The present description has the object of providing a method and a system for authenticating a packaged product from a remote location, according to claims 1 and 11.
In particular, the present description refers to a method and a system for providing the possibility to a user of authenticating, from a remote location, through a mobile terminal, a packaged product intended for free utilisation and/or and or placing in the market.
It is known that firms, companies, individuals, consortiums, etc. spend considerable amounts of money for advertisement and other marketing initiatives with the aim of creating trademarks and reputation for a product. In some cases, further sums are often spent in developing products to be marketed with these trademarks.
Successful trademarks represent a precious asset for firms, companies, individuals, consortiums, and they are often at the centre of great efforts to supervise the correct and lawful use of such trademarks.
Although these efforts, successful trademarks are unfairly exploited by unethical subjects such as manufacturers and sellers of counterfeit and/or stolen products.
An often even more serious result is the damage to the good name and reputation of the owner of the trademark, especially when a counterfeit product is sold as an authentic product.
With the effort of fighting this problem, the owners fight the counterfeiters by introducing programmes/devices aimed at eliminating or at least reducing such unlawful activities.
While some programmes/devices have been quite successful for a short period of time, the unlawful earnings for the wrongdoers are often so high that the programmes/devices are overcome or even copied.
For example, according to the method currently in use, the container in which the product intended to be used and/or or sold is housed or, more generally, the product packaging, is provided with a recognition identification in form of a code, for example a barcode or a hologram, whose reading allows the identification of the product, the name of the manufacturer as well as any other information regarding the product such as, for example, the expiry date if the product in question is edible.
The recognition indication in form of code, according to the prior art, is usually fixed on the container or on the packaging in such a location to be detected and read by apposite apparatus in that, mainly, such indication is intended to control the movement of the seller warehouse and providing data for preparing sales receipts or invoices.
However, given the visibility thereof on the container or on the packaging, the indication, though in form of a code, may be cloned and deceitfully placed on containers or packagings in which a counterfeit product or the product however not corresponding to the one the original product corresponds to, is arranged.
Therefore, the coded indication, according to the prior art, applied in positions visible on the container or on the packaging of the product are not capable of guaranteeing, through the reading thereof, the actual authenticity of the purchased product, in other words, the matching between the product and the name and the origin declared on the container or on the packaging of the product.
The object of the invention in question is to provide a method and a system capable of overcoming the problems observed in the prior art.
An embodiment allows obtaining a method and a system which, contrary to the known methods and systems of authentication, allows obtaining easy use, inexpensive accessibility both for the user (or consumer/purchaser of the packaged product) and for the manufacturer/seller of the product.
The present invention allows obtaining a method and a system capable of allowing the user (or consumer/purchaser of the packaged product) to verify the authenticity of the packaged product in real time.
In addition, the method and the system of the invention allows geolocalising the remote location in which the authentication occurs.
Lastly, the method and system of the invention allows guaranteeing resistance to reverse engineering attacks and, especially, compliance with the ISO 12931:2012 standard, which provides indeed for tampering with the integrity of the packaging or part of the product or the like.
The characteristics and advantages of the present disclosure shall be evident from the following detailed description of possible practical embodiments thereof, illustrated by way of non-limiting example in the assembly of drawings, wherein:
Even though not explicitly shown, the single characteristics described with reference to the specific embodiments shall be described as accessory and/or interchangeable with other characteristics, described with reference to other embodiment examples.
Within the scope of the present invention, the term container is used to indicate a general box in which there is placed a product freely utilisable and/or placed in the market intended for use or consumption by a purchaser, same case applying, for example, to a bottle containing wine or liquor or any other type of liquid product, whether edible or not.
It should be immediately observed that the products are obtained i.e. provided directly by a producer/seller of the products.
With reference to
In a wall of the packaging, in a position observable from the external, there may be placed a conventional barcode, or a hologram, schematically indicated with 5, to be read through the conventional product identification operations, for example when selling and issuing a receipt.
The packaging is also provided with a sealing 6, fixed using conventional methods between the cover 3 and the container 2, with the function of maintaining the opening 4 closed and guaranteeing the integrity of the packaging.
According to the invention, the sealing 6 is provided, in a portion of the surface 7 thereof faced towards the packaging and thus neither accessible nor observable from the external when the sealing is integral and applied on the packaging, of an authentication element 8 of the product.
With reference to
The latter comprises a portion 11 which extends above the end 12 of the neck, closed by a conventional cap 13, and at least one tubular portion 14 which extends axially around the neck.
As known, the cover capsule 10, in a conventional embodiment thereof, may be made of plastic PVC material, or polylaminate, or even aluminium or tin or PET. After being placed on the neck 9 of the bottle it is made to adhere thereto thus covering the cap and serving the sealing functions.
According to the invention and as illustrated in
In particular, upon opening the bottle, before extracting the cap 13, at least partly, from the tubular portion 14 of the capsule allows accessibility and visibility of the authentication element 15 which can thus be read.
With reference to
In particular, the axial area 17 extends along the axis of the neck 9 of the bottle 2A continuing along a diameter of the cap 13.
As shown in
A different embodiment of the capsule according to the invention is shown with reference to
The capsule 20, arranged on the neck 9 of a bottle, is provided with an area 21 with easy opening in forma of a tab with an end 22 for manually grasping for tearing.
According to the invention, the inner surface of the tab 22 is provided with an authentication element 23 not shown from outside.
In particular, the area 21 with easy opening extends along the axis of the neck 9 of the bottle 2A, i.e. parallel to the axis of the neck of the bottle.
A different embodiment of the capsule according to the invention is shown with reference to
Also in this case the capsule 20, arranged on the neck 9 of a bottle, is provided with an area 21 with easy opening in form of a tab with an end 22 for manually grasping for tearing.
According to the invention, the inner surface of the tab 22 or the portion 11 on the surface thereof facing towards the cap 13 is provided with an authentication element 23 not visible from the external.
In particular, the area 21 with easy opening extends circumferentially to the neck 9 of the bottle 2A.
It should be observed that in a further embodiment the unique authentication element 8, 15, 19, 23 may be arranged both on the tab and in the area of the capsule simultaneously so as to guarantee the reading should one of the authentication elements be damaged or not readable.
With the aim of providing the possibility of authenticating the product contained in the packaging and, with reference to the flow chart illustrated in
In particular the method 24 allows the authentication of the product contained in the container 2, 2A by a user from a remote location.
The method 24 comprises the step, block 25, of generating for each packaged product in the container 2, 2A the unique authentication element 8, 15, 19, 23 through an algorithm.
Preferably the algorithm is configured for generating unique authentication elements, starting from always different alphanumerical data threads, such as for example the product identification code normally used for example by the producer/seller.
Such unique authentication elements 8, 15, 19, 23 may also be cryptographed, through cryptographic protocols of the sha-1, sha-2, md5 type or the like. This guarantees that the authentication element 8, 15, 19, 23 is unique in a statistically certain manner and protected against reverse engineering attacks.
It should be observed that the step of generating, block 25, for each product the unique authentication element 8, 15, 19, 23 through the algorithm, for example of the cryptographic type, is performed by a certifying body, such certifying body being different from the producer/seller of the product.
The method comprises the step, block 26, of providing a plurality of sealings 6, 10, 16 and 20 each of which being configured for permanently memorising a respective unique authentication element 8, 15, 19, 23.
For example the step of permanently memorising the unique authentication element 8, 15, 19, 23 consists in transferring such authentication elements 8, 15, 19, 23 on the sealings 6, 10, 16 and 20 through for example a printing operation, if the sealing is provided in a paper medium or a capsule for bottles, or memorise them in a memory portion of an RFID chip.
The method 24 comprises the step, block 27, of associating—irreversibly for each product—the respective sealing 6, 10, 16 and 20 to the container 2, 2A containing the product.
The sealing 6, 10, 16 and 20 on which there is transferred the unique authentication element 8, 15, 19, 23 is thus associated to the container containing the products.
The method through which the association of the sealing 6, 10, 16 and 20 to the container 2, 2A is performed is known to a man skilled in the art and thus it shall not be described.
The method 24 provides the step, block 28, of memorising such association between the product and the respective sealing 6, 10, 16 and 20. In particular it is provided for memorising, in a suitable database, such specific association for each product that the producer/seller may wish to subject to the method of the present description. It should be observed that the memorisation step, block 26, same case applying to the comparison step, block 31, are performed by the certifying body. This guarantees that the unique authentication element 8, 15, 19, 23 is known to the certifying body alone and not to the producer/seller so that the unique authentication element 8, 15, 19, 23 is actually secret for everyone except for who actually generated it.
Once the packaging containing the products are freely utilisable and/or placed in the market, the method comprises the step, block 30, of acquiring the unique authentication element 8, 15, 19, 23 from a remote location.
Such remote location represents the physical place in which there occurs the utilisation and/or placing of the packaged product in market.
For such purpose the authentication element 8 may be read only when it is made accessible following the breaking of the sealing 6 and, as indicated in
In particular, the process of association of the sealing 6, 10, 16 and 20 to the container 2, 2 A has the paramount aim of jeopardising the integrity of the container or a part of the product or the like so as to be able to verify the authenticity thereof, in compliance with the ISO 12931:2012 standard.
The method 24 comprises the step, block 31, of comparing the unique authentication element 8, 15, 19, 23 acquired with the association between the product and the respective unique authentication element memorised in the database and the confirmation of the authenticity of the packaged product is transmitted to the in real time user, block 32, should, following such comparison, the acquired authentication element coincide with the memorised association between the product and the respective generated authentication element.
On the contrary, should it not coincide—following the comparison, block 31, between the unique authentication element 8, 15, 19, 23 acquired with the association between the product and the respective unique authentication element memorised in the database—then the confirmation of the non-authenticity of the packaged product is transmitted to the user in real time, block 32.
The user may also be informed, block 32, should the acquired unique authentication element 8, 15, 19, 23 reveal to have been read previously following the comparison, block 31. This represents a further guarantee of authenticity of the product given that two unique authentication elements 8, 15, 19, 23 cannot be associated to the same product.
With the aim of performing the step of acquiring, block 30, comparing, block 31 and transmitting to the user the result of the comparison, block 32, it is provided for using, for example as illustrated in
In particular the mobile terminal 33, once the packaged product is freely utilisable and/or placed on the market, is configured for:
In other words, the computer programme present in the memory of the mobile terminal 33, through the remote server, verifies whether the unique authentication element 8, 15, 19, 23 was actually generated by the certifying body.
Should this occur, the remote server shall verify whether the unique authentication element 8, 15, 19, 23 in question was previously received by another user, with possibility of returning details if affirmative or response of official authenticity in case of negative result.
Furthermore, it should be observed that the mobile terminal 33 acquires the geographic coordinates of the remote location sending them to said remote server.
Such geographic coordinates are used for example for tracking the product sales and purchase position.
The transmission of the unique authentication element 8, 15, 19, 23 and/or of the geographic coordinates of the remote location to the remote server same case applying to sending the comparison result, block 31, to the mobile terminal 33 are carried out through, for example, a telephone network of the mobile or landline type.
It should be observed that the remote server is maintained by the certifying body, wherein the remote server comprises the database in which the association between the product and the respective sealing is memorised.
According to a preferred embodiment the mobile terminal 33 is selected from the group comprising smartphones, tablets, notebooks, netbooks, personal computers and the like.
Obviously, the embodiments of the method and the system for authenticating the packaged products arranged in a container from a remote location described previously may be subjected to modifications by a man skilled in the art, with the aim of meeting contingent and specific needs, all falling within the scope of protection as described by the claims that follow.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IT2013/000320 | 11/15/2013 | WO | 00 |