Abstract: ABSTRACT “A MULTI LAYERED SECURITY MARK FOR PRODUCT AUTHENTICATION” The present invention provides a multi layered security mark (100) comprises of a plurality of layers are fabricated over said substrate (101). The plurality of layers includes a signature layer (102) and a dynamic layer (103). The signature layer (102) is formed by superimposition of a customer signature layer (102a) and a noise signature layer (102b). The customer signature layer (102a) includes an artwork image having a customer-specific data and the noise signature layer (102b) includes an artwork image having a plurality of random dot noise patterns. The dynamic layer (103) having machine-readable code is printed on a top portion of the signature layer (102) and provides a method for authentication of the multi layered security mark by the consumer and by the inspector. Further, the present invention also provides the dedicated device (400) for authenticating the multi layered security mark (100). Figure 1 on sheet no. 1 of the drawings may accompany the abstract when published.
Description:FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
[See Section 10 and Rule 13]
TITLE:
“A MULTI LAYERED DIGITAL SECURITY MARK FOR PRODUCT AUTHENTICATION”
APPLICANT:
MANIPAL TECHNOLOGIES LIMITED
A company incorporated under Indian Companies Act, 1956,
having address at
Press Corner, Manipal-576104,
Karnataka, India
PREAMBLE TO THE DESCRIPTION:
The following specification particularly describes the invention and the manner in which it is to be performed:
FIELD OF THE INVENTION
The present invention relates to the field of security mark for product authentication. More particularly, the present invention relates to a multi layered digital security mark having multiple layers with a unique identification mark that prevents copying and cloning of the product.
BACKGROUND OF THE INVENTION
Product counterfeiting is the imitation of products or brands without the authorization of the original manufacturer. Counterfeit products are often made with inferior materials and workmanship, and they may pose health and safety risks to consumers, especially when it comes to products such as pharmaceuticals, electronics, and food.
Product counterfeiting is a global problem that costs businesses billions of dollar losses in revenue each year. Counterfeit products damage the reputation of legitimate brands by tarnishing their image and eroding consumer confidence. When consumers purchase counterfeit products and are subsequently disappointed with the quality or performance, they are less likely to trust the brand in the future. In addition to these disadvantages, counterfeit products can also contribute to organized crime, environmental damage, and labor exploitation. Companies struggle to protect their products from being copied since their name, logo, ideas and designs are copied and sold cheaply in the market.
ES2794406T3 discloses a composite security mark for a physical object, in particular an anti-counterfeiting product mark, comprising: a non-clonable physical function, PUF; characterized in that the composite security mark further comprises: a representation of a pointer that indicates a location where a digital signature can be accessed, said pointer indicates a routing to a server from which the digital signature can be retrieved; wherein the digital signature: digitally signs a summary value resulting from the application of a predetermined cryptographic summary function to the data representing a response generated by the PUF in reaction to a challenge of a predetermined challenge-response authentication scheme; y is a set of one or more digital values resulting from an encryption of said summary value with a private key, according to an asymmetric cryptographic system, of the issuer of said data that represents a response generated by the PUF or of said resulting summary value of the same.
US10627552B2 discloses a retroreflective articles including a security mark comprising a retroreflective layer including multiple cube corner elements that collectively form a structured surface; polymeric barrier layers positioned adjacent to the structured surface; and a conforming layer positioned adjacent to the barrier layers, wherein the conforming layer is optically opaque; wherein barrier layers at a first portion have a color or infra-red absorbency that is different from barrier layers at a second portion, and wherein the conforming layer is a polymeric adhesive.
EP1953710A1 discloses a method for detection of miniature security mark configurations within documents and images, wherein the miniature security marks are in the form of dispersed miniature security marks and may include data marks or a combination of data marks and anchor marks. The method includes sub-sampling a received image, which is a digital representation possible recipient(s) of the miniature security marks, to generate a reduced-resolution image of the received image. Maximum/minimum points detection is performed and the maximum/minimum points are grouped into one or more clusters according to location distances between the maximum/minimum points. Group configuration is checked to match the clusters with a pre-defined template configuration. Dot parameter verification is then performed to verify mark location and configuration between the received image and a pre-defined template dot specification.
The drawbacks related to conventional security mark and method is that these conventional security mark are prone to reproduce/ copied as these security mark are not equipped with multi layered security mark having unique product and consumer identity feature which is unique for each and every consumer and product. Further, these conventional method does not provide a method to authenticate the multi layered security mark of the product for all stakeholders in the ecosystems.
Therefore, due to aforementioned drawbacks, there is a need of a multi layered security mark having a layers of security marks with a unique product and costumers identity feature which is unique for each and every consumer and product that reduces the risk of counterfeit products entering the market and also there is a need for method to authenticate the multi layered security mark of the product for both consumers and brand owners to prevent copying and cloning of the product.
OBJECT OF THE INVENTION
The main object of the present invention is to provide a multi layered digital security mark for product authentication.
Another object of the present invention is to provide a multi layered digital security mark having multiple layers with a unique identification mark that prevents copying and cloning of the product.
Yet another object of the present invention is to provide a multi layered digital security mark having a signature layer printed by a covert ink that creates an anti-copy layer on the substrate.
Yet another object of the present invention is to provide a multi layered digital security mark having a signature layer formed by superimposition of a customer signature layer and a noise signature layer that gives an anti-counterfeit security feature.
Yet another object of the present invention is to provide a multi layered digital security mark having a customer signature layer that has an encrypted customer-specific data which is unique for each customer.
Yet another object of the present invention is to provide a multi layered digital security mark having noise signature layer that has plurality of random dot noise patterns which has a distinctive feature and difficult to replicate.
Yet another object of the present invention is to provide a multi layered digital security mark having a dynamic layer that has a machine-readable code prepared via a technique on the basis of plurality of characteristics.
Yet another object of the present invention is to provide a multi layered digital security mark that has a unique product and consumer identity feature which is unique for every consumer and product.
Yet another object of the present invention is to provide a multi layered digital security mark having a signature layer printed by the covert ink which is detected by a dedicated device.
Still another object of the present invention is to provide a method to authenticate a multi layered digital security mark printed on a substrate by a consumer as well as a product inspector.
Yet another object of the present invention is to provide a method which has the ability to function in both online and offline modes and in offline mode, the method facilitates product authentication, while in online mode, the method supports both product authentication and product verification.
SUMMARY OF THE INVENTION
The present invention provides a multi layered digital security mark having multiple layers with a unique identification mark and a method to authenticate the multi layered digital security mark of the product that prevents copying and cloning of the product.
In an embodiment, the present invention provides a multi layered digital security mark comprising of a plurality of layers fabricated over the substrate. The plurality of layers include a signature layer and a dynamic layer. The signature layer is formed by superimposition of a customer signature layer and a noise signature layer. The customer signature layer includes an artwork image having a customer-specific data that is encrypted to obtain an encrypted data which is integrated into the artwork image. The noise signature layer includes an artwork image having a plurality of random dot noise patterns that is prepared via a technique on the basis of plurality of characteristics and the dynamic layer is a data-based layer which includes a machine-readable code and is printed on a top portion of said signature layer.
In another embodiment, the present invention provides the multi layered security mark, wherein said multi layered security mark is authenticated by said consumer via a method that comprise the steps of: (a) capturing an image of said multilayered security mark that is affixed on a product through a mobile device, wherein said mobile device is accessed by said consumer; (b) reading said machine readable code printed on said dynamic layer, else, repeat step (a) if machine readable code is not read; (c) checking if the mobile device is an online state; (d) verifying said machine readable code data with a data stored in a database in case the mobile device is in the online state; (e) showing a warning message in case said machine readable code is not verified with the data stored in the database; (f) extracting a predefined region on said signature layer incase said machine readable code is successfully read; (g) detecting and authenticating said signature layer, noise signature layer and customer signature layer are authentic, else, incase verification fails then display non authentic on said mobile device and store verification data in a database; (h) checking again if the mobile device is in online state, after successful verification of signature layer, noise signature layer and customer signature layer; (i) verifying said customer specific data present on said customer signature layer with a data stored in said database in case the mobile device is in the online state, if not verified, then display non authentic on said mobile device; and (j) displaying authenticity of said product after successful verification in step (g) and step (i), else display non authentic on said mobile device and store the verification data in said database.
In another embodiment, the present invention provides the multi layered security mark, wherein said multi layered security mark is authenticated by said inspector via a method that comprise the steps of: (a) checking if a dedicated device is connected to a mobile device, if not connected display warning message on said mobile device; (b) capturing an image of said multilayer security mark that is affixed on a product using said mobile device equipped with said dedicated attachment, wherein said dedicated device is connected to said mobile device which is accessed by said inspector; (c) reading said machine readable code present in said dynamic layer upon completion of step (b), else, repeat step (b) in case machine readable code not read; (d) checking if the mobile device is in online state; (e) verifying said machine readable code data with a data stored in a database; upon completion of step (c) and in case the mobile device is in the online state; (f) extracting a predefined region on said signature layer incase machine readable code data is successfully read; (g) detecting and verifying said signature layer, noise signature layer and customer signature layer are authentic, else display non authentic on said mobile device incase verification fails; (h) checking again if the mobile device is in online state; (i) verifying said customer specific data present on said customer signature layer with a data stored in said database in case the mobile device is in the online state, else display non authentic on said mobile device if not verified; (j) activating an ink detection mode in said dedicated device; (k) detecting presence of a dedicated ink features of said signature layer; and (l) displaying authenticity of said product upon presence of said dedicated ink features in step (k), else display non authentic on said mobile device and store the verification data in database.
In another embodiment, the present invention provides a dedicated device attached to the mobile device to capture an image of said multilayer security mark comprising of at least one lens, a plurality of filters, a light source and a control unit. The lens is for magnifying the said multilayer security mark. The plurality of filters, filter the unwanted light reflected from said multi layered security mark. The light source that emits a visible wavelength light to excite the dedicated ink. The dedicated ink is a covert ink. The control unit is for managing the light source and facilitating a communication between the dedicated device and mobile device. There are various alternatives offered for connecting the dedicated device to the mobile device, including cable, Bluetooth, Wi-Fi, and more.
The above objects and advantages of the present invention will become apparent from the hereinafter set forth brief description of the drawings, detailed description of the invention, and claims appended herewith.
BRIEF DESCRIPTION OF THE DRAWINGS
An understanding of the multi layered security mark for product authentication and an authentication method thereof of the present invention may be obtained by reference to the following drawings:
Figure 1 is an exploded view of a multi layered security mark according to an embodiment of the present invention.
Figure 2 is a flow chart of identification mark generation of a multi layered security mark according to an embodiment of the present invention.
Figure 3 is a flowchart of the method for authentication of the multi layered security mark by the consumer according to an embodiment of the present invention.
Figure 4 is a flowchart of the method for authentication of the multi layered security mark by the inspector according to an embodiment of the present invention.
Figure 5 is a sectional view of the dedicated device according to an embodiment of the present invention.
DESCRIPTION OF THE INVENTION
The present invention will now be described hereinafter with reference to the accompanying drawings in which a preferred embodiment of the invention is shown. This invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough, and will fully convey the scope of the invention to those skilled in the art.
Many aspects of the invention can be better understood with references made to the drawings below. The components in the drawings are not necessarily drawn to scale. Instead, emphasis is placed upon clearly illustrating the components of the present invention. Moreover, like reference numerals designate corresponding parts through the several views in the drawings. Before explaining at least one embodiment of the invention, it is to be understood that the embodiments of the invention are not limited in their application to the details of construction and to the arrangement of the components set forth in the following description or illustrated in the drawings. The embodiments of the invention are capable of being practiced and carried out in various ways. In addition, the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
The present invention provides a multi layered security mark having multiple layers with a unique identification mark that prevents copying and cloning of the product.
In an embodiment, the present invention provides a multi layered digital security mark comprising of a substrate, and a plurality of layers fabricated over the substrate. The plurality of layers include a signature layer and a dynamic layer. The signature layer is formed by superimposition of a customer signature layer and a noise signature layer. The customer signature layer includes an artwork image having a customer-specific data that is encrypted to obtain an encrypted data which is integrated into the artwork image. The noise signature layer includes an artwork image having a plurality of random dot noise patterns that is prepared via a technique on the basis of plurality of characteristics and the dynamic layer is a data-based layer which includes a machine-readable code and is printed on a top portion of said signature layer.
In another embodiment, the present invention provides the multi layered security mark, wherein said multi layered security mark is authenticated by said consumer via a method that comprise the steps of: (a) capturing an image of said multilayered security mark that is affixed on a product through a mobile device, wherein said mobile device is accessed by said consumer; (b) reading said machine readable code printed on said dynamic layer, else, repeat step (a) if machine readable code is not read; (c) checking if the mobile device is an online state; (d) verifying said machine readable code data with a data stored in a database in case the mobile device is in the online state; (e) showing a warning message in case said machine readable code is not verified with the data stored in the database; (f) extracting a predefined region on said signature layer incase said machine readable code is successfully read; (g) detecting and authenticating said signature layer, noise signature layer and customer signature layer are authentic, else, incase verification fails then display non authentic on said mobile device and store verification data in a database; (h) checking again if the mobile device is in online state, after successful verification of signature layer, noise signature layer and customer signature layer; (i) verifying said customer specific data present on said customer signature layer with a data stored in said database in case the mobile device is in the online state, if not verified, then display non authentic on said mobile device; and (j) displaying authenticity of said product after successful verification in step (g) and step (i), else display non authentic on said mobile device and store the verification data in said database.
In another embodiment, the present invention provides the multi layered security mark, wherein said multi layered security mark is authenticated by said inspector via a method that comprise the steps of: (a) checking if a dedicated device is connected to a mobile device, if not connected display warning message on said mobile device; (b) capturing an image of said multilayer security mark that is affixed on a product using said mobile device equipped with said dedicated attachment, wherein said dedicated device is connected to said mobile device which is accessed by said inspector; (c) reading said machine readable code present in said dynamic layer upon completion of step (b), else, repeat step (b) in case machine readable code not read; (d) checking if the mobile device is in online state; (e) verifying said machine readable code data with a data stored in a database; upon completion of step (c) and in case the mobile device is in the online state; (f) extracting a predefined region on said signature layer incase machine readable code data is successfully read; (g) detecting and verifying said signature layer, noise signature layer and customer signature layer are authentic, else display non authentic on said mobile device incase verification fails; (h) checking again if the mobile device is in online state; (i) verifying said customer specific data present on said customer signature layer with a data stored in said database in case the mobile device is in the online state, else display non authentic on said mobile device if not verified; (j) activating an ink detection mode in said dedicated device; (k) detecting presence of a dedicated ink features of said signature layer; and (l) displaying authenticity of said product upon presence of said dedicated ink features in step (k), else display non authentic on said mobile device and store the verification data in database.
In another embodiment, the present invention provides a dedicated device attached to the mobile device to capture an image of said multilayer security mark comprising of at least one lens, a plurality of filters, a light source and a control unit. The lens is for magnifying the said multilayer security mark. The plurality of filters, filter the unwanted light reflected from said multi layered security mark. The light source that emits a visible wavelength light to excite the dedicated ink. The dedicated ink is a covert ink. The control unit is for managing the light source and facilitating a communication between the dedicated device and mobile device. There are various alternatives offered for connecting the dedicated device to the mobile device, including, Bluetooth, Wi-Fi, and more.
Referring to Figure 1, an exploded view of a multi layered security mark according to an embodiment of the present invention is depicted. A multi layered security mark (100) comprises of a substrate (101) and a plurality of layers are fabricated over the substrate (101). The substrate (101) is made of material such as adhesive paper, non-adhesive paper, and plastic. The plurality of layers includes a signature layer (102) and a dynamic layer (103). The signature layer (102) is formed by superimposition of a customer signature layer (102a) and a noise signature layer (102b). The signature layer (102) is printed via a standard ink or a covert ink which creates an anti-copy layer on the substrate (101). Consumer and customer are interchangeable term and are used accordingly.
The customer signature layer (102a) includes an artwork image having a customer-specific data that includes numeric, alphabetic, or alphanumeric information. The customer-specific data is encrypted to obtain an encrypted data which is integrated into the artwork image via placement protocol. The customer signature layer (102a) is personalized for each customer or product, potentially containing specific data or elements to enhance the product uniqueness. The noise signature layer (102b) includes an artwork image generated by a technique for creating a plurality of random dot noise pattern. The noise signature layer (102b) is prepared via a technique on the basis of plurality of characteristics that includes number of dots generated, dot placement criteria, pixel size, unique noise signature size, and image dot per inch is set at 1200 and above that makes the noise signature layer (102b) distinctive and difficult to replicate. The signature layer (102) is printed via a standard ink or a covert ink which creates an anti-copy layer on the substrate (101). The signature layer (102) is printed on the substrate (101) through various printing technologies such as Offset printing, Screen printing, Inkjet printing, Gravure printing, or Flexo printing. When the signature layer (102) is printed using the covert ink, the authentication of the product is done using a dedicated device attached to a mobile device. The covert ink is capable of being excited at a visible wavelength of 100 nm to 400 nm. When the signature layer (102) is printed using conventional ink, the authentication of product is done using a mobile device, by consumers without the need for any additional device. The dynamic layer (103) is printed on a top-portion of the signature layer (102) via a plurality of methods that utilize a resolution of 300 dots per inch (DPI) or higher. The dynamic layer (103) is a data-based layer which includes a machine-readable code that includes 2D barcodes such as QR code, Data Matrix code or customized barcodes. The dynamic layer (103) consists of machine-readable codes. These codes are commonly used to encode data and scanned using a mobile device. The dynamic layer (103) is printed using various printing technologies, such as digital, inkjet, and laser printing, offer the flexibility to incorporate variable data.
Referring to Figure 2, is a flow chart of a method of identification mark data generation of a multi layered security mark according to an embodiment of the present invention is depicted. The method comprises the steps of a) getting a customer data from a database for generation of a customer signature layer; b) getting a product data from a database for generation of a machine code; c) generating a noise signature layer; d) combining the noise signature layer with the customer signature layer to generate a product signature layer; e) printing the product signature layer using a signature ink and f) printing the machine code.
In addition to this, the data related to the signature layer (102) and the dynamic layer (103) is generated and stored in a database. Initially, data related to the customer signature layer (102a) is generated. The customer signature layer (102a) is an artwork image having a customer-specific data that includes numeric, alphabetic, or alphanumeric information. The costumer-specific data is collected from the customer which is unique for every customer and encrypted to obtain an encrypted data and saved in the database. Further, the data related to the noise signature layer (102b) having an artwork image is generated by a technique for creating a plurality of random dot noise patterns that makes the noise signature layer (102b) distinctive and difficult to replicate. Finally, data for the dynamic layer (103) which is a data-based layer containing machine-readable code is generated using input data from the multi-layer generation application. The input data for this code is extracted from a database which is preferable an excel or CSV file, or data is static or variable data. The input data is generated in sequence, or randomly or based on said technique. This machine-readable code shall take the form of 2D barcodes, such as QR codes, Data Matrix codes, or customized barcodes. The generated unique data is stored in a database and is later utilized for product authentication and monitoring.
To print the multi layered security mark (100) on the substrate (101), the data saved for the different layers in the database is extracted from the database. Initially, the signature layer (102) is printed on a substrate (101) via a standard ink or a covert ink. When the product signature layer (102) is printed using standard ink, product counterfeit detection shall be performed using a mobile device without the need for any additional device. However, when the signature layer (102) is printed using covert ink that exhibits changes or reactions as part of forensic feature checking, and requires a dedicated device (400) that is attached to a mobile device for detection. Once the signature layer (102) is printed, the dynamic layer (103) is printed on top of the signature layer (102) using printing as digital, inkjet, and laser printing. The mobile device extracts the identification mark security feature from the multi layered security mark (100) and matches them using machine learning and image processing techniques and authenticate the security mark of the product. This combined multiple layer of security mark constitutes security feature which is unique for each consumer and product.
Referring to Figure 3, is a flowchart of the method for authentication of the multi layered security mark by the consumer according to an embodiment of the present invention is depicted. The multi layered security mark (100) is authenticated by said consumer via a method that comprise the steps of: (a) capturing an image of said multilayered security mark that is affixed on a product through a mobile device, wherein said mobile device is accessed by said consumer; (b) reading said machine readable code printed on said dynamic layer (103), else, repeat step (a) if machine readable code is not read; (c) checking if the mobile device is an online state; (d) verifying said machine readable code data with a data stored in a database in case the mobile device is in the online state; (e) showing a warning message in case said machine readable code is not verified with the data stored in the database; (f) extracting a predefined region on said signature layer (102) incase said machine readable code is successfully read; (g) detecting and authenticating said signature layer (102), noise signature layer (102b) and customer signature layer (102a) are authentic, else, incase verification fails then display non authentic on said mobile device and store verification data in a database; (h) checking again if the mobile device is in online state, after successful verification of signature layer (102), noise signature layer (102b) and customer signature layer (102a); (i) verifying said customer specific data present on said customer signature layer (102a) with a data stored in said database in case the mobile device is in the online state, if not verified, then display non authentic on said mobile device; and (j) displaying authenticity of said product after successful verification in step (g) and step (i), else display non authentic on said mobile device and store the verification data in said database. All information regarding the scanning scan time, scan date, geographical scan location, and other details related to product scanning, is logged in to a central monitoring system, which is managed exclusively by department officials and all transactions, including invalid ones, are recorded and shall be viewed in the central monitoring system by the department officials. The method operates in both online and offline modes, wherein in offline mode, the method facilitates product authentication, while in the online mode the method supports both product authentication and product verification.
Referring to Figure 4, is a flowchart of the method for authentication of the multi layered security mark by the inspector according to an embodiment of the present invention is depicted. The multi layered security mark (100) as claimed in claim 9, wherein said multi layered security mark (100) is authenticated by said inspector via a method that comprise the steps of: (a) checking if a dedicated device is connected to a mobile device, if not connected display warning message on said mobile device; (b) capturing an image of said multilayer security mark (100) that is affixed on a product using said mobile device equipped with said dedicated attachment, wherein said dedicated device is connected to said mobile device which is accessed by said inspector; (c) reading said machine readable code present in said dynamic layer (103) upon completion of step (b), else, repeat step (b) in case machine readable code not read; (d) checking if the mobile device is in online state; (e) verifying said machine readable code data with a data stored in a database; upon completion of step (c) and in case the mobile device is in the online state; (f) extracting a predefined region on said signature layer (102) incase machine readable code data is successfully read; (g) detecting and verifying said signature layer (102), noise signature layer (102b) and customer signature layer (102a) are authentic, else display non authentic on said mobile device incase verification fails; (h) checking again if the mobile device is in online state; (i) verifying said customer specific data present on said customer signature layer (102a) with a data stored in said database in case the mobile device is in the online state, else display non authentic on said mobile device if not verified; (j) activating an ink detection mode in said dedicated device; (k) detecting presence of a dedicated ink features of said signature layer (102); and (l) displaying authenticity of said product upon presence of said dedicated ink features in step (k), else display non authentic on said mobile device and store the verification data in database. The dedicated ink is preferably a covert ink. All information regarding the scanning scan time, scan date, geographical scan location, and other details related to product scanning, is logged in to a central monitoring system, which is managed exclusively by department officials and all transactions, including invalid ones, are recorded and can be viewed in the central monitoring system by department officials.
The method operates in both online and offline modes, wherein in offline mode, the method facilitates product authentication, while in the online mode the method supports both product authentication and product verification.
Referring to Figure 5, is a sectional view of the dedicated device according to an embodiment of the present invention is depicted. The dedicated device comprises of at least one lens (401), a plurality of filters (402), a light source (403) and a control unit (405). The lens (401) is for magnifying the said multilayer security mark (100) that is affixed on a product. The lens (401) allows magnification of 10X and a focal length ranging from 15 mm to 30 mm that obtain clear and magnified image. The plurality of filters (402) are filtering the unwanted light reflected from said multi layered security mark (100). The light source (403) emits a visible wavelength light to excite said dedicated ink, wherein said dedicated ink is a Covert ink. The control unit (405) is for managing said light source and facilitating a communication between said dedicated device and mobile device. The mobile device initiates the scanning process and scans the multi layered security mark (100). Initially, mobile device sends a command to switch to normal lighting. The mobile device scans the multi layered security mark (100) and checks for security features in normal lighting. If these features of the multi layered security mark (100) are verified successfully, the mobile device sends a command to switch the light source (403) to excite the color-changing ink. The mobile device then verifies the covert ink features, and displays the authentication result on the mobile device.
Therefore, the present invention provides the multi layered security mark having a layers of security marks with a unique product and customers identity feature which is unique for each and every consumer and product that reduces the risk of counterfeit products entering the market and also the method to authenticate the multi layered security mark of the product for both consumers and brand owners to prevent copying and cloning of the product.
Many modifications and other embodiments of the invention set forth herein will readily occur to one skilled in the art to which the invention pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
The foregoing description of embodiments of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiments were chosen and described in order to explain the principals of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated.
, Claims:CLAIMS
We claim:
1. A multi layered security mark (100) comprises of:
a plurality of layers are fabricated over said substrate (101); and
wherein:
said plurality of layers includes a signature layer (102) and a dynamic layer (103);
said signature layer (102) is formed by superimposition of a customer signature layer (102a) and a noise signature layer (102b);
said customer signature layer (102a) includes an artwork image having a customer-specific data that is encrypted to obtain an encrypted data which is integrated into said artwork image;
said noise signature layer (102b) includes an artwork image having a plurality of random dot noise patterns that is prepared via a technique on the basis of plurality of characteristics; and
said dynamic layer (103) is a data-based layer which includes a machine-readable code and is printed on a top portion of said signature layer (102).
2. The multi layered security mark (100) as claimed in claim 1, wherein said substrate (101) is made of material which includes but not limited to adhesive paper, non-adhesive paper, plastic.
3. The multi layered security mark (100) as claimed in claim 1, wherein said signature layer (102) is an anti-counterfeit layer which has a digital security feature for authentication purpose.
4. The multi layered security mark (100) as claimed in claim 1, wherein said customer-specific data is preferably numeric, alphabetic, or alphanumeric information.
5. The multi layered security mark (100) as claimed in claim 1, wherein said customer-specific data is encrypted to obtain said encrypted data which is integrated into said artwork image via a placement protocol.
6. The multi layered security mark (100) as claimed in claim 1, wherein said plurality of characteristics includes but not limited to number of dots generated, dot placement criteria, pixel size, unique noise signature size.
7. The multi layered security mark (100) as claimed in claim 1, wherein said dynamic layer (103) is a data-based layer which includes a machine-readable code that is selected but not limited to 2D barcodes such as QR code, Data Matrix code or customized barcodes and said dynamic layer (103) is printed via a plurality of methods.
8. The multi layered security mark (100) as claimed in claim 1, wherein said signature layer (102) is printed via a standard ink or a covert ink which creates an anti-copy layer on said substrate (101).
9. The multi layered security mark (100) as claimed in claim 1, wherein said multi layered security mark (100) is authenticated by a consumer and an inspector.
10. The multi layered security mark (100) as claimed in claim 9, wherein said multi layered security mark (100) is authenticated by said consumer via a method that comprise the steps of:
(a) capturing an image of said multilayered security mark that is affixed on a product through a mobile device, wherein said mobile device is accessed by said consumer;
(b) reading said machine readable code printed on said dynamic layer (103), else, repeat step (a) if machine readable code is not read;
(c) checking if the mobile device is an online state;
(d) verifying said machine readable code data with a data stored in a database in case the mobile device is in the online state;
(e) showing a warning message in case said machine readable code is not verified with the data stored in the database;
(f) extracting a predefined region on said signature layer (102) incase said machine readable code is successfully read;
(g) detecting and authenticating said signature layer (102), noise signature layer (102b) and customer signature layer (102a) are authentic, else, incase verification fails then display non authentic on said mobile device and store verification data in a database;
(h) checking again if the mobile device is in online state, after successful verification of signature layer (102), noise signature layer (102b) and customer signature layer (102a);
(i) verifying said customer specific data present on said customer signature layer (102a) with a data stored in said database in case the mobile device is in the online state, if not verified, then display non authentic on said mobile device; and
(j) displaying authenticity of said product after successful verification in step (g) and step (i), else display non authentic on said mobile device and store the verification data in said database.
11. The multi layered security mark (100) as claimed in claim 10, wherein said method comprises a step of collecting an information related to said capturing, verification and matching along with scan time stamp, geographical scan location, additional details related to said product and transmitting said information to a central monitoring system.
12. The multi layered security mark (100) as claimed in claim 10, wherein said method operates in both online and offline modes, wherein in offline mode, the method facilitates product authentication, while in the online mode the method supports both product authentication and product verification.
13. The multi layered security mark (100) as claimed in claim 9, wherein said multi layered security mark (100) is authenticated by said inspector via a method that comprise the steps of:
(a) checking if a dedicated device is connected to a mobile device, if not connected display warning message on said mobile device;
(b) capturing an image of said multilayer security mark (100) that is affixed on a product using said mobile device equipped with said dedicated attachment, wherein said dedicated device is connected to said mobile device which is accessed by said inspector;
(c) reading said machine readable code present in said dynamic layer (103) upon completion of step (b), else, repeat step (b) in case machine readable code not read;
(d) checking if the mobile device is in online state;
(e) verifying said machine readable code data with a data stored in a database; upon completion of step (c) and in case the mobile device is in the online state;
(f) extracting a predefined region on said signature layer (102) incase machine readable code data is successfully read;
(g) detecting and verifying said signature layer (102), noise signature layer (102b) and customer signature layer (102a) are authentic, else display non authentic on said mobile device incase verification fails;
(h) checking again if the mobile device is in online state;
(i) verifying said customer specific data present on said customer signature layer (102a) with a data stored in said database in case the mobile device is in the online state, else display non authentic on said mobile device if not verified;
(j) activating an ink detection mode in said dedicated device;
(k) detecting presence of a dedicated ink features of said signature layer (102); and
(l) displaying authenticity of said product upon presence of said dedicated ink features in step (k), else display non authentic on said mobile device and store the verification data in database.
14. The multi layered security mark (100) as claimed in claim 13, wherein said dedicated ink is preferably a covert ink.
15. The multi layered security mark (100) as claimed in claim 14, wherein said dedicated device is powered on when connected to said mobile device to scan said multi layered security mark (100) as well as said dedicated ink.
16. The multi layered security mark (100) as claimed in claim 14, wherein said dedicated device (400) comprises of:
at least one lens (401);
a plurality of filters (402);
a light source (403);
a control unit (405);
wherein:
said lens (401) is for magnifying and capturing said artwork images prepared via said dedicated ink present on said multi layered security mark (100) by exciting said dedicated ink;
said plurality of filters (402) filters the unwanted light reflected from said multi layered security mark (100);
said light source (403) that emits a visible wavelength light to excite said dedicated ink, wherein said dedicated ink is a covert ink; and
said control unit (405) is for managing said light source and facilitating a communication between said dedicated device and mobile device.
17. The multi layered security mark (100) as claimed in claim 13, wherein said dedicated device is connected to said mobile device including cable (406), Bluetooth, Wi-Fi, and more.
Dated this 09th day of January, 2024
| # | Name | Date |
|---|---|---|
| 1 | 202441001692-STATEMENT OF UNDERTAKING (FORM 3) [09-01-2024(online)].pdf | 2024-01-09 |
| 2 | 202441001692-FORM 1 [09-01-2024(online)].pdf | 2024-01-09 |
| 3 | 202441001692-FIGURE OF ABSTRACT [09-01-2024(online)].pdf | 2024-01-09 |
| 4 | 202441001692-DRAWINGS [09-01-2024(online)].pdf | 2024-01-09 |
| 5 | 202441001692-DECLARATION OF INVENTORSHIP (FORM 5) [09-01-2024(online)].pdf | 2024-01-09 |
| 6 | 202441001692-COMPLETE SPECIFICATION [09-01-2024(online)].pdf | 2024-01-09 |
| 7 | 202441001692-FORM-26 [09-04-2024(online)].pdf | 2024-04-09 |
| 8 | 202441001692-Proof of Right [18-04-2024(online)].pdf | 2024-04-18 |