Method and apparatus for counterfeiting protection

ABSTRACT

The disclosure relates generally to methods and apparatus for protecting against counterfeit products and for methods and apparatus for providing counterfeiting protection for an object. In one embodiment, the method includes the steps of: (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information to thereby determine the authenticity of the object.

PRIORITY INFORMATION

The instant disclosure claims the filing-date benefit of ProvisionalApplication No. 60/754,324 filed Dec. 29, 2005 (entitled “System andmethod for anti-counterfeiting using chemical imaging”), ProvisionalApplication No. 60/777,852, filed Mar. 1, 2006 (entitled:“Anti-counterfeiting business model”), and Provisional Application No.60/784,042 filed Mar. 20, 2006 (entitled: “Two- and Three-DimensionalBar Codes with Invisible Encryptions”). The disclosure of each of theseapplications is incorporated herein in its entirety.

CROSS-REFERENCES TO RELATED APPLICATIONS

Cross-reference is made to the following related U.S. application Ser.Nos. 11/641,666; 11/641,669; 11/641,668; and 11/641,667 all filedconcurrently herewith and entitled “Method and Apparatus forCounterfeiting Protection” and which are also incorporated herein byreference in their entirety.

BACKGROUND

Counterfeiting is on the rise. The accessibility of production marketswith little or no regulation and low labor cost coupled with demand forinexpensive product provides a strong market for counterfeit products.While all counterfeit products adversely effect the bona fidemanufacturers' profitability, certain counterfeit goods can have anadverse, if not fatal, effect on the consumer's health. For example, acounterfeit medicinal product can have a fatal effect on a patient'shealth if it includes inappropriate dosage of the active ingredient.

More recently, counterfeit drugs and medicinal products have entered themarket through direct email to potential consumers. Advertisements forpopular pharmaceutical products such as Lipitor®, Viagra® and Ambien®are ubiquitous. Counterfeiters take advantage of the popularity of theseproducts and send direct emails to potential consumers who may wish toself-prescribe or obtain the product at a lower price. While this typeof counterfeiting is a problem, what is much more troubling is the factthat counterfeiters are now infiltrating the supply chain that existsbetween the manufacturer and the distribution point to the consumer,such as a neighborhood pharmacy. Counterfeiters who insert theircounterfeit products into the supply chain can do so by, for example,reproducing the existing markings (e.g., barcodes, visible securitymarkings, lot numbers, etc.) on a product or the package for a productthen introducing their counterfeit products with the reproduced markingsin the supply chain at a supply chain node, such as a distributor'swarehouse. Consequently, unsuspecting and unwitting doctors,pharmacists, and consumers who think that they are prescribing,distributing, and consuming authentic products are actually being dupedinto dealing with counterfeit products. This method of counterfeiting isespecially insidious and dangerous and has the potential to ruin thetrust doctors, pharmacists, and consumers have in the products that arebeing prescribed let alone the harm caused to the consumer by consumingproducts that are potentially harmful. Furthermore, counterfeiting byplacing fraudulent products that are seemingly real into the supplychain for authentic products is in no way limited to drugs and medicalproducts. Rather, this counterfeiting procedure can be replicated injust about any product supply chain. Thus, the potential for harm due tosupply chain counterfeiting is enormous.

While bona fide manufacturers incorporate various means, such as barcodes, to verify a product's authenticity, sophisticated counterfeitersare able to match most such identifications. For example,one-dimensional bar codes have been conventionally printed on theproduct's packaging. Such barcodes have been readily and accuratelyreproduced on the counterfeit product's packaging. Similarly, productmarkings which often appear on the ingestible solid medications such astablets and capsules are readily and accurately reproduced in thecounterfeit product. Additionally, while counterfeit drugs and medicalproducts are often sold directly to the consumer, a portion of suchproducts can find its way to regular distribution channels such aspharmacies, clinics and hospitals. These distribution channels have aresponsibility to provide authentic products and would face substantialliabilities should they dispense a counterfeit product. Accordingly,there is a need for a method and apparatus for providing protectionagainst counterfeit products.

SUMMARY OF THE DISCLOSURE

In an embodiment, the disclosure relates to a method for providingcounterfeiting protection for an object, comprising the steps of: (a)affixing to an object an identifying mark having a first portion and asecond portion wherein said second portion includes an encryptedfeature; (b) reading the first portion to thereby obtain a first set ofinformation; (c) transmitting the first set of information to a remotelocation; (d) receiving from the remote location a second set ofinformation; and (e) reading the second portion using the second set ofinformation to thereby determine the authenticity of the object.

In another embodiment, the disclosure relates to an improved method forproviding counterfeiting protection for an object including the stepsof: affixing an identifying mark on the object and reading theidentifying mark at a distribution point for the object, and theimprovement comprising: affixing a feature on the object wherein thefeature is encrypted according to a predetermined encryption methodcomprising obtaining from a remote location a first set of informationto direct the affixing of the feature on the object; and obtaining fromthe remote location a second set of information for reading the feature.

In yet another embodiment, the disclosure relates to a method forproviding counterfeiting protection for an object, comprising the stepsof: (a) accessing an object including an identifying mark having a firstportion and a second portion wherein said second portion includes anencrypted feature; (b) reading the first portion to thereby obtain afirst set of information; (c) transmitting the first set of informationto a remote location; (d) receiving from the remote location a secondset of information; and (e) reading the second portion using the secondset of information to thereby determine the authenticity of the object.

In still another embodiment, the disclosure relates to a method fordetermining authenticity of an object, comprising: reading anidentifying mark on an object; determining if the identifying markincludes a first portion and a second portion; determining if the secondportion includes a feature encrypted according to a predeterminedencryption method; indicating a lack of authenticity of the object uponthe occurrence of one or more of the following: an absence of said firstportion on said object, an absence of said second portion on saidobject, or an absence of said feature encrypted according to thepredetermined encryption method on said object; and indicatingauthenticity of the object upon the occurrence of all of the following:a determination that said first portion is on said object, adetermination that said second portion is on said object, and thedetermination that said feature encrypted according to the predeterminedencryption method is on said object.

In a further embodiment, the disclosure relates to an object comprising:an identifying mark affixed to said object; said identifying mark havingan identifier feature including at least one of: the object'sdesignation, the object's type, the object's batch number, location ofmanufacture, date of manufacture, time of manufacture, date ofexpiration, and at least one of the object's ingredients; and saididentifying mark having an encrypted feature with an attribute chosenfrom the group consisting of: shape, size, dimensionality, material,location on the object, and spectral fingerprint.

In another further embodiment, the disclosure relates to a system forproviding counterfeiting protection for an object, comprising: anaffixer for affixing to an object an identifying mark having a firstportion and a second portion wherein said second portion includes anencrypted feature; a first reading device for reading the first portionto thereby obtain a first set of information; a transmitter fortransmitting the first set of information to a remote location; areceiver for receiving from the remote location a second set ofinformation; and a second reading device for reading the second portionusing the second set of information to thereby determine theauthenticity of the object.

In an improvement according to yet a further embodiment, the disclosurerelates to a system for providing counterfeiting protection for anobject where the system includes a writing device for placing anidentifying mark on the object and a reading device for reading theidentifying mark at a distribution point for the object, and theimprovement comprising: said writing device further comprising circuitryfor receiving a first set of information from a remote location and anaffixer for placing an encrypted feature on said object as a function ofsaid first set of information; and said reading device furthercomprising circuitry for receiving a second set of information from saidremote location wherein said second set of information includesinstructions for the reading device to read said encrypted feature.

In an improvement according to still a further embodiment, thedisclosure relates to generating an encrypted feature at a remotelocation, requiring a manufacturer to access the remote location duringmanufacture of an object so as to receive data pertaining to theencrypted feature therefrom to be included as part of an identifyingmark placed on the object, and requiring an operator at a distributionpoint to access the remote location during reading of the identifyingmark so as to send data pertaining to the encryption feature to theremote location, thereby enabling the remote location to ascertainauthenticity of the object at the distribution point.

In another embodiment, the disclosure relates to an apparatus and methodfor receiving an object having an identifying mark, locating theidentifying mark associated with the object and place the identifyingmark in proximity to a reading device, reading the identifying mark withthe reading device to determine whether the identifying mark includes afirst portion, when the identifying mark includes the first portion,reading the first portion to thereby obtain a first set of information,transmitting the first set of information to a remote location,determining at the remote location a second set of information based onthe received first set of information, receiving from the remotelocation the second set of information, using the second set ofinformation, optically investigating the identifying mark to determinewhether the identifying mark includes a second portion, when theidentifying mark includes the second portion, reading the second portionwith the reading device to thereby obtain a third set of information,transmitting the third set of information to the remote location, andusing the third set of information, determining at the remote locationwhether the second portion includes a feature encrypted according to apre-determined method and verifying at the remote location authenticityof the encrypted feature if determined to be present in the secondportion.

In still another embodiment, the disclosures relates to an apparatusconfigured to receive a first request from a manufacturer of a productdesirous of preventing counterfeiting of the product, generate anencrypted feature for the product, and send the encrypted feature to themanufacturer without making the content of the encrypted feature knownto the manufacturer, wherein the encrypted feature is to be included aspart of an identification mark to be placed on the product duringmanufacture thereof.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other embodiments of the disclosure will be described withreference to the following drawings, in which:

FIG. 1A is a schematic representation of a conventional 2D barcode;

FIG. 1B is an exemplary 2D barcode system according to one embodiment ofthe disclosure;

FIG. 1C is an exemplary 3D barcode system according to one embodiment ofthe disclosure;

FIG. 2 is an exemplary representation of a pharmaceutical capsule withan identifying product mark according to one embodiment of thedisclosure;

FIG. 3 is a schematic representation of an authentication systemaccording to one embodiment of the disclosure;

FIG. 4 is a flow diagram showing an authentication process according toone embodiment of the disclosure; and

FIG. 5 is an overview of the actions/responsibilities of the entities inan anticounterfeiting system according to one embodiment of thedisclosure.

FIG. 6 is a block diagram of an embodiment of the disclosure.

FIG. 7 is a flow diagram of an embodiment of the disclosure.

DETAILED DESCRIPTION

FIG. 1A is a schematic representation of a conventional two-dimensional(2D) barcode. In FIG. 1A, barcode 100 is a 2D barcode having a verticaldimension and a horizontal dimension. Each of the horizontal and thevertical dimensions of barcode 100 include rows 1-15 and column 1-15.Information can be encoded and stored in each of the two dimensions ofbarcode 100. Conventional barcodes include information such as theproduct's manufacturing date, manufacturing location, batch number, etc.The barcode information (or other identifying marks) can be placed onthe product and/or its packaging.

Because conventional barcodes can be easily replicated bycounterfeiters, in one embodiment of the disclosure a barcode maycontain encrypted information (or an encryption feature) in addition tothe conventional information. The encrypted feature or features can beconfigured to be invisible to the naked eye or to the conventionalbarcode scanners. That is, the encrypted feature can be invisible toscanners tuned to a conventional wavelength. Alternatively, theencrypted feature can be viewed by the conventional scanner but not bedeciphered or decoded. Thus, even if the counterfeiter can obtain thescanner, the counterfeiter would still fail to replicate the content ofthe encrypted feature. It is noted here that the terms “encryptedfeature”, “encryption feature”, “encrypted portion”, “encryptionportion” or other such similar terms are used interchangeably herein.

FIG. 1B is an exemplary barcode system according to one embodiment ofthe disclosure. In FIG. 1B, barcode 120 represents a 2D barcode, similarto the barcode of FIG. 1A, having vertical rows 1-15 and horizontal rows1-15 (not marked for brevity). The vertical and horizontal rows cancontain information as in the conventional 2D barcodes. According to oneembodiment of the disclosure, barcode 120 can be supplemented withencrypted information. For example, the cross-hatched region 125 in FIG.1B may be printed with Raman-scattering material or fluorescent materialsuch that region 125 would not be visible at the visual wavelength rangeand/or with a reader that is not adapted to read Raman-scattered photonsor fluorescent photons. Similarly, hatched region 130 may be printedwith a Raman-scattering material or fluorescent material having adifferent wavelength or spectral fingerprint (a non-limiting example ofwhich may be a particular intensity or energy distribution over aparticular wavelength range) than that of the cross-hatched region 125.Thus, the different hatching in FIG. 1B can denote differentwavelengths. Each of regions 125 and 130 can contain additional productinformation. Because regions 125 and 130 are not visible to the nakedeye or to a conventional barcode scanner, a counterfeiter may notreadily copy these regions.

Further, regions 125 and 130 can be encrypted with information such asauthentication information whose decoding would require a cipher onlyknown to an independent authentication center. Encoded regions 125 and130 can also be configured to form a watermark, a logo, or other symbolssuch that once visible it can authenticate the product.

According to one embodiment of the disclosure, barcode 120 may comprisea first region 122, a second region 125 and/or a third region 130. Firstregion 122 can provide a first set of information which can lead toreading or decoding the second region 125 and/or third region 130. Forexample, the first set of information can direct the reader to anauthentication center for providing decoding information for secondregion 125 and/or third region 130. The first set of information canalso provide certain parameters for reading one or both of second region125 and third region 130. Such parameters may include, location,orientation or an attribute of the second and/or third regions. Theattributes of the encoded regions can include, shape, size,dimensionality, material, spectral fingerprint and encryptionfeature(s).

Thus, an embodiment of the disclosure relates to the placement of anidentifying mark having a first portion and a second portion. Theidentifying mark can be a 1D barcode, 2D barcode, a 3D barcode, a datamatrix or a combination thereof. The identifying mark can be in color orin back and white. The first portion of the identifying mark cancomprise an object identifier such as a barcode. The second portion ofthe identifying mark can comprise an independent object identifier or itmay be part of the first portion's object identifier. The second portionmay be encrypted to contain additional data not accessible to thecounterfeiter. The encrypted features may be invisible to the naked eyeor to the conventional barcode scanners. The encrypted features may alsobe unknown to the product's manufacturer and/or its distributor (i.e.,the writing device used to place the identifying mark on the object maybe a mere conduit for placing the identifying mark on the object asdirected by a control or information or authentication center while thewriting device may not have hardware and/or software for generatingand/or storing the particulars of the identifying mark; similarly thereading device used to read the identifying mark may be a mere conduitfor reading the identifying mark as directed by the control/informationcenter while the reading device may not have hardware and/or softwarefor storing the particulars of the identifying mark apart from thereading process). The first portion may include information pertainingto decoding the encryption of the second portion. Thus, the scanner mayread the first portion and obtain a first set of information (based on,for example, a visible symbol including, but not limited to, a number, aletter, an alpha-numeric symbol, a geometric symbol, or any othersymbol). The first set of information may be then communicated to acontrol/information/authentication center which would respond byproviding a second set of information to the scanner. Using the secondset of information, the scanner or another reading device may read theencrypted feature(s) and send a third set of information to thecontrol/information/authentication center (or a separate authenticationcenter) where the third set of information is based on the content ofthe encrypted feature(s). The control/information/authentication center,or the separate authentication center, may use the third set ofinformation to determine the authenticity of the object.

As a non-limiting example, the second set of information may comprisewavelength information for reading the second portion where reading thesecond portion includes illuminating the second portion with photons ofa predetermined wavelength. The illumination may be performed using alaser. The predetermined wavelength may be in the range of near infraredlight, infrared light, visible light, and ultraviolet light. In anotherembodiment, reading the second portion may include forming a spatiallyaccurate wavelength-resolved image of the second portion showing a firstand a second spatial dimension. A spatially accurate wavelength-resolvedimage is an image of a sample that is formed from multiple “frames”wherein each frame has plural spatial dimensions and is created fromphotons of a particular wavelength (or wave number) or from photons in aparticular wavelength band (or wave number band) so that the frames maybe combined to form a complete image across all wavelengths (wavenumbers) of interest. The second set of information may include spatialinformation (e.g., where on the object the scanner/reader is to look forthe encrypted feature), temporal information (e.g., time intervals forthe scanner/reader to illuminate and read the encrypted information),and/or energy information (e.g., at what intensity and/or wavelength thescanner/reader should illuminate the encrypted feature).

FIG. 1C is an exemplary 3D barcode system according to one embodiment ofthe disclosure. In FIG. 1C, barcode 150 contains information in threedimensions. As in FIG. 1B, barcode 150 can be an identifying mark havinga first portion and a second portion. The first portion can be defined,for example, by region 155 which can be detectable to conventionalscanners. The second portion of barcode 150 can comprise, for example,regions 160 and/or 165. For illustration purposes, each of regions 160and 165 is shown with hatching or cross-hatching. It should be noted,however, that regions 160 and 165 can be encoded such that they are notvisible at the visual wavelength range. Thus, a scanner can read thefirst portion (i.e., region 155) to obtain a first set of information.The first set of information can be used to read one or both of thesecond region 160 and/or third region 165. Such information may includeone or more parameters for reading the second region 160. In oneembodiment, the first set of information comprises productidentification information which can be communicated to theauthentication center to obtain one or more parameters required forreading the second and/or third regions.

The identifying mark may include a second portion with spectral featuresundetectable to the naked eye or to the conventional barcode scanner.For example, the encrypted feature of the identifying mark may beencoded into or along side the mark using a fluorescent material havinga predetermined spectral fingerprint. The spectral fingerprint can bedetermined by the authentication center on an a priori, random orquasi-random basis. The fluorescent material and/or spectralfingerprints may vary from one batch to another or from one product toanother. Products within the same package may even have differentspectral fingerprints. The second portion may be positioned within oroutside of the first portion of the mark. The authentication center candetermine timing, placement, location, shape and the content of thesecond portion. The authentication center can comprise a remote facilityor a third-party facility which operates independently of themanufacturer and/or the distribution center, i.e., the manufacturerand/or the distribution center may not be aware of the details, orsometimes even the existence, of the second portion of the mark or anencrypted feature of the mark. In an alternative embodiment, e.g., in acorporate environment, the remote facility may be an entity affiliatedwith the manufacturer or a subsidiary or any other entity owned oroperated by the manufacturer.

FIG. 2 is an exemplary representation of a pharmaceutical capsule withan identifying product mark according to one embodiment of thedisclosure. In FIG. 2, capsule 200 contains medicament. Standardproduction information, such as the amount of active pharmaceuticalingredient (API) 210, is printed on capsule 200. The information may beprinted using acceptable food coloring or it may be embossed as animpression on capsule 200, or any other method known in the art.Additional identification 220 is also provided on capsule 200. While forillustration purposes identification 220 is a visible mark, it should benoted that such identification can be made invisible according to theprinciples disclosed herein.

The identifying mark 220 can include an encrypted feature therein. Inanother embodiment, the identifying mark can contain information todirect the reader to a coordinate on the product that contains theencrypted feature. In still another embodiment, either the visibleportion or the invisible portion of the identifying mark may function asa reference frame for a coordinate system that facilitates detection inan orientation-independent manner. The identifying mark may also includeadditional identification criteria as well as information for contactingthe authentication center.

The encrypted feature (alternatively, the second portion of theidentifying mark) may be printed on the product using spectralfingerprints which cannot be detected with the naked eye or withconventional scanning devices without a priori knowledge of its spectralfingerprint. The second portion may include a parameter that is afunction of its location on the product, its orientation with respect tothe product or an attribute thereof. The attribute of the second portionmay include shape, size, dimensionality, material, spectral fingerprintand encryption feature. While the illustrative examples provided hereindisclose an identifying feature having a first visible portion and asecond portion not visible to the naked eye, the principles disclosedherein are not limited thereto. Indeed, in an embodiment of thedisclosure, the entire identifying mark may be invisible at the visualwavelength range and to a scanner not configured with the spectralfingerprint of the identifying mark.

In another embodiment, the identifying mark or the encryption portionthereof may contain fluorescent material having a specific spectralsignature determined by an authentication center. The encryption portionmay even contain more than one type of fluorescent material or a singletype of fluorescent material having different spectral fingerprints atdifferent locations within the identifying mark. For example, a barcodemay be used having two different colors, each color identifying adifferent spectral fingerprint. Similarly, the encryption portion maycomprise one or more Raman-scattering material. In such cases,authenticity may be determined on the basis of one or more of thewavelengths emitted from the fluorescent material, the wavelength of theRaman-scattering from the Raman-scattering material, an intensity ofemission the fluorescent material, an intensity of emission from thefluorescent material, an intensity of the Raman-scattering material or achemical image of the second portion.

An apparatus according to one embodiment of the disclosure may include ascanner or a reading device configured to detect the authenticationcenter's spectral signature after the spectral signature has beenrevealed. The size and shape of the identifying mark 220 may be over onecentimeter in length or smaller (microscopic), e.g., such asapproximately 1 micrometer or even smaller. Conventional printingmethods, such as inkjet printing, photolithography, two-photon writing,embossing, engraving and stamping can be used to print the identifyingmark on the product and/or its packaging.

FIG. 3 is a schematic representation of an authentication systemaccording to one embodiment of the disclosure. Among others, system 300of FIG. 3 shows manufacturer 310, authentication center 320 anddistribution center 330. In an exemplary embodiment, manufacturer 310requests authentication instructions from authentication center 320concerning product 305. The request may include the manufacturer's name,product information, production date, expiration date, etc.Authentication center 320 may be at a remote location and independentfrom manufacturer 310 and/or distributor 330. Product 305 may be avariety of objects such as, but not limited to, pharmaceuticals,chemicals, biological material, food, food additives, spices, cosmetics,perfumes, paper money, coins, credit cards, digital video discs, compactdiscs, audio tapes, video tapes, electronic devices or works of art.Other examples of product 305 may be an item or object to be used foridentification purposes for a person or animal. Furthermore, theauthentication system described above may be used for placing anidentification device directly on an animal or person (obviously, the“manufacturer” would not be manufacturing the animal or person, butwould simply be a location for writing/applying the identificationdevice on the animal or person).

Authentication center 320 may respond to the manufacturer's request byproviding information for applying one or more identifying marks andtheir attributes for product 305. The attributes of the identifying markmay define its physical characteristics, including: shape, size,dimensionality, material, spectral fingerprint, and one or moreencryption features.

In one embodiment, manufacturer 310 determines the first portion of theidentifying mark and communicates the same to authentication center 320.The authentication center 320 then responds by providing attributes ofthe encrypted portions of the mark. The encrypted portion may beincorporated in the identifying mark or it may define a secondaryidentifying mark. The encrypted portion may be defined by a 1D, 2D or a3D barcode, or some combination thereof, and may be invisible in thevisual wavelength range. Further, the encrypted portion may comprise oneor more of the fluorescent material and/or a Raman-scattering material.The encrypted feature may include a fluorescent material having a firstspectral fingerprint at a first location of product 305 and a secondspectral fingerprint at a second location of product 305. In analternative embodiment, the encrypted feature may include aRaman-scattering material having a first spectral fingerprint at a firstlocation of product 305 and a second spectral fingerprint at a secondlocation of product 305. Using the authentication information,manufacturer 310 can place the identifying mark on product 305.Authentication center 320 may also store authentication information atdatabase 328 for future reference.

Distributor 330 can be a point-of-service facility such as a pharmacy,hospital, clinic or any other facility which dispenses product 305 tothe consumer. Alternatively, distributor 330 can be a facility whereby aconsumer having acquired product 305 can verify its authenticity. Totest the authenticity of product 305, distributor 330 may includescanner 340. Scanner 340 may include conventional barcode scanners orsimilar devices suitably modified to identify encrypted featuresaccording to the teachings of the present disclosure. Scanner 340 may beconfigured to read the identifying mark of product 305. Scanner 340 mayalso be configured to identify the encrypted features included in theidentifying mark of product 305 once its spectral fingerprint isdisclosed to scanner 340.

To decode the encrypted portions of product 305, distributor 330 mayrequest information from authentication center 320 by sending to theauthentication center certain identifying information read by scanner340. For example, the scanner may read the first portion of theidentifying mark on the product 350 and send that information to theauthentication center. The authentication center may query the database328 to extract decoding information associated with the informationreceived from the scanner's reading of the first portion of theidentifying mark. Decoding information may include information such asthe spectral fingerprint of the encrypted portions of product 305.Decoding information may also include coordinate or orientationinformation describing the location of any other encryption mark onproduct 305 or its packaging. These and other authentication informationcan be communicated to the distributor 330 and/or the scanner 340.

Using the authentication information, scanner 340 may read encryptedinformation on product 305. Alternatively, if scanner 340 is notconfigured to operate at the desired wavelength, a different scanner maybe tuned to read the encrypted portions of the identifying mark. Onceread, the encrypted information can be either communicated back to theauthentication center 320 for verification or it may be verified atscanner 340 or distributor center 330. If product 305 is authentic, itmay be released to the consumer 360. If authentication fails, product305 may be removed from circulation.

FIG. 4 is a flow-diagram showing an authentication process according toone embodiment of the disclosure. In step 410, a scanner reads anidentifying mark or at least a first portion thereof. The identifyingmark may be located on the product, on the packaging for the product, orboth. The identifying mark can comprise a barcode having a first portionand a second portion. The first portion can be readily detected by thescanner using, for example, conventional means (e.g., initial opticalscanning of the product or its package). The second portion may beencrypted such that its detection or its decoding would requireadditional information. Thus, the scanner may read the first portion ofthe identifying mark at step 420 to obtain a first set of information.In step 430, the first set of information is communicated to anauthentication center (e.g., the authentication center 320 in FIG. 3).In one embodiment, the scanner transmits the first set of informationwirelessly to the authentication center and receives instructions fromthe authentication center wirelessly.

The authentication center can comprise the product manufacturer or,preferably, an independent authentication center. Upon receiving thefirst set of information, in step 440, the authentication centertransmits a second set of information to the scanner. The second set ofinformation may include spectral fingerprint(s) or other decodinginformation for reading the second portion of the identifying mark. Thesecond set of information may also include coordinate information forlocating the second portion of the identifying mark. Using the secondset of information, the scanner identifies and reads the second portionof the identifying mark in step 450. In step 460, a determination ismade for the authenticity of the product. The determination ispreferably made at a remote location (e.g., based on the informationreceived from the scanner upon its performing the reading operation atstep 450) and communicated to the point of service, although thedetermination may be made at the point of service (however this latteroption may require additional security measures such that theft of thescanner does not allow the thief to decode or decrypt the identifyingmark). Finally, in step 470, the results of the authentication inquirycan be displayed.

The readers/reading devices may include software and/or hardware thatmakes the reader secure so that if the reader is removed, misplaced, orstolen (i.e., a “suspect reader”), the authentication center will beaware of the status of the reader and be able to alert a person at theauthentication center and/or disable the reader automatically. Theauthentication center may no longer accept input from a suspect readerthereby eliminating the possibility of a hacker gaining access to theauthentication center's database and/or information by reverseengineering a reader.

FIG. 5 is an overview of the actions/responsibilities of the entities inan anticounterfeiting system according to one embodiment of thedisclosure. As described above, a manufacturing entity or writing device501 may perform the attaching of an identifying mark (which may containan encrypted feature) to an object (product, material, etc.) under theinstruction and/or control of a control/information/authenticationcenter, sometimes referred to herein as an Information Technology (“IT”)center 502. A distributor or reading device 503 may perform the functionof reading the identifying mark attached to the object. In analternative embodiment, the reading device 503 may be more than onedevice: one reading device for reading the encrypted feature of theidentifying mark and another reading device for reading thenon-encrypted features (of the identifying mark as well as othernon-encrypted features of the object). Preferably, the manufacturer 501and the distributor 503 are “passive” while the IT center 502 is“active”, i.e., only the IT center has knowledge of the encryptedfeature while the manufacturing entity/writing device 502 and thedistributor/reading device 502 are merely conduits for writing/readinginformation, respectively without any storage of secret encryptioninformation (which is only possessed by the IT center) and without any“intelligence” to actively perform any authentication verificationoperation locally (i.e., without IT center's support). For example, thereading device 503 may be a simple conduit of information to/from the ITcenter, with the IT center providing all instructions to the readerdevice (e.g., as to which encrypted spectral fingerprint to measure atwhat location within the barcode, etc.) and making all authenticityverification decisions based on the information received from thereading device. Because of such a passive role of the reading device, itmay not be risky to make such reading devices publicly available asdiscussed hereinabove. In one embodiment, the 2D/3D barcode reader mayinclude circuits/components (e.g., a laser scanner and a liquid crystaltunable filter (“LCTF”) for wavelength discrimination) capable of“reading” the barcode as well as identifying the IT center-instructedspectral signature of the invisible fluorescent encryption material.

An invisible, encrypted product-ID may be embedded or written on eachproduct/package to be protected. The writing of suchproduct/material/object-ID may be under the control of an activeInformation Technology (“IT”) center that can determine the timing,placement/location, shape, and content of various such invisible ID's tobe used during such product “marking”. In one embodiment, suchproduct-ID may be made of a fluorescent material having a predeterminedspectral fingerprint (as determined by the IT center). The fluorescentmaterial and/or fingerprints may change from one product batch toanother or even from one product to another in the same package as maybe dynamically determined by the IT center during product manufacturingand/or packaging. The IT center may perform time-based changing ofproduct/material-ID in a fully random fashion, in a quasi-randomfashion, or according to a predetermined method (e.g., serially, as afunction of a predetermined algorithm, etc.) In one embodiment, theshape of the identification symbol (for product/material-ID) may be inthe form of a two-dimensional (“2D”) barcode or data matrix, whichcontains an invisible encryption portion for anticounterfeiting. Varioussuitable shapes, (e.g., squares, rectangles, polygons, etc.) of varyingsizes may be selected for the 2D barcodes as determined by the ITcenter. The portion of the 2D barcode not containing such encryption maybe printed either visibly or invisibly on the surface of theproduct/package. However, an invisible printing of the entire barcodemay be preferred for additional protection. It is noted here that thetwo dimensional array of the barcode may function as a reference framefor a coordinate system that may facilitate barcode detection in anorientation-independent manner—i.e., without dependence on a specificorientation of the product/package containing the bar code. In otherwords, during detection, the product/package may not have to be orientedin a specific direction to enable barcode detection.

The size, shape, placement, and spectral signature of the encryptionportion may be determined by the IT center. Similarly, the shapes andplacement of the bars constituting the non-fluorescent portion of the 2Dbarcodes may also be determined by the IT center for added security. The2D barcodes may contain information including, for example, the timingof their printing, the associated product batch number, the type/name ofthe product, the expiration date (if any) of the product and itsingredients, etc. All such information may also be stored in the ITcenter for future retrieval when needed (e.g., for product/packageverification in the field or at a retail store).

Conventionally available 2D or 3D barcode readers may be suitablymodified (e.g., to detect the IT center-mandated spectral signature inthe encrypted invisible portion) to read the 2D or 3D barcodes accordingto the teachings of the present disclosure.

It is observed here that if a counterfeiter were to copy the 2D barcode,for example, the counterfeiter may not know the exact spectralsignature, location, and shape of the fluorescent encryption portionbecause only the IT center may know of the specific spectral wavelength,location, shape, or other attribute and/or parameter that is registeredin its database as representing the spectral fingerprint of thefluorescent portion. The authentication verification may be a two stepprocedure: (1) the reader first registering the product/productionstandard information with the third-party IT center (and the IT centerestablishing this initial product ID match), and (2) the IT center thenidentifying the linked encryption and sending appropriate readinginstructions to the reader for a second reading operation (i.e., thereading of the invisible encrypted product or material ID). If thereader-detected encryption information matches the stored encryptioninformation (associated with the product ID read in the first readingoperation) in the IT center, then the reader may get an “OK” or “valid”signal indicating an authentic product/package. However, if there is nomatch at this second level of checking, then an early warning signal maybe sent to the reader to indicate the presence of a possible counterfeitproduct/package. Therefore, when a counterfeiter copies the barcode, thecopied barcode will be without the necessary encryption, therebyimmediately signaling an authentication failure.

In an alternative embodiment, a three dimensional (“3D”) barcode may beused instead of a 2D version for additional security and informationstorage. It is observed that a 3D barcode may contain significantly moreinformation than a 2D barcode because of the availability of many morevariables for manipulation in a 3D representation. Various parametersand/or attributes of a 3D barcode may be varied to accomplish uniquecoding. Such parameters and attributes may include, for example, any ofthe x, y, or z dimensions of a cube, rectangular block, or othergeometric shape, the spacing between two blocks, the number of blocks,the number of x, y, or z columns of the entire structure, the thickness(i.e., depth) of a block, etc. An exemplary placement of encryptedinvisible blocks is also illustrated in the 3D barcode embodiment ofFIG. 1C.

Various methods may be used to write the 3D barcodes including, forexample, photolithography, two-photon writing method, inkjet printing,embossing, engraving, stamping, etc. Depending on the method of writing,the bars may be applied to the surface of the product/package or thesurface may be suitably deformed to create the bars. In the case ofinkjet printing, wells of inks of different compounds (some fluorescentfor an invisible encryption portion) of fast-drying material may be usedto write the barcode in a 3D form using a layer-by-layer approach. Inone embodiment, a reader of such 3D barcode may employ confocal imagingto obtain the depth information in addition to the length and widthinformation for the blocks constituting the 3D barcode. In anotherembodiment, the reader may include a displacement sensor orcharge-coupled device (“CCD”) sensor with, for example, a laser as anillumination source. An ultrasonic distance measuring device may also beemployed in the 3D barcode reader unit. It is preferable that a 3Dbarcode reader be capable of distinguishing various raised bars (withand without spacing between two adjacent bars) and also distinguishingbetween bars of different height/width/depth.

As in the case of the 2D barcode, the IT center may instruct the productmanufacturer or bar code writing device what and how to write the 3Dbarcode with the invisible encryption material on the product itselfand/or the package. The IT center may also store the written informationand link it with the production- or product-related information toassist in future authentication of the product/package as was the casein the embodiment with 2D barcodes. In case of writing 2D or 3D barcodesdirectly on a medical, pharmaceutical, or food product, it may bedesirable to obtain necessary approvals from appropriate state andfederal public health authorities, such as the U.S. Food and DrugAdministration (“FDA”). The authentication verification process forproducts/packages with 3D barcodes may also be a two-step processsimilar to that discussed hereinbefore for the 2D barcodes.

The readers for the 2D and/or 3D barcodes according to the teachings ofthe present disclosure may be in the form of hand-held/portable readersor in the form of stationary readers. In one embodiment, a retailpharmacy store may provide a free drug authentication checking serviceto its patrons whenever a patron decides to determine authenticity of adrug. Such situations may arise, for example, when the patron has boughtthe drug online over the Internet and would like to make sure that thepurchased drug is authentic. Such an on-demand drug authenticationchecking service by the retail pharmacy store may be part of a goodwillgesture to its patrons and also to generate more business for its ownretail drug division if the customer finds out that theinternet-purchased drug is not authentic. As part of such a typicallyfree service, the pharmacy store may provide a hand-held reader to thepatron for authentication verification in a do-it-yourself manner.Alternatively, the pharmacy store may place a stationary “booth” orkiosk (e.g., similar to typical free blood-pressure monitoring units inpharmacy stores) containing a 2D/3D barcode reader capable ofsynchronizing with the IT center (e.g., through a secure internetconnection) and reading the 2D or 3D barcodes printed on products and/orpackaging according to the teachings of the present disclosure. Again,the authentication verification using this kiosk may also be in ado-it-yourself manner, but patrons needing assistance with the operationof the kiosk may be provided appropriate help by the pharmacy personnelas a goodwill gesture. The kiosk may be placed at a location near thepharmacy dispatch counter allowing the patron to access the pharmaciston duty with any questions and also to assist the patron in choosing theright product in case the patron's product turns out to be counterfeit.Other business establishments (e.g., a mall, a sporting goods store, aspecialty clothing store, a bank, etc.) may also offer such freeon-demand authentication for relevant products of interest (e.g.,jewelry, precious stones, premium watches, sporting goods, specialtyline of clothing, money, financial instruments, etc.) so as to attractpatrons into the establishment and to offer them additional productselections. A fee-based service providing product authenticationaccording to the teachings of the present disclosure may be offered by abusiness establishment if so desired.

FIG. 6 shows a block diagram of an overview of a system according to anembodiment of the disclosure. The kiosk 601 may be a strand-alone kiosk,for example in a shopping mall, or it may be an integral part of adistribution point for a product, such as a pharmacy. The kiosk may beconnected to an IT Center 603 via a network 602 such as the internet.The kiosk preferably includes a reader, more preferably a passivereader, as described herein. As discussed above, information flowsbetween the kiosk and the IT Center via the network. The kiosk readermay have a security system or security protocols so that the IT Centercan be assured that the reader and/or kiosk (if an integral unit) isauthentic and not a hacker attempting to gain access to the IT Center. Auser of the kiosk may be charged a fee to determine if a product isauthentic. The authentication procedure may include an authenticationprocedure discussed herein.

FIG. 7 is a flow diagram according to an embodiment of the disclosure.At block 701, an object is received from a user for the determination ofthe authenticity of the product. At block 702, an identifying mark or anidentification mark may be read by a reader device to thereby obtain afirst set of information. The reader device may be located at adistribution point for the product. This first set of information may beobtained from a first portion of the identifying mark or it may beobtained from another mark on the product. At block 703, the firstinformation is transmitted to a remote location, such as an IT Center asdescribed herein. At block 704, at the remote location a second set ofinformation may be determined from the received first set ofinformation. As a non-limiting example, the remote location may use thefirst set of information to access a look-up table or as input to analgorithm to thereby determine the second set of information. At block705, the second set of information is transmitted by the remote locationand received by the reader device. At block 706, the reader device usesthe second set of information to obtain a third set of information froma second portion of the identifying mark or from a separate mark on theproduct and/or the packaging therefor. At block 707, the reader devicetransmits the third set of information to the remote location. At block708, the remote location receives the third set of information and usingthe third set of information determines if the second portion of theidentifying mark, for example, includes an encrypted feature and thenverifies the authenticity of the encrypted feature. Optionally, and notshown in FIG. 7, the remote location may send a signal to the readerdevice indicating the authenticity or lack thereof of the product.

The above description is not intended and should not be construed to belimited to the examples given but should be granted the full breadth ofprotection afforded by the appended claims and equivalents thereto.Although the disclosure is described using illustrative embodimentsprovided herein, it should be understood that the principles of thedisclosure are not limited thereto and may include modification theretoand permutations thereof.

1. A method for providing counterfeiting protection for an object, comprising the steps of: (a) accessing the object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information, wherein said reading of the second portion includes forming an image of at least a part of said second portion to thereby determine the authenticity of the object, wherein said image is such that it provides for high spectral resolution and high spatial definition.
 2. The method of claim 1 wherein a composition of the second portion includes a parameter that is a function of at least one of: a location of the second portion on the object, an orientation of the second portion on the object, and an attribute of the second portion.
 3. The method of claim 2 wherein the attribute is chosen from the group consisting of: shape, size, dimensionality, material, spectral fingerprint, and encrypted feature.
 4. The method of claim 1 wherein the step of reading the second portion comprises the steps of: (e)(i) reading the second portion using the second set of information to thereby obtain a third set of information; (e)(ii) transmitting the third set of information to the remote location; and (e)(iii) receiving from the remote location an indication of the authenticity of the object.
 5. The method of claim 1 wherein one of the first and second portions is affixed to a package for the object.
 6. The method of claim 1 wherein a dimension for one of the first and second portions is approximately one micrometer.
 7. The method of claim 1 wherein the first portion includes at least one of: object name, object type, object batch number, location of manufacture, date of manufacture, time of manufacture, date of expiration, and at least one of the object ingredients.
 8. The method of claim 1 wherein the second portion includes at least one of a fluorescent material and a Raman-scattering material.
 9. The method of claim 8 wherein the determination of authenticity is a function of at least one of: wavelength of emission from the fluorescent material, a wavelength of the Raman-scattering from the Raman-scattering material, and intensity of emission from the fluorescent material, an intensity of the Raman-scattering from the Raman-scattering material, a chemical image of the second portion, and combinations thereof.
 10. The method of claim 1 wherein the second portion is invisible in the visual wavelength range.
 11. The method of claim 1 wherein the second portion includes a two-dimensional barcode.
 12. The method of claim 1 wherein the second portion includes a three-dimensional barcode.
 13. The method of claim 12 wherein the three-dimensional barcode is affixed by a method chosen from the group consisting of: photolithography, two-photon writing, inkjet printing, embossing, engraving, and stamping.
 14. The method of claim 1 wherein the second portion comprises a fluorescent material having a first spectral fingerprint at a first location within the second portion and a second spectral fingerprint at a second location within the second portion.
 15. The method of claim 1 wherein the second portion comprises a first fluorescent material having a first spectral fingerprint and a second fluorescent material having a second spectral fingerprint.
 16. The method of claim 1 wherein the second portion comprises a Raman-scattering material having a first spectral fingerprint at a first location within the second portion and a second spectral fingerprint at a second location within the second portion.
 17. The method of claim 1 wherein the second portion comprises a first Raman-scattering material having a first spectral fingerprint and a second Raman-scattering material having a second spectral fingerprint.
 18. The method of claim 1 wherein the second portion comprises a Raman-scattering material having a first spectral fingerprint and a fluorescent material having a second spectral fingerprint.
 19. The method of claim 1 wherein the object is chosen from the group consisting of: pharmaceuticals, chemicals, biological material, food, food additives, spices, cosmetics, perfumes, paper money, coins, credit cards, digital video discs, compact discs, audio tapes, video tapes, electronic devices, and works of art.
 20. The method of claim 1 wherein the step of reading the second portion includes illuminating the second portion with photons of a predetermined wavelength.
 21. The method of claim 20 wherein the predetermined wavelength is in a range of wavelengths consisting of: near infrared light, infrared light, visible light, ultraviolet light.
 22. The method of claim 20 wherein the illuminating photons are from a laser.
 23. The method of claim 1 wherein steps (c) and (d) are replaced with: (c)(i) transmitting the first set of information to a remote location; (c)(ii) receiving the first set of information at said remote location; (c)(iii) determining at said remote location a second set of information based on the received first set of information; (c)(iv) transmitting the second set of information from the remote location; and (d) receiving from the remote location the second set of information.
 24. A method comprising: (a) providing to a user an item with an identifying mark affixed thereto, wherein said identifying mark has a first portion and a second portion and wherein said second portion includes an encrypted feature; and (b) instructing said user to perform the following after receiving said item: (i) read the first portion to thereby obtain a first set of information; (ii) transmit the first set of information to a remote location; (iii) receive from the remote location a second set of information; and (iv) read the second portion using the second set of information, wherein said reading of the second portion includes forming an image of at least a part of said second portion to thereby determine the authenticity of the object, wherein said image is such that it provides for high spectral resolution and high spatial definition.
 25. A method for determining authenticity of an object comprising: reading a first portion of an identifying mark on the object to thereby obtain a first set of information; transmitting the first set of information to a remote location; determining at the remote location a second set of information based on the received first set of information; receiving from the remote location the second set of information; reading a second portion of the identifying mark using the second set of information, wherein said reading of the second portion includes forming an image of at least a part of said second portion, wherein said image is such that it provides for high spectral resolution and high spatial definition; indicating a lack of authenticity of the object upon the occurrence of one or more of the following: an absence of said first portion on said object, an absence of said second portion on said object, or an absence of a feature encrypted according to a predetermined encryption method on said object; and indicating authenticity of the object upon the occurrence of all the following: a determination that said first portion is on said object, a determination that said second portion is on said object, and the determination that said feature encrypted according to the predetermined encryption method is on said object.
 26. The method of claim 25 wherein one of the first and second portions is affixed to a package for the object.
 27. The method of claim 25 wherein a dimension for one of the first or second portions is approximately one micrometer.
 28. The method of claim 25 wherein the first portion includes at least one of: object name, object type, object batch number, location of manufacture, data of manufacture, time of manufacture, date of expiration, and at least one of the object ingredients.
 29. The method of claim 25 wherein the second portion includes at least one of a fluorescent material and a Raman-scattering material.
 30. The method of claim 29 wherein the step of indicating authenticity includes a determination of at least one of: a wavelength of emission from the fluorescent material, a wavelength of the Raman-scattering from the Raman-scattering material, an intensity of emission from the fluorescent material, an intensity of the Raman-scattering from the Raman-scattering material, a chemical image of the second portion, and combinations thereof.
 31. The method of claim 25 wherein the second portion is invisible in the visual wavelength range.
 32. The method of claim 25 wherein the feature includes a two-dimensional barcode.
 33. The method of claim 25 wherein the feature includes a three-dimensional barcode.
 34. The method of claim 33 wherein the three-dimensional barcode is affixed by a method chosen from the group consisting of: photolithography, two-photon writing, inkjet printing, embossing, engraving, and stamping.
 35. The method of claim 25 wherein the reading of said second portion of the identifying mark using said second set of information includes: determining if said second portion comprises a fluorescent material having a first spectral fingerprint at a first location within said second portion; and determining if said second portion comprises a fluorescent material having a second spectral fingerprint at a second location within said second portion.
 36. The method of claim 25 wherein the reading of said second portion of the identifying mark using said second set of information includes: determining if said second portion comprises a first fluorescent material having a first spectral fingerprint; and determining if said second portion comprises a second fluorescent material having a second spectral fingerprint.
 37. The method of claim 25 wherein the reading of said second portion of the identifying mark using said second set of information includes: determining if said second portion comprises a Raman-scattering material having a first spectral fingerprint at a first location within said second portion; and determining if said second portion comprises a second spectral fingerprint at a second location within said second portion.
 38. The method of claim 25 wherein the reading of said second portion of the identifying mark using said second set of information includes: determining if said second portion comprises a first Raman-scattering material having a first spectral fingerprint; and determining if said second portion comprises a second Raman-scattering material having a second spectral fingerprint.
 39. The method of claim 25 wherein the reading of said second portion of the identifying mark using said second set of information includes: determining if said second portion comprises a Raman-scattering material having a first spectral fingerprint; and determining if said second portion comprises a fluorescent material having a second spectral fingerprint.
 40. The method of claim 25 wherein the object is selected from the group consisting of: pharmaceuticals, chemicals, biological material, food, food additives, spices, cosmetics, perfumes, paper money, coins, credit cards, digital video discs, compact discs, audio tapes, video tapes, electronic devices, and works of art.
 41. The method of claim 25 wherein the step of reading said second portion of the identifying mark using said second set of information includes illuminating said second portion with photons of a predetermined wavelength.
 42. The method of claim 41 wherein the predetermined wavelength is in a range of wavelengths consisting of: near infrared light, infrared light, visible light, and ultraviolet light.
 43. The method of claim 41 wherein the illuminating photons are from a laser.
 44. The method of claim 25 further comprising charging a fee for determining authenticity of said object.
 45. A method for providing counterfeiting protection for an object, comprising the steps of: (a) accessing the object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature, wherein said encrypted feature comprises a Raman-scattering material; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information, wherein said reading of the second portion includes forming an image of at least a part of said second portion to thereby determine the authenticity of the object, wherein said image is such that it provides for high spectral resolution and high spatial definition.
 46. The method of claim 45 wherein the determination of authenticity is a function of at least one of: a wavelength of the Raman-scattering from the Raman-scattering material, intensity of the Raman-scattering from the Raman-scattering material, a chemical image of the second portion, and combinations thereof.
 47. The method of claim 45 wherein the second portion comprises a Raman-scattering material having a first spectral fingerprint at a first location within the second portion and a second spectral fingerprint at a second location within the second portion.
 48. The method of claim 45 wherein the second portion comprises a first Raman-scattering material having a first spectral fingerprint and a second Raman-scattering material having a second spectral fingerprint.
 49. A method for determining authenticity of an object comprising: reading a first portion of an identifying mark on the object to thereby obtain a first set of information; transmitting the first set of information to a remote location; determining at the remote location a second set of information based on the received first set of information; receiving from the remote location the second set of information; reading a second portion of the identifying mark using the second set of information, wherein said second portion comprises a Raman-scattering material, and wherein said reading of the second portion includes forming an image of at least a part of said second portion, wherein said image is such that it provides for high spectral resolution and high spatial definition; indicating a lack of authenticity of the object upon the occurrence of one or more of the following: an absence of said first portion on said object, an absence of said second portion on said object, or an absence of a feature encrypted according to a predetermined encryption method on said object; and indicating authenticity of the object upon the occurrence of all of the following: a determination that said first portion is on said object, a determination that said second portion is on said object, and the determination that said feature encrypted according to the predetermined encryption method is on said object.
 50. The method of claim 49 wherein the step of indicating authenticity includes a determination of at least one of: a wavelength of the Raman-scattering from the Raman-scattering material, an intensity of the Raman-scattering from the Raman-scattering material, a chemical image of the second portion, and combinations thereof. 