Sign In to Follow Application
View All Documents & Correspondence

Gemstone Authentication

Abstract: Techniques of authentication of the gemstones for quick and accurate gemstone authentication are disclosed herein. The technique includes scanning a plurality of rough gemstones and determining their physical attributes including a set of pre-polishing attributes associated with each of the rough gemstones. Further, the technique includes associating a GUID with each of the rough gemstones. Subsequently, a polished gemstone, when received, is authenticated based on a set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the rough gemstones.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
01 April 2020
Publication Number
21/2020
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
ayush@mslaw.in
Parent Application

Applicants

SAHAJANAND TECHNOLOGIES PRIVATE LIMITED
A1, Sahajanand Estate, Wakharia Wadi, Near Dabholi Char Rasta, Ved Road, Surat, Gujarat 395004, India

Inventors

1. GAJJAR, Munjalkumar Dhirajlal
43, 1st Floor, Ravindrapark Society, Opp. Jay Ambe Society, Adajan Patia, Surat, Gujarat 395009, India
2. VAISHNANI, Piyush Himmatbhai
A-201, Harmony Heights, Near Shishumandir school, Next to Krishna Bunglows, Shashtri road, Bardoli, Surat 394601, India
3. GAYWALA, Rahul Mahendra Kumar
71, Haridwar Society, Kalpana Chawla Road, New Adajan Road, Surat, Gujarat 395009, India

Specification

FORM 2
THE PATENTS ACT, 1970 (39 of 1970) & THE PATENTS RULES, 2003
COMPLETE SPECIFICATION (See section 10, rule 13) 1. Title of the invention: GEMSTONE AUTHENTICATION
2. Applicant(s)

NAME NATIONALITY ADDRESS
SAHAJANAND Indian A1, Sahajanand Estate, Wakharia
TECHNOLOGIES PRIVATE Wadi, Near Dabholi Char Rasta,
LIMITED Ved Road, Surat, Gujarat 395004, India
3. Preamble to the description
COMPLETE SPECIFICATION
The following specification particularly describes the invention and the manner in which it
is to be performed.

TECHNICAL FIELD
[0001] The present subject matter relates, in general, to gemstone processing and,
particularly but not exclusively, to gemstone authentication.
BACKGROUND
[0002] Gemstones are naturally occurring deposits of minerals and can include,
for example, diamonds, quartz, opals, sapphires, rubies, emeralds, and topaz. Since the gemstones are rare, they are highly valued for use. The value of these gemstones results from their color, luster, and the manner in which they transmit, refract, or reflect rays of light. For the enhancement of such properties, gemstones are analyzed and processed, by various techniques, such as planning by way of pre-processing and cutting, faceting, shaping, and polishing.
BRIEF DESCRIPTION OF DRAWINGS
[0003] The above aspects are further described in conjunction with the figures
below. It should be noted that the figures merely illustrate the principles of the present subject matter. Therefore, various assemblies that encompass the principles of the present subject matter, although not explicitly shown herein, may be devised from the figures and are included within its scope. The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to reference like features and components.
[0004] Fig. 1 schematically illustrates a gemstone authentication system, in
accordance with an example of the present subject matter
[0005] Fig. 2 illustrates the process of gemstone authentication, in accordance with
the present subject matter.

DETAILED DESCRIPTION
[0006] The present subject matter relates to aspects of automatic authentication of
gemstones.
[0007] Gemstones have irregular dimensions, and undergo diverse processing
steps, such as sawing, bruiting, and polishing, to reach to finished state. In an example, the processing steps may be performed on multiple machines, such as gemstone planner and a gemstone cutter. As part of planning, a bare gemstone, i.e., an unprocessed gemstone, is scanned to measure basic geometry thereof. For example, shape, dimensions (length, width, and height). Thereafter, the gemstone planner estimates physical attributes of the gemstone based upon the geometry of the gemstone. The physical attributes along with the gemstone may be transferred further to the gemstone cutter for further cutting process.
[0008] Once the gemstone is cut, an unpolished gemstone is obtained which is is
further processed for obtaining a finished gemstone. The further processing may include polishing the gemstone. Polishing includes buffing the gemstone for obtaining a highly reflective surface on each of the facets of the gemstone. However, polishing may not always be performed by the same party that has planned and cut the gemstone, and, instead, the polishing of the unpolished gemstones may be outsourced to a third-party. Once, the third-party vendor completes the polishing process, the polished gemstones are returned. However, there is a possibility that the returned gemstones may have been replaced, for example, by counterfeit gemstones, by a rogue third-party vendor. While, conventionally, certain methodologies are employed in order to ensure the authenticity of gemstones sent for polishing, such methodologies of ascertaining the authenticity are tedious, as they may involve measuring specific dimensions of the gemstones. In addition, such conventional methodologies are performed manually which may lead to inaccuracies and errors in authentication, notwithstanding the fact that such a process may be time-consuming and may require skilled labor.

[0009] To this end, a system for gemstone authentication of gemstones and a
method thereof, are described herein. The gemstone authentication system and the method thereof overcome the above-described problems associated with the gemstone authentication once the gemstones are polished.
[0010] Various examples of the apparatus and method for gemstone
authentication. The described examples are provided as non-limiting examples of the apparatus and method for gemstone authentication.
[0011] The present subject matter discloses a gemstone authentication system. In
an example, the gemstone authentication system may include a gemstone authenticator which may further include a processor. The gemstone authenticator may receive the gemstones which may be fed into the gemstone authenticator one by one or in batches. Further, the gemstone authenticator scans an exterior surface of a rough gemstone to determine physical attributes associated with the rough gemstone. In an example, the rough gemstone can be either a bare gemstone, i.e., a completely unprocessed gemstone. In such a case, the gemstone authenticator may perform the scanning, for instance, in a planning phase. In another example, the rough gemstone can be an unpolished gemstone obtained after performing cutting and sawing operations on the bare gemstone. In such a case, the gemstone authentication may be performed immediately before the rough gemstone is sent for polishing.
[0012] Based on the physical attributes determined by the gemstone authenticator,
a set of pre-polished attributes associated with the rough gemstone are determined by the gemstone authenticator. In an example, the set of pre-polishing attributes may include tolerance values linked with each attribute in the pre-polishing attributes. In an example, the gemstone authenticator may associate a unique identifier with each of the received gemstone by the gemstone authenticator once the exterior surface of the rough gemstone has been scanned and the pre-polishing attributes are determined. The unique identifier associated with each rough gemstone may be known as Gemstone

Unique Identifier (GUID). Further, the gemstone authenticator may store the GUID linked with the set of pre-polishing attributes of the rough gemstone in a computer readable medium. After which, the rough gemstone may be sent for polishing operation.
[0013] Further, the gemstone authenticator may subsequently receive a polished
gemstone. Moreover, the gemstone authenticator may scan an exterior surface of the polished gemstone to determine physical attributes associated with the polished gemstone. Here, the physical attributes of the polished gemstone may include a set of post-polishing attributes associated with the polished gemstone. Furthermore, once the gemstone authenticator determines the physical attributes associated with the polished gemstone, the gemstone authenticator may then authenticate the polished gemstone based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones.
[0014] A method for authentication of a gemstone is also envisaged by the present
subject matter. Accordingly, a plurality of rough gemstones may be received by a gemstone authenticator. As mentioned previously, the rough gemstones may either be bare gemstones which are unprocessed or unpolished gemstones. Further, an exterior surface of a rough gemstone can be scanned to determine physical attributes associated with the rough gemstone for each rough gemstones. Thereafter, the gemstone authenticator can determine, based on the physical attributes, a set of pre-polishing attributes associated with the rough gemstone, the set of pre-polishing attributes including tolerance values linked with each attribute in the pre-polishing attributes. Furthermore, a gemstone unique identifier (GUID) can be associated with the rough gemstone and also linked with the set of pre-polishing attributes of the rough gemstone in a computer readable medium. Subsequently, when a gemstone to be authenticated, i.e., a polished gemstone, is received, an exterior surface of the polished gemstone is scanned to determine physical attributes associated with the polished gemstone. The physical attributes of the polished gemstone can include a set of post-polishing

attributes associated with the polished gemstone. The authentication of the polished gemstone can be performed based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones. For instance, the post-polishing attributes associated with the polished gemstone and the pre-polishing attributes associated with the plurality of rough gemstones can be compared to each other to identify whether the polished gemstone matches any of the GUIDs of the rough gemstones to authenticate the polished gemstone.
[0015] Thus, the present subject matter relates to techniques of authentication of
the gemstones, specifically, a quick and accurate gemstone authentication system and a method thereof which can authenticate the gemstone without requiring skilled labour. Since, the authentication of the gemstone is automatic, authentication by an operator is eliminated, thereby eliminating the need of skilled labor. Therefore, the gemstone authentication technique of the present subject matter is independent of human intervention and does not require skilled operator to perform the authentication. Further, incorrect identification of the gemstone due the manual authentication of the gemstone eliminates the chance for human error. Consequently, the gemstone authentication technique as described in the present subject matter is quick and accurate.
[0016] These and other advantages of the present subject matter would be
described in greater detail in conjunction with the following figures. While aspects of gemstone detachment can be implemented in any number of different configurations, the examples are described in the context of the following device(s) and method(s).
[0017] Fig. 1 schematically illustrates a gemstone authentication system 100, in
accordance with an example of the present subject matter. The gemstone authentication system 100 may include a gemstone authenticator 102. In one example, the gemstone authenticator 102 can be implemented in a gemstone planning machine,

whereas, in another example, the gemstone authenticator 102 can be implemented in a gemstone cutting machine. In yet another example, the gemstone authenticator 102 can be partly implemented in the gemstone planning machine and partly implemented in the gemstone cutting machine. In still another example, the gemstone authenticator 102 may be implemented as an entirely different unit, separate from the gemstone cutting machine as well as from the gemstone planning machine.
[0018] In accordance with an example of the present subject matter, the gemstone
authenticator 102 includes a receiver 104. The receiver 104 may receive the gemstone individually. Further, the receiver 104 may receive rough gemstones as well as polished gemstones. In an example, the receiver 104 may also receive the gemstone in batches. Further, the receiver 104 may be configured to include a gemstone holder. In one example, the rough gemstone can be directly mounted on the receiver. In another example, the receiver 104 may be configured to receive the gemstone mounted onto a dope or a gemstone holder. Once the receiver 104 receives the gemstone, the gemstone may be handled further.
[0019] The gemstone authenticator 102 may further include a scanner 106. In an
example, the scanner 106 may include an image capturing device, such as CCD array. Further, the scanner 106, in an example, may include any laser-based image capturing device. The scanner 106 may be configured to scan an exterior surface of a rough gemstone or a polished gemstone. In an example, the scanner 106 may be configured to scan the exterior surface of a rough gemstone to determine physical attributes associated with the rough gemstone for each of the gemstones.
[0020] Further, the gemstone authenticator 102 further includes an encoder 108.
In an example, the encoder 108 may be configured to encode the data associated with each of the plurality of gemstone with a unique identifier for each of the gemstone. Further, the encoder 108 encodes all the data of history files and index files and converts thereof into an encoded gemstone data in an acceptable format of a

communication protocol means. The encoder 108 transfers the encoded data to the communication protocol means. Further, in an example, the communication protocol means is configured to transfer the data to a decoder of a gemstone planner or gemstone cutter or to the gemstone authenticator where the gemstone authenticator is implemented as a separate unit or sub-system. The decoder may decode the gemstone data and generate the decoded gemstone data in a data file.
[0021] Further, the gemstone authenticator 102 may further include a computer
readable medium 110 configured to store the encoded data from the encoder 108. The computer readable medium 110 can include any computer-readable medium known in the art including, for example, volatile memory, such as Static-Random Access Memory (SRAM) and Dynamic-Random Access Memory (DRAM), and/or non-volatile memory, such as Read-Only Memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
[0022] Further, the gemstone authenticator 102 may further include a controller
112 which can be operably coupled to the receiver 104, the scanner 106, the encoder 108, and the computer readable medium 110, to control the operation of the various components of the gemstone authenticator 102. Accordingly, the controller 112 can be configured control the operation of the various components of the gemstone authenticator 102, process the data therefrom, and determine whether or the polished gemstone is authentic or not.
[0023] In one example, the controller 112 can be implemented as a
microcontroller, a microcomputer, and/or any device that manipulates signals based on operational instructions. According to said example, controller 112 can include a processor and a device memory. The processor can be a single processing unit or a number of units, all of which could include multiple computing units. The controller 112 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines,

logic circuitries, and/or any devices that manipulate signals, based on operational instructions. Among other capabilities, the controller 112 is provided to fetch and execute computer-readable instructions stored in the device memory. The device memory may be coupled to the controller 112 and can include any computer-readable medium known in the art including, for example, volatile memory, such as Static-Random Access Memory (SRAM) and Dynamic-Random Access Memory (DRAM), and/or non-volatile memory, such as Read-Only Memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
[0024] In operation, the receiver 104 of the gemstone authenticator 102 may
receive the gemstones which may be fed into the gemstone authenticator 102 one by one or in batches. In an example, the rough gemstone can be either a bare gemstone, i.e., a completely unprocessed gemstone. In such a case, the gemstone authenticator 102 may perform the scanning, for instance, in a planning phase. In another example, the rough gemstone can be an unpolished gemstone obtained after performing cutting and sawing operations on the bare gemstone. In such a case, the gemstone authentication may be performed immediately before the rough gemstone is sent for polishing.
[0025] Further, the scanner 106 scans an exterior surface of a rough gemstone to
determine physical attributes associated with the rough gemstone. In an example, the scanner 102 may scan the physical attributes of the gemstone. In an implementation, scanner 106 may scan the physical attributes, including secondary physical attributes, of the received gemstone, rough or polished, which may include but are not limited to shape, weight, colour grade, cut grade, clarity grade, crown height, crown height, crown angle, total depth, star length, cutting depth, lower girdle length, girdle thickness, pavilion angle, pavilion depth, pavilion height, tolerances values and so on.
[0026] Based on the physical attributes determined by the scanner 106, a set of
pre-polished attributes associated with the rough gemstone are determined by the

gemstone authenticator 102. In an example, the set of pre-polishing attributes may include tolerance values linked with each attribute in the pre-polishing attributes.
[0027] Further, as explained above, the encoder 108 may be configured to encode
the data associated with each of the plurality of gemstone with a unique identifier for each of the gemstone. Accordingly, the encoder 108 may associate a unique identifier with each of the received gemstone, once the exterior surface of the rough gemstone has been scanned and the pre-polishing attributes are determined. The unique identifier associated with each rough gemstone may be known as the Gemstone Unique Identifier (GUID). Further, the encoder 108 may store the GUID linked with the set of pre-polishing attributes of the rough gemstone in a computer readable medium. After which, the rough gemstone may be sent for polishing operation. As will be understood, the entire operation explained above is orchestrated and controlled by the controller 112.
[0028] Further, the receiver 104 may subsequently receive a polished gemstone.
The scanner 106 may scan an exterior surface of the polished gemstone to determine physical attributes associated with the polished gemstone. The physical attributes of the polished gemstone may include a set of post-polishing attributes associated with the polished gemstone. Furthermore, once the gemstone authenticator 102 determines the physical attributes associated with the polished gemstone, the controller 112 may then authenticate the polished gemstone based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones.
[0029] To explain the above in a real-time scenario, the rough gemstone, for
instance, a bare gemstone, is received by the gemstone authenticator 102. The gemstone authenticator 102 scans the exterior surface to determine the physical attributes of the rough gemstone. In an example, the physical attributes may include a basic shape and size of the gemstone, such as the length, breadth and height of the

rough gemstone. Further, the gemstone authenticator 102 then determines the pre-polishing attributes based on the physical attributes of the gemstone. In an example, the pre-polishing attributes may include geometry of the rough gemstone, such as the table, crown, girdle, pavilion, number of facets etc. Further, the pre-polishing attributes also include the tolerances values associated with each attribute in the pre-polishing attributes. The tolerances values may be used to identify the gemstone once the gemstone has been polished. In other words, for a bare gemstone, the pre-polishing attributes can include the attributes that the gemstones will have after it has been processed through all the pre-polishing steps, such as cutting, sawing, bruting, etc. Moreover, in an example, the gemstone authenticator 102 may also determine the secondary physical attributes of the gemstone. Further, the gemstone authenticator 102 now associates the rough gemstone and its pre-polishing attributes with the unique identifier, known as the Gemstone Unique Identifier (GUID), and stores the same on a computer readable medium for later use. The gemstone authenticator 102 can perform this for each of the gemstones that are to be authenticated at a later point in time and, therefore, creates a database of pre-polishing attributes for each of the gemstones, each linked with a GUID. The rough gemstones may now be sent for polishing.
[0030] Furthermore, the gemstone authenticator 102 subsequently receives a
polished gemstone which, now, has to be authenticated. The gemstone authenticator 102 now scans the exterior surface of the polished gemstone to determine the physical attributes associated with the polished gemstone. Here, the physical attributes also include the set of post-polishing attributes associated with the polished gemstone. Now, the gemstone authentication system, by the gemstone authenticator 102, authenticates the polished gemstone based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones.

[0031] In an example, the authentication of the gemstone may be performed by
matching the set of post-polishing attributes with the set of pre-polishing attributes of that particular gemstone. The gemstone authenticator 102 then identifies the set of pre-polishing attributes matching to the set of post-processing attributes of that particular gemstone, based on the tolerances values in the set of pre-polishing attributes pre¬determined by the gemstone authenticator 102. If the set of post-polishing attributes of the gemstone matches with the set of pre-polishing attributes of the gemstone, the gemstone can be safely termed as authentic. Moreover, If the set of post-polishing attributes of the gemstone do not match with the set of pre-polishing attributes of the gemstone, the gemstone may be counterfeit or may have been swapped with an inferior quality gemstone. In an example, a part of the authentication process, such as scanning, may be performed on the gemstone planner.
[0032] Specifically, in an example, the gemstone authenticator 102 may identify
the GUID associated with the polished gemstone. Further, the gemstone authenticator 102 may retrieve the corresponding set of pre-polishing attributes associated with the GUID. In addition, the gemstone authenticator 102 may authenticate the polished gemstone based on match between the set of post-polishing attributes determined for the polished gemstone and the pre-polishing attributes retrieved based on the GUID.
[0033] In another example, the gemstone authenticator 102 may match the set of
post-polishing attributes of the polished gemstone with the set of pre-polishing attributes of plurality of rough gemstones. Furthermore, the gemstone authenticator 102 may identify the GUID of the rough gemstone having a highest match of the pre-polishing attributes with the post-polishing attributes of the polished gemstone. Moreover, the gemstone authenticator 102 may match the identified GUID of the rough gemstone with the GUID of the polished gemstone to authenticate the polished gemstone.

[0034] In yet another example, if the gemstone authenticator 102 is unable to
determine a single gemstone or GUID which matches the polished gemstone, the gemstone authenticator 102 may authenticate the polished gemstone based on secondary attributes. For instance, when more than one rough gemstone has a highest match of the pre-polishing attributes with the post-polishing attributes of the polished gemstone the gemstone authenticator 102 may use the secondary attributes. In such a case, the gemstone, authenticator may use a set of secondary post-polishing attributes of the polished gemstone and secondary pre-polishing attributes associated with each of the plurality of rough gemstones.
[0035] Fig. 2 illustrates the process of gemstone authentication, in accordance with
the present subject matter.
[0036] At block 200, one or more rough gemstones are received by the gemstone
authenticator 102. At block 202, the gemstone authenticator 102 scans the exterior surface, by the scanner 106, to determine the physical attributes of the gemstone. In an example, the physical attributes may include a basic shape and size of the gemstone, such as the length, breadth and height of the gemstone. Further, the gemstone authenticator 102 then determines the pre-polishing attributes based on the physical attributes of the gemstone. In an example, the pre-polishing attributes may include geometry of the rough gemstone, such as the table, crown, girdle, pavilion, number of facets etc. Further, the pre-polishing attributes also include the tolerances values associated with each attribute in the pre-polishing attributes. The tolerances values may be used to identify the gemstone once the gemstone has been polished.
[0037] Further, at block 204, the gemstone authenticator 102 now associates
gemstone to the pre-polishing attributes of that particular gemstone with the unique identify, known as the Gemstone Unique Identifier (GUID), by means of the encoder 108. Further, as part of associating the GUID with the gemstone, the gemstone authenticator 102 can stores the same in the computer readable media. Now, the

gemstone authenticator 102 has a set of pre-polishing attributes for each of the gemstone, each linked with a GUID. The rough gemstone may now be sent for polishing.
[0038] Furthermore, at block 206, the gemstone authenticator 102 subsequently
receives polished gemstone which, now, has to be authenticated. At block 208, the gemstone authenticator 102 now scans the exterior surface of the polished gemstone by the scanner 104 to determine the physical attributes associated with the polished gemstone. Here, the physical attributes also include the set of post-polishing attributes associated with the polished gemstone. In an implementation, scanner 106 may scan the physical attributes of the received gemstone which may include but are not limited to shape, weight, colour grade, cut grade, clarity grade, crown height, crown height, crown angle, total depth, star length, cutting depth, lower girdle length, girdle thickness, pavilion angle, pavilion depth, pavilion height, tolerances values and so on.
[0039] Finally, at block 210, the gemstone authentication system, by the gemstone
authenticator, authenticates the polished gemstone based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones.
[0040] In an example, the authentication of the gemstone may be performed by
the gemstone authentication system 100 by matching the set of post-polishing attributes with the set of pre-polishing attributes of that particular gemstone. The gemstone authenticator 102 then identifies the set of pre-polishing attributes matching to the set of post-processing attributes of that particular gemstone, based on the tolerances values in the set of pre-polishing attributes pre-determined by the gemstone authenticator 102. If the set of post-polishing attributes of the gemstone matches with the set of pre-polishing attributes of the gemstone, the gemstone can be safely termed as authentic. Moreover, If the set of post-polishing attributes of the gemstone do not match with the set of pre-polishing attributes of the gemstone, the gemstone may be

counterfeit or may have been swapped with an inferior quality gemstone. In an example, a part of the authentication process, such as scanning, may be performed on a gemstone planner.
[0041] Specifically, in an example, once a polished gemstone is received by the
gemstone authentication system 100, the gemstone authenticator 102 identifies the
GUID of the received polished gemstone. Further, based on the GUID, the gemstone
authenticator 102 obtains the corresponding set of pre-polishing attributes and post-
polishing attributes of the received polishing gemstone. Further, the gemstone
authenticator 102 authenticates the polished gemstone based on match between the set
of post-polishing attributes and the pre-polishing attributes. In such example, for a
particular GUID, if the corresponding set of post-polishing attributes and the pre-
polishing attributes match, then the received polished gemstone can be safely termed
as authentic. However, for a particular GUID, if the corresponding set of post-
polishing attributes and the pre-polishing attributes do not match, the gemstone
authenticator 102 proceeds to match the set of secondary pre and post-polishing
attributes corresponding to the particular gemstone. Moreover, for a particular GUID,
if the corresponding set of secondary post-polishing attributes and the secondary pre-
polishing attributes do not match, then the received polished gemstone can be termed
as counterfeit or may have been swapped with an inferior quality gemstone.
[0042] In another example, the gemstone authenticator 102 may determine the set
of post-polishing attributes of the polished gemstone. Further, based on the set of post-polishing attributes, the gemstone authenticator 102 matches the set of post-polishing attributes of the received polished gemstone with the set of pre-polishing attributes of plurality of rough gemstones stored in the computer readable medium to identify the corresponding GUID associated with the particular gemstone. In such example, the corresponding set of post-polishing attributes and the pre-polishing attributes are matched, a corresponding GUID is identified. If on matching the set of pre and post polishing attributes a GUID is identified, the received polished gemstone can be safely

termed as authentic. However, if on matching the set of pre and post polishing attributes a GUID is not identified, the gemstone authenticator 102 proceeds to match the set of secondary pre and post-polishing attributes corresponding to the particular gemstone. Moreover, if on matching set of secondary post-polishing attributes and the secondary pre-polishing attributes a GUID is not identified, the received polished can be termed as counterfeit or may have been swapped with an inferior quality gemstone.
[0043] Thus, the present subject matter relates to techniques of authentication of
the gemstones, specifically, a quick and accurate gemstone authentication system and a method thereof which can authenticate the gemstone without requiring skilled labour. Since, the authentication of the gemstone is automatic, authentication by an operator is eliminated, thereby eliminating the need of skilled labor. Further, incorrect identification of the gemstone due the manual authentication of the gemstone eliminates the chance for human error. Consequently, the gemstone authentication technique as described in the present subject matter is quick, accurate and eliminates human error.
[0044] Although implementations for gemstone authentication are described, it is
to be understood that the present subject matter is not necessarily limited to the specific features of the systems or methods described herein. Rather, the specific features and methods are disclosed as implementations for gemstone authentication. Various modifications of the disclosed examples, as well as alternate examples of the subject matter, will become apparent to persons skilled in the art upon reference to the description of the subject matter. It is therefore contemplated that such modifications can be made without departing from the scope of the present subject matter as defined.

I/We Claim:
1. A gemstone authentication system (100) comprising:
a receiver (104) configured to receive a plurality of rough gemstones;
a gemstone authenticator (102), comprising a controller (112), configured to:
for each of the plurality of rough gemstones, scan an exterior surface of a rough gemstone to determine physical attributes associated with the rough gemstone, wherein the gemstone authenticator is to determine, based on the physical attributes, a set of pre-polishing attributes associated with the rough gemstone, the set of pre-polishing attributes including tolerance values linked with each attribute in the pre-polishing attributes; and
associate a gemstone unique identifier (GUID) with the rough gemstone and with the set of pre-polishing attributes of the rough gemstone, wherein the GUID is stored in a computer readable medium;
receive, by the receiver (104), subsequently, a polished gemstone;
scan an exterior surface of the polished gemstone to determine physical attributes associated with the polished gemstone, wherein the physical attributes of the polished gemstone include a set of post-polishing attributes associated with the polished gemstone; and
authenticate, by the controller (112), the polished gemstone based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones.

2. The gemstone authentication system (100) as claimed in claim 1, wherein the
rough gemstone is one of a bare gemstone and an unpolished gemstone
obtained after performing processing operations on the bare gemstone.
3. The gemstone authentication system (100) as claimed in claim 1, wherein the
gemstone authenticator (102) is configured to:
identify the GUID associated with the polished gemstone;
retrieve the corresponding set of pre-polishing attributes associated with the GUID; and
authenticate the polished gemstone based on match between the set of post-polishing attributes determined for the polished gemstone and the pre-polishing attributes retrieved based on the GUID.
4. The gemstone authentication system (100) as claimed in claim 1, wherein the
gemstone authenticator (102) is configured to:
match the set of post-polishing attributes of the polished gemstone with the set of pre-polishing attributes of plurality of rough gemstones;
identify the GUID of the rough gemstone having a highest match of the pre-polishing attributes with the post-polishing attributes of the polished gemstone; and
match the identified GUID of the rough gemstone with the GUID of the polished gemstone to authenticate the polished gemstone.
5. The gemstone authentication system (100) as claimed claim 4, wherein the
gemstone authenticator (102) is configured to authenticate the polished
gemstone based on a set of secondary post-polishing attributes of the polished
gemstone and secondary pre-polishing attributes associated with each of the
plurality of rough gemstones, when more than one rough gemstone has a

highest match of the pre-polishing attributes with the post-polishing attributes of the polished gemstone. 6. A method for authentication of a gemstone, the method comprising:
receiving, by a gemstone authenticator (102), a plurality of rough gemstones;
scanning an exterior surface of a rough gemstone to determine physical attributes associated with the rough gemstone for each of the plurality of rough gemstones, wherein the gemstone authenticator is to determine, based on the physical attributes, a set of pre-polishing attributes associated with the rough gemstone, the set of pre-polishing attributes including tolerance values linked with each attribute in the pre-polishing attributes;
associating a gemstone unique identifier (GUID), by an encoder (108), with the rough gemstone and with the set of pre-polishing attributes of the rough gemstone, wherein associating comprises storing the GUID in a computer readable medium;
receiving, subsequently, a polished gemstone;
scanning an exterior surface of the polished gemstone to determine physical attributes associated with the polished gemstone, wherein the physical attributes of the polished gemstone include a set of post-polishing attributes associated with the polished gemstone; and
authenticating the polished gemstone based on the set of post-polishing attributes associated with the polished gemstone and the set of pre-polishing attributes associated with the plurality of rough gemstones.

7. The method for authentication of a gemstone as claimed in claim 6, wherein the rough gemstone is one of a bare gemstone and an unpolished gemstone obtained after performing processing operations on the bare gemstone.
8. The method for authentication of a gemstone as claimed in claim 6, wherein the gemstone authenticator (102) is configured to:
identify the GUID associated with the polished gemstone;
retrieve the corresponding set of pre-polishing attributes associated with the GUID; and
authenticate the polished gemstone based on match between the set of post-polishing attributes determined for the polished gemstone and the pre-polishing attributes retrieved based on the GUID.
9. The method for authentication of a gemstone as claimed in claim 6, wherein
the gemstone authenticator (102) is configured to:
match the set of post-polishing attributes of the polished gemstone with the set of pre-polishing attributes of plurality of rough gemstones;
identify the GUID of the rough gemstone having a highest match of the pre-polishing attributes with the post-polishing attributes of the polished gemstone; and
match the identified GUID of the rough gemstone with the GUID of the polished gemstone to authenticate the polished gemstone.
10. The method for authentication of a gemstone as claimed in claim 9, wherein
the gemstone authenticator (102) is configured to authenticate the polished
gemstone based on a set of secondary post-polishing attributes of the polished
gemstone and secondary pre-polishing attributes associated with each of the
plurality of rough gemstones, when more than one rough gemstone has a

highest match of the pre-polishing attributes with the post-polishing attributes of the polished gemstone.

Documents

Application Documents

# Name Date
1 202021014639-FER.pdf 2024-12-23
1 202021014639-FORM 3 [11-03-2025(online)].pdf 2025-03-11
1 202021014639-STATEMENT OF UNDERTAKING (FORM 3) [01-04-2020(online)].pdf 2020-04-01
2 202021014639-POWER OF AUTHORITY [01-04-2020(online)].pdf 2020-04-01
2 202021014639-FORM-26 [05-12-2021(online)].pdf 2021-12-05
2 202021014639-FER.pdf 2024-12-23
3 202021014639-FORM FOR SMALL ENTITY(FORM-28) [01-04-2020(online)].pdf 2020-04-01
3 202021014639-FORM-26 [05-12-2021(online)].pdf 2021-12-05
3 202021014639-FORM-26 [08-11-2021(online)].pdf 2021-11-08
4 202021014639-AMENDED DOCUMENTS [14-10-2021(online)].pdf 2021-10-14
4 202021014639-FORM FOR SMALL ENTITY [01-04-2020(online)].pdf 2020-04-01
4 202021014639-FORM-26 [08-11-2021(online)].pdf 2021-11-08
5 202021014639-FORM 13 [14-10-2021(online)].pdf 2021-10-14
5 202021014639-FORM 1 [01-04-2020(online)].pdf 2020-04-01
5 202021014639-AMENDED DOCUMENTS [14-10-2021(online)].pdf 2021-10-14
6 202021014639-FORM-26 [10-07-2021(online)].pdf 2021-07-10
6 202021014639-FORM 13 [14-10-2021(online)].pdf 2021-10-14
6 202021014639-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [01-04-2020(online)].pdf 2020-04-01
7 202021014639-OTHERS [17-05-2021(online)].pdf 2021-05-17
7 202021014639-FORM-26 [10-07-2021(online)].pdf 2021-07-10
7 202021014639-DRAWINGS [01-04-2020(online)].pdf 2020-04-01
8 202021014639-DECLARATION OF INVENTORSHIP (FORM 5) [01-04-2020(online)].pdf 2020-04-01
8 202021014639-OTHERS [17-05-2021(online)].pdf 2021-05-17
8 202021014639-PRE GRANT OPPOSITION DOCUMENT [17-05-2021(online)].pdf 2021-05-17
9 202021014639-COMPLETE SPECIFICATION [01-04-2020(online)].pdf 2020-04-01
9 202021014639-PRE GRANT OPPOSITION DOCUMENT [17-05-2021(online)].pdf 2021-05-17
9 202021014639-PRE GRANT OPPOSITION FORM [17-05-2021(online)].pdf 2021-05-17
10 202021014639-FORM-9 [02-04-2020(online)].pdf 2020-04-02
10 202021014639-PRE GRANT OPPOSITION FORM [17-05-2021(online)].pdf 2021-05-17
10 202021014639-Proof of Right [29-09-2020(online)].pdf 2020-09-29
11 202021014639-FORM 18 [02-04-2020(online)].pdf 2020-04-02
11 202021014639-Proof of Right [29-09-2020(online)].pdf 2020-09-29
11 Abstract1.jpg 2020-05-18
12 202021014639-FORM 18 [02-04-2020(online)].pdf 2020-04-02
12 Abstract1.jpg 2020-05-18
13 202021014639-FORM 18 [02-04-2020(online)].pdf 2020-04-02
13 202021014639-FORM-9 [02-04-2020(online)].pdf 2020-04-02
13 202021014639-Proof of Right [29-09-2020(online)].pdf 2020-09-29
14 202021014639-PRE GRANT OPPOSITION FORM [17-05-2021(online)].pdf 2021-05-17
14 202021014639-FORM-9 [02-04-2020(online)].pdf 2020-04-02
14 202021014639-COMPLETE SPECIFICATION [01-04-2020(online)].pdf 2020-04-01
15 202021014639-COMPLETE SPECIFICATION [01-04-2020(online)].pdf 2020-04-01
15 202021014639-DECLARATION OF INVENTORSHIP (FORM 5) [01-04-2020(online)].pdf 2020-04-01
15 202021014639-PRE GRANT OPPOSITION DOCUMENT [17-05-2021(online)].pdf 2021-05-17
16 202021014639-DECLARATION OF INVENTORSHIP (FORM 5) [01-04-2020(online)].pdf 2020-04-01
16 202021014639-DRAWINGS [01-04-2020(online)].pdf 2020-04-01
16 202021014639-OTHERS [17-05-2021(online)].pdf 2021-05-17
17 202021014639-DRAWINGS [01-04-2020(online)].pdf 2020-04-01
17 202021014639-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [01-04-2020(online)].pdf 2020-04-01
17 202021014639-FORM-26 [10-07-2021(online)].pdf 2021-07-10
18 202021014639-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [01-04-2020(online)].pdf 2020-04-01
18 202021014639-FORM 13 [14-10-2021(online)].pdf 2021-10-14
18 202021014639-FORM 1 [01-04-2020(online)].pdf 2020-04-01
19 202021014639-FORM 1 [01-04-2020(online)].pdf 2020-04-01
19 202021014639-FORM FOR SMALL ENTITY [01-04-2020(online)].pdf 2020-04-01
19 202021014639-AMENDED DOCUMENTS [14-10-2021(online)].pdf 2021-10-14
20 202021014639-FORM-26 [08-11-2021(online)].pdf 2021-11-08
20 202021014639-FORM FOR SMALL ENTITY(FORM-28) [01-04-2020(online)].pdf 2020-04-01
20 202021014639-FORM FOR SMALL ENTITY [01-04-2020(online)].pdf 2020-04-01
21 202021014639-POWER OF AUTHORITY [01-04-2020(online)].pdf 2020-04-01
21 202021014639-FORM-26 [05-12-2021(online)].pdf 2021-12-05
21 202021014639-FORM FOR SMALL ENTITY(FORM-28) [01-04-2020(online)].pdf 2020-04-01
22 202021014639-POWER OF AUTHORITY [01-04-2020(online)].pdf 2020-04-01
22 202021014639-FER.pdf 2024-12-23
22 202021014639-STATEMENT OF UNDERTAKING (FORM 3) [01-04-2020(online)].pdf 2020-04-01
23 202021014639-FORM 3 [11-03-2025(online)].pdf 2025-03-11
23 202021014639-STATEMENT OF UNDERTAKING (FORM 3) [01-04-2020(online)].pdf 2020-04-01
24 202021014639-Statement and Evidence [30-05-2025(online)].pdf 2025-05-30
25 202021014639-FER_SER_REPLY [23-06-2025(online)].pdf 2025-06-23

Search Strategy

1 SearchHistory(11)E_04-12-2024.pdf