Abstract: ABSTRACT “NON-REPRODUCIBLE TRACK AND TRACE DIGITAL VARIABLE SECURITY MARK” The present invention relates to a data authentication method and system for identifying counterfeited or altered printed secure document and determining authentication of a document through digital device such as smart phone and desktop computer. More specifically, the invention discloses a photocopy proof security feature for the authenticity of the product using partially visible code. Herein, the secure document is selected from group of but not limited to paper documents, cartons and labels or any kind of packaging substrate. An end user is able to authenticate the secure document by scanning the security mark through proprietary smart phone or desktop application to check the genuine nature of the product and a report view is provided to identify the circulation of counterfeit product in the market. Figure 2 on sheet no. 2 of the drawings may accompany the abstract when published.
DESC:FIELD OF THE INVENTION
The present invention relates to a system and method for identifying counterfeited or altered printed secure document through electronic devices having a camera, such as smart phones, computing devices. More specifically, the invention discloses a photocopy proof security feature for the authenticity of the product using partially visible code.
BACKGROUND OF THE INVENTION
Counterfeiting is a major problem now days at cost of consumer trust. It’s a crime which involves making of unauthorised replicas of real products to take the advantage of superior value of the imitated product. Data identification and authentication is the process of ensuring the origin and integrity of data. There are various techniques used for identification and authentication in an effort to reduce counterfeiting. The available techniques include visible features, hidden markers, forensic and track & trace etc. In one type of anti-counterfeiting a UV ink is used to identify the product but it has been very common practice to examine UV ink. Combination security marks have also been used which comprises a visible component and an invisible component. The process for printing of mark is performed in two steps and in the same manner reading of mark is carried out in two steps which is a complex method of identification.
One of the techniques very much in use for data authentication is Bar Code which is an optical, machine-readable, representation of data and usually describes something about the object that carries the barcode. We see that a lot of Track and Trace systems are composed with standard barcodes, but these barcodes can be easily generated using openly available barcode technology, by any counterfeiter and fraud is more likely to happen. Further there are some data authentication systems which have a photocopy proof feature for secure physical document.
US6354501B1 discloses a composite authentication mark which includes a bar code portion that is visible when illuminated with visible light and an invisible code portion that is not visible when illuminated with visible light, wherein the bar code portion includes a plurality of bars and spaces and the invisible code portion is arranged in at least one of the spaces of the bar code portion without overlapping any of the bars of the bar code portion. Because the invisible code portion does not overlap with any of the bars of the bar code portion, a single-step printing and reading processes may be used.
US6536672B1 discloses a product authentication system and method employs a unique mark that is simple and cost-effective but provides several layers of protection, including anti-counterfeit and anti-diversion, against counterfeiters. The unique mark contains a product control code that is printed in invisible ink comprising a UV ink and an IR ink. The first layer of protection is invisibility. The second layer of protection is the code itself. The third layer of protection is the presence of the IR ink in the invisible code. The fourth layer of protection is the presence of the IR emitting characteristics of the invisible code. The drawback of this type of mark authentication is that it comprises several layers which are difficult to identify and takes much time.
Therefore, there is a need of development of technology that shall reduce time spent in identifying and authenticating the product security mark.
OBJECT OF THE INVENTION
The main object of the present invention is to provide a system and method for product authentication.
Another object of the present invention is to provide an anti-counterfeit security mark which is partially visible to naked eye.
Yet another object of the present invention is to provide track and trace solution to any printed secure document.
Yet another object of the present invention is to provide a security mark which can be used to guarantee the product authenticity by scanning secure mark through smart phone application or desktop application.
Still another object of the present invention is to provide cost effective anti-counterfeit solution for the authentication of security mark.
SUMMARY OF THE INVENTION
The present invention encompasses a data authentication method and system for securing and determining authentication of a document. Herein, the secure document is selected from group of but not limited to paper documents, cartons and labels or any kind of packaging substrate. An end user is able authenticate the secure document by scanning the security mark through proprietary smart phone or desktop application.
In an embodiment of the present invention a system for generation and authentication of the security mark is disclosed. The system comprises a security mark generating unit and a security mark authenticating unit; wherein the security mark generating unit generates an anti-counterfeit security mark which is partially visible to naked eye to ensure the authenticity of the security mark even after photocopy of the secure document; the authenticating unit validates the security mark by scanning encoded data and checks the authenticity The said system additionally provides a feature of report view optional for user to permit a product owner to identify the circulation of counterfeit product in the market by viewing a set of information obtained from said authenticating unit.
In another embodiment of the present invention, a method for generating and authenticating the security mark is disclosed. The method comprising the steps of: a) generating an anti-counterfeit security mark encoded with unique identifier and a photo copy proof feature through a security mark generating unit; b) validating anti-counterfeit security mark as obtained in step (a) by scanning the mark using security mark authenticating unit. Optionally a report view is used for viewing a set of information as obtained by scanning the encoded data; wherein the set of information includes but not limited to product details and scanning history details of products such as location from where it is scanned, device id, scan date and time.
In another embodiment of the present invention, a method of generation of security mark is disclosed. Security mark is generated using the provided information such as product identifier or product details by encoding machine readable codes through proprietary encoding technique. Product id and product details such as id no., name, type (category), price etc. are either stored in database or in the remote database server referenced by the product id encoded in the security mark. Security mark signature comprises of said provided encoded information and may include a photo copy proof feature. Security mark signature is generated after applying photocopy proof feature.
In another embodiment, the present invention provides a security mark which is an anti-counterfeit security mark and is partially visible to naked eye. Each security mark is encoded with unique identifier by using proprietary encryption technique, for authentication and providing track and trace solution to any printed secure document. Also, partially visible feature is applied to the security mark to ensure the authenticity of the security mark even after photocopy of the secure document.
In another embodiment of the present invention, method of generation of at least one photocopy proof feature is disclosed. The photocopy proof feature is generated by creating a dot pattern based on generation process. A plurality of dot patterns are created on security mark signature wherein each dot in security mark is placed in a set of smaller dots instead of single dot to make this photocopy proof feature invisible. The dot pattern enhances the authenticity of the product.
In another embodiment of the present invention, an authentication method is provided by scanning the secure mark through smart phone application or desktop application. After scanning, the security mark region is detected and cropped to remove noise to get security mark signature. The validity of security mark is checked by reading the encoded data and checking the authenticity. Product information is fetched from database when security mark is verified. When all the information is fetched, the result is displayed and history details such as location from where it is scanned, device id, scan date and time and product identifier are updated in a server database.
In another embodiment of the present invention, a user optional report view is provided that enables tracking of origin and history of the products. When the product is scanned the history details such as location from where it is scanned, device id, scan date and time, and product identifier are stored in the server database. A server is provided with a web monitoring system from where a report is viewed and downloaded. A filter is provided to select a data that is required and the filtered report is displayed.
BRIEF DESCRIPTION OF THE DRAWINGS
A complete understanding of the system and method of the present invention may be obtained by reference to the following drawings:
Figure 1 show the photocopy proof feature of the security element in accordance to an embodiment of the present invention.
Figure 2 shows the block diagram of non-reproducible track and trace digital variable security mark system in accordance to an embodiment of the present invention.
Figure 3 shows the method for generating, authenticating and report viewing of non-reproducible track and trace digital variable security mark.
Figure 4 shows the flow process of generation of security mark in accordance to an embodiment of the present invention.
Figure 5 shows the block diagram for security mark generation in accordance to an embodiment of the present invention.
Figure 6 shows the flow process of security mark authentication in accordance to an embodiment of the present invention.
Figure 7 shows the block diagram for security mark authentication in accordance to an embodiment of the present invention.
Figure 8 shows the flow process of report view in accordance to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
The present invention will now be described hereinafter with reference to the accompanying drawings in which a preferred embodiment of the invention is shown. This invention may, however, be embodied in many different forms and should not be construed as being limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough, and will fully convey the scope of the invention to those skilled in the art.
The present invention discloses a system and method for authenticating and securing non-reproducible track and trace digital security mark in order to maintain the genuineness of the secure document printed on security mark of any product. Herein, the secure document is selected from group of but not limited to paper documents, cartons and labels or any kind of packaging substrate. An end user is able to authenticate the secure document by scanning the security mark through proprietary smart phone or desktop application.
In an embodiment, the present invention provides a system and method for generation and authentication of the security mark. Security mark is an anti-counterfeit security mark which is partially invisible to naked eye. Each security mark is encoded with unique identifier by using proprietary encryption technique, for authentication and providing track and trace solution to any printed secure document. Also, partially visible feature is applied to the security mark to ensure the authenticity of the security mark even after photocopy of the product or secure document.
In another embodiment of the present invention, method of generation of security mark is disclosed. Security mark is generated using information such as product identifier or product details by encoding machine readable codes through proprietary encoding technique. Product id and product details such as id no., name, type (category), price etc. are either stored in database or in the remote database server referenced by the product id encoded in the security mark. Security mark signature comprises of said provided encoded information and may include a photo copy proof feature. Security mark signature is generated after applying photocopy proof feature.
In another embodiment of the present invention, method of generation of at least one photocopy proof feature is disclosed. The photocopy proof layer is generated by creating a dot pattern based on generation process. A plurality of dot patterns are created on security mark signature wherein each dot in security mark is placed in a set of smaller dots instead of single dot to make this photocopy proof feature invisible.
Referring to Figure 1, the photocopy proof feature of the security element is illustrated. This security element i.e. security mark signature comprises of a security mark having a photocopy proof feature. Security mark is an anti-counterfeit security mark which is partially invisible to naked eye. Each security mark is encoded with unique identifier by using proprietary encryption technique, for authentication and providing track and trace solution to any printed secure document. The photocopy proof feature is a set of smaller dots instead of single dot to make this feature invisible to naked eye wherein set of smaller dots are placed at specific distance and having specific size.
Now referring to Figure 2, a system for generation and authentication and a user optional report view of a non-reproducible track and trace digital variable security mark is illustrated. The system comprising a security mark generating unit for generating an anti-counterfeit security mark by combining both i.e. encoded product details and a photocopy proof feature together to ensure the authenticity of the security mark even after photocopy of the secure document; a security mark authenticating unit to validate the generated security mark by scanning the security mark through smartphone application or desktop application; and the user optional report view as per user choice displays the results and allows a product owner to identify the circulation of counterfeit product in the market by viewing a set of information like product details and scanning history details of products such as location from where it is scanned, device id, scan date and time and alike.
Now referring to Figure 3, a method for generating, authenticating and optionally report viewing of a non-reproducible track and trace digital variable security mark is illustrated. The method comprising the steps of: a) generating an anti-counterfeit security mark encoded with unique identifier and a photo copy proof feature through a security mark generating unit; b) validating anti-counterfeit security mark as obtained in step (a) by scanning the encoded data in a security mark authenticating unit through smartphone or desktop application. Optionally, a user as per choice is able to view a set of information like product details and scanned history details of products such as location from where it is scanned, device id, scan date and time by a report viewer to identify the circulation of counterfeit product in the market.
Figure 4 depicts the flow process of generation of security mark comprising fetching the product identifier to encode in security mark and encoding of information is done through proprietary encoding technique including but not limited to AES (Advanced Encryption Standard), triple data encryption standard and alike. Product id and product details are either stored in database or in the remote database server referenced by the product id encoded in the security mark. Security mark signature is generated after applying photocopy proof feature that comprises dot pattern with set of smaller dots instead of single dot to make this photocopy proof feature invisible.
Figure 5 depicts the block diagram for security mark generation comprising an input database and server database for storing data of the products. The details of products including but not limited to product details such as product id no., name, type (category), price and alike. The product details are then encrypted through proprietary encoding technique and by using error correction codes generating a unique data i.e. security mark signature. The generated output image i.e. security mark signature is formed after applying the photocopy proof feature and is then printed on the product.
Figure 6 depicts the flow process of security mark authentication comprising of capturing and scanning the secure mark through smart phone application or desktop application. After scanning, the security mark region is detected and cropped to remove noise to get security mark signature. Noise removal procedure comprising of three steps: (1) calculate the dot size based on security mark size; (2) extracting the specific size dots using morphological operation; (3) checking the inner smaller set of dots to authenticate the security mark. The validity of security mark is checked by reading the encoded data and checking the authenticity. Product information is fetched from database when security mark is verified. When all the information is fetched, the result is displayed and history details such as location from where it is scanned, device id, scan date and time and product identifier are updated in a server database.
Figure 7 depicts the block diagram for security mark authentication comprising the process of receiving the product with security mark signature and capturing the security mark signature present on the security mark through smart phone application or desktop application. The captured image is then processed to retrieve the security mark signature. The security mark signature is verified for its genuineness and the data is decrypted. The decrypted data is then validated by comparing with the product data present in server database and the final validated data is displayed on the screen.
Figure 8 depicts flow process of user optional report view that track the origin and history of your products. When the product is scanned the history details such as location from where it is scanned, device id, scan date and time, and product identifier are stored in the server database. A server is provided with a web monitoring system from where a report is viewed and downloaded. In the web monitoring system, a filter is provided to select data that is required such as location etc. and the filtered report with required details is displayed.
The present invention provides a system and method that involves the development of non-reproducible track and trace digital variable security mark and checks its authenticity through the digital devices such as smart phone, desktop computers or any other embedded devices. The security mark comprises of a security mark signature for securing the mark from any fraud, copying or duplication. The security mark signature is formed by merging a photocopy proof feature and encoded product details together.
The authentication is provided by scanning the secure mark through smart phone application or desktop application. After scanning, the security mark region is detected and cropped to remove noise to get security mark signature. The validity of security mark is checked by reading the encoded data and checking the authenticity. Product information is fetched from database when security mark is verified. When all the information is fetched, the result is displayed and history details such as location from where it is scanned, device id, scan date and time and product identifier are updated in a server database.
This invention has a great advantage of having non-manual verification of genuineness, this prevents major counterfeits that used to happen in manual verification of authenticity. Since authentication process is completely digital, authenticity of the product may be checked using smart phone or desktop application or Embedded device.
Many modifications and other embodiments of the invention set forth herein will readily occur to one skilled in the art to which the invention pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
,CLAIMS:CLAIMS
We claim:
1. A system for generation and authentication of a non-reproducible track and trace digital variable security mark on a secure document comprising:
a) a security mark generating unit; and
b) a security mark authenticating unit;
wherein;
the security mark generating unit generates the non-reproducible track and trace digital variable security mark which is partially visible to naked eye and photocopy proof to ensure the authenticity of the security mark;
the security mark authenticating unit validates the non-reproducible track and trace digital variable security mark by scanning and validating information stored in said mark; and
a report viewer optionally provides a report comprising information of circulation of a product with said mark.
2. The system as claimed in claim 1, wherein non-reproducible track and trace digital variable security mark comprises of a security mark signature encoded with a unique identifier and a photo copy proof feature.
3. The system as claimed in claim 2, wherein said unique identifier includes product details such as but not limited to product id no., name, type, category, price and alike.
4. The system as claimed in claim 1, wherein the photocopy proof feature is partially visible and comprises a plurality of dot patterns with each dot comprising a set of smaller dots.
5. The system as claimed in claim 1, wherein the information of circulation includes is but not limited to product details and scanned history details comprising a record of location from where it is scanned, device id, scan date and time.
6. The system as claimed in claim 1, wherein the secure document is selected from group of but not limited to paper documents, cartons and labels or any kind of packaging substrate.
7. A method for generating and authenticating a non-reproducible track and trace digital variable security mark comprising the steps of:
(a) generating the non-reproducible track and trace digital variable security mark encoded with a unique identifier and a photo copy proof feature; and
(b) authenticating said mark as obtained in step (a) by scanning said mark though a security mark authenticating unit;
wherein;
said mark is generated by fetching the unique identifier, encoding using a proprietary encoding technique and applying a photocopy proof feature to obtain the non-reproducible track and trace digital variable security mark; and
said mark is authenticated by capturing and scanning the non-reproducible track and trace digital variable security mark, removing noise from scanned mark and validating the mark by extracting the product details and photocopy proof feature.
8. The method as claimed in claim 7, wherein the unique identifier includes product details such as but not limited to product id no., name, type, category, price and alike.
9. The method as claimed in claim 7, wherein the photocopy proof feature is partially visible and comprises a plurality of dot patterns with each dot comprising a set of smaller dots.
10. The method as claimed in claim 7, wherein the scanning of said encoded data is performed using an application in a digital device including but not limited to smart phone, desktop computer or embedded device.
| # | Name | Date |
|---|---|---|
| 1 | 201941007772-ABSTRACT [08-08-2022(online)].pdf | 2022-08-08 |
| 1 | 201941007772-STATEMENT OF UNDERTAKING (FORM 3) [27-02-2019(online)].pdf | 2019-02-27 |
| 1 | 201941007772-US(14)-HearingNotice-(HearingDate-02-06-2025).pdf | 2025-04-17 |
| 2 | 201941007772-ABSTRACT [08-08-2022(online)].pdf | 2022-08-08 |
| 2 | 201941007772-CLAIMS [08-08-2022(online)].pdf | 2022-08-08 |
| 2 | 201941007772-PROVISIONAL SPECIFICATION [27-02-2019(online)].pdf | 2019-02-27 |
| 3 | 201941007772-CLAIMS [08-08-2022(online)].pdf | 2022-08-08 |
| 3 | 201941007772-COMPLETE SPECIFICATION [08-08-2022(online)].pdf | 2022-08-08 |
| 3 | 201941007772-FORM 1 [27-02-2019(online)].pdf | 2019-02-27 |
| 4 | 201941007772-FIGURE OF ABSTRACT [27-02-2019(online)].jpg | 2019-02-27 |
| 4 | 201941007772-DRAWING [08-08-2022(online)].pdf | 2022-08-08 |
| 4 | 201941007772-COMPLETE SPECIFICATION [08-08-2022(online)].pdf | 2022-08-08 |
| 5 | 201941007772-FER_SER_REPLY [08-08-2022(online)].pdf | 2022-08-08 |
| 5 | 201941007772-DRAWINGS [27-02-2019(online)].pdf | 2019-02-27 |
| 5 | 201941007772-DRAWING [08-08-2022(online)].pdf | 2022-08-08 |
| 6 | 201941007772-OTHERS [08-08-2022(online)].pdf | 2022-08-08 |
| 6 | 201941007772-FER_SER_REPLY [08-08-2022(online)].pdf | 2022-08-08 |
| 6 | 201941007772-DECLARATION OF INVENTORSHIP (FORM 5) [27-02-2019(online)].pdf | 2019-02-27 |
| 7 | 201941007772-OTHERS [08-08-2022(online)].pdf | 2022-08-08 |
| 7 | 201941007772-FORM-26 [02-05-2019(online)].pdf | 2019-05-02 |
| 7 | 201941007772-FER.pdf | 2022-04-29 |
| 8 | 201941007772-FER.pdf | 2022-04-29 |
| 8 | 201941007772-FORM 18 [27-10-2021(online)].pdf | 2021-10-27 |
| 8 | Correspondence by Agent_Form26_08-05-2019.pdf | 2019-05-08 |
| 9 | 201941007772-COMPLETE SPECIFICATION [27-02-2020(online)].pdf | 2020-02-27 |
| 9 | 201941007772-FORM 18 [27-10-2021(online)].pdf | 2021-10-27 |
| 9 | 201941007772-Proof of Right (MANDATORY) [19-08-2019(online)].pdf | 2019-08-19 |
| 10 | 201941007772-COMPLETE SPECIFICATION [27-02-2020(online)].pdf | 2020-02-27 |
| 10 | 201941007772-DRAWING [27-02-2020(online)].pdf | 2020-02-27 |
| 10 | Correspondence by Agent_Assignment_28-08-2019.pdf | 2019-08-28 |
| 11 | 201941007772-DRAWING [27-02-2020(online)].pdf | 2020-02-27 |
| 11 | Correspondence by Agent_Assignment_28-08-2019.pdf | 2019-08-28 |
| 12 | 201941007772-COMPLETE SPECIFICATION [27-02-2020(online)].pdf | 2020-02-27 |
| 12 | 201941007772-Proof of Right (MANDATORY) [19-08-2019(online)].pdf | 2019-08-19 |
| 12 | Correspondence by Agent_Assignment_28-08-2019.pdf | 2019-08-28 |
| 13 | Correspondence by Agent_Form26_08-05-2019.pdf | 2019-05-08 |
| 13 | 201941007772-Proof of Right (MANDATORY) [19-08-2019(online)].pdf | 2019-08-19 |
| 13 | 201941007772-FORM 18 [27-10-2021(online)].pdf | 2021-10-27 |
| 14 | 201941007772-FER.pdf | 2022-04-29 |
| 14 | 201941007772-FORM-26 [02-05-2019(online)].pdf | 2019-05-02 |
| 14 | Correspondence by Agent_Form26_08-05-2019.pdf | 2019-05-08 |
| 15 | 201941007772-DECLARATION OF INVENTORSHIP (FORM 5) [27-02-2019(online)].pdf | 2019-02-27 |
| 15 | 201941007772-FORM-26 [02-05-2019(online)].pdf | 2019-05-02 |
| 15 | 201941007772-OTHERS [08-08-2022(online)].pdf | 2022-08-08 |
| 16 | 201941007772-DECLARATION OF INVENTORSHIP (FORM 5) [27-02-2019(online)].pdf | 2019-02-27 |
| 16 | 201941007772-DRAWINGS [27-02-2019(online)].pdf | 2019-02-27 |
| 16 | 201941007772-FER_SER_REPLY [08-08-2022(online)].pdf | 2022-08-08 |
| 17 | 201941007772-DRAWING [08-08-2022(online)].pdf | 2022-08-08 |
| 17 | 201941007772-FIGURE OF ABSTRACT [27-02-2019(online)].jpg | 2019-02-27 |
| 17 | 201941007772-DRAWINGS [27-02-2019(online)].pdf | 2019-02-27 |
| 18 | 201941007772-FIGURE OF ABSTRACT [27-02-2019(online)].jpg | 2019-02-27 |
| 18 | 201941007772-FORM 1 [27-02-2019(online)].pdf | 2019-02-27 |
| 18 | 201941007772-COMPLETE SPECIFICATION [08-08-2022(online)].pdf | 2022-08-08 |
| 19 | 201941007772-CLAIMS [08-08-2022(online)].pdf | 2022-08-08 |
| 19 | 201941007772-FORM 1 [27-02-2019(online)].pdf | 2019-02-27 |
| 19 | 201941007772-PROVISIONAL SPECIFICATION [27-02-2019(online)].pdf | 2019-02-27 |
| 20 | 201941007772-ABSTRACT [08-08-2022(online)].pdf | 2022-08-08 |
| 20 | 201941007772-PROVISIONAL SPECIFICATION [27-02-2019(online)].pdf | 2019-02-27 |
| 20 | 201941007772-STATEMENT OF UNDERTAKING (FORM 3) [27-02-2019(online)].pdf | 2019-02-27 |
| 21 | 201941007772-STATEMENT OF UNDERTAKING (FORM 3) [27-02-2019(online)].pdf | 2019-02-27 |
| 21 | 201941007772-US(14)-HearingNotice-(HearingDate-02-06-2025).pdf | 2025-04-17 |
| 22 | 201941007772-FORM-26 [30-05-2025(online)].pdf | 2025-05-30 |
| 23 | 201941007772-Correspondence to notify the Controller [30-05-2025(online)].pdf | 2025-05-30 |
| 24 | 201941007772-Written submissions and relevant documents [17-06-2025(online)].pdf | 2025-06-17 |
| 25 | 201941007772-RELEVANT DOCUMENTS [17-06-2025(online)].pdf | 2025-06-17 |
| 26 | 201941007772-MARKED COPIES OF AMENDEMENTS [17-06-2025(online)].pdf | 2025-06-17 |
| 27 | 201941007772-FORM 13 [17-06-2025(online)].pdf | 2025-06-17 |
| 28 | 201941007772-AMMENDED DOCUMENTS [17-06-2025(online)].pdf | 2025-06-17 |
| 29 | 201941007772-PatentCertificate11-09-2025.pdf | 2025-09-11 |
| 30 | 201941007772-IntimationOfGrant11-09-2025.pdf | 2025-09-11 |
| 1 | 201941007772E_29-04-2022.pdf |