RELATED APPLICATIONThis application is a continuation under 37 C.F.R. 1.53(b) of U.S. application Ser. No. 12/135,391 filed Jun. 9, 2008, which is a continuation under 37 C.F.R. 1.53(b) of U.S. application Ser. No. 11/134,065 filed May 20, 2005, which applications are incorporated herein by reference and made a part hereof.
BACKGROUNDIdentifiers have been used to identify all types of products. Labels are one type of identifier and can include a logo that identifies the source of a product and the type of a product. Sometimes the label includes a serial number. Special grading codes can be included in labels for the purpose of identifying the grade of a product, uniformity of a product or the source of a product. Labels are also placed on a product to specifically identify the exact source within a manufacturing plant of the product. A serial number or some other identifier can be used to identify the product while it is being manufactured. The serial number or some other identifier is scanned during the various stages of manufacture and records are kept as to the processes used and the manufacturing machines used to form the product. This can be useful in identifying the cause of product failures. For example, if one manufacturing machine is not performing correctly and some of the products made on the machine pass inspection or do not undergo inspection, a number of products can end up in the marketplace with an obvious defect or a latent defect. When the product fails, the manufacturing information can be used to track down other products that may also have the same latent defect.
Labels or similar identifiers are also used to authenticate a product when a product fails or when a product is returned. A manufacturer can be assured that they have ownership of a problem when the product label can be used to authenticate the product as one the manufacturer produced. In many product areas, there are large numbers of counterfeit goods that appear, especially to the consumer, to be original goods. When a counterfeit product is returned, in some instances manufacturers are fixing or replacing goods that they did not originally manufacture. This adds expense to the manufacturer.
Another problem is diversion of products. In some instances, certain parts are made by subcontractors of a manufacturer. The subcontractors generally bid for the job. The bidding can be fierce with high pressure to bid low. One tactic employed by subcontractors is to bid the jobs with little or no margin. The subcontractor produces more parts than is required by the contract with the idea that these additional parts can be sold as original parts. The profits are made on selling the additional parts. This tactic is known as diversion. When a diverted product is returned, in some instances manufacturers are fixing or replacing goods that they did not originally sell or manufacture. No profit was generated on the diverted product. Fixing or replacing diverted products also adds expense to the manufacturer of the product.
A constant challenge for manufacturers is to authenticate product that has been manufactured and sold by the manufacturer so that the responsibility for fixing or replacing a defective product can be determined to rest squarely with the manufacturer. The manufacturer loses money when products can not be authenticated and they fix or replace counterfeit products or diverted products.
BRIEF DESCRIPTION OF THE FIGURESEmbodiments of the present invention are illustrated by way of example and not limitation in the Figures of the accompanying drawings in which:
FIG. 1 is a schematic diagram illustrating a system for authentication of a product, according to an example embodiment.
FIG. 2 is a perspective view of a product that includes an overt identifier and a covert identifier, according to an example embodiment.
FIG. 3 is a view of a product that includes a label having an overt identifier and a covert identifier, according to an example embodiment.
FIG. 4 is a view of a product that includes a label having an overt identifier and a covert identifier, according to an example embodiment.
FIG. 5 is a data base having a plurality of records in which an overt number is associated with a cover number, according to an example embodiment.
FIG. 6 is a data base having a plurality of records in an overt number, a covert number and other information are associated, according to an example embodiment.
FIG. 7 is a flow diagram illustrating a method for authenticating or rejecting a product based on the covert and overt identifiers, according to an example embodiment.
FIG. 8 is a schematic diagram illustrating a medium that includes an instruction set, according to an example embodiment.
FIG. 9 illustrates an example computer system used in conjunction with certain example embodiments.
DETAILED DESCRIPTIONA system and method for authenticating products are described herein. In the following description, numerous specific details are set forth. The following description and the drawing figures illustrate aspects and example embodiments of the invention sufficiently to enable those skilled in the art. Other embodiments may incorporate structural, logical, electrical, process, and other changes. For example, functions described as software may be performed in hardware and vice versa. Other structures may also be used and still be within the scope of the system and method described. Examples merely typify possible variations, and are not limiting. Individual components and functions may be optional, and the sequence of operations may vary or run in parallel. Portions and features of some embodiments may be included in, substituted for, and/or added to those of others. The scope of the embodied subject matter encompasses the full ambit of the claims and substantially all available equivalents.
FIGS. 1-3 show various example embodiments of a products marked with anidentifier210. Theidentifier210 includes a covert identifier212 and anovert identifier214.FIG. 2 is a perspective view of atire200, as an example product, that includes anidentifier210 placed directly on theproduct200. Theidentifier210 includes an overt identifier212 and acovert identifier214. In some embodiments, theidentifier210 includes at least one direct marking on a product, which could be either the covert identifier portion, and an overt identifier portion. The overt identifier212 is a marking that is capable of being detected by the naked eye or by a reader. The overt identifier212 is also unique to the product, such as a serial number associated with the product. Although not required, the number may be one of a sequence of numbers. Thecovert identifier214 is generally not visible. In one example embodiment, acovert identifier214 is placed directly on theproduct210. Thecovert identifier214, in one embodiment, includes a taggant (shown inFIG. 2) which are microscopic particles that cannot be seen by the naked eye and are difficult to detect via forensic methods other than a specific detection method. The taggant can be combined with an ink or an adhesive and placed in at an assigned or selected location. As shown inFIG. 1, theproduct200 includes adatum240 that is used to locate the assigned or selected location where thecovert identifier214 is to be placed and later found. Thedatum240 can include a bar or marking on theproduct200. For example, thedatum240 may be the corner of a letter of the brand name of the product. In many products, the brand name is formed with the product. For example, some tires include raised letters used to indicate the brand of the tire. The brand name is formed when the tire is molded.
FIGS. 2 and 3 are views ofproducts300 that include alabel310 having anovert identifier314 and acovert identifier312, according to example embodiments. As shown inFIGS. 2 and 3, thelabel310 is the identifier. Thelabel310 can be manufactured in a separate operation and applied to theproduct300 during manufacture. This simplifies the manufacturing process for theproduct300. In some embodiments,label310 includes adatum340 for locating an assigned or selected location of thecovert identificatier312. In some embodiments of the invention, thecovert identifier312 includes ataggant352. Thetaggant352 includes a plurality of microscopic particles that cannot be seen by the naked eye and are difficult to detect via forensic methods other than a specific detection method. Thetaggant352 is shown inFIG. 2 for the sake of clarity. Thetaggant352 can be combined with an ink or an adhesive and placed in at an assigned or selected location on thelabel310. In other embodiments, thetaggant352 is combined with an ink or an adhesive and placed over a majority of the surface of thelabel310. In still other embodiments, thetaggant352 is combined with an ink or an adhesive and placed over substantially the entire surface of thelabel310. In such instances, thedatum340 is used to find the portion of thelabel310 from which to read thetaggants352. As shown inFIG. 2, a pair of x-axis locations (x1 and x2) are selected and the y-axis locations of the particle found at the x-axis location is determined. The coordinates of the pair of particles are then used to generate a random number. This is one algorithm that is used to transform the random distribution of substantially invisible particles found in ataggant352 into a random number. Of course, other algorithms can be used to generate a random number from the distribution of particles in thetaggant352. In some example embodiments, the actual pattern could be stored. This however, would require more memory than using an algorithm to generate a random number from the random distribution of particles associated with thetaggant352. As shown inFIG. 3, theovert identifier314 need not be a number but can be a series of letters. In other embodiments of the invention, theovert identifier314 can be a combination of letters and numbers which are unique to the particular manufactured item in a product line.
FIG. 3 differs fromFIG. 2 in that theovert identifier316 is a bar code placed on thelabel310. The bar code includes a unique number, such as a serial number associated with the manufacturedproduct300. In addition, a brand name320 is placed on the label. Again, thedatum340 could be set as a portion of one of the letters in the brand name or as the bar below the brand name. Thetaggant352 is invisible to the naked eye inFIG. 3.
FIG. 4 is a schematic diagram illustrating asystem400 for authentication of a product (such asproducts200,300 shown inFIGS. 1-3), according to an example embodiment. Theauthentication system400 includes asensor module410, aninformation handling module420, such as a processor or microprocessor, and astorage module440. Thesensor module400 includes afirst sensor412 and asecond sensor414. Thefirst sensor412 includes a device for detecting acovert identifier212,312 associated with a product (shown inFIGS. 1-3). Thesecond sensor414 includes a device for determining or reading theovert identifier214,314 associated with theproduct200,300 (shown inFIGS. 1-3). Thememory module440 stores a value associated with acovert identifier212,312 and an associated value associated with anovert identifier214,314. Thememory module440 stores combinations of values associating anovert identifier212,314 with acovert identifier212,312 for a product type at the time of manufacture. Thememory module440 can also be used to store combinations ofovert identifiers214,314 andcovert identifiers212,312 from products that have left a factory or left the control of a manufacturer. Thememory module440 can store the associated combinations of overt identifiers and covert identifiers in adata base442. More specifically, thememory module440 can store the associated combinations of overt identifiers and covert identifiers as a plurality of records in adata base442.
Theauthentication system400 also includes acomparator444 for comparing records found in thedata base442 with a detected value associated with acovert identifier212,312 associated with the product and a detected value of theovert identifier214,314, associated with the product, to a previously storedcovert identifier212,312 associated with the product and previously storedovert identifier214,314 associated with theproduct200,300.
Theauthentication system400 can also include alocator413 for locating thecovert identifier212,312 associated with theproduct200,300 (shown inFIGS. 1-3). Thelocator413, in one embodiment, is adapted to locate adatum240,340 associated with theproduct200,300. Once thelocator413 determines thedatum location240,340 on aproduct200,300 or on alabel310, a set of instructions ordirections450 stored in thestorage module400 is used to locate thecovert identifier212,312. Thedatum240,340 can include a bar or marking on alabel310 or can include a marking on aproduct200. For example, thedatum240,340 may be the corner of a letter of the brand name of the product. In many products, the brand name is formed with the product. For example, some tires include raised letters that are formed when the tire is molded.
In some embodiments of theauthentication system400, aproduct200,300 is rejected as not authentic or as not manufactured and sold by a manufacturer if thecovert identifier212,312 is not found or not located at the selected location for theproduct200,300. If thecovert identifier212,312 is not found, then the product is rejected as being from a source other than the manufacturer. If acovert identifier212,312 is found in the selected location on theproduct200,300, then thecovert identifier212,312 can be read or detected. Thus, detecting the presence of thecovert identifier212,312 can be thought of as a way to quickly determine if theproduct200,300 may be authentic. As mentioned above, thecovert identifier212,312 is substantially invisible. In other words, the covert identifier can not be seen by the naked eye and can only be detected and read with an appropriate sensor, such as thefirst sensor412. In some example embodiments, thefirst sensor412 for detecting a covert identifier operates outside the spectrum of visual light. Thefirst sensor412 can use ultraviolet (UV) light to detect the covert identifier. In other embodiments, the sensor detects the covert identifier non visually.
Theauthentication system400 includes also includes further instructions in theinstruction set450 that cause the information handling module or theprocessor420 to receive instructions from the storage module ormemory unit440. The instructions cause the information handling module or theprocessor420 to perform operations including reading a covert identifier associated with a product, reading an overt identifier associated with the product, and matching a covert identifier with an overt identifier to authenticate the product. Theinstruction set450 also includes sets of instructions for all the tasks that must be performed by the information handling module or theprocessor420, including associating theovert identifier214,314 with thecovert identifier212,312, driving thesensors412,414, and algorithms for determining a random number from the location of the randomly distributed particles associated with thetaggant352. Theinstruction set450 also includes instructions for carrying out methods needed to authenticate or reject a product as not authentic.
In some example embodiments, theauthentication system400 includes a connection460 to a network470. The network can be a local area network (LAN) and wide area network (WAN) or the internet. The network connection allows variousinformation handling systems420 to share information and instruction sets. For example, theauthentication system400 shown inFIG. 4 could be a system at a manufacturing site where theproduct200,300 was originally produced. Other authentication systems remote from theauthentication system400 shown inFIG. 4 could communicate with thestorage module440 of theauthentication system400 shown to obtain secure associations or combinations ofovert identifiers214,314 andcovert identifiers212,312 to verify that products were indeed manufactured by the manufacturer. Of course, appropriate levels of authorization would be set in place to prevent corruption of the data in thedata base442.
FIG. 5 shows a representation of adata base542 having a plurality ofrecords520,521,522,523,524,525 in which anovert number514 is associated with acovert number512, according to an example embodiment. Theovert number514 is a number unique to the particular article manufactured. Thecovert number512 is a number generated from a random distribution of particles at a particular location on a product or on a label attached or placed on a product. The combination of the random,covert number512 and the uniqueovert number514, such as a product serial number, is designated as a secure association in asecure data base542 at the time of manufacture of the particular product. The association of the random,covert number512 and the uniqueovert number514 makes duplication of the product markings or duplication of thelabel310 highly unlikely. Duplication is highly unlikely since the distribution of the particles of the taggant352 (shown inFIG. 2) is random, and any number of algorithms can be used to generate a random number from the taggant. The algorithm can vary by the location of the datum or by the dimensions along the x or y axis where the particles are to be located to generate the random number. Thus, in order to duplicate theidentifier210,310, the random distribution of particles must also be replicated.
FIG. 6 is adata base642 having a plurality ofrecords620,621,622,623,624,625 . . . n, in anovert number614, acovert number612 andother information650 are securely associated within thedata base642, according to an example embodiment. The other information can include any type of data. There is no limitation to the type of data that can be associated with a particular record. For example, other information can include the product type or a product number, or information related to the manufacture of the particular device. For example, in many factories, each manufactured item is tracked during each stage of manufacture. Manufacturing an article of manufacture may require bending at one of twenty bending machines and may require welding at one of ten welding stations. The more complex the manufacturing process, the more possible manufacturing combinations exist. For a particular article of manufacture, the combination of machines and processes underwent during manufacture can be associated with the record in thedata base642. This information can be very helpful in isolating causes for product failure in the future. For example, products may be failing that were welded at one welding station. Rather than recalling an entire line of products, only certain ones need to be recalled which can help the manufacturer save on recall expenses. Other information may include distributors and buyers that filled in warranty registrations. Of course, theother information650 stored in thedata base642 could be one or more pointers to records in other data bases that could contain the other information.
FIG. 7 is a flow diagram illustrating amethod700 for authenticating or rejecting a product based on the covert and overt identifiers, according to an example embodiment. Theauthentication method700 includes reading a covert identifier associated with aproduct710, and reading an overt identifier associated with theproduct712. A decision is then made as to whether the read covert identifier and overt identifier combination matches a stored combination covert identifier and overt identifier, as depicted bydecision box714. If the read combination matches a stored combination, the product is authenticated716 and the process ends720. On the other hand, if the read combination does not match a stored combination, the product is rejected as not authentic718, and the process ends720.
In some embodiments, theauthentication method700 includes labeling the product with a label that includes an overt identifier and a covert identifier. In other embodiments, theauthentication method700 includes marking the product with an overt identifier and a covert identifier. The covert identifier from the product, and the overt identifier from the product are stored at the time of manufacture and may be stored when subsequently read after manufacture. The covert identifier and the overt identifier are related to the product. In one embodiment, the covert identifier and the overt identifier are related in a data base of an information handling system. The covert identifier and the overt identifier can be related to the product by forming a record in a data base. Other manufacturing information can be related with the covert identifier and the overt identifier and the product. In one embodiment, the covert identifier is invisible to the naked eye. Reading the covert identifier associated with the product includes finding a datum associated with the covert identifier, and reading a pattern at a location related to the datum. In some embodiments, the method includes associating a unique number with the random pattern.
Another embodiment of an authentication method includes determining that an overt identifier is associated with a product, and detecting that a covert identifier is associated with the product. Detecting an overt identifier includes locating an area where a covert, identifier is to be located, and determining the presence of the covert identifier. In some embodiments, determining the presence of the covert identifier includes determining the presence of a plurality of taggant particles. In other embodiments, the authentication method for determining the presence of the covert identifier includes reading the covert identifier.
In still another example embodiment, a method of product identification includes placing a covert identifier on a product, and placing an overt identifier on the product. The product identification method also includes relating the covert identifier and the overt identifier to the product. Relating the covert identifier and the overt identifier to the product can also include associating the covert identifier and the overt identifier in a data base. In some embodiments, other product information is also related with the product. In some embodiments, product manufacturing information is also related to the product. In some embodiments, placing a covert identifier on a product, and placing an overt identifier on the product includes labeling a product with a label that includes a covert identifier and an overt identifier. In some embodiments, the covert identifier is on a portion of the label.
FIG. 8 is a schematic diagram illustrating of amedia800 that includes aninstruction set850, according to an example embodiment. The machinereadable medium800 includes any type of medium such as a link to the internet or other network, or a disk drive or a solid state memory device, or the like. A machine-readable medium800 includes instructions within theinstruction set850. The instructions, when executed by a machine such as an information handling system or a processor, cause the machine to perform operations that include reading a covert identifier associated with a product, reading an overt identifier associated with the product, and matching a covert identifier with an overt identifier to authenticate the product. The instructions can further cause the machine to perform operations that include storing a covert identifier from the product, and storing an overt identifier from the product. The instructions can further cause the machine to perform operations that include relating the covert identifier and the overt identifier to the product. The instructions can cause the machine to form a record in a data base. The instructions on the machine-readable medium can cause the machine to detect the existence of a covert identifier when reading a covert identifier associated with a product. The machine-readable medium can include instructions that, when executed by a machine, further cause the machine to detect a pattern using a sensor operating outside the visible range when reading the covert identifier, and associate a random number with the pattern. In some embodiments, reading a covert identifier includes instructions that, when executed by a machine, further cause the machine to find a datum associated with the covert identifier, read a random pattern at a location related to the datum, and associate a unique number with the random pattern. In some example embodiments, a random pattern representing the covert identifier is read and compared with a previously stored random pattern associated with the overt identifier.
Hardware and Operating EnvironmentThis section provides an overview of the example hardware and the operating environment in which embodiments of the invention can be practiced.
FIG. 9 illustrates an example information handling system or processor or computer system used in conjunction with certain embodiments of the invention. The information handling system orprocessor420 can be a microprocessor or a computer system. As illustrated inFIG. 9,computer system1100 comprises processor(s)1102. Thecomputer system1100 also includes amemory unit1130,processor bus1122, and Input/Output controller hub (ICH)1124. The processor(s)1102,memory unit1130, andICH1124 are coupled to theprocessor bus1122. The processor(s)1102 may comprise any suitable processor architecture. Thecomputer system1100 may comprise one, two, three, or more processors, any of which may execute a set of instructions in accordance with embodiments of the present invention.
Thememory unit1130 includes anoperating system1140, which includes an I/Oscheduling policy manager1132 and I/O schedulers1134. Thememory unit1130 stores data and/or instructions, and may comprise any suitable memory, such as a dynamic random access memory (DRAM), for example. Thecomputer system1100 also includes IDE drive(s)1108 and/or other suitable storage devices. Agraphics controller1104 controls the display of information on adisplay device1106, according to embodiments of the invention.
The Input/Output controller hub (ICH)1124 provides an interface to I/O devices or peripheral components for thecomputer system1100. TheICH1124 may comprise any suitable interface controller to provide for any suitable communication link to the processor(s)1102,memory unit1130 and/or to any suitable device or component in communication with theICH1124. For one embodiment of the invention, theICH1124 provides suitable arbitration and buffering for each interface.
For one embodiment of the invention, theICH1124 provides an interface to one or more suitable integrated drive electronics (IDE) drives1108, such as a hard disk drive (HDD) or compact disc read-only memory (CD ROM) drive, or to suitable universal serial bus (USB) devices through one or more USB ports110. For one embodiment, theICH1124 also provides an interface to akeyboard1112, amouse1114, a CD-ROM drive1118, and one or more suitable devices through one ormore firewire ports1116. TheICH1124 also provides anetwork interface1120 though which thecomputer system1100 can communicate with other computers and/or devices.
In one embodiment, thecomputer system1100 includes a machine-readable medium that stores a set of instructions (e.g., software) embodying any one, or all, of the methodologies for loading modules described herein. Furthermore, software can reside, completely or at least partially, withinmemory unit1130 and/or within the processor(s)1102.
Thus, a system, method, and machine-readable medium including instructions for Input/Output scheduling have been described. Although the present invention has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the disclosed subject matter. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.