Product authentication system and computer implemented method

ABSTRACT

Methods, systems and computer readable media for product authentication are described.

TECHNICAL FIELD

Embodiments relate generally to computerized electronic commercesystems, and more particularly, to methods, systems and computerreadable media for authenticating products.

BACKGROUND

Counterfeit goods are a significant problem to genuine goodsmanufacturers and to consumers. Fear of buying a counterfeit item maysuppress buyer offer or bid prices in online marketplaces. An item thathas been authenticated by an expert may fetch a higher price in anelectronic commerce marketplace (e.g., eBay, Amazon, etc.). Embodimentswere conceived in light of the above mentioned needs, problems and/orlimitations, among other things.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of an example product authentication system inaccordance with at least one implementation.

FIG. 2 is a flow chart of an example method of authenticating an item inaccordance with at least one implementation.

FIG. 3 is a flow chart of an example method of registering andqualifying an expert for product authentication in accordance with atleast one implementation.

FIG. 4 is a flow chart of an example method of providing a productauthentication opinion in accordance with at least one implementation.

FIG. 5 is a diagram of an example computing device configured forproduct authentication in accordance with at least one implementation.

FIG. 6 is a flow chart of an example method of providing a productauthentication opinion in accordance with at least one implementation.

DETAILED DESCRIPTION

FIG. 1 is a diagram of an example product authentication environment 100in accordance with at least one implementation. The environment 100includes an authentication system 102, a buyer system 104, a sellersystem 106, an administrator system 108, an expert system 110, and anauthentication database 112.

In operation, the authentication system can provide graphical userinterfaces (e.g., via a web server) to the other systems (e.g., one ormore of 104-110) and can perform one or more of the functions shown inFIGS. 2-4 and described below.

The authentication system 102 can include a server, desktop computer,portable computer, mobile device or the like. The buyer system 104,seller system 106, administrator system 108 and expert system 110 caninclude a desktop computer, portable computer, mobile device or thelike.

FIG. 2 is a flow chart of an example method of authenticating an item inaccordance with at least one implementation. The method begins at 202,where an indication of buyer interest in authenticating an item isreceived. The indication can include an electronic message from a buyersystem to an authentication system via a user interface on the buyersystem for requesting item authentication. The user interface could be auser interface element (e.g., an authenticate button) in a web page(e.g., an item sale listing page) displayed by electronic commercesystem. Processing continues to 204.

At 204, the system determines whether the buyer has the item or not. Ifthe buyer has the item, the authentication could be considered apost-sale authentication, and processing continues to 214. If the buyerdoes not have the item, the authentication could be considered apre-sale authentication and processing continues to 206.

At 206, the authentication system, receives buyer information and theauthentication request (e.g., via a graphical user interface provided bythe authentication system and displayed on the buyer system). Buyerinformation can include one or more of the following: name, emailaddress, website or online marketplace where item is being offered forsale (e.g., Amazon, eBay, Craig;s list, Postmark, Mercarri, etc.). Thebuyer can also establish a user name and password for his/her account inthe authentication system. Processing continues to 208.

At 208, information regarding the item for which authentication has beenrequested by the buyer is received at the authentication system. Theitem information can include listing number or other identifier, selleridentifier, etc. that can be used to identify the item within the systemthat is it being sold through (e.g., Amazon, ebay, etc.). Processingcontinues to 210.

At 210, an electronic message is sent from the authentication system tothe seller to let the seller know that a buyer or potential buyer hasrequested authentication of the item. The message can include the itemidentifier and ecommerce system in which the item is being offered forsale. The message can be sent via email, text message, or via amessaging system associated with an ecommerce platform on which the itemis being offered for sale. Processing continues to 212.

At 212, an electronic message is sent to the buyer or prospective buyerwhen the item is being authenticated and, optionally, when theauthentication opinion has been provided.

At 214, because the buyer has the item in hand, the buyer is more akinto a seller for authentication system purposes as described herein.Accordingly, the buyer is directed to a seller process flow (e.g., asshown in FIG. 3 and described below).

FIG. 3 is a flow chart of an example method of registering andqualifying an expert for product authentication in accordance with atleast one implementation. Processing begins at 302, where a sellerregistration request is received via a graphical user interface. Theseller registration request can include seller information such as oneor more of the following: name, address, phone number, email address,item categories that the seller sells in and may want to authenticateproducts for, ecommerce websites or marketplaces seller uses (e.g.,eBay, Amazon, Craig's list, Postmark, Mercarri, etc.). Additionally, theseller may pay for the authentication service according to a paymentsystem. The authentication payment system can be based on credits. Forexample, an item up to $100 in value can be authenticated for 1 credit.Each additional $100 in value can require an additional half credit. Forused items, each additional $100 in value could cost ⅛ credit. Creditscan be purchased individually (e.g., for $9.95), or in bulk (e.g., 10credits for $89.95 or 100 credits for $795) Processing continues to 304.

At 304, item information is received via a graphical user interface. Theitem information can include item identifier, website or marketplace,seller user ID in website or marketplace, etc. Processing continues to306.

At 306, digital images and optionally other electronic datacorresponding to the item to be authenticated are received from theseller system. The digital images can include images of the item to beauthenticated, where the images are taken according to instructionsprovided by the authentication system (e.g., front picture, top picture,left side picture, right side picture, etc.). The other electronic datacan include information about the item entered by the seller, such asstyle number, serial number, source of the item, or other informationabout the item that may be useful to, or requested by, an authenticationexpert. Processing continues to 308.

At 308, an electronic message is optionally sent to the buyer to informthe buyer that an authentication is in progress. The seller canauthorize this message to be sent. The authentication in progressmessage may serve to keep the buyer interested in the item while theauthentication opinion is being prepared. Processing continues to 310.

At 310, an electronic message is sent to an expert system for itemauthentication. The message may go to a given expert system based on theitem category and/or manufacturer. Alternatively, the message may go toa group of expert authenticators, where one (or possibly more) of theauthenticators selects the message and performs the authentication.Processing continues to 312.

At 312, an authentication opinion result is received at theauthentication system from the expert system. The opinion result can bein the form of an electronic message. The opinion can include aconfidence value (e.g., a percentage) of confidence that the expertauthenticator has that the item is authentic or not. In addition to theitem images and information, various other factors can be used by theexpert authenticator, such as which site the item is listed for sale on,the seller's experience and/or rating, etc. Processing continues to 314.

At 314, an electronic message containing the authentication opinionresult can be sent to the seller. The authentication opinion result caninclude an opinion of whether an item is authentic, the confidence ofthat opinion and the factors considered relevant to the opinion.Processing continues to 316.

At 316, an electronic message is optionally sent to the buyer (e.g., ifpermitted and/or requested by the seller) and/or to a machine learningsystem. The machine learning system can be configured to collectinformation on authentication requests and results in order to train acomputerized expert system with human expert opinions.

FIG. 4 is a flow chart of an example method of providing a productauthentication opinion in accordance with at least one implementation.Processing begins at 402, where an application from an expert isreceived. The application can include information such as name, address,phone number, email address, subject matter areas in which the applicantconsiders him or herself an expert in. Processing continues to 404.

At 404, the applicant is given an expert qualification examination via acomputerized testing system (e.g., network based or via local computer).The qualification examination can include questions developed with thehelp of another expert in the product category that the qualificationexamination pertains to. The questions can include visual authenticationquestions presented using pictures of authentic and counterfeit goods.Processing continues to 406.

At 406, if the applicant passes the expert qualification examination, atelephone interview is arranged for the applicant. Processing continuesto 408.

At 408, if the applicant did not pass the expert qualificationexamination, send the applicant an electronic message informing theapplicant. Also, the application may not be permitted to re-apply forgiven time period (e.g., 6 months.). Processing continues to 410.

At 410, if the applicant passes the expert qualification examination andthe telephone interview, the applicant is permitted to register as anexpert with the authentication system. Processing continues to 412.

At 412, an indication of an authentication task selection is received atthe authentication system from an expert system. For example, theindication could be based on the expert accepting an authenticationrequest from the authentication system or based on the expert selectingone or more authentication tasks from a pool of available authenticationtasks in the authentication system. Processing continues to 414.

At 414, an electronic message containing the authentication request anditem images and other information is sent to the expert system.Processing continues to 416.

At 416, authentication opinion data is received at the authenticationsystem from the expert system. The opinion data can include the opinionof the expert as to whether the item is authentic, an optionalconfidence value in the opinion and optional factors supporting theopinion. Processing continues to 418.

At 418, the authentication opinion is provided from the authenticationsystem to the seller and, optionally, to the buyer and/or a machinelearning system (as described above). In some implementations, providingthe authentication opinion can include providing an “AuthenticationSeal” (e.g., a digital design or logo) that can be placed manually (orautomatically) in a listing for the item that was authenticated. Theseal can be hyper linked, so that a prospective buyer can click on theauthentication seal and will be forwarded to the authentication systemwebsite for confirmation of authentication showing the item, the sellerand the grade of the item was given by the authentication service. Also,after the authentication is complete, an optional rating and feedbacksystem can be provided in which the buyer and administrator rate theexpert (e.g., according to a 5 star rating system). The buyer feedbackand rating of the expert can be made public, while the administratorfeedback can be private between administrator and expert for qualitycontrol and process improvement.

Some implementations can include a product tag (e.g., RFID, barcode, orother machine or human readable indicium) that can be applied to theproduct once it have been authenticated, where the tag includes a uniqueauthentication system number or identifier that corresponds to thatproduct or item.

FIG. 5 is a diagram of an example computing device 500 in accordancewith at least one implementation. The computing device 500 includes oneor more processors 502, nontransitory computer readable medium 506 andnetwork interface 508. The computer readable medium 506 can include anoperating system 504, an authentication application 510, and a datasection 512 (e.g., for storing seller information, item information,expert information, buyer information, and authentication opinioninformation, etc.).

In operation, the processor 502 may execute the application 510 storedin the computer readable medium 506. The application 510 can includesoftware instructions that, when executed by the processor, cause theprocessor to perform operations for product authentication in accordancewith the present disclosure (e.g., performing one or more of 202-214,302-316, 402-418, and/or 602-604 described herein).

The application program 510 can operate in conjunction with the datasection 512 and the operating system 504.

FIG. 6 is a flow diagram of an example method for authenticationidentification, tracking and verification in accordance with someimplementations. Processing begins at 602, where an identificationnumber is associated with an authentication record for an item. Theidentification number can be a unique number associated with theauthentication record for the item. The identification number can be atemporary identification number or a permanent identification number. Atemporary identification number is one that may only be valid for agiven time period after activation (e.g., 30 days, 60 days, 90 days, upto 365 days, etc.). A permanent identification number is one thatremains valid indefinitely or remains valid longer than the given timeperiod of validity for a temporary identification number. The length oftime an authentication identification number may be valid can correspondto the level of service purchased by the seller. For example, a lowlevel of authentication can be sold to a seller for a lesser price thana higher level authentication. The lower level authentication may havean identification number that is temporary (or expires within a giventime period). A high level service can include an identification numberthat has a longer expiration period or may not ever expire (e.g., bepermanent). Processing continues to 604.

At 604, a tag bearing the identification number in human readableformat, computer readable format, or both is generated and provided. Thehuman readable format can include printed alphanumeric characters,symbols or the like. The computer readable format can include a bar code(2D, 3D, QR code, etc.), a radio frequency ID (RFID) tag, a near fielddevice, a Bluetooth device (e.g., Bluetooth low energy, standardBluetooth, etc.), or the like. Processing continues to 606.

At 606, the tag is affixed to the item for which the authenticationrecord was generated. The tag can be affixed manually (e.g., by using azip tie or the like) or affixed by a machine using a suitable tagattachment device. Processing continues to 608.

At 608, a photo of the item showing the tag affixed with the humanreadable and/or machine readable identification number visible in thephoto, is optionally obtained. For example, an authenticator or approvedvendor could affix the tag and take an image of the item with the tagaffixed showing the identification number. The image with the tag andidentification number visible could then be included in a listing forthe item (e.g., a fixed price or auction type sales listing on anecommerce website, etc.). The image with the tag affixed to the item canalso be provided to the authentication service, where the image can bestored as part of the authentication record for the item. Processingcontinues to 610.

At 610, a location of the item is optionally tracked. The tracking canbe accomplished via a location device such as a global positioningsystem (GPS) receiver, an RFID tag, a Bluetooth device, a beacon signalreceiver, or the like. The location device can be a device that iscapable of determining location information or a device that permits anexternal system to determine the location of the item. The locationdevice can be a separate device or integrated into the tag. Processingcontinues to 612.

At 612, information from the authentication record associated with theidentification number is provided in response to a query including theidentification number. For example, a prospective buyer of an item canview an image of the item in a listing on an ecommerce website and notethe identification number. The prospective buyer can then enter theidentification number into a website of the authentication service aspart of a query for authentication information. In response, theauthentication service website could respond with some or all of theinformation from the authentication record. For example, theauthentication service can respond with an image of the item having theauthentication identification number visible in the image on a tagaffixed to the item. The authentication service can also respond withinformation about the authentication.

In another example, the identification number could be associated with ahyperlinked user interface element (e.g., a graphic seal or badge, atext link, etc.) displayed in a sales (or rental) listing for the item.When a prospective buyer clicks the hyperlinked user interface element,the prospective buyer could be redirected to the authentication servicewebsite where authentication information for the item associated withthe identification number is displayed. Alternatively, another userinterface element (e.g., a pop-up box, etc.) containing authenticationinformation could be displayed when the prospective buyer clicks thehyperlinked user interface element.

In yet another example, when a seller is creating the listing for anitem that has been authentication, the authentication identificationnumber for that item could be entered at the ecommerce website where thelisting is being created and the ecommerce platform could connect withthe authentication service and retrieve the authentication recordinformation associated with the identification number entered by theseller. The retrieved authentication information can be optionallyinserted into the listing for the item and optionally indicated hashaving been retrieved by the ecommerce platform directly from theauthentication service (and thus having potentially more credibility).

Authentication record information can include, but is not limited to,the item name, manufacturer, style or model number, serial number, dateof manufacture, color, size, material, authenticator notes,authenticator identification number, authenticator name, authenticationdate, images obtain during authentication, location information,previous or current sales or sales listing information, etc.

It will be appreciated that the modules, processes, systems, andsections described above can be implemented in hardware, hardwareprogrammed by software, software instructions stored on a nontransitorycomputer readable medium or a combination of the above. A system asdescribed above, for example, can include a processor configured toexecute a sequence of programmed instructions stored on a nontransitorycomputer readable medium. For example, the processor can include, butnot be limited to, a personal computer or workstation or other suchcomputing system that includes a processor, microprocessor,microcontroller device, or is comprised of control logic includingintegrated circuits such as, for example, an Application SpecificIntegrated Circuit (ASIC). The instructions can be compiled from sourcecode instructions provided in accordance with a programming languagesuch as Java, C, C++, C#.net, assembly or the like. The instructions canalso comprise code and data objects provided in accordance with, forexample, the Visual Basic™ language, or another structured orobject-oriented programming language. The sequence of programmedinstructions, or programmable logic device configuration software, anddata associated therewith can be stored in a nontransitorycomputer-readable medium such as a computer memory or storage devicewhich may be any suitable memory apparatus, such as, but not limited toROM, PROM, EEPROM, RAM, flash memory, disk drive and the like.

Furthermore, the modules, processes systems, and sections can beimplemented as a single processor or as a distributed processor.Further, it should be appreciated that the steps mentioned above may beperformed on a single or distributed processor (single and/ormulti-core, or cloud computing system). Also, the processes, systemcomponents, modules, and sub-modules described in the various figures ofand for embodiments above may be distributed across multiple computersor systems or may be co-located in a single processor or system. Examplestructural embodiment alternatives suitable for implementing themodules, sections, systems, means, or processes described herein areprovided below.

The modules, processors or systems described above can be implemented asa programmed general purpose computer, an electronic device programmedwith microcode, a hard-wired analog logic circuit, software stored on acomputer-readable medium or signal, an optical computing device, anetworked system of electronic and/or optical devices, a special purposecomputing device, an integrated circuit device, a semiconductor chip,and/or a software module or object stored on a computer-readable mediumor signal, for example.

Embodiments of the method and system (or their sub-components ormodules), may be implemented on a general-purpose computer, aspecial-purpose computer, a programmed microprocessor or microcontrollerand peripheral integrated circuit element, an ASIC or other integratedcircuit, a digital signal processor, a hardwired electronic or logiccircuit such as a discrete element circuit, a programmed logic circuitsuch as a PLD, PLA, FPGA, PAL, or the like. In general, any processorcapable of implementing the functions or steps described herein can beused to implement embodiments of the method, system, or a computerprogram product (software program stored on a nontransitory computerreadable medium).

Furthermore, embodiments of the disclosed method, system, and computerprogram product (or software instructions stored on a nontransitorycomputer readable medium) may be readily implemented, fully orpartially, in software using, for example, object or object-orientedsoftware development environments that provide portable source code thatcan be used on a variety of computer platforms. Alternatively,embodiments of the disclosed method, system, and computer programproduct can be implemented partially or fully in hardware using, forexample, standard logic circuits or a VLSI design. Other hardware orsoftware can be used to implement embodiments depending on the speedand/or efficiency requirements of the systems, the particular function,and/or particular software or hardware system, microprocessor, ormicrocomputer being utilized. Embodiments of the method, system, andcomputer program product can be implemented in hardware and/or softwareusing any known or later developed systems or structures, devices and/orsoftware by those of ordinary skill in the applicable art from thefunction description provided herein and with a general basic knowledgeof the software engineering and computer networking arts.

Moreover, embodiments of the disclosed method, system, and computerreadable media (or computer program product) can be implemented insoftware executed on a programmed general purpose computer, a specialpurpose computer, a microprocessor, a network server or switch, or thelike.

It is, therefore, apparent that there is provided, in accordance withthe various embodiments disclosed herein, methods, systems and computerreadable media for product authentication.

While the disclosed subject matter has been described in conjunctionwith a number of embodiments, it is evident that many alternatives,modifications and variations would be, or are, apparent to those ofordinary skill in the applicable arts. Accordingly, Applicant intends toembrace all such alternatives, modifications, equivalents and variationsthat are within the spirit and scope of the disclosed subject matter.

What is claimed is:
 1. A computer-implemented method comprising:receiving, at an authentication system, a seller registration requestvia a graphical user interface on a seller system; receiving, at theauthentication system, item information via the graphical userinterface; receiving, at the authentication system, digital images orelectronic data corresponding to the item to be authenticated arereceived from the seller system; sending an electronic message from theauthentication system to an expert system for item authentication;receiving an authentication opinion result at the authentication systemfrom the expert system; and sending an electronic message containing theauthentication opinion result to the seller system.