Sign In to Follow Application
View All Documents & Correspondence

“Multitenant Counterfeit Product Detection Digital Warranty Management System With Bilayer Encrypted Machine Readable Codes

Abstract: ABSTRACT : “MULTITENANT COUNTERFEIT PRODUCT DETECTION DIGITAL WARRANTY MANAGEMENT SYSTEM WITH BILAYER ENCRYPTED MACHINE-READABLE CODES” 5 The method to applying Bi-layer cryptography on machine-readable codes like QR codes/Bar codes(7) with a common key for encrypting details of manufactures and a unique manufacturer-specific crypt key(2) for each manufacturer to identify counterfeit products in real-time and warranty management. The system is designed to work for both single tenancy and multi-tenancy models to support several 10 manufactures and products in a single set-up. The readable code through mobile Applications or online through the browser interface(12). In the process first, a common encryption key(5) is used to get details of the manufacturer then a manufacturer-specific key(2) is used for decryption(11) of the product details(1) which is further verified against details stored in the server. Product will be 15 identified as counterfeit if decryption(11) fails or product details(1) are not available in the database, if applicable warranty details will be shown to the user.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
01 October 2021
Publication Number
42/2021
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
parulchaturvedi@yahoo.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-02-17
Renewal Date

Applicants

Artibraino Private Limited
11, Vakil Garden City, Tallaghattapura, Kanakapura Road, Bangalore

Inventors

1. Kumar Sindhurakshit
11, Vakil Garden City, Tallaghattapura, Kanakapura Road, Bangalore
2. Swarakshita Sindhurakshit
11, Vakil Garden City, Tallaghattapura, Kanakapura Road, Bangalore

Specification

Claims:We Claim:
1. The system for multitenant counterfeit product detection and digital warranty
management system with bilayer encrypted machine-readable codes(7)
comprising of :
a. Artibraino cloud based Smart Product Verification System
10 b. Engraver printers
c. Manufacturers specific key for product information and common cipher key
for all manufacturer details(4).
d. To validate the authenticity of the product using a mobile device/computer
interface/processor
15 e. Decrypter
- wherein artibraino smart product verification system and Digital Warranty
Management System characterized by end-to-end tracking of the product
using the tamper-proof methodology.
- Wherein it scans the printed/engraved machine-readable code(7) through a
20 mobile App or webcam(12) scanning as said machine-readable encrypted
codes (Bard code/QR code), wherein Bi-layer cryptography secured
manufacturer-specific encryption/cipher key for product details(1), and
common encryption/cipher key for manufacturers ensuring all information
is secured at the same time. Wherein it comprises all communications
25 channels secured by using the Secure Socket layer. As said, it atleast
supports multi-tenancy as manufacturing details are not included in the ID.
- Wherein as said cloud storage infrastructure is the hardware and software
framework which supports the computing requirements of a cloud storage
service including a hardware abstraction layer.
30 - Wherein Decrypter is used in Mobile app/web interface/connected scanner
to decrypt manufacture details using bilayer cryptography by cipher
encryption method for security.
12
5 - wherein, the Customer can scan and verify generated code online or
through the App Applied Machine Intelligence and engraver printer to
print.
2. The method for multitenant counterfeit product detection and digital warranty
management system with bilayer encrypted machine-readable codes
10 (7)comprising of;
− all communication channels secured with SSL (secured socket layer)
a. In the reception process Step, 0 Manufacturers choose an encryption key
that gets securely stored on the server.
b. In the determination process Step 1 &2, the said manufacturer generates
15 machine-readable codes secured by his unique encryption key(5) with
product details(1) as desired.
c. In the transmission process Step 3, 4, and 5, In step 3, encrypted details are
passed for the second layer of encryption where manufacturer details(4) get
added, and then complete information is encrypted e-readable code get
20 permanently printed/engraved on the product.
d. In the Invalidation Steps, 11-18, a Product with machine-readable code is
scanned to validate its originals again using a common encryption
key(5)with inputs from steps 4 and 5.
e. In transmission Step 8, 9, 10, In step 8, encrypted details get stored in the
25 central storage and machine and generate digital secure warranty card if the
sale is made.
f. In Steps 19-24, Anyone can verify product originality by scanning
QR/Bar/machine readable code.
3. The method for multitenant counterfeit product detection as claimed in claim 2,
30 wherein QR codes are generated and randomly verified on multiple platforms
including Windows, Linux (Ubuntu 18. x), and other platforms supporting Java
Technology.
4. The method for multitenant counterfeit product detection as claimed in claim 2,
wherein the QR codes(8) have been tested with normally lesser printers, and
13
5 engravers to verify it works practically on various products like LED, Smart
Plugs, etc.
5. The method for multitenant counterfeit product detection as claimed in claim 2,
wherein the various tests liked unit testing, integration testing, regression testing,
acceptance testing has been performed by a mobile application(12) on various
10 models covering different scenarios.
6. The method for multitenant counterfeit product detection as claimed in claim 2,
wherein the Manufacturer prints secure code generated with product details(1).
7. The method for multitenant counterfeit product detection as claimed in claim 2,
wherein the Code gets scanned and recorded in the supply chain and transaction
15 get recorded wherein, the Customer can scan and verify generated code online
or through the App Applied Machine Intelligence.
8. The method for multitenant counterfeit product detection as claimed in claim 2,
wherein the cryptographically Bi-Layer secured machine-readable codes, with
encryption keys unique to each manufacturer for product information and
20 common cipher key for all manufacturer details(4).
9. The method for multitenant counterfeit product detection as claimed in claim 2,
wherein the Create QR code use Artibraino QR code generator(2) desktop
software powered with cryptography to generate temper proof QR code(9) for
product label.
25 10. The method for multitenant counterfeit product detection as claimed in claim
2, wherein Scanning the QR code(8) on the product to update product inventory
or to generate warranty card and validating the product warranty(13) the simply
scanning QR code(8) through browser or mobile(12) to assert if the product is
original and its details including warranty validity date if applicable.
30 Dated
30th Sep 2021
Patent Agent of the Applicant

Parul Chaturvedi(IN-PA 3286 , Description:5 TECHNICAL FIELD OF THE INVENTION:
This invention relates to applying Bi-layer cryptography on machine-readable
codes like QR codes/Bar codes(7) with a common key for encrypting details of
manufactures and a unique manufacturer-specific crypt key for each manufacturer
to identify counterfeit products in real-time and warranty management.
10 BACKGROUND AND PRIOR ART AND PROBLEM IN PRIOR ART:
Background description includes information that may be useful in understanding
the present disclosure. It is not an admission that any of the information provided
herein is prior art or relevant to the present disclosure, or that any publication
specifically or implicitly referenced is prior art
15 Counterfeit products are growing exponentially with the enormous amount of
online and black-market, so there is a strong need to address the challenges of
detecting counterfeit products and designing appropriate technology to improve
detection accuracy. This is one of the active research areas to be explored in the
current world. Another problem this invention address is secure digital warranty
20 management, by using cryptographically secured codes to avoid and detect any
manipulation in warranty information.
Counterfeiters creates serious problems for authentic businesses, but too many
people are unaware of the full extent of the impact of counterfeit goods on brands.
Key impacts of counterfeit include but are not limited to damaging authentic
25 brands’ reputations. Stealing sales by undercutting prices. Leaving companies to
deal with the fallout of counterfeits like false returns. Harming the long-term trust
built with business partners. These impacts of counterfeit goods on an organization
run deeply and can cause long-lasting damage. Brands will see a sales hit once the
problem becomes widespread since counterfeiters can undercut them on price.
30 Counterfeiting and duplication is a serious issue for all product manufacturers
around the globe which can affect the company's name, company revenue, and
consumer health. Finding the authenticity of a product is the biggest challenge.
Counterfeit and duplicate products are causing a major downturn in the world
market. Thus, product makers are targeting huge losses and benefits. India and other
countries are lighting such counterfeit and duplicate products. Another challenge is
having digital warranty management, although there are solutions, they are prone
to temper in the warranty card, this invention ensures no tampering by using
cryptographically secured code on the product and warranty details in the secure
10 environment. This invention makes identifying counterfeit products as simple as
scanning the printed/engraved machine-readable code(7) through a mobile App or
webcam(12)
The two prior art are found which look similar while analyzing the key differences
are found US20140101063A1:
15 1. It does not support multi-tenancy as manufacturer details(4) are not included in
the ID, this is one of the key novelties of the current solution.
2. It is a rule/threshold-based system, trying to use product features like colour, size,
image, etc., or other rules for counterfeit detection. The current invention uses a
secured product identifier with an exact match.
20 3. Information may or may not be secure making it easy to counterfeit by mimicking
the pattern of information. In the current Artibraino invention, Bi-layer
cryptography with a unique key for each manufacturer makes it high resistance to
counterfeiting.
4. It does not support digital warranty management, Artibraino invention includes
25 secured digital warranty management.
5. Communication channels are not secured. The current invention uses secure
(SSL). channel for communication.
US7222791B2:
1. Uses unsecured labels, this pattern can be easily mimicked by a counterfeiter. In
30 the current innovation Bi-layer cryptography with a unique key for each
manufacturer makes its high resistance to counterfeiting.
5 2. It does not support multi-tenancy as manufacturing details are not included in the
ID, this is one of the key novelties of the current solution.
3. It does not support digital warranty management, Artibraino invention includes
secured digital warranty management.
4. Communication channels are not secured. Artibraino invention uses a secure
10 (SSL) channel for communication.
THE OBJECT OF THE INVENTION :
The present object of the invention is applying Bi-layer cryptography on machinereadable codes like QR codes/Bar codes(7).
Another object of the invention is a common key for encrypting details of
15 manufactures(4) and a unique manufacturer-specific crypt key for each
manufacturer to identify counterfeit products in real-time and warranty
management.
It is therefore the object of the invention to overcome the other drawbacks in prior
device/system/apparatus.
20 The further object of the invention is system is designed to work for both single
tenancy and multi-tenancy models to support several manufactures and products in
a single set-up.
Yet another objective of the invention is securing machine-readable encrypted
codes (Bard code/QR code) Bi-layer cryptography to secure with manufacturer25 specific encryption/cipher key for product details(1) and common
encryption/cipher key for manufacturer ensuring all information is secured at the
same time secure keys are never passed to the client app/mobile app (12) to ensure
that they are not compromised.
SUMMARY OF THE INVENTION :
30 The present embodiment of the invention relates to applying Bi-layer cryptography
on machine-readable codes like QR codes/Bar codes(7) with a common key for5 encrypting details of manufactures and a unique manufacturer-specific crypt key
for each manufacturer to identify counterfeit products in real-time and warranty
management.
In another embodiment, the system is designed to work for both single tenancy and
multi-tenancy models to support a number of manufactures and products in a single
10 set-up.
In a further embodiment the system and method provide a very unique solution,
there are alternative ways of detection like some AI-powered systems, some
blockchain-based solutions, some solutions based on optical illumination, but they
are not as effective as this.
15 According to the embodiments, the novelty of our solutions is securing machinereadable encrypted codes (Bard code/QR code) Bi-layer cryptography(7) to secure
with manufacturer-specific encryption/cipher key for product details(1), and
common encryption/cipher key for manufacturers ensuring all information is
secured at the same time secure keys are never passed to the client app/mobile app
20 (12) to ensure that they are not compromised. All communications channels are also
secured using the SSL layer.
The foregoing summary is illustrative only and is not intended to be in any way
limiting. In addition to the illustrative aspects, embodiments, and features described
above, further aspects, embodiments, and features will become apparent by
25 reference to the drawings and the following detailed description.
The real functioning of this device is given on this video link and website
https://www.youtube.com/watch?v=TU5MkdW15io
https://www.artibraino.in/
BRIEF DESCRIPTION OF DRAWINGS:
30 It is to be noted, however, that the appended drawings illustrate only typical
embodiments of the present subject matter and are therefore not to be considered
for limiting of its scope, for the invention may admit to other equally effective 5 embodiments. A detailed description is described concerning the accompanying
figures. In the figures, a reference number identifies the figure in which the
reference number first appears. The same numbers are used throughout the figures
to reference features and components. Some embodiments of system or methods or
structure by embodiments of the present subject matter are now described, by way
10 of example, and concerning the accompanying figures, in which:
Fig .1 illustrates real-time counterfeit products detection and diagrammatically
management with Bilayer secure encrypted machine-readable codes(7).
DETAILED DESCRIPTION OF THE INVENTION:
While the embodiments of the disclosure are subject to various modifications and
15 alternative forms, a specific embodiment thereof has been shown by way of
example in the figures and will be described below. It should be understood,
however, that it is not intended to limit the disclosure to the particular forms
disclosed, but on the contrary, the disclosure is to cover all modifications,
equivalents, and alternatives falling within the scope of the disclosure.
20 In the description of the following embodiments, numerous specific details are
outlined to provide a thorough understanding of embodiments of the present
disclosure. It will be apparent to one skilled in the art that embodiments of the
present disclosure may be practiced without some of these specific details.
The terms “comprises”, “comprising”, or any other variations thereof used in the
25 disclosure, are intended to cover a non-exclusive inclusion, such that a device,
system, assembly that comprises a list of components does not include only those
components but may include other components not expressly listed or inherent to
such system, or assembly, or device. In other words, one or more elements in a
system or device proceeded by “comprises… a” does not, without more constraints,
30 preclude the existence of other elements or additional elements in the system or
device.
Throughout the present disclosure, the terms “a” and “an” are intended to denote at
least one of a particular element. As used herein, the term “includes” means includes but is not limited to, the term “including” means including but not limited
to. The term “based on” means based at least in part on.
Reference numeral: 1- Product details
2- Manufacturer specific encryption key
3- Crypt code generator
10 4- Manufacturer details
5- Common encryption key
6- Cloud storage
7- Machine-readable code with bilayer encryption(QR code/Bar code/other code)
8- Print engrave encrypted machine-readable code(QR code/Bar code/other code)
15 9- Product with encrypted machine-readable code(QR code/Bar code/other code)
10- Point of sale Mobile app/web interface/connected scanner
11- Decrypter
12- Mobile app/web interface/connected scanner
13- Product origin warranty if applicable Additional info
20 In the present embodiment of the invention, there are several approaches currently
adapted but none of them effective to identify counterfeit products. Below is a
summary of prevalent approaches to counterfeit detection.
According to an embodiment when technology and features are compared for
counterfeit detection the testing result show Artibriano crypto code is best and
25 better quality in predictive, security, trust, and ease of use in real-time on contrary
to QR code, watermarking algorithm, RFID, hologram, ERP and AI-based image
analysis which show low and medium efficiency.
In another embodiment of an invention, the working principle is shown and step by
step procedure method of working real-time counterfeit products detection and diagrammatically management with Bilayer secure encrypted machine-readable
codes(7).
Below are steps, all communication channels are secured with SSL (secured socket
layer)
Step 0: Manufacturers choose an encryption key(5) that gets securely stored on the
10 server.
Step 1 &2: The manufacturer generates machine-readable codes secured by his
unique encryption key(3) with product details(1) as desired.
Step 3, 4, and 5: In step 3, encrypted details are passed for the second layer of
encryption where manufacturer details(4) get added, and then complete information
15 is encrypted again using a common encryption key(5) with inputs from steps 4 and
5.
Sep 8, 9, 10: In step 8, encrypted details get stored in the central storage and
machine-readable code(7) gets permanently printed/engraved on the product.
Steps 11-18: Product with machine-readable code is scanned to validate its origin
20 and generate digital secure warranty card if the sale is made.
Steps 19-24: Anyone can verify product originality by scanning QR/Bar/machine
readable code through mobile Applications or online through the browser
interface(12). In the process first, a common encryption key(5) is used to get details
of the manufacturer then a manufacturer-specific key (2) is used for decryption(11)
25 of the product details(1) which is further verified against details stored in the server.
Product will be identified as counterfeit if decryption(11) fails or product details(1)
are not available in the database, if applicable warranty details will be shown to the
user.
It should be noted that the description and figures merely illustrate the principles of
30 the present subject matter. It should be appreciated by those skilled in the art that
conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the
present subject matter. It should also be appreciated by those skilled in the art by
devising various arrangements that, although not explicitly described or shown
herein, embody the principles of the present subject matter and are included within
its spirit and scope. The purposes to aid the reader in understanding the principles
10 of the present subject matter and the concepts contributed by the inventor(s) to
furthering the art and are to be construed as being without limitation to such
specifically recited examples and conditions. The novel features which are believed
to be characteristic of the present subject matter, both as to its organization and
method of operation, together with further objects and advantages will be better
15 understood from the following description when considered in connection with the
accompanying figures.
ADVANTAGES OF THE INVENTION :
1. Cryptographically Bi-Layer secured machine-readable codes, with
encryption keys unique to each manufacturer for product information and
20 common cipher key for all manufacturer details(4).
2. With Bi-layer cryptography, it is almost impossible to decode and mimic code
printed/engraved on the product.
3. Can be applied for all type majority of products on which printing or
engraving is possible.
25 4. No additional change in the manufacturing process can work with most of the
existing production and packaging systems.
5. Temper-proof digital warranty management along with counterfeit control.
6. Encryption keys are never transferred/stored on a client like mobile App/Web
Browser(12) etc. Making it a completely secured mechanism.
30 7. All data communication is through an SSL secured channel.
These and other advantages of the present subject matter would be described in
greater detail concerning the following figures. It should be noted that the
description merely illustrates the principles of the present subject matter. It will thus
be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described herein, embody the principles
of the present subject matter and are included within its scope
In another embodiment of the invention, Artibraino cloud-based Smart Product
Verification System and Digital Warranty Management System solves the problem
by end-to-end tracking of the product from factory to the point of sale in a secure
10 manner using the tamper-proof methodology and with a negligible additional cost
per product.
Process/working of the device
1. Manufacturer prints secure code generated with product details(1).
2. Code get scanned and recorded in the supply chain and transaction get recorded.
15 3. Customer can scan and verify generated code online or through the App.
Applied Machine Intelligence.
According to an embodiment of the invention test, Data Analysis Report shown
Having more than a million QR codes are generated and randomly verified on
multiple platforms including Windows, Linux (Ubuntu 18. x), and other platforms
20 supporting Java Technology. In an embodiment, the QR codes(8) have been tested
with normally lesser printers, and engravers to verify it works practically on various
products like LED, Smart Plugs, etc. Various tests liked unit testing, integration
testing, regression testing, Acceptance testing has been performed by a mobile
application on various models(12) covering different scenarios.
25 Dated
30th Sep 2021
Patent Agent of the Applicant

Parul Chaturvedi(IN-PA 3286)

Documents

Application Documents

# Name Date
1 202141044696-POWER OF AUTHORITY [01-10-2021(online)].pdf 2021-10-01
2 202141044696-FORM FOR STARTUP [01-10-2021(online)].pdf 2021-10-01
3 202141044696-FORM FOR SMALL ENTITY(FORM-28) [01-10-2021(online)].pdf 2021-10-01
4 202141044696-FORM 1 [01-10-2021(online)].pdf 2021-10-01
5 202141044696-FIGURE OF ABSTRACT [01-10-2021(online)].jpg 2021-10-01
6 202141044696-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [01-10-2021(online)].pdf 2021-10-01
7 202141044696-EVIDENCE FOR REGISTRATION UNDER SSI [01-10-2021(online)].pdf 2021-10-01
8 202141044696-DRAWINGS [01-10-2021(online)].pdf 2021-10-01
9 202141044696-COMPLETE SPECIFICATION [01-10-2021(online)].pdf 2021-10-01
10 202141044696-FORM 3 [04-10-2021(online)].pdf 2021-10-04
11 202141044696-FORM 3 [04-10-2021(online)]-1.pdf 2021-10-04
12 202141044696-ENDORSEMENT BY INVENTORS [04-10-2021(online)].pdf 2021-10-04
13 202141044696-STARTUP [07-10-2021(online)].pdf 2021-10-07
14 202141044696-FORM28 [07-10-2021(online)].pdf 2021-10-07
15 202141044696-FORM-9 [07-10-2021(online)].pdf 2021-10-07
16 202141044696-FORM 18A [07-10-2021(online)].pdf 2021-10-07
17 202141044696-FER.pdf 2021-11-23
18 202141044696-Correspondence_Startup, DIPP_03-01-2022.pdf 2022-01-03
19 202141044696-OTHERS [31-05-2022(online)].pdf 2022-05-31
20 202141044696-FER_SER_REPLY [31-05-2022(online)].pdf 2022-05-31
21 202141044696-COMPLETE SPECIFICATION [31-05-2022(online)].pdf 2022-05-31
22 202141044696-CLAIMS [31-05-2022(online)].pdf 2022-05-31
23 202141044696-US(14)-HearingNotice-(HearingDate-19-08-2022).pdf 2022-08-04
24 202141044696-US(14)-ExtendedHearingNotice-(HearingDate-22-08-2022).pdf 2022-08-04
25 202141044696-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [19-08-2022(online)].pdf 2022-08-19
26 202141044696-FORM-26 [19-08-2022(online)].pdf 2022-08-19
27 202141044696-US(14)-ExtendedHearingNotice-(HearingDate-08-09-2022).pdf 2022-08-22
28 202141044696-Proof of Right [08-09-2022(online)].pdf 2022-09-08
29 202141044696-FORM 3 [08-09-2022(online)].pdf 2022-09-08
30 202141044696-Annexure [08-09-2022(online)].pdf 2022-09-08
31 202141044696-US(14)-ExtendedHearingNotice-(HearingDate-27-09-2022).pdf 2022-09-21
32 202141044696-Written submissions and relevant documents [11-10-2022(online)].pdf 2022-10-11
33 202141044696-PatentCertificate17-02-2023.pdf 2023-02-17
34 202141044696-IntimationOfGrant17-02-2023.pdf 2023-02-17
35 202141044696-Correspondence_SIPP Scheme_05-04-2023.pdf 2023-04-05

Search Strategy

1 SearchE_19-11-2021.pdf

ERegister / Renewals

3rd: 04 May 2023

From 01/10/2023 - To 01/10/2024

4th: 04 May 2023

From 01/10/2024 - To 01/10/2025

5th: 04 May 2023

From 01/10/2025 - To 01/10/2026