The present invention relates generally to computer-implemented system and method of product authentication utilizing a platform host in communication with array of devices.
Those of skill in the art will recognize that the following description is merely illustrative of the principles of the disclosure, which may be applied in various ways to provide many different alternative embodiments. This description is made for illustrating the general principles of the teachings of this disclosure invention and is not meant to limit the inventive concepts disclosed herein.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and together with the general description of the disclosure given above and the detailed description of the drawings, given below, explain the principles of the disclosure.
In the drawings:
The drawings are not necessarily to scale. In certain instances, details that are not necessary for an understanding of the disclosure or that render other details difficult to perceive may have been omitted. It should be understood, of course, that the disclosure is not necessarily limited to the embodiments illustrated herein.
The present invention provides its benefits across a broad spectrum of endeavors. It is applicant's intent that this specification and the claims appended hereto be accorded a breadth in keeping with the scope and spirit of the invention being disclosed despite what might appear to be limiting language imposed by the requirements of referring to the specific examples disclosed. Thus, to acquaint persons skilled in the pertinent arts most closely related to the present invention, a preferred embodiment of the system is disclosed for the purpose of illustrating the nature of the invention. The embodiments described herein are illustrative, and as will become apparent to those skilled in the art, can be modified in numerous ways within the scope and spirit of the invention, the invention being measured by the appended claims and not by the details of the specification.
Although the following text sets forth a detailed description of numerous different embodiments, the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
It should also be understood that, unless a term is expressly defined herein, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word “means” and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S.C. § 112, subparagraph (f).
The present invention comprises various embodiments of a computer-implemented product authentication system including (1) a platform host; (2) software; (3) computing devices; (4) mobile devices; and (5) QR code applicators. The invention addresses the common problems of distinguishing a genuine product from counterfeit products and losing track of product warranty registrations. The invention's QR code database ensures that consumers and retailers will not be tricked by fake products and ensures that warranties on products can be tracked correctly. The invention differs from traditional product authentication and warranty tracking systems because it is a closed loop system that randomly creates and automatically tests QR codes to determine the authenticity of a product. Once a new QR code is randomly created, the QR code applicator marks a product with the QR code, and the code is stored in the platform host as that product's individual serial number. In some embodiments, the QR applicator includes a laser machine, a printer, or an engraver. In some embodiments, a QR code is marked on a product during production of the product to allow for production tracking. In some embodiments, the product authentication system is available 24 hours a day, 365 days a year.
In some embodiments, the platform host is made available to various types of users on a variety of applications. In some embodiments, the applications include the Manufacturer App, Support App, Admin App, Manager App, and Mobile Apps. In some embodiments, the types of users include Operators, Managers, Admins, and Users. The Admin App allows Admins to create Managers and search product notes by specifying the date range and Operator. The Manager App allows Managers to create Operators. The Manufacture App is responsible for generating new serial number QR codes. After an Operator scans the QR code marked on the product, Manufacture App compares it with the generated code and if the code is the stock-keeping unit code, the QR code is scanned. Then the Manufacture App stores the result in Cloud Server database, or in Local database if there is no Internet available at the time of storage. In some embodiments, if the storage process fails at any step the app stored the generated QR code in the Defective database (on Cloud Server or Local database).
Users utilize the mobile apps for warranty registration. Users have to scan the QR code on the device using a mobile device camera and the mobile app checks the Cloud server for the code. The cloud server checks that there is no registration for the device and permits a mobile app to continue to the registration form. After the user fills out and sends the registration form to the server, the server generates the code and sends a message to the user device for phone number verification. After the user receives the message and enters the code, the application registers the product in the database of cloud server and sends a confirmation email. The Mobile Apps are executable on a variety of operating systems, including Android and iOS. The Support App is used to scan User product serial numbers, sent by email or any other means, to customer support. Once the QR code is scanned, the support app shows the user's personal data with all previous product notes and attachments. The support app also allows customer support to add another note with a single attachment. In some embodiments, each attachment can be any file with a size limit of 5 MB.
Operators are responsible for running the Manufacturer App and are created by Managers. Managers are responsible for the creation of Operators and are created by Admins. Admins are responsible for creating Managers. Users are registered product owners. In some embodiments, the software allows Users to register for a product warranty by scanning a product QR code using a mobile device camera. In some embodiments, the invention is also enabled with a cyber security system that monitors and alerts if a cyberattack has been detected.
A communications link is established between the software (102, 103, 104, 105, 106), a plurality of computing devices (110, 115, 116), and the platform host 101. The platform host 101 receives a request from one or more user devices to establish an account. In some embodiments, the platform host 101 assigns a role to each registered user, including an “Admin,” a “Manager,” an “Operator,” and a “User.”
In some embodiments, the platform host 11 makes available a graphical user interface based on the account data points, which user interface includes a plurality of product authentication functions.
The system and method described herein can be delivered in a variety of ways including via a desktop application, a mobile application, through a wide area network, such as a cloud-based or online computing environment, or through a local area network. Accordingly, the system is designed and flexible and scalable with various formats of user devices including personal computers, tablets, mobile devices, and virtual devices.
In some embodiments, the QR code is stored in a local database 114 if the computing device 110 is not connected to the Internet at the time of storage. In some embodiments, the computing device 110 is executing the software 111. The software 111 periodically checks the local database 114 for product data. If the software 111 detects product data in the local database 114 while the computing device 110 is connected to the Internet, the software 111 stores the product data detected in the local database 114 on the platform host 101. In some embodiments, the software 111 is called the Local Recovery Service. As noted above, in some embodiments system users are assigned a role, with one of those being the Operator. Operators are responsible running the software 102 that creates and stores the newly created QR codes. In some embodiments, the software 102 that creates and stores the new QR code is called the Manufacture App 102. In some embodiments, the system can automatically create and store the newly generated QR codes. In some embodiments, the creation and storage of the newly generated QR codes may be carried out manually through user input. Still yet, in some embodiments, the creation and storage process can be carried out through artificial intelligence by configuring the platform host 101 with machine learning functionality, either locally or remotely. In some embodiments, a QR code is marked on a product during production of the product to allow for production tracking.
With reference to
In some embodiments, the computing environment of the present invention includes the computing systems of the computing devices (110, 115, 116). The computing devices (110, 115, 116) can send and receive data and information. The computing systems of the computing devices (110, 115, 116) correspond to the platform host 101 that can also send and receive data and information. The computing devices (110, 115, 116) can include any smart phone, tablet computer, laptop computer, or other computing or mobile device capable of reading, and/or recording data about systems, devices, locations, and/or equipment, etc. The computing systems of the computing devices (110, 115, 116) can include any server computer, desktop computer, laptop computer, or other device capable of storing and managing data communication by and between one or more computing systems. Any of the computing devices (110, 115, 116) can be capable of accomplishing any of the steps of functions described in this description.
The computing devices (110, 115, 116) can include processing systems, storage systems, software, communication interfaces, and user interfaces. The processing system can load and execute software (102, 103, 104, 105, 106) from a storage system. When executed by the computing devices (110, 115, 116), the software (102, 103, 104, 105, 106) directs a processing system to receive data, images, devices, locations, and/or equipment, etc. Such data could include any of the information described above, including but not limited to the functionality described herein.
Additionally, the computing devices (110, 115, 116) can include a communication interface that can be further configured to transmit data to and receive data from other computing devices using a communication network. The communication network could include the Internet, cellular network, satellite network, RF communication, blue-tooth type communication, near field, or any other form of communication network capable of facilitating communication between the computing devices (110, 115, 116).
The processing system of the computing devices (110, 115, 116) can comprise a microprocessor and other circuitry that retrieves and executes software (102, 103, 104, 105, 106). The processing system can be implemented within a single processing device but can also be distributed across multiple processing devices or sub-systems that cooperate in executing program instructions. Examples of the processing system include general purpose central processing units, application specific processors, and logic devices, as well as any other type of processing device, combinations of processing devices, or variations thereof.
The storage system of the computing devices (110, 115, 116) can comprise any storage media readable by the processing system, and capable of storing software (102, 103, 104, 105, 106) and data from the computing devices (110, 115, 116). Data from the computing devices (110, 115, 116) may be stored in a word, excel, or any other form of digital file. The storage system can include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. The storage system can be implemented as a single storage device but may also be implemented across multiple storage devices or sub-systems.
The storage system can comprise additional elements, such as a controller, capable of communicating with the processing system. Examples of storage media include random access memory, read only memory, magnetic disks, optical disks, flash memory, virtual memory, and non-virtual memory, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and that may be accessed by an instruction execution system, as well as any combination or variation thereof, or any other type of storage media. In some implementations, the storage media can be a non-transitory storage media. In some implementations, at least a portion of the storage media may be transitory. In no case is the storage media a propagated signal.
The application interface of the computing devices (110, 115, 116) can include data inputs and image displays. In one example, the data inputs can be used to collect information and data inputs from the user.
In some embodiments, the computing devices (110, 115, 116) can include a user interface. The user interface can include a mouse, a keyboard, a voice input device, a touch input device for receiving a gesture from a user, a motion input device for detecting non-touch gestures and other motions by a user, and other comparable input devices and associated processing elements capable of receiving user input from a user. Output devices such as a graphical display, speakers, printers, haptic devices, and other types of output devices may also be included in the user interface. The user input and output devices are well known in the art and need not be discussed at length here.
The included descriptions and figures depict specific implementations to teach those skilled in the art how to make and use the best mode. For the purpose of teaching inventive principles, some conventional aspects have been simplified or omitted. Those skilled in the art will appreciate variations from these implementations that fall within the scope of the invention. Those skilled in the art will also appreciate that the features described above can be combined in various ways to form multiple implementations. As a result, the invention is not limited to the specific implementations described above, but only by the claims and their equivalents.
The foregoing discussion of the disclosure has been presented for purposes of illustration and description. The foregoing is not intended to limit the disclosure to the form or forms disclosed herein. In the foregoing Detailed Description for example, various features of the disclosure are grouped together in one or more embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed disclosure requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the following claims are hereby incorporated into this Detailed Description, with each claim standing on its own as a separate preferred embodiment of the disclosure.
Moreover, though the present disclosure has included description of one or more embodiments and certain variations and modifications, other variations and modifications are within the scope of the disclosure, e.g., the use of a certain component described above alone or in conjunction with other components may comprise a system, while in other aspects the system may be the combination of all of the components described herein, and in different order than that employed for the purpose of communicating the novel aspects of the present disclosure. Other variations and modifications may be within the skill and knowledge of those in the art, after understanding the present disclosure. This method of disclosure is intended to obtain rights which include alternative embodiments to the extent permitted, including alternate, interchangeable and/or equivalent structures, functions, ranges or steps to those claimed, whether such alternate, interchangeable and/or equivalent structures, functions, ranges or steps are disclosed herein, and without intending to publicly dedicate any patentable subject matter.