METHOD FOR CHECKING THE AUTHENTICITY OF THE INDICATION OF ORIGIN AND THE SHELF-LIFE SPECIFICATIONS OF PRODUCTS
20180218375 · 2018-08-02
Inventors
Cpc classification
G07D7/0047
PHYSICS
G07D7/2033
PHYSICS
G06F16/955
PHYSICS
International classification
Abstract
The invention relates to a method for checking the authenticity of the specifications of origin of products and the specifications of time-based guarantees of product properties. The method is used to combat product piracy and to provide the prerequisites for automated identification of products, the shelf-life of which is just before the predefined expiry thereof or the expiry of the time based functional guarantee thereof. The field of application extends in this case to checking food, pharmaceutical products through to technical products.
Claims
1. A method for checking the authenticity of the indications of origin of products and their time-related guarantee of product properties, characterized in that: (a) the indication of origin is applied to the product (1) in data communication with an individual security code, b) in the authenticity control the optical design features within the design surface (2) are detected in their entirety by means of a computer device, c) a decoding of the connection data contained in the individual security code to a database, which contains the respective individual security code, the data of the origin identifier and a query code (6) associated therewith, by the computer device, d) after the connection to the database, a comparison of the transmitted data with the data stored in the database is done and each query a new query code (6) is created and sent to the computer device, and e) is sent at a detected agreement of the values of the new query code (6) as a signal for authenticity to the computer device and a deviation of the compared values, a signal for the presence of a forgery is sent to the computer device and the transmitted signals from this optical and/or acoustically reproduced.
2. The method according to claim 1, characterized in that the data-technical connection of the origin marking with the individual security code by coding by means of a three-dimensional material technology incorporation during the process engineering application of the origin marking on the product (1).
3. The method according to claim 1, characterized in that the data-technical connection of the origin marking with the data on the time-related warranty of product properties within the printing design of the indication of origin during their application to the product (1).
4. The method according to claim 1, characterized in that the data connection of the origin marking is produced via a connection code to further product information and/or to a three-dimensional optical representation of the marked product (1).
5. The method according to claim 1, characterized in that the origin marking and the data technically associated with this individual security code and/or information about the warranty period of the product properties of the camera of a mobile computer device (4) is detected by means of autofocus in the entirety, a data assignment the comparison values stored in a database and corresponding to the encrypted data are compared with each other and the optically and/or acoustically signaled by the mobile computer device (4) after the coded signal transmission and the retrieval of the comparative data of the integrated data association of the genuine origin labeling from the database becomes.
6. A method according to claim 1, characterized in that the camera-technological detection of the origin marking during each detection process takes place alternately during the exposure by means of the flash device of the mobile computing device (4) and without exposure to the Blit breeding equipment.
7. Method according to claims 1 and 6, characterized in that the camera-technological detection of the origin marking during a detection process takes place alternately under at least two different predetermined light incidence angles and with the inclusion of the ZOOM function.
8. The method according to claim 1, characterized in that assigned during the printing manufacturing process for each of the products an individual coding pattern in the form of a predetermined number of different arrangements of printing visible and/or invisible design elements and applied to the surface of the origin mark and stored in a database, when verifying authenticity, the coding patterns are detected according to an encrypted specification of the elements of the coding pattern to be checked, and then compared with the values of the values stored in the database.
9. The method according to claims 1 and 8, characterized in that the control of the data for time-related warranty of the product properties by means of a comparison of the coded in the coding expiration date with the in the database the product (1) associated with the expiration date.
10. The method according to claim 1, characterized in that the detected individual coding of the respective product (1) converted by means of a hash function, sent to the server (5) and stored by the server (5) with the also converted by means of the hash function stored Values of the genuine product (I).
Description
[0009] The method will be explained in more detail using an exemplary embodiment. In the drawing shows:
[0010]
[0011]
[0012] With the schematic representation of
[0013] For the purpose of authentic control, the detection of the design elements by means of a mobile computing device 4, such as a smart phone, tablet PC, notebook, by triggering the autofocus function. The peripheral edges of the design surface 2 to be tested are detected. Thereafter, the optical representation elements of the total area between the peripherally delimiting edges are two-dimensionally picked up by the camera of the mobile computing device 4. For the purpose of discriminating the two-dimensional and three-dimensional code features introduced in the origin identifier, the camera is moved relative to the inspected surface during the detection process. During the usually upward movement, acquisitions from different distances (heights) and/or angles are performed by software. If different views of the visual display elements are detected due to the different incidence of light, a three-dimensional design feature is present within the design area 2. The changes in the optical views of three-dimensional representations upon detection from different planes or angles of incidence of the light may be enhanced by thereby triggering the flashlight device and/or the flashlight function. Alternatively, instead of the movement upwards, the camera can also be made laterally and thereby change the respective detection angle of the camera. With a required higher accuracy of the detection of the design features, the respective detection takes place within the different distance levels by the software-assisted connection of the ZOOM function of the camera. From the design elements of the acquired overall view, the connection data are decoded from the respective individual codes recorded, to connect to the server 5 of the manufacturer via the Internet 7. After the connection has been established, the individual code and the data of the detected brand 3 are transmitted. The values decoded by the server 5 are then compared with stored values of the data of the genuine product. If the comparison results in a match of the values, a corresponding signal is transmitted to the mobile computer device 4 and signaled by the latter visually and/or acoustically as a genuine product. In this case, a query code 6 is transmitted, which also contains the query time and the release for the querying seller. If the comparison yields deviations of the values, then the presence of a counterfeit product is signaled by the mobile computer device 4. After the connection has been established, the individual code and the data of the detected brand 3 are transmitted. The values decoded by the server 5 are then compared with stored values of the data of the genuine product. If the comparison results in a match of the values, a corresponding signal is transmitted to the mobile computer device 4 and signaled by the latter visually and/or acoustically as a genuine product. In this case, a query code 6 is transmitted, which also contains the query time and the release for the querying seller. If the comparison yields deviations of the values, then the presence of a counterfeit product is signaled by the mobile computer device 4. After the connection has been established, the individual code and the data of the detected brand 3 are transmitted. The values decoded by the server 5 are then compared with stored values of the data of the genuine product. If the comparison results in a match of the values, a corresponding signal is transmitted to the mobile computer device 4 and signaled by the latter visually and/or acoustically as a genuine product. In this case, a query code 6 is transmitted, which also contains the query time and the release for the querying seller. If the comparison yields deviations of the values, then the presence of a counterfeit product is signaled by the mobile computer device 4.
[0014] The database of the server 5 contains the assignments of the mark 3 to the individual codes of the products land a query code 6 associated therewith. The data of the mark 3 and of the individual code are compared with the data of the database and the associated interrogation code 6 is determined. If the respective data associated with the product 1 match, the authenticity of the product is signaled. For each query, the query code 6 is recreated according to a predetermined stored mathematical function. Subsequently, the new polling code 6 is sent from the server 5 to the polling mobile computing device 4. The server 5 registers the query and stores the time and the number of queries already made. For the authenticity check, in addition to the trademark data with the individual code, the valid query code 6 must also be entered and transmitted. Even with a complete imitation of the original product with individual code and brand data so the confirmation of the authenticity can be done only with simultaneous knowledge of the currently valid query code 6. When querying the database also more product information such as technical data, a three-dimensional audiovisual representation of the product is available.
[0015] During the recording process of the individual code, a hash function integrated into the evaluation software is used, which converts the acquired value. This conversion makes it impossible to trace back to the individual code of the product land thus significantly increases the security against counterfeiting. The converted value is sent to the server 5.
[0016] Within the server 5, the appropriate values of the product 1 to be checked are also converted and stored using the same hash function. After the transfer of the detected and hash function coded values, these are compared with the stored values. If the comparison results in a match of the values, a corresponding signal is transmitted to the mobile computer device 4 and signaled by the latter visually and/or acoustically as a genuine product of the manufacturer. If the comparison yields deviations of the values, then the presence of a counterfeit product 1 is signaled by the mobile computer device 4.
[0017] The data connection between the origin marking (e.g. brand) and the individual code can be designed as a hologram, in which, for example, the brand representation and the code are components of the hologram. Furthermore, instead of the laser engravings or holograms or in addition to these code patterns in the form of punctiform patterns are used, which are produced by dot-shaped applications of invisible dots of infrared color. These are detected by the camera sensor of the mobile computing device 4 and displayed on the display. The code is decrypted by creating a template on the code pattern by querying only predetermined polling points of the applied code pattern. In order to increase the detection accuracy and the required exclusive reproduction of the IR image (pattern), an IR filter is arranged between the camera sensor and the code pattern to be detected, which hides the influence of daylight. The key for the respective locations of the code pattern to be queried is stored in the database and is sent to the mobile computing device 4 at the query from the data associations of the brand and individual connection code. This determines the values of the code pattern at the locations specified by the key and sends them to the database. After comparing the code thus decrypted, a comparison is then made with the valid stored values.
[0018] The schematic representation of
[0019] The storage of the shelf life data in a query carried out in another database 8 allows the overview and timely signaling of those products 1, for which a price discount is provided within predetermined periods.