tag writing technique (500) in accordance with an embodiment of the present disclosure.
  • FIG. 6 illustrates a flow chart representing the steps involved in a method for anti-counterfeit authentication using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure.
  • NFT non-fungible token
  • NFC near-field communication
  • an anti -counterfeit system for authenticating a product using a combination of non-fungible token and a near-field communication.
  • the anti-counterfeit system comprises a processing subsystem hosted on a server.
  • the processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules.
  • the processing subsystem includes a receiving module is configured to receive a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product.
  • the product is embedded with an NFC tag comprising a unique identifier that is pre-programmed.
  • a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag.
  • the receiving module is also configured to generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module.
  • the NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code
  • the processing subsystem includes a decrypting module operatively coupled to the receiving module wherein the decrypting module is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address.
  • the processing subsystem includes a verifying module operatively coupled to the decoding module wherein the verifying module is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture, and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product.
  • the processing subsystem includes a feedback module operatively coupled to the verifying module wherein the feedback module is configured to send an authenticated message to the user upon verification of the product.
  • FIG. 1 is a block diagram of an anti-counterfeit system (100) for authenticating a product (110) using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure.
  • the anti-counterfeit system (100) includes a processing subsystem (105) hosted on a server (108).
  • the server (108) may include a cloud server.
  • parts of the server (108) may be a local server coupled to a user device (120).
  • the server (108) may include a local server.
  • the processing subsystem ( 105) is configured to execute on a network ( 115) to control bidirectional communications among a plurality of modules.
  • the network (115) may include both wired and wireless communications according to one or more standards and/or via one or more transport.
  • the network (115) may include a wireless network such as Wi-Fi, Bluetooth, Zigbee, near field communication (NFC), infra-red communication (RFID) or the like.
  • the network (115) may also include communications over a terrestrial cellular network, including, a global system for mobile communications (GSM), code division multiple access (CDMA), and/or enhanced data for global evolution (EDGE) network.
  • GSM global system for mobile communications
  • CDMA code division multiple access
  • EDGE enhanced data for global evolution
  • the anti-counterfeit system (100) includes a receiving module (140) operatively coupled to the processing subsystem (105).
  • the receiving module (140) is configured to receive a request from an NFC enabled user device (120) to authenticate a product (110) in response to a user (125) tapping the NFC enabled user device (120) on the product (110).
  • Examples of the NFC enabled user device includes smartphones, tablets and the like which can support NFC technology.
  • NFC is a method of wireless data transfer that allows smartphones, laptops, tablets, and the like to share data when in proximity.
  • the product (110) is embedded with an NFC tag when the user (125) purchases the product (110). Examples of the product (110) includes, but is not limited to, food, drinks, drugs, cosmetics, cloths and electronic products.
  • the NFC tag comprises a unique identifier that is pre-programmed.
  • the NFC enabled user device (120) should be able to capture the NFC tag through its input devices (for instance, RFID/ NFC reader and a camera). Further, a unique non-fungible token () is created for the product (110) on a blockchain address (130) and is linked to the NFC tag.
  • the NFC enabled user device (120) may comprise, but is not limited to, a mobile phone, desktop computer, portable digital assistant (PDA), smart phone, tablet, ultra-book, netbook, laptop, multi-processor system, microprocessor -based or programmable consumer electronic system, or any other communication device that a user may use.
  • the NFC enabled user device (120) may comprise a display module (not shown) to display information (for example, in the form of user interfaces).
  • the system may comprise one or more of touch screens, accelerometers, gyroscopes, cameras, microphones, global positioning system (GPS) devices, and so forth.
  • GPS global positioning system
  • the receiving module (140) is configured to generate an NFC data exchange format message (NDEF message) upon receiving the request using NTAG 413.
  • NDEF is a standardized data format which allows a smartphone to read and write data such as URLs, text files and the like on the NFC tag.
  • the NTAG 413 enables dynamic encryption of the NDEF message on the NFC tag. This means, for example, the one of a URL and a plain text file saved as NDEF can be created and encrypted by the tag dynamically. In this way, each time a new, individually encrypted code is created and sent which can be authenticated by the corresponding reader or server.
  • the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device (120) thereby providing a secured communication between the NFC tag (110) and the decrypting module (145).
  • the NDEF message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code.
  • the processing subsystem (105) also comprises a decrypting module (145) operatively coupled to the receiving module (140).
  • the decrypting module (145) is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address.
  • the blockchain address comprises a NFT link to the product.
  • the NFT is digitized information about the product that can be proved to be unique and is not interchangeable because no other product can ever hold the same value.
  • the record of the uniqueness of the NFT exists on a blockchain in which the information is almost impossible to alter.
  • the NFT provides the certificate of ownership to the digital asset.
  • the processing subsystem (105) comprises a verifying module (150) operatively coupled to the decrypting module (145) and is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT. Examples of the details include, but is not limited to, model number, model name, owner name, date of manufacture and time of manufacture.
  • the NFT represents a nonfungible physical asset owned by a seller of the product wherein ownership of the nonfungible physical asset is transferred from the seller to a buyer upon purchase of the product.
  • the verifying module (150) is configured to match the details of the product upon retrieving from the blockchain with the unique identifier of the NFC tag to determine the authenticity of the product.
  • the processing subsystem (105) comprises a tracking module (155) operatively coupled to the verifying module (150) wherein the tracking module (155) is configured to track the frequency of the NFC tag to prevent recurrent usage.
  • the processing subsystem (105) comprises a feedback module (160) operatively coupled to the tracking module (155) wherein the feedback module (160) is configured to send an authenticated message to the user upon verification of the product.
  • the authenticated message comprising the details of the physical item.
  • Example of details includes model number, model name, owner name, date of manufacture, time of manufacture and the like.
  • FIG. 2 is a block diagram representation of a verifying module of FIG. 1 in accordance with an embodiment of the present disclosure
  • FIG. 2 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure.
  • the server (200) includes processor(s) (230), and memory (210) operatively coupled to the bus (220).
  • the processor(s) (230), as used herein, means any type of computational circuit, such as, but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
  • the memory (210) includes several subsystems stored in the form of executable program which instructs the processor (230) to perform the method steps illustrated in FIG. 1.
  • the memory (210) includes a processing subsystem (105) of FIG.l.
  • the processing subsystem (105) further has following modules: a receiving module (140), a decrypting module (145), a verifying module (150), a tracking module (155) and a feedback module (160).
  • a receiving module (140) a decrypting module
  • 145 verifying module
  • 150 a tracking module
  • 160 a feedback module
  • an anti -counterfeit system for authenticating a product using a combination of non-fungible token and a near-field communication is provided.
  • the anti-counterfeit system comprises a processing subsystem hosted on a server.
  • the processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules.
  • the processing subsystem includes a receiving module is configured to receive a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product.
  • the product is embedded with an NFC tag comprising a unique identifier that is pre-programmed.
  • a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag.
  • the receiving module is also configured to generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module.
  • the NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code
  • the processing subsystem includes a decrypting module operatively coupled to the receiving module wherein the decrypting module is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address.
  • the processing subsystem includes a verifying module operatively coupled to the decoding module wherein the verifying module is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture, and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product.
  • the details from the NFC tag are cross referenced with the data stored in the blockchain.
  • the processing subsystem includes a feedback module operatively coupled to the verifying module wherein the feedback module is configured to send an authenticated message to the user upon verification of the product.
  • the bus (220) as used herein refers to be internal memory channels or computer network that is used to connect computer components and transfer data between them.
  • the bus (220) includes a serial bus or a parallel bus, wherein the serial bus transmits data in bit-serial format and the parallel bus transmits data across multiple wires.
  • the bus (220) as used herein may include but not limited to, a system bus, an internal bus, an external bus, an expansion bus, a frontside bus, a backside bus and the like.
  • FIG. 3 is a schematic representation of data exchange in an anti-counterfeit system in accordance with an embodiment of the present disclosure.
  • the process of data exchange takes place between an NFC tag (110), an NFC enabled user device (120), a server (108) and a public blockchain ( 130).
  • a) The process begins when the NFC enabled user device (120) scans the NFC tag (110) embedded on a product. The scanning of the NFC tag generates a dynamic URL. At this point, the URL is rendered to the NFC enabled user device (120) via a browser. The user opens the URL.
  • the NFC tag (110) transmits an encrypted UID, CMAC and a blockchain transition hash key to the NFC enabled user device (120) at step (165).
  • the NFC enabled user device (120) makes an API call to the server in step (170) and subsequently passes the encrypted UID, CMAC and a blockchain transition hash key to the server for decryption at step (175).
  • the server decodes the SUN messages using AES decryption in step (180).
  • the server matches the SUN message and information from the blockchain in step (185).
  • the blockchain validates the product at step (190) and subsequently transmits the details of an owner of the product to the server (195).
  • the server finally transmits the information back to the user that the product is verified at step 200.
  • FIG. 4 is a schematic representation of access permission in an anti-counterfeit system in accordance with an embodiment of the present disclosure.
  • a user owner of a product
  • (125) may access an application (210) that is configured to perform the method disclosed herein.
  • the user taps an NFC tag (110) with an NFC enabled user device (120).
  • the authorization server (108) verifies the user (220).
  • the user scans the NFC tag (110) by tapping the NFC enabled user device (120)
  • the user (125) is provided with an access token and authorization code from the authorization server (230).
  • the user is capable to access data from a resource server (240).
  • the resource server in turn delegates authentication and authorization capabilities to the authorization server (250).
  • FIG. 5 is a schematic representation of an NFC tag writing technique (500) in accordance with an embodiment of the present disclosure.
  • a user typically the owner of a product
  • the application is compatible on a user device (120).
  • the user enters information related to the product for instance, but is not limited to, product name, manufacturing date and owner details (260).
  • the information is uploaded on the server (265) and is subsequently saved in a database upon scanning (270).
  • An NFT token is simultaneously minted on a blockchain address using ERC 721 of ERC 1155 token standard (275).
  • ERC1155 is a multi-token standard that allows the creation of fungible, non- fungible, and semi-fungible tokens all in one contract.
  • ERC- 1155 is a token standard that enables the efficient transfer of fungible and non-fungible tokens in a single transaction.
  • This blockchain address is returned back to the application configured on the user device (280).
  • An NDEF message is generated by the application by using the blockchain address and an AES encryption key (285).
  • This NDEF message is written on the NFC tag and makes it ‘write protected’ (290).
  • the NFC tag is now featured with a ‘read only’ capability with the NFT address linked to it.
  • FIG. 5 illustrates a flow chart representing the steps involved in a method (500) for anti-counterfeit authentication using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure.
  • NFT non-fungible token
  • NFC near-field communication
  • An essential requirement for performing the method disclosed herein is to implant/ embed/ stick an NFC tag on a product while on the manufacturing process. Once the NFC tag had been embedded, it is also essential to mint an NFT on a public blockchain and link the NFT with the NFC tag.
  • the NFC tag is used to secure the physical asset (product) and the NFT is used to secure the digital asset of the product.
  • the public blockchain typically maintains all the data about the product securely.
  • consumer brands may launch the product on meta verse digitally. In another embodiment, the consumer brands may resale the product between multiple consumers. After the product is sold, the consumer may simply tap on the embedded NFC tag with their user device (for instance, smart phone, tablet and the like) to securely communicate information.
  • their user device for instance, smart phone, tablet and the like
  • the method (500) includes receiving a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product purchased by a user by a receiving module of a processing subsystem in step (310).
  • the NFC enabled user device includes smartphones, tablets and the like which can support NFC technology.
  • NFC is a method of wireless data transfer that allows smartphones, laptops, tablets, and the like to share data when in proximity.
  • the product is embedded with an NFC tag comprising a unique identifier that is pre-programmed and wherein a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag.
  • the product may include, but not limited to drugs, cosmetics, cloths, and so on.
  • the NFC tag comprises a unique identifier to determine if a tag is issued by the user wherein the unique identifier is pre-programmed and unique.
  • the method (500) includes generating, by the receiving module of the processing subsystem, an NFC data exchange format (NDEF) message upon receiving the request in step (315).
  • the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module.
  • the NDEF message is cross-referenced with a blockchain identifier (hash key) to retrieve the details of the authenticity of the product. The details include, but is not limited to, model, make, date and time of manufacture.
  • the NDEF message is generated each time the NFC enabled user device is tapped on the product (embedded with the NFC tag) using NTAG 413 and Advanced Encryption Standard (AES) cryptography.
  • the NTAG 413 brings the AES cryptographic authentication and provides an automatic and secure connection. It also introduces a novel security feature called “Secure Unique NFC message (SUN) which automatically generates a tap-unique tag authentication data upon each tap of the NFC enabled user device on the NFC tagged product.
  • SUN Secure Unique NFC message
  • the NFC enabled user device automatically connects to a server and based on the information contained in a URE, the NFC enabled user device checks the authenticity of the NFC tag and verifies the information.
  • an NFC counter is integrated during encryption to generate the unique code for each tap.
  • the NFC counter enables the reading of the NFC tag and therefore a reuse of an old NFC tag is not possible. This feature allows tracking or determining the frequency of the NFC tag.
  • NTAG 424 is used to generate a new NDEF message at every single tap on the NFC tag.
  • the NTAG 424 enable dynamic encryption of NDEF messages on the NFC tag. Consequently, a URE is saved as the NDEF message and is rendered to the NFC enabled user device. Further, the NDEF message is created and encrypted dynamically. Therefore, each time a new encrypted code is created and sent to the server for authentication.
  • the NDEF message comprises Secure Unique NFC (SUN) message, Cipher-based Message Authentication Coe (CMAC) and the blockchain address.
  • SUN Secure Unique NFC
  • CMAC Cipher-based Message Authentication Coe
  • the SUN message is a unique feature of NT AG 424 which ensures a secure communication between the NFC tag and the server by generating a unique code. Each time the NFC tag is tapped, the unique code is generated and sent to the server in real time. The unique code is sent as an URL from the NFC enable user device to the server. Further, the unique code is based on the CMAC information and can be calculated from the NFC tag and/ or the counter. The CMAC information is used to check for authenticity.
  • the NFC tag uses the CMAC information to calculate a MAC code and subsequently sends the MAC code and the NDEF message to the server.
  • the method (500) includes decrypting, by a decrypting module of the processing subsystem, the unique identifier from the NDEF message, wherein the unique identifier references to the non- fungible token on the blockchain address that comprises the NFT link to the physical item in step (320).
  • a unique NFT is created for the product on a public blockchain (for instance Polygon, Ethereum and so on). Subsequently, a corresponding unique identifier (hash key) is stored in a database.
  • the NFC tag and NFT are minted on the blockchain address using Ethereum Request for Comments (ERC) 721 and ERC 1155 wherein the ERC 721 and ERC 1155 to provide a unique and trusted identity to the product. It must be noted that the NFC tag and NFT can be read by the NFC enabled user device.
  • the MAC code is decrypted to the received NDEF message with the previously shared key and compares it with a calculated MAC.
  • ERC 721 is a standard for representing ownership of non-fungible tokens, that is, where each token is unique. It is a free, open standard that describes how to build non-fungible or unique tokens on the Ethereum blockchain. While most tokens are fungible (every token is the same as every other token), ERC-721 tokens are all unique.
  • the method (500) includes validating, by a verifying module of the processing subsystem, the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT in step (325). The details include model number, model name, owner name, date of manufacture, time of manufacture and the like.
  • the frequency of the NFC tag is tracked, by a tracking module, to prevent recurrent usage.
  • the method (600) also allows transferring ownership of the product to a new entity and subsequently maintain a history and ledger of the product ownership.
  • the method (500) includes matching, by the verifying module of the processing subsystem, the details of the product upon retrieving with the unique identifier to determine the authenticity of the product in step (330).
  • the details from the NFC tag and the details stored in the blockchain are cross referenced.
  • the method (500) includes sending, by a feedback module of the processing subsystem, an authenticated message to the user upon verification of the product in step (340).
  • the user is presented with the information that the NFC tag is valid.
  • the user is granted access to the protected content.
  • Various embodiments of the anti-counterfeit system and method for authenticating a product using a combination of NFT and NFC as described above provides several beneficial features.
  • the method allows transactions by a simple tap of an NFC enabled user device on a product embedded with an NFC tag. This provides a channel for secure information communication resulting in a frictionless authentication experience.
  • the SUN message authentication includes encryption to ensure authentic, secure encryption and trustworthy data exchange. Further, the minting of the NFC tag and NFT on the blockchain using ERC 721 and ERC 1155 provides unique and trusted identities to the product.
  • processors including one or more microprocessors, digital signal processors (DSPs), application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), or any other equivalent integrated or discrete logic circuitry, as well as any combinations of such components.
  • DSPs digital signal processors
  • ASICs application-specific integrated circuits
  • FPGAs field-programmable gate arrays
  • processors may generally refer to any of the foregoing logic circuitry, alone or in combination with other logic circuitry, or any other equivalent circuitry.
  • a control unit including hardware may also perform one or more of the techniques of this disclosure.
  • Such hardware, software, and firmware may be implemented within the same device or within separate devices to support the various techniques described in this disclosure.
  • any of the described units, modules, or components may be implemented together or separately as discrete but interoperable logic devices. Depiction of different features as modules or units is intended to highlight different functional aspects and does not necessarily imply that such modules or units must be realized by separate hardware, firmware, or software components. Rather, functionality associated with one or more modules or units may be performed by separate hardware, firmware, or software components, or integrated within common or separate hardware, firmware, or software components.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An anti-counterfeit system for authenticating a product using a combination of non-fungible token (NFT) and near-field communication (NFC) is disclosed. A receiving module receive a request from an NFC enabled user device to authenticate a NFC tag labeled product purchased by a user. The receiving module generate a NDEF message using NTAG 413, in response to the user taping NFC enabled user device on the product. A decrypting module retrieves a unique blockchain key from the NDEF message. The blockchain key references to a particular blockchain address wherein the blockchain address comprises a NFT to the physical item. A verifying module retrieve details corresponding to the physical item and authenticate based on the details retrieved. A feedback module sends an authenticated message to the user wherein the authenticated message comprising the details of the product.

Description

SYSTEM AND METHOD FOR ANTI-COUNTERFEIT AUTHENTICATION USING A COMBINATION OF NON-FUNGIBLE TOKEN AND NEAR-FIELD COMMUNICATION
EARLIEST PRIORITY DATE
This Application claims priority from a Complete patent application filed in India having Patent Application No. 202221063660, filed on November 08, 2022, and titled “SYSTEM AND METHOD FOR ANTI-COUNTERFEIT AUTHENTICATION USING A COMBINATION OF NON-FUNGIBLE TOKEN AND NEAR-FIELD COMMUNICATION”
FIELD OF INVENTION
Embodiments of the present disclosure relate to the field of anti-counterfeiting consumer products, and more particularly, an anti-counterfeit system and a method for authenticating a physical item using a combination of non-fungible token (NFT) and near-field communication (NFC).
BACKGROUND
Counterfeits, replicas, fakes, and illegal products are among the top challenges for many consumer brands globally. It erodes the consumer’s trust in the product and the brand. In most cases, the consumer unable to distinguish between a genuine product and a counterfeit. Some consumers knowingly buy counterfeit products, while others may mistake a counterfeit for the real thing. However, counterfeit products can be unsafe and cause severe malfunctions. Counterfeit medicine, personal hygiene products, and makeup can contain toxins that can pose a risk to your health. Fake electronics and mechanical parts are usually not tested for safety, which can pose significant risk of extreme heat, self-igniting, and exploding. Even harmless counterfeits, such as clothing, are often produced by people working in unsafe conditions without regular supervision. This puts consumers at risk of illness and injury. There are many emerging anti-counterfeiting solutions available today to help identify counterfeit goods and to prevent illicit sales. One of the most popular ways to authenticate products is anti -counterfeit near-field communication (NFC) tags. But it doesn’t ensure security that the information it carries can be duplicated. NFC tags only saves limited data which is associated with some public data on a server database. A recent way that a retailer can claim back control in the fight against counterfeits is by leveraging blockchain solutions and there are several concepts available with it. Further, the field is emerging with improved concept and enhanced services to fight counterfeiting.
Hence, there is a need for an improved system and method for anti-counterfeit authentication using non-fungible token and near-field communication which addresses the aforementioned issue(s).
BRIEF DESCRIPTION
In accordance with an embodiment of the present disclosure, an anti-counterfeit system for authenticating a product using a combination of non-fungible token and a near-field communication is provided. The anti-counterfeit system comprises a processing subsystem hosted on a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes a receiving module is configured to receive a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product. The product is embedded with an NFC tag comprising a unique identifier that is pre-programmed. A unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag. The receiving module is also configured to generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module. The NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code Further, the processing subsystem includes a decrypting module operatively coupled to the receiving module wherein the decrypting module is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address. Furthermore, the processing subsystem includes a verifying module operatively coupled to the decoding module wherein the verifying module is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture, and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product. Moreover, the processing subsystem includes a feedback module operatively coupled to the verifying module wherein the feedback module is configured to send an authenticated message to the user upon verification of the product.
In accordance with an embodiment of the present disclosure, an anti-counterfeit method for authenticating a product using a combination of non-fungible token and a near-field communication is provided. The method includes receiving, by a receiving module of a processing subsystem, receive a request from a NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product purchased by a user, wherein the product is embedded with a NFC tag comprising a unique identifier that is preprogrammed and wherein a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag. The method also includes generating, by the receiving module of the processing subsystem, an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag () and the decrypting module. Further, the method includes decrypting, by a decrypting module of the processing subsystem, the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token () on the blockchain address that comprises the NFT link to the physical item. Furthermore, the method includes validating, by a verifying module of the processing subsystem, the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture. Moreover, the method includes matching, by the verifying module of the processing subsystem, the details of the product upon retrieving with the unique identifier to determine the authenticity of the product. The method includes sending, by a feedback module of the processing subsystem, an authenticated message to the user upon verification of the product.
To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
FIG. 1 is a block diagram of an anti-counterfeit system for authenticating a product using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure;
FIG. 2 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure;
FIG. 3 is a schematic representation of data exchange in an anti-counterfeit system in accordance with an embodiment of the present disclosure;
FIG. 4 is a schematic representation of access permission in an anti-counterfeit system in accordance with an embodiment of the present disclosure;
FIG. 5 is a schematic representation of an NFC tag writing technique (500) in accordance with an embodiment of the present disclosure; and
FIG. 6 illustrates a flow chart representing the steps involved in a method for anti-counterfeit authentication using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure.
Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
The terms “comprises”, “comprising”, or any other variations thereof, are intended to cover a nonexclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or subsystems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional subsystems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
In accordance with an embodiment of the present disclosure, an anti -counterfeit system for authenticating a product using a combination of non-fungible token and a near-field communication is provided. The anti-counterfeit system comprises a processing subsystem hosted on a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes a receiving module is configured to receive a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product. The product is embedded with an NFC tag comprising a unique identifier that is pre-programmed. A unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag. The receiving module is also configured to generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module. The NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code Further, the processing subsystem includes a decrypting module operatively coupled to the receiving module wherein the decrypting module is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address. Furthermore, the processing subsystem includes a verifying module operatively coupled to the decoding module wherein the verifying module is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture, and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product. Moreover, the processing subsystem includes a feedback module operatively coupled to the verifying module wherein the feedback module is configured to send an authenticated message to the user upon verification of the product.
FIG. 1 is a block diagram of an anti-counterfeit system (100) for authenticating a product (110) using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure. The anti-counterfeit system (100) includes a processing subsystem (105) hosted on a server (108). In one embodiment, the server (108) may include a cloud server. In another embodiment, parts of the server (108) may be a local server coupled to a user device (120). In yet another embodiment, the server (108) may include a local server. The processing subsystem ( 105) is configured to execute on a network ( 115) to control bidirectional communications among a plurality of modules. In another embodiment, the network (115) may include both wired and wireless communications according to one or more standards and/or via one or more transport. In another embodiment, the network (115) may include a wireless network such as Wi-Fi, Bluetooth, Zigbee, near field communication (NFC), infra-red communication (RFID) or the like. In yet another embodiment, the network (115) may also include communications over a terrestrial cellular network, including, a global system for mobile communications (GSM), code division multiple access (CDMA), and/or enhanced data for global evolution (EDGE) network.
The anti-counterfeit system (100) includes a receiving module (140) operatively coupled to the processing subsystem (105). The receiving module (140) is configured to receive a request from an NFC enabled user device (120) to authenticate a product (110) in response to a user (125) tapping the NFC enabled user device (120) on the product (110). Examples of the NFC enabled user device includes smartphones, tablets and the like which can support NFC technology. NFC is a method of wireless data transfer that allows smartphones, laptops, tablets, and the like to share data when in proximity. The product (110) is embedded with an NFC tag when the user (125) purchases the product (110). Examples of the product (110) includes, but is not limited to, food, drinks, drugs, cosmetics, cloths and electronic products. The NFC tag comprises a unique identifier that is pre-programmed. The NFC enabled user device (120) should be able to capture the NFC tag through its input devices (for instance, RFID/ NFC reader and a camera). Further, a unique non-fungible token () is created for the product (110) on a blockchain address (130) and is linked to the NFC tag.
It is to be noted that the NFC enabled user device (120) may comprise, but is not limited to, a mobile phone, desktop computer, portable digital assistant (PDA), smart phone, tablet, ultra-book, netbook, laptop, multi-processor system, microprocessor -based or programmable consumer electronic system, or any other communication device that a user may use. In some embodiments, the NFC enabled user device (120) may comprise a display module (not shown) to display information (for example, in the form of user interfaces). In further embodiments, the system may comprise one or more of touch screens, accelerometers, gyroscopes, cameras, microphones, global positioning system (GPS) devices, and so forth.
Further, the receiving module (140) is configured to generate an NFC data exchange format message (NDEF message) upon receiving the request using NTAG 413. The NDEF is a standardized data format which allows a smartphone to read and write data such as URLs, text files and the like on the NFC tag. The NTAG 413 enables dynamic encryption of the NDEF message on the NFC tag. This means, for example, the one of a URL and a plain text file saved as NDEF can be created and encrypted by the tag dynamically. In this way, each time a new, individually encrypted code is created and sent which can be authenticated by the corresponding reader or server. The NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device (120) thereby providing a secured communication between the NFC tag (110) and the decrypting module (145). Typically, the NDEF message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code.
The processing subsystem (105) also comprises a decrypting module (145) operatively coupled to the receiving module (140). The decrypting module (145) is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address. The blockchain address comprises a NFT link to the product. Typically, the NFT is digitized information about the product that can be proved to be unique and is not interchangeable because no other product can ever hold the same value. The record of the uniqueness of the NFT exists on a blockchain in which the information is almost impossible to alter. The NFT provides the certificate of ownership to the digital asset.
The processing subsystem (105) comprises a verifying module (150) operatively coupled to the decrypting module (145) and is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT. Examples of the details include, but is not limited to, model number, model name, owner name, date of manufacture and time of manufacture.
The NFT represents a nonfungible physical asset owned by a seller of the product wherein ownership of the nonfungible physical asset is transferred from the seller to a buyer upon purchase of the product.
Further, the verifying module (150) is configured to match the details of the product upon retrieving from the blockchain with the unique identifier of the NFC tag to determine the authenticity of the product. The processing subsystem (105) comprises a tracking module (155) operatively coupled to the verifying module (150) wherein the tracking module (155) is configured to track the frequency of the NFC tag to prevent recurrent usage.
The processing subsystem (105) comprises a feedback module (160) operatively coupled to the tracking module (155) wherein the feedback module (160) is configured to send an authenticated message to the user upon verification of the product. The authenticated message comprising the details of the physical item. Example of details includes model number, model name, owner name, date of manufacture, time of manufacture and the like.
In one embodiment, the various functional components of the system may reside on a single computer, or they may be distributed across several computers in various arrangements. The various components of the system may, furthermore, access one or more databases, and each of the various components of the system may be in communication with one another. Further, while the components of FIG. 1 are discussed in the singular sense, it will be appreciated that in other embodiments multiple instances of the components may be employed. FIG. 2 is a block diagram representation of a verifying module of FIG. 1 in accordance with an embodiment of the present disclosure;
FIG. 2 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure. The server (200) includes processor(s) (230), and memory (210) operatively coupled to the bus (220). The processor(s) (230), as used herein, means any type of computational circuit, such as, but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
The memory (210) includes several subsystems stored in the form of executable program which instructs the processor (230) to perform the method steps illustrated in FIG. 1. The memory (210) includes a processing subsystem (105) of FIG.l. The processing subsystem (105) further has following modules: a receiving module (140), a decrypting module (145), a verifying module (150), a tracking module (155) and a feedback module (160). In accordance with an embodiment of the present disclosure, an anti -counterfeit system for authenticating a product using a combination of non-fungible token and a near-field communication is provided. The anti-counterfeit system comprises a processing subsystem hosted on a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes a receiving module is configured to receive a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product. The product is embedded with an NFC tag comprising a unique identifier that is pre-programmed. A unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag. The receiving module is also configured to generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module. The NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code Further, the processing subsystem includes a decrypting module operatively coupled to the receiving module wherein the decrypting module is configured to decrypt the unique identifier from the NDEF message, wherein the unique identifier references to the non-fungible token on the blockchain address. Furthermore, the processing subsystem includes a verifying module operatively coupled to the decoding module wherein the verifying module is configured to validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture, and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product. In other words, the details from the NFC tag are cross referenced with the data stored in the blockchain. Moreover, the processing subsystem includes a feedback module operatively coupled to the verifying module wherein the feedback module is configured to send an authenticated message to the user upon verification of the product.
The bus (220) as used herein refers to be internal memory channels or computer network that is used to connect computer components and transfer data between them. The bus (220) includes a serial bus or a parallel bus, wherein the serial bus transmits data in bit-serial format and the parallel bus transmits data across multiple wires. The bus (220) as used herein, may include but not limited to, a system bus, an internal bus, an external bus, an expansion bus, a frontside bus, a backside bus and the like.
FIG. 3 is a schematic representation of data exchange in an anti-counterfeit system in accordance with an embodiment of the present disclosure. The process of data exchange takes place between an NFC tag (110), an NFC enabled user device (120), a server (108) and a public blockchain ( 130). a) The process begins when the NFC enabled user device (120) scans the NFC tag (110) embedded on a product. The scanning of the NFC tag generates a dynamic URL. At this point, the URL is rendered to the NFC enabled user device (120) via a browser. The user opens the URL. The NFC tag (110) transmits an encrypted UID, CMAC and a blockchain transition hash key to the NFC enabled user device (120) at step (165). b) Further, the NFC enabled user device (120) makes an API call to the server in step (170) and subsequently passes the encrypted UID, CMAC and a blockchain transition hash key to the server for decryption at step (175). c) The server decodes the SUN messages using AES decryption in step (180). d) Further, the server matches the SUN message and information from the blockchain in step (185). e) The blockchain validates the product at step (190) and subsequently transmits the details of an owner of the product to the server (195). f) The server finally transmits the information back to the user that the product is verified at step 200.
FIG. 4 is a schematic representation of access permission in an anti-counterfeit system in accordance with an embodiment of the present disclosure. A user (owner of a product) (125) may access an application (210) that is configured to perform the method disclosed herein. The user taps an NFC tag (110) with an NFC enabled user device (120). At this point, the authorization server (108) verifies the user (220). When the user scans the NFC tag (110) by tapping the NFC enabled user device (120), the user (125) is provided with an access token and authorization code from the authorization server (230). Subsequently, the user is capable to access data from a resource server (240). The resource server in turn delegates authentication and authorization capabilities to the authorization server (250). FIG. 5 is a schematic representation of an NFC tag writing technique (500) in accordance with an embodiment of the present disclosure. A user (typically the owner of a product) opens an application that is configured to perform the method disclosed herein. The application is compatible on a user device (120). The user enters information related to the product for instance, but is not limited to, product name, manufacturing date and owner details (260). The information is uploaded on the server (265) and is subsequently saved in a database upon scanning (270). An NFT token is simultaneously minted on a blockchain address using ERC 721 of ERC 1155 token standard (275). ERC1155 is a multi-token standard that allows the creation of fungible, non- fungible, and semi-fungible tokens all in one contract. In other words, ERC- 1155 is a token standard that enables the efficient transfer of fungible and non-fungible tokens in a single transaction. This blockchain address is returned back to the application configured on the user device (280). An NDEF message is generated by the application by using the blockchain address and an AES encryption key (285). This NDEF message is written on the NFC tag and makes it ‘write protected’ (290). The NFC tag is now featured with a ‘read only’ capability with the NFT address linked to it.
FIG. 5 illustrates a flow chart representing the steps involved in a method (500) for anti-counterfeit authentication using a combination of non-fungible token (NFT) and near-field communication (NFC) in accordance with an embodiment of the present disclosure. An essential requirement for performing the method disclosed herein is to implant/ embed/ stick an NFC tag on a product while on the manufacturing process. Once the NFC tag had been embedded, it is also essential to mint an NFT on a public blockchain and link the NFT with the NFC tag. The NFC tag is used to secure the physical asset (product) and the NFT is used to secure the digital asset of the product. The public blockchain typically maintains all the data about the product securely. When the NFT is sold to a user, the ownership details are updated and coded into the NFT. In one embodiment, consumer brands may launch the product on meta verse digitally. In another embodiment, the consumer brands may resale the product between multiple consumers. After the product is sold, the consumer may simply tap on the embedded NFC tag with their user device (for instance, smart phone, tablet and the like) to securely communicate information.
The method (500) includes receiving a request from an NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product purchased by a user by a receiving module of a processing subsystem in step (310). Examples of the NFC enabled user device includes smartphones, tablets and the like which can support NFC technology. NFC is a method of wireless data transfer that allows smartphones, laptops, tablets, and the like to share data when in proximity. The product is embedded with an NFC tag comprising a unique identifier that is pre-programmed and wherein a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag. The product may include, but not limited to drugs, cosmetics, cloths, and so on. The NFC tag comprises a unique identifier to determine if a tag is issued by the user wherein the unique identifier is pre-programmed and unique.
The method (500) includes generating, by the receiving module of the processing subsystem, an NFC data exchange format (NDEF) message upon receiving the request in step (315). The NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device thereby providing a secured communication between the NFC tag and the decrypting module. The NDEF message is cross-referenced with a blockchain identifier (hash key) to retrieve the details of the authenticity of the product. The details include, but is not limited to, model, make, date and time of manufacture.
The NDEF message is generated each time the NFC enabled user device is tapped on the product (embedded with the NFC tag) using NTAG 413 and Advanced Encryption Standard (AES) cryptography. The NTAG 413 brings the AES cryptographic authentication and provides an automatic and secure connection. It also introduces a novel security feature called “Secure Unique NFC message (SUN) which automatically generates a tap-unique tag authentication data upon each tap of the NFC enabled user device on the NFC tagged product. The NFC enabled user device automatically connects to a server and based on the information contained in a URE, the NFC enabled user device checks the authenticity of the NFC tag and verifies the information. In one embodiment, an NFC counter is integrated during encryption to generate the unique code for each tap. The NFC counter enables the reading of the NFC tag and therefore a reuse of an old NFC tag is not possible. This feature allows tracking or determining the frequency of the NFC tag.
In one embodiment, NTAG 424 is used to generate a new NDEF message at every single tap on the NFC tag. The NTAG 424 enable dynamic encryption of NDEF messages on the NFC tag. Consequently, a URE is saved as the NDEF message and is rendered to the NFC enabled user device. Further, the NDEF message is created and encrypted dynamically. Therefore, each time a new encrypted code is created and sent to the server for authentication.
Typically, the NDEF message comprises Secure Unique NFC (SUN) message, Cipher-based Message Authentication Coe (CMAC) and the blockchain address. The SUN message is a unique feature of NT AG 424 which ensures a secure communication between the NFC tag and the server by generating a unique code. Each time the NFC tag is tapped, the unique code is generated and sent to the server in real time. The unique code is sent as an URL from the NFC enable user device to the server. Further, the unique code is based on the CMAC information and can be calculated from the NFC tag and/ or the counter. The CMAC information is used to check for authenticity. The NFC tag uses the CMAC information to calculate a MAC code and subsequently sends the MAC code and the NDEF message to the server.
The method (500) includes decrypting, by a decrypting module of the processing subsystem, the unique identifier from the NDEF message, wherein the unique identifier references to the non- fungible token on the blockchain address that comprises the NFT link to the physical item in step (320).
A unique NFT is created for the product on a public blockchain (for instance Polygon, Ethereum and so on). Subsequently, a corresponding unique identifier (hash key) is stored in a database. In one embodiment, the NFC tag and NFT are minted on the blockchain address using Ethereum Request for Comments (ERC) 721 and ERC 1155 wherein the ERC 721 and ERC 1155 to provide a unique and trusted identity to the product. It must be noted that the NFC tag and NFT can be read by the NFC enabled user device.
The MAC code is decrypted to the received NDEF message with the previously shared key and compares it with a calculated MAC.
ERC 721 is a standard for representing ownership of non-fungible tokens, that is, where each token is unique. It is a free, open standard that describes how to build non-fungible or unique tokens on the Ethereum blockchain. While most tokens are fungible (every token is the same as every other token), ERC-721 tokens are all unique. The method (500) includes validating, by a verifying module of the processing subsystem, the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT in step (325). The details include model number, model name, owner name, date of manufacture, time of manufacture and the like.
In one embodiment, the frequency of the NFC tag is tracked, by a tracking module, to prevent recurrent usage. In such an embodiment, the method (600) also allows transferring ownership of the product to a new entity and subsequently maintain a history and ledger of the product ownership.
The method (500) includes matching, by the verifying module of the processing subsystem, the details of the product upon retrieving with the unique identifier to determine the authenticity of the product in step (330). In other words, the details from the NFC tag and the details stored in the blockchain are cross referenced.
The method (500) includes sending, by a feedback module of the processing subsystem, an authenticated message to the user upon verification of the product in step (340). The user is presented with the information that the NFC tag is valid. In one embodiment, the user is granted access to the protected content.
Various embodiments of the anti-counterfeit system and method for authenticating a product using a combination of NFT and NFC as described above provides several beneficial features. The method allows transactions by a simple tap of an NFC enabled user device on a product embedded with an NFC tag. This provides a channel for secure information communication resulting in a frictionless authentication experience. The SUN message authentication includes encryption to ensure authentic, secure encryption and trustworthy data exchange. Further, the minting of the NFC tag and NFT on the blockchain using ERC 721 and ERC 1155 provides unique and trusted identities to the product.
The techniques described in this disclosure may be implemented, at least in part, in hardware, software, firmware, or any combination thereof. For example, various aspects of the described techniques may be implemented within one or more processors, including one or more microprocessors, digital signal processors (DSPs), application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), or any other equivalent integrated or discrete logic circuitry, as well as any combinations of such components. The term “processor” or “processing subsystem” may generally refer to any of the foregoing logic circuitry, alone or in combination with other logic circuitry, or any other equivalent circuitry. A control unit including hardware may also perform one or more of the techniques of this disclosure.
Such hardware, software, and firmware may be implemented within the same device or within separate devices to support the various techniques described in this disclosure. In addition, any of the described units, modules, or components may be implemented together or separately as discrete but interoperable logic devices. Depiction of different features as modules or units is intended to highlight different functional aspects and does not necessarily imply that such modules or units must be realized by separate hardware, firmware, or software components. Rather, functionality associated with one or more modules or units may be performed by separate hardware, firmware, or software components, or integrated within common or separate hardware, firmware, or software components.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the disclosure and are not intended to be restrictive thereof.
While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, the order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Claims

LAIM:
1. An anti-counterfeit system (100) for authenticating a product using a combination of non- fungible token and near-field communication comprising: a processing subsystem (105) hosted on a server (108), wherein the processing subsystem (105) is configured to execute on a network (115) to control bidirectional communications among a plurality of modules comprising: a receiving module (140) operatively coupled to the processing subsystem (105) and configured to: receive a request from an NFC enabled user device (120) to authenticate the product in response to a user (125) tapping the NFC enabled user device (120) on the product, wherein the product is embedded with an NFC tag (110) comprising a unique identifier that is pre-programmed; and wherein a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag (110); generate an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device (120) thereby providing a secured communication between the NFC tag (110) and the server (108); wherein the NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipher-based message authentication code; a decrypting module (145) operatively coupled to the receiving module (140) wherein the decrypting module (145) is configured to decrypt the unique identifier from the NFC data exchange format message, wherein the unique identifier references to the non-fungible token on the blockchain address; a verifying module (150) operatively coupled to the decrypting module (145) wherein the verifying module (150) is configured to: validate the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture; and match the details of the product upon retrieving with the unique identifier to determine the authenticity of the product; and a feedback module ( 160) operatively coupled to the verifying module (150) wherein the feedback module (160) is configured to send an authenticated message to the user upon verification of the product.
2. The anti-counterfeit system (100) as claimed in claim 1 wherein a dynamic URL is generated and rendered on the user device in response to the user tapping the NFC tag with the NFC enabled user device (120).
3. The anti-counterfeit system (100) as claimed in claim 1 comprising a database (135) operatively coupled to the processing sub-system (105) wherein the database (135) is operable to store a hash key corresponding to the unique non-fungible token of the product.
4. The anti-counterfeit system (100) as claimed in claim 1 wherein the NFC data exchange format message comprises a blockchain address, a secure unique NFC message and a cipherbased message authentication code.
5. The anti-counterfeit system (100) as claimed in claim 1 wherein the retrieving module (140) matches the SUN authorization and information from blockchain to retrieve details corresponding to the physical asset from the NFT.
6. The anti-counterfeit system (100) as claimed in claim 1 wherein the NFT represents a nonfungible physical asset owned by a seller of the product wherein ownership of the nonfungible physical asset is transferred from the seller to a buyer upon purchase of the product.
7. The anti-counterfeit system (100) as claimed in claim 6 wherein the buyer is allowed to resell the physical asset to a third party thereby transferring ownership of the product to the third party, wherein information related to the ownership of the product is stored in the database (135).
8. The anti-counterfeit system (100) as claimed in claim 1 wherein the NFT tokens are minted using ERC 721 or ERC 1155 token standard on a public blockchain.
9. The anti-counterfeit system (100) as claimed in claim 1 comprising a tracking module (155) operatively coupled to the verifying module (150) wherein the tracking module (155) is configured to track the frequency of the NFC tag to prevent recurrent usage.
10. An anti-counterfeit method (600) for authenticating a product using a combination of non- fungible token (NFT) and near-field communication (NFC) comprising: receiving, by a receiving module of a processing subsystem, receive a request from a NFC enabled user device to authenticate the product in response to a user tapping the NFC enabled user device on the product purchased by a user, wherein the product is embedded with a NFC tag comprising a unique identifier that is pre-programmed and wherein a unique non-fungible token is created for the product on a blockchain address and is linked to the NFC tag; (310) generating, by the receiving module of the processing subsystem, an NFC data exchange format message upon receiving the request, wherein the NFC data exchange format message enables a dynamic encryption of a unique identifier on the NFC enabled user device () thereby providing a secured communication between the NFC tag () and the decrypting module; (315) decrypting, by a decrypting module of the processing subsystem, the unique identifier from the NDEF message, wherein the unique identifier references to the non- fungible token () on the blockchain address that comprises the NFT link to the physical item; (320) validating, by a verifying module of the processing subsystem, the blockchain address corresponding to the unique identifier and retrieve details of the product from the NFT wherein the details comprise model number, model name, owner name, date of manufacture and time of manufacture; (325) matching, by the verifying module of the processing subsystem, the details of the product upon retrieving with the unique identifier to determine the authenticity of the product; (330) and sending, by a feedback module of the processing subsystem, an authenticated message to the user upon verification of the product. (335)
PCT/IB2022/062861 2022-11-08 2022-12-29 System and method for anti-counterfeit authentication using a combination of non-fungible token and near-field communication WO2024100444A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202221063660 2022-11-08
IN202221063660 2022-11-08

Publications (1)

Publication Number Publication Date
WO2024100444A1 true WO2024100444A1 (en) 2024-05-16

Family

ID=91032017

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2022/062861 WO2024100444A1 (en) 2022-11-08 2022-12-29 System and method for anti-counterfeit authentication using a combination of non-fungible token and near-field communication

Country Status (1)

Country Link
WO (1) WO2024100444A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190156078A1 (en) * 2017-11-03 2019-05-23 Pap Investments, Ltd. Dual frequency nfc/rfid card for self service baggage check and method
US20220343328A1 (en) * 2021-04-27 2022-10-27 Digital Seat Media, Inc. Systems and methods for quality control related to nft purchase

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190156078A1 (en) * 2017-11-03 2019-05-23 Pap Investments, Ltd. Dual frequency nfc/rfid card for self service baggage check and method
US20220343328A1 (en) * 2021-04-27 2022-10-27 Digital Seat Media, Inc. Systems and methods for quality control related to nft purchase

Similar Documents

Publication Publication Date Title
US11664997B2 (en) Authentication in ubiquitous environment
JP7299971B2 (en) Methods, computer program products and apparatus for creating and registering digitally sealed assets and verifying the authenticity of digitally sealed assets
JP7230235B2 (en) Using Contactless Cards to Securely Share Personal Data Stored on Blockchain
US11743038B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US11139976B2 (en) System and method, which using blockchain and mobile devices, provides the validated and authenticated identity of an individual to a valid and authenticated requestor
US10171476B2 (en) System and method for protecting the privacy of identity and financial information of the consumer conducting online business
CN107851254B (en) Seamless transactions with minimized user input
EP2810402B1 (en) A method and database system for secure storage and communication of information
US20160358184A1 (en) Open registry for identity of things including tamperproof tags
CN115867910A (en) Privacy preserving identity attribute verification using policy tokens
US20130226813A1 (en) Cyberspace Identification Trust Authority (CITA) System and Method
US9210146B2 (en) Secure content transfer using dynamically generated optical machine readable codes
US11171781B2 (en) System and method which using blockchain protects the privacy of access code and the identity of an individual seeking online access
KR102178179B1 (en) apparatus and user terminal for mobile identification
CA3057398C (en) Securely performing cryptographic operations
US11177959B2 (en) Cryptography method and system for securing data via electronic transmission
WO2023273070A1 (en) Registration method and system, and electronic device, storage medium and computer program product
CN111147248A (en) Encrypted transmission method, device and system of face feature library and storage medium
US20230237172A1 (en) Data broker
KR102122555B1 (en) System and Method for Identification Based on Finanace Card Possessed by User
KR100875920B1 (en) Product authentication and service provider verification system using RDF signature tag and method
US20240346482A1 (en) System and method for managing paired a physical tag and a non-fungible token.
WO2024100444A1 (en) System and method for anti-counterfeit authentication using a combination of non-fungible token and near-field communication
GB2499269A (en) Biometric information generation of a secure keychain
WO2024232035A1 (en) System and method for authentication certification

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22965016

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE