A System to Authenticate a Product and a Method Thereof

20230083338 · 2023-03-16

    Inventors

    Cpc classification

    International classification

    Abstract

    The present disclosure envisages the field of authenticate a product. A system (100) to authenticate a product comprises a user device (102), a sensing module (104), a reference capturing module (106), a recognition module (108) and a redirection module 110). The user device (102) is configured to scan a visual of a product. The sensing module (104) is configured to receive and sense presence of a unique code in the visual. The reference capturing module (106) is configured to capture, process and generate an ID part one and an ID part two from the received visual. The recognition module (108) located on a remote server (118) processes the ID part one and ID part two to recognize and fetch a validation system credential. The redirection module (110) is configured receive the ID part one and the validation system credential to access a validation system to authenticate the ID part one.

    Claims

    1. A system (100) to authenticate a product, said system (100) comprising: a user device (102) configured to scan a visual of a product; a sensing module (104) configured to receive said visual and further configured to sense presence of a unique code in said visual; a reference capturing module (106) configured to cooperate with said sensing module (104) to capture said sensed unique code along with said visual, and further configured to process and generate an ID part one and an ID part two from said visual; a recognition module (108) located on a remote server (118) communicatively coupled to said reference capturing module (106), said recognition module (108) comprising: a processing module (112) configured to cooperate with said reference capturing module (106) to receive said ID part one and ID part two and further configured to process a plurality of parts present in said ID part one and said ID part two; a repository (114) configured to store a first look up table having a list of a plurality of image recognition and machine learning rules and a second look up table to store a list of a plurality of authentication system credential; and a crawler and extractor (116) configured to receive a first signal from said processing module (112) to crawl through the first look up table and extract said image recognition and machine learning rules to identify said ID part two and further configured to receive a second signal from said processing module (112) to crawl through the second look up table and extract said authentication system credential corresponding to said identified ID part two; and a redirection module (110) communicatively coupled to said server (118), said redirection module (110) is configured to cooperate with said recognition module (108) to receive said ID part one along with said authentication system credential, and further configured to access an authentication system using said authentication system credential to authenticate said ID part one.

    2. The system (100) as claimed in claim 1, said reference capturing module (106) configured to extract said sensed unique code as ID part one and remaining said visual as ID part two from said visual.

    3. The system (100) as claimed in claim 1, said recognition module (108) is configured to use machine learning techniques and image recognition techniques to process said ID part one and ID part two.

    4. The system (100) as claimed in claim 1, said authentication system credential includes at least one of website address and application link.

    5. The system (100) as claimed in claim 1, said redirection module (110) configured to force open an authentication interface on the user device (102) using said received authentication system credential to authenticate said ID part one.

    6. A method (200) for authenticating a product, said method comprising the following steps: scanning (202), by a user device (102), at least one visual of a product; receiving (204), a sensing module (104), the said visual; sensing (206), by said sensing module (104), a unique code in said visual; capturing (208), by a reference capturing module (106), said visual along said unique code; processing (210), by said reference capturing module (106), said unique code and said visual; generating (212), by said reference capturing module (106), an ID part one and an ID part two using said processed parts; receiving (214), by a processing module (112) in a recognition module (108), said ID part one and ID part two; processing (216), by said processing module (112) in said recognition module (108), said ID part two to identify a corresponding authentication system credential; receiving (218), by a redirection module (110), said ID part one and said authentication system credential; and accessing (220), by said redirection module (110), an authentication system using said authentication system credential to authenticate said ID part one.

    7. The method as claimed in claim 6, wherein the steps of receiving (214) and processing (216), by said recognition module (108) are performed on said server (118).

    Description

    BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWING

    [0027] A system to authenticate a product and a method thereof, of the present disclosure will now be described with the help of the accompanying drawing, in which:

    [0028] FIG. 1 illustrates a block diagram of the system to authenticate a product, in accordance with an embodiment of the present disclosure; and

    [0029] FIGS. 2a and 2b illustrate a flow diagram depicting a method to authenticate a product, in accordance with an embodiment of the present disclosure.

    [0030]

    TABLE-US-00001 LIST OF REFERENCE NUMERALS 100 system 102 user device 104 sensing module 106 reference capturing module 108 recognition module 110 redirection module 112 processing module 114 repository 116 crawler and extractor 118 remote server

    DETAILED DESCRIPTION

    [0031] Embodiments, of the present disclosure, will now be described with reference to the accompanying drawing.

    [0032] Embodiments are provided so as to thoroughly and fully convey the scope of the present disclosure to the person skilled in the art. Numerous details, are set forth, relating to specific components, and methods, to provide a complete understanding of embodiments of the present disclosure. It will be apparent to the person skilled in the art that the details provided in the embodiments should not be construed to limit the scope of the present disclosure. In some embodiments, well-known processes, well-known apparatus structures, and well-known techniques are not described in detail.

    [0033] The terminology used, in the present disclosure, is only for the purpose of explaining a particular embodiment and such terminology shall not be considered to limit the scope of the present disclosure. As used in the present disclosure, the forms “a,” “an,” and “the” may be intended to include the plural forms as well, unless the context clearly suggests otherwise. The terms “comprises,” “comprising,” “including,” and “having,” are open ended transitional phrases and therefore specify the presence of stated features, integers, steps, operations, elements, modules, units and/or components, but do not forbid the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The particular order of steps disclosed in the method and process of the present disclosure is not to be construed as necessarily requiring their performance as described or illustrated. It is also to be understood that additional or alternative steps may be employed.

    [0034] Conventional system and method the counterfeiter could create a completely parallel system for authentication to easily mislead the consumer can to a counterfeit portal. To overcome this problem, a system (hereinafter referred to as “system (100”)) and method (hereinafter referred to as “method (200)) to authenticate a product of the present disclosure, is described with reference to FIG. 1, FIG. 2a and FIG. 2b.

    [0035] Referring to FIG. 1, the system (100) comprises, a user device (102), a sensing module (104), a reference capturing module (106), a recognition module (108) and a redirection module (110). The user device (102) is configured to scan a visual of a product.

    [0036] In an embodiment, the user device (102) may be selected from the group consisting of, but is not limited to, a mobile phone, a smartphone, an iPad, a tablet, a palmtop, code scanning cameras, smart watch and code scanning equipment.

    [0037] The sensing module (104) is configured to receive the visual and further configured to sense presence of a unique code in the visual.

    [0038] In an embodiment, the unique code can be a selected from the group consisting of, but is not limited to a QR code, a watermark, a texture, a barcode, an invisible UV image, and a randomly generated numbers or a combination thereof. In another embodiment, the unique code can be overt or covert. In another embodiment, the unique code can be over the surface of the product or hidden under a removable layer on the surface of the product.

    [0039] The reference capturing module (106) configured to cooperate with the sensing module (104) to receive the sensed unique code along with the visual, and further configured to process and generate an ID part one and an ID part two from the visual.

    [0040] In an embodiment, the reference capturing module (106) can be further configured to scan from a group of a visible image, an invisible image, a visible unique code or an invisible unique code or a combination thereof.

    [0041] In another embodiment, the reference capturing module (106) is further configured to extract the sensed unique code as ID part one and remaining the visual as ID part two from the visual.

    [0042] The recognition module (108) located on a remote server (118) communicatively coupled to the reference capturing module (106), the recognition module (108) is comprising a processing module (112), a repository (114) and a crawler and extractor (116).

    [0043] In an embodiment, the recognition module (108) is configured to use machine learning techniques and image recognition techniques to process the ID part one and ID part two.

    [0044] The processing module (112) configured to cooperate with the reference capturing module (106) to receive the ID part one and ID part two and further configured to process a plurality of parts present in the ID part one and the ID part two.

    [0045] The repository (114) configured to store a first look up table having a list of a plurality of image recognition and machine learning rules and a second look up table to store a list of a plurality of authentication system credential.

    [0046] In an embodiment, the authentication system credential includes at least one of website address and application link.

    [0047] In another embodiment, the authentication system credential can be sourced directly from an authentication authority of the product by know your customer documentations.

    [0048] The crawler and extractor (116) configured to receive a first signal from the processing module (112) to crawl through the first look up table and extract the image recognition and machine learning rules to identify the ID part two and further configured to receive a second signal from the processing module (112) to crawl through the second look up table and extract the authentication system credential corresponding to the identified ID part two.

    [0049] The redirection module (110) communicatively coupled to the server (118), the redirection module (110) is configured to cooperate with the recognition module (108) to receive the ID part one along with the authentication system credential, and further configured to access an authentication system using the authentication system credential to authenticate the ID part one.

    [0050] In an embodiment, the redirection module (110) is configured to force open an authentication interface on the user device (102) using the received authentication system credential to authenticate the ID part one.

    [0051] FIGS. 2a and 2b illustrate a flow diagram of the method (200) for authenticating a product. The method comprising the following steps: [0052] At Step 202: scanning, by a user device (102), at least one visual of a product; [0053] At Step 204: receiving, a sensing module (104), the visual; [0054] At Step 206: sensing, by the sensing module (104), a unique code in the visual; [0055] At Step 208: capturing, by a reference capturing module (106), the visual along the unique code; [0056] At Step 210: processing, by the reference capturing module (106), the unique code and the visual; [0057] At Step 212: generating, by the reference capturing module (106), an ID part one and an ID part two using the processed parts; [0058] At Step 214: receiving, by a processing module (112) in a recognition module (108), the ID part one and the ID part two; [0059] At Step 216: processing, by the processing module (112) in the recognition module (108), the ID part two to identify a corresponding authentication system credential; [0060] At Step 218: receiving, by a redirection module (110), the ID part one and the authentication system credential; and [0061] At Step 220: accessing, by the redirection module (110), an authentication system using the authentication system credential to authenticate the ID part one.

    [0062] In an embodiment, the steps of receiving (214) and processing (216), by the recognition module (108) are performed on the remote server (118).

    [0063] In an embodiment, the authentication system validates the ID part one and display status of authenticity associated with the product on the user device (102) in further steps.

    Technical Advancements

    [0064] The present disclosure described herein above has several technical advantages including, but not limited to, system to authenticate a product and a method thereof, which: [0065] creates a streamlined and automated verification of a product. [0066] authenticate a product and a method thereof that is reliable. [0067] avoid errors in accessing the genuine websites and/or systems for verification and authentication. [0068] prevents redirection to fake parallel verification portals and/or systems. [0069] identifies a counterfeit product. [0070] is easily accessible.

    [0071] The foregoing disclosure has been described with reference to the accompanying embodiments which do not limit the scope and ambit of the disclosure. The description provided is purely by way of example and illustration.

    [0072] The embodiments herein and the various features and advantageous details thereof are explained with reference to the non-limiting embodiments in the following description.

    [0073] Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.

    [0074] The foregoing description of the specific embodiments so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.

    [0075] The use of the expression “at least” or “at least one” suggests the use of one or more elements or ingredients or quantities, as the use may be in the embodiment of the disclosure to achieve one or more of the desired objects or results.

    [0076] Any discussion of documents, acts, materials, devices, articles or the like that has been included in this specification is solely for the purpose of providing a context for the disclosure. It is not to be taken as an admission that any or all of these matters form a part of the prior art base or were common general knowledge in the field relevant to the disclosure as it existed anywhere before the priority date of this application.

    [0077] While considerable emphasis has been placed herein on the components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.