Title of Invention

METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AN OBJECT

Abstract The invention relates to a method for verifying authenticity of an object (200) that has a unique identification number (ID), said method comprising the steps of: A) generating a varying secret key, a first authentication code (AC1) based on the varying secret key, and a second authentication code (AC2) based on the unique identification number (ID) of the object (200) and the varying secret key; and (B) generating a verifying code that is based on two of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200), and that can be matched to the remaining one of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200) in order to verify authenticity of the object (200).
Full Text METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AN OBJECT
The invention relates to a method and system for
verifying authenticity of an object, more particularly
to a method and system for verifying authenticity of
an object thorough the use of varying authentication
codes.
Laser labels are currently in use to address the
problem of counterfeiting. Typically, the laser label
is attached to a product, and can be scanned to verily
the authenticity of the product.
Such method of verification, however, requires the
use of a dedicated verification device. Acccrciinqly,
verification of the authenticity of a product attached
with the iaser label is only possible by persons, such
as retail outlet, staff, equipped with the verification
device, and cannot be conveniently carried cur. by
cons ume r s t hem selves.
Therefore, the object of the present invention is
to provide a method and system for ver.i i yinc authentic! 1. y
of an object through the use of varying authentication
codes so as to overcome the aforesaid drawback of trie
prior art.
According v.o one aspect of the present invention,
a method for verifying authenticity c: an object that
has a unique identification number includes the steps
of:
(A) generating a varying secret key, a fir a t
authentication code based on the varying secret key,
and a second authentication code based on the unique
identification number of the object and the varying
secret key; and
(B) generating a verifying code that is based on
two of the first and second authentication codes and
the unique identification number of the oojoct and thai
can be matched to the remaining one of the first, and
second authentication codes and the unique
identification number of the object in order to verify
authenticity of the object.
According to another aspect of the present invent ion,
asystem, whichis for verifying authenticity© fan object
chat has a unique identification number, comprises an
authentication code generating device that is adapted
to be attached to the object. The authentication code
generating device includes a chip that is operable so
as to generate a varying secret key, a first
authentication code based on the varying secret key,
and a second authentication code based on the varying
secret key and the unique identification number of the
object. A veriiying code can be generated, such as through
an inquiry-based user interface, based on two of the
first and second authentication codes and the unique
identification number of the object, and can be matched
to the remaining one of the first and second
authentication codes and the unique identification
number of the object in order to verify authenticity
of the object.
Other features and advantages of the present
ir.venr. ion will become apparent in the to.I I owing det ailed
description of the preferred embodiment, with reference
to the accompanying drawings, of which:
Figure 1 is a schematic block diagram of a system
for implementing the preferred embodiment of the method
for verifying authenticity of an object according to
the present invention;
Figure 2 is a flowchart to illustrate steps performed
by an authentication code generating device of the system
of Figure 1; and
Figure 3 is a flowchart to illustrate steps associated
with an inquiry-based user interface of the system of
F i gu re 1 .
Figure 1. illustrates a system 100 for implementing
the preferred embodiment of a method for verifying
authenticity of an object 20C in accordance with this
invention.
The object 2 00 has a unique identification number
(ID), e.g., "GU8I4b6'/899" . In this embodiment, the
object 200 is a consumer product, such as a wine. In
an alternative embodiment, the object 200 may be an
artwork, a security bond, or a certificate.
The system 100 according to this invention is shown
to include an authentication code generating device 1
and an inquiry-based user interface 2.
The authentication code generating device 1 of the
system 100 according to this invention includes a chip
11, an actuator 12, and a display 13.
The chip 11 of the authentication code generating
device 1 is operable so as to generate a varying secret
key, a first authentication code (AC1) based on the
varying secret key, and a second authentication code
(AC2) based on the unique identification number (ID)
of the object 200 and the varying secret key, in a manner
that will be described in greater detail hereinafter.
In this embodiment, the chip 11 of the authentication
code generating device 1 is a radio frequency
identification (RFID) chip.
In this embodiment, the chip 11 of the authentication
code generating device 1 is configured with a chip code,
e.g., "003027033001029" that corresponds to the unique
identification number (ID) of the object 200.
The chip 11 of the authentication code generating
device 1 is further configured with first to seventh
lookup tables as follows:


The display 13 of the authenticat, icr. code generating
device 1 is coupled Lc and controlled by the chip 11,
and operable so as to display the first and second
authentication codes (AC1, AC2) generated by the chip
11.
The actuator 12 of the authentication code generating
device 1 is coupled to the chip II, and is operable so
as to enable the chip 11 to generate the varying secret,
key, and the first and second authenticat ion codes (AC1,
AC2 ) . Preferably, the actuator 12 of the authentication
code generating device 1 is one of a voice-activated
device, a wireless device, a touch screen, a keypad,
and timer software application.
In this embodiment, the chip 11 of the authentication
code generating device 1 of the system 100 is installed
with proprietary software for executing steps
associated with the method of the preferred embodiment.
The steps performed by the chip 11 of the authentication
code generating device 1, as illustrated in Figure 2,
are as follows:
In step .31, upon operation of the actuator 12 o! the
authentication code generating device 1, the chip 11
of the authentication code generating device 1 generates
a varying secret key that, in this embodimeni, is a
function of date and time. For example, when the actuator
12 of the authentication code generating device 1 is
operated on May 31, 2004 at 9:30:24 AM, the chip 1": of
the authentication code generating device 1 generates
a varying secret key as "2004 0531093024".
In step 32, the chip II of the authentication code
generating device 1 divides the varying secret key
generated in step 31 into seven groups. For example,
for the exemplified varying secrei key of
""20040531093024", the first group corresponds to "2",
the second group corresponds to "004", the third group
corresponds to the "05", the fourth group corresponds
to "31", the fifth group corresponds to "09", the sixth
group corresponds to "30", and the seventh group
corresponds to "24".
In step 33, the chip 11 of the authentication code
generating device 1 converts each of the first to fifth
groups into a corresponding identifier code using a
respective one of the first to fifth lookup tables
configured therein, leaving the sixth and seventh groups
unchanged. It is noted that since the first group (e.g.,
2) has three corresponding identifier codes (e.g., B,
L, and V), as i llustrated in the first, lookup rab.le,
and since the third group of the varying secret key (e.g.
Ob) has three corresponding identifier codes (e.g. E,
Q, and 3), as illustrated in third lockup tabic, there
are nine possible conversions for r.he varying secret
key, "20040530093024", one of which is "BAEQUI3024".
Thereafter, in step 34, the chip 11 of the
authentication code generating device 1 permutes the
seven groups by selecting one of predetermined
permutations stored in the sixth lookup table. With
reference to the sixth lookup table, there are forty-five
thousand three hundred sixty possible permutations for
"BAEQUI3024", one of which is "AEQU2430BI" .
In step 3b, the chip 11 of the authentication code
generating device 1 appends the identifier code, which
corresponds to the selected one of the predetermined
permutations, to the selected one of the predetermined
permutations in order to obtain the first authenticat ion
code. With reference to the sixth lookup table, since
the identifier code for "AEQU24 30BI" is "D", the first
authentication code (ACT) is "AEQU2430B1U". In an
alternative embodiment, steps 32 to 35 are skipped, and
the first authentication code (AC1) takes the value of
the varying secret key generated in step 31.
In step 36, the chip 11 of the authentication code
generating device 1 divides the chip code configured
therein into five groups. For example, for the
exemplified chip code "00 3027033 001029", the firsr.
group corresponds to "003", the second group corresponds
to "027", the third group corresponds to "033", t.hefounh
group corresponds to "00.1", and the fifth group
corresponds to "029".
In step 37, the chip 11 of the authentication code
generating device 1 converts each of the first, to fifth
groups into a corresponding identifier code using the
second lookup table configured therein to thereby obtain
"ADA1BAABA3".
In step 38, the chip 11 of the authentication code
generating device 1 converts the varying secret key by
discarding the first eight digits of the varying secret
key to thereby obtain "093024".
In step 39, the chip 11 of the authentication code
generating device 1 appends "093024" obtained in st.ep
38 to "ADA1BAABA3" obtained in step 37 to thereby obtain
"ADA1BAABA3093024".
In step 4C, the chip 11 of the authentication code
generating device 1 divides the results obtained in step
39 into fourgroups. The first group corresponds to "ADA! ",
the second group corresponds to "BAAB", the third group
corresponds to "A309", and the fourth group corresponds
to "3024".
In step 41, the chip 11 of the authentication code
generating device 1 permutes the four groups by selecting
one of predetermined permutations stored in the seventh
lookup table. With reference to the seventh lockup tabic,
there are twenty-four possible permutations for
"ADA1BAABA3093024", one of which is"ADA1A309BAAB3024".
In step 42, the chip 11 of the authentication cede
generating device 1 appends the identifier code, which
corresponds to the selected one of the predetermined
permutations, to the selected one of :.he predetermined
permutations in order to obtain the second
authentication code. With reference to the seventh
lookup table, since the identifier code for
"ADA1A309BAAB3024" is "B", the second aut her. t. icaticr.
code is "ADA1A309BAAB3034B".
In this embodiment, the inquiry-based user interface
2 is web-based application software that is installed
in a web server (not shown) and that executes steps
associated with the method of the preferred embodiment .
It is noted that the unique identification number (ID)
of the object 200, and the chip code that corresponds
to the unique identification number (ID) of the object
200 are configured in the inquiry-based user interface
2. The steps associated with the inquiry-based user
interface 2, as illustrated in Figure 3, are as follows:
In step 51, after the unique identification number
(ID) of the object 200, e.g., "GU814567899", and tnc
first authentication code (AC1), e.g., "AEQU2430BID",
generated by the chip 11 of the authentication code
generating device 1 are inputted to the inquiry-cased
user interface 2, the flowproceeds rostepb2. Otherwise,
the flow proceeds to step 61.
In step 52, ihe inquiry-based user interface /.
determines the chip code that is configured therein arid
that corresponds to the unique identification number
(ID) of the object. 200 inputted in step b'i.
In step S3, the inquiry-based user interface 2
generates a secret key based on the first authentication
code (AC1) inputted in step 51 by performing steps 31
to 3 5 in reverse.
In step 54, the inquiry-based user interface 2
generates and displays a verifying code based or: the
chip code determined in step 5 2 and the secret key
generated i. n step 53.
When the verifying code generated in step 54 matches
the second authenticating code (AC2) generated by the
chip II of the authentication code generating device
1, the object 200 is verified as authentic. Otherwise,
the object 200 is determined to be a counterfeit.
In step 61, after the unique identification number
(ID) of the object 200, and the second authentication
code (AC2) generated by the chip 11 of the authent i cat ion
code generating device i are inputted to the
inquiry-based user interface 2, the flow proceeds to
step 62. Otherwise, ihe flow proceeds to step 71.
In step 62, the inquiry-based user interface 2
determines the chip code that is configured therein and
thai corresponds to the unique Identification number
(ID) of the object 200 inputted in step 61.
In step 63, the inquiry-based user interface 2
generates a secret, key based on the second authentication
code (AC2 ) inputted in step 61 and the chip code
determined in step 62 by performing steps 36 to 42 in
reverse.
In step 64, the inquiry-based user interface 2
generates a verifying code based on the secret key
generated in step 63.
When the verifying code generated in step 64 matches
the first authenticating code (AC!) generated by the
chip 11 of the authentication code generating device
1, the object 200 is verified as authentic. Otherwise,
the object 200 is determined to be a counterfeit.
In step 71, after the first and second authentication
codes (AC1, AC2) generated by the chip 11 of the
authentication code generating device i are inputted
to the inquiry-based user interface 2, the flow proceeds
to step 72. Otherwise, the flow proceeds to step 51.
In step 72, the inquiry-based user Interface 2
generates a secret key based on the first authentication
code (AC1) inputted in step 71 by performing step 31
to 35 in reverse.
In step 73, the inquiry-based user interface 2
generates a chip code based on the secret key generated
in step 72 and the second authentication code (AC1;
inputted in step 71 by performing steps 36 to 4? in
reverse.
In step 74, the inquiry-based user interface 2
determines the unique identification number (10) tha l.
corresponds r.o the chip code generated in step 73.
When the unique identification number (ID)
determined in step 74 matches the unique identification
number (ID) of the object 200 generated by the chip II
of the authentication code generating device 1, the
object: 2 00 is verified as authentic. Otherwise, the
object 200 is determined to be a counterfeit.
It is noted that, in an alternative embodiment, the
unique identification number (ID) of the object 200
serves as a serial number of the object. 200.
From the above description, since the varying secret,
key generated by the chip 11 of the authentication code
generating device 1 is a function of date and time, the
first and second authentication codes (ACT, AC2)
generated by the chip 11 of the authentication code
generating device 1 varies with date and time each time
the actuator 12 is operated. As such, a dedicated
verification device is not required, and any person can
verify the authenticity of the object 200 by simply
accessing the internet.
It is noted that the authentication code generacing
device I of this invention is attached securely on the
object 200, and unauthorized removal oi the
authentication code generating device 1 from the obiect
2 00 can render the authentication code generating device
1 inoperative. As such, the authentication code
generating device 1 is prevented from being used on other
objects.
In an alternative embodiment, the display j3 of the
authentication code generating device 1 may be dispensed
with. Moreover, the authentication code generating
device 1 can include a transmitter (not shown) that is
coupled to and controlled by the chip 11 o E the
authentication code generating device 1 so as to transmit
the first and second authentication codes (ACi, AC2)
wirelessly. The first and second authentication codes
(ACI, AC2} transmitted by the transmitter of the
authentication code generating device 1 may be received
and displayed by one of a notebook computer, a personal
digital assistant. (PDA), and a mobile phone.
WE CLAIM
1. A method for verifying authenticity of an object (200) that has a unique
identification number (ID), said method characterized by the steps of:
(A) enabling an authentication code generating device (1) that is attached to
the object (200) to generate a varying secret key, a first authentication
code (AC1) based on the varying secret key, and a second authentication
code (AC2) based on the unique identification number (ID) of the object
(200) and the varying secret key; and
(B) enabling an inquiry-based user interface in the form of web-based
application software (2) to generate a verifying code that is based on two
of the first and second authentication codes (AC1, AC2) and the unique
identification number (ID) of the object (200), and that can be matched
to the remaining one of the first and second authentication codes (AC1,
AC2) and the unique identification number (ID) of the object (200) in
order to verify authenticity of the object (200).
2. The method as claimed in Claim 1, wherein step (A) comprises the sub-
step of enabling a display (13) to inform the first and second
authentication codes (AClf AC2) to a user.
3. The method as claimed in Claim 1, wherein the authentication code
generating device (1) is configured with a chip code that corresponds to
the unique identification number (ID) of the object (200),
the second authentication code (AC2) being generated based on the chip
code configured in the authentication code generating device (1) and the
varying secret key generated in step (A).
4. The method as claimed in Claim 1, wherein the unique identification
number (ID) of the object (200) serving as a serial number of the object
(200),
wherein the authentication code generating device (1) is configured with a
chip code that corresponds to the serial number of the object (200),
the second authentication code (AC2) being generated based on the chip
code configured in the authentication code generating device (1) and the
varying secret key generated in step (A).
5. A system (100) for verifying authenticity of an object (200) that has a
unique identification number (ID), said system (100) characterised by:
an authentication code generating device (1) adapted to be attached to
the object (200), and having a chip (11) operable so as to generate a
varying secret key, a first authentication code (AC1) based on the varying
secret key, and a second authentication code (AC2) based on the varying
secret key and the unique identification number (ID) of the object (200),
and an inquiry-based user interface in the form of web-based application
software (2) configured to generate a verifying code based on two of the
first and second authentication codes (AC1, AC2) and the unique
identification number (ID) of the object (200) that can be matched to the
remaining one of the first and second authentication codes (AC1, AC2)
and the unique identification number (ID) of the object (200) in order to
verify authenticity of the object (200).
6. The system (100) as claimed in Claim 5, wherein said chip (11) of said
authentication code generating device (1) is configured with a chip code
that corresponds to the unique identification number (ID) of the object
(200), and generates the second authentication code (AC2) based on the
chip code configured in said chip (11) of said authentication code
generating device (1) and the varying secret key generated by said chip
(11) of said authentication code generating device (1).
7. The system (100) as claimed in Claim 5, wherein said authentication code
generating device (1) comprises an actuator (12) coupled to said chip (11)
of said authentication code generating device (1), and operable so as to
enable said chip (11) of said authentication code generating device (1) to
generate the varying secret key and the first and second authentication
codes (AC1, AC2).
8. The system (100) as claimed in Claim 5, wherein said authentication code
generating device (1) comprises a display (13) coupled to and controlled
by said chip (11) of said authentication code generating device (1) so as
to display the first and second authentication codes (AC1, AC2) generated
by said chip (11) of said authentication code generating device (1).
9. The system (100) as claimed in Claim 5, wherein said authentication code
generating device (1) comprises a transmitter that is coupled to and
controlled by said chip (11) of said authentication code generating device
(1) to transmit the first and second authentication codes (AC2) wirelessly.
10.The system (100) as claimed in Claim 7, wherein said actuator (12) of said
authentication code generating device (1) is one of a voice-activated
device, a wireless device, a touch screen, a keypad, and timer application
software.
11.The system (100) as claimed in Claim 5, wherein said chip (11) of said
authentication code generating device (1) is a radio frequency
identification (RFID) chip.
12.The system (100) as claimed in Claim 5, wherein the unique identification
number (ID) of the object (200) serving as a serial number of the object
(200),
wherein said chip (11) of said authentication code generating device (1) is
configured with a chip code that corresponds to the serial number of the
object (200), and generates the second authentication code (AC2) based
on the chip code configured in said chip (11) of said authentication code
generating device (1) and the varying secret key generated by said chip
(11) of said authentication code generating device (1).


The invention relates to a method for verifying authenticity of an object (200)
that has a unique identification number (ID), said method comprising the steps
of: A) generating a varying secret key, a first authentication code (AC1) based on
the varying secret key, and a second authentication code (AC2) based on the
unique identification number (ID) of the object (200) and the varying secret key;
and (B) generating a verifying code that is based on two of the first and second
authentication codes (AC1, AC2) and the unique identification number (ID) of the
object (200), and that can be matched to the remaining one of the first and
second authentication codes (AC1, AC2) and the unique identification number
(ID) of the object (200) in order to verify authenticity of the object (200).

Documents:

00193-kol-2005 abstract.pdf

00193-kol-2005 claims.pdf

00193-kol-2005 correspondence-1.1.pdf

00193-kol-2005 correspondence-1.2.pdf

00193-kol-2005 correspondence.pdf

00193-kol-2005 description(complete).pdf

00193-kol-2005 drawings.pdf

00193-kol-2005 form-1.pdf

00193-kol-2005 form-18.pdf

00193-kol-2005 form-2.pdf

00193-kol-2005 form-26.pdf

00193-kol-2005 form-3.pdf

193-KOL-2005-CLAIMS 1.1.pdf

193-KOL-2005-CORRESPONDENCE 1.3.pdf

193-KOL-2005-FORM-27.pdf

193-kol-2005-granted-abstract.pdf

193-kol-2005-granted-claims.pdf

193-kol-2005-granted-correspondence.pdf

193-kol-2005-granted-description (complete).pdf

193-kol-2005-granted-drawings.pdf

193-kol-2005-granted-examination report.pdf

193-kol-2005-granted-form 1.pdf

193-kol-2005-granted-form 18.pdf

193-kol-2005-granted-form 2.pdf

193-kol-2005-granted-form 26.pdf

193-kol-2005-granted-form 3.pdf

193-kol-2005-granted-reply to examination report.pdf

193-kol-2005-granted-specification.pdf


Patent Number 238880
Indian Patent Application Number 193/KOL/2005
PG Journal Number 09/2010
Publication Date 26-Feb-2010
Grant Date 24-Feb-2010
Date of Filing 21-Mar-2005
Name of Patentee USERSTAR INFORMATION STSTEM CO. LTD
Applicant Address 5F-2, NO. 21, LANE 513, SIAOYA RD, CHIAYI CITY,
Inventors:
# Inventor's Name Inventor's Address
1 YIN-HUNG TSENG 5F-2, NO. 21, LANE 513, SIAOYA RD, CHIAYI CITY
PCT International Classification Number N/A
PCT International Application Number N/A
PCT International Filing date
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 NA