Method and system for verifying the authenticity of goods
The invention relates to a method and system for verifying the authenticity of goods. In recent years, a considerable need has been recognized for anti-counterfeiting methods and systems for use on a variety of articles or goods. Many of these methods and systems rely on special product features. However, an approach wherein the complexity of features goods is increased will only work for a limited period of time, as the large profits from counterfeiting gives counterfeiters access to advanced resources. Moreover, complex features are not always appreciated by customers and may require advanced education or knowledge of these customers. Further, such an approach raises manufacturing costs. Authenticity of products is particularly relevant for valuable items, items with a reputation of qual- ity or products for which the quality is critical. Examples of such goods comprise jewellery, proprietary products, pharmaceutical products or spare parts for e.g. cars. Further such methods and systems may be useful for products with a weak distribution control. WO 99/04364 discloses a method and system for verifying the authenticity of goods by marking these goods with random numbers and providing users with access to a database with codes of authentic goods. Comparing means are provided to compare the random number of a good with the codes in the da- tabase in order to verify the authenticity of the goods. If the database indicates that the code has previously been used, it is indicated to the user that the code is a duplicate, being evidence of illegal counterfeiting. A disadvantage of this method and system is, inter alia, that such an approach still allows counterfeiting. The numbers attached to the goods may e.g. be copied from the products and attached to counterfeited goods. If the copied number is verified at the database before the original number, the consumer of the original good is wrongly informed that his good is forged if he checks the authenticity afterwards. If
bar codes are used, the consumer needs a scanner or code reader to verify the authenticity of the goods. It is an object of the invention to provide an improved method and system for verifying the authenticity of goods . This object is achieved by providing a method for verifying the authenticity of one or more goods, each good having at least one associated user-exposable code, in a system comprising at least one authentication server at least arranged to have access to unique codes for authentic goods and to verify said user-exposable code, and at least one user device connectable to said authentication server via a data transmission network, comprising the steps of: receiving one or more data-strings comprising said user- exposable code and an exposure state of said user- exposable code at said authentication server; determining the authenticity of said good in dependence on said user-exposable code and said exposure state. This object is further achieved by providing a system for verifying the authenticity of one or more goods, each having at least one associated user-exposable code, comprising at least one authentication server arranged to have access to unique codes for authentic goods and to verify said user- exposable code and at least one user device connectable to said authentication server via a data transmission network, said authentication server being arranged to determine the authenticity of said good in dependence on said user-exposable code and said exposure state . By providing the goods with non-exposed codes that can be exposed by the user or consumer of the goods, chances of illegal copying of codes in stores or at other stages in the production and distribution process, are significantly reduced. Further by considering the exposure state of the code in the authenticity verification process, chances of abuse are further reduced. The user can establish the authenticity of the good prior to using it. The system is self-explanatory and therefore simple for the user.
In a particularly advantageous embodiment of the invention, the method comprises the steps of: if said user-exposable code does not match with said unique codes, transmitting at least a first non- authenticity message to said user device; or else, determining whether said user-exposable code has previously been received; and, if said user-exposable code has not previously been received, transmitting a first authenticity message to said user device; or else, providing a query on said user device relating to said exposure state; receiving in response to said query said one or more data-strings comprising said exposure state at said au- thentication server; transmitting a second non-authenticity message or a second authenticity message to said user device, depending on said exposure state. Contrary to the prior art, the fact that a code was previously used does not necessarily result in a non- authenticity message. Instead a further query is presented to the user to establish the exposure state, e.g. evaluating whether the originally non-exposed code was exposed by the user himself. If the user did expose the code himself while the code has already been received and/or checked, there is a good chance counterfeiters have exposed original codes and covered these or copied codes again, indicating that a forged article is at stake. In this case a non-authenticity message reading e.g. "this product is probably fake" or "this code is suspect" is presented to the user. If the good of the user has attached an already exposed code, probably a genuine product is resold. Accordingly an authenticity message is presented to the user, reading e.g. "this product is probably genuine". It should be appreciated that the order of the steps is irrele- vant as long as this effect is achieved. The exposure state may also relate to other characteristics of the code, e.g. the environmental circumstances
wherein the code is readable. It may e.g. be so that after exposure of the code, the code becomes unreadable after a particular period of time and may only be made visible once more by heating the label. In such a case, the exposure state relates to how the code was made visible again. It is noted that the method and system for verifying the authenticity of goods may be combined with other measures to distinguish counterfeited and authentic goods. The invention further relates to a computer program product with computer executable code portions for performing the method and to an authentication server arranged to perform this method. Some further embodiments of the invention are presented in the dependent claims and described in more detail below. The invention will be further illustrated with reference to the attached drawings, which schematically show a preferred embodiment according to the invention. It will be understood that the invention is not in any way restricted to this specific and preferred embodiment. In the drawings : Figs. 1A and IB respectively show a good with a non- exposed code and an exposed code ; Fig. 2 shows a system for verifying the authenticity of goods according to an embodiment of the invention, and Fig. 3 shows a flow chart for a part of the method for verifying the authenticity of goods according to an embodiment of the invention. Figs. 1A and IB show a good, article, product or item 1, such as jewellery, a mobile phone, a theatre ticket or a pharmaceutical product. The good 1 has an associated user- exposable code 2, that is covered by a code cover 3 in Fig. 1A and exposed, i.e. the cover is removed, in Fig. IB. The cover may e.g. be removed by peeling off the cover or by scratching it away. Preferably, the cover 3 cannot easily be reattached over the code 2. The code may be attached to the product in various ways, such as by means of labels, tags or stickers.
Alternatively the code 2 may be applied directly to the product, e.g. by printing or engraving, thereby reducing the chance that the good 1 and code 2 are separated. It is noted that the good 1 may have multiple codes 2 that are e.g. applied on top of each other, such that only a single code cover 3 is required. In that case the codes 2 may e.g. be applied on stickers that can be removed by different users in a distribution chain in order to verify the authenticity of the good 1. The label, tag, sticker or good itself further comprises an address 4 for verifying the authenticity over a data transmission network as will be described below. The label, tag, sticker or good itself may further comprise information on the manner in which one should proceed to verify the au- thenticity. The user should e.g. be prompted to remove the code cover 3. Codes 2 or batches of such codes can be sold to parties having interests in reducing counterfeiting in one or more markets, such a manufacturers of distributors of pharma- ceutical products. Fig. 2 shows a system 10 for verifying the authenticity of one or more goods 1, wherein each good 1 has at least one user-exposable code 2, as was shown in Figs 1A and IB. The system 10 comprises a data transmission network 11 comprising a wired data transmission network 11A, such as e.g. the internet, and a wireless data transmission network 11B that is communicatively connected to the wired network 11A via a gateway 12. The system 10 comprises a first user device 13, e.g. a computer arrangement, and a second user device 14, e.g. a mobile phone. Further the system 10 comprises an authentication server 15 communicatively connected with network 11 and having access to a database 16, comparing means 17, a counter 18 and a query generator 19. The database 16 comprises unique codes identifying authentic goods 1. Measures are taken to avoid hacking of the database 16. The operation of the system 10 displayed in Fig. 2 is described with reference to Fig. 3 illustrating an embodiment
of the method for verifying the authenticity of goods 1 according to the invention. In 21 a data-string is received from the user device 14 over the data transmission network 11 at the authentication server 15. The data-string comprises the user-exposable code 2, e.g. 12345 67890 00141, of the good 1. The code preferably has over ten positions to enhance the scalability of the method and system and to minimize chances of guessing correct codes. This feature can be further enhanced by employing al- phanumeric codes, which is a preferred embodiment of the invention. As the code can be transmitted wirelessly, the user may check the authenticity of the good 1 at the purchase point. The code is entered on a web page with the address pro- vided on or with the good 1 and is e.g. a URL. A URL is always unique and cannot therefore reasonably be duplicated thereby enhancing the safety of the system. In 22, the authentication server 15 may provide a confirmation query at the user device 14 to check whether the code entered by the user is correct. If the code is incorrect, the user is requested to enter the correct code; else the user confirms that he entered the correct code and the method proceeds to 23. This confirmation procedure reduces the chance of incorrect assessment of the authenticity of the good 1. In 23 the comparing means 17 of the authentication server 15 compares the received code 2 with the unique codes for authentic goods 1 in the database 16. If the received code 2 does not match a unique code of the database 16, a first non-authenticity message 24 is transmitted to the user device 14. Accordingly it is determined that the good 1 is not authentic. Subsequently further information can be gathered on the good 1 at 25, e.g. by transmitting further queries to the user device 14, to identify and flag a counterfeit at 26. This further information provides valuable intelligence of these illegal activity. If the received code 2 matches with a unique code for an authentic good 1 of the database 16, in 27 it is determined
whether the code 2 was received previously. If the code 2 is received for the first time, a first authenticity message 28 is transmitted to the user device 14. Accordingly it is established that the good 1 to which the code 2 is associated is an authentic good. In 29 further information can be provided for the user. If it is determined in 27 that the code 2 has been received previously, the query generator 19 may provide a query 30 relating to the exposure state of the user-exposable code 2. The query may e.g. read: "did you expose this code yourself?" . If the response to the query 30 is negative ("no") an authenticity message 31 is transmitted to the user device 14. The authenticity message 31 may e.g. read: "This product is probably genuine" . In 32 alternative verification may be applied, wherein the user may be guided through the alternative verification route. As an example, the label or tag may comprise unique other features to which the user can be pointed and queried. The user may e.g. be asked to provide information on certain characteristics of a hologram provided on the label . Again urther information can be provided to the user device 14 in 33. If the response to the query 30 is positive ("yes"), a non-authenticity message 34 is transmitted to the user de- vice 14. The non-authenticity message 34 may e.g. read: "This product is probably fake". In such a case the code 2 may e.g. have been copied or covered again. Subsequently further information can be gathered on the good 1 at 35, e.g. by transmitting further queries to the user device 14, to iden- tify and flag a counterfeit at 36. This further information provides valuable intelligence of these illegal activity. It should be appreciated that further steps may be added to the method or steps may be performed in a different sequence. An example of a further step is the provision of the counter 18 allowing not only the determination of whether the code 2 was previously received but also the determination of the actual number of times the code 2 was received. The method
may thus further involve the definition of a threshold for the number of times a code is received and performing an appropriate action is such a threshold is achieved or exceeded. If e.g. the code 2 of a good 1 is received more than three times at the authentication server 15, the alternative verification 32 may be more detailed. Another modification of the method involves the input at the user device 13, 14 and receipt of the user-exposable code 2 as well as the exposure state at the authentication server 15 in step 21, i.e. the query 30 is made independent of the fact whether the code 2 was received before. In this case only a single input, involving both the code 2 and the exposure state, is necessary at the user device 13, 14. Other modifications or combinations of steps can be envisaged as well. The system provides a source for valuable information on both legal and illegal activities. The system establishes a direct contact with the end-user of the good 1 which can be valuable for other commercial purposes, such as advertising or updates. Illegal goods can be traced.