Title of Invention | METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AN OBJECT |
---|---|
Abstract | The invention relates to a method for verifying authenticity of an object (200) that has a unique identification number (ID), said method comprising the steps of: A) generating a varying secret key, a first authentication code (AC1) based on the varying secret key, and a second authentication code (AC2) based on the unique identification number (ID) of the object (200) and the varying secret key; and (B) generating a verifying code that is based on two of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200), and that can be matched to the remaining one of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200) in order to verify authenticity of the object (200). |
Full Text | METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF AN OBJECT The invention relates to a method and system for verifying authenticity of an object, more particularly to a method and system for verifying authenticity of an object thorough the use of varying authentication codes. Laser labels are currently in use to address the problem of counterfeiting. Typically, the laser label is attached to a product, and can be scanned to verily the authenticity of the product. Such method of verification, however, requires the use of a dedicated verification device. Acccrciinqly, verification of the authenticity of a product attached with the iaser label is only possible by persons, such as retail outlet, staff, equipped with the verification device, and cannot be conveniently carried cur. by cons ume r s t hem selves. Therefore, the object of the present invention is to provide a method and system for ver.i i yinc authentic! 1. y of an object through the use of varying authentication codes so as to overcome the aforesaid drawback of trie prior art. According v.o one aspect of the present invention, a method for verifying authenticity c: an object that has a unique identification number includes the steps of: (A) generating a varying secret key, a fir a t authentication code based on the varying secret key, and a second authentication code based on the unique identification number of the object and the varying secret key; and (B) generating a verifying code that is based on two of the first and second authentication codes and the unique identification number of the oojoct and thai can be matched to the remaining one of the first, and second authentication codes and the unique identification number of the object in order to verify authenticity of the object. According to another aspect of the present invent ion, asystem, whichis for verifying authenticity© fan object chat has a unique identification number, comprises an authentication code generating device that is adapted to be attached to the object. The authentication code generating device includes a chip that is operable so as to generate a varying secret key, a first authentication code based on the varying secret key, and a second authentication code based on the varying secret key and the unique identification number of the object. A veriiying code can be generated, such as through an inquiry-based user interface, based on two of the first and second authentication codes and the unique identification number of the object, and can be matched to the remaining one of the first and second authentication codes and the unique identification number of the object in order to verify authenticity of the object. Other features and advantages of the present ir.venr. ion will become apparent in the to.I I owing det ailed description of the preferred embodiment, with reference to the accompanying drawings, of which: Figure 1 is a schematic block diagram of a system for implementing the preferred embodiment of the method for verifying authenticity of an object according to the present invention; Figure 2 is a flowchart to illustrate steps performed by an authentication code generating device of the system of Figure 1; and Figure 3 is a flowchart to illustrate steps associated with an inquiry-based user interface of the system of F i gu re 1 . Figure 1. illustrates a system 100 for implementing the preferred embodiment of a method for verifying authenticity of an object 20C in accordance with this invention. The object 2 00 has a unique identification number (ID), e.g., "GU8I4b6'/899" . In this embodiment, the object 200 is a consumer product, such as a wine. In an alternative embodiment, the object 200 may be an artwork, a security bond, or a certificate. The system 100 according to this invention is shown to include an authentication code generating device 1 and an inquiry-based user interface 2. The authentication code generating device 1 of the system 100 according to this invention includes a chip 11, an actuator 12, and a display 13. The chip 11 of the authentication code generating device 1 is operable so as to generate a varying secret key, a first authentication code (AC1) based on the varying secret key, and a second authentication code (AC2) based on the unique identification number (ID) of the object 200 and the varying secret key, in a manner that will be described in greater detail hereinafter. In this embodiment, the chip 11 of the authentication code generating device 1 is a radio frequency identification (RFID) chip. In this embodiment, the chip 11 of the authentication code generating device 1 is configured with a chip code, e.g., "003027033001029" that corresponds to the unique identification number (ID) of the object 200. The chip 11 of the authentication code generating device 1 is further configured with first to seventh lookup tables as follows: The display 13 of the authenticat, icr. code generating device 1 is coupled Lc and controlled by the chip 11, and operable so as to display the first and second authentication codes (AC1, AC2) generated by the chip 11. The actuator 12 of the authentication code generating device 1 is coupled to the chip II, and is operable so as to enable the chip 11 to generate the varying secret, key, and the first and second authenticat ion codes (AC1, AC2 ) . Preferably, the actuator 12 of the authentication code generating device 1 is one of a voice-activated device, a wireless device, a touch screen, a keypad, and timer software application. In this embodiment, the chip 11 of the authentication code generating device 1 of the system 100 is installed with proprietary software for executing steps associated with the method of the preferred embodiment. The steps performed by the chip 11 of the authentication code generating device 1, as illustrated in Figure 2, are as follows: In step .31, upon operation of the actuator 12 o! the authentication code generating device 1, the chip 11 of the authentication code generating device 1 generates a varying secret key that, in this embodimeni, is a function of date and time. For example, when the actuator 12 of the authentication code generating device 1 is operated on May 31, 2004 at 9:30:24 AM, the chip 1": of the authentication code generating device 1 generates a varying secret key as "2004 0531093024". In step 32, the chip II of the authentication code generating device 1 divides the varying secret key generated in step 31 into seven groups. For example, for the exemplified varying secrei key of ""20040531093024", the first group corresponds to "2", the second group corresponds to "004", the third group corresponds to the "05", the fourth group corresponds to "31", the fifth group corresponds to "09", the sixth group corresponds to "30", and the seventh group corresponds to "24". In step 33, the chip 11 of the authentication code generating device 1 converts each of the first to fifth groups into a corresponding identifier code using a respective one of the first to fifth lookup tables configured therein, leaving the sixth and seventh groups unchanged. It is noted that since the first group (e.g., 2) has three corresponding identifier codes (e.g., B, L, and V), as i llustrated in the first, lookup rab.le, and since the third group of the varying secret key (e.g. Ob) has three corresponding identifier codes (e.g. E, Q, and 3), as illustrated in third lockup tabic, there are nine possible conversions for r.he varying secret key, "20040530093024", one of which is "BAEQUI3024". Thereafter, in step 34, the chip 11 of the authentication code generating device 1 permutes the seven groups by selecting one of predetermined permutations stored in the sixth lookup table. With reference to the sixth lookup table, there are forty-five thousand three hundred sixty possible permutations for "BAEQUI3024", one of which is "AEQU2430BI" . In step 3b, the chip 11 of the authentication code generating device 1 appends the identifier code, which corresponds to the selected one of the predetermined permutations, to the selected one of the predetermined permutations in order to obtain the first authenticat ion code. With reference to the sixth lookup table, since the identifier code for "AEQU24 30BI" is "D", the first authentication code (ACT) is "AEQU2430B1U". In an alternative embodiment, steps 32 to 35 are skipped, and the first authentication code (AC1) takes the value of the varying secret key generated in step 31. In step 36, the chip 11 of the authentication code generating device 1 divides the chip code configured therein into five groups. For example, for the exemplified chip code "00 3027033 001029", the firsr. group corresponds to "003", the second group corresponds to "027", the third group corresponds to "033", t.hefounh group corresponds to "00.1", and the fifth group corresponds to "029". In step 37, the chip 11 of the authentication code generating device 1 converts each of the first, to fifth groups into a corresponding identifier code using the second lookup table configured therein to thereby obtain "ADA1BAABA3". In step 38, the chip 11 of the authentication code generating device 1 converts the varying secret key by discarding the first eight digits of the varying secret key to thereby obtain "093024". In step 39, the chip 11 of the authentication code generating device 1 appends "093024" obtained in st.ep 38 to "ADA1BAABA3" obtained in step 37 to thereby obtain "ADA1BAABA3093024". In step 4C, the chip 11 of the authentication code generating device 1 divides the results obtained in step 39 into fourgroups. The first group corresponds to "ADA! ", the second group corresponds to "BAAB", the third group corresponds to "A309", and the fourth group corresponds to "3024". In step 41, the chip 11 of the authentication code generating device 1 permutes the four groups by selecting one of predetermined permutations stored in the seventh lookup table. With reference to the seventh lockup tabic, there are twenty-four possible permutations for "ADA1BAABA3093024", one of which is"ADA1A309BAAB3024". In step 42, the chip 11 of the authentication cede generating device 1 appends the identifier code, which corresponds to the selected one of the predetermined permutations, to the selected one of :.he predetermined permutations in order to obtain the second authentication code. With reference to the seventh lookup table, since the identifier code for "ADA1A309BAAB3024" is "B", the second aut her. t. icaticr. code is "ADA1A309BAAB3034B". In this embodiment, the inquiry-based user interface 2 is web-based application software that is installed in a web server (not shown) and that executes steps associated with the method of the preferred embodiment . It is noted that the unique identification number (ID) of the object 200, and the chip code that corresponds to the unique identification number (ID) of the object 200 are configured in the inquiry-based user interface 2. The steps associated with the inquiry-based user interface 2, as illustrated in Figure 3, are as follows: In step 51, after the unique identification number (ID) of the object 200, e.g., "GU814567899", and tnc first authentication code (AC1), e.g., "AEQU2430BID", generated by the chip 11 of the authentication code generating device 1 are inputted to the inquiry-cased user interface 2, the flowproceeds rostepb2. Otherwise, the flow proceeds to step 61. In step 52, ihe inquiry-based user interface /. determines the chip code that is configured therein arid that corresponds to the unique identification number (ID) of the object. 200 inputted in step b'i. In step S3, the inquiry-based user interface 2 generates a secret key based on the first authentication code (AC1) inputted in step 51 by performing steps 31 to 3 5 in reverse. In step 54, the inquiry-based user interface 2 generates and displays a verifying code based or: the chip code determined in step 5 2 and the secret key generated i. n step 53. When the verifying code generated in step 54 matches the second authenticating code (AC2) generated by the chip II of the authentication code generating device 1, the object 200 is verified as authentic. Otherwise, the object 200 is determined to be a counterfeit. In step 61, after the unique identification number (ID) of the object 200, and the second authentication code (AC2) generated by the chip 11 of the authent i cat ion code generating device i are inputted to the inquiry-based user interface 2, the flow proceeds to step 62. Otherwise, ihe flow proceeds to step 71. In step 62, the inquiry-based user interface 2 determines the chip code that is configured therein and thai corresponds to the unique Identification number (ID) of the object 200 inputted in step 61. In step 63, the inquiry-based user interface 2 generates a secret, key based on the second authentication code (AC2 ) inputted in step 61 and the chip code determined in step 62 by performing steps 36 to 42 in reverse. In step 64, the inquiry-based user interface 2 generates a verifying code based on the secret key generated in step 63. When the verifying code generated in step 64 matches the first authenticating code (AC!) generated by the chip 11 of the authentication code generating device 1, the object 200 is verified as authentic. Otherwise, the object 200 is determined to be a counterfeit. In step 71, after the first and second authentication codes (AC1, AC2) generated by the chip 11 of the authentication code generating device i are inputted to the inquiry-based user interface 2, the flow proceeds to step 72. Otherwise, the flow proceeds to step 51. In step 72, the inquiry-based user Interface 2 generates a secret key based on the first authentication code (AC1) inputted in step 71 by performing step 31 to 35 in reverse. In step 73, the inquiry-based user interface 2 generates a chip code based on the secret key generated in step 72 and the second authentication code (AC1; inputted in step 71 by performing steps 36 to 4? in reverse. In step 74, the inquiry-based user interface 2 determines the unique identification number (10) tha l. corresponds r.o the chip code generated in step 73. When the unique identification number (ID) determined in step 74 matches the unique identification number (ID) of the object 200 generated by the chip II of the authentication code generating device 1, the object: 2 00 is verified as authentic. Otherwise, the object 200 is determined to be a counterfeit. It is noted that, in an alternative embodiment, the unique identification number (ID) of the object 200 serves as a serial number of the object. 200. From the above description, since the varying secret, key generated by the chip 11 of the authentication code generating device 1 is a function of date and time, the first and second authentication codes (ACT, AC2) generated by the chip 11 of the authentication code generating device 1 varies with date and time each time the actuator 12 is operated. As such, a dedicated verification device is not required, and any person can verify the authenticity of the object 200 by simply accessing the internet. It is noted that the authentication code generacing device I of this invention is attached securely on the object 200, and unauthorized removal oi the authentication code generating device 1 from the obiect 2 00 can render the authentication code generating device 1 inoperative. As such, the authentication code generating device 1 is prevented from being used on other objects. In an alternative embodiment, the display j3 of the authentication code generating device 1 may be dispensed with. Moreover, the authentication code generating device 1 can include a transmitter (not shown) that is coupled to and controlled by the chip 11 o E the authentication code generating device 1 so as to transmit the first and second authentication codes (ACi, AC2) wirelessly. The first and second authentication codes (ACI, AC2} transmitted by the transmitter of the authentication code generating device 1 may be received and displayed by one of a notebook computer, a personal digital assistant. (PDA), and a mobile phone. WE CLAIM 1. A method for verifying authenticity of an object (200) that has a unique identification number (ID), said method characterized by the steps of: (A) enabling an authentication code generating device (1) that is attached to the object (200) to generate a varying secret key, a first authentication code (AC1) based on the varying secret key, and a second authentication code (AC2) based on the unique identification number (ID) of the object (200) and the varying secret key; and (B) enabling an inquiry-based user interface in the form of web-based application software (2) to generate a verifying code that is based on two of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200), and that can be matched to the remaining one of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200) in order to verify authenticity of the object (200). 2. The method as claimed in Claim 1, wherein step (A) comprises the sub- step of enabling a display (13) to inform the first and second authentication codes (AClf AC2) to a user. 3. The method as claimed in Claim 1, wherein the authentication code generating device (1) is configured with a chip code that corresponds to the unique identification number (ID) of the object (200), the second authentication code (AC2) being generated based on the chip code configured in the authentication code generating device (1) and the varying secret key generated in step (A). 4. The method as claimed in Claim 1, wherein the unique identification number (ID) of the object (200) serving as a serial number of the object (200), wherein the authentication code generating device (1) is configured with a chip code that corresponds to the serial number of the object (200), the second authentication code (AC2) being generated based on the chip code configured in the authentication code generating device (1) and the varying secret key generated in step (A). 5. A system (100) for verifying authenticity of an object (200) that has a unique identification number (ID), said system (100) characterised by: an authentication code generating device (1) adapted to be attached to the object (200), and having a chip (11) operable so as to generate a varying secret key, a first authentication code (AC1) based on the varying secret key, and a second authentication code (AC2) based on the varying secret key and the unique identification number (ID) of the object (200), and an inquiry-based user interface in the form of web-based application software (2) configured to generate a verifying code based on two of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200) that can be matched to the remaining one of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200) in order to verify authenticity of the object (200). 6. The system (100) as claimed in Claim 5, wherein said chip (11) of said authentication code generating device (1) is configured with a chip code that corresponds to the unique identification number (ID) of the object (200), and generates the second authentication code (AC2) based on the chip code configured in said chip (11) of said authentication code generating device (1) and the varying secret key generated by said chip (11) of said authentication code generating device (1). 7. The system (100) as claimed in Claim 5, wherein said authentication code generating device (1) comprises an actuator (12) coupled to said chip (11) of said authentication code generating device (1), and operable so as to enable said chip (11) of said authentication code generating device (1) to generate the varying secret key and the first and second authentication codes (AC1, AC2). 8. The system (100) as claimed in Claim 5, wherein said authentication code generating device (1) comprises a display (13) coupled to and controlled by said chip (11) of said authentication code generating device (1) so as to display the first and second authentication codes (AC1, AC2) generated by said chip (11) of said authentication code generating device (1). 9. The system (100) as claimed in Claim 5, wherein said authentication code generating device (1) comprises a transmitter that is coupled to and controlled by said chip (11) of said authentication code generating device (1) to transmit the first and second authentication codes (AC2) wirelessly. 10.The system (100) as claimed in Claim 7, wherein said actuator (12) of said authentication code generating device (1) is one of a voice-activated device, a wireless device, a touch screen, a keypad, and timer application software. 11.The system (100) as claimed in Claim 5, wherein said chip (11) of said authentication code generating device (1) is a radio frequency identification (RFID) chip. 12.The system (100) as claimed in Claim 5, wherein the unique identification number (ID) of the object (200) serving as a serial number of the object (200), wherein said chip (11) of said authentication code generating device (1) is configured with a chip code that corresponds to the serial number of the object (200), and generates the second authentication code (AC2) based on the chip code configured in said chip (11) of said authentication code generating device (1) and the varying secret key generated by said chip (11) of said authentication code generating device (1). The invention relates to a method for verifying authenticity of an object (200) that has a unique identification number (ID), said method comprising the steps of: A) generating a varying secret key, a first authentication code (AC1) based on the varying secret key, and a second authentication code (AC2) based on the unique identification number (ID) of the object (200) and the varying secret key; and (B) generating a verifying code that is based on two of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200), and that can be matched to the remaining one of the first and second authentication codes (AC1, AC2) and the unique identification number (ID) of the object (200) in order to verify authenticity of the object (200). |
---|
00193-kol-2005 correspondence-1.1.pdf
00193-kol-2005 correspondence-1.2.pdf
00193-kol-2005 correspondence.pdf
00193-kol-2005 description(complete).pdf
193-KOL-2005-CORRESPONDENCE 1.3.pdf
193-kol-2005-granted-abstract.pdf
193-kol-2005-granted-claims.pdf
193-kol-2005-granted-correspondence.pdf
193-kol-2005-granted-description (complete).pdf
193-kol-2005-granted-drawings.pdf
193-kol-2005-granted-examination report.pdf
193-kol-2005-granted-form 1.pdf
193-kol-2005-granted-form 18.pdf
193-kol-2005-granted-form 2.pdf
193-kol-2005-granted-form 26.pdf
193-kol-2005-granted-form 3.pdf
193-kol-2005-granted-reply to examination report.pdf
193-kol-2005-granted-specification.pdf
Patent Number | 238880 | ||||||||
---|---|---|---|---|---|---|---|---|---|
Indian Patent Application Number | 193/KOL/2005 | ||||||||
PG Journal Number | 09/2010 | ||||||||
Publication Date | 26-Feb-2010 | ||||||||
Grant Date | 24-Feb-2010 | ||||||||
Date of Filing | 21-Mar-2005 | ||||||||
Name of Patentee | USERSTAR INFORMATION STSTEM CO. LTD | ||||||||
Applicant Address | 5F-2, NO. 21, LANE 513, SIAOYA RD, CHIAYI CITY, | ||||||||
Inventors:
|
|||||||||
PCT International Classification Number | N/A | ||||||||
PCT International Application Number | N/A | ||||||||
PCT International Filing date | |||||||||
PCT Conventions:
|