WO2007111569A1 - User-friendly authenticity investigation - Google Patents

User-friendly authenticity investigation Download PDF

Info

Publication number
WO2007111569A1
WO2007111569A1 PCT/SE2007/050196 SE2007050196W WO2007111569A1 WO 2007111569 A1 WO2007111569 A1 WO 2007111569A1 SE 2007050196 W SE2007050196 W SE 2007050196W WO 2007111569 A1 WO2007111569 A1 WO 2007111569A1
Authority
WO
WIPO (PCT)
Prior art keywords
layout
data
element variation
variation
authenticity
Prior art date
Application number
PCT/SE2007/050196
Other languages
French (fr)
Inventor
Ingrid Rokahr
Sari Hakli
Kirsi Viskari
Original Assignee
Trackway Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trackway Oy filed Critical Trackway Oy
Priority to EP07748357A priority Critical patent/EP2011040A1/en
Publication of WO2007111569A1 publication Critical patent/WO2007111569A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the present invention relates to the investigation of the authenticity of objects.
  • the invention more particularly relates to a method, device and computer program for enabling the investigation of the authenticity of an object as well as a method, authentication data handling device and computer program product for investigating the authenticity of an object.
  • Illegal copying of objects is a big problem for companies, organisations and individuals. Illegal copying involves such things as copying products to be sold, counterfeiting, as well as copying of security items, such as identity cards, credit cards, bank cards and certificates. Counterfeiting is an increasing problem for manufacturers and users. Through counterfeiting copies of goods appear that resemble the goods of the rightful owners. This can lead to considerable economical losses for the companies that provide products.
  • an object may be a product or the package provided for a product.
  • the objects are here identified by their unique code.
  • a system for identifying a code then normally involves the reading of the code, which code is attached to or integrated into the object. Reading of the code is then performed using a reading device.
  • the code is originally in a non-numerous mode like an image, a barcode, or a combination of properties or numeric values, that information is used for calculation of an identification number, an ID.
  • the object is uniquely identified by its code, and it's ID.
  • the code and the ID can be identical or unambiguously correlated to each other.
  • the ID is entered into a system which enables information exchange.
  • the system provides information related to the specific ID, which information has been stored to the system at an earlier stage.
  • systems for providing information about the whereabouts of an item by reading the item's unique ID are known. This is commonly used in track & trace systems. It is also known in the art that the unique ID of an item or product can be used for authenticity requests.
  • For authentication of a product it is checked whether the product's ID has been issued by the manufacturer and whether it is currently in circulation. Further rules may be applied to include analysis of geographical information, time stamps, or supply chain information prior to authentication.
  • the authentication database of issued IDs is maintained by the manufacturer or by a third party on behalf of the manufacturer. It can also contain further data related to the product or production.
  • Systems providing track & trace or authentication information are either based on a centralized database or the database is distributed among several information providers. In the latter case software is used for compiling the information from several information providers.
  • the information can be exchanged remotely as long as a connection is established between a requesting party and the database.
  • connection to the centralized or distributed database can be made via a network connection.
  • the network can be a private network or it can be internet-based. It can also include additional telecommunication means like mobile phones or Bluetooth etc.
  • the information which is stored in connection to track & trace information related to a product is usually product name, tracking history (where and when the ID of an item has been read), expiry date of product, and further product description (for example dosage and package size).
  • Connected to the network are at least one or several databases for maintaining the database information.
  • Connected to the network are also one or more reader or interface devices which enable input of ID for requests or for registration of a reading event.
  • Systems are also known in the art for integration of security features in a product.
  • devices are used for detecting and controlling security features on products.
  • security features which have been applied to products are: fluorescent markers in packaging materials, metal threads in banknotes, micro-text o printing, code printing, taggants, and many, many others.
  • signature is used here.
  • the signatures are either detected on-site by appropriate equipment (for example an UV- lamp is used to look at UV-fluorescent features), or specialized readers that signal 5 authenticity in case they detect a certain fluorescence pattern.
  • appropriate equipment for example an UV- lamp is used to look at UV-fluorescent features
  • specialized readers that signal 5 authenticity in case they detect a certain fluorescence pattern.
  • proprietary signatures are read by proprietary readers designed for detection of the proprietary signature.
  • the present invention is therefore directed towards providing a user-friendly authenticity investigation.
  • One object of the present invention is to provide a method for enabling user-friendly investigation of the authenticity of an object.
  • This object is according to a first aspect of the present invention achieved through a method for enabling the investigation of the authenticity of an object comprising the steps of: selecting at least one detectable element variation from a limited number of element variations that may be provided in relation to a layout, which layout is common to at least one group of such objects, storing at least a reference to an identity of the object together with reference object specifying data in a product database, providing an area of the object with said layout including said selected element variation, and providing the object with an identity, wherein the object specifying data includes reference element variation data identifying the selected element variation.
  • Another object of the present invention is to provide a device for enabling user-friendly investigation of the authenticity of an object.
  • This object is according to a second aspect of the present invention achieved through a device for enabling the investigation of the authenticity of an object comprising: at least one object modifying unit arranged to provide the object with an identity, and provide an area of the object with a graphical layout, a control unit arranged to select at least one detectable element variation from a limited number of element variations that may be provided in relation to the layout, which layout is common to at least one group of objects, store at least a reference to the identity together with reference object specifying data in a product database, where the reference object specifying data includes reference element variation data identifying the selected element variation, order the object modifying unit to provide the object with said layout including said selected element variation, and order the object modifying unit to provide the object with the identity.
  • Another object of the present invention is to provide a computer program product for enabling user-friendly investigation of the authenticity of an object.
  • This object is according to a third aspect of the present invention achieved through a computer program product for enabling the investigation of the authenticity of an object
  • a computer program product for enabling the investigation of the authenticity of an object
  • Another object of the present invention is to provide a method for investigating the authenticity of an object that is more user-friendly.
  • This object is according to a fourth aspect of the present invention achieved through a 5 method for investigating the authenticity of an object comprising the steps of: receiving an identity associated with an object, and locating reference object specifying data including reference element variation data for an element variation for the object in a product database based on the identity, in order to allow a comparison of said reference element variation data with at least one o detectable element variation provided in a layout to be made for indicating the authenticity of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be provided in the layout.
  • Another object of the present invention is to provide an authentication data handling device for investigating the authenticity of an object that is more user-friendly.
  • an authentication data handling device for investigating the authenticity of an object 0 comprising: an authenticating unit arranged to receive an identity associated with an object, and locate reference object specifying data including reference element variation data for the object in a product database based on the identity, 5 in order to allow a comparison of said reference element variation data with at least one detectable element variation provided in a layout to be made for indicating the authenticity of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be 0 provided in the layout.
  • Another object of the present invention is to provide a computer program product for investigating the authenticity of an object that in a more user-friendly way.
  • This object is according to a sixth aspect of the present invention achieved through a computer program product for investigating the authenticity of an object, comprising computer program code to make an authentication data handling device perform when said computer program code is loaded into said authentication data handling device: 5 receive an identity associated with an object, and locate reference object specifying data including reference element variation data for the object in a product database based on the identity, in order to allow a comparison of said reference element variation data with at least one detectable element variation provided in a layout to be made for indicating the authenticity o of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be provided in the layout.
  • An element variation as used here is intended to cover variations of an element of a 5 layout provided for an object.
  • This element may be visual such as a special font used in characters in the layout, a special colour, a special icon, a special string of characters or image or a special pattern. It may also be tactile in that such an element, like a special string of characters or a pattern may be embossed in a layout.
  • the element may also be a special odour provided to a product.
  • the manufacturing method for such element variation is based on digital marking technologies like digital printing, laser writing, or digital embossing, so that each layout is digitally defined and applied. When the element variation is digitally defined, its data are easily stored in the database.
  • digital marking technologies give a good data basis for calculation of images that possibly represent how a certain product should look 5 like including its element variation or variations.
  • digital printing as printing method for the product makes it possible to integrate the added element variations in the print jobs without any additional printing steps, whereby the manufacturing is facilitated.
  • the present invention has many advantages. It allows a user to determine the authenticity 0 of an object in a fast and simple way and without requiring any complicated and expensive equipment for investigation of an object.
  • the authentication is furthermore not limited to being carried out in any special place like a laboratory, but can be carried out virtually anywhere. This means that the invention can be carried out without having to resort to various security technologies, although it may very well be combined with such security technologies if it is deemed necessary.
  • the present invention thus lowers the technology threshold while keeping a high security level.
  • fig. 1 schematically shows an authenticity investigation enabling device and an authentication data handling device both connected to a database, as well as an object being provided with a graphical layout
  • fig. 2 shows a graphical layout of the object according to a first embodiment of the present invention
  • fig. 3 shows a graphical layout of the object according to a second embodiment of the present invention
  • fig. 4 shows a table of how content is organised in the database according to some variations of the present invention
  • fig. 5 shows a flow chart outlining a number of method steps taken in a method for enabling the investigation of the authenticity of an object according to the present invention being performed in the authenticity investigation enabling device, fig.
  • FIG. 6 shows a flow chart outlining a number of method steps taken in a method for performing investigations about an object according to the present invention performed in the authentication data handling device
  • fig. 7 shows a block schematic of the relevant parts of an object investigating device
  • fig. 8 shows a table of how content is organised in the database according to some other variations of the present invention
  • fig. 9 schematically shows a computer program product in the form of a CD ROM disc comprising computer program code for carrying out a method of the present invention.
  • Fig. 1 schematically shows a device for enabling the investigation of the authenticity of an object or an authenticity investigation enabling device 10 together with such an object 18.
  • Fig. 1 also shows an authentication data handling device 22. Both these devices 10 and 22 are furthermore connected to a product database 20. These devices 10 and 22 and the database 20 may communicate with each other using a network, which is with advantage
  • a computer network like a LAN, the Internet or some other type of network. It is also possible that they communicate with each other via some form of telecommunication network or a short-range wireless network, like Bluetooth.
  • the devices may be co-located, but they may also be provided in different locations.
  • the authenticity investigation enabling device 10 may be located at the premises of a producer of the object or product, while the authentication data handling device 22 may be located at the premises of a company providing authenticity checks, such as at a retail company selling the object or a product associated with the object.
  • An object may be a package for a product or the product itself. It may furthermore be the combination of product and package. It is then possible that the identity is provided on the product while the graphical layout is provided on the package for the product or vice versa.
  • the authenticity investigation enabling device 10 here includes a first interface 12 for communicating with the database 20 and which is connected to a control unit 14, which in turn is connected to an object modifying unit 16.
  • the object modifying unit 16 may be digital marking equipment that can perform digital printing, laser marking, digital 35 embossing etc. It is capable of providing differentiated layouts of the object 18, which will be described in more detail later in relation to a graphical layout.
  • the authentication data handling device 22 includes a second interface 24 for communicating with the database 20.
  • the second interface 24 is connected to an authenticating unit 26, which in turn is connected to an element variation comparing unit 28 as well as to a display 30 and a 5 keyboard or keypad 32.
  • Fig. 2 and 3 show two different ways in which a graphical layout of the object can be provided.
  • the object is provided with an identity ID1 as well as with a graphical layout 34.
  • the identity is provided in the actual o graphical layout 34. It should however be realised that this identity may be provided on the object separately from the graphical layout 34.
  • the object may be provided in relation to a group of products of a product producer. This means that the object may be provided in relation to a group of products out of several different groups of products provided by the producer.
  • This graphical layout 34 has a main part that is common to at least one 5 group of such objects. It may also be common to a number of such groups or even to all the products of the producer.
  • the graphical layout may also include at least one section 36 that is varied, i.e. is not common.
  • this section 36 at least one detectable element variation 37 is provided.
  • This element variation is one out of a number of selectable element variations from a limited number of element variations that may be provided.
  • the graphical layout 34 includes only one image 38 that is printed on the object and in this embodiment shown in fig. 3, a section 36 is provided as a perceptible, and here visible, part of this image, where this section includes one element variation.
  • the element variation is coded into the common element of the graphical layout. The element variation 5 is thus here concealed by the common elements and not directly perceptible.
  • the element variation 37 is in both these embodiments shown as a special font of a piece of text in the graphical layout. Here it is possible to select various fonts for this piece of text. It should however be realised that the element variations may be provided in some other way like for instance applied to a company logotype or areas having certain colours or 0 combinations of colours, icons or images, character strings or special patterns. It is furthermore possible to apply a certain type of odour to the layout.
  • the product identity ID1 may here be provided as a bar code.
  • the first embodiment may be varied in that there may be more than one section. In this case the element variation may be provided in more than one such section.
  • the provision of more than one element variation e.g. at least a first and a second element variation, gives rise to a quite large number of different layouts when combining the element variations in different ways. This facilitates for the producer of the product as the limited number of element variations for each element variation can be kept small but still enables a safe authentication.
  • an element variation of the same or different types there may be provided more that one element variation of the same or different types.
  • the above described element variations need furthermore not be printed, but can be embossed or provided in any other suitable way in the layout. This means that an element variation does not have to be a variation of a visual element, but can be provided as a variation of an element that is perceived through other senses, like touch, smell, taste, or sound.
  • Fig. 4 depicts a table 40, which shows how content in the database 38 is organised according to a first variation of the present invention.
  • identity ID of an object there is corresponding reference element variation data (EV) identifying the corresponding selected element variation.
  • a number of identities are typically a production batch.
  • object identities ranging from 001 - 099 have received first reference element variation data EV1
  • object identities ranging from 100 - 199 have received second reference element variation data EV2
  • object identities ranging from 200 - 299 have received third reference element variation data EV3
  • object identities ranging from 300 - 399 have received fourth reference element variation data EV4.
  • each object's ID may, e.g. be randomly matched with a specific element variation data.
  • fig. 1 - 4 shows a flow chart outlining a number of method steps taken in a method for enabling the investigation of the authenticity of an object according to the present invention.
  • a detectable element variation 37 to be provided in a section 36 of the graphical layout 34 is here first selected by the control unit, step 42. It here selects one of a number of variations, which is here a 5 special font that is to be applied for a production batch. This means that all objects with identities within a range, which is here range 001 - 099 are provided with the selected element variation.
  • the object identities of the batch and reference object specifying data are then sent form the control unit 14 via the interface 12 to the database 20, where they are stored in the table 38, step 44.
  • the reference object specifying data includes o reference element variation data, which identifies the selected element variation. Since there is one element variation for the whole batch there may be an indicator of the identity interval of the batch stored. This can be seen as storing a reference to the identity together with the reference object specifying data.
  • the control unit 14 orders the object modifying unit 16 to provide the object with the object identity, step 46, and to 5 print the graphical layout with the selected element variation, step 48.
  • the graphical layout 34 is thus here provided in an area of the object and includes the selected element variation.
  • the section with the element variation is included in this image where the graphical layout is provided, while if two images are printed the graphical layout is provided in the first image, while the element variation is 0 provided in the second image. It should here be realised that it is possible to store the specific object identity together with the data identifying the selected element variation. It is also possible that the reference object specifying data includes also data identifying the common layout, which is then stored together with the reference element variation data.
  • the user may here access the authentication data handling device 22. This may be done through directly using it via a user interface in 5 the form of the display 30 and keyboard 32.
  • the authentication data handling device 22 may also be provided through a server on the Internet or any other suitable network, which the user who wants to investigate the authenticity of the object may access via his/her own computer. In this case the interface 24 would be used for communication with the computer of the user. This solution is very attractive since then a 5 user can authenticate a product from virtually every location on earth.
  • the user When a product is to be investigated the user thus gets in contact with the authenticating unit 26 of the authentication data handling device 22 via any of these interfaces 24 or 30 and 32. The user is then presented with the possibility to enter a product identity and
  • the object specifying data that should be entered then includes at least object element variation data identifying the selected detectable element variation, which data can be provided in a drop down list.
  • object element variation data identifying the selected detectable element variation, which data can be provided in a drop down list.
  • the user may thus be presented with a number of different fonts and be made to select one. It is also possible that the user may have to enter the element variation data
  • the authenticating unit 26 thus receives the object identity ID1 , step 50, which is here 20 ID1 , and object specifying data comprising the object element variation data EV1 ', step 52. After this has been done the authenticating unit 26 connects to the database 20 via the interface 24 and locates the reference element variation data EV1 of the object 18 having the received identity ID1 in the interval ID 001 - 0099 in the database 20, step 54. Thereafter this reference element variation data EV1 is sent from the authenticating unit 25 26 to the element variation comparing unit 28 together with the object element variation data EV1 ' received from the user.
  • the element variation comparing unit 28 compares the reference element variation data EV1 with the object element variation data EV1 ', step 56, and determines if there is a match or not, step 58. If there is a match, step 58, the authenticating unit 26 then indicates authenticity of the product, step 62, while if there is 30 no match, step 58, the authenticating unit 26 indicates a mismatch, step 60, which is an indication that the object is related to counterfeit goods.
  • a product identifier is entered by the user and the reference element variation data retrieved from the authentication database and presented to the user. It may here be displayed, for instance through showing the actual graphical layout with the reference element variation or be presented as description of varied markings, possibly also pointing out common security identification means to the group of products which this product belongs to.
  • variable data are displayed to the user
  • the actual authentication is performed by the user by comparing the described features and the product with the ones he/she can directly perceive from the object.
  • the device When the device performs the authentication, it is also possible that the user is made to indicate the common layout of the object, which is then compared with data identifying the common layout from the database. Further rules may also be applied to include analysis of geographical information, time stamps, or supply chain information prior to authentication.
  • the element variation is coded in the common elements of the graphical layout, it is still possible for the user to investigate the element variation. If the user in this case has a special lens, foil or filter, which reveals the element variation in the second image when being placed over the first image. Such a foil may be small and the user can carry it around with him/her.
  • the graphical layout of the object may be photographed by the user. If the camera used has image analysis capability it is here possible for the user to see the element variation and then enter or send the object element variation data to the authentication data handling device. This may then be done using a mobile phone.
  • the element variation comparing unit includes an image analysing unit.
  • the object specifying data may comprise a scanned image of the graphical layout, which may be sent to the authenticating unit of the authentication data handling device.
  • the authentication data handling device may then analyse the image, present the data in the second image to the user, who in turn enters the object element variation data. It is also possible that the user is directed to another device where such image analysis may be performed.
  • the database includes a reference image which is obtained and provided to the image analysing unit of the element variation comparing unit, which thereafter compares the elements of the two images and indicates a match based on the comparison.
  • the authenticity investigation enabling device 10 in this embodiment stores further reference object specifying data in the database 20.
  • This further reference object specifying data is here material properties related to an area of an object group and measurement specifying data in the form of a number of settings S for how to perform measurements in those areas of the object group.
  • the table in fig. 7 is similar to the table in fig. 4, however it includes two extra columns. These columns include sets of material properties P and measurement specifying data S for how to perform measurements in areas of the objects.
  • the material property data are preferably pre-measured properties of the object. These measurements have then been performed beforehand, for instance by the object provider, preferably before shipping of said objects
  • Fig. 8 shows a block schematic that outlines the general structure of an object investigating device 64, with which the user can inspect the object and to be connected to the authentication data handling device.
  • the object 18 is made of a certain type of material and is provided with a code field, that in this embodiment is provided as a bar code BC providing an code C corresponding to the object identity ID1.
  • the code C may be an identity ID1 or it may be a code, which enables the identity to be determined based 5 on some code determining algorithm. Such a determination of the identity corresponding to the code may be provided in the authentication data handling device 22.
  • the code C may be identical with the identity ID1 for a correctly identified object.
  • the object 18 furthermore has one area A, where the structure of the material has been tampered with in order to provide a signature that can be detected.
  • the measured material properties o that thus indicate the signature are denoted as P1 '.
  • the signature has been embedded through the area A comprising a fluorescent taggant or marker in order to define a selective fluorescence pattern.
  • the taggant may be provided through adding small particles having a certain fluorescence that differs from the fluorescence of the box material at selected positions within the area A. There are several ways in which this 5 tampering can be made, a few of which will be described further on in the description. It should here be realised that the material need not be tampered with at all.
  • the device 64 is provided with an object identity detector 68 which is here provided as a bar code reader. It also has a 0 material properties measurement unit 70, which in this embodiment is made up of a light source 72 arranged to move over the area A and one or a number of light detectors 74 that move in parallel with the light source 72 and detect light reflected from the surface of the object. In the figure, only one such detector 74 is shown in order to simplify the understanding of the present invention. However, it should be realised that there may be 5 several such detectors.
  • the device furthermore includes an object investigation control unit 66 controlling the units 68 and 70 as well as a communication interface 76 to the network.
  • the object investigation control 0 unit 66 orders the bar code reader 68 to read the bar code BC.
  • the bar code reader 68 then obtains the identity ID1 of the object 18 by detecting it through reading the code C provided by the bar code BC.
  • the thus detected identity ID1 is then forwarded to the authentication data handling device 22.
  • This may be accompanied by the previously mentioned object element variation data.
  • the authentication data handling device 22 then 5 obtains the settings S1 that are associated with the identity ID1 from the database 20. This can be done simultaneously with the locating of reference element variation data described above and here it is possible that also the pre-stored material property data P1 associated with the object 18 are fetched at the same time.
  • the authentication data handling device 22 then sends the settings S1 to the object investigating device 64, where the control unit 66 applies the settings S1 on the material properties measurement unit 70. In this way the material properties measurement unit 70 is adjusted according to the received settings S1 .
  • Typical settings may here include data indicating where the area A is located. Other information may be coordinates where to o scan, the direction and size of scan area, scanning speed, detector sensitivity, calibration parameters, frequency and resolution (both in time and space). Also the analysis parameters may be varied and specified.
  • the light source 72 which may with advantage be a laser, is set to scan the area A with light L having a certain frequency profile.
  • the light detector 74 which may with advantage be a 5 diode laser, then detects or measures the material properties P1 '.
  • the fluorescence in a certain area is measured while scanning the irradiating frequency. This can be done by tuning a laser or by irradiation with multi-frequency light which passes a prism. Then these measured properties P1 ' are provided to the authentication data handling device 22. 0
  • the authentication data handling device 22 compares the received material properties P1 with the measured material properties P1 ' and bases the indication of authenticity also on this comparison.
  • the measurements can be multi-tasks like for example frequency scanning in certain sequences and frequency bands whereas the response is delivered to the authentication system and a comparison with identity related data is performed to check the identity of the object having a certain identity.
  • the fluorescence in a certain area may be measured while scanning the irradiating frequency. This can be done by tuning a laser or by irradiation with multifrequency light which passes a prism.
  • the fluorescence profile would depend on the materials used in manufacturing of the object. In many cases, materials have very specific fluorescence 5 profiles and can as such reveal copied materials with different origin. This is the case, for example, for some paperboard substrates.
  • fluorescent taggants or markers can be used to define a selective fluorescence pattern. This would provide the object with an additional security feature since it is not sufficient to provide a feature giving a certain response at a o certain frequency but the response would have to be correlated for several frequencies.
  • any measurements that characterize an item in a physical or chemical manner can be used.
  • Other examples are: electrical nose (chemical analysis), atomic force microscopy, air 5 leakage, profile scanning, weight, inertia, x-ray, acoustic sensing.
  • the measurement specifying data can be provided in the form of pre-defined measurement protocols.
  • item-related pre-defined measurement protocols or analysis enables the detection of statistical variations inherent in material through so- 0 called micro-level analysis, even though the material is considered to be identical on a macro-level.
  • Micro-level analysis can reveal signature information that identifies a certain part of a material. This signature can be unique or sufficiently distinct to be used as a specific object property.
  • One embodiment of the invention could use unique identities for each item and a signature would be unambiguous for authentication of an item. 5
  • One embodiment of this invention is related to communication about any kind of measurement protocols to be applied for testing the identity of an object and communication of results for comparison with data from the database.
  • measurement instructions are coordinates where to scan, the direction and size of scan 0 area, scanning speed, resolution (in time and in space), frequency, magnetic or electronic parameters, but the invention is not limited to the parameters mentioned here.
  • analysis parameters like calibration, normalization or reference data can be communicated too.
  • Other data can be parameter settings, localization of measurement 5 points etc.
  • a combination of measurements is possible. For example image analysis from a white light reflection scan may be used for identifying the relevant area when performing a signature scan.
  • each object is identified by a code, which above was provided as a 5 barcode.
  • a code written to an RFID tag.
  • the object identity can be unique for each object or it can be the same for a group of objects. It is also possible that the material properties are common for a group of objects.
  • the control unit of the authenticity investigation enabling device and the authenticating unit and element variation comparing unit of the authentication data handling device may each be implemented through one or more processors together with computer program code for performing their functions.
  • the authentication data handling device may here 0 also be provided as a mobile phone.
  • the program code mentioned above may also be provided as a computer program product, for instance in the form of one or more data carriers carrying computer program code for performing the functionality of the present invention when being loaded into a device having computing functionality, such as a computer or a mobile phone.
  • One such carrier 78, in the form of a CD ROM disc is 5 generally outlined in fig. 9. It is however feasible with other data carriers, like diskettes, memory sticks or USB memories.
  • the computer program code can furthermore be provided as pure program code on an external server and fetched from there for provision in the device or entity that is to receive it.

Abstract

A device (10) for enabling the investigation of the authenticity of an object (18) comprises a object modifying unit (16), which provides the object (18) with an identity and an area of 5 the object with a graphical layout, and a control unit (14), which selects a detectable element variation, orders the object modifying unit (16) to provide the object (18) with the graphical layout including the selected element variation, and stores the identity together with reference element variation data identifying the selected element variation in a product database (20). An authentication data handling device (22) receives an identity of 10 an object (18) and locates reference element variation data in a product database (20) in order to allow a comparison of the data with an element variation of the object for indicating the authenticity of the object.

Description

USER-FRIENDLY AUTHENTICITY INVESTIGATION
TECHNICAL FIELD OF THE INVENTION
The present invention relates to the investigation of the authenticity of objects. The invention more particularly relates to a method, device and computer program for enabling the investigation of the authenticity of an object as well as a method, authentication data handling device and computer program product for investigating the authenticity of an object.
DESCRIPTION OF RELATED ART
Illegal copying of objects is a big problem for companies, organisations and individuals. Illegal copying involves such things as copying products to be sold, counterfeiting, as well as copying of security items, such as identity cards, credit cards, bank cards and certificates. Counterfeiting is an increasing problem for manufacturers and users. Through counterfeiting copies of goods appear that resemble the goods of the rightful owners. This can lead to considerable economical losses for the companies that provide products.
Due to this, different methods have evolved to identify a product as being rightfully issued by a certain entity, which may be a company, an organisation, a state but also individuals.
In this context systems are known in the art for enabling information exchange related to objects, where an object may be a product or the package provided for a product. The objects are here identified by their unique code. A system for identifying a code then normally involves the reading of the code, which code is attached to or integrated into the object. Reading of the code is then performed using a reading device. In case the code is originally in a non-numerous mode like an image, a barcode, or a combination of properties or numeric values, that information is used for calculation of an identification number, an ID. The object is uniquely identified by its code, and it's ID. The code and the ID can be identical or unambiguously correlated to each other. The ID is entered into a system which enables information exchange. The system provides information related to the specific ID, which information has been stored to the system at an earlier stage. In the art, systems for providing information about the whereabouts of an item by reading the item's unique ID are known. This is commonly used in track & trace systems. It is also known in the art that the unique ID of an item or product can be used for authenticity requests. For authentication of a product it is checked whether the product's ID has been issued by the manufacturer and whether it is currently in circulation. Further rules may be applied to include analysis of geographical information, time stamps, or supply chain information prior to authentication. The authentication database of issued IDs is maintained by the manufacturer or by a third party on behalf of the manufacturer. It can also contain further data related to the product or production.
Systems providing track & trace or authentication information are either based on a centralized database or the database is distributed among several information providers. In the latter case software is used for compiling the information from several information providers. The information can be exchanged remotely as long as a connection is established between a requesting party and the database.
The connection to the centralized or distributed database can be made via a network connection. The network can be a private network or it can be internet-based. It can also include additional telecommunication means like mobile phones or Bluetooth etc. The information which is stored in connection to track & trace information related to a product is usually product name, tracking history (where and when the ID of an item has been read), expiry date of product, and further product description (for example dosage and package size).
Connected to the network are at least one or several databases for maintaining the database information. Connected to the network are also one or more reader or interface devices which enable input of ID for requests or for registration of a reading event.
One disadvantage with these prior art systems is that the identifying number or code might be copied and used on non-authentic products. Further security measures against counterfeiting are needed in order to prevent the copying of an item. These security features are often having impact on the production process since security materials require secure material handling procedures. One technology which is not yet commonly used but often mentioned is RFID. It is a common opinion that an item ID provided by a chip from an RFID tag is considered to be more secure than printed versions of codes since the RFID chips themselves are hard to copy. However, RFID is currently not cost-effective for item-level use for most products.
5
Systems are also known in the art for integration of security features in a product. In connection to this, devices are used for detecting and controlling security features on products. Examples of security features which have been applied to products are: fluorescent markers in packaging materials, metal threads in banknotes, micro-text o printing, code printing, taggants, and many, many others. For such security features the general term signature is used here.
The signatures are either detected on-site by appropriate equipment (for example an UV- lamp is used to look at UV-fluorescent features), or specialized readers that signal 5 authenticity in case they detect a certain fluorescence pattern.
One reason for the use of proprietary signatures is that a manufacturer has control over the use of material containing such signatures. This is necessary in order to control (i.e. avoid) the diversion of security material to counterfeiters and is especially valid where the 0 signature is applied for example by addition of security particles like taggants, which are often integrated in the packaging substrate while other signatures might be added at a later stage, for example in the converting or printing. Usually, the proprietary signatures are read by proprietary readers designed for detection of the proprietary signature.
5 Systems are known in the art for verification of intrinsic properties which identify an object uniquely, for example scanning of the surface structure of a paper, see for example WO 2005/088533. The scanned information is then compared with information representing the original scan. This information can be retrieved from a database. Either a known database is searched for a certain signature or a pointer is used to point at the 0 corresponding signature of the original object with the same ID. The ID can be the pointer used for finding or identifying the corresponding signature.
The above mentioned additional security measures require the use of special security data identifying equipment. This may involve heavy investments for a user wanting to 5 know if a product is authentic or not. A user wanting to authenticate an object may furthermore not be physically at the same place where this authentication equipment is provided, which may involve travel in order to authenticate an object. Many security features are targeting secure identification of products performed by investigators, customs, brand owners. Many of those are not targeting the user or consumer. The consumer would still have to rely on the product sold being authentic.
There is therefore a need for a simpler and more user-friendly authenticating process that still guarantees a reasonable degree of safety.
SUMMARY OF THE INVENTION
The present invention is therefore directed towards providing a user-friendly authenticity investigation.
One object of the present invention is to provide a method for enabling user-friendly investigation of the authenticity of an object.
This object is according to a first aspect of the present invention achieved through a method for enabling the investigation of the authenticity of an object comprising the steps of: selecting at least one detectable element variation from a limited number of element variations that may be provided in relation to a layout, which layout is common to at least one group of such objects, storing at least a reference to an identity of the object together with reference object specifying data in a product database, providing an area of the object with said layout including said selected element variation, and providing the object with an identity, wherein the object specifying data includes reference element variation data identifying the selected element variation.
Another object of the present invention is to provide a device for enabling user-friendly investigation of the authenticity of an object. This object is according to a second aspect of the present invention achieved through a device for enabling the investigation of the authenticity of an object comprising: at least one object modifying unit arranged to provide the object with an identity, and provide an area of the object with a graphical layout, a control unit arranged to select at least one detectable element variation from a limited number of element variations that may be provided in relation to the layout, which layout is common to at least one group of objects, store at least a reference to the identity together with reference object specifying data in a product database, where the reference object specifying data includes reference element variation data identifying the selected element variation, order the object modifying unit to provide the object with said layout including said selected element variation, and order the object modifying unit to provide the object with the identity.
Another object of the present invention is to provide a computer program product for enabling user-friendly investigation of the authenticity of an object.
This object is according to a third aspect of the present invention achieved through a computer program product for enabling the investigation of the authenticity of an object comprising: computer program code to make an authenticity investigation enabling device, when said computer program code is loaded into said authenticity investigation enabling device: select at least one detectable element variation from a limited number of element variations that may be provided in relation to a graphical layout, which layout is common to at least one group of objects, store at least a reference to an identity of the object together with reference object specifying data in a product database, order an object modifying unit to provide the object with said layout including said selected element variation, and order the object modifying unit to provide the object with the identity, wherein the reference object specifying data includes reference element variation data identifying the selected element variation. Another object of the present invention is to provide a method for investigating the authenticity of an object that is more user-friendly.
This object is according to a fourth aspect of the present invention achieved through a 5 method for investigating the authenticity of an object comprising the steps of: receiving an identity associated with an object, and locating reference object specifying data including reference element variation data for an element variation for the object in a product database based on the identity, in order to allow a comparison of said reference element variation data with at least one o detectable element variation provided in a layout to be made for indicating the authenticity of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be provided in the layout.
5 Another object of the present invention is to provide an authentication data handling device for investigating the authenticity of an object that is more user-friendly.
This object is according to a fifth aspect of the present invention achieved through an authentication data handling device for investigating the authenticity of an object 0 comprising: an authenticating unit arranged to receive an identity associated with an object, and locate reference object specifying data including reference element variation data for the object in a product database based on the identity, 5 in order to allow a comparison of said reference element variation data with at least one detectable element variation provided in a layout to be made for indicating the authenticity of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be 0 provided in the layout.
Another object of the present invention is to provide a computer program product for investigating the authenticity of an object that in a more user-friendly way. This object is according to a sixth aspect of the present invention achieved through a computer program product for investigating the authenticity of an object, comprising computer program code to make an authentication data handling device perform when said computer program code is loaded into said authentication data handling device: 5 receive an identity associated with an object, and locate reference object specifying data including reference element variation data for the object in a product database based on the identity, in order to allow a comparison of said reference element variation data with at least one detectable element variation provided in a layout to be made for indicating the authenticity o of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be provided in the layout.
An element variation as used here is intended to cover variations of an element of a 5 layout provided for an object. This element may be visual such as a special font used in characters in the layout, a special colour, a special icon, a special string of characters or image or a special pattern. It may also be tactile in that such an element, like a special string of characters or a pattern may be embossed in a layout. The element may also be a special odour provided to a product. In a preferred embodiment of the present invention, 0 the manufacturing method for such element variation is based on digital marking technologies like digital printing, laser writing, or digital embossing, so that each layout is digitally defined and applied. When the element variation is digitally defined, its data are easily stored in the database. Furthermore, digital marking technologies give a good data basis for calculation of images that possibly represent how a certain product should look 5 like including its element variation or variations. The use of digital printing as printing method for the product makes it possible to integrate the added element variations in the print jobs without any additional printing steps, whereby the manufacturing is facilitated.
The present invention has many advantages. It allows a user to determine the authenticity 0 of an object in a fast and simple way and without requiring any complicated and expensive equipment for investigation of an object. The authentication is furthermore not limited to being carried out in any special place like a laboratory, but can be carried out virtually anywhere. This means that the invention can be carried out without having to resort to various security technologies, although it may very well be combined with such security technologies if it is deemed necessary. The present invention thus lowers the technology threshold while keeping a high security level.
It should be emphasized that the term "comprises/comprising" when used in this specification is taken to specify the presence of stated features, integers, steps or components, but does not preclude the presence or addition of one or more other features, integers, steps, components or groups thereof.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will now be described in more detail in relation to the enclosed drawings, in which:
fig. 1 schematically shows an authenticity investigation enabling device and an authentication data handling device both connected to a database, as well as an object being provided with a graphical layout, fig. 2 shows a graphical layout of the object according to a first embodiment of the present invention, fig. 3 shows a graphical layout of the object according to a second embodiment of the present invention, fig. 4 shows a table of how content is organised in the database according to some variations of the present invention, fig. 5 shows a flow chart outlining a number of method steps taken in a method for enabling the investigation of the authenticity of an object according to the present invention being performed in the authenticity investigation enabling device, fig. 6 shows a flow chart outlining a number of method steps taken in a method for performing investigations about an object according to the present invention performed in the authentication data handling device, fig. 7 shows a block schematic of the relevant parts of an object investigating device, fig. 8 shows a table of how content is organised in the database according to some other variations of the present invention, and fig. 9 schematically shows a computer program product in the form of a CD ROM disc comprising computer program code for carrying out a method of the present invention.
DETAILED DESCRIPTION OF EMBODIMENTS In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular architectures, interfaces, techniques, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to 5 those skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well known devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
1 o Fig. 1 schematically shows a device for enabling the investigation of the authenticity of an object or an authenticity investigation enabling device 10 together with such an object 18. Fig. 1 also shows an authentication data handling device 22. Both these devices 10 and 22 are furthermore connected to a product database 20. These devices 10 and 22 and the database 20 may communicate with each other using a network, which is with advantage
15 a computer network, like a LAN, the Internet or some other type of network. It is also possible that they communicate with each other via some form of telecommunication network or a short-range wireless network, like Bluetooth. The devices may be co-located, but they may also be provided in different locations. Here it should be realised that the authenticity investigation enabling device 10 and the authentication data handling device
20 22 may be provided at different locations or sites, where the authenticity investigation enabling device 10 may be located at the premises of a producer of the object or product, while the authentication data handling device 22 may be located at the premises of a company providing authenticity checks, such as at a retail company selling the object or a product associated with the object.
25
An object may be a package for a product or the product itself. It may furthermore be the combination of product and package. It is then possible that the identity is provided on the product while the graphical layout is provided on the package for the product or vice versa.
30
The authenticity investigation enabling device 10 here includes a first interface 12 for communicating with the database 20 and which is connected to a control unit 14, which in turn is connected to an object modifying unit 16. The object modifying unit 16 may be digital marking equipment that can perform digital printing, laser marking, digital 35 embossing etc. It is capable of providing differentiated layouts of the object 18, which will be described in more detail later in relation to a graphical layout. The authentication data handling device 22, includes a second interface 24 for communicating with the database 20. The second interface 24 is connected to an authenticating unit 26, which in turn is connected to an element variation comparing unit 28 as well as to a display 30 and a 5 keyboard or keypad 32.
Fig. 2 and 3 show two different ways in which a graphical layout of the object can be provided. According to the present invention the object is provided with an identity ID1 as well as with a graphical layout 34. In fig. 2 and 3 the identity is provided in the actual o graphical layout 34. It should however be realised that this identity may be provided on the object separately from the graphical layout 34. The object may be provided in relation to a group of products of a product producer. This means that the object may be provided in relation to a group of products out of several different groups of products provided by the producer. This graphical layout 34 has a main part that is common to at least one 5 group of such objects. It may also be common to a number of such groups or even to all the products of the producer. The graphical layout may also include at least one section 36 that is varied, i.e. is not common. In this section 36 at least one detectable element variation 37 is provided. This element variation is one out of a number of selectable element variations from a limited number of element variations that may be provided. In a 0 first embodiment of the present invention the graphical layout 34 includes only one image 38 that is printed on the object and in this embodiment shown in fig. 3, a section 36 is provided as a perceptible, and here visible, part of this image, where this section includes one element variation. In a second embodiment of the present invention, the element variation is coded into the common element of the graphical layout. The element variation 5 is thus here concealed by the common elements and not directly perceptible. The element variation 37 is in both these embodiments shown as a special font of a piece of text in the graphical layout. Here it is possible to select various fonts for this piece of text. It should however be realised that the element variations may be provided in some other way like for instance applied to a company logotype or areas having certain colours or 0 combinations of colours, icons or images, character strings or special patterns. It is furthermore possible to apply a certain type of odour to the layout. The product identity ID1 may here be provided as a bar code. It should also be realised that the first embodiment may be varied in that there may be more than one section. In this case the element variation may be provided in more than one such section. There may furthermore 5 be provided more than one element variation provided in one or more sections, and there may be provided different element variations in the same section or in different sections. The provision of more than one element variation, e.g. at least a first and a second element variation, gives rise to a quite large number of different layouts when combining the element variations in different ways. This facilitates for the producer of the product as the limited number of element variations for each element variation can be kept small but still enables a safe authentication. Moreover, in this way it is more difficult for potential counterfeiters to become aware of all possible element variations and to copy the required combinations of element variations for a certain ID. The latter is valid especially in case different marking technologies are required for certain element variations.
Also in the second embodiment there may be provided more that one element variation of the same or different types. The above described element variations need furthermore not be printed, but can be embossed or provided in any other suitable way in the layout. This means that an element variation does not have to be a variation of a visual element, but can be provided as a variation of an element that is perceived through other senses, like touch, smell, taste, or sound.
Fig. 4 depicts a table 40, which shows how content in the database 38 is organised according to a first variation of the present invention. For a number of identities ID of an object, there is corresponding reference element variation data (EV) identifying the corresponding selected element variation. Here a number of identities are typically a production batch. Thus it can be seen that object identities ranging from 001 - 099 have received first reference element variation data EV1 , object identities ranging from 100 - 199 have received second reference element variation data EV2, object identities ranging from 200 - 299 have received third reference element variation data EV3 and object identities ranging from 300 - 399 have received fourth reference element variation data EV4. Here it should be realised that as an alternative there may be provided different reference element variation data for each ID in a batch or different element variation data for each object's ID. Each object's ID may, e.g. be randomly matched with a specific element variation data.
Now the operation of the authenticity investigation enabling device will be described in relation to previously mentioned fig. 1 - 4 as well as to fig. 5, which shows a flow chart outlining a number of method steps taken in a method for enabling the investigation of the authenticity of an object according to the present invention. In the production process, and here in the packaging of products a detectable element variation 37 to be provided in a section 36 of the graphical layout 34 is here first selected by the control unit, step 42. It here selects one of a number of variations, which is here a 5 special font that is to be applied for a production batch. This means that all objects with identities within a range, which is here range 001 - 099 are provided with the selected element variation. The object identities of the batch and reference object specifying data are then sent form the control unit 14 via the interface 12 to the database 20, where they are stored in the table 38, step 44. Here the reference object specifying data includes o reference element variation data, which identifies the selected element variation. Since there is one element variation for the whole batch there may be an indicator of the identity interval of the batch stored. This can be seen as storing a reference to the identity together with the reference object specifying data. Thereafter the control unit 14 orders the object modifying unit 16 to provide the object with the object identity, step 46, and to 5 print the graphical layout with the selected element variation, step 48. The graphical layout 34 is thus here provided in an area of the object and includes the selected element variation. In case there is only one image, the section with the element variation is included in this image where the graphical layout is provided, while if two images are printed the graphical layout is provided in the first image, while the element variation is 0 provided in the second image. It should here be realised that it is possible to store the specific object identity together with the data identifying the selected element variation. It is also possible that the reference object specifying data includes also data identifying the common layout, which is then stored together with the reference element variation data.
5 In this way it is now possible to investigate the authenticity of the object.
The functioning of the authentication data handling device 22 will now be described with reference being made to fig. 1 - 4 and 6, which latter figure shows a flow chart outlining a number of method steps taken in a method for performing investigations about an object 0 according to the present invention.
It all starts with a user investigating of an object 18, which in the present example is the package for a product in the form of a box The user may here access the authentication data handling device 22. This may be done through directly using it via a user interface in 5 the form of the display 30 and keyboard 32. However, the authentication data handling device 22 may also be provided through a server on the Internet or any other suitable network, which the user who wants to investigate the authenticity of the object may access via his/her own computer. In this case the interface 24 would be used for communication with the computer of the user. This solution is very attractive since then a 5 user can authenticate a product from virtually every location on earth.
When a product is to be investigated the user thus gets in contact with the authenticating unit 26 of the authentication data handling device 22 via any of these interfaces 24 or 30 and 32. The user is then presented with the possibility to enter a product identity and
1 o object specifying data. The object specifying data that should be entered then includes at least object element variation data identifying the selected detectable element variation, which data can be provided in a drop down list. In the case of fonts shown in fig. 2 and 3, the user may thus be presented with a number of different fonts and be made to select one. It is also possible that the user may have to enter the element variation data
15 him/herself, especially if colours are used. The user can then visually inspect the product and enter the required data. As an alternative it is here also possible to enter data concerning of the common parts of graphical layout.
The authenticating unit 26 thus receives the object identity ID1 , step 50, which is here 20 ID1 , and object specifying data comprising the object element variation data EV1 ', step 52. After this has been done the authenticating unit 26 connects to the database 20 via the interface 24 and locates the reference element variation data EV1 of the object 18 having the received identity ID1 in the interval ID 001 - 0099 in the database 20, step 54. Thereafter this reference element variation data EV1 is sent from the authenticating unit 25 26 to the element variation comparing unit 28 together with the object element variation data EV1 ' received from the user. The element variation comparing unit 28 then compares the reference element variation data EV1 with the object element variation data EV1 ', step 56, and determines if there is a match or not, step 58. If there is a match, step 58, the authenticating unit 26 then indicates authenticity of the product, step 62, while if there is 30 no match, step 58, the authenticating unit 26 indicates a mismatch, step 60, which is an indication that the object is related to counterfeit goods.
In this way it is possible for a user to determine the authenticity of an object in a fast and simple way and without requiring any complicated and expensive equipment that 35 investigates any signatures of the object. There are several ways in which the invention can be varied.
It is possible that the user performs the authentication him/herself. In this case a product identifier is entered by the user and the reference element variation data retrieved from the authentication database and presented to the user. It may here be displayed, for instance through showing the actual graphical layout with the reference element variation or be presented as description of varied markings, possibly also pointing out common security identification means to the group of products which this product belongs to.
In case the variable data are displayed to the user, the actual authentication is performed by the user by comparing the described features and the product with the ones he/she can directly perceive from the object.
When the device performs the authentication, it is also possible that the user is made to indicate the common layout of the object, which is then compared with data identifying the common layout from the database. Further rules may also be applied to include analysis of geographical information, time stamps, or supply chain information prior to authentication.
In case the element variation is coded in the common elements of the graphical layout, it is still possible for the user to investigate the element variation. If the user in this case has a special lens, foil or filter, which reveals the element variation in the second image when being placed over the first image. Such a foil may be small and the user can carry it around with him/her.
As an alternative the graphical layout of the object may be photographed by the user. If the camera used has image analysis capability it is here possible for the user to see the element variation and then enter or send the object element variation data to the authentication data handling device. This may then be done using a mobile phone.
It is also possible that the element variation comparing unit includes an image analysing unit. In this case the object specifying data may comprise a scanned image of the graphical layout, which may be sent to the authenticating unit of the authentication data handling device. The authentication data handling device may then analyse the image, present the data in the second image to the user, who in turn enters the object element variation data. It is also possible that the user is directed to another device where such image analysis may be performed.
Here it is also possible that the database includes a reference image which is obtained and provided to the image analysing unit of the element variation comparing unit, which thereafter compares the elements of the two images and indicates a match based on the comparison.
It is possible to provide even safer detection of the authenticity of an object. This can be done by using measurements of the properties of the object in a special way. This will now be described with reference being made to fig. 7, which generally shows how content in the database 20 is organised according to a second variation of the present invention and to fig. 8, which shows a block schematic that outlines the general structure of an object investigating device.
The authenticity investigation enabling device 10 in this embodiment stores further reference object specifying data in the database 20. This further reference object specifying data is here material properties related to an area of an object group and measurement specifying data in the form of a number of settings S for how to perform measurements in those areas of the object group. The table in fig. 7 is similar to the table in fig. 4, however it includes two extra columns. These columns include sets of material properties P and measurement specifying data S for how to perform measurements in areas of the objects. In the table there are thus shown a first set of material properties P1 and a first number of settings S1 for the first range of identities ID 001 - 099, a second set of material properties P2 and a second number of settings S2 for the second range of identities ID 100 - 199, a third set of material properties P3 and a third number of settings S3 for a third range of identities ID 201 - 299 as well as a fourth set of material properties P4 and a fourth number of settings S4 for the fourth range of identities ID 301 - 399. The material property data are preferably pre-measured properties of the object. These measurements have then been performed beforehand, for instance by the object provider, preferably before shipping of said objects
Fig. 8 shows a block schematic that outlines the general structure of an object investigating device 64, with which the user can inspect the object and to be connected to the authentication data handling device. Here the object 18 is made of a certain type of material and is provided with a code field, that in this embodiment is provided as a bar code BC providing an code C corresponding to the object identity ID1. The code C may be an identity ID1 or it may be a code, which enables the identity to be determined based 5 on some code determining algorithm. Such a determination of the identity corresponding to the code may be provided in the authentication data handling device 22. The code C may be identical with the identity ID1 for a correctly identified object. The object 18 furthermore has one area A, where the structure of the material has been tampered with in order to provide a signature that can be detected. The measured material properties o that thus indicate the signature are denoted as P1 '. Here the signature has been embedded through the area A comprising a fluorescent taggant or marker in order to define a selective fluorescence pattern. The taggant may be provided through adding small particles having a certain fluorescence that differs from the fluorescence of the box material at selected positions within the area A. There are several ways in which this 5 tampering can be made, a few of which will be described further on in the description. It should here be realised that the material need not be tampered with at all.
Since the object 18 is provided with an identity ID1 , the device 64 is provided with an object identity detector 68 which is here provided as a bar code reader. It also has a 0 material properties measurement unit 70, which in this embodiment is made up of a light source 72 arranged to move over the area A and one or a number of light detectors 74 that move in parallel with the light source 72 and detect light reflected from the surface of the object. In the figure, only one such detector 74 is shown in order to simplify the understanding of the present invention. However, it should be realised that there may be 5 several such detectors. The device furthermore includes an object investigation control unit 66 controlling the units 68 and 70 as well as a communication interface 76 to the network.
When the authenticity of the object 18 is to be inspected, the object investigation control 0 unit 66 orders the bar code reader 68 to read the bar code BC. The bar code reader 68 then obtains the identity ID1 of the object 18 by detecting it through reading the code C provided by the bar code BC. The thus detected identity ID1 is then forwarded to the authentication data handling device 22. This may be accompanied by the previously mentioned object element variation data. The authentication data handling device 22 then 5 obtains the settings S1 that are associated with the identity ID1 from the database 20. This can be done simultaneously with the locating of reference element variation data described above and here it is possible that also the pre-stored material property data P1 associated with the object 18 are fetched at the same time.
5 The authentication data handling device 22 then sends the settings S1 to the object investigating device 64, where the control unit 66 applies the settings S1 on the material properties measurement unit 70. In this way the material properties measurement unit 70 is adjusted according to the received settings S1 . Typical settings may here include data indicating where the area A is located. Other information may be coordinates where to o scan, the direction and size of scan area, scanning speed, detector sensitivity, calibration parameters, frequency and resolution (both in time and space). Also the analysis parameters may be varied and specified. As the settings S1 have been applied, the light source 72, which may with advantage be a laser, is set to scan the area A with light L having a certain frequency profile. The light detector 74, which may with advantage be a 5 diode laser, then detects or measures the material properties P1 '. In one example of the invention, the fluorescence in a certain area is measured while scanning the irradiating frequency. This can be done by tuning a laser or by irradiation with multi-frequency light which passes a prism. Then these measured properties P1 ' are provided to the authentication data handling device 22. 0
Thereafter the authentication data handling device 22 compares the received material properties P1 with the measured material properties P1 ' and bases the indication of authenticity also on this comparison.
5 In this way it is possible to provide a safe determination of the authenticity of an object. There is furthermore no need for a dedicated material properties measurement unit in the object investigating device, since the measurement specifying data indicates how it should be operated. Therefore the invention is versatile.
0 There are a number of ways in which measurements can be made. The measurements can be multi-tasks like for example frequency scanning in certain sequences and frequency bands whereas the response is delivered to the authentication system and a comparison with identity related data is performed to check the identity of the object having a certain identity. 5 The fluorescence in a certain area may be measured while scanning the irradiating frequency. This can be done by tuning a laser or by irradiation with multifrequency light which passes a prism. The fluorescence profile would depend on the materials used in manufacturing of the object. In many cases, materials have very specific fluorescence 5 profiles and can as such reveal copied materials with different origin. This is the case, for example, for some paperboard substrates. In case the fluorescence pattern is not regarded to be sufficiently discriminating, fluorescent taggants or markers can be used to define a selective fluorescence pattern. This would provide the object with an additional security feature since it is not sufficient to provide a feature giving a certain response at a o certain frequency but the response would have to be correlated for several frequencies.
Other types of detection than spectroscopic and optical detection may be provided. Any measurements that characterize an item in a physical or chemical manner can be used. Other examples are: electrical nose (chemical analysis), atomic force microscopy, air 5 leakage, profile scanning, weight, inertia, x-ray, acoustic sensing.
The measurement specifying data can be provided in the form of pre-defined measurement protocols. The use of item-related pre-defined measurement protocols or analysis enables the detection of statistical variations inherent in material through so- 0 called micro-level analysis, even though the material is considered to be identical on a macro-level. Micro-level analysis can reveal signature information that identifies a certain part of a material. This signature can be unique or sufficiently distinct to be used as a specific object property. One embodiment of the invention could use unique identities for each item and a signature would be unambiguous for authentication of an item. 5
One embodiment of this invention is related to communication about any kind of measurement protocols to be applied for testing the identity of an object and communication of results for comparison with data from the database. Examples of measurement instructions are coordinates where to scan, the direction and size of scan 0 area, scanning speed, resolution (in time and in space), frequency, magnetic or electronic parameters, but the invention is not limited to the parameters mentioned here. In addition to measurement parameters affecting the physical or chemical response to the measurements, analysis parameters like calibration, normalization or reference data can be communicated too. Other data can be parameter settings, localization of measurement 5 points etc. A combination of measurements is possible. For example image analysis from a white light reflection scan may be used for identifying the relevant area when performing a signature scan.
As mentioned above each object is identified by a code, which above was provided as a 5 barcode. However, it should be realised that it is also possible to use a code written to an RFID tag. The object identity can be unique for each object or it can be the same for a group of objects. It is also possible that the material properties are common for a group of objects.
o As mentioned above, when an identity is fed to the system, information is provided on how to measure certain features. These were above being described as control commands to the object investigating device without any human interaction. As an alternative these instructions can be given as text or numbers to a user, who is then performing the measurements as advised by the information. 5
The control unit of the authenticity investigation enabling device and the authenticating unit and element variation comparing unit of the authentication data handling device may each be implemented through one or more processors together with computer program code for performing their functions. The authentication data handling device may here 0 also be provided as a mobile phone. The program code mentioned above may also be provided as a computer program product, for instance in the form of one or more data carriers carrying computer program code for performing the functionality of the present invention when being loaded into a device having computing functionality, such as a computer or a mobile phone. One such carrier 78, in the form of a CD ROM disc is 5 generally outlined in fig. 9. It is however feasible with other data carriers, like diskettes, memory sticks or USB memories. The computer program code can furthermore be provided as pure program code on an external server and fetched from there for provision in the device or entity that is to receive it.
0 While the invention has been described in connection with what is presently considered to be most practical and preferred embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements. Therefore the present invention is only to be limited by the following claims.

Claims

1 . Method for enabling the investigation of the authenticity of an object (18) comprising the steps of:
5 selecting (42) at least one first detectable element variation from a limited number of element variations that may be provided in relation to a layout (34), which layout is common to at least one group of objects, storing (44) at least a reference to an identity (ID1 ) of the object (18) together with reference object specifying data (EV1 ; EV1 , P1 , S1 ) in a product database (20), o providing (46) an area of the object with said layout (34) including said selected element variation, and providing (48) the object with an identity (ID1 ), wherein the reference object specifying data includes reference element variation data (EV1 ) identifying the selected element variation. 5
2. Method according to claim 1 , wherein the layout is a graphical layout.
3. Method according to claim 1 or 2, wherein the first detectable element variation is provided as a perceptible variation in at least one section (36) of the layout (34). 0
4. Method according to any previous claim, wherein there is also a second detectable element variation.
5. Method according to any previous claim, wherein said step of storing comprises 5 storing also reference data identifying the common layout together with the reference element variation data (EV1 ).
6. Method according to any previous claim, wherein the step of providing an area of the object with said layout comprises providing said layout on the object (18) using digital 0 marking technology.
7. Method according to claim 6, wherein the layout is provided through a printed image (38, 39), where said at least one first element variation is coded into the common elements of the layout. 5
8. Method according to any previous claim, wherein said at least one first detectable element variation comprises an element in the group of: a special font used in characters in the layout, a special colour, a special icon or image, a special pattern, a special string of characters and an odour.
5
9. Method according to any previous claim, wherein the reference object specifying data includes measurement specifying data (S1 ) specifying the way measurements of properties of the object are to be carried out.
1 0 10. Method according to claim 9, wherein the measurement specifying data (S1 ) comprises data indicating a part of the object (18) which is to be irradiated with light (L) having a certain frequency profile.
1 1. Device (10) for enabling the investigation of the authenticity of an object (18) 15 comprising: at least one object modifying unit (16) arranged to provide the object (18) with an identity (ID1 ), and provide an area of the object with a layout (34), a control unit (14) arranged to 20 select at least one first detectable element variation (37) from a limited number of element variations that may be provided in relation to the layout (34), which layout is common to at least one group of objects, store at least a reference to the identity (ID1 ) together with reference object specifying data (EV1 ; EV1 , P1 , S1 ) in a product database (20), where the 25 reference object specifying data includes reference element variation data (EV1 ) identifying the selected element variation, order the object modifying unit (16) to provide an area of the object (18) with said layout (34) including said selected element variation, and order the object modifying unit (16) to provide the object with the identity (ID1 ).
30
12. Device (10) according to claim 1 1 , wherein the layout is a graphical layout.
13. Device (10) according to claim 1 1 or 12, wherein the first detectable element variation is provided in at least one section (36) of the layout (34).
35
14. Device (10) according to any of claims 1 1 - 13, wherein there is also a second detectable element variation.
15. Device (10) according to any of claims 1 1 - 14, wherein said control unit (14) when 5 performing said storing is arranged to store also data identifying the common layout together with the reference element variation data.
16. Device (10) according to any of claims 1 1 - 15, wherein said object modifying unit (16) is arranged to provide said layout on said area of the object using digital marking
1 o technology.
17. Device (10) according to claim 16, wherein the layout (34) is provided through a printed image (38,), where said at least one first element variation is coded into the common elements of the layout.
1 5
18. Device (10) according to any of claims 1 1 - 17, wherein the reference object specifying data includes measurement specifying data (S1 ) specifying the way measurements of properties of the object are to be carried out.
20 19. Device (10) according to claim 18, wherein the measurement specifying data comprises data indicating a part of the object which is to be irradiated with light (L) having a certain frequency profile.
20. Device (10) according to any of claims 10 - 15, wherein said device also includes the 25 database (20).
21. Computer program product (78) for enabling the investigation of the authenticity of an object (18) comprising: computer program code to make an authenticity investigation enabling device (10), 30 when said computer program code is loaded into said authenticity investigation enabling device (10): select at least one first detectable element variation (37) from a limited number of element variations that may be provided in relation to a layout (34), which layout is common to at least one group of objects, store at least a reference to an identity (ID1 ) of the object (18) together with reference object specifying data (EV1 ; EV1 , P1 , S1 ) in a product database (20), order an object modifying unit (16) to provide an area of the object (18) with said layout (34) and said selected element variation, and 5 order the object modifying unit (16) to provide the object with the identity (ID1 ), wherein the reference object specifying data includes reference element variation data (EV1 ) identifying the selected element variation.
22. Method for investigating the authenticity of an object (18) comprising the steps of: o receiving (50) an identity (ID1 ) associated with an object (18), and locating (54) reference object specifying data (EV1 ; EV1 , P1 , S1 ) including reference element variation data (EV1 ) for the object (18) in a product database (20) based on the identity (ID1 ), in order to allow a comparison (56) of said reference element variation data (EV1 ) with 5 at least one detectable element variation (37) provided in a layout (34) to be made for indicating (62) the authenticity of the object (18), where said layout is located in an area of the object (18) and is common to at least one group of such objects and said at least one element variation (37) is one of a limited number of element variations that may be provided in the layout. 0
23. Method according to claim 22, wherein the layout is a graphical layout.
24. Method according to claim 22 or 23, wherein said at least one first detectable element variation is provided in at least one section (36) of the layout (34). 5
25. Method according to any of claims 22 - 24, wherein there is also a second detectable element variation.
26. Method according to any of claims 22 - 25, wherein said at least one first detectable 0 element variation comprises an element in the group of: a special font used in characters in the layout, a special colour, a special icon or image, a special pattern a special string of characters, or an odour.
27. Method according to any of claims 22 - 26, further comprising the steps of receiving 5 (52) object specifying data (EV1 '; EV1 ', P1 ') comprising object element variation data (EV 1 ') identifying at least one detectable element variation (37) provided in said layout (34), comparing (56) the reference element variation data (EV1 ) with the object element variation data, and indicating (62) the authenticity of the object (18) based on a match (58).
5
28. Method according to claim 27, wherein the received object specifying data includes a scanned image of at least a part of the layout including the element variation.
29. Method according to claim 28, wherein the step of locating reference object specifying 1 o data comprises locating a stored image of at least a part of the layout and the comparison of element variation data comprises comparison of the images with each other.
30. Method according to claim 28 or 29, wherein the layout (34) is provided through a 15 printed image (38), where said at least one first element variation is coded into the common elements of the layout and further comprising the step of processing the scanned image for retrieving the object element variation data from the image.
31. Method according to any of claims 26 - 30, wherein the received object specifying 20 data (EV1 ', P1 ') comprises measured material properties (P1 ') of the object (18) that have been obtained through measurements of the object using measurement specifying data (S1 ) and the reference object specifying data (EV1 , P1 , S1 ) includes material property data (P1 ) associated with the object, further comprising the step of comparing the measured material properties (P11) with the located material property 25 data (P1 ) and basing the indicating of the authenticity also on this comparison.
32. Method according to claim 31 , wherein the reference object specifying data (EV1 , P1 , S1 ) further comprises the measurement specifying data (S 1 ).
30 33. Method according to claim 31 or 32, wherein the measurement specifying data comprises data indicating a part of the object which is to be irradiated with light (L) having a certain frequency profile.
34. Authentication data handling device (22) for investigating the authenticity of an object 35 (18) comprising: an authenticating unit (26) arranged to receive an identity (ID1 ) associated with an object (18), and, locate reference object specifying data (EV1 ; EV1 , P1 , S1 ) including reference element variation data (EV1 ) for the object (18) in a product database (20) based 5 on the identity (ID1 ), in order to allow a comparison of said reference element variation data (EV1 ) with at least one detectable element variation (37) provided in a layout (34) to be made for indicating the authenticity of the object (18), where the layout is located in an area of the object (18) and is common to at least one group of such objects and o said at least one element variation (37) is one of a limited number of element variations that may be provided in the layout.
35. Authentication data handling device (22)) according to claim 34, wherein the layout is a graphical layout. 5
36. Authentication data handling device (22) according to claim 34 or 35, wherein the first detectable element variation is provided in at least one section (36) of the layout (34).
37. Authentication data handling device (22) according to any of claims 34 - 36, wherein 0 there is also a second detectable element variation.
38. Authentication data handling device (22) according to any of claims 34 - 37, wherein the authenticating unit is further arranged to receive object specifying data (EV1 '; EV1 ', P1 ') comprising object element variation data (EV1 ') identifying at least one 5 detectable element variation (37), further comprising an element variation comparing unit (28) arranged to compare the reference element variation data (EV1 ) with the object element variation data and said authenticating unit (26) being further arranged to indicate the authenticity of the object based on a match in a comparison between the reference element variation data (EV1 ) with the object element variation data. 0
39. Authentication data handling device (22) according to claim 38, wherein the received object specifying data includes a scanned image of at least a part of the layout (34) including the element variation and the element variation comparing unit (28) comprises an image analysing unit arranged to analyse the scanned image. 5
40. Authentication data handling device (22) according to claim 39, wherein the authenticating unit (26) when locating reference object specifying data is arranged to locate a stored image of at least a part of the graphical layout in the database (20) and order the image analysing unit to compare the images with each other for comparing
5 element variation data.
41. Authentication data handling device (22) according to claim 39 or 40, wherein the layout (34) is provided through a printed image (38), where said at least one first element variation is coded into the common elements of the layout and the image o analysing unit is further arranged to process the scanned image for retrieving the object element variation data from the image.
42. Authentication data handling device (22) according to any of claims 38 - 41 , wherein the received object specifying data (EV1 ', P1 ') comprises measured material 5 properties (P1 ') of the object (18) that have been obtained through measurements of the object using measurement specifying data (S1 ) and the reference object specifying data (EV1 , P1 , S1 ) includes material property data (P1 ) associated with the object and the authenticating unit (26) is arranged to base the indicating of the authenticity also on a comparison of the material properties, while the element 0 variation comparing unit (28) comprises a material properties comparing unit arranged to compare the measured material properties (P11) with the located material property data (P1 ).
43. Authentication data handling device (22) according to claim 42, wherein the reference 5 object specifying data (EV1 , P1 , S1 ) further comprises the measurement specifying data (S1 ).
44. Authentication data handling device (22) according to any of claims 34 - 43, further comprising said database. 0
45. Computer program product (78) for investigating the authenticity of an object (18), comprising computer program code to make an authentication data handling device (22) perform when said computer program code is loaded into said authentication data handling device (22): 5 receive an identity (ID1 ) associated with an object (18), and locate reference object specifying data (EV1 ; EV1 , P1 , S1 ) including reference element variation data (EV1 ) for the object in a product database (20) based on the identity (ID1 ), in order to allow a comparison of said reference element variation data (EV1 ) with at least one detectable element variation (37) provided in a layout (34) to be made for indicating the authenticity of the object (18), where the layout is located in an area of the object (18) and is common to at least one group of such objects and said at least one element variation (37) is one of a limited number of element variations that may be provided in the layout.
PCT/SE2007/050196 2006-03-29 2007-03-29 User-friendly authenticity investigation WO2007111569A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07748357A EP2011040A1 (en) 2006-03-29 2007-03-29 User-friendly authenticity investigation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US78738706P 2006-03-29 2006-03-29
US60/787,387 2006-03-29

Publications (1)

Publication Number Publication Date
WO2007111569A1 true WO2007111569A1 (en) 2007-10-04

Family

ID=38541396

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/SE2006/050576 WO2007111548A1 (en) 2006-03-29 2006-12-12 Versatile authenticity investigation
PCT/SE2007/050196 WO2007111569A1 (en) 2006-03-29 2007-03-29 User-friendly authenticity investigation

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/SE2006/050576 WO2007111548A1 (en) 2006-03-29 2006-12-12 Versatile authenticity investigation

Country Status (2)

Country Link
EP (2) EP2008221A4 (en)
WO (2) WO2007111548A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069385A (en) * 2015-07-25 2015-11-18 合肥玖德电子科技有限公司 Identity authentication system based on ID card

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
EP1730675B1 (en) 2004-03-12 2015-05-20 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
EP1730665B1 (en) 2004-03-12 2009-06-03 Ingenia Technology Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
GB2417592B (en) 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
JP5123181B2 (en) 2005-07-27 2013-01-16 インジェニア・テクノロジー・(ユーケイ)・リミテッド Authenticity verification
GB2448245B (en) 2005-12-23 2009-11-04 Ingenia Holdings Optical authentication
GB2460625B (en) * 2008-05-14 2010-05-26 Ingenia Holdings Two tier authentication
GB2466311B (en) 2008-12-19 2010-11-03 Ingenia Holdings Self-calibration of a matching algorithm for determining authenticity
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation
EP2990988A1 (en) 2014-09-01 2016-03-02 Authentic Vision GmbH Method and authentication system for registration of a random security feature
EP3699856A1 (en) * 2019-02-21 2020-08-26 INL - International Iberian Nanotechnology Laboratory Tagging of an object

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
WO2001043086A1 (en) * 1999-12-08 2001-06-14 Mischenko Valentin Alexandrovi Method and system for authentication of articles
WO2005088233A1 (en) * 2004-03-17 2005-09-22 Cardoso Mendonca De Barros Ric An armor plate and an armor-plated vehicle

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6459825B1 (en) * 1999-02-18 2002-10-01 Phillips M. Lippincott Method and apparatus for a self learning automatic control of photo capture and scanning
US6874639B2 (en) * 1999-08-23 2005-04-05 Spectra Systems Corporation Methods and apparatus employing multi-spectral imaging for the remote identification and sorting of objects
AU2003902702A0 (en) * 2003-05-30 2003-06-19 Astrosys International Ltd Currency note identification and validation
EP1730675B1 (en) * 2004-03-12 2015-05-20 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993022745A1 (en) * 1992-05-06 1993-11-11 Cias, Inc. COUNTERFEIT DETECTION USING RANDOM NUMBER FIELD IDs
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
WO2001043086A1 (en) * 1999-12-08 2001-06-14 Mischenko Valentin Alexandrovi Method and system for authentication of articles
WO2005088233A1 (en) * 2004-03-17 2005-09-22 Cardoso Mendonca De Barros Ric An armor plate and an armor-plated vehicle

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069385A (en) * 2015-07-25 2015-11-18 合肥玖德电子科技有限公司 Identity authentication system based on ID card

Also Published As

Publication number Publication date
EP2008221A1 (en) 2008-12-31
EP2008221A4 (en) 2010-07-07
EP2011040A1 (en) 2009-01-07
WO2007111548A1 (en) 2007-10-04

Similar Documents

Publication Publication Date Title
WO2007111569A1 (en) User-friendly authenticity investigation
US20090283583A1 (en) Two Tier Authentication
EP1784757B1 (en) Authenticity verification methods, products and apparatuses
JP5148996B2 (en) Method and apparatus for creating and subsequently verifying authentic printed articles
US9053364B2 (en) Product, image, or document authentication, verification, and item identification
US20080294900A1 (en) Authenticity Verification of Articles Using a Database
US20070185788A1 (en) Authentication and Tracking System
US20160140427A1 (en) Security coding system and marker, optoelectronic scanner and method of coding articles
US8123139B2 (en) Virtual code window
WO2004079507A2 (en) System and method for tracking and authenticating items through an internet web site
RU2651167C2 (en) Method and system for marking item, item so marked and method and system for authenticating marked item
GB2462029A (en) A system for tracking an article
KR102011604B1 (en) Method and Apparatus for Providing Authenticity Determination
RU2205450C1 (en) Method for authenticating antiques
CN114202040A (en) Anti-counterfeiting method based on product surface texture password label
EP4242950A1 (en) A system and a computer-implemented method for detecting counterfeit items or items which have been produced illicitly
CN112689838B (en) Photoluminescence identification apparatus, system and method
KR101906480B1 (en) Security sheet for authenticity determination and method for determinating authenticity using the same
RU2205452C1 (en) Method for authenticating musical instruments
WO2003005310A2 (en) Anti-counterfeiting measures

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07748357

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007748357

Country of ref document: EP