METHOD IMPLEMENTED IN COMPUTER PROGRAM FOR VERIFICATION OF CONFORMITY AND/OR AUTHENTICITY OF AN ARTICLE
20220343337 · 2022-10-27
Inventors
Cpc classification
G06K19/06093
PHYSICS
International classification
Abstract
A method implemented in a computer program for verifying the conformity and/or authenticity of an article is described, which comprises assigning a pair of random codes (C1) and (C2) to a given article (A), and the linkage of the codes to the article is stored in a database (BD1) accessed through an application and one of the codes being illegible only with the violation of the primary packaging (Pp), so that the verification of authenticity or conformity of the article (A) is obtained when the validity of the codes and the association of the pair of codes are verified. Through this basic functionality, it is possible to assign an article to an entity (E), without the risk of duplication; to control the number of times an article is reused, in accordance with legal and safety standards and to prevent reprocessing of the product, when necessary.
Claims
1. Method implemented in a computer program to verify the conformity and/or authenticity of an article characterized by comprising: a) generating random codes (C1) and (C2) using an algorithm; b) assigning a pair of distinct random codes (C1 and C2) to an article (A); c) linking codes C1 and C2 and article (A), in one-to-one correspondence, in a BD1 database accessed remotely through the world wide web; d) inserting the first code (C1) inside the primary packaging (Pp) that houses the item (A) and kept inaccessible to human vision or to reading by a reader device; e) second code (C2) kept apparent on the outside of the final packaging of the article (A); f) pair of codes (C1) and (C2) linked to an article (A) is entered in an application; g) if the pair of codes C1 and C2 is valid and the linkage is verified in the BD1 database, a message is returned in the application interface informing the compliance or authenticity status of the article (A); h) if pair of codes is not valid and/or if the linkage of codes C1 and C2 is not verified in the BD1 database, an error message is returned.
2. Method according to claim 1, characterized in that a first code (C1) is generated by means of a proprietary computer program and a second code (C2) is generated by means of a commercial computer program.
3. Method according to claim 1, characterized in that the first code (C1) is printed/written on an avatar (B).
4. Method according to claim 3, characterized in that (B) is covered with scratchable paint.
5. Method according to claim 1, characterized in that the first code (C1) is printed/engraved on the surface of the article (A)).
6. Method according to claim 1, characterized in that the second code (C2) is printed/engraved on an avatar (B).
7. Method, according to claim 1, characterized in that more than one first code (C1) arranged inside a primary packaging (Pp) is linked to a second code C2 that contains a linked attribute that allows controlling the primary codes C1 linked to C2.
8. Method, according to claim 1, characterized in that any of the codes C1 or C2 has linked attributes verified by the computer program at the time of linkage analysis.
9. Method implemented in a computer program to verify the conformity and/or authenticity of an article characterized by comprising: a) generating a primary random code (C1); b) assigning code C1 to an article (A) and registration in database BD1; c) inserting the first code (C1) inside the primary packaging (Pp) that houses the item (A) and kept inaccessible to human vision or to reading by a reader device; d) primary code (C1) linked to an article (A) is entered in an application; e) if code C1 is valid, after verifying the database (BD1), a message is returned in the application interface informing the compliance or authenticity status of the article (A); f) if code C1 is not valid, after verifying the database (BD1), an error message is returned.
10. Method according to claim 1, characterized by comprising: a) pair of valid and associated codes C1 and C2 in base BD1 are linked to an entity (E); b) a linkage record (Rvinc) stored in a database associated with the database (BD1) is generated.
11. Method, according to claim 10, characterized in that the record of linkage (Rvinc) to an entity (E) requires additional data information in specific articles (A) previously indicated in the database (BD1).
12. Method, according to claim 9, characterized in that the primary code (C1) presents a control field defining a limit number of linkages, allowing the assignment to n entities (En) until reaching the maximum limit of linkages allowed on the platform.
13. Method, according to claim 1, characterized in that the primary code (C1) presents a control field defining a limit number of linkages, allowing the assignment to n entities (En) until reaching the maximum limit of linkages allowed on the platform.
Description
BRIEF DESCRIPTION OF THE FIGURES
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
DETAILED DESCRIPTION OF THE INVENTION
[0033] The method implemented in a computer program to verify the conformity and/or authenticity of an article, object of this patent of invention, comprises the assignment of a pair of different random codes (C1 and C2) to an article (A), said primary (C1) and secondary (C2) codes linked to each other and to the article (A), in one-to-one correspondence, in a database (BD1) accessed remotely through the world wide web through a mobile device or desktop equipped of an application, as shown in
[0034] The random codes (C1) and (C2) are generated through an algorithm, and comprise a standardized data structure in numerical, alpha-numeric, two-dimensional form (barcode, QRCode), among others.
[0035] Optionally, a first code (C1) is generated using a proprietary computer program and a second code (C2) is generated using a commercial computer program, such as the unique encodings for identifying commercial items displayed on the product and/or product packaging, in a place visible to the user, which can be in the form of a barcode (EAN-13 codes), EAN/UPC barcodes, GS1 DataBar barcodes, QRCode, among others.
[0036] The first code (C1) is kept inaccessible to human vision or reading by a reader device, being readable only when there is violation of the primary packaging (Pp) that holds the article (A).
[0037] Optionally, the first code (C1) is printed/engraved onto an avatar (B) (such as a QR Code, barcode, or similar).
[0038] Optionally, the avatar (B) is coated with scratchable paint, requiring the removal of the coating to read the data structure.
[0039] Optionally, the first code (C1) is printed/engraved on the surface of the article (A).
[0040] The second code (C2) is kept apparent on the outside of the final packaging of the article (A), just like the conventional codes used in the tracking and logistics operations of commercial items.
[0041] Optionally, the second code (C2) is printed/engraved on an avatar (B) (such as a QR Code, barcode, or similar).
[0042] If the packaging (Pp) contains more than one item (A), each item (A) receives a first code (C1) in turn linked to a second code (C2) arranged on the external face of the packaging. In this situation, the secondary code C2 contains a linked attribute that allows to control the number of primary codes (C1) linked to secondary codes (C2).
[0043] The final packaging of the item (A) is the packaging that will be used for the shipment of the item (A), which may be the primary packaging (Pp) or a secondary packaging that holds the primary packaging (Pp).
[0044] The user who receives the article (A) accesses an application installed on a mobile device or stored in the cloud and informs the pair of codes (C1) and (C2). The secondary code (C2) is readable on the external face of the final packaging and the first code is readable upon violation of the primary packaging (Pp) of the article (A).
[0045] By “inform” is meant typing in a specific field of the application's graphical interface and/or reading the data structure through a reader device.
[0046] The pair of codes (C1) and (C2) informed in the application is analyzed based on the execution of an instruction stored in the computer program installed in a processor. If the pair of codes (C1) and (C2) is valid and the linkage in the database (BD1) is verified, a message is returned in the application interface informing the compliance or authenticity status of the article (A). If the linkage of the primary (C1) and secondary (C2) codes is not verified and/or the linkage of the codes (C1) and (C2) is not verified, an error message is returned.
[0047] Attributes can be linked to any of the primary (C1) or secondary (C2) codes, these attributes can be verified by the computer program at the time of linkage analysis, and the verification can be interrupted when an attribute does not comply with instructions previously stored in the computer program. For example, if an attribute is “expiration date”, the linkage operation is suspended if the computer program finds that the attribute's date is less than the reading date.
[0048] This first computerized module is particularly useful for indicating to a user the authenticity of an article (A), preventing piracy and ensuring security.
[0049] Alternatively, as shown in
[0050] The primary random code (C1) is kept inaccessible to human vision or reading by a reader device, being readable only with violation of the primary packaging (Pp) that holds the article (A).
[0051] The user receiving the article (A) accesses an application installed on an electronic device (such as a mobile phone, tablet, computer, laptop) and informs the application of the primary random code (C1) obtained by violating the primary packaging (Pp) of the article (A). The computer program verifies the validity of the primary code (C1), from a database verification (BD1), and returns an authenticity confirmation message. If the primary code (C1) is not valid, after verifying the database (BD1), an error message is returned.
[0052] A second computerized module associated with the first computerized module allows, from the verification of conformity or authenticity of an article (A), the article (A) to be associated with an entity (E), without the risk of duplication.
[0053] For example, in the case of assigning an article (A) to an entity (E) (in this case, a patient), a user registered in the application informs, in a specific field of the graphic interface, the codes (C1) and (C2) linked to the article (A). To obtain code C1, the user must necessarily open the primary packaging (Pp) for reading.
[0054] The codes (C1) and (C2) linked to an article (A) are informed in the application interface and compared by the computer program with the codes stored in the database (BD1) from the execution of a stored instruction in the computer program. When the pair of codes (C1) and (C2) is valid and is associated in the base (BD1), the codes (C1) and (C2) are linked to an entity (E).
[0055] If one of the attributes of the codes (C1) or (C2) presents nonconformities registered in the respective database (BD1), at the time of linkage of the article (A) to an entity (E), the computer program generates a alert. Examples of this occurrence are related to non-conformity of the batch or expiration date. In this situation, the user responsible for registration is prevented from continuing the operation.
[0056] If the item (A) is assigned to an entity (E), a linkage record (Rvinc) is generated, stored in a database associated with the BD1 database, as shown in
[0057] “n” articles (A) can be associated to an entity (E).
[0058] The attempt to associate an article (A) to a second entity (E2) is prevented based on the record of linkages (Rvinc), and the continuity of the operation is prevented. In this situation, a non-assignment alert message may be returned.
[0059] Optionally, a linkage record (Rvinc) to an entity (E) may require additional data information in specific articles (A) previously indicated in the database (BD1). For example, if the article (A) is implementable, the record of linkage (Rvinc) to an entity (E) is only closed with the record of the status of the article (A) implemented, opened or discarded.
[0060] Optionally, databases (DB) and their linkages are registered in Blockchain, allowing for traceability and inability to change.
[0061] Patient-related information is encrypted to maintain confidentiality.
[0062] The platform (P) allows the generation of management reports, making it possible to obtain information about articles assigned to a given patient, allowing data to be audited and preventing fraud and reuse of articles.
[0063] In case articles (A) are reusable, the number of uses can be controlled. In this situation, article (A) receives a code C1 with a control field defining a limit number of linkages. In this way, article A can be assigned to n entities (En) until reaching the maximum limit of linkages allowed on the platform, as shown in
[0064] Optionally, a commercial adhesive code can be linked to article (A) only in the first reprocessing cycle.