Sign In to Follow Application
View All Documents & Correspondence

An Anti Counterfeiting Security System And A Method Thereof

Abstract: ABSTRACT AN ANTI-COUNTERFEITING SECURITY SYSTEM AND A METHOD THEREOF The present disclosure envisages the field of anti-counterfeiting security systems. The system (100) comprises stock keeping units (SKUs) (102), user devices (104), a security server (154), and a block chain server (118). Each of the SKU (102) provided with a plurality of visual codes associated with a unique identifier (ID). The user device (104) scans a first visual code (106) and a second visual code (108). The first visual code (106) is authenticated based on the first repository (110). The scan details of the second visual code (108) on first scan are stored in the block chain server (118). On the second scan, verification of the device IDs is performed. If device IDs are same or known to user based on the user inputs, a repurchase option is displayed, else a notification is sent to the manufacturers. The system (100) notifies a consumer about the authenticity of the SKU (102).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 November 2018
Publication Number
44/2019
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
dewan@rkdewanmail.com
Parent Application
Patent Number
Legal Status
Grant Date
2021-03-18
Renewal Date

Applicants

SEPIO PRODUCTS PRIVATE LIMITED.
037, Akshay Ind. Premises Co-op.Society Ltd. Navghar, Vasi (E), Palghar-401210, Maharashtra, India

Inventors

1. NORONHA Paul Abner
301 Seville 3rd Domnic Colony, Orlem, Malad West Mumbai-400064, Maharashtra, India
2. GANDHI Darshan Dhruman
105 Woodstock building JP Road, Seven Bungalows, Andheri West, Mumbai -400061, Maharashtra, India
3. KAMAT Dattaprasad Narayan
102 Trimbak Sadan 5th Ajmal Road, Vile Parle East Mumbai-400057, Maharashtra, India
4. NATHANI Murad
Ashiana Bullock Road, Bandstand. Bandra Mumbai-400050, Maharashtra, India

Specification

DESC:FIELD
The present disclosure relates to the field of anti-counterfeiting security systems.
DEFINITIONS
As used in the present disclosure, the following terms are generally intended to have the meaning as set forth below, except to the extent that the context in which they are used indicate otherwise.
SKU – The term “SKU (Stock Keeping Unit)” hereinafter refers to an identifier which is associated with a product. For example, if a retail shop has 25 units of a product belonging to a particular brand, style, color, and size, then it is referred to as 25 SKUs.
Re-purchase SKU- The term “Re-purchase SKU (Stock Keeping Unit)” hereinafter refers to purchase additional units of the same SKU.
Hop- The term “hop” hereinafter refers to the redirection of one URL to another URL
BACKGROUND
The background information herein below relates to the present disclosure but is not necessarily prior art.
Manufacturing, distribution and sale of counterfeit products is very common in the commercial world. In some cases, the packaging of authentic products is reused for selling counterfeit products. These counterfeit products are sold in direct competition with the authentic products. The prevailing anti-counterfeit systems are incapable of accurately identifying and tracing the counterfeit products, which leads to increase in the footprint of the anti-counterfeit products. Thus, the huge investments made by companies, in research and development of authentic products, goes futile, thereby affecting the revenues of the product manufacturers. Spread of counterfeit products, in certain scenarios, also poses a serious threat to the health and life of consumers, which is not desired.
Further, the emerging anti-counterfeiting technologies like micro printing, tamper-evident packaging, and encrypted micro-particles are complex and expensive. Moreover, for checking the authenticity of the product the visual codes (like QR codes) printed on the product are scanned. The visual codes on the product are pre-printed and have been pre-assigned a URL which cannot be changed later. The pre-assigned URL makes the information provided by the product as static with no provision to add any new information related to the product. Further, the URL’s once assigned to a product cannot be assigned to any other products, even though the assigned product is no longer marketed.
There is, therefore, felt a need for developing an anti-counterfeiting security system and a method thereof that eliminates the above-mentioned drawbacks.
OBJECTS
Some of the objects of the present disclosure, which at least one embodiment herein satisfies, are as follows:
An object of the present disclosure is to provide an anti-counterfeiting security system and a method thereof.
Another object of the present disclosure is to provide a system that distinguishes between authentic and fake products.
Still another object of the present disclosure is to provide a system that notifies a consumer about the authenticity of the product.
Yet another object of the present disclosure is to provide a system that facilitates companies to keep track of their product sales.
Still another object of the present disclosure is to provide a system that facilitates easy repurchase of products.
Yet another object of the present disclosure is to provide a system that allows companies to run customized marketing campaigns.
Still another object of the present disclosure is to provide a system which is simple and cost effective.
Other objects and advantages of the present disclosure will be more apparent from the following description, which is not intended to limit the scope of the present disclosure.
SUMMARY
The present disclosure envisages an anti-counterfeiting security system comprising a plurality of stock keeping units (SKUs), a plurality of user devices, a security server, and a block chain server.
Each of the SKU is provided with a plurality of visual codes, and each visual code associated with a unique identifier (ID).
Each user device is associated with a unique device ID. The user device is configured to facilitate a user to:
(i) scan a first visual code for obtaining first scanned information pertaining to the SKU and a second visual code for obtaining second scanned information pertaining to purchasing and/or re-purchasing the SKU; and
(ii) provide inputs for identifying a counterfeit SKU on receiving a prompt signal.
In an embodiment, the second visual code is hidden under a scratch able surface.
In another embodiment, the second visual code is printed on the inner pouch/packaging.
The security server is communicatively coupled with the user devices. The security server comprises a first repository, a first authentication unit, and a second authentication unit.
The first repository is configured to store a first look up table having a list of the unique IDs associated with the first visual code and a first static internet address and at least one of first customized internet addresses accessible via the internet corresponding to each of the unique IDs.
The first authentication unit is configured to cooperate with the first repository to authenticate the first scanned information based on the first look up table, and is further configured to generate a flag signal when the first scanned information is authenticated.
The first authentication unit comprises a first decoder and a first validator.
The first decoder is configured to receive the first scanned information, and is further configured to decode the first scanned information wherein the first decoded information comprises the unique ID associated to the first visual code.
The first validator is configured to cooperate with the first decoder and the first repository to crawl the first lookup table to extract the stored unique ID corresponding to the decoded unique ID, and is further configured to generate the flag signal when the first scanned information is authenticated.
The first decoder and the first validator are implemented using one or more processor(s).
The second authentication unit is configured to generate and transmit a first check signal to verify the second scanned information. The second authentication unit is configured to generate and transmit a store signal for storing the second scanned information on receiving a validated signal and identify the counterfeit SKU based on the inputs on receiving a non-validated signal.
The second authentication unit includes a second decoder, a second validator, a third validator, a comparator, an activating unit, a prompt unit and a notification unit.
The second decoder is configured to receive the second scanned information, and is further configured to decode the second scanned information.
The second validator is configured to cooperate with the second decoder to generate and transmit the first check signal to validate presence of the second decoded information in the second repository, and is further configured to generate and transmit the store signal for storing the second decoded information on receiving the validated signal. The second decoded information comprises the unique ID, the device ID, time of scan, location of scan, and date of scan associated with the second visual code.
The third validator is configured to receive the non-validated signal, and is further configured to generate and transmit a second check signal to extract the stored device ID.
The comparator is configured to cooperate with the second validator and the blockchain server to compare the extracted device ID and the decoded unique device ID and generate a comparison result.
The activating unit is configured to cooperate with the comparator to generate and transmit a first activate signal if both compared IDs are same.
The prompt unit is configured to cooperate with the comparator to generate and transmit an extract signal to extract the stored second decoded information if both compared IDs are same, and is further configured to transmit the extracted second decoded information to the user device, and generate and transmit a prompt signal to the user device to provide the inputs.
The notification unit is configured to cooperate with the prompt unit to identify the counterfeit SKU based on the inputs, and is further configured to generate and transmit a notification to manufacturers of the SKU.
The third validator, the comparator, the activating unit, the prompt unit and the notification unit are implemented using one or more processor(s).
The block chain server is communicatively coupled with the security server. The block chain server includes a second repository and a verification unit.
The second repository is configured to store a second lookup table having a list of the unique IDs associated with the second visual code and a second static internet address and at least one second customized internet addresses accessible via the internet corresponding to each of the unique IDs.
The verification unit is configured to cooperate with the second repository to verify presence/non-presence of the second scanned information in the second lookup table on receiving the first check signal by generating and transmitting the validated/non-validated signal, and is further configured to store the second scanned information and details of scan on receiving the store signal in the second lookup table.
The verification unit comprises a fourth validator, a fifth validator, a sixth validator, an activator, a second extractor and a second crawler and extractor.
The fourth validator is configured to cooperate with the security server to receive the first check signal, and is further configured to cooperate with the second repository to crawl the second lookup table to extract the stored unique ID corresponding to the decoded unique ID and generate a verification result.
The fifth validator is configured to cooperate with the fourth validator and the security server to generate and transmit the validated signal on successful verification based on the verification result, and is further configured to receive the store signal to store the second decoded information in the second lookup table corresponding to the unique ID. The fifth validator is configured to generate and transmit a second activate signal.
The sixth validator is configured to cooperate with the fifth validator and the security server to generate and transmit the non-validated signal on unsuccessful verification based on the verification result, and is further configured to receive the second check signal.
The activator is configured to cooperate with the sixth validator to crawl the second look up table to extract the stored device ID corresponding to the decoded device ID, and is further configured to transmit the extracted device ID.
The second extractor is configured to cooperate with the security server to receive the extract signal to crawl the second lookup table to extract the second decoded information based on the decoded unique ID, and transmit the second decoded information.
The second crawler and extractor is configured to cooperate with the second authentication unit, the second repository and the security server to crawl through the second look up table to extract the second static internet address and the least one customized internet addresses corresponding to the second decoded information on receiving the first activate signal and/or the second activate signal, and is further configured to transmit the extracted second static internet address and the second customized internet address to a hopping unit.
The fourth validator, the fifth validator, the sixth validator, the activator, the second extractor and the second crawler and extractor are implemented using one or more processor(s).
The security server further comprises the hopping unit configured to:
• cooperate with the first authentication unit and the first repository to perform a first hop to open the first static internet address and subsequently perform at least one hop after a pre-determined time to open the first customized internet address on receiving the flag signal; or
• cooperate with said blockchain server to receive the second static internet address and the second customized internet address from the blockchain server, and is further configured to perform a first hop to open the second static internet address and subsequently perform at least one hop after a pre-determined time to open the second customized internet address.
The hopping unit includes a first crawler and extractor and a hopper.
The first crawler and extractor is configured to cooperate with the first authentication unit and the first repository to crawl through the first look up table to extract the first static internet address and the first customized internet address corresponding to the first decoded information on receiving the flag signal.
The hopper is configured to cooperate with the first crawler and extractor and the blockchain server to perform a first hop to open the first static internet address and subsequently perform at least one hop after a pre-determined time to the second customized internet address, and is further configured to receive the second static internet address and the second customized internet address to perform a first hop to open the second static internet address and subsequently perform at least one hop after a pre-determined time to the second customized internet address.
The first crawler and extractor and the hopper are implemented using one or more processor(s).
In an embodiment, the first customized addresses and the second customized addresses are user defined based on the type of the SKUs.
In an embodiment, the system displays marketing information related to the SKU on opening the first customized address.
In another embodiment, the system displays options for purchasing/re-purchasing of the SKU and marketing information related to the SKU on opening the second customized address.
The present disclosure envisages an anti-counterfeiting security method.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWING
An anti-counterfeiting security systems and a method thereof of the present disclosure will now be described with the help of the accompanying drawing, in which:
Figure 1 illustrates a block diagram of the anti-counterfeiting security systems; and
Figure 2a, 2b and 2c illustrate a flow diagram of an anti-counterfeiting security method.
LIST OF REFERENCE NUMERALS
100 System
102 Stock Keeping Units (SKUs)
104 User device
106 first visual code
108 second visual code
110 first repository
112 first authentication unit
114 hopping unit
116 second authentication unit
118 Block chain server
120 second repository
122 verification unit
124 first crawler and extractor
126 First decoder
128 first validator
130 second validator
132 third validator
134 comparator
136 activating unit
138 hopper
140 prompt unit
142 notification unit
144 fourth validator
146 fifth validator
148 sixth validator
150 activator
152 Second extractor
154 security server
156 Second decoder
158 second crawler and extractor
DETAILED DESCRIPTION
Embodiments, of the present disclosure, will now be described with reference to the accompanying drawing.
Embodiments are provided so as to thoroughly and fully convey the scope of the present disclosure to the person skilled in the art. Numerous details, are set forth, relating to specific components, and methods, to provide a complete understanding of embodiments of the present disclosure. It will be apparent to the person skilled in the art that the details provided in the embodiments should not be construed to limit the scope of the present disclosure. In some embodiments, well-known processes, well-known apparatus structures, and well-known techniques are not described in detail.
The terminology used, in the present disclosure, is only for the purpose of explaining a particular embodiment and such terminology shall not be considered to limit the scope of the present disclosure. As used in the present disclosure, the forms "a,” "an," and "the" may be intended to include the plural forms as well, unless the context clearly suggests otherwise. The terms "comprises," "comprising," “including,” and “having,” are open ended transitional phrases and therefore specify the presence of stated features, elements, modules, units and/or components, but do not forbid the presence or addition of one or more other features, elements, components, and/or groups thereof.
An anti-counterfeiting security system and a method thereof of the present disclosure, is described with reference to Figure 1 through Figure 2c.
Referring to Figure 1, the anti-counterfeiting security system (hereinafter referred as “system”) (100) comprises a plurality of stock keeping units (SKUs) (102), a plurality of user devices (104), a security server (154), and a block chain server (118).
Each of the SKU (102) is provided with a plurality of visual codes, and each visual code associated with a unique identifier (ID).
Each user device (104) is associated with a unique device ID. The user device (104) is configured to facilitate a user to:
(i) scan a first visual code (106) for obtaining first scanned information pertaining to the SKU (102) and a second visual code (108) for obtaining second scanned information pertaining to purchasing and/or re-purchasing the SKU (102); and
(ii) provide inputs for identifying a counterfeit SKU (102) on receiving a prompt signal.
In an embodiment, the second visual code (108) is hidden under a scratch able surface.
In another embodiment, the second visual code (108) is printed on the inner pouch/packaging.
The security server (154) is communicatively coupled with the user devices (104). The security server (154) comprises a first repository (110), a first authentication unit (112), and a second authentication unit (116).
The first repository (110) is configured to store a first look up table having a list of the unique IDs associated with the first visual code (106) and a first static internet address and at least one of first customized internet addresses accessible via the internet corresponding to each of the unique IDs.
The first authentication unit (112) is configured to cooperate with the first repository (110) to authenticate the first scanned information based on the first look up table, and is further configured to generate a flag signal when the first scanned information is authenticated.
The first authentication unit (112) comprises a first decoder (126) and a first validator (128).
The first decoder (126) is configured to receive the first scanned information, and is further configured to decode the first scanned information wherein the first decoded information comprises the unique ID associated to the first visual code.
The first validator (128) is configured to cooperate with the first decoder (126) and the first repository (110) to crawl the first lookup table to extract the stored unique ID corresponding to the decoded unique ID, and is further configured to generate the flag signal when the first scanned information is authenticated.
The first decoder (126) and the first validator (128) are implemented using one or more processor(s).
The second authentication unit (116) is configured to generate and transmit a first check signal to verify the second scanned information. The second authentication unit (116) is configured to generate and transmit a store signal for storing the second scanned information on receiving a validated signal and identify the counterfeit SKU (102) based on the inputs on receiving a non-validated signal.
The second authentication unit (116) includes a second decoder (156), a second validator (130), a third validator (132), a comparator (134), an activating unit (136), a prompt unit (140) and a notification unit (142).
The second decoder (156) is configured to receive the second scanned information, and is further configured to decode the second scanned information.
The second validator (130) is configured to cooperate with the second decoder (156) to generate and transmit the first check signal to validate presence of the second decoded information in the second repository (120), and is further configured to generate and transmit the store signal for storing the second decoded information on receiving the validated signal. The second decoded information comprises the unique ID, the device ID, time of scan, location of scan, and date of scan associated with the second visual code.
The third validator (132) is configured to receive the non-validated signal, and is further configured to generate and transmit a second check signal to extract the stored device ID.
The comparator (134) is configured to cooperate with the second validator (130) and the blockchain server (118) to compare the extracted device ID and the decoded unique device ID and generate a comparison result.
The activating unit (136) is configured to cooperate with the comparator (134) to generate and transmit a first activate signal if both compared IDs are same.
The prompt unit (140) is configured to cooperate with the comparator (134) to generate and transmit an extract signal to extract the stored second decoded information if both compared IDs are same, and is further configured to transmit the extracted second decoded information to the user device (104), and generate and transmit a prompt signal to the user device (104) to provide the inputs.
The notification unit (142) is configured to cooperate with the prompt unit (140) to identify the counterfeit SKU (102) based on the inputs, and is further configured to generate and transmit a notification to manufacturers of the SKU (102).
In an embodiment, the user device (104) displays a questionnaire asking if the user is aware of the other user device (104). The user may be using more than one user device (104), so he/she must be familiar with the other user device (104). Or the scenario can be that the SKU (102) is already bought by some other user, if the user does not recognize the SKU (102) or the purchase. Based on the inputs, the user is either directed to the hopping unit (114) or a notification is sent to the user and the manufacturers notifying them about the counterfeit SKU (102).
The second decoder (156), the second validator (130), the third validator (132), the comparator (134), the activating unit (136), the prompt unit (140) and the notification unit (142) are implemented using one or more processor(s).
The block chain server (118) is communicatively coupled with the security server (154). The block chain server (118) includes a second repository (120) and a verification unit (122).
The second repository (120) is configured to store a second lookup table having a list of the unique IDs associated with the second visual code (108) and a second static internet address and at least one second customized internet addresses accessible via the internet corresponding to each of the unique IDs.
The verification unit (122) is configured to cooperate with the second repository (120) to verify presence/non-presence of the second scanned information in the second lookup table on receiving the first check signal by generating and transmitting the validated/non-validated signal, and is further configured to store the second scanned information and details of scan on receiving the store signal in the second lookup table.
The verification unit (122) comprises a fourth validator (144), a fifth validator (146), a sixth validator (148), an activator (150), a second extractor (152) and a second crawler and extractor (158).
The fourth validator (144) is configured to cooperate with the security server (154) to receive the first check signal, and is further configured to cooperate with the second repository (120) to crawl the second lookup table to extract the stored unique ID corresponding to the decoded unique ID and generate a verification result.
The fifth validator (146) is configured to cooperate with the fourth validator (144) and the security server (154) to generate and transmit the validated signal on successful verification based on the verification result, and is further configured to receive the store signal to store the second decoded information in the second lookup table corresponding to the unique ID. The fifth validator (146) is configured to generate and transmit a second activate signal.
The sixth validator (148) is configured to cooperate with the fifth validator (146) and the security server (154) to generate and transmit the non-validated signal on unsuccessful verification based on the verification result, and is further configured to receive the second check signal.
The activator (150) is configured to cooperate with the sixth validator (148) to crawl the second look up table to extract the stored device ID corresponding to the decoded device ID, and is further configured to transmit the extracted device ID.
The second extractor (152) is configured to cooperate with the security server (154) to receive the extract signal to crawl the second lookup table to extract the second decoded information based on the decoded unique ID, and transmit the second decoded information.
The second crawler and extractor (158) is configured to cooperate with the second authentication unit (116), the second repository (120) and the security server (154) to crawl through the second look up table to extract the second static internet address and the least one customized internet addresses corresponding to the second decoded information on receiving the first activate signal and/or the second activate signal, and is further configured to transmit the extracted second static internet address and the second customized internet address to a hopping unit (114).
The fourth validator (144), the fifth validator (146), the sixth validator (148), the activator (150), the second extractor (152) and the second crawler and extractor (158) are implemented using one or more processor(s).
The security server (154) further comprises the hopping unit (114) configured to
• cooperate with the first authentication unit (112) and the first repository (110) to perform a first hop to open the first static internet address and subsequently perform at least one hop after a pre-determined time to open the first customized internet address on receiving the flag signal; or
• cooperate with said blockchain server (118) to receive the second static internet address and the second customized internet address, and is further configured to perform a first hop to open the second static internet address and subsequently perform at least one hop after a pre-determined time to open the second customized internet address.
The hopping unit (114) includes a first crawler and extractor (124) and a hopper (138).
The first crawler and extractor (124) is configured to cooperate with the first authentication unit (112) and the first repository (110) to crawl through the first look up table to extract the first static internet address and the first customized internet address corresponding to the first decoded information on receiving the flag signal.
The hopper (138) is configured to cooperate with the first crawler and extractor (124) and the blockchain server (118) to perform a first hop to open the first static internet address and subsequently perform at least one hop after a pre-determined time to the second customized internet address, and is further configured to receive the second static internet address and the second customized internet address to perform a first hop to open the second static internet address and subsequently perform at least one hop after a pre-determined time to the second customized internet address.
The first crawler and extractor (124) and the hopper (138) are implemented using one or more processor(s).
The processor may be a general-purpose processor, a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), and/or the like. The processor may be configured to retrieve data from and/or write data to the memory. The memory can be for example, a random access memory (RAM), a memory buffer, a hard drive, a database, an erasable programmable read only memory (EPROM), an electrically erasable programmable read only memory (EEPROM), a read only memory (ROM), a flash memory, a hard disk, a floppy disk, cloud storage, and/or so forth.
In an embodiment, the first customized addresses and the second customized addresses are user defined based on the type of the SKUs (102).
In an embodiment, the system (100) displays marketing information related to the SKU (102) on opening the first customized address.
In another embodiment, the system (100) displays options for purchasing/re-purchasing of the SKU (102) and marketing information related to the SKU (102) on opening the second customized address.
In an embodiment, a set of visual codes are bought by a manufacturer of the SKU (102), that are pre-printed and have been assigned a URL which cannot be changed later. For any modifications in the URL, the hopping functionality comes into picture. For example: the first scanned information, which is the original URL related to the SKU (102), is first verified in the first repository (110). Once it is verified, the hopping unit (114) perform multiple hops of which a first hop is to open the first static internet address and subsequently perform at least one hop after a pre-determined time to open the first customized internet address on receiving a flag signal on successful authentication. The hopping helps in adding any new information to the SKU details and marketing information, by customization of the URL. This way the user can view all the information related to the SKU (102) that the manufacturer wants to show. Hence, the hopping unit (114) facilitates the customization of the URLs.
In another embodiment, not all the visual codes are used at once. For example: if 1 to 1000 visual codes are available to be used, only 1 to 500 can be used for a particular SKU (102), and 501 to 1000 can still be unused. Further, all the URLs assigned to the visual codes are unique. These URLs are assigned in randomized fashion and are not sequential. In yet another embodiment, the different URLs can point to same SKUs (102) at a time, and different SKU (102) at a different time when the earlier SKU (102) details are removed from the URL.
In yet another embodiment, besides providing a re-purchase option related to a SKU (102), the system (100) reuses the existing packaging while replenishing the inventory. A brand can replace the used SKU (102) with a new one and collect the used SKU (102) for reuse. The earlier visual code is washed off and a new visual code is applied in its place having a new unique ID.
In an embodiment, when multiple instances of scanning of the same second visual code (108) are recorded by the company, the company makes an attempt to reach out to the user or the sales representative for that area to investigate further on the multiple same QR code counterfeits.
The fact that the second visual code (108) was scanned by the user, means that the product SKU (102) was purchased. This piece of information gives a lot of insights to companies who currently have no way of identifying SKU (102) level sales data due to the limited visibility in the supply chain.
In another embodiment, the company configures the second visual code (108) to provide different experiences to different users. For example, a user may be taken to an online video if the second visual code (108)) is scanned in Mumbai and another user may be shown an augmented reality video if the second visual code (108) may be scanned in Delhi.
In an embodiment, the visual code (108) is used to identify illicit sales. A company may use a mobile application or a high speed camera to track an SKU (102) through the various stages of the supply chain. At each event, from manufacturing to distribution, additional information (location, authorised personnel details etc.,) is appended to the visual code (108) by scanning, which is included in the second or third hop URL or saved on the security server (154) to be displayed on the user device (104). In this way, a manufacturer knows the exact location of an SKU (102), up to the retail store it was last distributed. If visual codes (108) or (106) are scanned at another location, it reveals illicit sales. A brand may choose to display all the collected information to a potential buyer.
In another embodiment, the URL of the unique ID of the visual codes (106) or (108), may not hold all the information of the product at the time of generation. The information is later appended to the hop URL that allows a crawler to identify the product and send marketing messages to the consumer on the social networking sites.
In an embodiment, the user device (104) may be a smart phone, a tablet computer, a laptop computer, a personal digital assistant, or an electronic wearable device, a pocket sized electronic device, a portable electronic device having scanning and processing capabilities.
A pseudo code depicting the functionality of the system (100) is as follows:
START
\\A brand has two visual code for each SKU (102)
READ {QR_INR_1} \\QR_INR_1 as first visual code
READ {QR_OUT_1} \\QR_OUT_1 as second visual Code
READ {Device_D1} \\Device_D1 as user device id
READ {Device_D2} \\Device_D2 as other user device id

IF {Device_D1 SCAN QR_INR_1} THEN
SELECT {Check details of Device_D1 from Block Chain}
IF {Device_D1 == VALID}
{Redirect consumer to certain e-commerce website to repurchase the SKU}
ELSE
Display {" SKU is authentic"}
Display {" SKU purchased"}
WRITE {Store all details of Device_D1{Date,Time,User_Device_ID,Location]} IN {BlockChain}
ENDSELECT
ELSE IF{Device_D2 SCAN QR_INR_1} THEN
SELECT {Check details of Device_D2 from BlockChain}
IF{Device_D2 != VALID}
DISPLAY {" SKU is counterfeit"}
DISPLAY {"The details of the first scan are: Date: DD/MM/YY, Time: HH:MM:SS, Device_ID: ___________, Location: _____}
READ {"Do you recognize this purchase?"}
IF{YES}
DISPLAY {"Marketing Contents"}
ELSE
SEND_MSG {"Notification to company about a counterfeit SKU being in circulation"}
ENDIF
ENDSELECT
ELSE IF{Device_D1 SCAN QR_OUT_1 || Device_D2 SCAN QR_OUT_1} THEN
Display{"Marketing Content"}
END
Using the system (100) disclosed, companies are able to identify users who first engaged with the SKU (102) by scanning the first visual code (106) (which is primarily for marketing), and then purchased the SKU (102) by scanning the inner (or hidden) second visual code (108)). The system (100) is further configured to identify repurchase of the product SKUs (102) done by scanning the second visual code (108) again using the same user device (104).
In another embodiment, the system (100) is configured to capture information about the user device (104) used to scan either the first visual code (106) or the second visual code (108) to identify users and bucket them under categories such as:
• Consumers who engage with multiple products of the same company;
• Consumers who purchase multiple products of the same company;
• Consumers who only engage with the company using outer QR code but never purchase any products; and
• Consumers who purchase the same product at a fixed interval.
In an embodiment, the system (100) also identify product SKUs (102) that are always purchased together and enable companies to build product baskets with varying degrees of complexity to generate insights such as – “x percentage of people who purchase SKU (102), also end up purchasing SKU (102) within 7 days”.
In another embodiment, a SKU (102) is assigned a digital identity (stored on block chain server 118) via a QR code, a unique NFC chip or a unique RFID chip. This digital identity may be used to track a SKU (102) right from the manufacturing plant, through the entire supply chain up till purchase and consumption. This digital identity is configured to store data points about the SKU (102) such as authenticity information, QC certificates, manufacturing date and location, and tamper information.
In another embodiment, the system (100) may further help companies build, track and trace identities across the supply chain by creating digital Identities at a truck level, pallet level, shipper and product level. The system
(100) is configured to maintain a list of product SKUs (102) going into a shipper, list of shippers going into pallets and pallets going into trucks. The SKUs (102) are secured at all the levels using a hardware unit suitable for each level (for e.g. Securing and tracking a truck using an electronic reusable lock, RFID for pallets and shippers and QR codes/NFC for individual product SKUs). This enables the companies to secure and track the whereabouts of SKUs (102) and shipments across the supply chain, thereby reducing manual intervention, theft and tamper incidents.
Figures 2a, 2b and 2c illustrate a flow diagram of an anti-counterfeiting security method. The steps include:
• Step 202: providing, by a plurality of stock keeping units (SKUs) (102), a plurality of visual codes associated with a unique identifier (ID);
• Step 204: scanning, by a plurality of user devices (104), a first visual code (106) for obtaining information pertaining to the SKU (102) and a second visual code (108) for purchasing and/or re-purchasing the SKU (102);
• Step 206: providing, by the plurality of user devices (104), inputs for identifying a counterfeit SKU (102) on receiving a prompt signal;
• Step 208: storing, by a first repository (110), a first look up table having a list of the unique IDs associated with the first visual code (106) and a first static internet address and at least one of first customized internet addresses accessible via the internet corresponding to each of the unique IDs;
• Step 210: authenticating, by a first authentication unit (112), the first scanned information based on the first look up table;
• Step 212: generating and transmitting, by the first authentication unit (112), a flag signal when said first scanned information is authenticated;
• Step 214: generating and transmitting, by a second authentication unit (116), a first check signal to verify the second scanned information;
• Step 216: generating and transmitting, by the second authentication unit (116), a store signal for storing the second scanned information on receiving a validated signal;
• Step 218: identifying, by the second authentication unit (116), the counterfeit SKU (102) based on the inputs on receiving a non-validated signal;
• Step 220: storing, by a second repository (120), a second lookup table having a list of the unique IDs associated with the second visual code (108) and a second static internet address and at least one second customized internet addresses accessible via the internet corresponding to each of the unique IDs;
• Step 222: verifying, by a verification unit (122), presence/non-presence of the second scanned information in the second lookup table on receiving the first check signal by generating and transmitting the validated/non-validated signal;
• Step 224: storing, by the verification unit (122), the second scanned information and details of scan on receiving the store signal in the second lookup table;
• Step 226: performing, by a hopping unit (114), a first hop is to open the first static internet address and subsequently perform at least one hop after a pre-determined time to open the first customized internet address on receiving the flag signal; and
• Step 228: receiving, by the hopping unit (114), the second static internet address and the second customized internet address from the blockchain server (118) to perform a first hop to open the second static internet address and subsequently perform at least one hop after a pre-determined time to open the second customized internet address.

TECHNICAL ADVANCEMENTS
The present disclosure described herein above has several technical advantages including, but not limited to, the realization of, an anti-counterfeiting security system and a method thereof, which:
• distinguishes between authentic and fake products;
• notifies a consumer about the authenticity of the product;
• facilitates companies to keep track of their product sales;
• facilitates easy repurchase of products;
• allows companies to run customized marketing campaigns; and
• simple and cost effective.
The foregoing disclosure has been described with reference to the accompanying embodiments which do not limit the scope and ambit of the disclosure. The description provided is purely by way of example and illustration.
The embodiments herein and the various features and advantageous details thereof are explained with reference to the non-limiting embodiments in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
The foregoing description of the specific embodiments so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.
Throughout this specification the word “comprise”, or variations such as “comprises” or “comprising”, will be understood to imply the inclusion of a stated element, step, or group of elements, steps, but not the exclusion of any other element, or step, or group of elements, or steps.
The use of the expression “at least” or “at least one” suggests the use of one or more elements or ingredients or quantities, as the use may be in the embodiment of the disclosure to achieve one or more of the desired objects or results.
While considerable emphasis has been placed herein on the components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.
,CLAIMS:WE CLAIM:
1. An anti-counterfeiting security system (100), said system (100) comprising:
• a plurality of stock keeping units (SKUs) (102), each of said SKU (102) provided with a plurality of visual codes, each visual code associated with a unique identifier (ID);
• a plurality of user devices (104), each user device (104) associated with a unique device ID, said user device (104) configured to facilitate a user to:
(i) scan a first visual code (106) for obtaining first scanned information pertaining to said SKU (102) and a second visual code (108) for obtaining second scanned information pertaining to purchasing and/or re-purchasing said SKU (102); and
(ii) provide inputs for identifying a counterfeit SKU (102) on receiving a prompt signal,
• a security server (154) communicatively coupled with said user devices (104), said security server (154) comprising:
(i) a first repository (110) configured to store a first look up table having a list of said unique IDs associated with said first visual code (106) and a first static internet address and at least one of first customized internet addresses accessible via the internet corresponding to each of said unique IDs;
(ii) a first authentication unit (112) configured to cooperate with said first repository (110) to authenticate said first scanned information based on said first look up table, and further configured to generate a flag signal when said first scanned information is authenticated; and
(iii) a second authentication unit (116) configured to generate and transmit a first check signal to verify said second scanned information, said second authentication unit (116) configured to generate and transmit a store signal for storing said second scanned information on receiving a validated signal and identify said counterfeit SKU (102) based on said inputs on receiving a non-validated signal,
• a block chain server (118) communicatively coupled with said security server (154), said block chain server (118) comprising:
(i) a second repository (120) configured to store a second lookup table having a list of said unique IDs associated with said second visual code (108) and a second static internet address and at least one second customized internet addresses accessible via the internet corresponding to each of said unique IDs; and
(ii) a verification unit (122) configured to cooperate with said second repository (120) to verify presence/non-presence of said second scanned information in said second lookup table on receiving said first check signal by generating and transmitting said validated/non-validated signal, and further configured to store said second scanned information and details of scan on receiving said store signal in said second lookup table,
wherein said security server (154) further comprises a hopping unit (114) configured to:
• cooperate with said first authentication unit (112) and said first repository (110) to perform a first hop to open said first static internet address and subsequently perform at least one hop after a pre-determined time to open said first customized internet address on receiving said flag signal; or
• cooperate with said blockchain server (118) to receive said second static internet address and said second customized internet address, and further configured to perform a first hop to open said second static internet address and subsequently perform at least one hop after a pre-determined time to open said second customized internet address.

2. The system (100) as claimed in claim 1, wherein said first authentication unit (112) includes:
• a first decoder (126) configured to receive said first scanned information, and further configured to decode said first scanned information wherein said first decoded information comprises said unique ID associated to said first visual code; and
• a first validator (128) configured to cooperate with said first decoder (126) and said first repository (110) to crawl said first lookup table to extract said stored unique ID corresponding to said decoded unique ID, and further configured to generate said flag signal when said first scanned information is authenticated,
wherein said first decoder (126) and said first validator (128) are implemented using one or more processor(s).

3. The system (100) as claimed in claim 1, wherein said hopping unit (114) includes:
• a first crawler and extractor (124) configured to cooperate with said first authentication unit (112) and said first repository (110) to crawl through said first look up table to extract said first static internet address and said first customized internet address corresponding to said first decoded information on receiving said flag signal; and
• a hopper (138) configured to cooperate with said first crawler and extractor (124) and said blockchain server (118) to perform a first hop to open said first static internet address and subsequently perform at least one hop after a pre-determined time to said second customized internet address, and further configured to receive said second static internet address and said second customized internet address to perform a first hop to open said second static internet address and subsequently perform at least one hop after a pre-determined time to said second customized internet address,
wherein said first crawler and extractor (124) and said hopper (138) are implemented using one or more processor(s).

4. The system (100) as claimed in claim 1, wherein said second authentication unit (116) includes:
• a second decoder (156) configured to receive said second scanned information, and further configured to decode said second scanned information;
• a second validator (130) configured to cooperate with said second decoder (156) to generate and transmit said first check signal to validate presence of said second decoded information in said second repository (120), and further configured to generate and transmit said store signal for storing said second decoded information on receiving said validated signal, said second decoded information comprising said unique ID, said device ID, time of scan, location of scan, and date of scan associated with said second visual code;
• a third validator (132) configured to receive said non-validated signal, and further configured to generate and transmit a second check signal to extract said stored device ID;
• a comparator (134) configured to cooperate with said second validator (130) and said blockchain server (118) to compare said extracted device ID and said decoded unique device ID and generate a comparison result;
• an activating unit (136) configured to cooperate with said comparator (134) to generate and transmit a first activate signal if both compared IDs are same;
• a prompt unit (140) configured to cooperate with said comparator (134) to generate and transmit an extract signal to extract said stored second decoded information if both compared IDs are same, and further configured to transmit said extracted second decoded information to said user device (104), and generate and transmit a prompt signal to said user device (104) to provide said inputs; and
• a notification unit (142) configured to cooperate with said prompt unit (140) to identify said counterfeit SKU (102) based on said inputs, and further configured to generate and transmit a notification to manufacturers of said SKU (102).
wherein said second decoder (156), said second validator (130), said third validator (132), said comparator (134), said activating unit (136), said prompt unit (140) and said notification unit (142) are implemented using one or more processor(s).

5. The system (100) as claimed in claim 1, wherein said verification unit (122) includes:
• a fourth validator (144) configured to cooperate with said security server (154) to receive said first check signal, and further configured to cooperate with said second repository (120) to crawl said second lookup table to extract said stored unique ID corresponding to said decoded unique ID and generate a verification result;
• a fifth validator (146) configured to cooperate with said fourth validator (144) and said security server (154) to generate and transmit said validated signal on successful verification based on said verification result, and further configured to receive said store signal to store said second decoded information in said second lookup table corresponding to said unique ID, said fifth validator (146) configured to generate and transmit a second activate signal;
• a sixth validator (148) configured to cooperate with said fifth validator (146) and said security server (154) to generate and transmit said non-validated signal on unsuccessful verification based on said verification result, and further configured to receive said second check signal;
• an activator (150) configured to cooperate with said sixth validator (148) to crawl said second look up table to extract said stored device ID corresponding to said decoded device ID, and further configured to transmit said extracted device ID;
• a second extractor (152) configured to cooperate with said security server (154) to receive said extract signal to crawl said second lookup table to extract said second decoded information based on said decoded unique ID, and transmit said second decoded information; and
• a second crawler and extractor (158) configured to cooperate with said second authentication unit (116), said second repository (120) and said security server (154) to crawl through said second look up table to extract said second static internet address and said least one customized internet addresses corresponding to said second decoded information on receiving said first activate signal and/or said second activate signal, and further configured to transmit said extracted second static internet address and said second customized internet address to said hopping unit (114),
wherein said fourth validator (144), said fifth validator (146), said sixth validator (148), said activator (150), said second extractor (152) and said second crawler and extractor (158) are implemented using one or more processor(s).
6. The system (100) as claimed in claim 1, wherein said first customized addresses and said second customized addresses are user defined based on the type of said SKUs (102).
7. The system (100) as claimed in claim 1 displays marketing information related to said SKU (102) on opening said first customized address.
8. The system (100) as claimed in claim 1 displays options for purchasing/re-purchasing of said SKU (102) and marketing information related to said SKU (102) on opening said second customized address.
9. The system (100) as claimed in claim 1, wherein said second visual code (108) is hidden under a scratch able surface.
10. The system (100) as claimed in claim 1, wherein said second visual code (108) is printed on the inner pouch/packaging.
11. An anti-counterfeiting security method, said method comprises the following steps:
• providing (202), by a plurality of stock keeping units (SKUs) (102), a plurality of visual codes associated with a unique identifier (ID);
• scanning (204), by a plurality of user devices (104), a first visual code (106) for obtaining information pertaining to said SKU (102) and a second visual code (108) for purchasing and/or re-purchasing said SKU (102);
• providing (206), by said plurality of user devices (104), inputs for identifying a counterfeit SKU (102) on receiving a prompt signal;
• storing (208), by a first repository (110), a first look up table having a list of said unique IDs associated with said first visual code (106) and a first static internet address and at least one of first customized internet addresses accessible via the internet corresponding to each of said unique IDs;
• authenticating (210), by a first authentication unit (112), said first scanned information based on said first look up table;
• generating and transmitting (212), by said first authentication unit (112), a flag signal when said first scanned information is authenticated;
• generating and transmitting (214), by a second authentication unit (116), a first check signal to verify said second scanned information;
• generating and transmitting (216), by said second authentication unit (116), a store signal for storing said second scanned information on receiving a validated signal;
• identifying (218), by said second authentication unit (116), said counterfeit SKU (102) based on said inputs on receiving a non-validated signal;
• storing (220), by a second repository (120), a second lookup table having a list of said unique IDs associated with said second visual code (108) and a second static internet address and at least one second customized internet addresses accessible via the internet corresponding to each of said unique IDs;
• verifying (222), by a verification unit (122), presence/non-presence of said second scanned information in said second lookup table on receiving said first check signal by generating and transmitting said validated/non-validated signal;
• storing (224), by said verification unit (122), said second scanned information and details of scan on receiving said store signal in said second lookup table;
• performing (226), by a hopping unit (114), a first hop to open said first static internet address and subsequently perform at least one hop after a pre-determined time to open said first customized internet address on receiving said flag signal; and
• receiving (228), by said hopping unit (114), said second static internet address and said second customized internet address from said blockchain server (118) to perform a first hop to open said second static internet address and subsequently perform at least one hop after a pre-determined time to open said second customized internet address.

Documents

Application Documents

# Name Date
1 201821045130-STATEMENT OF UNDERTAKING (FORM 3) [29-11-2018(online)].pdf 2018-11-29
2 201821045130-PROVISIONAL SPECIFICATION [29-11-2018(online)].pdf 2018-11-29
3 201821045130-PROOF OF RIGHT [29-11-2018(online)].pdf 2018-11-29
4 201821045130-POWER OF AUTHORITY [29-11-2018(online)].pdf 2018-11-29
5 201821045130-FORM FOR STARTUP [29-11-2018(online)].pdf 2018-11-29
6 201821045130-FORM FOR SMALL ENTITY(FORM-28) [29-11-2018(online)].pdf 2018-11-29
7 201821045130-FORM 1 [29-11-2018(online)].pdf 2018-11-29
8 201821045130-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [29-11-2018(online)].pdf 2018-11-29
9 201821045130-EVIDENCE FOR REGISTRATION UNDER SSI [29-11-2018(online)].pdf 2018-11-29
10 201821045130-DRAWINGS [29-11-2018(online)].pdf 2018-11-29
11 201821045130-DECLARATION OF INVENTORSHIP (FORM 5) [29-11-2018(online)].pdf 2018-11-29
12 201821045130-ORIGINAL UR 6(1A) FORM 1-111218.pdf 2019-04-25
13 201821045130-ENDORSEMENT BY INVENTORS [25-09-2019(online)].pdf 2019-09-25
14 201821045130-DRAWING [25-09-2019(online)].pdf 2019-09-25
15 201821045130-COMPLETE SPECIFICATION [25-09-2019(online)].pdf 2019-09-25
16 Abstract1.jpg 2019-09-30
17 201821045130-STARTUP [25-10-2019(online)].pdf 2019-10-25
18 201821045130-FORM28 [25-10-2019(online)].pdf 2019-10-25
19 201821045130-FORM-9 [25-10-2019(online)].pdf 2019-10-25
20 201821045130-FORM 18A [25-10-2019(online)].pdf 2019-10-25
21 201821045130-FER.pdf 2020-01-16
22 201821045130-OTHERS [18-05-2020(online)].pdf 2020-05-18
23 201821045130-FER_SER_REPLY [18-05-2020(online)].pdf 2020-05-18
24 201821045130-CLAIMS [18-05-2020(online)].pdf 2020-05-18
25 201821045130-US(14)-HearingNotice-(HearingDate-11-09-2020).pdf 2020-08-17
26 201821045130-FORM-26 [10-09-2020(online)].pdf 2020-09-10
27 201821045130-Correspondence to notify the Controller [10-09-2020(online)].pdf 2020-09-10
28 201821045130-Written submissions and relevant documents [26-09-2020(online)].pdf 2020-09-26
29 201821045130-FORM 13 [26-09-2020(online)].pdf 2020-09-26
30 201821045130-Response to office action [15-03-2021(online)].pdf 2021-03-15
31 201821045130-PatentCertificate18-03-2021.pdf 2021-03-18
32 201821045130-IntimationOfGrant18-03-2021.pdf 2021-03-18
33 201821045130-Response to office action [14-05-2021(online)].pdf 2021-05-14
34 201821045130-RELEVANT DOCUMENTS [18-06-2021(online)].pdf 2021-06-18
35 201821045130-POWER OF AUTHORITY [16-06-2022(online)].pdf 2022-06-16
36 201821045130-FORM-28 [16-06-2022(online)].pdf 2022-06-16
37 201821045130-FORM-16 [16-06-2022(online)].pdf 2022-06-16
38 201821045130-FORM FOR STARTUP [16-06-2022(online)].pdf 2022-06-16
39 201821045130-EVIDENCE FOR REGISTRATION UNDER SSI [16-06-2022(online)].pdf 2022-06-16
40 201821045130-ASSIGNMENT WITH VERIFIED COPY [16-06-2022(online)].pdf 2022-06-16
41 201821045130-POWER OF AUTHORITY [27-07-2022(online)].pdf 2022-07-27
42 201821045130-FORM-28 [27-07-2022(online)].pdf 2022-07-27
43 201821045130-FORM-16 [27-07-2022(online)].pdf 2022-07-27
44 201821045130-FORM FOR STARTUP [27-07-2022(online)].pdf 2022-07-27
45 201821045130-EVIDENCE FOR REGISTRATION UNDER SSI [27-07-2022(online)].pdf 2022-07-27
46 201821045130-ASSIGNMENT WITH VERIFIED COPY [27-07-2022(online)].pdf 2022-07-27
47 201821045130-FORM-26 [09-08-2022(online)].pdf 2022-08-09
48 201821045130-FORM-26 [09-08-2022(online)]-1.pdf 2022-08-09
49 201821045130-FORM FOR STARTUP [28-08-2023(online)].pdf 2023-08-28
50 201821045130-EVIDENCE FOR REGISTRATION UNDER SSI [28-08-2023(online)].pdf 2023-08-28
51 201821045130-FORM-27 [15-07-2024(online)].pdf 2024-07-15

Search Strategy

1 SEARCHAE_13-07-2020.pdf
2 2019-12-0916-16-27_09-12-2019.pdf

ERegister / Renewals

3rd: 13 May 2021

From 29/11/2020 - To 29/11/2021

4th: 14 May 2021

From 29/11/2021 - To 29/11/2022

5th: 20 Sep 2022

From 29/11/2022 - To 29/11/2023

6th: 27 Oct 2023

From 29/11/2023 - To 29/11/2024

7th: 01 Aug 2024

From 29/11/2024 - To 29/11/2025

8th: 24 Oct 2025

From 29/11/2025 - To 29/11/2026