A method for verifying the authenticity of an article
Technical Field The invention relates to a method for verifying the authenticity of an article according to the preamble of claim 1.
Background Art
EP 967 459 describes a system for verifying ownership of articles where a unique article number is affixed to each article. In addition to this, a certificate carrying a certification number is provided for each article. For verifying ownership of an article, both numbers are transferred to a database where they are checked. However, this method requires the delivery of certificates, which, in many applications, requires further logistic and administrative efforts.
Disclosure of Invention
Hence, the problem to be solved by the present invention is to provide a method of this type where authenticity of articles can be verified reliably and with small logistic and administrative overhead.
This problem is solved by the method of claim 1. Accordingly, an individual article number is affixed to each article and an individual container number is af- fixed to each container. Each container contains at least one article, preferably a plurality of articles.
For checking the authenticity of an article, the article number as well as the number of the container it was located in is transferred through a communication network to a central database. This database contains the article numbers of all registered articles as well as the container number for each article and can therefore be
used for a redundant check of the received article number and container number .
Preferably, the article and corresponding container number cannot be derived from each other in ob- vious manner. In other words, even after inspecting a plurality of containers and articles placed therein, a third party will be unable to generate article numbers for a given container number or vice versa. For this purpose, at least one or both types of numbers can be cre- ated using random or pseudo-random algorithms, or they can be linked by cryptographic algorithms with sufficient security.
The method is iterative, the container or containers can be placed in "super-containers" having su- per-container numbers affixed thereto, and the database can store the corresponding hierarchy of numbers. When opening a super-container, its authenticity as well as the authenticity of the containers it holds can be checked by submitting a super-container number and a con- tainer number to the database.
Brief Description of Drawings The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings, wherein:
Fig. 1 shows articles, containers and super- containers carrying identification numbers and
Fig. 2 is a possible supply chain.
Best Mode for Carrying out the Invention The basic principle of the invention is shown in Fig. 1. Here, a plurality of articles 1 is to be packaged and shipped. For this purpose, each article 1 is
packaged in an individual package and a label 2 carrying a unique article number 3 is attached to each package. The article number may be any numeric or alpha-numeric string of suitable length. It may be encoded as bar code (as shown) and/or in human readable digits or letters or in any other type of marking technique.
A plurality of articles are packaged in a common container 4. In the present embodiment, each container 4 holds three articles. However, this number may vary widely depending on the nature of the article and its distribution chain.
Each container is provided with a unique container number 5, which is e.g. again printed on a suitable label 6. Again, the container number may be any nu- meric or alpha-numeric string of suitable length and it can be encoded using any suited marking technique.
As mentioned above, this process can be iterated by placing a plurality of containers 4 in a common super-container 7, which can again be marked with a label 8 carrying a unique super-container number 9, etc.
Preferably and for reasons that will become clearer as this description proceeds, the labels are designed as seals that must be broken for accessing the in- sides of a package, container or supercontainer . The articles packaged in this way can be any type of articles where authentication may be required. In particular, they might be brand articles where falsification may appear attractive, such as cigarettes, perfumes, fashion wear, etc. Fig. 2 shows how the articles are distributed and how their authenticity is verified.
In a first step, a manufacturer 10 packages the articles 1 and places them in containers 4 and super- containers 7 in the manner explained above. Whenever an item is placed in a next larger container, its number is scanned, e.g. by a suitable scanner device, and it is recorded together with the number of the container. The
corresponding information in then sent to a secure database 11. In this way, database 11 can maintain a list of all article numbers 3 and, for each article, the number 5 of the container 4 it has been placed in. Similarly, it can maintain a list of all container numbers 5 and the numbers 9 the super-containers 7 they are placed in.
The numbers and corresponding items recorded in the database 11 are in the following called "registered numbers" and "registered items". Instead of reading the individual numbers before placing the items in their containers, the corresponding labels may e.g. manufactured and attached in a controlled manner such that the information of what article numbers are in which container is known without need to scan the numbers .
The manufacturer 10 will usually ship the largest type of container (the above "super-container" 7) to distributors 12. Upon receipt of a super-container 7, the distributor 12 should first check if the label 8 has been broken. If yes, he must assume that the super- container was opened and that the container-numbers 5 inside it may have been read by an unauthorised third party. If this is the case, he should alert database 11 or manufacturer 10 (who will in his turn alert database 11) . Database 11, which will mark the corresponding super-container number and container-numbers as insecure and possibly known (in their combination) to a third party.
If the label 8 is not broken, distributor 12 accepts the super-container 7. He opens it and verifies its authenticity as follows:
- For verifying the authenticity of the super-container 7, he may read or scan the super-container number 9 and the container number 5 of any container 4 inside it. He sends this pair of numbers to database 11, where it is checked if the container number 5 corresponds to a registered container number. If yes, it is further
checked if the super-container number 9 corresponds to the super-container 7 that was registered for the given container number 5. If these conditions are fulfilled, database 11 affirms the authenticity of the number pair and therefore the authenticity of the super-container 7.
- For an even more thorough authentication, the distributor 12 can send all container numbers 5 in the super-container to database 11, which then runs the same check for each container. In a next step, distributor 12 will sell the
(unopened) containers 4 to retailers 13. Upon receipt of a container 4, a retailer can take similar steps for verifying it as the distributor 12. He first checks if the label 6 is broken and alerts distributor 12, manufac- turer 10 and/or database 11 if this is the case. If not, he opens container 4. He can then check the authenticity of the delivery by sending container number 5 together with at least one article number 3 to database 11 for verification. Finally, retailer 13 will sell the individual articles 1 to end users 14. If an end user 14 wants proof of the authenticity of an article, he can either query database 11 using the article number (which may then e.g. confirm that the article is a registered article) or, de- pending on the nature of the article to be sold, he can even request retailer 13 to provide the container number for the given article and send both these numbers to the database for verification in the manner described above. In addition to the above, the authenticity of containers 4 or super-containers 7 can be checked at any time, e.g. by custom authorities, by taking a sample, e.g. of a container 4, opening the same, and sending the container number 5 as well as an article number 2 of an article 1 inside it, to the database 11. As it becomes clear from the above, the present system allows a verification of authenticity using two numbers and not only one, which inherently increases
the reliability of the method. Furthermore, the system is immune to most attacks. For instance, in order to manufacture unauthorized articles, a fraudulent party would have to know not only individual article numbers 3 but also the corresponding container numbers 5. This would make it necessary to open containers to get access to the items inside, which would be detected in a next step of the distribution chain.
In the above example, the number 3, 5 or 9 , respectively, is printed on a label 2, 6 or 8 , which is then fixed to the article's package, a container or a super-container. Generally, the number can e.g. be affixed to the article (container, super-container) by physically attaching the it thereto (e.g. by printing or engraving it on the same or by attaching a label with the number to the item) . The number can also placed as a slip or certificate into the package of the article, the container or the super-container, respectively. It is preferred, however, to place the number on the outside of the item is belongs to such that it can be inspected without opening the item.
The system described here allows not only to verify the authenticity of the various items, but it allows also to track the items in the distribution chain, as each verification request can be recorded in database 11, together with information identifying the requester. A precise analysis of the flow of items becomes possible. For example, the target market of each product can be determined easily, which can be of interest in case a batch of articles has to be called back to the manufacturer for repairs. The system also allows to detect and monitor gray market activities.
The communication between database 11 and any parties checking authenticity of items can be carried out by means of any communication network, e.g. by phone or by Internet.
As mentioned above, the present system allows to monitor articles, containers, super-containers and even larger container entities in hierarchic manner. The following claims use the terms "article" and "container" to express one arbitrary step in this hierarchy.