Sign In to Follow Application
View All Documents & Correspondence

System And Method For Creating A Unique Copyproof Code

Abstract: A system to create a unique copy proof code using microbeads is disclosed. The system produces surfaces that can have one or more microbeads with pixels or unique shapes, or surfaces with unique fractal shapes. The pixels provide rates of gradients to hold unique encoded information. Likewise, unique shapes and/or the unique fractal shapes also hold unique encoded information. Surfaces so configured or their combinations can also create unique copy proof codes. In an embodiment, the system is configured as a printer to produce the surfaces. Errors can be introduced in a code created using pre-determined rules and it can be deciphered properly only when such errors are corrected above a threshold value while reading the code.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 September 2017
Publication Number
13/2019
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
info@khuranaandkhurana.com
Parent Application

Applicants

Tech Machinery And More Private Limited
233, Tower-B2, Spaze-i-Tech Park, Sector-49, Sohna Road, Gurugram -122018, Harayana, India.

Inventors

1. KRISHNA, Nishant Kumar
706, S-14, Smondoville, Neotown, Electronic City Phase 1, Bangalore – 560100, Karnataka, India.
2. KEDIA, Gaurav Kumar
Unit No. 233, Tower B2, Spaze I – Tech Park, Sohna Road, Gurgaon– 122002, Haryana, India.
3. DAGA, Binod
Unit No. 233, Tower B2, Spaze I – Tech Park, Sohna Road, Gurgaon– 122002, Haryana, India.

Specification

TECHNICAL FIELD
[0001] The present disclosure relates to systems and methods for creating codes. In particular, present disclosure relates to systems and methods for creating unique copy proof codes that find use in various product tracking and tracing systems such as those for supply chain management and for preventing counterfeiting.
BACKGROUND
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Product identification systems and methods are well established. They include simple labeling solutions moving on to complex bar-coding and the like systems wherein each unit of a product is uniquely identified. Purposes of such systems can as well be manifold. For example, inventory/supply management requires that a product unit be tracked when it is sold to a customer for billing and reordering purposes. A retailer may achieve this by a label printer printing a consecutive code (that can be represented as a barcode, for example ) that is scanned and deciphered by a suitably configured reader at a point of sale (POS) machine that interfaces with accounting and purchasing systems, thereby keeping track of each unit sold and triggering a reorder signal when the balance quantity falls below pre-determined level (the level depending upon approximate delivery time of the product promised by its manufacture to the retailer, factoring in approximate sales during this period so as not to have a stock out situation at the retailer). A manufacturer may like to keep track of each unit of a product sold for similar purposes and also for other aspects such as quality control, product recall, warranty and after sales service. In such situations, a code put on a product can carry information such as date of manufacture and expiry, details of components used in the product etc. Even law enforcement agencies are interested in unique product identification, a simple example being requirement of a unique number plate before a vehicle is declared road worthy. Criminals on the other hand have the objective of removing/faking such identifications in order to gain by selling counterfeit products (as elaborated hereunder) or to remove traces of their crime. For instance as a first step a criminal gang would remove /replace/ counterfeit identification marks on a stolen vehicle such as its number plate, engine 2
identification number etc. so that it is easier for them to use the vehicle for illegal purposes and more difficult for police to locate/capture the stolen vehicle since even if they somehow reach the vehicle, its true identity as a stolen vehicle will not be revealed.
[0004] Counterfeiting of items such as goods, materials, and documents defrauds consumers, tarnishes the brand names of legitimate manufacturers and providers of such items, and can endanger public health (for example, when adulterated foods and drugs are passed off as genuine). Counterfeiting is a hugely lucrative business, with criminals relying on the continued high demand for cheap goods coupled with low production and distribution costs. Nowadays counterfeit products, including counterfeit famous brand products and counterfeit fine art item are often manufactured with the intention to take advantage of the superior value of the imitated product. Some counterfeit products are almost indistinguishable from authentic items by human eyes and even by some testing equipment. At present, counterfeit products are creating a serious problem in many countries in the world resulting in huge economic losses and negatively impacting both consumers and producers of the trustworthy items. For example, when a customer is buying a water bottle, the customer is unaware about the authenticity of the water bottle. The customer is unaware if the water bottle is from an authorized company and contains filtered/mineral water or it is from a local manufacturing company and holds just tap water. This is a generic problem which is faced not only by customers/consumers but also faced by producers of genuine products. Counterfeit products can also disrupt regular economic operations of many countries.
[0005] Advancements in modern technology have led to development of various new and advanced anti-counterfeiting measures that prevent imitation and copying of products without an owner's allowance. Anti-counterfeiting measures have included serial numbers, machine readable identifiers (e.g., barcodes also termed as 1-dimensional or1D codes, and QR codes also termed as 2-dimensional or 2D codes), “tamper-proof/ copy-proof” security labels (e.g., holograms and labels that change state or partly or completely self-destruct on removal), laser stickers, entity particles attached to a product, and remotely detectable tags (e.g., radio-frequency identification tags) applied to items directly or to tags, labels, and/or packaging for such items.
[0006] However, inspite of various developments of anti-counterfeiting measures/ technology using barcode, watermarking, laser printed stickers etc. attached to the products and the like are already well adapted to provide an anti-counterfeit preliminary mechanism, they are not complete. For instance, barcodes on current electronic devices do not have a complete anti-counterfeit mechanism and such measures have themselves been counterfeited. 3
The main reason is that according the conventional anti-counterfeit method, it is difficult to determine whether barcodes, watermarking, laser stickers, entity particles attached to the products and the like are forged due to remaking, recording or replicating them. In light of such counterfeiting, consumers generally have been unable to rely upon such measures in order to verify the authenticity of marked or tagged items.
[0007] Still another disadvantage of present identification systems is the size/visibility of identification marks and codes created. The size increases in proportion to information required to be retrieved from the code and due to inherent limitations of present printing and scanning/retrieving devices. However, a large size makes it equally easier for the code/mark to be copied/cloned/destroyed.
[0008] Hence there is a need in the art for a system and method for creating a copy proof code that is effective in obviating problems as elaborated above.
[0009] All publications herein are incorporated by reference to the same extent as if each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
[0010] In some embodiments, the numbers expressing quantities or dimensions of items, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term “about.” Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0011] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates 4
otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0012] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0013] Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.
OBJECT OF THE INVENTION
[0014] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as listed herein below.
[0015] It is an object of the present disclosure to provide for a system and method to create a code that is not easily visible to the human eye for an anti-counterfeiting system.
[0016] It is another object of the present disclosure to provide for a system and method as above wherein the code created is copy proof, that is, it cannot be copied.
[0017] It is yet another object of the present disclosure to provide for a system and method as above wherein the code created carries large amount of information.
SUMMARY
[0018] This summary is provided to introduce a selection of concepts in a simplified form to be further described below in the Detailed Description. This summary is not intended
5
to identity key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
[0019] The present disclosure relates to systems and methods for creating codes. In particular, present disclosure relates to systems and methods for creating unique copy proof codes that find use in various product tracking and tracing systems such as those for preventing counterfeiting. The term product as used herein can interchangeably be referred as “object”, “article”, “item”, “unit”, “piece”, “device”, “gadget”, “artifact”, or “entity”.
[0020] In an aspect, present disclosure elaborates upon a system to create a unique copy proof code using microbeads, the system including: a non-transitory storage device having embodied therein one or more routines operable to create the code; and one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines can include any or a combination of: a gradient based encoding module, which when executed by the one or more processors, can produce a first surface having a microbead carrying one or more pixels, each of the one or more pixels comprising a color and an intensity, wherein analysis of a set of the one or more pixels can provide a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient can hold a unique first encoded information in a non-copyable manner; a unique shapes based encoding module, which when executed by the one or more processors, can produce a second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner; and a fractals based encoding module, which when executed by the one or more processors, can produce a third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[0021] In an aspect, the system can further include an error introduction module, which when executed by the one or more processors, can introduce at least one error in the code based upon at least one pre-determined rule.
[0022] In another aspect, the system can provide any or a combination of the first surface, the second surface and the third surface in a sequence, wherein the sequence can create the code.
[0023] In yet another aspect, the sequence can be incorporated in a tracker bar configured on the code itself or operatively connected to the code.
[0024] In an aspect, the tracker bar can hold any or a combination of encoding and decoding processes for any or a combination of the one or more pixels, the unique shape and the unique fractal shape, either fully or partially. 6
[0025] In another aspect, the microbeads can be any or a combination of a 2D microbead and a 3D microbead.
[0026] In yet another aspect, the system can be operatively configured as a printer to print the code.
[0027] In an aspect, present disclosure elaborates upon a method of creating a unique copy proof code using microbeads, the method including any or a combination of: producing, using a computing system, a first surface of the code, the first surface having a microbead carrying one or more pixels, each of the one or more pixels comprising a color and an intensity, wherein analysis of a set of the one or more pixels can provide a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient can hold a unique first encoded information in a non-copyable manner; producing , using the computing system, a second surface of the code, the second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner; and producing, using the computing system, a third surface of the code, the third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[0028] In an aspect, the method can further include introducing, using the computing system, at least one error in the code based upon at least one pre-determined rule.
[0029] In another aspect, the method can provide any or a combination of the first surface, the second surface and the third surface in a sequence, and wherein the sequence can create the code.
[0030] In yet another aspect of the method, the sequence can be incorporated in a tracker bar configured on the code itself or operatively connected to the code.
[0031] In an aspect of the method, wherein the tracker bar can hold any or a combination of encoding algorithms and decoding algorithms for any or a combination of the pixel, the unique shape and the unique fractal shape, either fully or partially.
[0032] In another aspect of the method, the microbeads can be any or a combination of a 2D microbead and a 3D microbead.
[0033] In yet another aspect the method can configure a printer to print the code.
[0034] In an aspect, present disclosure elaborates upon a product including a code, wherein the code can include any or a combination of :a first surface having a microbead carrying one or more pixels, each of the one or more pixels comprising a color and an intensity, wherein analysis of a set of the one or more pixels can provide a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the 7
gradient can hold a unique first encoded information in a non-copyable manner; a second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner; and a third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[0035] In another aspect, the code can further include at least one error based upon at least one pre-determined rule.
[0036] In an embodiment, a code formed by using microbeads as elaborated in present disclosure can be affixed on a product/package as part of the production process itself, using printers etc. suitably configured, while storing information contained therein in a database that can be configured in cloud. At any point in the supply chain of the product/package, information in the code can be compared with corresponding information in the database and a mismatch can indicate a product tampering and/or deviation from its planned supply chain path. Information can be retrieved from the code using, for instance, GPS enabled mobile devices configured with suitable applications and can be sent along with locational coordinates of the code. Any tampering found can trigger alarms and this location information can provide inputs to, for instance, manufacturer of the product to take remedial actions to avoid further counterfeiting of its product.
[0037] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.
BRIEF DESCRIPTION OF THE DRAWINGS
[0038] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0039] In the figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label. 8
[0040] FIGs. 1A to 1D illustrate various types of QR codes that exist presently (Prior art).
[0041] FIG.2 illustrates functional modules of a system for creating a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[0042] FIG. 3 illustrates a method of creating a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[0043] FIGs. 4A and 4B indicate how microbeads with pixels can be used to form a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[0044] FIGs.5A and 5B indicate how microbeads having unique shapes can be used to form a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[0045] FIGs. 6A to 6C indicate how unique fractal shapes can be used to form a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[0046] FIG. 7 illustrates a unique copy proof code formed in accordance with an exemplary embodiment of the present disclosure.
[0047] FIG. 8 illustrates an exemplary computer system in which or with which embodiments of the present invention may be utilized in accordance with an exemplary embodiment of the present disclosure.
DETAILED DESCRIPTION
[0048] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0049] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[0050] Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is 9
not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).
[0051] If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
[0052] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0053] Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. These exemplary embodiments are provided only for illustrative purposes and so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. The invention disclosed may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Various modifications will be readily apparent to persons skilled in the art. The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure). Also, the terminology and phraseology used is for the purpose of describing exemplary embodiments and should not be considered limiting. Thus, the present invention is to be accorded the widest scope encompassing numerous alternatives, modifications and equivalents consistent with the principles and features disclosed. For purpose of clarity, details relating to technical material that is known in the technical fields related to the invention have not been described in detail so as not to unnecessarily obscure the present invention. 10
[0054] Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named element.
[0055] The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth in the appended claims.
[0056] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
[0057] The term “machine-readable storage medium” or “computer-readable storage medium” includes, but is not limited to, portable or non-portable storage devices, optical storage devices, and various other mediums capable of storing, containing, or carrying instruction(s) and/or data. A machine-readable medium may include a non-transitory medium in which data can be stored and that does not include carrier waves and/or transitory electronic signals propagating wirelessly or over wired connections. Examples of a non-transitory medium may include, but are not limited to, a magnetic disk or tape, optical storage media such as compact disk (CD) or digital versatile disk (DVD), flash memory, memory or memory devices. A computer-program product may include code and/or machine-executable
11
instructions that may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
[0058] Furthermore, embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks (e.g., a computer-program product) may be stored in a machine-readable medium. A processor(s) may perform the necessary tasks.
[0059] Systems depicted in some of the figures may be provided in various configurations. In some embodiments, the systems may be configured as a distributed system where one or more components of the system are distributed across one or more networks in a cloud computing system.
[0060] In various embodiments, one or more of computing devices may link to the proposed system for transfer/exchange of data using wireless or wired link. The link may be based on any of a variety (or combination) of communications technologies by which signals may be exchanged, including without limitation, wired technologies employing electrically and/or optically conductive cabling, and wireless technologies employing infrared, radio frequency or other forms of wireless transmission. It is envisioned that one or more of these links may be implemented as channels of communication (e.g., virtual private network (VPN) channels or other forms of virtual channels) formed between computing devices through portions of the Internet.
[0061] In various implementations, the computing devices may be any of a variety of types of computing device, including without limitation, a desktop computer system, a data entry terminal, a laptop computer, a notebook computer, a tablet computer, a handheld personal data assistant, a smartphone, a body-worn computing device incorporated into clothing, a computing device integrated into a vehicle (e.g., a car, a bicycle, etc.), a server, a cluster of servers, a server farm, etc.
[0062] The computing devices may store instructions to be executed by processor in storage, such as control routine. The storage may include various types of computer-readable 12
storage media in the form of one or more higher speed memory units, such as read-only memory (ROM), random-access memory (RAM), dynamic RAM (DRAM), Double-Data-Rate DRAM (DDRAM), synchronous DRAM (SDRAM), static RAM (SRAM), programmable ROM (PROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory, polymer memory such as ferroelectric polymer memory, ovonic memory, phase change or ferroelectric memory, silicon-oxide-nitride-oxide-silicon (SONOS) memory, magnetic or optical cards, an array of devices such as Redundant Array of Independent Disks (RAID) drives, solid state memory devices (e.g., USB memory, solid state drives (SSD) and any other type of storage media suitable for storing information. As such, and in various embodiments, storage may provide volatile and/or non-volatile storage of data, data structures, computer-executable instructions, and so forth. For example, a number of program modules can be stored in memory units, including an operating system, and control routine.
[0063] The computing devices may execute processing operations or logic using a processing circuit in communication with control routine(s). The processing circuit may comprise various hardware elements, software elements, or a combination of both. Examples of hardware elements may include devices, logic devices, components, processors, microprocessors, circuits, processor circuits, circuit elements (e.g., transistors, resistors, capacitors, inductors, and so forth), integrated circuits, application specific integrated circuits (ASIC), programmable logic devices (PLD), digital signal processors (DSP), field programmable gate array (FPGA), memory units, logic gates, registers, semiconductor device, chips, microchips, chip sets, and so forth. Examples of software elements may include software components, programs, applications, computer programs, application programs, system programs, software development programs, machine programs, operating system software, middleware, firmware, software modules, routines, subroutines, functions, methods, procedures, software interfaces, application program interfaces (API), instruction sets, computing code, computer code, code segments, computer code segments, words, values, symbols, or any combination thereof. Determining whether an embodiment is implemented using hardware elements and/or software elements may vary in accordance with any number of factors, such as desired computational rate, power levels, heat tolerances, processing cycle budget, input data rates, output data rates, memory resources, data bus speeds and other design or performance constraints, as desired for a given implementation.
[0064] In various embodiments, one or more of the control routines used in the proposed system may comprise a combination of an operating system, device drivers and/or 13
application-level routines (e.g., so-called “software suites” provided on disc media, “applets” obtained from a remote server, etc.). Where an operating system is included, the operating system may be any of a variety of available operating systems appropriate for whatever corresponding ones of the processor circuits and, including without limitation, Windows™, OS X™, Linux®, iOS® (formerly iPhone OS), or Android OS™. Where one or more device drivers are included, those device drivers may provide support for any of a variety of other components, whether hardware or software components, that comprise one or more of the computing devices.
[0065] Each of the appended claims defines a separate invention, which for infringement purposes is recognized as including equivalents to the various elements or limitations specified in the claims. Depending on the context, all references below to the "invention" may in some cases refer to certain specific embodiments only. In other cases it will be recognized that references to the "invention" will refer to subject matter recited in one or more, but not necessarily all, of the claims.
[0066] Various terms as used herein are shown below. To the extent a term used in a claim is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.
[0067] The present disclosure relates to systems and methods for creating unique copy proof codes that find use in various product tracking and tracing systems such as those for preventing counterfeiting. In particular, present disclosure relates to a system of printing such a code using microbeads, wherein the term product as used herein can interchangeably be referred as “object”, “article”, “item”, “unit”, “piece”, “device”, “gadget”, “artifact”, or “entity”.
[0068] In an aspect, present disclosure elaborates upon a system to create a unique copy proof code using microbeads, the system including: a non-transitory storage device having embodied therein one or more routines operable to create the code; and one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines can include any or a combination of: a gradient based encoding module, which when executed by the one or more processors, can produce a first surface having a microbead carrying one or more pixels, each of the one or more pixels comprising a color and an intensity, wherein analysis of a set of the one or more pixels can provide a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient can hold a unique first encoded information in 14
a non-copyable manner; a unique shapes based encoding module, which when executed by the one or more processors, can produce a second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner; and a fractals based encoding module, which when executed by the one or more processors, can produce a third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[0069] In an aspect, the system can further include an error introduction module, which when executed by the one or more processors, can introduce at least one error in the code based upon at least one pre-determined rule.
[0070] In another aspect, the system can provide any or a combination of the first surface, the second surface and the third surface in a sequence, wherein the sequence can create the code.
[0071] In yet another aspect, the sequence can be incorporated in a tracker bar configured on the code itself or operatively connected to the code.
[0072] In an aspect, the tracker bar can hold any or a combination of encoding and decoding processes for any or a combination of the one or more pixels, the unique shape and the unique fractal shape, either fully or partially.
[0073] In another aspect, the microbeads can be any or a combination of a 2D microbead and a 3D microbead.
[0074] In yet another aspect, the system can be operatively configured as a printer to print the code.
[0075] In an aspect, present disclosure elaborates upon a method of creating a unique copy proof code using microbeads, the method including any or a combination of: producing, using a computing system, a first surface of the code, the first surface having a microbead carrying one or more pixels, each of the one or more pixels comprising a color and an intensity, wherein analysis of a set of the one or more pixels can provide a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient can hold a unique first encoded information in a non-copyable manner; producing , using the computing system, a second surface of the code, the second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner; and producing, using the computing system, a third surface of the code, the third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner. 15
[0076] In an aspect, the method can further include introducing, using the computing system at least one error in the code based upon at least one pre-determined rule.
[0077] In another aspect, the method can provide any or a combination of the first surface, the second surface and the third surface in a sequence, and wherein the sequence can create the code.
[0078] In yet another aspect of the method, the sequence can be incorporated in a tracker bar configured on the code itself or operatively connected to the code.
[0079] In an aspect of the method, wherein the tracker bar can hold any or a combination of encoding algorithms and decoding algorithms for any or a combination of the pixel, the unique shape and the unique fractal shape, either fully or partially.
[0080] In another aspect of the method, the microbeads can be any or a combination of a 2D microbead and a 3D microbead.
[0081] In yet another aspect the method can configure a printer to print the code.
[0082] In an aspect, present disclosure elaborates upon a product including a code, wherein the code can include any or a combination of :a first surface having a microbead carrying one or more pixels, each of the one or more pixels comprising a color and an intensity, wherein analysis of a set of the one or more pixels can provide a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient can hold a unique first encoded information in a non-copyable manner; a second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner; and a third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[0083] In another aspect, the code can further include at least one error based upon at least one pre-determined rule.
[0084] FIG. 1A illustrates a normal QR code with encoded product information and authenticity information. FIG. 1B illustrates the QR code with a graphics mask 102 which needs special algorithm for reading. The graphics has extra information about authenticity which can be read by, for example, a suitably configured mobile application that scans the QR code.
[0085] FIG. 1C illustrates a QR code with graphics mask102 and an additional barcode 104.In an exemplary embodiment, the graphics can be a dummy one with no information. The graphics mask 102 then may not serve any purpose other than adding a mask thereby mandating a higher level QR code reading algorithm to read the code.Further,
16
the placement of this graphics can be in the middle or in one or more corners and its shape can be regular or irregular since QR codes error correction algorithms can support error rates up to 30% and can still be read.
[0086] In an exemplary embodiment, the barcode 104 can provide additional information about authenticity. The value in the QR code and this barcode has to match in pair and the actual value in the server can be stored at separate location. Further, the barcode 104can printed separately for e.g., bottle cap.
[0087] FIG. 1D illustrates another QR code with multiple ways to encode authenticity information. The QR code can include barcode 104 with authenticity information, a plurality of pivot squares 106, a tracker bar 108, another code110, and a provision of split bars 112 for greater flexibility in incorporating data on the code. Barcode 104 with authenticity information must be matched with the value in the QR code. In another exemplary embodiment, the plurality of pivot squares 106 can provide a way for a code reader to lock on the location of other elements of the code. In an implementation, the pivot squares are used to give a way for the reader to lock on the location of other elements and makes reading the codes easier. In another exemplary embodiment, the tracker bar 108 can give the information about order of split bars in clockwise direction, which bars are present, and code type of the overall code which will change if there are split bars.
[0088] In another exemplary embodiment, the another code 110 can also be embedded as a part of this QR code and the position can be randomized for various codes making reverse engineering the QR code very tough. In an exemplary implementation, code 110 can be simple or composite code. In case of simple code, the final printed code is a single code image. In case of composite code, the final printed code is a composite image of multiple codes.
[0089] In another exemplary embodiment, the provision of split bars 112 can be provided for greater flexibility in terms of dealing with specific data and such bars are optional. In an implementation, each of the other codes can be printed on the remaining sides of the code. In another implementation, split bar based codes can result into multiple codes being printed on one side.
[0090] In this manner, codes can be generated for various product identification and tracking purposes with varying information and levels of difficulty in copying them. However, means as elaborated above can still lead to tampering/copying the code generated, particularly since codes generated are visible. As technical abilities increase, there are increasing possibilities of such codes being copied as well. 17
[0091] Hence there is a need in the art systems and methods to create codes that are absolutely copy proof.
[0092] FIG.2 illustrates functional modules of a system for creating a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[0093] In an aspect, present disclosure elaborates upon a system and method of creating a unique copy proof code using microbeads, making use of inherent characteristics of the microbead. Microbeads are manufactured solid plastic particles of less than five micrometers( .005 millimeter) in their largest dimension. Since a human eye can see objects of size about 0.1 millimeter and above and not less than that, it can readily be appreciated that a microbead is not visible to human eye and will need special equipment to be even seen. Microbeads may be spherical, cylindrical, cubic, rectangular, or any other 3D shape although spherical shape is most common, and can easily be configured as a 2D shape as well, for example a microdot . The composition of microbeads can vary and often include silica based glass, polyethylene (PE) or polypropylene (PP), polyethylene terephthalate (PET), polymethlyl methacrylate (PMMA) or nylon. Plastic microbeads are in face soaps, body washes, and even toothpastes for use as exfoliants. They are sometimes included in “age-defying” makeup, as well as lip gloss and nail polish.
[0094] Microbeads present an ideal way of creating a unique copy proof code since although miniscule in size, their surfaces ( that can be 2D or 3D ) can store a large amount of information as is required for such codes. Further, their miniscule size ensures their invisibility to the human eye thus obviating problems such as tampering and its consequent disadvantages and makes codes created thereon copy proof, as elaborated further.
[0095] In an aspect, functional modules of the system for creating a copy proof code can include a gradient based encoding module 202, a unique shapes based encoding module 204, a fractals based encoding module 206, and an errors introduction module 208.
Gradient Based Encoding Module 202
[0096] In an aspect, the gradient based encoding module 202 can produce a first surface having a microbead carrying a pixel having a color and an intensity, wherein the pixel can provide a rate of change of gradient of any or a combination of color and intensity, and the rate of change of gradient can hold a unique first encoded information in a non-copyable manner.
[0097] As is generally understood, a pixel is smallest single component of a digital image. However, the definition is highly context-sensitive. For example, there can be "printed pixels" in a page, or on a microbead as elaborated here, pixels carried by electronic signals, or 18
represented by digital values, or pixels on a display device, or pixels in a digital camera (photosensor elements). Pixels can be used as a unit of measure such as: 2400 pixels per inch, 640 pixels per line, or spaced 10 pixels apart.
[0098] In an aspect, present disclosure can enable a pixel to be printed on a microbead that in turn is configured on a surface. A plurality of such surfaces can be printed with pixels of varying color and intensity. When such surfaces are put together, a rate of gradient can be formed that can be used to encode information. In another exemplary embodiment, a single surface can have plurality of microbeads, each printed with a pixel thereby creating a rate of gradient. In yet another exemplary embodiment, a microbead can be printed with a plurality of pixels with varying color and/or intensity thereby creating a rate of gradient on the microbead itself. All such combinations are fully covered in the present disclosure.
[0099] In an aspect, proposed system can use features of surfaces configured as above to store information for a copy proof code. Information used can be unique (for example, a sequence of non-repeated random numbers) and so, can uniquely identify an object form another. Further, the information can be encoded using encryption and coding techniques and so be decipherable only via appropriately configured systems, for example authorized readers.
[00100] In this manner, module 202 can provide a unique copy proof code holding unique encoded information.
Unique Shapes Based Encoding Module 204
[00101] In an aspect, the unique shapes based encoding module 204 can produce a second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner.
[00102] In another aspect, unique shapes based encoding module 204 can produce microbeads having different shapes in order to encode information. Microbead with such shapes can look like dots or irregular circles or sometimes just blots but when magnified/zoomed (by appropriately configured code readers, for instance) can reveal their actual shapes. In exemplary embodiments such shapes can be 16 point stars or 32 point stars. Information can be encoded in such shapes and cannot readily be copied since copying would lead to loss of fine granularity that the original possesses. Such a loss can be used to identify the copy as being on a counterfeit product most probably, and accordingly trigger an alarm, using appropriately configured systems. In this manner, such codes can be made copy proof.
19
Fractals Based Encoding Module 206
[00103] In an aspect, the fractals based encoding module 206 can produce a third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[00104] In an exemplary embodiment, the unique fractal shape can be printed on the third surface using special printers, algorithms, colors and inks.
[00105] In an aspect, fractals based encoding module 206 can encode information based on fractals. As is known, fractals are algorithm-based complex and symmetrical shapes which can be used to encode very complex information with very high confidence. For example, Fractal Plasma when created of multiple colors is almost impossible to copy as a copy and print process won't be able to reproduce the colors and transitions, except when using highly specialized printers and colors that can be deployed in the present system disclosed. Various attributes, functions and algorithms used to create the fractals can be encrypted/proprietary and hence the code created can be made copy proof.
[00106] Fractals created by various algorithms can exhibit similar patterns at increasingly small scales, a concept that is known as expanding symmetry or evolving symmetry. Hence fractals created by the module 206 can be condensed to extremely small dimensions without effecting in any manner the complex information contained in them. Module 206 can be operatively configured with a printer with special inks that can create a fractal cloud according to data to be encoded in a fractal (such data being the unique code to be created, for example) and the fractal cloud can incorporate colors and hues accordingly. Such a cloud cannot be copied with exactly the same colors and hues thereby creating a unique copy proof code. Data therein can be retrieved using appropriately configured readers that can zoom as required to retrieve the data in the fractal cloud.
Errors Introduction Module 208
[00107] In an aspect, the proposed system can include an error introduction module 208. Module 208 can introduce one or more errors in a code being created according to procedures as elaborated above. Errors can be introduced in the code according to at least one rule wherein such rule or rules may include various algorithms including those that may be proprietary to an enterprise implementing the proposed system.
[00108] In case a code has been created with errors as elaborated above, the code reading system for such a code can have a corresponding error correction module that can correct the errors created while reading the code so as to read the code properly. As can be 20
readily understood, appropriate ‘threshold values’ for reading such errors can be set in the code reading system based upon which a code can be read/ deciphered further or rejected.
[00109] In an aspect, proposed system can provide any or a combination of the first surface, the second surface and the third surface in a sequence wherein the sequence creates the unique and copy proof code. Further, the sequence can be incorporated in a tracker bar configured on the code itself or operatively connected to the code.
[00110] In an exemplary embodiment ( as elaborated in FIG. 7) , a plurality of such surfaces can be combined and can have a QR code as well wherein the QR code formed thus is non-copyable. The QR code can carry information on many attributes of a product in different areas, some of which can carry prints of fractal clouds as elaborated above while others can carry microbeads based codes while still can carry normal QR codes. A printer can be configured to take inputs from the system as disclosed as well as from other systems to finally prepare a code combining a QR code as well as any or a combination of non-copyable codes as elaborated above. In this manner the code created can also become non-copyable.
[00111] In an exemplary embodiment, an anti-counterfeit system operatively connected to an appropriately configured scanner can retrieve a URL from a QR code that also incorporates the non-copyable elements elaborated above. The anti-counterfeit system can retrieve a sequence and appropriate algorithms to read and decode the non-copyable elements and thus determine the code/unique ID of the product on which the code may have been put.
[00112] The system can further compare the code so determined with a preconfigured codes database that it can access and trigger an alarm in case a code matching the determined code is not found in the pre-configured database. In another exemplary embodiment, the sequence can be configured on a tracker bar on the code itself and the scanner can therefore retrieve the sequence.
[00113] In another aspect, the tracker bar can hold any or a combination of encoding algorithms and decoding algorithms for any or a combination of the pixel, the unique shape and the unique fractal shape, either fully or partially.
[00114] In an exemplary embodiment, the tracker bar can provide only a partial key that can be sent by an appropriately configured code reader to a backend server (that can be in the cloud, for instance) and, upon such receipt the server can provide the full key, encoding or decoding algorithm, pattern reading sequence or any combination of these either to the same code reader or another/combination of code readers that can in turn retrieve the full code for further use as required. 21
[00115] As can be readily understood, microbeads used by the proposed system can be two dimensional (for example a circular microdot) or three dimensional (for example a sphere, cuboid, cylinder and the like). A three dimensional microbead can offer a plurality of surfaces that can aid in storing large amounts information, as required.
[00116] In yet another aspect, the proposed system can be operatively configured as a printer to print the code. As can be appreciated the unique and copy proof code can incorporate any or a combination of above elements/surfaces. A plurality of such surfaces can also be likewise created,
[00117] In an exemplary embodiment, modules as described above can be operatively connected to, or incorporated in a special printer working with specially developed inks and printing techniques to produce/print surfaces with microbeads and fractal clouds as elaborated above.
[00118] In an exemplary embodiment, unique copy proof codes so formed using microbeads can be affixed on a product/its package and can be read by appropriately configured code readers and the copy proof information contained in such codes can be extracted. Proprietary algorithms can further be deployed by the system proposed to decipher the codes and information compared therein can be compared with corresponding information stored in a database (that can be configured in the cloud) to establish tampering/counterfeiting of the product or its diversion from its planned supply chain route. In an exemplary embodiment, such comparison can be based upon fuzzy logic techniques to identify a ‘degree of truth’ rather than an exact match. The fuzzy logic technique can be particular useful, for example, in reading information contained in the surface having a fractal shape. In another exemplary embodiment, the unique copy proof code can incorporate various product attributes, each of which can be given a weight and evaluation of tampering / counterfeiting can be based upon a ‘threshold value’ of any or a combination of such attributes exceeding or falling below pre-determined values. In this manner, information encoded in the code created by using microbeads as elaborated herein can be utilized to detect / minimize counterfeiting.
[00119] FIG. 3 illustrates a method of creating a unique copy proof code in accordance with an exemplary embodiment of the present disclosure.
[00120] In an aspect the proposed method can be implemented using a computing system that in turn can have various modules as already elaborated.
[00121] In an aspect the method can include, at step 302, producing, using a computing system, a first surface of a code, the first surface having a microbead carrying one or more
22
pixels, each of said one or more pixels comprising a color and an intensity, wherein analysis of a set of said one or more pixels provides a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient holds a unique first encoded information in a non-copyable manner.
[00122] In another aspect the method can include, at step 304, producing, using the computing system, a second surface of the code, the second surface having a microbead of a unique shape, wherein the unique shape can hold a unique second encoded information in a non-copyable manner.
[00123] In yet another aspect the method can include, at step 306, producing, using the computing system, a third surface of the code, the third surface having a unique fractal shape, wherein the unique fractal shape can hold a unique third encoded information in a non-copyable manner.
[00124] In an aspect, the method can include, at step 308, introducing at least one error in the code based upon at least one pre-determined rule.
[00125] FIGs. 4A and 4B indicate how microbeads with pixels can be used to form a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[00126] As illustrated in FIG.4A, three surfaces with microbeads can be produced, the microbeads having three pixels 402, 404 and 406 respectively. The pixels can of different colors and can have varying intensities. For instance pixel 402 can be black, 404 can be red and 406 can be orange. Surfaces with such microbeads can be produced by appropriately configured printers that can in turn be operated based upon unique code to be generated. The changing pixel color, intensity and density of printing can lead to changes in gradients of color and intensity and such rate of change (that can include multiple changes over a specified area) can be used to hold unique encoded information.
[00127] It can readily be appreciated that code such formed is not readily copyable since that will lead to a deterioration in color and intensity gradients. In case the change exceeds a pre-determined threshold, the code can be declared as a counterfeit/copy by appropriately configured systems. Reduced to micrometer level sizes as provided by microbeads, it will be all the more difficult to find the code and thereby copy the code with any level of accuracy as multiple subtle transitions of gradient over a short distance willnot be copy able.
[00128] FIG. 4B illustrates how a gradient based pattern can be used to create a unique copy proof code. As elaborated above, extent of change of gradient can be pre-configured and surfaces produced accordingly. The surfaces can be held/printed on a substrate and have a
23
gradient between points X and Y, such gradient determining a code. To check validity of the code, the gradient of the code can be compared with that pre-configured. In case the code has been copied, the gradient will not remain the same, as elaborated above and hence the copied code can be declared a fake and alarms raised accordingly.
[00129] FIGs.5Aand 5B indicate how surfaces having microbeads of unique shapes can be used to form a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[00130] As illustrated in FIG. 5A, unique shapes based encoding module 204 can produce surfaces having microbeads of different shapes shown as 502, 504 and 506 respectively. The surfaces can be held/printed on a substrate. Still other shapes, such as 16 point stars and 32 point stars (not shown) can be likewise produced. The shapes (and their sequence of printing) can be generated by appropriately configured printers that can in turn be operated based upon unique code to be generated. In such a manner the shapes can hold unique encoded information.
[00131] In an aspect, proposed system can produce surfaces having microbeads of such shapes using specially designed printers and inks.
[00132] As illustrated in FIG.5B, such shapes at normal resolutions available to copiers will come out as irregular circles or blots when copied. Hence, copying such patterns with any precision is not possible since their shapes will show up only as dots/circles, if at all. Hence codes such formed can be copy proof. Information therein can be retrieved by specially designed readers and algorithms that can, for instance, provide high level magnification /zooming to the microbeads to retrieve information from such shapes.
[00133] FIGs. 6A to 6C indicates how surfaces having unique fractal shapes can be used to form a copy proof code in accordance with an exemplary embodiment of the present disclosure.
[00134] In an aspect, fractals based encoding module 206 can produce surfaces having unique fractal shapes that can be printed on the surfaces. Such fractals can be based on functions involving iterations and calculations on complex numbers such as those based on Mandelbrot set (as illustrated in FIG. 6A), Fractal Plasma (shown in FIG.6B) and L System (illustrated in FIG. 6C).Module 206 can create unique fractals that cannot be copied using available techniques. In an exemplary embodiment, a fractal based on Fractal plasma can give best results in terms of copy proofing.
[00135] FIG. 7 illustrates a unique copy proof code formed in accordance with an exemplary embodiment of the present disclosure. 24
[00136] As illustrated, a copy proof code having many of elements/surfaces as elaborated above can be combined to form a non-copyable code. The code can also include a QR code. As illustrated at 702 a tracker bar can be configured on the code to indicate where the non-copyable codes as elaborated herein appear, their encoding schemes and reading mechanisms etc. Various authenticity check mechanisms can be incorporated. For instance, a barcode 704 can carry authenticity information that can be matched with that in the QR code to ensure that QR Code is not fake. Pivot squares 706 can provide a path/way for the code reader to lock in precisely on location of various elements in the code.
[00137] In an exemplary embodiment, a non-copyable microbeads based code 706 can be embedded in the QR code. Its position can be randomized for various codes thus making it very tough to be reverse engineered.
[00138] In another exemplary embodiment, split bars 708 can be provided for greater flexibility for configuring the code and various elements thereon.
[00139] In yet another exemplary embodiment, one or more non-copyable codes as elaborated herein can be configured on the QR code. As illustrated, a surface 712 can carry microbeads having pixels to create a unique gradient, surface 714 can carry microbeads with different unique shapes and surface 716 can have a unique fractal shape printed on it. As already elaborated such surfaces can form non-copyable codes.
[00140] FIG. 8 illustrates an exemplary computer system in which or with which embodiments of the present invention may be utilized in accordance with an exemplary embodiment of the present disclosure.
[00141] Embodiments of the present disclosure include various steps, which have been described above. A variety of these steps may be performed by hardware components or may be tangibly embodied on a computer-readable storage medium in the form of machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with instructions to perform these steps. Alternatively, the steps may be performed by a combination of hardware, software, and/or firmware. As shown in the figure, computer system 800 includes an external storage device 810, a bus 820, a main memory 830, a read only memory 840, a mass storage device 850, communication port 860, and a processor 870. A person skilled in the art will appreciate that computer system 800 may include more than one processor and communication ports. Examples of processor 870 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on a chip processors or other future processors. Processor 870 may include various modules 25
associated with embodiments of the present invention. Communication port 860 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 860 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), Storage Area Network (SAN), Virtual Storage Area Network (VSAN), or any network to which computer system 800 connects. Memory 830 can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. Read only memory 840 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor870. Mass storage 850 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7200 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc. Bus 820 communicatively couples processor(s) 870 with the other memory, storage and communication blocks. Bus 820 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor 870 to software system. Optionally, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to bus 820 to support direct operator interaction with computer system 800. Other operator and administrative interfaces can be provided through network connections connected through communication port 860. External storage device 810 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure. 26
[00142] Although the proposed system has been elaborated as above to include all the main modules, it is completely possible that actual implementations may include only a part of the proposed modules or a combination of those or a division of those into sub-modules in various combinations across multiple devices that can be operatively coupled with each other, including in the cloud. Further the modules can be configured in any sequence to achieve objectives elaborated. Also, it can be appreciated that proposed system can be configured in a computing device or across a plurality of computing devices operatively connected with each other, wherein the computing devices can be any of a computer, a laptop, a smart phone, an Internet enabled mobile device and the like. All such modifications and embodiments are completely within the scope of the present disclosure.
[00143] As used herein, and unless the context dictates otherwise, the term “coupled to” is intended to include both direct coupling (in which two elements that are coupled to each other or in contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms “coupled to” and “coupled with” are used synonymously. Within the context of this document terms “coupled to” and “coupled with” are also used euphemistically to mean “communicatively coupled with” over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[00144] Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C ….and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[00145] While some embodiments of the present disclosure have been illustrated and described, those are completely exemplary in nature. The disclosure is not limited to the embodiments as elaborated herein only and it would be apparent to those skilled in the art that numerous modifications besides those already described are possible without departing from the inventive concepts herein. All such modifications, changes, variations, substitutions, and equivalents are completely within the scope of the present disclosure. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. 27
ADVANTAGES OF THE INVENTION
[00146] Present disclosure provides for a system and method that creates a code that is not easily visible to the human eye for an anti-counterfeiting system.
[00147] Present disclosure provides for a system and method as above wherein the code created is copy proof, that is, it cannot be copied.
[00148] Present disclosure provides for a system and method as above wherein the code created carries large amount of information.

We Claim:
1. A system to create a unique copy proof code using microbeads, the system comprising:
a non-transitory storage device having embodied therein one or more routines operable to create the code; and
one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines include any or a combination of:
a gradient based encoding module, which when executed by the one or more processors, produces a first surface having a microbead carrying one or more pixels, each of said one or more pixels comprising a color and an intensity, wherein analysis of a set of said one or more pixels provides a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient holds a unique first encoded information in a non-copyable manner;
a unique shapes based encoding module, which when executed by the one or more processors, produces a second surface having a microbead of a unique shape, wherein the unique shape holds a unique second encoded information in a non-copyable manner; and
a fractals based encoding module, which when executed by the one or more processors, produces a third surface having a unique fractal shape, wherein the unique fractal shape holds a unique third encoded information in a non-copyable manner.
2. The system of claim 1, wherein the system further includes an error introduction module, which when executed by the one or more processors, introduces at least one error in the code based upon at least one pre-determined rule.
3. The system of claim 2, wherein the system provides any or a combination of the first surface, the second surface and the third surface in a sequence, wherein the sequence creates the code.
4. The system of claim 3, wherein the sequence is incorporated in a tracker bar configured on the code itself or operatively connected to the code.
5. The system of claim 3, wherein the tracker bar holds any or a combination of encoding and decoding processes for any or a combination of the one or more pixels, the unique shape and the unique fractal shape, either fully or partially. 29
6. The system of one of the preceding claims, wherein the microbeads are any or a combination of a 2D microbead and a 3D microbead.
7. The system of one of the preceding claims, wherein the system is operatively configured as a printer to print the code.
8. A method of creating a unique copy proof code using microbeads, the method comprising any or a combination of:
producing, using a computing system, a first surface having a microbead carrying one or more pixels, each of said one or more pixels comprising a color and an intensity, wherein analysis of a set of said one or more pixels provides a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient holds a unique first encoded information in a non-copyable manner;
producing , using the computing system, a second surface having a microbead of a a unique shape, wherein the unique shape holds a unique second encoded information in a non-copyable manner; and
producing, using the computing system, a third surface having a unique fractal shape, wherein the unique fractal shape holds a unique third encoded information in a non-copyable manner.
9. The method of claim 8, wherein the method further comprises introducing, using the computing system, at least one error in the code based upon at least one pre-determined rule.
10. The method of claim 9, wherein the method provides any or a combination of the first surface, the second surface and the third surface in a sequence, and wherein the sequence creates the code.
11. The method of claim 10, wherein the sequence is incorporated in a tracker bar configured on the code itself or operatively connected to the code.
12. The method of claim 11, wherein the tracker bar holds any or a combination of encoding and decoding processes for any or a combination of the pixel, the unique shape and the unique fractal shape, either fully or partially.
13. The method of claim 8 to claim 12, wherein the microbeads are any or a combination of a 2D microbead and a 3D microbead.
14. The method of claim 8 to claim 13, wherein the method configures a printer to print the code.
15. A product including a code, said code comprising any or a combination of: 30
a first surface having a microbead carrying one or more pixels, each of said one or more pixels comprising a color and an intensity, wherein analysis of a set of said one or more pixels provides a rate of change of gradient of any or a combination of color and intensity, and wherein the rate of change of the gradient holds a unique first encoded information in a non-copyable manner;
a second surface having a microbead of a unique shape, wherein the unique shape holds a unique second encoded information in a non-copyable manner; and
a third surface having a unique fractal shape, wherein the unique fractal shape holds a unique third encoded information in a non-copyable manner.
16. The product of claim 13, wherein the said code further comprises at least one error based upon based upon at least one pre-determined rule.

Documents

Application Documents

# Name Date
1 201711034588-STATEMENT OF UNDERTAKING (FORM 3) [28-09-2017(online)].pdf 2017-09-28
2 201711034588-FORM FOR SMALL ENTITY(FORM-28) [28-09-2017(online)].pdf 2017-09-28
3 201711034588-FORM FOR SMALL ENTITY [28-09-2017(online)].pdf 2017-09-28
4 201711034588-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [28-09-2017(online)].pdf 2017-09-28
5 201711034588-EVIDENCE FOR REGISTRATION UNDER SSI [28-09-2017(online)].pdf 2017-09-28
6 201711034588-DRAWINGS [28-09-2017(online)].pdf 2017-09-28
7 201711034588-DECLARATION OF INVENTORSHIP (FORM 5) [28-09-2017(online)].pdf 2017-09-28
8 201711034588-COMPLETE SPECIFICATION [28-09-2017(online)].pdf 2017-09-28
9 201711034588-FORM-26 [29-09-2017(online)].pdf 2017-09-29
10 201711034588-Power of Attorney-161017.pdf 2017-10-23
11 201711034588-Correspondence-161017.pdf 2017-10-23
12 abstract.jpg 2018-01-23
13 201711034588-Proof of Right (MANDATORY) [06-02-2018(online)].pdf 2018-02-06
14 201711034588-OTHERS-050218.pdf 2018-02-09
15 201711034588-Correspondence-050218.pdf 2018-02-09
16 201711034588-FORM 18 [10-12-2020(online)].pdf 2020-12-10
17 201711034588-FER.pdf 2022-01-07
18 201711034588-FORM-26 [07-07-2022(online)].pdf 2022-07-07
19 201711034588-FER_SER_REPLY [07-07-2022(online)].pdf 2022-07-07
20 201711034588-DRAWING [07-07-2022(online)].pdf 2022-07-07
21 201711034588-CORRESPONDENCE [07-07-2022(online)].pdf 2022-07-07
22 201711034588-COMPLETE SPECIFICATION [07-07-2022(online)].pdf 2022-07-07
23 201711034588-CLAIMS [07-07-2022(online)].pdf 2022-07-07
24 201711034588-ABSTRACT [07-07-2022(online)].pdf 2022-07-07

Search Strategy

1 201711034588E_06-01-2022.pdf