PRODUCT AUTHENTICITY VERIFICATION TAG, WRAPPING PAPER INCLUDING SAME, AND PRODUCT AUTHENTICITY VERIFICATION METHOD
20200215840 ยท 2020-07-09
Inventors
Cpc classification
Y10T428/24802
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
International classification
Abstract
Provided are an authenticity verification tag and a wrapping paper including the same. The authenticity verification tag includes a layer; a first region, which forms a border on the layer and includes identification information regarding a product to be verified for authenticity; a second region surrounded by the first region; and a plurality of spots, which are arranged in the second region and are usable for authenticity verification.
Claims
1. An authenticity verification tag comprising: a layer; a first region, which forms a border on the layer and comprises identification information regarding a product to be verified for authenticity; a second region surrounded by the first region; and a plurality of spots, which are arranged in the second region and are usable for authenticity verification.
2. The authenticity verification tag of claim 1, wherein the plurality of spots is spaced apart from one another.
3. The authenticity verification tag of claim 1, wherein each of the plurality of spots is one of special characters, letters, and numbers.
4. The authenticity verification tag of claim 1, wherein neighboring spots among the plurality of spots are different to each other in at least one of size, shape, arrangement direction, and color.
5. The authenticity verification tag of claim 1, wherein at least one of the plurality of spots has a length of 0.10 mm or less.
6. The authenticity verification tag of claim 1, wherein the plurality of spots comprises: authentication elements used for the authenticity verification; and camouflage elements not related to the authenticity verification.
7. The authenticity verification tag of claim 6, wherein at least one of a location in the second region, a density, a color, and a shape of the authentication element is pre-defined.
8. The authenticity verification tag of claim 6, wherein the authentication element comprises a separate color.
9. The authenticity verification tag of claim 1, wherein a plurality of copy-proof elements, which are arranged in the second region and indicate that the authenticity verification tag is fabricated in a manner different from a pre-defined manner.
10. The authenticity verification tag of claim 9, wherein neighboring copy-proof elements among the plurality of copy-proof elements are same in at least one of size, shape, arrangement direction, and color.
11. The authenticity verification tag of claim 1, wherein the plurality of copy-proof elements are larger than the plurality of spots.
12. The authenticity verification tag of claim 1, wherein the interval between the plurality of copy-proof elements is smaller than the interval between the plurality of spots.
13. The authenticity verification tag of claim 1, wherein the first region is formed by 1-dimensionally arranging first unit elements having a first color and second unit elements having a second color different from the first color.
14. The authenticity verification tag of claim 1, wherein the identification information is indicated by a combination of first unit elements and second unit elements that are arranged at a certain distance from the first unit element.
15. The authenticity verification tag of claim 14, wherein the identification information comprises at least one of information regarding a manufacturer providing the product, brand information regarding the product, and detailed information regarding the product.
16. The authenticity verification tag of claim 1, wherein the second region includes at least one of an image and text related to the product.
17. The authenticity verification tag of claim 16, wherein at least one of the image and the text is arranged to overlap the spots.
18. The authenticity verification tag of claim 16, wherein at least one of the image and the text is larger than a size of at least one of the spots.
19. The authenticity verification tag of claim 18, wherein at least one of the image and the text is at least 10 times larger than the size of at least one of the spots.
20. A wrapping paper comprising an authenticity verification tag according to any one of claims 1 to 19.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
DESCRIPTION OF EMBODIMENT
[0060] Hereinafter, detailed descriptions of the present disclosure will be given with reference to the accompanying drawings. In the drawings, like reference numerals denote like elements, and the size of each component in the drawings may be exaggerated for clarity and convenience of explanation.
[0061]
[0062] Referring to
[0063] The layer 110 may include a transparent material or a translucent material and may include a material on which the first region 120 and the second region 130 may be printed. As will be described below, the layer 110 may be a partial layer of a wrapping paper 710 for wrapping a product.
[0064] For example, the layer 110 may include polyethylene phthalate (PET). PET exhibits high tensile strength, excellent thermal stability and dimensional stability, and no cosmetic change even under conditions causing softening and shrinkage due to heat, and thus shrinkage rate of PET is small when printed. The material constituting the layer 110 is not limited to PET. The layer 110 may include at least one material from among oriented polypropylene (OPP), oriented nylon (ONY), and nylon (NY). The material constituting the layer 110 may be determined according to the type of a product to be wrapped.
[0065] The layer 110 may include a material that may be attached to and detached from other materials. For example, the layer 110 may include at least one from among benzene, trichloroethylene (TCE), formaldehyde, lead, nickel, cadmium, chromium, sulfuric acid, ethylene oxide, dimethylformamide (DMF), TDI (toluene-2,4-di Isocyanate/toluene-2,6-diisocyanate), normal hexane, methylene chloride (MC), methanol (methyl alcohol), toluene, styrene, hydrochloric acid (hydrogen chloride), hydrofluoric acid (hydrogen fluoride), mercury, tetramethylammonium hydroxide (TMAH), phenol, methyl bromide, and chloroform (trichloromethane).
[0066] The first region 120 forming the border of the authenticity verification tag 100 and the second region 130 surrounded by the first region 120 may be arranged on the layer 110. Also, the layer 110 may include a peripheral region 150 other than the first region 120 and the second region 130.
[0067] The first region 120 may have a frame-like shape to partition the second region 130 from the peripheral region 150. As shown in
[0068] The first region 120 may include a plurality of sub-regions 121. The first region 120 may include first to fourth sub-regions 121, 122, 123, and 124. Every two of four sub-regions 121, 122, 123, and 124 may have the same shape. For example, a first sub-region 121 and a third sub-region 123 may be rotationally symmetrical with each other about the center of the authenticity verification tag 100, and a second sub-region 122 and a fourth sub-region 124 may also be rotationally symmetrical with each other around the center of the authenticity verification tag 100. However, the present disclosure is not limited thereto. The first sub-region 121 and the second sub-region 122 may be rotationally symmetrical with each other, and the third sub-region 123 and the fourth sub-region 124 may be rotationally symmetrical with each other.
[0069] As shown in
[0070] The first region 120 may include identification information of a product for authenticity verification through a combination of the first unit elements 200a and the second unit elements 200b. Here, the identification information may include at least one of information regarding a manufacturer that manufactures the product, brand information of the product, and detailed information regarding the product (e.g., function, product name, etc.).
[0071] Identification information 200 as described above may be included in at least one of the first to fourth sub-regions 121, 122, 123, and 124.
[0072] As described above, the fact that the first sub-region 121 and the third sub-region 123 are rotationally symmetrical with each other, and the second sub-region 122 and the fourth sub-region 124 are rotationally symmetrical with each other may indicate that the same first identification information is included in the first sub-region 121 and the third sub-region 123 and the same second identification information is included in the second sub-region 122 and the fourth sub-region 124. In this regard, two or more of the same identification information is displayed, such that, when one identification information is not recognized due to damage, the other identification information may be used.
[0073] The identification information 200 may be encoded as a combination of the first unit elements 200a and the second unit elements 200b of the first region 120. For example, when a point at which the first unit element 200a is displayed based on a first end of the first sub-region 121 is referred to as a starting point 210 of the identification information 200, the first unit elements 200a and the second unit elements 200b arranged from the starting point 210 for a certain distance in a direction from the first end to a second end of the first sub-region 121 (e.g., the rightward direction) may become the identification information 200. When the certain distance is 12 unit lengths l, first to twelfth unit elements from the starting point 210 may be identification information 200. For example, when the first unit element 200a is 0 and the second unit element 200b is 1, the identification information 200 as shown in
[0074] The space surrounded by the first region 120 may be referred to as the second region 130. The second region 130 may be printed in a different color from the first region 120. In other words, the background color of the second region 130 may include a third color different from the first color and the second color.
[0075] Meanwhile, the plurality of spots 140 that may be used for authenticity verification may be disposed in the second region 130. Although the spots 140 are arranged in the second region 130, the size of the spots 140 may be too small for visually identification. As shown in
[0076] The size of each spots 140 may be a visually unrecognizable size. For example, as shown in
[0077] Meanwhile, at least one of sizes, shapes, arrangement directions, and colors of the spots 140 adjacent to one another from among the plurality of spots 140 may differ. As the spots 140 of different types are randomly arranged as described above, the spots 140 may not be visually identified, but the spots 140 may be visually seen as being separated from one another. Also, since the spots 140 are arranged throughout the second region 130 and are randomly arranged, replication of the authenticity verification tag 100 according to an embodiment may be difficult.
[0078] The spots 140 may also be used for authenticity verification. For example, the spots 140 may be divided into authentication elements used for authenticity verification and camouflage elements not related to authenticity verification. Spots corresponding to authentication elements and spots corresponding to camouflage elements may be pre-defined. In other words, at least one of a location in the second region 130, a density, a color, and a shape of the authentication element may be pre-defined. For example, the authentication element may include a separate color to be distinguished from the camouflage element, and the camouflage element may include a combination of basic colors. However, the present disclosure is not limited thereto. The authentication element, like the camouflage element, may include a combination of basic colors.
[0079] A reader (e.g., a user terminal) may verify authenticity by recognizing information regarding an authentication element corresponding to identification information (i.e., a location in the second region 130, a density, a color, and a shape of the authentication element) by using metadata and recognizing whether the authentication element exists in the second region 130. A method by which a reader checks the authentication element will be described below.
[0080] The first region 120, the second region 130, and the spots 140 as described above may be printed on the layer 110 by using a precision printing technique.
[0081] In the authenticity verification tag 100 according to an embodiment, identification information regarding a product is distinguished from an authentication element used to verify authenticity thereof. Also, since the authentication element is not only mixed with many camouflage elements, it is also difficult to visually distinguish the camouflage elements from the authentication element with a tag only, and thus it is difficult to replicate the authenticity verification tag 100. Also, since the metadata to which an authentication element and identification information are matched is stored in a device other than the authenticity verification tag 100, security of information for authenticity verification may be doubled.
[0082] Also, since the authenticity verification tag 100 according to an embodiment may be directly printed on the wrapping paper 710 for packaging a product or printed on the product, the authenticity verification tag 100 may increase reliability of the product. In other words, when the authenticity verification tag 100 is authentic, a product related to the authenticity verification tag 100 may more likely be authentic.
[0083]
[0084] At least one of sizes, shapes, arrangement directions, and colors of the copy-proof elements 400 adjacent to one another from among the plurality of copy-proof element 400 may be the same. Although
[0085] When the authenticity verification tag 100 is replicated in a copying method with a resolution lower than a precise printing method used for fabricating the authenticity verification tag 100, the copy-proof elements 400 may be printed in a plane shape instead of spots.
[0086]
[0087]
[0088] According to an embodiment, the layer 110 of the authenticity verification tag 100 may be a sticker type. Therefore, the layer 110 may be attached to and detached from the wrapping paper 710 for wrapping a product. However, the present disclosure is not limited thereto. The layer 110 of the authenticity verification tag 100 may be a part of a wrapping paper.
[0089]
[0090]
[0091]
[0092]
[0093] The network may be implemented in any type of wired/wireless networks, such as a local area network (LAN), a wide area network (WAN), a value added network (VAN), a personal local area network (PAN), a mobile radio communication, or a satellite communication network.
[0094] The management server 810 is a device that may be connected to the user terminal 820 to transmit and receive data and is capable of providing an authenticity verification application per a user request. When the user terminal 820 connects to the management server 810 via a network, the management server 810 may provide the user terminal 820 with various screens for providing an authenticity verification application. An authenticity verification application may include information regarding authentication elements according to identification information.
[0095] The management server 810 may update the application for authenticity verification from time to time to the user terminal 820, which has downloaded the application for authenticity verification and may receive not only a result of authenticity verification, but also location information and time information regarding the user terminal 820 during the authenticity verification from the user terminal 820. Also, the management server 810 may obtain data related to authenticity verification, e.g., a frequency for authenticity verification, a location of authenticity verification, a time zone of authenticity verification, and information regarding a user who performed authenticity verification, by using information received from the user terminal 820, e.g., a result of authenticity verification, location information, and time information.
[0096] The user terminal 820 is a terminal that may be used by a user and is a terminal capable of transmitting and receiving data by accessing the management server 810 through a wired or wireless network. The user terminal 820 may be a terminal including a camera 1040 capable of photographing a tag. The user terminal 820 may be a smart phone, a PC, a tablet PC, a notebook, a smart TV, a mobile phone, a personal digital assistant (PDA), a laptop computer, a media player 110, a micro server, a global positioning system (GPS) device, an e-book terminal, a digital broadcasting terminal, a navigation device, a digital camera 1040, a wearable device, and other mobile or non-mobile computing devices, but the present disclosure is not limited thereto.
[0097]
[0098] Referring to
[0099] In addition to the authenticity verification application, identification information and information regarding authentication elements according to products or manufacturers may be stored in the database 920 in the form of metadata. For example, when there is a request of a customer, an administrator may specify identification information and information regarding authentication elements and fabricate the authenticity verification tag 100 as described above. Also, the administrator may input the identification information and the information regarding the authentication elements through a user interface (not shown) of the management server 810. Then, the first processor 930 may store the identification information and the information regarding authentication elements in the database 920 in the form of metadata.
[0100] The first processor 930 may provide metadata and an authenticity verification application stored in the database 920 to the user terminal 820 according to a request of the user terminal 820, and, when a result of authenticity verification is received from the user terminal 820, the first processor 930 may store information about the result of authenticity verification in the database 920. The first processor 930 may generate various data useful to a customer based on a result of authenticity verification, e.g., a fake tag location, an authentic product distribution channel, etc.
[0101]
[0102] As shown in
[0103] The user terminal 820 may be implemented with one housing or may be implemented with a plurality of housings. When the user terminal 820 is implemented with a plurality of housings, a plurality of components may be connected to one another via a wire or wirelessly. For example, the user terminal 820 may be divided into a first device including the camera 1040 and a second device including the storage unit 1020, the output unit 1030, and the second processor 1050.
[0104]
[0105] The second processor 1050 may determine whether identification information is obtained from the tag (operation S1120). In addition to the authenticity verification tag 100 according to an embodiment, the tag may further include a bar code, a QR code, and other tags having a similar shape to the authenticity verification tag 100.
[0106] Meanwhile, as shown in
[0107] The first region 120 may be formed by 1-dimensionally arranging first unit elements 200a having a first color and second unit elements 200b having a second color different from the first color. The first color may be white and the second color may be black, but are not limited thereto. The first color and the second color may be different colors that may be identified. Identification information regarding a product may be displayed by a combination of the first unit elements 200a and the second unit elements 200b. Here, the identification information may include at least one of information regarding a manufacturer that manufactures the product, brand information of the product, and detailed information regarding the product (e.g., function, product name, etc.). Therefore, the second processor 1050 may obtain identification information by recognizing the first unit elements 200a and the second unit elements 200b that are binarily arranged and included in the first region 120.
[0108] For example, as shown in
[0109] On the other hand, when it is unable to obtain identification information from the tag (operation S1120No), the second processor 1050 may output a first indicator indicating that the tag is not recognized through the output unit 1030 (operation S1130). The tag may not be the authenticity verification tag 100 according to an embodiment, and may be a bar code or a QR code. In other words, the first region 120 may not exist in the tag, or, even when the first region 120 exists, the first unit elements 200a and the second unit elements 200b may not exist. In such a case, the second processor 1050 is unable to obtain identification information from the tag. In this case, the user terminal 820 may output the first indicator indicating that the tag is not recognized.
[0110] When identification information is obtained (operation S1120Yes), the second processor 1050 may determine whether the obtained identification information is registered identification information (operation S1140). The second processor 1050 may determine whether the obtained identification information is registered identification information by comparing the obtained identification information with identification information stored in the storage unit 1020.
[0111] However, when it is determined that the obtained identification information is not registered identification information (operation S1140No), the second processor 1050 may generate a second indicator indicating that the tag is unregistered, and the output unit 1030 may output the second indicator (operation S1150).
[0112] When identification information is not recognized or recognized identification information is not registered, authenticity verification may not be performed. Therefore, the second processor 1050 may output an indicator of the same type as the second indicator 1220 indicating that confirmation failed. However, a tag including unregistered identification information may be a tag similar to an authenticity verification tag according to an embodiment and may be a fake tag. To prevent the distribution of fake tags, a first indicator and a second indicator may be output differently.
[0113] When it is determined that the identification information is registered identification information (operation S1140Yes), the second processor 1050 may obtain information regarding an authentication element corresponding to the identification information (operation S1160). The second processor 1050 may obtain information regarding an authentication element corresponding to identification information by using metadata stored in the storage unit 1020. Information regarding an authentication element may include at least one of a shape, a size, a color, a location in the second region 130, and a density of the authentication element. As shown in
[0114] The second processor 1050 may check whether an authentication element exists (operation S1170).
[0115] The plurality of spots 140 that may be used for authenticity verification may be disposed in the second region 130. The spots 140 may be arranged in the second region 130 and be apart from one another. Each of the spots 140 may be any one of special characters, letters, and numbers. The letters may be letters of languages, such as Korean, Japanese, and Chinese, other than English letters, and special characters, and numbers.
[0116] The size of each spots 140 may be a visually unrecognizable size. For example, the spots 140 may have a thickness t of about 0.02 mm or less. Alternatively, the spots 140 may have a length l or a width w of about 0.10 mm or less, and an interval between the spots 140 may be about 0.15 mm.
[0117] Meanwhile, at least one of sizes, shapes, arrangement directions, and colors of the spots 140 adjacent to one another from among the plurality of spots 140 may differ. As the spots 140 of different types are randomly arranged as described above, the spots 140 may not be visually identified, but the spots 140 may be visually seen as being separated from one another.
[0118] The spots 140 may also be used for authenticity verification. Spots arranged at locations corresponding to the location information regarding an authentication element stored in the storage unit 1020 may be used for authentication verification. In detail, the second processor 1050 may recognize spots arranged at a location of the second region 130 corresponding to the location information stored in the storage unit 1020 and may determine whether recognized spots coincide with information regarding an authentication element. In other words, the second processor 1050 may determine whether a shape, a size, a color, or an arrangement direction of the spots is identical to that in the information regarding an authentication element. When a spot coinciding the information regarding an authentication element exists at a pre-registered location of the second region 130, the second processor 1050 may determine that the authentication element exists.
[0119] Although the above descriptions are given based on one authentication element, the present disclosure is not limited thereto. There may be a plurality of authentication elements, and the existence of authentication elements may be determined by comparing the consistency between the spots 140 and the authentication elements on the probability basis and then comparing a result thereof with a reference value. Alternatively, the existence of authentication elements may be determined by comparing the density of the spots 140 (that is, authentication elements) having a particular shape or the spots 140 (that is, authentication elements) having a particular color in the second region 130 with a reference value.
[0120] When it is determined that authentication elements exist (operation S1170Yes), the second processor 1050 may generate a third indicator indicating that the tag is authentic and output the third indicator through the output unit 1030 (operation S1180). The third indicator may be shown on a display in the form of an icon.
[0121] When it is determined that no authentication element exists (operation S1170No), the second processor 1050 may output a fourth indicator indicating that the is not authentic (operation S1190). The fourth indicator may also be displayed on the display in the form of an icon.
[0122] The system 800 according to an embodiment may provide various information by using a result of executing an authenticity verification application. Every time the user terminal 820 executes an authenticity verification application and outputs an indicator, the user terminal 820 may transmit a result thereof to the management server 810.
[0123] For example, in case of outputting a first indicator indicating that a tag is not recognized, the user terminal 820 may transmit a photograph of a tag together with the first indicator to the management server 810. The management server 810 may store the first indicator and the photograph of the tag in the form of metadata. Alternatively, the management server 810 may check whether the failure of recognition is due to a malfunction of the authenticity verification application while the tag is a recognizable tag. Then, a result of the checking may be used as data for improving the performance of the application.
[0124] Even when outputting a second indicator indicating that the tag is an unregistered rag, the user terminal 820 may transmit a photograph of the tag together with the second indicator to the management server 810. The fact that the second indicator is output indicates that identification information is obtained from the tag. However, when the obtained identification information is unregistered identification information, it is likely that the photographed tag is a fake tag. Therefore, the user terminal 820 transmits the photograph of the tag to the management server 810, such that the management server 810 may manage fake tags. The user terminal 820 may transmit not only the photograph of the tag, but also location information thereof to the management server 810. Then, an administrator may double-check whether the tag is a fake tag and take an action to prevent the occurrence of fake tags.
[0125] When a third indicator indicating that the tag is authentic is output, the user terminal 820 may transmit location information regarding the tag together with a result thereof to the management server 810. The management server 810 may store the third indicator and the location information in the form of metadata and use the above information to statisticize the distribution path of a product associated with the tag. Alternatively, the user terminal 820 may transmit information regarding the user terminal 820 as well as information regarding the third indicator to the management server 810. Since the user terminal 820 is a terminal that has downloaded the authenticity verification application from the management server 810, the management server 810 may obtain information regarding a user of the user terminal 820 based on information regarding the user terminal 820. Therefore, the management server 810 may also statisticize information regarding consumers of a product associated with the tag.
[0126] When a fourth indicator indicating that the tag is not authentic is output, the user terminal 820 may transmit location information regarding the tag together with a result thereof to the management server 810. The fact that the fourth indicator is output may highly likely indicate that the photographed tag is a fake tag. The management server 810 may store the fourth indicator and the location information in the form of metadata and use the above information to statisticize the distribution path of a product associated with the tag. The administrator may double-check whether the tag is a fake tag and take an action to prevent the occurrence of fake tags.
[0127] Example embodiments of an authenticity verification tag have been described and illustrated in the accompanying drawings in order to facilitate understanding of the present disclosure. However, it should be understood that such embodiments are merely illustrative of the present disclosure and do not limit it. It is also to be understood that the present disclosure is not limited to the illustrations and the descriptions given above. This is because various other modifications may be made by one of ordinary skill in the art.
EXPLANATION OF REFERENCE NUMERALS DESIGNATING THE MAJOR ELEMENTS OF THE DRAWINGS
[0128] 100: authenticity verification tag [0129] 110; layer [0130] 120: first region [0131] 130: second region [0132] 140: spots [0133] 200: identification information [0134] 200a: first unit element [0135] 200b: second unit element [0136] 400: copy-proof elements [0137] 800: system [0138] 810: management server [0139] 820: user terminal