SYSTEM AND METHOD FOR AUTHENTICATING AND CERTIFYING A PHYSICAL ITEM, AND CORRESPONDING CERTIFIED PHYSICAL ITEM

20230031817 · 2023-02-02

    Inventors

    Cpc classification

    International classification

    Abstract

    A system and a method for authenticating and certifying a physical item are provided. The system has an identification tag coupled to the physical item and having a relevant tag identifier adapted to be read at a distance, a non-fungible cryptographic token issued on a predetermined digital register distributed in a plurality of nodes of a processor network and configured to store the relevant tag identifier of the identification tag coupled to the physical item and data or information representative of the physical item, and detectors for detecting the presence of the identification tag of the physical item passing nearby a predetermined detection area or through a predetermined detection gate. Data indicative of the presence of the physical item in the predetermined area or the physical item passing through the predetermined gate is recorded in the non-fungible cryptographic token. The physical item may be a garment, a sportswear item, a collectible, or a luxury item.

    Claims

    1. A system for authenticating and certifying a physical item, comprising: an identification tag configured to be coupled to the physical item and having a relevant tag identifier adapted to be read at a distance; a non-fungible cryptographic token issued on a predetermined digital register distributed in a plurality of nodes of a processor network, the non-fungible cryptographic token being configured to store at least said relevant tag identifier of the identification tag coupled to the physical item and data or information representative of said physical item, said non-fungible cryptographic token forming a unique digital representation of said physical item; detectors configured to detect a presence of said identification tag of the physical item passing nearby and to read the relevant tag identifier of said identification tag; and a remote processing system associated with said detectors and configured to access said non-fungible cryptographic token on the basis of the relevant tag identifier acquired from said identification tag, wherein said detectors are configured to detect the presence of said physical item in a predetermined detection area or through a predetermined detection gate, wherein said predetermined detection area or said predetermined detection gate is located in transit areas through which said physical item has to pass to be classified as an authentic item, and said remote processing system is configured to record in said non-fungible cryptographic token data indicative of the presence of the physical item in said predetermined detection area or through said predetermined detection gate.

    2. The system of claim 1, wherein said predetermined detection area or said predetermined detection gate is located along an access path to an event during which said physical item is used, and recording of the presence of the physical item in the predetermined detection area or through the predetermined detection gate is adapted to correlate said physical item to said event.

    3. The system of claim 2, further comprising a geographic localization system associated with said detectors and configured to localize the detectors in a predetermined geographic reference system, and to feed recording of relative location data into said non-fungible cryptographic token.

    4. The system of claim 3, wherein said geographic localization system comprises satellite localization devices or terrestrial localization devices, and said remote processing system is configured to acquire data of the satellite localization devices, or of the terrestrial localization devices, respectively, used for localization and to record said data of the satellite localization devices, or of the terrestrial localization devices, respectively, in said non-fungible cryptographic token, and wherein said data of the satellite or terrestrial localization devices used for localization are adapted to be used by said remote processing system to verify origin of the data acquired by said detectors.

    5. The system of claim 2, wherein said remote processing system is configured to verify a correlation of said physical item to said event by a comparison with data referring to the event and stored in a computer system of a certification entity extraneous to the system.

    6. The system of claim 1, wherein said identification tag is a tamper-proof radio-frequency identification tag integrated with the physical item.

    7. The system of claim 1, wherein said identification tag is an identification tag assembly comprising a combination of a Radio Frequency Identification (RFID) microcircuit and a Near Field Communication (NFC) microcircuit, wherein the RFID microcircuit stores a unique identifier of the NFC microcircuit and the NFC microcircuit stores the unique identifier of the RFID microcircuit.

    8. The system of claim 1, wherein said non-fungible cryptographic token is initialized with identification data of a manufacturer of the physical item and is configured to store data representative of transfers of ownership of said physical item, comprising at least one transfer from the manufacturer to a first buyer.

    9. The system of claim 1, wherein said non-fungible cryptographic token includes a time stamp indicative of time of creation of the non-fungible cryptographic token.

    10. The system of claim 1, wherein said non-fungible cryptographic token includes data indicative of a current location of the physical item.

    11. The system of claim 1, wherein a graphic identification code (C) of the physical item or an identification code of the physical item stored electronically according to a predetermined format is coupled to said physical item, the identification code storing address data of the predetermined distributed digital register, the address data allowing partial read access to the data recorded in said non-fungible cryptographic token.

    12. The system of claim 11, comprising a user interface computer environment, implemented as an application adapted to be downloaded and to reside on a user's personal mobile telecommunication device or on a user's personal processing device, said user interface computer environment being configured to perform said partial read access to the data recorded in said non-fungible cryptographic token on the basis of said address data.

    13. The system of claim 1, wherein said predetermined distributed digital register is an Ethereum blockchain platform and said non-fungible cryptographic token is implemented as an ERC-721 token on the Ethereum blockchain platform.

    14. The system of claim 1, wherein said physical item is a garment.

    15. The system of claim 14, wherein the identification tag is incorporated in an area of the garment on which a heat-sealed patch is affixed.

    16. A method for authenticating and certifying a physical item by the system of claim 1, the method comprising: coupling an identification tag to the physical item, the identification tag having a relevant tag identifier adapted to be read at a distance; issuing a non-fungible cryptographic token on a predetermined digital register distributed in a plurality of nodes of a processor network, and storing in said non-fungible cryptographic token the relevant tag identifier of the identification tag coupled to the physical item and data or information representative of the physical item, whereby said non-fungible cryptographic token forms a unique digital representation of said physical item; detecting a presence of said identification tag of the physical item passing through a predetermined detection area or through a predetermined detection gate; reading the relevant tag identifier of said identification tag and accessing said non-fungible cryptographic token on the basis of the relevant tag identifier acquired from the identification tag; and recording in said non-fungible cryptographic token a data indicative of the presence of the physical item in said predetermined detection area or through said predetermined detection gate.

    17. A physical item certified by the system of claim 1, comprising an identification tag having a relevant tag identifier adapted to be read at a distance, wherein a non-fungible cryptographic token issued on a predetermined digital register distributed in a plurality of nodes of a processor network is associated therewith, the non-fungible cryptographic token forming a unique digital representation of the physical item, the relevant tag identifier of the identification tag being stored in the non-fungible cryptographic token together with data or information representative of the physical item and data indicative of presence of the physical item in a predetermined detection area or through a predetermined detection gate arranged along an access path to an event during which said physical item was used.

    18. The physical item of claim 17, wherein said physical item is a garment, a collectible, or a luxury item.

    19. The physical item of claim 18, wherein said garment is a sportswear item.

    Description

    [0036] Further features and advantages of the invention will be explained in greater detail in the following detailed description of an embodiment thereof, given by way of non-limiting example and with reference to the accompanying drawings, in which:

    [0037] FIGS. 1, 2 and 3 are schematic views of a system for authenticating and certifying a physical item that is the subject of the invention, respectively in a step of initializing a physical item, a step of detecting the item in association with a predetermined event, and a step of consulting the record associated with an item; and

    [0038] FIG. 4 is a flow diagram of the operations for authenticating and certifying a physical item, which operations are carried out by the system in FIGS. 1 to 3.

    [0039] With reference to FIGS. 1 to 3, a system for authenticating and certifying a physical item is shown, in which the item is depicted, purely by way of non-limiting example of the invention, as a sports jersey J.

    [0040] The complete jersey J, which is ready to be worn in a competition, bears a patch P adapted to show an inscription such as the name or number of the athlete, or a sponsor of the sports club or even an emblem or other inscription. The patch is made in such a way as to subsequently adhere to the jersey, for example by means of a thermostamping or heat-sealing technique which does not allow its removal, as otherwise said jersey will be damaged. An identification tag T having a relevant tag identifier adapted to be read at a distance, for example a radio-frequency readable RFID tag, is incorporated into the patch P in a tamper-proof manner, or the tag T is incorporated between the patch and the fabric of the jersey when the patch is coupled to the jersey. The identification tag T is preferably designed as a tracking and anti-counterfeiting element paired to the jersey such that it may not be separated from the jersey without one or the other being damaged, the element being provided with an integrated passive or active microcircuit (RFID, NFC, etc.) that may be programmed with a unique identifier, UID, that allows remote contactless acquisition. In a preferred embodiment, the identification tag T is provided with both RFID and NFC microcircuits, so that it may be intercepted by a short- and/or long-distance reader. Advantageously, the RFID microcircuit also stores the unique identifier of the NFC microcircuit, and vice versa, the NFC microcircuit also stores the unique identifier of the RFID microcircuit. The patch comprises a silicone body containing the RFID and NFC microcircuits, and the fact that each microcircuit contains the identifier of the other makes any possible manipulation, tampering or fraudulent reproduction operation more complex.

    [0041] The jersey J also bears a labelling tag L which is coupled to the patch P or to the jersey J and which bears an identification code C of the item, such as a graphic barcode and preferably a two-dimensional barcode or QR code, or an identification code of the item stored electronically according to a predetermined format, for example the NDEF format in a circuit accessible by reading at radiofrequency in close proximity by means of an NFC protocol. The identification code C stores data including a unique identifier code of the item by means of which it is possible to trace the tag T and the token associated therewith.

    [0042] A remote processing system S, such as a web platform of an entity that owns the authentication and certification system, is designed to have read access to the identification tag T and to record the relevant identifier in a support database DB, together with other data such as data or information representative of the jersey, the name of the athlete to whom the jersey is assigned and the competition in which the jersey will be used, which data may be provided to the system S through other input means, for example a touch-sensitive keyboard or graphical user interface.

    [0043] FIG. 2 shows a portal G, which represents a predetermined detection gate located along an access path to the event during which the jersey is used, for example a predetermined transit area toward the playing field, through which area the jersey has to pass in order to be classified as an authentic item. One or more detectors SS are associated with the portal G, which detectors are adapted to detect the presence of an identification tag T of a jersey J passing nearby and to read the identifier of the tag.

    [0044] In a currently preferred embodiment, the portal G consists of a supporting structure of suitable shape and size to allow the worn shirt, and more generally the physical item to be detected thereby, to pass through. The detectors SS, in the form of antennas or optical readers, are arranged along the internal perimeter of the portal or at certain points thereof and are capable of interacting with the tags T integrated in the jerseys and reading the identifiers thereof. The detectors SS are managed by a centralized reading system CR which decodes the data read therefrom and makes said data usable for subsequent processing. The detectors SS are designed so as to ensure that any tampering is detectable; for example, they are provided with at least one microswitch or internal circuit configured to be corrupted or damaged in the event of any tampering with the detector structure. The provision of a suitable microprocessor would also allow the moment of any tampering with the detectors to be tracked, the event to be recorded in a memory, and an alarm message to be sent. The centralized reading system CR is also designed so as to ensure that any tampering is detectable; for example, the operating system is integrated therein and is protected from unauthorized access by hardware encryption, and is provided with a unique identifier and technologies for authenticating the origin of the data. The centralized reading system CR is connected to a local processing unit R by means of a wired connection or radio wave connection (for example according to a Wi-Fi, GPRS, 3G, 4G or 5G protocol). In the preferred embodiment, in which the identification tag T is provided with both RFID and NFC microcircuits, a single long-range reader operating according to RFID technology or a single short-range reader operating according to NFC protocol may alternatively read the tag identifier, or a dual-technology reader (combined RFID and NFC technology) may intercept a tag at short range by means of both technologies, ensuring double verification of the tag identifier and therefore a higher level of security.

    [0045] The portal G is advantageously provided with a multiple-input power supply device provided with rechargeable accumulators (batteries), which supply device is capable of supplying power to the detectors SS and to the centralized reading system CR even when the portal may not be connected to a permanent external power source. The accumulators may be recharged when the system is connected to an external power source (for example the electrical grid) or by alternative energy sources such as photovoltaic panels. The power supply device takes energy from the main source (electrical grid) and ensures that all the detectors and the centralized reading system are suitably supplied with energy in a form suitable for each one (regulation), and supports their operation even when disconnected from the electrical grid by allowing them to be used in remote environments or on the move by means of using rechargeable accumulators. It also allows the system to be powered and the accumulators to be recharged from secondary energy sources such as photovoltaic panels, wind systems, alternators/generators and more.

    [0046] In an alternative embodiment, the predetermined area or gate for detecting the presence of the item and its access to the event may be defined by means of a virtual perimeter associated with a real geographic area (geo-fencing), which perimeter is dynamically generated or defined by a set of boundaries pre-established by means of terminals which are capable of determining the position thereof and provided with communication capabilities.

    [0047] The processing unit R associated with the detectors SS is connected to the remote processing system S, for example by means of a global public computer network (Internet), to which it transfers data regarding the detection of the presence of the jerseys that have passed nearby to the portal G, which the remote processing system S stores in the database DB. The processing unit R is expediently a local processing device connected to the centralized reading system CR and therefore to the detectors SS, with protection against tampering and advanced data protection features (such as encryption, secure boot, etc.).

    [0048] The remote processing system S is also designed to create a non-fungible cryptographic token, NFT, on a predetermined digital register B distributed in a plurality of nodes of a public or private processor network, storing therein a time stamp indicative of the time of creation of the token, the identifier of the tag T, the serial code of the jersey J or its patch P to which the tag T is coupled, any initialization data identifying the manufacturer of the jersey and a data item indicative of the presence of the jersey through the portal G, whereby the token, indicated by reference sign K in the figures, forms a unique digital representation of the jersey. In the case where RFID and NFC technology are both present in the tag, the processing system S stores the unique identifier of the NFC microcircuit in the token associated with the RFID identifier of the tag and, vice versa, stores the unique identifier of the RFID microcircuit in the token associated with the NFC identifier of the tag. The recording of the jersey passing through the portal G correlates the jersey to the event for which it is used.

    [0049] Similarly, the jersey passing through the portal G may be recorded at the end of the event.

    [0050] In the preferred embodiment, the distributed digital register is the Ethereum blockchain platform and the non-fungible token, NFT, is produced as a token according to the ERC721 standard on the Ethereum blockchain platform.

    [0051] The remote processing system S is also designed to access the token K on the basis of the identifier acquired from the tag T of each jersey recorded in the database DB for which passage through the portal G has been recorded, in order to record therein data (public and private encrypted data) representative of transfers of ownership of the jersey, including at least one transfer of ownership from the manufacturer to a first buyer, which may be the sports club to which the jersey belongs or an official retailer thereof. Similarly, the remote processing system S may record on the token K data indicative of the current location of the jersey, at the first detection of transit through the portal G and subsequently by the owner of the token on a voluntary basis.

    [0052] In an alternative embodiment, the local processing unit R is designed to record data directly on the token K in blockchain, without using the remote processing system S.

    [0053] The processing unit R associated with the detectors SS is advantageously connected to a geographic localization system GPS designed for the localization of the detectors SS in a predetermined geographic reference system. The geolocation system GPS may also be integrated in the processing unit R or otherwise connected thereto so that any tampering with the system or the data acquired thereby that compromises its correct functioning may be detected.

    [0054] In one embodiment, the geographic localization system GPS comprises satellite localization means (operating technologies according to GPS, GNSS, Galileo, etc.), and the processing unit R is designed to acquire data from the satellite devices used for localization, for example including respective identification codes and position coordinates, and to provide said data from the satellite devices to the remote processing system S in order to be recorded in the token K. In an alternative embodiment, the geographic localization system GPS comprises terrestrial localization means (for example, telephone cells, radio triangulation systems, etc.), and the processing unit R is designed to acquire data from the terrestrial devices used for localization, for example including respective identification codes and position coordinates, and to provide said data from the terrestrial devices to the remote processing system S in order to be recorded in the token K. The geographic localization system GPS is designed in such a way as to ensure that any tampering is detectable, is provided with a unique identifier and technologies for authenticating the origin of the data, and is connected to the processing unit R via a digital wired connection, while the remote processing system S manages its operations entirely.

    [0055] The identification codes of the satellite or terrestrial devices used for localization are advantageously used by the remote processing system S to verify the origin of the data relating to the jerseys J acquired by the detectors SS, for example for comparison with external public databases.

    [0056] In a currently preferred embodiment, the remote processing system S verifies the correlation of the jersey J to the event by means of a comparison with data which refer to the event and are stored in a computer system of a certification entity extraneous to the system, which entity is indicated by reference sign LS in FIG. 2.

    [0057] Each connection or communication protocol, whether wired or wireless, advantageously has advanced features for protection, authentication and encryption of the transmitted data.

    [0058] FIG. 3 shows a user interface computer environment, APP, implemented as an application adapted to be downloaded and to reside on a user's personal mobile telecommunication device D or on a user's personal processing device, and said computer environment is designed to perform partial read access to the data recorded in the token K on the basis of the address data obtainable from the identification code C of the item, for example to read identification data of the jersey and its current owner.

    [0059] With reference to FIG. 4, an exemplary method for authenticating and certifying a physical item, such as an item of sportswear or a jersey J, is described below, which method comprises concisely the operations of: [0060] generating a unique code for the item, GUID, in step 100; [0061] pairing the unique code GUID of the item with the identifier TID of the tag T in step 200; [0062] uniquely and physically associating the tag T with the item J in step 300; [0063] digitalizing the item in blockchain in step 400, specifically by means of creating an associated token, according to one possible embodiment of the invention in which the token is created in advance; [0064] recording the ownership of the item in blockchain in step 500; [0065] detecting the presence (for example the transit) of the item through an area or a gate for reading the tag with (in one alternative embodiment, possibly creating the token if this has not occurred in step 400 and) recording in the token in blockchain in step 600; [0066] registering a transfer of ownership in step 700; [0067] adding supply chain steps of the item in blockchain in step 800; and [0068] verifying the authenticity of the item in step 900. [0069] The relevant steps of the method that is the subject of the invention are, in particular, coupling an identification tag having a relevant identifier adapted to be read at a distance to the item, issuing a non-fungible cryptographic token on a predetermined digital register distributed in a plurality of nodes of a public or private processor network, and storing the tag identifier in the token, detecting the tag of an item in transit in a predetermined detection area or through a predetermined detection gate with associated reading of the tag identifier, and recording, in the token associated with the tag identifier, a data element indicative of the presence of the item in the predetermined detection area or through the predetermined detection gate.

    [0070] The steps of the method are described in detail in the following.

    [0071] In step 100, the unique code of the item, or serial code, GUID, is generated by the remote processing system S, i.e. by the web platform of an entity that owns the authentication and certification system, and is intended to be associated with a single identification tag; said code may be revoked if the item is destroyed or if the item is removed from the platform, and may no longer be reused. This serial code also constitutes an identification code of the item for subsequent searching through user interface computer environments by constructing a URL (Uniform Resource Locator) that contains it. The URL is indelibly marked on the item by means of appropriate marking methods that allow it to be optically read (if it is marked in a barcode, QR code or similar) or is included in a predetermined digital format, for example the NDEF format (NFC Data Exchange Format), in a microcircuit for remote reading, for example via NFC protocol.

    [0072] In step 200, two methods for initializing the identification tag are possible, according to currently preferred alternative embodiments.

    [0073] A first possible initialization method involves pre-assigning the GUID.

    [0074] In step 200, the identification tag integrated in the item to be traced is labelled by a unique code, UID, consisting of a non-modifiable and proprietary part of the tag, the identifier TID, and a second part containing a code MINIGUID uniquely paired with the identification tag. During the initialization step, the identifier TID and the code MINIGUID are read by a unique code of the item, or serial code, GUID, which represents its guarantee of authenticity. The MINIGUID is written on the tag, for example by means of an RFID or NFC writing system if the tag is provided with an active/passive electronic microcircuit that is readable using one of the aforementioned protocols, and the tag is subsequently locked by means of a randomly generated access password or by irreversibly configuring the write lock parameters, thus preventing the tag from being reprogrammed.

    [0075] The identifier TID of the tag is read by an RFID/NFC reader device and sent to the remote processing system S in order to verify the presence of the tag data. If this is the case, the remote system S responds by communicating the code MINIGUID to be programmed inside the identification tag and the code GUID to be included in the optical identification system (for example QR code), which is then printed. The remote system S unmarks the tag as “processed.” The QR code is subsequently paired to the jersey J by means of the remote processing system S. The code MINIGUID of the tag is not used by the remote processing system S for the functionalities offered to a user, but may be used for counterchecking if there are disputes over the authenticity of the item associated with the tag.

    [0076] At the end of the initialization method, there are the following elements: [0077] identification tag comprising unique code UID composed of the tag identifier TID and the unique code MINIGUID; [0078] an optical or NFC reading element which represents a URL containing the unique code of the tag GUID; and [0079] an entry in the database DB maintained by the remote processing system S that associates the unique code of the tag GUID and the code MINGUID with the identifier TID.

    [0080] In the currently preferred embodiment in which the patch is associated with an identification tag assembly comprising both an RFID microcircuit and an NFC microcircuit, the following NFC tag writing operations are performed to ascertain the authenticity of said tag.

    [0081] An encrypted, password-protected and non-clonable message is written into the NFC microcircuit.

    [0082] The entity that owns the authentication and certification system has two private keys which are saved in the database DB and used for the creation of appMasterKeys and appKeys.

    [0083] Each NFC tag requires the following contents: [0084] an AppMasterKey: a root password used to modify other passwords and set permissions; [0085] a plurality of appKeys: passwords used to access a specific space of the memory in the microcircuit.

    [0086] A registered operator of the sports club, by means of an application, reads the NFC tag and checks whether or not the tag has already been initialized. If the tag has not been initialized, the application makes a call to a backend system of the authentication and certification system by passing the serial code of the tag to said system. The backend system takes a first private key and concatenates the serial code of the tag to the key, and then hashes the result, and the resulting hash is the AppMasterKey of that tag. Then, the backend system takes the second private key and concatenates the serial code of the tag to the key, and then hashes the result, and the resulting hash is the AppKey. The backend system takes the serial code of the tag and concatenates a “GENUINO” (constant) string thereto. This is the content to be inserted into the tag, encrypted using the previously generated AppKey.

    [0087] The backend system returns the AppMasterKey, the AppKey and the encrypted message to the application, and the application (in three different steps) must: [0088] write the AppMasterKey in the tag and log out; [0089] log in using the AppMasterKey and save the AppKey in the tag (for all the spaces provided in the memory of the microcircuit), and then log out; [0090] log in using AppKey and write the encrypted message.

    [0091] A second possible initialization method involves assigning the MINIGUID and pairing the GUID.

    [0092] In step 200, the identification tag integrated in the item to be traced is labelled by a unique code, UID, consisting of a non-modifiable and proprietary part of the tag, the identifier TID, and a second part containing a code MINIGUID uniquely paired with the identification tag. During the initialization step, the identifier TID and the code MINIGUID are read by a unique code of the item, or serial code, GUID, which represents its guarantee of authenticity. The MINIGUID is written on the tag, for example by means of an RFID or NFC writing system if the tag is provided with an active/passive electronic microcircuit that is readable using one of the aforementioned protocols, and the tag is subsequently locked by means of a randomly generated access password or by irreversibly configuring the write lock parameters, thus preventing the tag from being reprogrammed.

    [0093] The identifier TID of the tag is read by an RFID/NFC reader device and sent to the remote processing system S in order to verify the presence of the tag data. If this is the case, the remote system S responds by communicating the code MINIGUID to be programmed inside the identification tag. Using an optical reader, a local system reads the URL contained in a QR code from said QR code, extracting therefrom a previously printed code GUID. The extracted code and the identifier TID are sent to the remote system S which uniquely pairs them. The code MINIGUID of the tag is not used by the remote processing system S for the functionalities offered to a user, but may be used for counterchecking if there are disputes over the authenticity of the item associated with the tag.

    [0094] At the end of the initialization method, there are the following elements: [0095] identification tag comprising unique code UID composed of the tag identifier TID and the unique code MINIGUID; [0096] an optical or NFC reading element which represents a URL containing the unique code of the tag GUID; and [0097] an entry in the database DB maintained by the remote processing system S that associates the unique code of the tag GUID and the code MINGUID with the identifier TID.

    [0098] Step 300 includes physically applying the previously prepared tag to the item and, by means of a computer system, the unique code of the tag is linked to the unique code of the item to be traced.

    [0099] In step 400, the item thus identified and connected to the relative tag is generated in digital format on blockchain (token) with a further unique, non-modifiable identification code of the relative digital identity. Additional process information may be linked to this digital identity. The token contains any other serial codes of the components of the item, thus becoming a digital twin of the physical item in question.

    [0100] In step 500, the item recorded in blockchain is automatically paired to the manufacturer of the physical item, who holds initial ownership thereof.

    [0101] In step 600, the item passing through a portal for reading the identification tag at radiofrequency is detected by means of the emission of an excitation and reading carrier wave by the detectors SS associated with the portal, respectively a UHF carrier wave in the case of reading an RFID tag or an HF carrier wave in the case of reading an NFC tag. In the preferred embodiment in which the identification tag T is provided with both RFID and NFC microcircuits, the transit of the item may alternatively be detected at a long range (according to RFID technology) or at a short range (according to the NFC protocol), and in the latter case detection may take place using the double technology combining RFID and NFC, thereby guaranteeing double verification of the tag identifier and therefore a higher level of security. When passing through the electromagnetic field generated by the detectors SS, the tag is activated by transmitting its unique identification code, UID. Alternatively, it is possible to optically read the tag; if said tag is a passive tag without a microcircuit and is exposed outside the item, the detectors SS emit a beam of light to illuminate the code printed on the item which will then be read optically.

    [0102] The detectors SS transmit the data regarding the presence of the detected tag to the centralized reading system CR which decodes the data, thereby making said data usable for subsequent processing. These data are encapsulated in a packet that contains the unique identifier of the centralized reading system CR. The data packet is in turn signed to allow the recipient to guarantee its origin and integrity.

    [0103] The geolocation system GPS is adapted to detect the position of the portal and to prepare a data packet also containing the data of the devices used for localization, such as the visible GPS/GNSS/Galileo satellites or the GSM/5G radio links used for triangulation. The data packet formed in this way is signed to guarantee its origin and integrity.

    [0104] The local processing unit R receives the data packet signed by the centralized reading system CR and by the geolocation system GPS, verifies its origin and integrity and, if these checks are positive, extracts the unique identification code, UID, of the tag and the position data, packing them together and signing the data packet thus obtained with its own certificate of origin. The data thus formed may follow two channels: [0105] said data may be transmitted to the remote processing system S, which verifies its origin and integrity, extracts the relevant data therefrom and publishes said data on the blockchain; [0106] said data may be published directly in blockchain by using a dedicated derived smart-contract.

    [0107] The step 700 of recording a transfer of ownership may take place subsequently, at any time which is not related to the time of the previous steps being carried out but is triggered by the event of ownership of the item being transferred.

    [0108] When the item is purchased by a customer, both the product and the token associated therewith are sent to the customer. From that moment on, the customer has full control over the token and is the only owner able to make changes. In particular, the customer may at any time update the position of the product, disable or enable the transfer of the digital twin or transfer it to third parties, preferably without being previously authorized and without the need to use intermediaries.

    [0109] During the life cycle of the product, it is possible, as identified in step 800, to add the steps of the supply chain, i.e. the manufacturing processes or the addition of information, in blockchain. A movement is added to the history of the item by means of a specific function of the smart-contract. Each movement requires that the geolocation of the event and its time stamp are recorded. The information is made available in private or public form as appropriate, and may be accessed via blockchain.

    [0110] Finally, the operation of verifying the authenticity of the item in step 900 takes place by means of various possible geolocation operations, by comparing against API and by reading in blockchain.

    [0111] A verification operation may be performed through the user interface computer environment even without authentication, by a caller (subject interested in the verification), for example by framing the printed barcode paired with the tag. By means of the read code, the application associated with the interface computer environment verifies if the code is present in the database DB of the remote processing system, if the code is paired with a token identifier, if the token identifier exists, to whom it belongs and where it is geolocated (place). A suitable message warns the caller of the status of the product paired with the read serial code. In the event of an anomaly (the code exists but has not yet been put on sale or the code has been deactivated in advance, or the item was scanned in a place different from where the item should be), a report will be sent to the owner of the item in addition to the message. The application associated with the interface computer environment also verifies that the identification codes of the identification tag associated with the read code correspond in the archives of the entity that owns the authentication and certification system and in the distributed register.

    [0112] In the currently preferred embodiment in which the identification tag comprises an RFID microcircuit and an NFC microcircuit, the authenticity of the tag is verified as follows: [0113] the serial code of the tag is read and sent to the backend system, asking for the AppKey in return to access the private content of the memory. An AUTH KEY is used, which is to be inserted into the headers of the call, in order to ensure that only the devices/app of the certifying entity may receive the AppKey in return; [0114] the backend system checks the validity of the AUTH KEY and searches for the serial code in the database, and then returns the AppKey; [0115] the microcircuit is interrogated again by the frontend system with a request for the private content, and this is sent to the backend system, asking for the validity of this content; [0116] the backend system decrypts the content and verifies that the result is equal to the serial code+“GENUINO” and returns “true” or “false” to the frontend system; [0117] the frontend system shows on the application that the tag is authentic or not, depending on the “true” or “false” indication received.

    [0118] Subsequently, using this information, it is verified whether a token in blockchain is associated with this tag, whether the token is marked as valid or not, whether the token is marked as “match worn” or “match prepared,” and this information is communicated to the final user.

    [0119] Specifically, the verification of authenticity by means of geolocation is based on the verification of correspondence between the caller's longitude and latitude (obtained from the application of the caller's mobile device, possibly by consulting the existing databases of the identification codes of the issuing stations, for example the identifiers of the satellites in the case of the GPS/GNSS/Galileo localization system or GSM/5G radio stations in the case of the terrestrial localization system) and the current longitude and latitude of the item being verified (reading the data from the blockchain).

    [0120] The verification of the ownership of the item is based instead on the use of the blockchain. For example, the current owner of the item may be verified by the owner themselves by verifying the presence of the item in their digital wallet, or by a so-called caller comparing the current owner of the item with the owner reported by the caller, through an exchange of encrypted messages by two digital wallets, i.e. a message request for confirmation of possession issued by the caller's digital wallet that requires verification and an expression of confirmation to the digital wallet that owns the item.

    [0121] In this step, it is possible to remotely verify who is the owner of an item by reading the barcode associated with the item even if presented in digital format (image reproduced electronically). In this case, the interface application sends a message to the owner of the item asking him to send a signed message via blockchain to the requester. The owner of the item identified through a link contained in the read code may, through the application, report a violation or confirm ownership of the item by sending the requested signed message. The requester receives the ownership confirmation message or, otherwise, an anomaly message.

    [0122] It should be noted that the embodiment proposed for this invention in the foregoing discussion is purely a non-limiting example of this invention. A person skilled in the art will easily be able to implement this invention in different embodiments which do not however depart from the principles set forth herein and are therefore encompassed in this patent.

    [0123] This is particularly true with regard to the possibility of applying this invention to the authentication and certification of items other than items of sportswear, for example to other types of clothing, to collectible items or to luxury goods.

    [0124] Naturally, without prejudice to the principle of the invention, the embodiments and the details of execution may vary widely with respect to that which has been described and illustrated purely by way of non-limiting example, without thereby departing from the scope of protection of the invention defined by the appended claims.