UPC, EAN and JAN validation system and method for loss prevention at point of sale/return
First Claim
1. In a system for loss prevention at a transaction point by preventing a fraudulent transaction relating to an item, a method comprising the steps of:
- requiring a user to enter a first identifier and a second identifier of the item;
looking up the first identifier in a database of suspect or counterfeit items;
if the first identifier is not present in the database allowing the transaction;
if the second identifier corresponds with a record associated with the first identifier present in the database, allowing the transaction; and
if the first identifier is present in the database and the second identifier does not correspond with a record associated with the first identifier present in the database, denying the transaction.
6 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a process/system that validates the authenticity of the product UPC, EAN, JAN, RFID, EPC and/or equivalent code, in real-time, while a transaction is taking place. A database is preferably maintained including a list of suspected false or counterfeit UPC, EAN, JAN, RFID, EPC, and/or equivalent number or first digits, and further includes a list of key descriptive text or numbers found on a product or a product'"'"'s packaging that will either corroborate or contradict the real brand name with the brand encoded in the UPC, EAN, JAN, RFID EPC, and/or equivalent number. The invention allows a transaction if the item is not found in the database of suspect or counterfeit items, or if all of the identifiers match a record in the database; otherwise, the transaction is denied.
-
Citations
42 Claims
-
1. In a system for loss prevention at a transaction point by preventing a fraudulent transaction relating to an item, a method comprising the steps of:
-
requiring a user to enter a first identifier and a second identifier of the item;
looking up the first identifier in a database of suspect or counterfeit items;
if the first identifier is not present in the database allowing the transaction;
if the second identifier corresponds with a record associated with the first identifier present in the database, allowing the transaction; and
if the first identifier is present in the database and the second identifier does not correspond with a record associated with the first identifier present in the database, denying the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In a system for loss prevention at a transaction point by preventing a fraudulent transaction relating to an item, a method comprising the steps of:
-
requiring a user to enter a first identifier and a plurality of second identifiers of the item;
looking up the first identifier in a database of suspect or counterfeit items;
if the first identifier is not present in the database, allowing the transaction;
if the plurality of second identifiers correspond with a record associated with the first identifier present in the database, allowing the transaction;
if the first identifier is present in the database and the plurality of second identifiers do not correspond with a record associated with the first identifier present in the database, denying the transaction. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for loss prevention at a transaction point by preventing a fraudulent transaction relating to an item, comprising:
-
an input device, whereby a user inputs a first identifier and a second identifier of the item;
a searching routine, whereby the system looks up the first identifier in a database of suspect or counterfeit items; and
, a gatekeeper switch, that;
allows the transaction if the first identifier is not present in the database;
allows the transaction if the second identifier corresponds with a record associated with the first identifier present in the database; and
,denies the transaction if the first identifier is present in the database and the second identifier does not correspond with a record associated with the first identifier present in the database. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system for loss prevention at a transaction point by preventing a fraudulent transaction relating to an item, comprising:
-
an input device, whereby a user can input first identifier and a plurality of second identifiers of the item;
a searching routine, whereby the system can look up the first identifier in a database of suspect or counterfeit items; and
,a gatekeeper switch, that;
allows the transaction if the first identifier is not present in the database;
allows the transaction if the plurality of second identifiers correspond with a record associated with the first identifier present in the database; and
,denies the transaction if the first identifier is present in the database and the plurality of second identifiers do not correspond with a record associated with the first identifier present in the database. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification