System and Method for Product Authentication
First Claim
1. A computer-implemented system for product authentication, comprising:
- a central server comprising at least one computer processor configured to generate at least one unique authentication code pre-associated with one or more products of trusted origin;
a database coupled to said central server and storing the at least one unique authentication code;
an identification tag affixed to a unit of product or its package, the identification tag containing one of the at least one unique authentication code in the form of a machine-readable symbol; and
said at least one computer processor of said central server being further configured to;
receive an authentication request via a telecommunication interface from a user device, said authentication request comprising (a) an authentication code purportedly derived by said user device scanning or reading said identification tag affixed to said unit of product or its package and (b) a unique identifier of said user device,determine (i) whether said authentication code matches one of the at least one unique authentication code stored in the database and (ii) whether said identification tag has been previously scanned or read by another user device other than said user device, andtransmit a first response to said user device to confirm authenticity of said unit of product if said authentication code matches one of the at least one unique authentication code stored in the database and said identification tag has not been previously scanned or read by another user device other than said user device.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques for product authentication are disclosed which employ both identification tags affixed to products and a central server to validate scanned tag codes. To verify authenticity of a product, a user may peel off a cover label from the identification tag to reveal a scannable or readable code/symbol, use a device to scan or read the code/symbol, and then transmit it to the central server for authentication. The central server determines, based on database records, whether the code/symbol is genuine and never scanned by another device before. If so, the product is deemed authentic, and a corresponding token is created and stored based on the unique combination of the code/symbol and an identifier of the device used to scan/submit the code/symbol. Any subsequent authentication request originating from a different device to the central server with the same code/symbol may receive a negative response about the authenticity of the underlying product.
70 Citations
26 Claims
-
1. A computer-implemented system for product authentication, comprising:
-
a central server comprising at least one computer processor configured to generate at least one unique authentication code pre-associated with one or more products of trusted origin; a database coupled to said central server and storing the at least one unique authentication code; an identification tag affixed to a unit of product or its package, the identification tag containing one of the at least one unique authentication code in the form of a machine-readable symbol; and said at least one computer processor of said central server being further configured to; receive an authentication request via a telecommunication interface from a user device, said authentication request comprising (a) an authentication code purportedly derived by said user device scanning or reading said identification tag affixed to said unit of product or its package and (b) a unique identifier of said user device, determine (i) whether said authentication code matches one of the at least one unique authentication code stored in the database and (ii) whether said identification tag has been previously scanned or read by another user device other than said user device, and transmit a first response to said user device to confirm authenticity of said unit of product if said authentication code matches one of the at least one unique authentication code stored in the database and said identification tag has not been previously scanned or read by another user device other than said user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method for product authentication, comprising:
-
generating, by at least one computer processor, at least one unique authentication code associated with one or more products of trusted origin; storing the at least one unique authentication code in a database accessible by a central server; creating an identification tag containing one of the at least one unique authentication code in the form of a machine-readable symbol; affixing said identification tag to a unit of product or its package; receiving, by the central server and from a user device, an authentication request via a telecommunication interface, said authentication request comprising (a) an authentication code purportedly derived by said user device scanning or reading said identification tag affixed to said unit of product or its package and (b) a unique identifier of said user device; determining (i) whether said authentication code matches one of the at least one unique authentication code stored in the database and (ii) whether said identification tag has been previously scanned or read by another user device other than said user device; and transmitting a first response to said user device to confirm authenticity of said unit of product if said authentication code matches one of the at least one unique authentication code stored in the database and said identification tag has not been previously scanned or read by another user device other than said user device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory computer-readable medium having code for product authentication, the code configured to cause a computer processor on a user device to:
-
scan or read an identification tag affixed to a unit of product or its package to derive an authentication code; formulate an authentication request comprising (a) said authentication code and (b) a unique identifier of said user device; transmit said authentication request to a central server which determines (i) whether said authentication code matches one of at least one unique authentication code stored in a database and (ii) whether said identification tag has been previously scanned or read by another user device other than said user device; and receive, from said central server, a first response that confirms authenticity of said unit of product if said authentication code matches one of the at least one unique authentication code stored in the database and said identification tag has not been previously scanned or read by another user device other than said user device.
-
-
26. A computer-implemented method for product authentication, comprising:
-
generating, by at least one computer processor, at least one first unique authentication code and at least one second unique authentication code associated with one or more products of trusted origin; storing the at least one first unique authentication code and the at least one second unique authentication code in a database accessible by a central server; creating a first identification tag containing a first one of the at least one first unique authentication code in the form of a first machine-readable symbol and creating a second identification tag containing a second one of the at least one second unique authentication code in the form of a second machine-readable symbol, said first one and said second one being associated in said database; affixing said first identification tag and said second identification tag to a unit of product and/or its package such that said first machine-readable symbol is visible or readily accessible for scanning without opening said package while said second machine-readable symbol is not visible or readily accessible for scanning without removing a tamper-evident cover of said second identification tag or opening said package; receiving, by the central server and from a user device, an authentication request via a telecommunication interface, said authentication request comprising an authentication code purportedly derived by said user device scanning or reading said first identification tag or said second identification tag affixed to said unit of product or its package; determining, by the central server, whether said authentication code matches one of the at least one first unique authentication code or one of the at least one second unique authentication code stored in the database; if said authentication code matches one of the at least one first unique authentication code— if an associated one of the at least one second unique authentication code has not been associated with any user device, then transmitting a first response to said user device to indicate potential authenticity of said unit of product, or if an associated one of the at least one second unique authentication code has already been associated with some user device, then transmitting a second response to said user device to indicate a failure of authentication; if said authentication code matches one of the at least one second unique authentication code— if said matched one of the at least one second unique authentication code has not been previously scanned or read by another user device other than said user device, then transmitting a third response to said user device to confirm authenticity of said unit of product, or if said matched one of the at least one second unique authentication code has already been previously scanned or read by another user device other than said user device, then transmitting a fourth response to said user device to indicate a failure of authentication.
-
Specification