Systems and methods for generating secure tags

ABSTRACT

Systems and methods are provided for decoding secure tags using an authentication server and secure tag reader. The system can include at least one processor and at least one non-transitory memory. The memory can contain instructions that, when executed by the at least one processor, cause the secure tag reader to perform operations. The operations can include detecting a potential secure tag in an image and generating a normalized secure tag image using the image and a stylesheet. The operations can further include providing an identification request to an authentication server, the identification request including the normalized secure tag image. The operations can additionally include receiving rules for decoding tag data encoded into the secure tag as tag feature options and decoding the tag data using the received rules.

RELATED APPLICATIONS

This application is a Continuation of International Application No.PCT/IB2018/000915, filed Jul. 20, 2018, which claims the benefit ofpriority of U.S. Provisional Patent Application No. 62/535,201, filedJul. 20, 2017, both of which are incorporated herein by reference intheir entirety.

BACKGROUND

Authentication of things currently causes many problems for brands,merchants, and consumers. Existing inventory tracking approaches leavebrands vulnerable to counterfeiting, vulnerable to sales throughunauthorized channels (“grey market”), struggling with supply chainmanagement issues, and dealing with issues connecting with end users(e.g., tracking and verifying sales, managing product recalls, andperforming aftersales services). Retailers and resellers deal withsimilar problems, such as, for example, identifying counterfeits,accessing information about products, and managing relationships withcustomers (e.g., managing returns, receipts, customer support, specialoffers or discounts, and customer relationship management). Consumersmay also face problems with existing systems, including difficultiesidentifying counterfeit products, receiving accurate information aboutproducts, managing warranties, redemption from proof of purchase,product registration, and reselling the products as authentic.

Traditional tags, such as barcodes and QR codes, suffer from a varietyof weaknesses. For example, traditional tags are mainly used for objectof stock-keeping unit (SKU) identification and are typically read-only.Additionally, stored information is freely accessible to readers asstored binary encoded data. The information can only be written into atraditional tag using a single method. When reading a tag, it must beoriented in a particular direction. Furthermore, traditional tagstypically contain fixed sizes of information. These tags can be easilyreused and reproduced. Traditional tags also contain security risks, asQR codes have been used in the past for virus/malware transmission.

SUMMARY

The secure tags disclosed herein solve many issues faced by brands,merchants, and consumers surrounding the authentication of individualthings. These secure tags can allow individual objects to connect to theblockchain or similar database, allowing for individual verification.Every individual product has a unique secure tag which is neverrepeated, providing the ability for individual item identificationinstead of SKU identification. The individual item identification allowsfor proof of authenticity, as the secure tags can be used to verify eachindividual item. This form of unique identification is possible in partdue to high definition resolution smartphones with large computationalpower and online connectivity, digital printing, and blockchain andsecure database technology.

The unique secure tags of this disclosure provide significant advantagesover existing QR codes and barcodes, with the only similarity being thateach has a binary base ID layer. Unlike traditional tags, the securetags each contain a unique, discreet key, have dynamic and flexibleareas of storage, are integrated with digital ledgers, and containnumerous other advantages. For example, the secure tags are not limitedto one shape or forms—they can exist in multiple design states to fitthe need of the customer. In addition, the secure tags can exist acrossmany form factors, such as, for example digital, printed, engraved, andanimated forms. Another advantage of the secure tags is that they arereadable by various optical devices, including smartphones, vastlyexpanding the number of users who can scan a tag.

The secure tags contain both binary and analogue information, meaningthey can be read in multiple ways. The unique design of the secure tagsallows large amount of binary to be encoded into the tags and alsoallows for visual “fingerprints,” which don't return data but can beused to authenticate secure tags with the blockchain. The secure tagscan have additional layers of authenticity, such as by pairing and/orsequencing a secure tag with another secure tag, or by using informationwithin the proximity of the secure tag (i.e., proximity fingerprinting).Different levels of access can be provided to different users across thesupply chain. For example, a customer can be given access to see certaininformation about the authenticity, safety, and proof of warranty, whilethe retailer can be given access to see certain information about theproduct data, customer data, and product tracking. The ease of use andeffectiveness of the secure tags allow them to be useful in an endlessnumber of cases, helping reduce authentication of things issues acrossthe supply chain.

The disclosed embodiment includes an authentication server forinteracting with secure tags. The authentication server can include atleast one processor and at least one non-transitory memory containinginstructions that, when executed by the at least one processor, causesthe authentication server to perform operations which can includereceiving a tag identification request including a tag image;identifying a secure tag in the received tag image using a stored hashof an image of a secure tag generated using a stylesheet; generating tagdata using the received tag image and decoding rules for decoding tagsgenerated using the stylesheet; and providing the tag data in responseto the request.

In some embodiments, identifying the secure tag using the stored hashand the received tag image can further include generating a hash of thereceived tag image and determining if a difference between the storedhas and the generated hash satisfies a threshold criterion. Generatingthe hash of the received tag image can further include converting thereceived tag image into an image having a predetermined number ofpixels. The predetermined number of pixels can be greater than or equalto 64 pixels and less than or equal to 1,048,576 pixels. The stored hashcan be used to identify the secure tag can be a perceptual hash, and thedifference between the stored hash and the generated hash can be thehamming distance. In addition, the received tag image can be a vectorimage file; and generating the hash of the received image can includerasterizing at least a portion of the vector graphics files.

In some embodiments, identifying the secure tag in the received tagimage can include generating a hash of the received tag image; selectingfirst secure tags using differences between the generated hash andstored hashes of images of the first secure tags; generating a secondhash of a predetermined segment of the received tag image; and selectingthe secure tag from the first secure tags using differences between thegenerated second hash and stored second hashes of the predeterminedportion of the images of the first secure tags. In other embodiments,identifying the secure tag in the received tag image can includegenerating hashes of progressively smaller segments of the received tagimage.

In other embodiments, identifying the secure tag in the received tag caninclude generating a hash of the received tag image; generating a secondhash of a first segment of the received tag image corresponding to afirst predetermined segment of the secure tag; determining a differencebetween the generated hash and a stored hash of an image of the securetag does not satisfy a threshold criterion; selecting the secure tagusing a difference between the generated second hash and a stored secondhash of an image of the first predetermined segment of the secure tag;generating a third hash corresponding to a second predetermined segmentof the secure tag; and validating the secure tag using a differencebetween the generated third hash and a stored third hash of an image ofthe second predetermined segment of the secure tag. In certain aspects,the third hash can be generated over a second segment of the receivedtag image corresponding to the second predetermined segment of thesecure tag. In other aspects, the third hash can be generated over asecond received tag image corresponding to the second predeterminedsegment of the secure tag.

In other embodiments, identifying the secure tag in the received tagimage can include comparing hashes of images of predetermined segmentsof the secure tag to hashes of segments of one or more received tagimages including the received tag image, the segments of the one or morereceived tag images corresponding to the predetermined segments of thesecure tag, and selecting the secure tag based on the comparison. Thecomparison can include determining segment distances between the hashesof the images of the predetermined segments of the secure tag and thecorresponding hashes of segments of the one or more received tag images,and at least one of an overall distance using the segment distances or acount of segment distances satisfying a threshold criterion. Theoperations can further include determining a confidence value using anumber of the hashes of the images of the predetermined segments of thesecure tag, a count of segment distances satisfying the thresholdcriterion, and the segment distances. In addition, one or more of thereceived tag images can include a first image depicting at least some ofa tag at a first level of detail and a second image depicting at leastsome of the tag at a second level of detail greater than the first levelof detail.

In some embodiments, the operations can further include receiving thestored hash of the image from a private system; providing a decodingrequest to the private system, the decoding request including anidentifier of the secure tag; and wherein the decoding rules can bereceived from the private system in response to the decoding request.

In some embodiments, the tag identification request can include anauthorization key; the decoding request can include an authorizationkey; and the decoding rules can correspond to the authorization key. Inother embodiments, the tag identification request can be received from aclient device, and the operations can further include receiving publicdecoding rules for decoding a public portion of a tag generated usingthe stylesheet; and providing the public decoding rules to the clientdevice. In other embodiments still, the decoding rules can enabledecoding of a subset of tag features defined by the stylesheet. In otherembodiments still, the decoding rules can enable decoding of a portionof the secure tag defined by the stylesheet.

In some embodiments, the decoding rules can include first decoding rulesenabling decoding of at least one of a first portion of the secure tagdefined by the stylesheet or a first subset of tag features defined bythe stylesheet, and second decoding rules enabling decoding of at leastone of a second portion of the secure tag or a second subset of the tagfeatures. In addition, generating tag data using the received tag imageand the decoding rules can include generating first tag data using thefirst decoding rules, and generating second tag data using the first tagdata and the second decoding rules.

In some embodiments, the operations can further include tracking tagidentification requests. In other embodiments, the operations canfurther include storing tag identification request information. In otherembodiments still, the operations can further include providinginstructions to update a distributed database to reflect tag data.

The disclosed embodiment includes a system for generating a secure tag.The system for generating a secure tag can include at least oneprocessor, and at least one non-transitory memory containinginstructions that, when executed by the at least one processor, cause anauthentication server to perform operations which can include receivinga stylesheet describing a class of secure tags; obtaining a numericseed; generating a secure tag layout using the numeric seed and thestylesheet, the secure tag layout specifying a combination of tagfeature options based on the numeric seed and stylesheet; receiving tagdata; generating a secure tag encoding the tag data by selecting the tagfeature options according to values of the tag data; generating aperceptual hash of the secure tag; storing the hash and an identifierfor the secure tag in a database; and providing a secure tag.

In some embodiments, the secure tag layout can specify referenceportions that indicate one or more referenced locations in the securetag layout for encoding data. In other embodiments, the secure taglayout can specify unreferenced portions in the secure tag layout forencoding data. In other embodiments still, the secure tag layout canspecify junk portions in the secure tag layout for encoding random data.In other embodiments still, the secure tag layout can specify keyportions in the secure tag layout for encoding cryptographic keys.

In some embodiments, the tag feature options can include the presence orabsence of a tag feature at a position specified by the secure taglayout. In other embodiments, the tag feature options can include asize, color, or shape of a tag feature. In other embodiments still, thetag feature options can include a deviation from a position specified bythe secure tag layout. In other embodiments still, the tag featureoptions can include a number of tag features present at a positionspecified by the secure tag layout.

In some embodiments, the tag feature options can include the presence ofspline encoding on the tag feature. The spline encoding can include atag feature edge extending a varying distance from a reference point orline. The varying distance can encode one or more spatially multiplexedtag data values. In addition, the varying distance can encode repeats ofthe one or more spatially multiplexed tag data values.

In some embodiments, the tag feature options can include the presence ofmicrostructures on the tag feature. In other embodiments, the tagfeatures can include rims and the tag feature options for the rimsinclude rim breaks, rim deformations, and rim connections. In otherembodiments still, tag features can include rim breaks and the tagfeature options for the rim breaks include rim break edge shapes. Inother embodiments still, the tag features can include connectionsbetween predetermined types of tag features and the tag feature optionsfor the connections include connection width and connection asymmetry.In other embodiments still, the tag features can include connectionsbetween tag features and the tag feature options for the connectionsinclude connection width and connection asymmetry.

In some embodiments, generating the secure tag encoding the tag data byselecting the tag feature options can include selecting first tagfeature options according to values of first tag data, the selection ofthe first tag feature options creating second tag feature options, andselecting the second tag feature options according to values for secondtag data. In addition, the first tag feature options can include thepresence or absence of points, the second tag feature options caninclude the presence or absence of connections between points presentaccording to the values of the first tag data, and third tag featureoptions encoding third tag data can include the width of connectionspresent according to the values of the second tag data. In otherembodiments, generating the secure tag encoding the tag data byselecting the tag feature options according to values of the tag datacan include encrypting the tag data with a cryptographic key; selectingthe tag feature options according to values of the encrypted tag data;and encoding the cryptographic key into the secure tag.

In some embodiments, the secure tag can include a vector graphics file.In other embodiments, providing the secure tag can include rasterizingthe secure tag. In other embodiments still, providing the secure tag caninclude labeling an object with the secure tag or incorporating thesecure tag into a digital product. In other embodiments still, theoperations can further include checking the generated hash forcollisions with hashes for other secure tags before providing the tagdata. In other embodiments still, the stylesheet can include a publicportion for generating portions of the secure tag layout for encodingpublic data and a private portion for generating portions of the securetag layout for encoding private data. In other embodiments still, theoperations can further include generating perceptual hashes of differingsegments of the secure tag at multiple levels of detail; and storing theperceptual hashes of differing segments of the secure tag in thedatabase.

In some embodiments, the tag data can include one or more identifiersfor one or more other secure tags. The first identifier of the one ormore identifiers can further include a perceptual hash of a first securetag of the one or more other secure tags. In other embodiments, the tagdata can include an identifier for a multifactor identification item.The multifactor identification item can further include anauthentication credential or a perceptual hash of an image. In certainaspects, he image depicts a portion of an object labeled with the tag.In other aspects, the image depicts a person associated with the tag. Inother embodiments, providing the tag can include printing the tag on asubstrate, at least a first portion of the tag printed in fluorescentink.

The disclosed embodiment includes a secure tag reader. The secure tagreader can include at least one or more processors, and at least onenon-transitory memory containing instructions that, when executed by theat least one processor, cause the secure tag reader to performoperations which can include detecting a potential secure tag in animage; generating a normalized secure tag image using the image and astylesheet; providing an identification request to an authenticationserver, the identification request including the normalized secure tagimage; receiving rules for decoding tag data encoded into the secure tagas tag feature options; and decoding the tag data using the receivedrules. In some embodiments, the image can be received from a scanner ofthe secure tag reader. In other embodiments, the scanner can be acamera.

In some embodiments, detecting the potential secure tag in the image caninclude determining a size of the potential secure tag satisfies a sizeconstraint retrieved from the stylesheet. In other embodiments, thepotential secure tag can be detected using at least one of geometricfeature detection, kernel-based feature detection, template matching, ora convolutional neural network. Detecting a potential secure tag in theimage using geometric feature detection can further include thresholdingthe image to generate a binary-valued image; detecting geometricfeatures using target parameter values retrieved from the stylesheet inin the binary-valued image; and determining a reference point of thepotential secure tag using the geometric features. In addition, thegeometric features can include concentric ellipses and the referencepoint can include a focus of the concentric ellipses.

In some embodiments, generating a normalized image of the potentialsecure tag can include converting the image to a black and white orgreyscale image. In other embodiments, generating a normalized image ofthe potential secure tag can include flattening the image using an imagewarp transform and target parameter values retrieved from thestylesheet. Flattening the image using an image warp transform canfurther include correcting at least one of fisheye distortion, barreldistortion, or angular distortion. Additionally, the target parametervalues can include an inner or outer tag rim shape. In other embodimentsstill, generating a normalized image of the potential secure tag caninclude detecting image gaps by determining tag feature options forpotential image gaps and comparing the tag feature option values totarget parameter values. The target parameter values can include aninner or outer tag rim thickness and diameter ratio or an inner or outertag rim thickness and tag rim break width ratio. In other embodimentsstill, generating a normalized image of the potential secure tag caninclude determining an orientation of a tag feature and rotating theimage based on the determined orientation of the tag feature and atarget parameter value retrieved from the stylesheet. The tag featurecan be a center logo and the target parameter value can include a centerlogo orientation.

In some embodiments, the normalized image of the potential secure tagcan include a vector graphics image. In other embodiments, the imageincludes multiple potential secure tags, and the identification requestcan include a stream of vector graphics images corresponding to themultiple potential secure tags. In other embodiments still, theidentification request includes a public key of the secure tag reader,and at least a portion of the identification request is encrypted with aprivate key of the secure tag reader. In other embodiments still,generating a normalized secure tag image using the image can includeproviding instructions to display the image and an indicationhighlighting the potential secure tag on a user interface of the securetag reader; receiving instructions to generate a second, zoomed-in imageof the potential secure tag; and generating the normalized image fromthe second, zoomed-in image of the potential secure tag.

In some embodiments, the operations can further include providinginstructions to display the image and an indication highlighting thepotential secure tag on a user interface of the secure tag reader;receiving a selection of the potential secure tag; and providinginstructions to display the secure tag data on a user interface of thesecure tag reader. The indication highlighting the potential secure tagcan be a bounding box surrounding the potential secure tag in the image.

In some embodiments, the publicly available portion of the stylesheetcan provide rules for decoding public tag data encoded into the securetag as tag feature options. The public tag data can further include atleast one of an address of an authentication server, a product type, abrand name, an inventory number, or an error correction code.

The disclosed embodiment includes a secure tag system. The secure tagsystem can include at least one or more processors, and at least onenon-transitory memory containing instructions that, when executed by theat least one processor, cause the secure tag system to performoperations which can include scanning a secure tag that encodes tag dataas a selection of potential tag feature options; interacting with anauthentication server to decode the secure tag; and receiving stateinformation for the secure tag stored in a distributed database, thestate information indicating a validity status of the tag.

In some embodiments, interacting with an authentication server to decodethe secure tag can include providing an image of the secure tag to theauthentication server. In other embodiments, interacting with anauthentication server to decode the secure tag can include providing aperceptual hash of the secure tag to the authentication server. In otherembodiments still, interacting with an authentication server to decodethe secure tag can include providing an authentication key to theauthentication server. The state information can be received from theauthentication server, the state information dependent on theauthentication key. In other embodiments still, interacting with theauthentication server to decode the secure tag can further includereceiving decoding instructions from the authentication server, thedecoding instructions indicating the tag feature options encoding thetag data; and generating the tag data using the decoding instructions,the tag data including a tag identifier. In addition, receiving thestate information for the secure tag from a distributed database furthercan further include providing an authentication key to an oracle; andthe state information received can depend on the authentication key. Incertain aspects, the authentication key can correspond to a manufacturerand the state information can include at least one of trackinginformation, sales information, customer data, usage information,activation information, or location information. In other aspects, theauthentication key can correspond to a distributor and the stateinformation can include at least one of authenticity information,destination information, or manufacturer information. In other aspects,the authentication key can correspond to a retailer and the stateinformation can include at least one of authenticity information,transactional information, product information, or tracking information.In other aspects, the authentication key can correspond to a purchaserand the state information can include at least one of authenticityinformation, product information, or ownership information.

In some embodiments, the operations can further include providingupdated state information for the secure tag for storage in thedistributed database. The updated state information for the secure tagcan further be provided to an oracle for writing into the distributeddatabase together with an authentication key. In addition, the updatedstate information for the secure tag can indicate that the secure tag isinvalid. In other embodiments, the updated state information can includeupdated accessibility options for the state information. In otherembodiments still, the state information for the secure tag can indicateat least one of tracking information, sales information, customer data,usage information, activation information, location information,authenticity information, destination information, updated manufacturerinformation, transactional information, product data, or proof ofownership information. In other embodiments still, the state informationfor the secure tag can indicate a pairing between the secure tag andanother secure tag.

The disclosed embodiment includes a secure tag system. The secure tagsystem can include at least one processor, and at least onenon-transitory memory containing instructions that, when executed by theat least one processor, cause the secure tag system to performoperations which can include receiving a transaction request concerninga product associated with a first secure tag that encodes first tag dataas a selection of potential first secure tag feature options; generatinga second secure tag concerning the product that encodes second tagidentification data as a selection of potential second secure tagfeature options, the second tag data including an identifier of thefirst secure tag and an identifier of a purchaser; receiving anindication of a transfer of ownership to the purchaser; and creating anentry for the second secure tag in a database, the created entryindicating the transfer of ownership.

In some embodiments, the product can include a digital product. Thefirst secure tag is can further be embedded into the digital product ordisplayed together with the digital product. In other embodiments, theproduct can include a physical product. The first secure tag can furtherlabel the physical product.

In some embodiments, the operations can further include updating anentry for the first secure tag in the database. The entry is can befurther updated to indicate at least one of the transfer of ownership,an identifier of the second tag, transaction information concerning thetransfer of ownership, or a validity status of the first secure tag. Inother embodiments, the identifier of the first secure tag can include ahash of at least some of the first tag data. In other embodiments still,generating the second secure tag can include decoding the first securetag to retrieve the first tag data. In other embodiments still, thesecond secure tag can be generated using a stylesheet associated withthe first secure tag. In other embodiments still, the second secure tagcan be generated using a unique numerical seed.

In some embodiments, the database can be a distributed database; andcreating the entry for the second secure tag in the database can includeproviding an authentication key and an identifier of the second tag toan oracle for writing to a blockchain.

The disclosed embodiment includes a server for interacting with securetags. The server for interacting with secure tags can include at leastone processor, and at least one non-transitory memory containinginstructions that, when executed by the at least one processor, causethe server to perform operations which can include receiving a requestconcerning a first secure tag that encodes first tag data as a selectionof potential first secure tag feature options, the first tag dataincluding stored contextual information; decoding the stored contextualinformation; receiving contextual information; authenticating therequest using the received contextual information and the storedcontextual information; and providing an indication of successfulauthentication in response to the request.

In some embodiments, the stored contextual information can include atleast one of an authentication credential, a biometric identifier, asound file, a tag identifier, or a perceptual hash of an image. Thebiometric identifier can further include a fingerprint or voiceprint. Incertain aspects, the first secure tag can label an item and the imagecan depict a portion of the item. Additionally, the labeled item can bean identification card; and the portion of the item is an identificationphoto on the identification card. In other aspects, first secure tag canlabel an item and the image can depict a person associated with the itemor a texture of the item.

In some embodiments, authenticating the request can include determiningthat the received contextual information and the stored contextualinformation satisfy a similarity criterion. Satisfaction of thesimilarity criterion can further depend upon a hamming distance betweenthe received contextual information and the stored contextualinformation. In other embodiments, the operations can further includerequesting the contextual information; and the received contextualinformation can be received in response to the request.

In some embodiments, the indication of successful authentication caninclude at least some of the first tag data. In other embodiments, theindication of successful authentication can include decodinginstructions for at least some of the first tag data. In otherembodiments still, the indication of successful authentication caninclude status information retrieved from a distributed database. Inother embodiments still, the status information can be retrieved from adistributed database using an oracle.

The disclosed embodiment includes a two-part label. The two-part labelcan include a substrate labeled with a first secure tag that encodesfirst tag data as a selection of potential first secure tag featureoptions; and an overlay detachably adhered to the substrate, the overlayincluding transparent portions and opaque portions aligned with thefirst secure tag, the first secure tag and aligned opaque portionsencoding second tag data as a selection of potential second secure tagfeature options. In some embodiments, the potential first secure tagfeature options can differ from the potential second secure tag featureoptions. In other embodiments, the aligned opaque portions can obscureselected potential first secure tag feature options. In otherembodiments still, the aligned opaque portions can select potentialfirst secure tag feature options. In other embodiments still, thepotential first secure tag feature options can include the presence orabsence of tag features at positions specified by a first secure taglayout. In addition, the potential second secure tag feature options caninclude the presence or absence of tag features at positions specifiedby a second secure tag layout, the second secure tag layout differingfrom the first secure tag layout.

The disclosed embodiment includes a method for generating a two-partlabel. The method for generating a two-part label can include generatinga first secure tag that encodes first tag data as a selection ofpotential first secure tag feature options using the first tag data, afirst numeric seed, and a first stylesheet; generating a second securetag that encodes second tag data as a selection of potential secondsecure tag feature options using the second tag data, a second numericseed, and a second stylesheet; determining a difference image betweenthe first secure tag and the second secure tag; labelling a substratewith the first secure tag; and detachably adhering an overlay to thesubstrate, the overly labelled with the difference image and alignedwith the first secure tag.

In some embodiments, the overlay may obscure portions of the firstsecure tag absent from the second secure tag. In other embodiments, theoverlay can depict portions of the second secure tag absent from thefirst secure tag. In other embodiments still, the overlay can transmitportions of the second secure tag present in the first secure tag. Inother embodiments still, the substrate can include a consumer good. Thefirst secure tag can correspond to a post-purchase status of theconsumer good and the second secure tag can correspond to a pre-purchasestatus of the consumer good.

The disclosed embodiment includes a method for providing documents. Themethod for providing documents can include generating a first secure tagpaired to a document, the first secure tag encoding an identifier of thedocument using a selection of potential tag feature options; receiving,from a first device, an access request for the document; providing, tothe first device, the first secure tag; receiving, from a second device,a confirmation request including a secure tag image; comparing the firstsecure tag to the secure tag image; and providing the document to thefirst device based on the comparison. In certain aspects, the identifierof the document can include a hash of the document. In addition, thesecond device can be a mobile device.

In some embodiments, comparing the first secure tag to the secure tagimage can include generating a perceptual hash of the first secure tag;generating a perceptual hash of the secure tag image; and determining adifference between the stored perceptual hash and the generatedperceptual hash satisfies a threshold criterion. In other embodiments,comparing the first secure tag to the secure tag image can includegenerating a perceptual hash of the secure tag image; selecting firstsecure tags using differences between the generated perceptual hash andstored perceptual hashes of images of the first secure tags; generatinga second perceptual hash of a predetermined segment of the secure tagimage; and selecting the first secure tag from the first secure tagsusing differences between the generated second perceptual hash andstored second perceptual hashes of the predetermined portion of theimages of the first secure tags.

In some embodiments, the confirmation request can include a confirmationrequest identifier, and providing the document to the first device basedon the comparison can further include generating a second secure tagpaired to the request, the second secure tag encoding the confirmationrequest identifier using a selection of potential tag feature options;and watermarking the document with the second secure tag.

In some embodiments, the method can further include determining that thereceipt of the secure tag image satisfies an authentication criterion.In certain aspects, the authentication criteria can concern a number ofconfirmation requests associated with the first secure tag. In otheraspects, the authentication criteria can concern an elapsed time sincethe provision of the first secure tag to the first device. In otheraspects still, the authentication criteria can concern a geographicorigin of the confirmation request. In other aspects still, theconfirmation request can include a confirmation request identifier; andthe authentication criteria can concern the confirmation requestidentifier. In addition, the authentication criteria can be satisfiedwhen an access identifier of the access request matches a confirmationidentifier of the confirmation request.

The disclosed embodiment includes a system for generating mutable securetags. The system for generating mutable secure tags can include at leastone processor, and at least one non-transitory memory containinginstructions that, when executed by the at least one processor, causethe system to perform operations which can include generating a firstsecure tag encoding tag data as a selection of tag feature optionsaccording to values of the tag data; receiving, from a scanner of asecond device, a request including a sequence of tag images, thesequence of tag images including a first tag image; authenticating therequest using the first secure tag and the first tag image; andproviding an indication of the authentication of the request. In certainaspect, the scanner can be a camera. In other aspects, the trigger canbe a rollover or click event.

In some embodiments, the operations can further include providinginstructions to display, on a display of a first device, a sequence oftags including the first secure tag. In certain aspects, providinginstructions to display a sequence of tags including the first securetag can include embedding the sequence of tags into a digital product.In other aspects, the instructions can provide for displaying thesequence of tags of the display of the first device in response to atrigger.

In some embodiments, authenticating the request can include comparingone or more perceptual hashes of the first secure tag to one or morecorresponding hashes of the first tag image. In other embodiments,authenticating the request can include matching multiple secure tagsincluding the first secure tag to multiple corresponding tag images,including the first tag image. The authentication can further requirematching the multiple secure tags to the multiple corresponding tagimages according to a predetermined order of appearance. In otherembodiments still, authenticating the sequence of tags can include junktags.

In some embodiments, the indication of the authentication of the requestcan include at least some of the tag data. In other embodiments, theindication of the authentication of the request can include decodinginstructions for decoding at least some of the first tag data. In otherembodiments still, the indication of the authentication of the requestcan include status information retrieved from a database. In otherembodiments still, the database can be a distributed database; and thestatus information is retrieved from a distributed database using anoracle.

The disclose embodiment includes a method for tracking a product. Themethod for tracking a product can include labeling the product with acomputer-readable secure tracking tag that encodes productidentification data as a selection of tag feature options based on acombination of a numeric seed and a stylesheet. In some embodiments, thetag feature options can include the presence or absence of a tag featureat a position specified by the combination of the numeric seed and thestylesheet. In other embodiments, the tag feature options can include asize, color, or shape of a tag feature. In other embodiments still, thetag feature options can include a deviation from a position specified bythe combination of the numeric seed and the stylesheet. In otherembodiments still, the tag feature options include a number of tagfeatures present at a position specified by the combination of thenumeric seed and the stylesheet.

In some embodiments, the tag feature options include the presence ofspline encoding on the tag feature. The spline encoding can furtherinclude a tag feature edge extending a varying distance from a referencepoint or line. In addition, the varying distance can encode one or morespatially multiplexed tag data values, and the varying distance canencode repeats of the one or more spatially multiplexed tag data values.In other embodiments, the tag feature options can include the presenceof microstructures on the tag feature. In other embodiments still, thetag features can include rims and the tag feature options for the rimsinclude rim breaks, rim deformations, and rim connections. In otherembodiments still, the tag features can include rim breaks and the tagfeature options for the rim breaks include rim break edge shapes. Inother embodiments still, the tag features can include connectionsbetween predetermined types of tag features and the tag feature optionsfor the connections can include connection width and connectionasymmetry. In other embodiments still, the tag features can includeconnections between tag features and the tag feature options for theconnections can include connection width and connection asymmetry. Inother embodiments still, the tag features can include a center logo andthe tag feature options can include a displacement of the center logofrom a center point of the secure tag.

In some embodiments, the method can further include generating thecomputer-readable secure tracking tag. In certain aspects, generatingthe computer-readable secure tracking tag can further include selectingfirst tag feature options according to first values of the productidentification data, the selection of the first tag feature optionscreating second tag feature options, and selecting the second tagfeature options according to second values of the product identificationdata. The first tag feature options can further include the presence orabsence of points, the second tag feature options can include thepresence or absence of connections between points present according tothe first values, and third tag feature options encoding third values ofthe product identification data can include the width of connectionspresent according to the second values. In other aspects, generating thecomputer-readable secure tracking tag can further include encrypting atleast a portion of the product identification data with a cryptographickey; selecting first tag feature options according to values of theencrypted portion of the product identification data; and encoding thecryptographic key into the computer-readable secure tracking tag.

In some embodiments, the computer-readable secure tracking tag caninclude a vector graphics file and labeling the product with acomputer-readable secure tracking tag can include rasterizing the vectorgraphics file. In other embodiments, the method can further includeproviding identification information for the computer-readable securetracking tag to an authentication server. The method can further includegenerating a hash of the computer-readable secure tracking tag andchecking the hash for collisions with hashes of other computer-readablesecure tracking tags before providing the identification information tothe authentication server.

The disclosed embodiment includes a label for tracking a product. Thelabel for tracking a product can include a substrate printed with acomputer-readable secure tracking tag that encodes productidentification data as a selection of tag feature options based on acombination of a numeric seed and a stylesheet. In some embodiments, thetag feature options can include the presence or absence of a tag featureat a position specified by the combination of the numeric seed and thestylesheet. In other embodiments, the tag feature options can include asize, color, or shape of a tag feature. In other embodiments still, thetag feature options can include a deviation from a position specified bythe combination of the numeric seed and the stylesheet. In otherembodiments still, the tag feature options can include a number of tagfeatures present at a position specified by the combination of thenumeric seed and the stylesheet.

In some embodiments, the tag feature options can include the presence ofspline encoding on the tag feature. The spline encoding can furtherinclude a tag feature edge extending a varying distance from a referencepoint or line. In addition, the varying distance can encode one or morespatially multiplexed tag data values, the varying distance can encoderepeats of the one or more spatially multiplexed tag data values. Inother embodiments, the tag feature options can include the presence ofmicrostructures on the tag feature. In other embodiments still, the tagfeatures can include rims and the tag feature options for the rims caninclude rim breaks, rim deformations, and rim connections. In otherembodiments still, the tag features can include rim breaks and the tagfeature options for the rim breaks can include rim break edge shapes. Inother embodiments still, the tag features can include connectionsbetween predetermined types of tag features and the tag feature optionsfor the connections can include connection width and connectionasymmetry. In other embodiments still, the tag features can includeconnections between tag features and the tag feature options for theconnections can include connection width and connection asymmetry. Inother embodiments still, the tag features can include a center logo andthe tag feature options can include a displacement of the center logofrom a center point of the secure tag.

It is to be understood that both the foregoing general description andthe following detailed description are exemplary and explanatory onlyand are not restrictive of the disclosed embodiments, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are not necessarily to scale or exhaustive.Instead, emphasis is generally placed upon illustrating the principlesof the inventions described herein. These drawings, which areincorporated in and constitute a part of this specification, illustrateseveral embodiments consistent with the disclosure and, together withthe detailed description, serve to explain the principles of thedisclosure. In the drawings:

FIG. 1 depicts an exemplary system for interacting with secure tags.

FIG. 2 depicts an exemplary schematic of an authentication server forinteracting with secure tags.

FIG. 3 depicts an exemplary schematic of tag data.

FIG. 4 depicts an exemplary diagram illustrating components of anexemplary computing device generally suitable for implementing thedisclosed system and methods.

FIG. 5 depicts an exemplary schematic of a database for storing taginformation.

FIG. 6 depicts a flowchart illustrating an exemplary process of taggeneration.

FIG. 7 depicts a flowchart illustrating an exemplary iterative encodingprocess.

FIG. 8 depicts a flowchart illustrating an exemplary process of tagreading.

FIG. 9 depicts a flowchart illustrating an exemplary process of tagidentification.

FIG. 10 depicts a flowchart illustrating an exemplary process ofmulti-resolution tag identification.

FIG. 11 depicts a flowchart illustrating an exemplary process ofmulti-resolution tag identification with altered tags.

FIG. 12 depicts a flowchart illustrating an exemplary data structure forperforming multi-resolution tag identification.

FIG. 13 depicts an exemplary user interface depicting results of tagidentification.

FIG. 14 depicts an exemplary process for decoding tag featureselections.

FIG. 15 depicts an exemplary authentication process using contextualinformation.

FIG. 16A depict paired and sequenced secure tags.

FIG. 16B depict a secure tag paired to contextual information.

FIG. 17 depicts an exemplary overlay tag.

FIG. 18 depicts an exemplary process for multi-channel documentauthentication using secure tags.

FIG. 19 depicts exemplary secure tags sequences for authentication.

FIG. 20 depicts an exemplary process for inventory management using adatabase.

FIG. 21 depicts an exemplary process for modifying tags.

FIG. 22 depicts an exemplary process for inventory management usingpaired tags.

FIG. 23 depicts an exemplary process for documenting transfers ofownership.

FIG. 24A depicts an exemplary secure tag.

FIG. 24B depicts portions of a graphics file corresponding to theexemplary secure tag.

FIG. 25A depicts secure tags generated using the same style sheet anddifferent data.

FIG. 25B depicts secure tags generated using different style sheets andthe same data.

FIG. 26A depicts secure tag feature options.

FIGS. 26B-26N depict details of potential secure tag options.

FIGS. 27A-27J depicts generation of an exemplary secure tag.

FIGS. 28A-28N depicts generation of an exemplary secure tag.

FIGS. 29A and 29B depict exemplary user interfaces.

DETAILED DESCRIPTION

In the following detailed description, numerous specific details are setforth in order to provide a thorough understanding of the disclosedexample embodiments. However, it will be understood by those skilled inthe art that the principles of the example embodiments may be practicedwithout every specific detail. Well-known methods, procedures, andcomponents have not been described in detail so as not to obscure theprinciples of the example embodiments. Unless explicitly stated, theexample methods and processes described herein are neither constrainedto a particular order or sequence, nor constrained to a particularsystem configuration. Additionally, some of the described embodiments orelements thereof can occur or be performed simultaneously, at the samepoint in time, or concurrently. Reference will now be made in detail tothe disclosed embodiments, examples of which are illustrated in theaccompanying drawings. Unless explicitly stated, sending and receivingas used herein are understood to have broad meanings, including sendingor receiving in response to a specific request or without such aspecific request. These terms thus cover both active forms, and passiveforms, of sending and receiving.

FIG. 1 depicts an exemplary system 100 for interacting with secure tags.This exemplary system can include a secure tag 105, a client device 110,a validation server 115, a private system 120, and a public database125. Components of system 100 can be configured to communicate usingnetwork 130. In some embodiments, secure tag 105 can be decoded using animage of the secure tag, a stylesheet, and a numeric seed. Thisinformation can be distributed between private system 120 and clientdevice 110 to reduce the possibility that an attacker able to compromiseeither of these systems can decode the secure tag. For example, privatesystem 120 can be configured to store the stylesheet and the numericseed, while client device 110 can be configured to obtain an image ofsecure tag 105. In some embodiments, authentication server 115 can beconfigured to perform decoding, obtaining an image of secure tag 105from client device 110 and decoding instructions from private system120. In this manner, system can distribute the information necessary todecode secure tag 105 while ensuring that decoding occurs on a securesystem (authentication server 115).

Secure tag 105 can be a tag configured to label a product. The productcan be a physical product (e.g., a shoe) or a digital product (e.g. awebsite or video steam). As described herein, the product can beconfigured to encode tag data using a selection of tag feature options.The potential tag feature options for selection can depend on astylesheet and a numeric seed. In this manner, a stylesheet can define aclass of similar secure tags, while differing numeric seeds can ensurethat each tag remains unique.

Client device 110 may comprise a mobile device including a scanner. Forexample, client device 110 may be a mobile phone, such as a smartphone,a tablet computer or a portable computer. As an additional example,client device 110 can be an optical scanner, such as a handheld opticalscanner (e.g., a SIMATIC or MOTOROLA optical scanner). Client device 110can be configured to generate images of secure tag 105 and provide thoseimages to authentication server 115.

Authentication server 115 may include one or more computing systems,such as servers, general purpose computers, or mainframe computers.Authentication server 115 may be standalone, or it may be part of asubsystem, which may be part of a larger system. For example,authentication server 115 may include distributed servers that areremotely located and communicate over a public network (e.g., network130) or a dedicated private network. In some embodiments, authenticationserver 115 may be configured for communication with components of system100 over network 130. In some aspects authentication server 115 maycomprise one or more containers or virtual machines hosted on a cloudcomputing environment, such as Amazon Web Services.

Authentication server 115 can be configured to identify secure tagsbased on images received from client device 110 and decodinginstructions received from private system 120, or another system.Authentication server 115 can be configured to interact with publicdatabase 130 to read or write status information concerning identifiedtags. In some embodiments, authentication server 115 can be configuredto interact with public database 130 indirectly, through an oracle(e.g., when public database 130 is the Ethereum blockchain).Authentication server 115 can be configured to provide decoded taginformation or certain decoding instructions to client device 110 inresponse to identification requests.

Private system 120 may include one or more computing systems, such asservers, general purpose computers, or mainframe computers. Privatesystem 120 may be standalone, or it may be part of a subsystem, whichmay be part of a larger system. For example, private system 120 mayinclude distributed servers that are remotely located and communicateover a public network (e.g., network 130) or a dedicated privatenetwork. In some embodiments, private system 120 may be configured forcommunication with components of system 100 over network 130. In someaspects private system 120 may comprise one or more containers orvirtual machines hosted on a cloud computing environment, such as AmazonWeb Services.

Private system 120 can be configured to generate secure tags for use bysystem 100. In some embodiments, private system 120 can be configured tostore stylesheet information and numeric seeds for creating secure tags.Consistent with disclosed embodiments, private system 120 can beconfigured to respond to requests from authentication server 115. Therequests can include secure tag identifiers. Private system 120 can beconfigured to provide decoding instructions for the secure tagcorresponding to the secure tag identifiers. The decoding instructionscan include at least some of the stylesheets and the numeric seed, insome embodiments. The decoding instructions can include specificcorrespondences between tag feature options of the secure tag and tagdata.

Public database 125 can include one or more databases hosted bycomputing devices (e.g., laptops, desktops, workstations, servers,general purpose computers, mainframe computers, cloud computingplatforms). Public database 125 can be a distributed database. Forexample, public database 125 can be a blockchain database. In someembodiments, public database 125 can be the Ethereum blockchain, or asimilar smart contracts blockchain.

FIG. 2 depicts an exemplary schematic of an authentication server forinteracting with secure tags, consistent with disclosed embodiments.Authentication server 115 can be configured to include authenticationdatabase 205 in some aspects. Authentication database 205 can includerecords 220 in various aspects. In some embodiments, the records canassociate one or more hashes of secure tags with tag identificationdata. In various embodiments, in addition to the authenticationdatabase, authentication server 115 can be configured to include generalaccess rules. The general access rules can include application keyrequirements, authentication credential requirements, session tokenrequirements, or similar restrictions on accessing the authenticationserver.

FIG. 3 depicts an exemplary schematic of tag identification data,consistent with disclosed embodiments. In some embodiments, tagidentification data can include tag-specific access rules 305. Forexample, a particular secure tag may require a specific application keyfor decoding. As an additional example, another secure tag may notrequire any specific application key for decoding. Some secure tags mayinclude time, geographic location, local network, or user-based accessrules. Authentication server 115 can be configured to enforce theseaccess rules by rejecting identification requests that fail to satisfysecure tag specific access rules 305 for that secure tag. In someembodiments, tag identification data can include a tag identifier 310.In some aspects tag identifier 310 can be specific to a particularsecure tag. For example, tag identifier 310 can be a hash of theinformation encoded in the secure tag. As an additional example, tagidentifier 310 can be a perceptual hash of the secure tag. In suchembodiments, authentication server 115 may be configured to merely storethe tag identifiers 310, rather than storing hashes associated with thetag identifiers. In various embodiments, the tag identifier can storepublic data 315 and private data 320. Public data 315 can includemetadata concerning interactions with the secure tag that an operator ofauthentication server 115 wishing to make publicly available, such astracking data or location data. Private data 320 can include metadataconcerning interactions with the secure tag that an operator ofauthentication server 115 wishing to restrict access to, suchmanufacturing data or customer data collected by manufacturers,distributors, or and retailers. While public data can be provided inresponse to any inquiry, authentication server 115 can restrict accessto private data. For example, authentication server 115 can beconfigured to provide private data 320 in response to identificationrequests including the appropriate application key or authenticationcredential. The amount and type of private data 320 provided can dependon the application key or authentication credential received. In someembodiments, authentication server 115 can be configured to store linksto at least one of the tag-specific access rules 305, tag identifier310, public data 315, or private data 320. For example, at least some ofthis information can be stored in public database 130, or anotherdatabase. Whether links or the actual tag-specific access rules 305, tagidentifier 310, public data 315, or private data 320 is stored onauthentication server 115 can depend on performance and securityconcerns.

FIG. 4 depicts an exemplary diagram illustrating components of anexemplary computing device generally suitable for implementing thedisclosed system and methods. According to some embodiments, theexemplary device may include a processor 410, memory 415, I/Ointerface(s) 420, and network adapter 425. These units may communicatewith each other via bus 405, or wirelessly. The components shown in FIG.4 may reside in a single device or multiple devices.

Processor 410 may be one or more microprocessors, central processingunits, or graphics processing units performing various methods inaccordance with disclosed embodiments. Memory 415 may include one ormore computer hard disks, random access memory, removable storage, orremote computer storage. In various embodiments, memory 415 storesvarious software programs executed by processor 410. I/O interfaces 420may include keyboard, a mouse, an audio input device, a touch screen, orsimilar human interface device. Network adapter 425 enables theexemplary device to exchange information with components of FIG. 1 overnetwork 130. In various embodiments, network adapter 425 may beconfigured to support wireless or wired networks. In certain aspects,network adapter 425 may be configured with modules for supporting one ormore local area networks, personal area networks, or near fieldnetworks. In some aspects, network adapter 425 may be configured withhubs for supporting computer busses. For example, network adapter 425may be configured with one or more USB hubs.

FIG. 5 depicts an exemplary schematic of a database for storing taginformation. In some embodiments, public database can include individualaccounts 515 and bundle accounts 520. Consistent with disclosedembodiments, high-value items can have status information store inindividual accounts (e.g., houses, jewelry, cars, or the like) whilemultiple low-value items can have status information stored in a singlebundle accounts (e.g., shoes, cloths, personal electronics, digitalproducts such as movies, or the like). In some aspects, each transactioninvolving a secure tag of a high-value item can be written to publicdatabase 130, while groups of transactions involving low-value items canbe stored in a private database and periodical written to thecorresponding bundle account 520. In some embodiments, when publicdatabase 130 is a distributed database, requestor 501 (e.g.,authentication server 115) must interact with an oracle 510 in order toread and write information to the public database. In various aspects,the requestor and the oracle can be combined into a single program(e.g., authentication server 115 can serve as both requestor 501 andoracle 510). In some embodiments, users of system 100 can be able toread information from public database 130, directly, without having tocontact authentication server 115. For example system 100 can include aportal for reading information concerning secure tags that is containedin public database 130.

FIG. 6 depicts a flowchart illustrating an exemplary process 600 ofsecure tag generation, consistent with disclosed embodiments. Thoughdescribed below as performed by private system 120, process 600 can beperformed in some embodiments by authentication server 115 or anothersystem. Process 600 can include receiving the numeric seed andstylesheet necessary to generate a secure tag, generating a secure taglayout, generating a secure tag using the secure tag layout and tagdata, registering the secure tag with authentication server 115, andproviding the tag in an appropriate form for the product to be tracked.In this manner, an identifier unique to the product can be generatedthat encodes tag data as a selection of tag feature options.

After starting, process 600 can proceed to step 601. In step 601,private system 120 can receive a stylesheet. The stylesheet can describea class of secure tags. In some embodiments, the class of secure tagsand be similar in appearance, purpose, or use. For example, a stylesheetcan describe a class of secure tags used by a particular manufacturer(e.g., a shoe manufacturer) to label a particular product (e.g., a modelof shoe). In some embodiments, a manufacturer can use the samestylesheet to generate secure tags for instances of the same product.This can allow the manufacturer to achieve a degree of visual uniformityamong the secure tags used to label a product while ensuring that eachindividual tag remains unique.

A stylesheet can define tag data locations, tag features, and tagfeature options usable by secure tags in this class. In some aspects,spatial options (e.g., tag feature sizes, tag feature positions withinthe secure tag, and the like) can be defined by normalized values, suchas ratios and angles. As a nonlimiting example, a stylesheet can beconfigured to define a first diameter option for a point can be 10% ofthe distance from a center of the secure tag to the outer edge of thesecure tag, while a second diameter option for the point can be 15% ofthe distance from the center of the secure tag to the outer edge of thesecure tag. As a second nonlimiting example, a stylesheet can beconfigured to define potential tag feature locations according to aradial coordinate frame with an origin at the center of the tag. Aparticular potential tag feature location could be 5 degrees clockwisefrom an orientation line and 50% of the distance from the center pointto the edge of the tag. As another example, a break in a rim of the tagcould be twice as wide as the width of the tag. The width of the rim ofthe tag could be defined, in turn, as a fraction of the distance from acenter point to the edge of the tag. In this way, the stylesheet can beused to define a set of constraints on tag features that can be used toauthenticate a tag, independent of whether the tag can be decoded.

The stylesheet can describe potential mappings of data to tag featureoptions, consistent with disclosed embodiments. For example, thestylesheet can describe a correspondence between particular tag featureoptions and particular bits of a binary number. In some aspects, thestylesheet can describe a correspondence between particular values oftag feature options and particular values of bits of the binary number.For example, when a tag feature option has a particular value (or aparticular range of values, or a value selected from a particular set ofpotential values), the corresponding bit of the binary number can have avalue of 1. When the tag feature option has a different particular value(or a different particular range of values, or a value selected from adifferent particular set of potential values), the corresponding bit ofthe binary number can have a value of 0. In various aspects, thestylesheet can describe alternative options for secure tag layout andthe correspondences between tag feature options and tag data values. Insome aspects, the stylesheet can describe a potential for tag featuresto exist or not exist at a particular location. For example, thestylesheet can identify locations in the secure tag at which dots may bepresent, or locations in a rim of the secure tag at which breaks may bepresent. These options can be mutually exclusive. For example, accordingto a first option, a particular portion of a secure tag can be reservedfor tag data, while according to a second option, that particularportion of the secure tag can be reserved for a reference to anotherportion of the secure tag, and according to a third option, thatparticular portion of the secure tag can be filled with random tagfeatures intended to thwart unauthorized tag decoding.

In some embodiments, the stylesheet can be configured with data and/orinstructions for selecting between multiple secure tag layout options(e.g., layout options, options for tag data to tag feature optioncorrespondences, the presence or absence of tag features at particularlocations, etc.) This selection process can depend on randomly generatednumbers. For example, the stylesheet can be configured to select betweena first use for a particular location in a secure tag (e.g., storingdata) and a second use for the particular location in a secure tag(e.g., storing junk values) according the value of a randomly generatednumber. The stylesheet can be configured to use a vector of suchrandomly generated numbers to particular secure tag layout (including,for example, specific layout options, options for tag data to tagfeature option correspondences, the presence or absence of tag featuresat particular locations, etc.) The stylesheet can also be configuredwith a vector of parameters. For example, the stylesheet can beconfigured to select a first correspondence between tag data and tagfeature options when the value of a randomly generated number exceedsthe value of a parameter a and select a second correspondence betweentag data and tag feature options otherwise. To continue this example,the stylesheet can be configured to select a first location in thesecure tag for encoding tag data when the value of another randomlygenerated number exceeds the value of a parameter β and select a secondlocation in the secure tag for encoding tag data otherwise. In thisexample, a and R are parameters of the stylesheet. These parameters maytake default values or may take values received from a user or retrievedfrom another system or configuration file.

In some embodiments, a stylesheet can be configured to containparameters for how the tag is to look, minimum, maximum values andtolerances for preset, variable or randomly generated features. Astylesheet can be configured to generate different secure tag layoutsdepending on the intended use of the secure tag (e.g., the intended sizeof the secure tag, as a small tag may be more difficult to read using acellphone camera, the intended resolution of the printed secure tag, theintended color and surface finish of the secure tag). In someembodiments, private system 120 can be configured to provide aconfiguration tool enabling the generation, export, and storage ofstylesheets.

Private system 120 can be configured to generate random numbers for useby the stylesheet in creating a secure tag layout. The random numberscan be generated using a pseudorandom number generator. In some aspects,the stylesheet can specify the pseudorandom number generator (e.g., byreference to a function library or web service, by encoding thepseudorandom number generator into the stylesheet, or the like). Invarious aspects, private system 120 can specify the pseudorandom numbergenerator.

In some embodiments, the pseudorandom number generator can be configuredto generate a sequence of random numbers dependent on an initial seed.Given the same seed, the pseudorandom number generator can be configuredto generate the same sequence of pseudorandom numbers. The secure taglayout generated by the stylesheet can therefore depend on anyparameters of the stylesheet and the seed, consistent with disclosedembodiments.

In various embodiments, a pseudorandom number, represented as a binarynumber, can provide a sequence of selections by its bits. For example,when the binary number is 00110110, the “false” option may be selectedfor the first two options provided by the stylesheet and the “true”option may be selected for the third option provided by the stylesheet.Multiple bits can be used to select between options having more than twochoices. For example, two bits can be used to select options have fourpossible values.

In some embodiments, a stylesheet can include a public portion. In someaspects, system 100 can be configured to provision client devices withpublic portions of stylesheets. In various aspects, the public portionsof stylesheets can be available at a known location (e.g., a known URLor the like). The public portion of a stylesheet can include at leastsome of the ratios that constrain tag feature relationships. Forexample, the public portion can include a ratio between the width of anouter tag rim and a diameter (or major or minor axis, or the like) ofthe tag. This ratio could be used to determine whether a tag wasauthentic, in some aspects, without any further processing. The publicportion can also indicate where public tag data is located and how todecode that tag data. As a non-limiting example, the public portion of astylesheet can indicate that a spline along the outer edge of the outerrim, beginning at a 12 o'clock position and continuing to a 6 o'clockposition, encodes a SKU, a URL of the authentication server, or a knownvalue for use in determining whether an image of the tag has beencorrectly processed. As the stylesheet describes a class of tags, thispublic portion can describe information accessible in every secure tagbelonging to this class of tag.

In some embodiments, a stylesheet can include a private portion. Theprivate portion can describe ratios, secure tag layout information,correspondences between tag data and tag feature options and the like,which can be used to encode private tag data. In some aspects, theprivate portion of the stylesheet can be stored by private system 120.

After starting, process 600 can proceed to step 603. In step 603 privatesystem 120 can obtain a numeric seed. Private system 120 can beconfigured to generate the numeric seed using a random number generator.Private system 120 can be configured to receive the numeric seed from auser of system 100, a configuration file, or another system.

After steps 601 and 603, process 600 can proceed to step 605. In step605, private system 120 can generating a secure tag layout using thenumeric seed and the stylesheet. As described above, the stylesheet caninclude multiple ways to encode data as tag feature options. Theselection of a particular way to encode data as tag feature options(e.g., a secure tag layout) can depend on the numeric seed.

In some embodiments, a random number generator (e.g., Gibson ResearchCorporation's Ultra-High Entropy Pseudo-Random Number Generator or thelike) can generate one or more pseudorandom numbers using the numericseed. These pseudorandom numbers can then be used to select ways toencode data as tag feature options. For example, when there are 32binary options, the bit values of two 16-bit binary number can be usedto select among the 32 binary options to generate the secure tag layout.As an additional example, 32 binary options may be selected based oncomparing randomly generated numbers to threshold parameters. Forexample, private system 120 may be configured to choose a first optionif the value of a randomly generated number exceeds 0.95 and to a secondoption otherwise. As a further option, the random number generator canbe used in combination with a card shuffle algorithm to generate asequence of binary data (e.g., the presence or absence of a sequence of20 tag features). As a non-limiting example, private system 120 can beconfigured to determine a required number of tag features, determine anumber of potential locations for these tag features, create an arrayequal in size to the number of potential locations, fill the requirednumber of elements in the array with a value indicating the presence ofthe tag feature, and then shuffle the array to create a random sequence(e.g., using the Fisher-Yates shuffle algorithm or the like). In thismanner, the secure tag layout can specify a combination of tag featureoptions based on the choice of numeric seed and stylesheet.

In some embodiments, a secure tag layout can specify at least one ofreferenced tag portions, reference portions, unreferenced tag portions,key portions, or junk portions. These portions can include one or morelocations in a secure tag containing tag data. For example, a referencedtag portion can include one or more locations in a secure tag identifiedby tag data stored elsewhere on the tag. A corresponding referenceportion of a secure tag can store tag data necessary for locating thereferenced portion of the secure tag. Thus decoding the referenceportion of the secure tag can enable the corresponding referencedportion of the secure tag to be decoded. In some embodiments, additionalinformation may be required to decode the referenced portion of the tag.For example, the data stored in the reference portion may enable thereferenced portion to be located, but additional decoding instructionsor cryptographic keys may be necessary to decode the tag data at thereferenced portion. As an additional example, an unreferenced portioncan include one or more locations in a secure tag that is not referencedby tag data stored elsewhere in the tag. Without instructions (e.g., arelevant portion of the stylesheet), such unreferenced portions couldnot be identified, much less decoded. As a further example, a keyportion can include one or more locations in a secure tag at which keymaterial is stored. In some aspects, such key material can be used todecode tag data encoded into other portions of the secure tag. Invarious aspects, such key material can be used to request instructionsfor decoding other portions of the tag (e.g., such key material caninclude application keys or the like). A key portion can be a referencedor unreferenced portion, as described above. In some embodiments, asecure tag can include junk portions that that do not store data, orthat store random data lacking semantic significance. Such junk portionsensure that an attacker cannot simply assume that all tag features havesome relevant meaning, making an unauthorized attempt to decode the tagmore difficult.

In some embodiments the tag portions can describe spatial areas of thesecure tag. For example, a physical quadrant of the secure tag. Invarious embodiments, the tag portions can describe logical portions ofthe secure tag. For example, the secure tag can be a vector graphicsfile and the tag portion can be a logical division within that vectorgraphics file. For example, a tag portion can include an elementcontaining SVG tags describing potential locations for dots in a securetag in a particular order. The order of the tags in the element candescribe a mapping from bits in a number to the presence or absence ofthe dots in the secure image, without any reference to the actuallocation of the dots in the secure tag.

Consistent with disclosed embodiments, a secure tag layout can includemultiple different types of tag feature options. Tag feature options caninclude the presence or absence of a tag feature at a position specifiedby the secure tag layout. For example, a secure tag layout can indicatethat a dot may be placed at a particular location within a secure tag.The presence of the dot at that location can indicate that acorresponding bit of tag data is set.

Tag feature options can include a size, color, or shape of a tagfeature. For example, a secure tag layout can indicate that a larger dot(or first color dot, or distorted tag feature, or the like) correspondsto a set bit and a smaller dot (or second color dot, or undistorted tagfeature, or the like) corresponds to a null bit.

Tag feature options can include a deviation from a position specified bythe secure tag layout. For example, the secure layout can specify arelative location for a tag feature within the secure tag. Deviationfrom the specified location can encode values for one or more bits bythe direction and magnitude of the deviations (e.g., one or more bits bydeviations in the x-direction and one or more bits by deviations in they-direction).

Tag feature options can include a number of tag features present at aposition specified by the secure tag layout. For example, a number ofdots present at a specified location can encode bits. As a furtherexample, the encoding can be by a direct correspondence (e.g., the valueof the bits comprises the number of dots) or by some indirectcorrespondence (e.g., a bit is set when there are zero to two dotspresent and null when there are more than two dots present).

Tag feature options can include the presence of microstructures on thetag feature. Such microstructures may include microprinted bar codes, QRcodes, text or other features. In some embodiments, the microstructurescan be printed such that a scanner at a first distance from the securetag (e.g., greater than a distance between 5 and 20 cm) cannot resolvethe microstructures, while a scanner at a second distance from thesecure tag (e.g., less than a distance between 1 and 10 cm) can resolvethe microstructures.

Tag feature options can include the presence of spline encoding on thetag feature. In some embodiments, spline encoding can include anextension or variation of a tag feature edge. This extension orvariation can extend a varying distance from a reference point or line.For example, the edge of an otherwise round dot can extend a varyingamount from the center of the dot, or from the circumference of the dotas specified by the tag layout. This varying distance can encode onemore spatially multiplexed tag data values.

For example, a fundamental spatial frequency can be multiplexed with thebinary representation of a first tag value. Thus the fundamental spatialfrequency can contribute to the extension or varying of the edge atlocations corresponding to set bits in the first tag value, but not atlocations corresponding to null bits in the first tag value. Additionalfundamental spatial frequencies can be multiplexed with binaryrepresentations of additional tag values. These fundamental spatialfrequencies can differ by at least a factor of four (e.g., the firstfundamental spatial frequency can have a period of 2{circumflex over( )}12 micrometers, the second spatial frequency can have a period of2{circumflex over ( )}10 micrometers, the third spatial frequency canhave a period of 2{circumflex over ( )}8 micrometers, etc). The securetag layout can be configured to further specify an origin and number ofrepeats for decoding the splines. Thus the varying distance can encoderepeats of the one or more spatially multiplexed tag data values.

Tag features can include rims for the secure tags, such as an inner rimand an outer rim. Tag feature options for the rims can include rimbreaks, rim deformations, and rim connections. When a rim includes rimbreaks as an option, tag feature options for the rim breaks can includerim break edge shapes.

Tag features can include connections between predetermined types of tagfeatures. For example, such connections can include connections betweendots and connections between dots and rims (e.g., a connection between adot and an inner rim or outer rim). Tag feature options for theconnections can include connection width and connection asymmetry.

Tag features can include a center logo. The center logo can be used toidentify a general class of tag, for example enabling a user to identifya public portion of a stylesheet that can be used to decode public datain the tag. Tag feature options for a center logo can include adisplacement of the center logo from a center point of the secure tag.For example, a hash of the secure tag or a public key associated withthe secure tag can be encoded by the displacement of the center logofrom a center point of the secure tag.

After starting, process 600 can proceed to step 606. In step 606,private system 120 can be configured to receive tag data. The tag datacan be received through a user interface from a user, from an inputfile, from a memory of private system 120, from another system, or thelike. The tag data can include data and/or instructions. The data and/orinstructions can be represented by one or more numbers. The tag data caninclude an identifier for a multifactor identification item. An attemptto read the tag or perform an action using the tag can include decodingthe tag and comparing the identifier to other data to determine whetherthe read attempt or action is authenticated or authorized. For example,the multifactor identification item can include an authenticationcredential (e.g., a password; API key; token; hash of a password, APIkey, or token; or the like). As an additional example, the multifactoridentification item can include contextual information, such as an imageor perceptual hash of an image, or a voiceprint or hash of a sound. Forexample, the image can depict a portion of a product labeled with thetag. Including a perceptual hash of an image of a portion of the productlabeled with the tag, private system 120 can be configured to preventthe tag from being moved to another product or the labelling of multipleproducts with copies of the secure tag. As an additional example, theimage can depict a person associated with the secure tag. As anon-limiting example, the person can be the owner of the labeledproduct. In this manner, the secure tag can be used to verify ownership.

As a further example, the tag data can include one or more identifiersfor one or more other secure tags. For example, a first identifier ofthe one or more identifiers can include a perceptual hash of a firstsecure tag of the one or more other secure tags. In this manner,additional tags can be paired to the present tag. In some embodiments,the authentication server can be configured to request the provision ofimages of these additional tags, or perceptual hashes of theseadditional tags, in order to authenticate or authorize a requestconcerning the present tag.

After step 606, process 600 can proceed to step 607. In step 607,private system 120 can generate a secure tag encoding the tag data. Insome aspects, private system 120 can be configured to generate thesecure tag encoding the tag data by selecting the tag feature optionsaccording to values of the tag data. For example, when the secure taglayout provides tag feature options including potential locations formultiple dots or rim breaks and the tag data includes a binary number, adot or rim break can be present or absent depending on whether acorresponding bit of the binary number is set or null. In someembodiments, at least a portion of the tag data can be encrypted using acryptographic key. The secure tag can then be generated by selecting thetag feature options according to values of the encrypted tag data. Insome embodiments, a cryptographic key for decrypting the encrypted tagdata can also be encoded into the secure tag (e.g., in a referenced orunreferenced key portion of the secure tag). In some embodiments, thesecure tag can be a vector graphics file, such as a Scalable VectorGraphics file, Encapsulated PostScript file, Portable Document Formatfile, or the like.

After step 607, process 600 can proceed to step 609. In step 609,private system 120 can generate a perceptual hash (such as a pHash orthe like) an of the secure tag. Generating a perceptual hash can includerasterizing the secure tag. For example, when the secure tag is storedas a vector graphics file, generating the perceptual hash can includeconverting the perceptual hash to a raster graphics file format. In someembodiments, private system 120 can be configured to check for hashcollisions by comparing the generated pHash to a library of pHashes forexisting secure tags. Should a hash collision exist, private system 120can be configured to recreate the secure tag using a new numeric seed.In various embodiments, private system 120 can be configured to generateadditional perceptual hashes of differing segments of the secure tag atmultiple levels of detail.

After step 609, process 600 can proceed to step 611. In step 611,private system 120 can store the perceptual hash of the secure tag in adatabase (e.g., a database of authentication server 115). In someaspects, when private system 120 is configured to generate additionalhashes of differing segments of the secure tag, these additional hashescan be stored in the database together with the perceptual hash of theoverall secure tag. Private system 120 can be configured to store anidentifier for the secure hash in the database together the hash(es) ofthe secure tag. This identifier can be configured to enable privatesystem 120 to determine which stylesheet and numeric seed were used togenerate the secure tag. For example, private system 120 can beconfigured to maintain a database for tracking secure tags. Thisdatabase can use include secure tag identifiers as key values, anindication of the stylesheet used to generate each secure tag, and thenumeric seed used to generate each secure tag. In some embodiments, thisdatabase does not include the tag data used to generate the secure tag,or the image of the secure tag. Thus an attacker able to compromise thissecure database would not be able to recreate the tag data from thestore identifiers, stylesheet references, and numeric seeds.

After step 611, process 600 can proceed to step 612. In step 612,private system 120 can be configured to provide the secure tag. In someembodiments, providing the secure tag can include labeling an objectwith the tag or incorporating the secure tag into a digital product,such as a video file or web page. For example, providing the secure tagcan include providing instructions to display the secure tag on acomputer screen or the like. In various embodiments, providing the tagcan include printing the tag on a substrate. For example, providing thesecure tag can include providing the secure tag as a vector file or as araster file to a printing system that labels a product with the securetag. Thus providing the secure tag can include rasterizing the securetag. In some embodiments, the tag can be provided in multiple types ofink. For example, at least a first portion of the tag printed influorescent ink. This fluorescent ink may only be visible under certainlighting conditions, thereby creating additional options for encodingtag data.

In some embodiments, authentication server 115 can be configured toretrieve tag status information from a database (e.g., database 130).For example, authentication server 115 can be configured to determinewhether the secure tag is still valid, has been cancelled, or includesauthentication requirements concerning actions involving the secure tag(e.g., requiring the user provide an application key or authenticationcredential in order to perform a transaction involving the secure tag).

FIG. 7 depicts a flowchart illustrating an exemplary iterative encodingprocess 700, consistent with disclosed embodiments. Though describedbelow as performed by private system 120, process 700 can be performedin some embodiments by authentication server 115 or another system.Process 700 can include receiving a secure tag layout, determiningavailable tag features based on a current tag state, selecting tagfeature options use tag data values, and updating the available tagfeature options based on the selected tag feature options. In thismanner, items of tag data can be iteratively encoded into a secure tag,with each iteration creating the tag feature options used to encode thenext item of tag data.

After starting, process 700 can proceed to step 701. In step 701,private system 120 can receive a secure tag layout. The secure taglayout can be received from a prior step in a process of generating asecure tag (e.g., step 605 of process 600), from a memory of privatesystem 120, from another component of system 100, or from anothersystem. The secure tag layout can include a set of potential tag featureoptions.

After step 701, process 700 can proceed to step 703. In step 703,private system 120 can determine available tag features based on acurrent tag state. For example, a secure tag layout may specify that tagfeatures can include dots and connections between dots. The secure taglayout may specify an ordering of potential dot locations, with theposition of a potential dot location in the ordering corresponding to abit position in binary tag data. The secure tag layout may specify thatthe presence of a dot corresponds to a bit value of 1 and the absence ofa dot corresponds to a bit value of zero. In this example, the currenttag state can include these potential dot locations. The current tagstate could also include additional available tag features, such aspotential rim breaks or distortions.

After step 703, process 700 can proceed to step 705. In step 705,private system 120 can select tag feature options from the available tagfeature options using tag data values. To continue the prior example,private system 120 can read a bit from the binary tag data and place adot at the corresponding potential dot location when the value of thebit is 1 (and simply skip to the next bit when the value of the bit is0). While explained with regards to dots, such a process is similarlyapplicable to other tag features.

After step 705 process 700 can proceed to step 707 In step 707 privatesystem 120 can update the available tag feature options based on theselected tag feature options. To continue the prior example, thepotential dot locations may no longer constitute selectable tag featureoptions, but dot size, dot color, the presence or absence of connectionsbetween dots, and the presence or absence of connections between dotsand rims, may now be available. The stylesheet can provide rulesgoverning the correspondence between these tag feature options and tagdata items. For example, the stylesheet can provide rules forassociating connections between dots with particular bits in binary tagdata.

Private system 120 can be configured to continue selecting tag featureoptions and update the set of available tag feature options until thetag data is completely encoded. For example, private system 120 canselect first tag feature options according to values of first tag data.This selection of the first tag feature options can create second tagfeature options. Private system 120 can then select second tag featureoptions according to values of second tag data. This selection of thesecond tag feature options can in turn create third tag feature options.In a non-limiting example, the first tag feature options can include thepresence or absence of points, the second tag feature options caninclude the presence or absence of connections between points presentaccording to the values of the first tag data, and third tag featureoptions encoding third tag data can include the width of connectionspresent according to the values of the second tag data.

FIG. 8 depicts a flowchart illustrating an exemplary process 800 of tagreading. Process 800 includes the steps of tag detection, tagidentification and server-side decoding, and optional client-sidedecoding. In some embodiments, tag detection can be performed by clientdevice 110 using an image received from a scanner of client device 110(e.g., a camera of a mobile device, or a handheld optical scanner). Invarious embodiments, tag detection can be performed by client device 110using an image received from another device. In various embodiments, tagidentification and server-side decoding can be performed byauthentication server 115, private system 120, or another system. Invarious embodiments, optional client-side decoding can be performed byclient device 110.

After starting, process 800 can proceed to step 801. In step 801, clientdevice 110 can receive a raster image including at least a portion ofsecure tag 105. In some embodiments, tag detection 801 can includeconverting the raster image to a normalized vector graphics image andproviding the vector graphics image to authentication server 115. Invarious embodiments, tag detection 801 can include converting the rasterimage to a normalized raster image and providing the normalized rasterimage to authentication server 115.

Tag detection 801 can include detecting secure tag 105 in a receivedimage using at least one of geometric feature detection, kernel-basedfeature detection, template matching, or a convolutional neural network.In some embodiments, detecting secure tag 105 in a received image usinggeometric feature detection can include thresholding a raster image togenerate a binary valued image. This thresholding can include convertinga color image to a greyscale image and then thresholding the image basedon greyscale values, or converting the color image to a black and whiteimage. In some embodiments, client device 110 can be configured toperform the image conversion using image processing functions providedby ImageMagic, OpenCV, or the like.

Client device 110 can be configured to detect geometric features in thereceived tag image that match known target parameters, consistent withdisclosed embodiments. Client device 110 can also be configured todetect a reference point of the potential secure tag using the geometricfeatures. In some aspects, client device 110 can be configured to usegeometric feature-detection algorithms provided by OpenCV or the like.In some aspects, client device 110 can be configured to use targetparameter values retrieved from the stylesheet in detecting thegeometric features in the binary-valued image. For example, a publicportion of the stylesheet can include a description of the geometricfeatures present in a class of secure tags. Such geometric features caninclude the shape of an inner and/or outer tag rim. For example, thestylesheet can indicate that the inner and outer tag rims are circleshaving predetermined dimension ratios. Client device 110 can then usethe geometric feature-detection algorithms to detect concentric ellipseswith appropriate dimension rations in the received tag image. In someembodiments, the reference point can be a focus of the concentricellipses. In some embodiments, client device 110 can register thereference point as the center of secure tag 105.

Client device 110 can be configured to detect potential tag locations inthe image using kernel-based feature detection, consistent withdisclosed embodiments. In some aspects, the kernel-based featuredetection can be used to identify the outline of secure tag 105 or tagfeatures within secure tag 105. Consistent with disclosed embodiments,the kernel-based feature detection can be performed using kernel-basedfeature detection algorithms provided by OpenCV or the like.

Client device 110 can be configured to detect potential tag locations inthe image using template matching or image stencil detection. In someembodiments, the templates or stencils can be included in, or generatedusing public portions of stylesheets. The templates or stencils canconcern identifying portions of the secure tags, such as center logos ortag rims. For example, a template or stencil can match a center logo.Client device 110 can be configured to perform template matching orimage stencil detection using template matching algorithms provided byOpenCV or the like.

Client device 110 can be configured to detect potential tag locations inthe image using a convolutional neural network. The convolutional neuralnetwork can be implemented using real-time object detection functionsprovided by YOLO or the like. The convolutional neural network can betrained to distinguish secure tags from other features in an image. Insome embodiments, the convolutional neural network (or anotherconvolutional neural network) can be configured to distinguish betweenclasses of secure tags, following identification of a secure tag in animage.

During tag detection step 801, client device 110 can be configured togenerate a normalized secure tag image using the received image and astylesheet. In some embodiments, client device 110 can be configured touse a public portion of the stylesheet. The public portion of thestylesheet can specify target parameter values for a class of tags.These target parameter values can include shared characteristics of tagsin the class of tags. Such shared characteristics can include thepresence, absence, shape, and orientation of tag features such as acenter logo, inner rim, and outer rim. The target parameter values canfurther include ratios describing relationships between dimensions oftag features. For example, such ratios can include a ratio between inner(or outer) tag rim thickness and tag diameter or a ratio between inner(or outer) tag rim thickness and tag rim break widths. The targetparameter values can also include size constraints on the tag (e.g., anoverall diameter of a circular secure tag). Client device 110 can beconfigured to determine whether a secure tag identified in a receivedimage satisfies the overall size constraints retrieved from the publicportion of the stylesheet. The publicly available portion of thestylesheet can also provide rules for decoding public tag data encodedinto the secure tag as tag feature options. For example, the publiclyavailable portion of the stylesheet can describe a correspondencebetween tag feature options discernable from the normalized image andencoded tag data. The stylesheet, including the publicly availableportion of the stylesheet, can also describe semantics of encoded data.For example, the publicly available portion of the stylesheet canidentify publicly accessible encoded binary data as an address of anauthentication server, a product type, a brand name, an inventorynumber, or an error correction code.

During tag detection step 801, client device 110 can be configured toflatten the received image using an image warp transform. In someembodiments, client device 110 can perform the warp transform usingtarget parameter values retrieved from the public portion of thestylesheet. In some aspects, the image warp transform can map tagfeatures detected in the received image to known positions specified inthe public portion of the stylesheet. For example, client device 110 candetect potential secure tag rims in the received image and determine atransformation from the detected image locations to the known imagelocation. Using image warping functions provided by OpenCV or the like,client device 110 can be configured to transform the entire image tobetter map the detected features to the feature locations described bythe public portion of the stylesheet. In this manner, client device 110can be configured to correct for at least one of fisheye distortion,barrel distortion, or angular distortion.

During tag detection step 801, client device 110 can be configured todetermine an orientation of a tag feature and rotate the image based onthe determined orientation of the tag feature. The rotation can furtherbe based on a target parameter value retrieved from the public portionof the stylesheet. The tag feature can a center logo of the secure tag.Client device 110 can be configured to identify a center of the tagusing the template match system described above. Client device 110 canbe configured to then determine an outer ovoid line encompassing theentire secure tag. Client device 110 can be configured to then determinea center of the secure tag. After determining the center and the ovoidline, client device 110 can be configured to construct multiple righttriangles on the secure tag image. The right triangles can be placedsuch that the center of each right triangle overlaps the center of thesecure tag, while the two vertices bounding the hypotenuse intersect theouter ovoid rim. The triangle(s) with the least and/or greatesthypotenuse can be used, in conjunction with orientation information inthe public portion of the stylesheet, to correct the orientation of thetag. Client device 110 can be configured to determine the appropriatestyle sheet based on the center logo. Should the secure tag not includea center logo, client device 110 can be configured to determine the tagstyle sheet by reading tag feature options in a default location (e.g.,characters from an outer edge spline using spline encoding).

During tag detection step 801, client device 110 can be configured todetect image gaps. Such image gaps can arise from damage, lighting(e.g., reflections of ambient light into the scanner), or surfaceconditions (e.g., dirt). Client device 110 can be configured to detecttag feature options for potential image gaps and compare the tag featureoption values to target parameter values listed in the public portion ofthe stylesheet. Should the potential image gaps not match targetparameter values in the public portion of the stylesheet, client device110 can be configured to disregard the image gaps, extending tagfeatures surrounding the image gaps through the image gaps based on thetarget parameter values in the public portion of the stylesheet. Forexample, client device 110 can be configured to process rim gapsdetermined to be artifacts by disregarding the rim gaps when convertingthe normalized raster image to a vector graphics file for transmissionto authentication server 115.

During tag detection step 801, client device 110 can be configured toprovide an identification request to an authentication server, theidentification request including the normalized secure tag image. Thoughdescribed herein as an “identification request,” the reason or purposefor providing such a request is not limited to identifying the securetag. For example, providing the identification request can be part of anaction involving a secure tag, such as a transaction of ownership of anitem labeled with the secure tag, an update of rules concerning thesecure tag, or cancelation of the secure tag. As described above, clientdevice 110 can be configured to at least normalize an orientation of areceived raster image, flatten the raster image, correct image gaps.Client device 110 can be configured to then generate the normalizedsecure tag image by converting the raster image to a vector graphicsimage, such as an SVG, EPS, or PDF image.

In some embodiments, client device 110 can be configured to provideinstructions to display the image and an indication highlighting thepotential secure tag on a user interface of the secure tag reader. Forexample, when client device 110 is a camera of a smartphone, the displayof the smartphone can depict the image and include a bounding box, orsimilar indication, around the detected secure tag. In some embodiments,the bounding box can indicate whether the tag has been successfullyidentified. For example, a color, shape, linestyle, or the like of thebounding box can indicate whether the tag has been successfullyidentified. Client device 110 can be configured to perform an actionupon selection of the bounding box, such as optically or digitallyzooming into the area of the detected tag.

After step 801, process 800 can proceed to step 803. In step 803, clientdevice 110 can be configured to provide an identification request toauthentication server 115. The identification request can include anormalized image generated in step 801. The normalized image can be avector graphics image. In some embodiments, the raster image received byclient device 110 in step 801 can include multiple potential securetags. In such embodiments, client device 110 can be configured to detectand generate normalized images of the multiple potential secure tags.Client device 110 can be configured to provide the generate normalizedimages as a stream of vector graphics images corresponding to themultiple potential secure tags. In some embodiments, the identificationrequest can include a public key of the secure tag reader and at least aportion of the identification request can be encrypted with a privatekey of client device 110.

In some embodiments, client device 110 can be configured to receiveinstructions to generate another image. These instructions can bereceived from authentication server 115. The instructions canautomatically cause client device 110 to generate a second, zoomed-inimage of the potential secure tag. Alternatively or additionally, theinstructions can direct the user to cause the client device 110 togenerate a second, zoomed-in image of the potential secure tag. Clientdevice 110 can then be configured to generate another normalized imagefrom the second, zoomed-in image of the potential secure tag.

After step 803, process 800 can proceed to step 805. In step 805, clientdevice 110 can receive decoding instructions and/or tag data fromauthentication server 115. In some embodiments, the decodinginstructions can supplement the public portion of the stylesheet. Forexample, the decoding instructions can restrict the possibilitiesdisclosed by the stylesheet to a particular mapping of between tagfeature options and tag data values. In various embodiments, thedecoding instructions can describe a particular set of rules forconverting tag feature options to tag data values. For example, decodinginstructions can indicate that a particular tag data item has valuesdependent on a specifically identified set of tag feature options.

As indicated above, in some embodiments client device 110 can beconfigured to provide instructions to display the image and anindication highlighting the potential secure tag on a user interface ofthe secure tag reader. In some embodiments, client device 110 can beconfigured to receive an indication from a user selecting a potentialsecure tag (e.g. the indication can be a bounding box surrounding thepotential secure tag and the indication can include selection of thebounding box by a user on a touch-sensitive display). Client device 110can be configured to generate a normalized image of the potential securetag, to provide an identification request to authentication server 115,and to receive tag data and/or decoding instructions from authenticationserver 115 in response. Client device 110 can be configured to decodetag data using any decoding instructions received from authenticationserver 115. Client device 110 can then be configured to provideinstructions to display the secure tag data (e.g., received and/ordecoded tag data) on a user interface of client device 110 (or anotherdevice).

FIG. 9 depicts a flowchart illustrating an exemplary process 900 of tagidentification. Though described below as performed by authenticationserver 115, process 900 can be performed in some embodiments by privatesystem 120, client system 110, or another system. Consistent withdisclosed embodiments, process 900 can include the steps of receiving atag identification request, identifying a secure tag based on the tagidentification request, generating tag data using the retrieved tagimage and decoding rules, and providing the decoded tag data in responseto the request.

After starting, process 900 can proceed to step 901. In step 901authentication server 115 can receive a tag identification request. Thetag identification request can include a tag image (e.g., a photographor video image including an unidentified secure tag). Authenticationserver 115 can be configured to receive the tag identification requestfrom client device 110. The tag identification request can be receivedusing network 130. In some aspects, the tag identification request caninclude an authorization key (e.g., an API key for authorizing APIcalls). In some aspects, the tag identification request can include asession token (e.g., an OAUTH 2.0 bearer token, Kerberos token, or thelike). In some aspects, the tag identification request can include useridentification information, such as a user name or account information.In some aspects, authentication server 115 can be configured todetermine whether the identification request is valid based on thesession token and general access rules 210. For example, authenticationserver 115 can be configured by general access rules 210 to requireaccount information in addition to a session token. Alternatively,authentication server 115 can be configured by general access rules 210to permit access without requiring account information.

After step 901, process 900 can proceed to step 903. In step 903authentication server 115 can identify secure tag 105 in the receivedtag image. Consistent with disclosed embodiments, authentication server115 can be configured to identify secure tag 105 using a stored hash ofan image of a secure tag. The stored hash can be a perceptual hash(e.g., a pHash, aHash, dHash, or the like). The secure tag correspondingto the stored hash may have been generated using a stylesheet, asdescribe above with regard to FIG. 6 . In some embodiments,authentication server 115 can be configured to store hashes receivedfrom private system 120. Authentication server 115 may be configured toassociate the stored hashes with secure tag identifiers. Authenticationserver 115 may not be configured to store stylesheets or privateportions of stylesheets. Therefore, should an attacker gain access toauthentication server 115, the attacker only gains access to hashes andsecure tag identifiers. But authentication server 115 may be configuredto store public portions of stylesheets, in some embodiments.

In step 903, consistent with disclosed embodiments, authenticationserver 115 can generate one or more hashes of the received tag image.The one or more generate hashes can be perceptual hashes (e.g., a pHash,aHash, dHash, or the like). In some aspects, the received tag image canbe a vector graphics image. In various aspects, generating the hash ofthe received tag image can include converting at least a portion of thereceived vector graphics image into a raster image. This raster imagecan have a predetermined number of pixels. In some aspects, thepredetermined number of pixels can be greater than or equal to 64pixels. In various aspects, the predetermined number of pixels can beless than or equal to 1,048,576 pixels.

In step 903, consistent with disclosed embodiments, authenticationserver 115 can identify secure tag 105 in the received tag image bycomparing the generated one or more hashes of the received tag imagewith the stored hash of an image of a known secure tag. In someembodiments, this comparison can include determining a differencebetween the stored hash and the generated hash. Authentication server115 can be configured to identify secure tag 105 as the secure tagcorresponding to the stored hash(es) when the difference between thestored hash and the generated hash satisfies a threshold criterion. Forexample, the threshold criterion can require that the hashes match. Asan additional example, the threshold criterion can require that thehashes are similar. For example, in some aspects, the difference can bea distance between the stored hash and the generated hash.Authentication server 115 can be configured to identify hashes within athreshold distance as similar. In some embodiments, the distance can bea Hamming distance.

In some embodiments, authentication server 115 can be configured toidentify damaged or partially obscured tags. For example, authenticationserver 115 can be configured to identify secure tag 105 in the receivedtag image by generating hashes of progressively smaller segments of thereceived tag image. These progressively smaller segments of the receivedtag image can be compares to hashes of corresponding segments of theknown secure tag. Based on a degree of matching between these generatedhashes and the corresponding hashes of the known secure tag, a damagedor partially obscured tag can be identified, even when a hash of anoverall image of the damaged or partially obscured tag fails to matchany stored hashes.

In step 903, consistent with disclosed embodiments, authenticationserver 115 can determine a tag identifier for the matched stored hashes.The tag identifier can be used to retrieve decoding rules for the tag.

After step 903, process 900 can proceed to step 905. In step 905authentication system 115 can generate tag data using the received tagimage and decoding rules. In some aspects, these decoding rules can bespecific to tags generated using a particular stylesheet. For example,these decoding rules can identify the locations of tag data within thetag, specify default locations of tag features, specify correspondencesbetween tag feature options and tag data values, and provide ratios(e.g. diameters of dots as ratios of overall diameters, widths of rimbreaks as ratios of rim thicknesses, and the like) for identifying tagfeatures and tag feature options.

In step 905 authentication system 115 can receive the decoding rules inresponse to a decoding request. In some aspects, the decoding requestcan be provided to private system 120 or another system. The decodingrequest can be provided using network 130. The decoding request caninclude an identifier for secure tag 105. The decoding request caninclude an authorization key (e.g., the authorization key received fromclient device 110). In some aspects, the decoding rules can be retrievedfrom private system 120 or another system.

In some, embodiments, the decoding rules can enable decoding of a subsetof secure tag 105. The decoding rules can include or be based uponportions of the stylesheet used to generate secure tag 105. The decodingrules can correspond to the authorization key. For example,authentication system 115 can receive different decoding rules dependingon the authorization key including the in decoding request. As anadditional example, different rules can be provided in response to anauthorization key associated with a manufacturer than in response to anauthorization key associated with a retailer. Even though the secure tagcan include the same information, the difference between the decodingrules means that different subsets of that information can be availableto the manufacturer and the retailer.

In some embodiments, the decoding rules can enable iterative decoding ofsecure tag 105. For example, the decoding rules can include firstdecoding rules and second decoding rules. The first decoding rules canenable decoding of at least one of a first portion of the secure tagdefined by the stylesheet or a first subset of tag features defined bythe stylesheet. For example, the first decoding rules can enabledecoding of first tag data in a reference portion of the secure tag. Thesecond decoding rules can enable decoding of at least one of a secondportion of the secure tag or a second subset of the tag features. Forexample, the second decoding rules can enable decoding of second tagdata in a portion of the secure tag referenced by the first tag dataencoded in the reference portion of the secure tag decoded using thefirst tag. Without the first tag data encoded in the reference portion,the second decoding rules cannot be used to decode the second tag data.Thus the first tag data can be generated using the first decoding rulesand the second tag data can be generated using the first tag data andthe second decoding rules.

In some embodiments, authentication system 115 can receive publicdecoding rules for decoding a public portion of a tag generated usingthe stylesheet. Such rules can specify how to decode non-sensitiveinformation of general interest, such as stock keeping unit numbers(SKUs), brand names, expiration dates, and product names.

After step 905, process 900 can proceed to step 907. In step 907authentication server 115 can be configured to provide the decoded tagdata to client system 110 in response to the original tagidentification. In some embodiments, authentication system 115 can beconfigured to provide the tag decoding rules in addition to or insteadof the tag data. This can enable the client device to perform the tagdecoding in place of authentication server 115 or in order to verify thedecoding performed by authentication server 115. For example, in someembodiments, authentication server 115 can be configured to provide anypublic decoding rules for secure tag 105 stored by authentication server115, or received from private system 120, to client device 110.

In some embodiments, authentication server 115 can be configured totrack tag identification requests. For example, authentication server115 can be configured to store tracking information including theidentification request type, location, IP address, time of day, clientdevice identification information, user identification information,transaction information, or the like. In some embodiments,authentication server 115 can be configured to store the trackinginformation in authentication database 205. In various embodiments,authentication server 115 can be configured to provide instructions towrite this information to public database 130 (which may be adistributed database such as the Ethereum blockchain). For example,authentication server 115 can be configured to write the location ofidentification requests for secure tag 105 to bundle account 520 usingoracle 510. In some embodiments, authentication server 115 can beconfigured to provide at least a portion of the tracking information inresponse to requests from client device 110, depending on one or more ofthe identity associated with the requests or the API key(s) providedwith the request. In some embodiments, authentication server 115 can beconfigured to provide an address in public database 130 that clientdevice 110 can use to retrieve the tracking information.

FIG. 10 depicts a flowchart illustrating an exemplary process 1000 ofmulti-resolution tag identification, consistent with disclosedembodiments. Though described below as performed by authenticationserver 115, process 1000 can be performed in some embodiments by privatesystem 120, client system 110, or another system. Process 1000 caninclude the steps of generating a hash of an image of secure tag 105,selecting first secure tags based on the generated hash, generating asecond hash corresponding to a predetermined segment of secure tag 105,and selecting a secure tag from the first secure tags as the secure tagmatching secure tag 105. In this manner, process 1000 can enableauthentication server 115 to identify secure tag 105 in an image when ahash of secure tag 105 in the image matches multiple stored hashes.

After starting, process 1000 can proceed to step 1001. In step 1001,authentication server 115 can generate a hash of a secure tag (e.g.,secure tag 105) depicted in a received tag image. The hash can be aperceptual hash.

After step 1001, process 1000 can proceed to step 1003. In step 1003,authentication server 115 can select first secure tags using differencesbetween the generated hash and stored hashes of the first secure tags.In some embodiments, the differences can be distances according to ametric, such as a Hamming distance. In some aspects, the stored hashesof the selected first secure tags can differ from the generated hash ofthe secure tag depicted in the receive tag image by less than athreshold amount.

After step 1003, process 1000 can proceed to step 1005. In step 1005,authentication server 115 can generate a second hash of a predeterminedsegment of secure tag 105 depicted in the received tag image. Forexample, authentication server 115 can be configured to generate a hashof one or more quadrants of the secure tag.

Authentication server 115 can be configured to prompt client device 110for a second image, consistent with disclosed embodiments. For example,authentication server 115 can be configured to provide instructions todisplay a banding box or similar indication around the predeterminedsegment of secure tag 105. In response to this indication, a user caninteract with the client device to obtain a second image depicting thepredetermined segment of secure tag 105.

Authentication server 115 can be configured to receive this second imagefrom client device 110. While the first received image can depict atleast some of secure tag 105 as a whole in a first level of detail, thesecond received image can depict the predetermined segment of secure tag105 in a second level of detail greater than the first level of detail.For example, the first and second images can include the same number ofpixels, but the camera of client device 110 can be closer to thepredetermined segment of secure tag 105 when taking the second imagethan when taking the first image.

After step 1005, process 1000 can proceed to step 1007. In step 1007,authentication server 115 can be configured to select a particularsecure tag from the previously selected first secure tags.Authentication server 115 can be configured to refine the selection of amatching secure tag using differences between the second hash generatedin step 1005 and stored second hashes of the predetermined portion ofthe images of the first secure tags. For example, while the first hashgenerated in step 1001 may broadly match the stored hashes of the firstsecure tags, the second hash generated in step 1005 may only match oneof the stored second hashes (e.g., only the second hash generated instep 1005 and one of the stored second hashes may differ by less than athreshold amount). Should more than one of the stored second hashessufficiently match the second hash generated in step 1005,authentication server 115 can be configured to repeat this comparisonprocess with another predetermined segment of secure hash 105 (e.g., asub-segment of the quadrant chosen in step 1005, or another quadrant ofsecure tag 105).

FIG. 11 depicts a flowchart illustrating an exemplary process 1100 ofmulti-resolution tag identification with altered tags. Though describedbelow as performed by authentication server 115, process 1100 can beperformed in some embodiments by private system 120, client system 110,or another system. Consistent with disclosed embodiments, process 1100can include comparing a hash of the secure tag depicted in a receivedtag image to stored hashes of secure tag images. When the hash of thesecure tag depicted in a received tag image fails to match any of thestored hashes to within a predetermined degree of difference,authentication server 115 can be configured to compare a hash of apredetermined segment of the secure tag depicted in the received tagimage to stored hashes of corresponding segments of secure tags.Authentication server 115 can be configured to identify a potentiallymatching secure tag based on this second comparison. The authenticationserver 115 can be configured to compare a hash of another predeterminedsegment of the secure tag depicted in the received tag image to a storedhash of a corresponding segment of the identified potentially matchingsecure tag. Should these additional hashes match to within apredetermined degree of difference, authentication server 115 can beconfigured to confirm the identification of the matching secure tag asthe secure tag depicted in the received tag image. Thus, according toprocess 110, authentication server 115 can be configured to searchauthentication database 205 for hashes matching portions of the securetag depicted in the received image. In this manner, authenticationserver 115 can be configured to match incomplete or damaged secure tags.

After starting, process 1100 can proceed to step 1101. In step 1101,authentication server 115 can determine that differences between a firstgenerated hash and first stored hashes of secure tags do not satisfy athreshold criterion. The first generated hash can be of a secure tag(e.g., secure tag 105) depicted in a received image. The first storedhashes can be of secure tags in authentication database 205. Thedifference can be a distance, calculated according to a metric (e.g., aHamming distance).

After step 1101, process 1100 can proceed to step 1103. In step 1103,authentication server 115 can be configured to select one of the securetags in authentication database 205 based on a comparison between agenerated second hash of the secure tag depicted in the received image(e.g., secure tag 105) and a stored second hash. The generated secondhash can be a hash of a segment of the secure tag depicted in thereceived image (or another image of the same secure tag). The storedsecond hash can be a hash stored in authentication database 205 of asegment of a potentially matching secure tag. The segment of thepotentially matching secure tag can be the same as the segment of thesecure tag depicted in the received image.

After step 1103, process 1100 can proceed to step 1105. In step 1105,authentication server 115 can be configured to generate a hash of asecond segment of the secure tag depicted in the originally receivedimage. In some embodiments, authentication server 115 can be configuredto prompt client device 110 for another image. For example,authentication server 115 can be configured to provide instructions todisplay a banding box or similar indication around the segment of securetag 105. In response to this indication, a user can interact with clientdevice 110 to obtain a second image depicting the desired segment ofsecure tag 105.

In some embodiments, the second segment can be distinct from the firstsegment. For example, when the first segment is a top right quadrant ofthe secure tag, the second segment can be a top left quadrant of thesecure tag. In various embodiments, the second segment can overlap thefirst segment. For example, the second segment can fall wholly orpartially within the first segment. For example, the second segment canbe the lower left quadrant of the first segment.

After step 1105, process 1100 can proceed to step 1107. In step 1107,authentication server 115 can be configured to validate the potentiallymatching secure tag identified in step 1103. Authentication server 115can be configured to validate the potentially matching secure tag usinga difference between the generated third hash and a stored third hash.The stored third hash can be of a segment of the potentially matchingsecure tag. The segment can correspond to the segment used to generatethe third hash. Authentication server 115 can determine that thedifference between the third generated hash and this stored hashsatisfies a threshold criterion. The difference can be a distance,calculated according to a metric (e.g., a Hamming distance).

Consistent with disclosed embodiments, processes 1000 and 1100 caninclude determining (i) an overall distance using the segment distances,and/or (ii) a count of segment distances satisfies a thresholdcriterion. For example, authentication server 115 can compare multiplehashes of images of segments of secure tag 105 to corresponding storedhashes of segments of the secure tag. The comparison can includedetermining a distance between each hash of an image of a segment ofsecure tag 105 and the corresponding stored hash of a segment of thesecure tag. The comparison can include determining an overall distancebased on these individual distances, such as an average distance. Thecomparison can also include determining a count of the individualdistances satisfying a threshold criterion (e.g., falling within acertain maximum distance). In some embodiments, authentication server115 can be configured to determine a confidence value using at least oneof a number of the hashes compared, the count of the individualdistances satisfying the threshold criterion, or the individual oroverall distances.

FIG. 12 depicts a schematic of a logical database structure forperforming multi-resolution tag identification. Authentication database205 can be configured with the schema depicted in FIG. 12 , in someembodiments. Authentication database 1205 can be configured to storehashes generated using secure tags. These hashes can be generated byprivate system 120 during the tag creation process, as described abovewith regards to FIG. 6 . In some aspects, authentication database 205can be configured to store hashes concerning a first secure tag in adata structure 1201. Authentication database 205 can be configured tostore hashes corresponding to multiple levels of detail. In someaspects, tag level 1230 can include hashes computed over entire securetags. At this level of detail, small tag feature options used to encodedata may not be identifiable (due to the resolution of the scanner orimage processing losses). Thus a hash computed over an image depictingan entire tag may not match with any of the hashes stored inauthentication database, or may match with multiple hashes. In variousaspects, tag level 1240 can include hashes computed over a segment ofthe overall tag (e.g., quadrant of the overall secure tag). At thislevel of detail, small tag feature options used to encode data may beidentifiable. Furthermore, damage to one segment of a tag may not affectanother segment of the tag. Therefore, while a hash computed over theentire damaged tag may not match (e.g., unmatched hash 1203), a hashcomputed over an undamaged segment of the tag may still match (e.g.,matched hash 1211). In various aspects, tag level 1250 can includehashes computed over a sub-segment of the overall tag (e.g., a quadrantof a quadrant of the overall secure tag). Because additional segments ofother tags may match (e.g., matched hash 1213), authentication server115 can be configured to check additional hashes (e.g., matched hash1221, unmatched hash 1223). By checking these additional hatches,authentication server 115 can confirm that the secure tag correspondingto the hashes of first tag hash structure 1201 is the secure tagdepicted in the received image. In some embodiments, authenticationserver 115 can be configured to generate a score based on the number ofhashes checked, the number of hashes matching according to a similaritycriterion, and the degree of matching. This score can be used toidentify the secure tag matching the secure tag depicting in the imagereceived from client device 110. As would be appreciated by one of skillin the art, the depicted tree structure is not intended to be limiting.Other data structures could be used to store hashes and relatedinformation, such as an associative array or map keyed to the storedhashing and including identifiers for the secure tags.

FIG. 13 depicts an exemplary user interface for evaluating theauthenticity of a tag. A reading device can have an app that is able todisplay the determined level of authenticity of a tag. The authenticitycan be determined using the systems and methods disclosed herein. When asecure tag is scanned, the scanned tag image is sent to theauthentication server. The authenticity of the tag can be determinedusing the hashing method described in FIGS. 10-12 . When the tag isauthenticated, information about the tag is returned, including thenumber of scans, any reports, etc. In certain aspects, theauthentication server can determine a probability of authenticity basedon the hashing process. In other aspects, the authentication server candetermine the authenticity of the secure tag based on the tag historystored in the blockchain.

In some embodiments, the app to determine the level of authenticity of atag can return an “authentication score.” In certain aspects, a perfectscore 1301 can be returned. This can occur when, for example, the securetag is in good condition and the reading device is able to get a goodscan of the secure tag. In addition, perfect score 1301 can be returnedwhen the authentication server determines that the secure tag has notbeen scanned before or if the tag history in the blockchain indicatesthe product is not a counterfeit. In other aspects, a low score 1303 canbe returned. This can occur when the secure tag is in poor condition orthe reader cannot get a good scan of the secure tag. In addition, lowscore 1303 can be returned when the authentication server determinesthat the same tag has been identified as being potentially counterfeit.For example, if the tag has been scanned numerous times in multiplelocations, low score 1303 will be returned as the authentication score.In another example, if the tag has been reported as counterfeit, lowscore 1303 will be returned as the authentication score.

In some embodiments, a user can report a tag through the exemplary userinterface shown in FIG. 13 . For example, when low score 1303 isreturned indicating that the tag has been scanned on numerous occasionsand is not unique, the user can report the tag so that the owner of thetag becomes aware of the possible counterfeit. In other embodiments, auser can look at product information through the app. For example, whenhigh score 1301 is returned, the user can then review the productinformation.

FIG. 14 depicts an exemplary process for decoding tag featureselections. Though described below as performed by authentication server115, process 1400 can be performed in some embodiments by private system120, client system 110, or another system. Process 1400 can include thesteps of receiving an image, receiving decoding rules and a numericalseed, identifying possible features using a known stylesheet and/orknown data values, identifying actual features based on the receivedimage, reconstructing data values, and decrypting data values. In thismanner, authentication server 115 can be configured to decode datastored in a secure tag using information received from both clientdevice 110 and private system 120. In some embodiments, authenticationserver 115 does not store the image, decoding rules, a numerical seed.In this manner, the arrangement of functionality of system 100 ensuresthat an attacker compromising authentication server 115 would not beable to decode the contents the secure tags managed by authenticationserver 115.

After starting, process 1400 can proceed to step 1401. In step 1401,authentication server 115 can be configured to receive an image. Theimage can be a raster image or a vector graphics image. The image can bereceived from client device 110, or another system. Authenticationserver 115 can be configured to convert the image to a vector graphicsimage, when the image is a raster image.

After step 1401, process 1400 can proceed to step 1403. In step 1401,authentication server 115 can receive decoding instructions. In someembodiments, authentication server 115 can be configured to receivedecoding instructions from private system 120. The decoding instructionscan be received in response to a request from authentication server 115to private system 120. The request can include an application key andthe decoding instructions received can depend on the application keyprovided.

In some embodiments, private system 120 can be configured to convert thestylesheet and numeric seed used to generate the secure tag intodecoding instructions that directly describe correspondences between tagfeatures present in the vector graphics image and tag data values. Forexample, the decoding instructions can specify a set of tag featureoptions and a mapping from the values of these tag feature options tothe values of an item of tag data. In such embodiments, private system120 may not provide private portions of the stylesheet or the numericalseed to authentication server 115. In some embodiments, authenticationserver 115 can be configured to receive at least some of the privateportions of the stylesheet using to generate the tag together with anumerical seed used to generate a secure tag layout for the secure tag.In such embodiments, authentication server 115 can be configured togenerate the correspondences between tag features present in the vectorgraphics image and tag data values.

After step 1403, process 1400 can proceed to step 1405. In step 1405,authentication server 115 can identify possible features using thedecoding instructions and known tag data values. For example,authentication server 115 can be configured to locate tag featuresdescribed in the decoding instructions. In some instances, locating thetag features can depend on known tag data values. For example, a securetag may encode an 8-bit binary number into the size of dots in thesecure tag. The decoding instructions can indicate the correspondencebetween the size of the dots and the values of the specific 8-bit binarynumber. But the decoding instructions may not specify which portion ofthe secure tag contains the relevant dots. Another portion of the securetag can include a reference usable to identify the portion of the tagencoding the tag features (the dots) having tag feature options (dotsizes) that encode specific values of the tag data.

After step 1405, process 1400 can proceed to step 1407. In step 1407,authentication server 115 can identify actual tag feature option valuesbased on the received image. In some embodiments, when the image file isa vector graphics file, authentication server 115 can read the featureoption values from the vector graphics file. If necessary,authentication server 115 can first convert the received image to avector graphics file. Alternatively, authentication server 115 can usefunctions provided by OpenCV or the like to determine tag feature optionvalues (e.g., relative dot sizes, the presence or absence of a featureat a location) from a raster image directly.

After step 1407, process 1400 can proceed to step 1409. In step 1409,authentication server 115 can reconstruct tag data values based onactual feature values. For example, have determined the values of thetag feature options for the relevant tag features, authentication server115 can be configured to convert these tag feature option values to tagdata according to the decoding rules received from private system 120.

After step 1409, process 1400 can proceed to optional step 1411. Inoptional step 1411, authentication server 115 can decrypt the tag data.In some embodiments, authentication server 115 can be configured to usedkey material encoded into the secure tag to decrypt encrypted tag data.

FIG. 15 depicts an exemplary authentication process using contextualinformation. Though described below as performed by private system 120and authentication server 115, process 1500 can be performed in someembodiments entirely by private system 120 or by authentication server115, or by client system 110 or another system. According to process1500, private system 120 can encode contextual data into a secure tag.Authentication server 115 can then enforce contextual conditionsconcerning the encoded data in responding to an identification request.

After starting, process 1500 can proceed to step 1501. In step 1501,private system 120 can receive tag data. As previously described, thistag data can be received from another system, a memory of private system120, or a user.

After step 1501, process 1500 can proceed to step 1503, in step 1503,private system 120 can receive contextual information. In someembodiments, this contextual information can include at least one of anauthentication credential (e.g., a password, authentication token, orthe like), a biometric identifier (e.g., a fingerprint, voiceprint, orthe like), a sound file, a tag identifier (e.g., a tag identifier ofanother secure tag), or a perceptual hash of an image. For example, thesecure tag can produced to label an item (e.g., a user identificationcard, a piece of meat, a bottle of wine, an item owned by an individual)and the image can depict a portion of the item (e.g., the identificationphoto on the identification card, the grain of the meat, the label ofthe bottle of wine, the face of the individual that owns the item).

After step 1503, process 1500 can proceed to step 1505. In step 1505,private system 120 can encode the tag data and the contextualinformation into the secure tag. As described in this application, thetag data and the contextual information can be encoded into the securetag as a selection of tag feature options, with the available tagfeature options dependent on a numeric seed.

After step 1505, process 1500 can proceed to step 1507. In step 1505,authentication system 115 can receive an identification requestconcerning the secure tag. As described in this application, theauthentication server can be configured to identify the tag using one ormore hashes of the secure tag. Authentication server 115 can beconfigured to request decoding instructions from private system 120.Authentication server 115 can be configured to decode the storedcontextual information using the decoding instructions.

After step 1507, process 1500 can proceed to step 1509. In step 1509,authentication system 115 can receive additional contextual information.This additional contextual information can be received from clientdevice 110 or another device. The additional contextual information canbe received in response to a request provided by authentication system115. For example, authentication system 115 can provide instructions toclient device 110 for display to a user of client device 110 (e.g.,instructions to display on a user interface of client device 110 thetext “To unlock Laava tag take picture of owner's face”).

After step 1509, process 1500 can proceed to step 1511. In step 1511,authentication system 115 can authenticate the identification requestusing the additional contextual information. In some embodiments,authentication system 115 can be configured to determining that thereceived additional contextual information and the decoded contextualinformation satisfy a similarity criterion. For example, authenticationsystem 115 can be configured to compare the decoded contextualinformation to the received contextual information. When the contextualinformation is a perceptual hash of an image (e.g., a perceptual hash ofanother tag, or of an owner of the label item, or of a portion of thelabeled item) authentication system 115 can be configured to determine adistance between the received additional contextual information and thedecoded contextual information. In some aspects, this distance can be ahamming distance (or a similar metric).

After step 1511, process 1500 can proceed to step 1513. In step 1513,authentication system 115 can provide an indication based on the resultof the authentication performed in step 1511. Should the additionalcontextual information and the decoded contextual information notsatisfy the similarity criterion, authentication system 115 can providean indication of an authentication failure to client device 110. Shouldthe additional contextual information and the decoded contextualinformation satisfy the similarity criterion, authentication system 115can provide an indication of successful authentication to client device110. In some embodiments, the indication of successful authenticationcan include at least some of the tag data received in step 1501. Invarious embodiments, the indication of successful authentication caninclude decoding instructions for at least some of the tag data receivedin step 1501. In various embodiments, the indication of successfulauthentication can include status information retrieved from adistributed database. This status information can be retrieved from thedistributed database using an oracle (e.g., the distributed database canbe the Ethereum blockchain).

FIG. 16A depicts paired and sequenced secure tags. Secure tags can haverelationships with other tags to increase the level of security andauthenticity. For example, a first secure tag 1601 and a second securetag 1603 can be paired. First secure tag 1601 and second secure tag 1603can then both be required to be scanned for a user to get informationabout the products or to transfer ownership of the products. Forexample, first secure tag 1601 can be generated and placed on one shoein a pair of shoes, and second secure tag 1603 can be generated andplaced on the second show in the same pair of shoes. In this example,both tags are unique and identify the specific shoe in the pair, howeverboth tags are required to be read to authenticate the pair of shoesand/or transfer ownership.

In some embodiments, paired tags can further be sequenced to create asequenced tag 1605. Sequenced tag 1605 is a combination of first securetag 1601 and second secure tag 1603, and provides information about thepaired tags. In certain aspects, sequenced tag 1605 can be the only tagavailable to be scanned prior to purchase or transfer of ownership. Inthese aspects, sequenced tag 1605 can provide authentication of theproduct and basic information about the product. Sequenced tag 1605 canalso indicate which paired tags should be present. By way of theprevious example, when a pair of shoes contains paired tags, the tagscan be sequenced to create sequenced tag 1605. Sequenced tag 1605 can beplaced on the outside of the shoebox, providing information about theshoes inside the box. Once opened, first secure tag 1601 and secondsecure tag 1603 can be scanned to check that the correct shoes are inthe box.

FIG. 16B depicts an identification card 1607 using proximityfingerprinting. In addition to having relationships with other securetags, a secure tag 1611 can have a relationship with an external image,such as facial fingerprint 1609. Identification card 1607 can have anadditional level of authenticity by combining secure tag 1611 withfacial fingerprint 1609. Proximity fingerprinting works by using objectsin proximity to secure tag 1609 to further authenticate a tag. In someembodiments, this can prevent a situation where a secure tag is copiedfrom being authenticated somewhere else. For example, if secure tag 1611is copied from identification card 1607, it will still not be verifiedwithout facial fingerprint 1609. The result is a combined secured ID inthe form of identification card 1607. In some embodiments, secure tag1611 is paired with facial fingerprint 1609, meaning both secure tag1611 and facial fingerprint 1609 must be presented together forauthentication.

In some embodiments, identification card 1607 can be used to presentproof of identification in the appropriate situation. For example, apolice officer can require a citizen to present identification card 1607to ensure the person is who they claim to be at the point of encounter.In other embodiments, establishments that server alcohol can require aperson to present identification card 1607 to ensure the person is notusing a fake driver's license or proof of age card.

FIG. 22 depicts paired tags throughout the supply chain. When amanufacturer makes a product, it can create a first secure tag 2201 anda second secure tag 2203, pair the secure tags, and affix the securetags to the products. The paired tags can then be sequenced and updatedin the blockchain throughout the supply chain process. For example, thesequenced tag can contain information about the paired product itself2205, about the specific pallet the paired product was shipped on 2207,the overall shipment the paired product was sent in 2209, andinformation about the retailer 2211. At each stage in the supply chainprocess the blockchain is updated with information about the pairedproduct. When a customer goes to the retailer to purchase the product,he can carry out ownership validation 2213 of the sequenced tag.

In some embodiments, the retailer control 2215 and closed consumer loop2217 can have access to different levels of information. For example,closed consumer loop 2215 can have access to only information about thepaired tags themselves. This can include information about the productitself and the manufacturer. Closed consumer loop 2215 allows theconsumer to verify the authenticity of the paired tags. In this example,retailer control 2215 can include the ability to access informationabout the entire supply chain process. Retailer control 2215 can includeaccess to individual packaging information 2205, pallet information2207, shipment information 2209, and retailer information 2211. Retailercontrol 2215 will typically not include access to the paired tagsthemselves. Retailer control 2215 allows the retailer to track shipmentinformation and manage logistics.

FIG. 17 depicts an exemplary two-part label. The two-part label caninclude a base tag 1710 and an overlay 1720. Base tag 1710 can include asubstrate labeled with a first secure tag that encodes first tag data asa selection of potential first secure data feature options. Overlay 1720can be detachably adhered to the substrate containing base tag 1710.Overlay 1720 can include a transparent portion 1721 and an opaqueportion 1723. Both transparent portion 1721 and opaque portion 1723 canbe aligned with the first secure tag. The first secure tag located onbase tag 1710 can be unaffected by aligned transparent portion 1721.Aligned opaque portion 1723 and the first secure tag located on base tag1710 can encode second tag data as a selection of potential secondsecure tag feature options.

In some embodiments, the potential first secure tag feature options onbase tag 1710 are different from the potential second secure tagfeatures options created by opaque portion 1723 and base tag 1710. Inother embodiments, aligned opaque portion 1723 can obscure selectedfirst secure tag features on base tag 1710. In other embodiments still,aligned opaque portion 1723 can select potential first secure tagfeature options on base tag 1710. In other embodiments still, thepotential first secure tag feature options on base tag 1710 can includethe presence or absence of tag features at positions specified by afirst secure tag layout. In these embodiments, the potential secondsecure tag feature options created by aligned opaque portion 1723 caninclude the presence or absence of tag features at positions specifiedby a second secure tag.

The two-part label depicted in FIG. 17 can be generating by firstgenerating a first secure tag that encodes first tag data as a selectionof potential first secure tag feature options using the first tag data,a first numeric seed, and a first stylesheet. Next, the method generatesa second secure tag that encodes second tag data as a selection ofpotential second secure tag feature options using the second tag data, asecond numeric seed, and a second stylesheet. The method then determinesa difference image between the first secure tag and the second securetag and labels a substrate with the first secure tag to create base tag1710. The method then detachably adheres overlay 1720 to base tag 1710,overlay 1720 being labelled with the difference image and aligned withthe first secure tag.

In some embodiments, overlay 1720 obscures portions of the first securetag located on base tag 1710 by way of opaque portion 1723 absent fromthe second secure tag. In other embodiments, overlay 1720 depictsportions of the second secure tag absent from the first secure tag. Inother embodiments still, overlay 1720 transmits portions of the secondsecure tag present in the first secure tag located on base tag 1710 byway of transparent portion 1721. In other embodiments still, the firststylesheet used to generate the first secure tag can be different fromthe second stylesheet used to generate the second secure tag. In otherembodiments still, the substrate in which base tag 1710 is labeled onand overlay 1720 is adhered to can include a consumer good.

For example, a two-part labeled can be used for additionalauthentication and security of products. A two-part label can be placedon the outside of a box being sold, said two-part label containing basetag 1710 and overlay 1720. Overlay 1720 contains both transparentportion 1721 and opaque portion 1723, such that the tag has a uniquelook different from base tag 1710. In this example, the customer orretailer can scan the second tag created by overlay 1720 to revealcertain information about the product. After the product is purchasedand/or ownership is transferred, overlay 1720 can be removed revealingbase tag 1710. The now-owner can scan base tag 1710 to revealinformation completely different from the information provided by thecombination of overlay 1720 and base tag 1710. The two-part label addsan additional layer of security without adding to the complexity of thesecure tag itself.

FIG. 18 is a flowchart of exemplary method 1800 for providing documentsusing secure tags. Method 1800 begins at step 1801, where the methodassociates a first secure tag 1813 with a document 1811. First securetag 1813 can be generated and paired to document 1811. In addition,first secure tag 1813 has an identifier of document 1811 encoded into itusing a selection of potential feature options. In some embodiments, theidentifier of document 1811 can include a hash of document 1811. Inother embodiments, document 1811 is encrypted to the blockchain. Themethod can receive a request from a first device 1821 to access document1811. First device 1821 can be a mobile device (e.g. tablet, smartphone,etc.), a desktop computer, a laptop, a server, a wearable device(eyeglasses, a watch, etc.), and/or device dedicated hardware device.Following the request for access to document 1811, method 1800 moves tostep 1803.

At step 1803, the method provides first secure tag 1811 through firstuser device 1821 for display. At step 1805, the method can receiveconfirmation of the request through a second device 1831, which includesa secure tag image. Second device 1831 can be a mobile device (e.g.tablet, smartphone, etc.), a desktop computer, a laptop, a server, awearable device (eyeglasses, a watch, etc.), and/or device dedicatedhardware device. The method can then compare first secure tag image 1813to the secure tag image received from second device 1831. If thecomparison reveals a match between first secure image 1813 and thesecure tag image received from second device 1831, then method 1800 willmove to step 1807.

At step 1807, the method provides document 1811 to first device 1821 fordisplay. In some embodiments, document 1811 can be watermarked with asecure tag to create a watermarked document 1843. Watermarked document1843 can have a new secure tag or can be watermarked with first securetag 1813. In other embodiments, first device 1821 can become amauthorized user device 1841. In some embodiments, authorized user device1841 can access watermarked document 1843 for a predetermined period oftime. When the predetermined period of time has finished, authorizeduser device 1841 loses its authorization to view watermarked document1843. In other embodiments, watermarked document 1843 cannot be accessedby any device after it has been marked as read. In other embodimentsstill, watermarked document 1843 can be read by a second authorized userdevice after authorized user device 1841 has marked the document asread.

In some embodiments, comparing first secure tag 1813 and the secure tagimage received from second user device 1831 can include generating aperceptual has of first secure tag 1813, generating a perception hash ofthe secure tag image received from second user device 1831, anddetermining if a difference between the stored perceptual hash and thegenerated perceptual hash satisfies a threshold criterion. In otherembodiments, comparing first secure tag 1813 and the secure tag imagereceived from second user device 1831 can include generating aperceptual hash of the secure tag image received from second user device1831, selecting first secure tags using differences between thegenerated perceptual hash and stored perceptual hashes of images of thefirst secure tags, generating a second perceptual hash of apredetermined segment of the secure tag image received from second userdevice 1831, and selecting first secure tag 1813 from the first securetags using differences between the generated second perceptual hash andstored second perceptual hashes of the predetermined portion of theimages of the first secure tags.

In some embodiments, the confirmation request at step 1805 can include aconfirmation request identifier. In this embodiment, providing thedocument to first device 1821 at step 1807 based on the comparison canfurther include generating a second secure tag paired to the request,the second secure tag encoding the confirmation request identifier usinga selection of potential tag feature options, and watermarking document1811 with the second secure tag. In these embodiments, watermarkeddocument 1843 does not contain a watermark of first secure tag 1813.

In some embodiments, method 1800 can further include determining thatthe receipt of the secure tag image satisfies an authenticationcriterion. In certain aspects, the authentication criteria can concern anumber of confirmation requests associated with first secure tag 1813.In other aspects, the authentication criteria can concern an elapsedtime since the provision of first secure tag 1813 to first device 1821.In other aspects still, the authentication criteria can concern ageographic origin of the confirmation request. In other aspects still,the confirmation request can include a confirmation request identifier,and the authentication criteria can concern the confirmation requestidentifier. In these aspects, the authentication criteria can besatisfied when an access identifier of the access request matches aconfirmation identifier of the confirmation request.

Method 1800 can be used when there is an additional level of securityrequired for a document. For example, a bank can use method 1800 toensure security on certain documents. A bank can create a tag that ispaired with a document concerning a customer's account. The customer canrequest access to the document through her laptop. The bank then thesecure tag associated with the document to the customers laptop. Thecustomer can then scan the tag with her mobile phone and send the scanback to the bank. The image is then compared, and access to the bankdocuments will be granted if the image matches the secure tag provided.

FIG. 19 depicts an exemplary mutable secure tag. A mutable tag candigitally animate over time by morphing between glyphs and tags. Forexample, at a first time the tag can mutable tag can be in the form of aseries of dots without additional tag features, or an invalid frame1901. Invalid frame 1901 can mutate over a predetermined period of timeto change into a valid frame 1903. Valid frame 1903 can be read by anappropriate reading device and can return data. In some embodiments, amutable tag can be authentication by a single frame in the mutable tagprocess. In other embodiments, the mutable tag can be authenticated byauthenticated by several frames in the mutable tag process. In otherembodiments still, authentication can only occur based on the order ofappearance of frames in the mutable tag process. In other embodimentsstill, invalid frame 1901 can include a ‘junk tag,’ or a type of tagthat may appear valid but returns no information. A mutable tag can beread by any form of readable device, such as, for example, a camera.

In some embodiments, the mutable tag process can be triggered by arollover or click event. In these embodiments, the tag is static priorto the triggering event and enters the mutable tag process following thetriggering event. In other embodiments, the tag can be set to enter themutable tag process during a certain time frame. For example, a tag canbe set to mutate between the hours of 8 PM and 8 AM for additional tagsecurity over-night. In other embodiments still, the mutable tagcontains valid frame 1903 which is paired to another valid frame. Inthese embodiments, a user may be required to scan both paired frames toauthenticate the tag.

The system for generating a mutable secure tag can include at least oneprocessor and at least one non-transitory memory containing instructionsthat, when executed by the at least one processor, cause the system toperform operations which can include generating a first secure tagencoding tag data as a selection of tag feature options according tovalues of the tag data; receiving, from a scanner of a second device, arequest including a sequence of tag images, the sequence of tag imagesincluding a first tag image; authenticating the request using the firstsecure tag and the first tag image; and providing an indication of theauthentication of the request.

In some embodiments, the operations can further include providinginstructions to display, on a display of a first device, a sequence oftags including the first secure tag shown in valid frame 1903. In someaspect, the instructions provided to display a sequence of tagsincluding the first secure tag shown in valid frame 1903 can includeembedding the sequence of tags into a digital product. In other aspects,the instructions can provide for displaying the sequence of tags of thedisplay of the first device in response to a trigger. The trigger can bean event caused by a user or a predetermined event. In either aspect,the sequence of tags displayed can include invalid frame 1901 and validframe 1903.

In some embodiments, authenticating the request can include comparingone or more perceptual hashes of the first secure tag displayed in validframe 1903 to one or more corresponding hashes of the first tag image.In other embodiments, the authentication can further require matchingthe multiple secure tags to the multiple corresponding tag imagesaccording to a predetermined order of appearance. In other embodimentsstill, the indication of the authentication of the request can includeat least some of the tag data. In other embodiments still, theindication of the authentication of the request can include decodinginstructions for decoding at least some of the first tag data. In otherembodiments still, the indication of the authentication of the requestcan include status information retrieved from a database. In certainaspects, the database can be a distributed database, and the statusinformation can be retrieved from a distributed database using anoracle.

FIG. 20 depicts an exemplary system 2000 for inventory management usinga database, consistent with disclosed embodiments. Though describedbelow as performed by client systems associated with different entitiesin a supply chain, system 2000 can be performed in some embodiments byauthentication system 115, private system 120, or another system. Insome embodiments, manufacturing system 2001 can be configured toprovisioning a database (e.g., database 130) with status information fora secure tag. In some aspects, manufacturing system 2001 can beconfigured to update the state of an account 2010 of the database withstatus information concerning the secure tag, or an item labeled withthe secure tag. Manufacturing system 2001, or another system, can beconfigured to provide application keys to carrier system 2003 andretailer system 2005. These application keys can allow carrier system2003 and/or retailer system 2005 to update or modify the state ofaccount 2010. Alternatively or additionally, the state of an account2010 of the database can include rules governing access to the account.In some embodiments, customer system 2007 can lack an application key.Therefore, in some embodiments, customer system 2007 can have a defaultlevel of access to the database. For example, customer system 2007 canhave read only access to the state information described in account2010.

A client device can scan the secure tag associated with account 2010.Scanning the secure tag can cause the client device to interact withauthentication server 115 to decode the secure tag. In some embodiments,the client device can be configured to provide authenticationinformation (e.g., an application key or authentication credentials) andupdate information to authentication server 115.

In some embodiments, using information decoded from the secure tag,authentication server 115 can be configured to update account 2010. Insome aspects, authentication server 115 can be configured to provide theupdate information an address of the account to an oracle. The oraclecan then write the update to account 2010. In some embodiments,authentication server 115 can be configured to provide the informationto a private database. The private database can be configured to collectupdates, which can be periodically written to the database.

In various embodiments, using information decoded from the secure tag(e.g., an address of account 2010 in database 130), authenticationserver 115 can be configured to retrieve information from account 2010.In some aspects, authentication server 115 can be configured to providea request for state information to an oracle. The request can include anaddress of the account. The oracle can then read the state of account2010 to retrieve the state information, which is then conveyed to theclient device (directly or through one or more of the oracle and theauthentication server).

In some embodiments, authentication server 115 can be configured toprovide information for reading or writing to the database. For example,authentication server 115 can be configured to decode an address ofaccount 2010 in database 130 and provide the address to the clientdevice. The client device can the contact the oracle to provide updatesor read information. In such embodiments, the oracle may be configuredto restrict access to account 2010 based on application keys receivedfrom the client device or rules stored in account 2010.

A client device associated with manufacturing system 2001 can scan thesecure tag, consistent with disclosed embodiments. For example, a workercan use the client device to scan the secure tag as the item labeled bythe secure tag is exiting a manufacturing facility associated withmanufacturing system 2001. Manufacturing system 2001 can be configuredto use system 2000 to update account 2010 with information concerningthe manufacturing of the item. In some embodiments, manufacturing system2001 can subsequently access a portal to read information stored inaccount 2010 regarding the secure tag. For example, when manufacturingsystem 2001 accesses system 2000 (through authentication server 215 oran oracle) using an application key or credential associated with themanufacturer, manufacturing system 2001 can retrieve state informationincluding at least one of tracking information, sales information,customer data, usage information, activation information, or locationinformation.

A client device associated with distribution system 2003 can scan thesecure tag, consistent with disclosed embodiments. For example, a workercan use the client device to scan the secure tag as the item labeled bythe secure tag is received for transport. Based on this scan,distribution system 2003 can be configured to use system 2000 toretrieve state information regarding at least one of authenticityinformation, destination information, or manufacturer information.Distribution system 2003 can be configured to use system 2000 to updateaccount 2010 with information concerning the distribution of the item.In some embodiments, distribution system 2003 can subsequently access aportal to read information stored in account 2010 regarding the securetag. For example, when distribution system 2003 accesses system 2000(through authentication server 215 or an oracle) using an applicationkey or credential associated with the distributor, distribution system2003 can retrieve state information regarding at least one ofauthenticity information, destination information, or manufacturerinformation.

A client device associated with retailer system 2005 can scan the securetag, consistent with disclosed embodiments. For example, a worker canuse the client device to scan the secure tag as the item labeled by thesecure tag is received for from the distributor. Based on this scan,retailer system 2005 can be configured to use system 2000 to retrievestate information regarding at least one of authenticity information,transactional information, product information, or tracking information.Retailer system 2005 can be configured to use system 2000 to updateaccount 2010 with information concerning the receipt or sale of theitem. In some embodiments, retailer system 2005 can subsequently accessa portal to read information stored in account 2010 regarding the securetag. For example, when retailer system 2005 accesses system 2000(through authentication server 215 or an oracle) using an applicationkey or credential associated with the distributor, retailer system 2005can retrieve state information regarding at least one of authenticityinformation, transactional information, product information, or trackinginformation.

Customer device 2007 can scan the secure tag, consistent with disclosedembodiments. In some embodiments, customer device 2007 may lack anapplication key or authentication credential. In such embodiments,system 200 may provide relatively little information regarding the itemlabeled with secure tag 105. For example, customer device 2007 may beable to retrieve at least one of authenticity information, productinformation, or proof of ownership information.

As described herein, the state of the account can store statusinformation including state information for the secure tag indicates atleast one of tracking information, sales information, customer data,usage information, activation information, location information,authenticity information, destination information, updated manufacturerinformation, transactional information, product data, or proof ofownership information. The particular allocation of access to thisinformation among the manufacturer, distributor, retailer, and customeris intended to be exemplary, and not limiting.

FIG. 21 depicts an exemplary system 2100 for modifying secure taginformation in a database, consistent with disclosed embodiments. Thoughdescribed below as performed by a client system, system 2100 can beperformed in some embodiments by authentication system 115, privatesystem 120, or another system. As described above with regarding to FIG.20 , a system can access the database, either during an interactioninvolving a secure tag or using a portal, to read or write informationconcerning the state of the secure tag. As shown in FIG. 21 , a userwith a privileged account (e.g., as shown by a privileged applicationkey or authentication credentials) can access the database to updatestate information to cancel a tag. This can render the tag invalid forsubsequent use or transactions. For example, should user 2103 attempt toperform an action using the tag later, authentication server 115 canindicate that the tag is cancelled and refuse to identify the tag,authentication the tag, or perform the action.

FIG. 22 depicts a process for tracking inventory using secure tags. Asshown, two shoes can be tied together using paired tags (e.g., tags 2201and 2203), as discussed with regards to FIGS. 16A and 16B. The shoes canbe paired with the shoebox containing them by labeling the shoebox witha tag 2205 paired to each of tags 2201 and 2203. A tag 2207 for a box ofshoeboxes can be paired with tag 2205. A tag 2209 for a shippingcontainer can be paired with the tag 2207 for the box of shoeboxes. Aretailer tag 2211 can be paired with the tag 2209 for the shippingcontainer. The transfer of ownership to the customer can be associatedwith generation of tag 2213, as described below with respect to FIG. 23. In some embodiments, tag 2213 tag can be paired to the individual shoetags 2201 and 2203. Throughout this inventory tracking process, accountsassociated with the tags described can be updated with trackinginformation, location information, and other status information, asdiscussed with regards to FIGS. 20 and 21 . As shown, information inaccounts for those tags under retailer control (inside the retailercontrol loop 2203) can be accessible to at least the retailer, whileinformation in accounts for tags 2201, 2203, and 2213 can be accessibleto the customer.

FIG. 23 depicts a process to transferring ownership of an item using asecure tag. The tag validation process can involve pairing a uniquelygenerated digital secure tag with an original manufacturer secure tag2301. In some embodiments, a product is received by a seller withoriginal manufacturer secure tag 2301. Original manufacturer secure tag2301 is logged in the seller's system and associated with the productonline. Potential customers can then view the product online. Eachpotential customer sees a uniquely generated tag containing secondarydata which can authenticate the product when scanned. Each uniquelygenerated tag is paired with original manufacturer secure tag 2301. Forexample, potential buyer one will be presented with unique secure tagone 2303. Unique secure tag one 2303 resembles original manufacturersecure tag 2301 but contains unique secondary data. In addition, uniquesecure tag one 2303 is paired with original manufacturer secure tag2301. Thus, user one can confirm the authenticity of the product whilemaintaining unique secure tag one 2303 which can contain informationabout the time and date for viewing the product. In other embodiments,potential user two can be presented with unique secure tag two 2305,potential user three can be presented with unique secure tag three 2307,potential user four can be presented with unique secure tag four 2309,and potential user five can be presented with unique secure tag five2311. In each embodiment, the unique secure tag is paired to originalmanufacturer secure tag 2301.

In some embodiments, when a product is purchased by a buyer, the sellercan assign original manufacturer secure tag 2301 to the buyer. In otherembodiments, original manufacturer secure tag 2301 can be automaticallyassigned to the buyer upon purchase. In either embodiment, the purchaseand subsequent assignment of original manufacturer tag 2301 is updatedin the blockchain. Following purchase and assignment, no additionalunique secure tags can be generated and paired with originalmanufacturer tag 2301. In certain aspects, a potential customer can benotified of the purchase via the paired unique secure tag. For example,the pairing between original manufacturer secure tag 2301 and the uniquesecure tag can be killed. In another example, the unique secure tag cannotify the potential customer of the purchase via the updatedinformation on the blockchain.

FIG. 24A depicts an exemplary secure tag. The secure tag can containvarious technical components. For example, the technical components cancomprise: verification fragments, an outer and inner frame, an outerframe section, an outer frame block, dots, glyphs, connectors andsplines, a Laava stage one ID, a center graphic, a center graphic publickey, and additional technical features that are described in more detailbelow. The technical components can further be used to encode data invarious forms. The technical components are described in more detailbelow.

The center graphic can be a graphic, brand, or other visual, and can bean end user identifiable element which also contains fingerprinted data.In some embodiments, the center graphic can be used for orientation of asecure tag. In other embodiments, center graphic can be a glyph set,which can contain data. For example, center graphic can contain asmaller fingerprint signature than the larger tag, and if required, cancontain 128 characters of information in readable text. In otherembodiments still, center graphic can be used to display a brand. Insuch embodiments, center graphic can be any shape and can have color.The center graphic can further be surrounded by lines with a contrastdifference to separate it from the rest of the tag. In some embodiments,the lines can be required to have a certain thickness.

The center graphic public key can be a hashed SHA2 version of the centergraphic, typically a large generated number. The center graphic publickey can be used to unlock other portions of the tag, as described infurther detail below. The Laava stage one ID can be a manufacturer IDand public key and can allow a tag to be identified before any data isread. A glyph can generally be individual shapes or characters generatedwithin the tag, and can be where most of the data, keys, ID, etc., arestored. The outer frame is the border of the outside of the secure tagand defines the shape for scanning. The outer frame can also allow foradditional functionality and data storage. The inner frame can be anoptional border on the inside of a secure tag surrounding the centergraphic and may be used to separate glyphs from the center graphicvisually. In addition, inner frame can be used to assist withfingerprinting of the center graphic and can contain data.

Verification fragments can be a specific set of image data, and can beused for verification, comparison, and data storage. The verificationfragments can include multiple elements, such as the center graphic andother variable elements. Dots can be a point on a secure tag at whichwhite space becomes a visible shape or circle. Dots can store multipledata elements and define the tag and can be a starting point for forminga glyph. Splines and connectors can be a shape which joins or blends twoor more dots together and can allow for storage of larger amounts ofdata and stronger encrypting or encoding. An outer frame section is anidentified portion of the outer frame and can be used to store or repeatdata. An outer frame block can be a collection of breaks in the outerframe section and can be used to store data.

FIG. 24B depicts portions of a graphics file corresponding to theexemplary secure tag. The graphics file represents the exemplary securetag depicted in FIG. 24A. The graphics file is created during the taggeneration process, discussed in more detail below.

FIG. 25A depicts secure tag 2501, secure tag 2503, and secure tag 2505,each generated using the same style sheet but different data. Thestylesheet provides the tag template for the first step of secure taggeneration. In some embodiments, the stylesheet describes the class ofsecure tag. Following receipt of the stylesheet, the tag generationprocess receives a numeric seed, generates a secure tag layout, andreceives tag data, all before generating the final secure tag. Thestylesheet and numeric seed provide the locations of where data can beencoded. Data is then encoded as tag feature options. In FIG. 25A,secure tags 2501, 2503, and 2505 were all generated using the samestylesheet at the first step of the secure tag generation process, butdifferent data was provided before the final secure tag is generated.During the tag generation process, the tag generation systems can selectfrom the same first and second order locations based on the stylesheetfor secure tag 2501, 2503, and 2505, resulting in some similaritiesbetween the secure tags. After the layout for each exemplary secure tagwas been produced, the data was encoded into the tag feature options toproduce unique designs.

FIG. 25B depicts secure tag 2511, secure tag 2513, and secure tag 2515,each generated using different stylesheets but the same tag data. Asdiscussed above, the stylesheet is used at the first step in the taggeneration process. Secure tag 2511, 2513, and 2515 each began the taggeneration process with different first and second order locationsavailable. As with the previous examples, the data is encoded after thefirst and second order locations have been identified and selected.Since the data can be encoded into various tag features, and the taggeneration algorithm produces randomized designs, the same tag data canresult in significantly different final secure tag designs. Secure tag2511, 2513, and 2515 will all return the same data when scanned, buteach secure tag has a unique design.

FIGS. 26A through 26P depict details of the potential secure tagfeatures. Each Fig. is described in more detail below.

FIG. 26A depicts potential features of an exemplary secure tag. Each ofthe potential features can be used to encode data or for fingerprinting.The potential features comprise: the primary inner dots, the outerbreaks, the inner breaks, the inner edge blend, the outer horizontalblend, the inner frame, the owner ID, the secondary inner dots, theinner horizontal blend, the outer frame, the outer edge blend, the shortblend, the secondary outer dots, inner deformations, outer deformations,nodules, and the long blends. As discussed in more detail below, each ofthese potential features can be used to encode information. Additionalvariable assets can be used to embed additional data or encryptinformation. For example, the variable assets can comprise indents,hollows, colored shapes, gradients, connecting lines, and embeddedsymbols.

In some embodiments, the secure tags can contain additional features toauthenticate the product or store information. For example, backgroundpatterns or textures can be subtly or invisibly placed behind the tag.Similarly, in another example, adjacent patterns or textures can be usedto provide additional authentication or store information. In anotherexample, a Penrose Tile graphic pattern can be used to fingerprint ordistinguish a specific set of tags. In another example still, adjacentinformation, such as a unique word-set, can be placed within proximityto the tag. Such a design can be useful when human readable IDconfirmation is required, such as, for example, in the instance ofcustomer support.

FIG. 26B depicts an exemplary tag showing the position vector 2601.Position vector 2601 discloses the final positions of dots and shapes inan exemplary secure tag after the layout, and any displacement, of thedots and shapes has been determined. Position vector 2601 providesinformation on the location of each shape, dot, and tag feature in asecure tag.

FIG. 26C depicts an example of offset dot alignment. As disclosed above,the layout of an exemplary secure tag can be determined following thereceipt of a stylesheet describing the class of secure tags and thenumeric seed. Layout location 2603 depicts the location of an exemplarydot after the secure tag layout was generated. After receiving the tagdata, the secure tag is generated as tag feature options. Certain tagfeature options involve alignment and positioning of dots and shapes.Displaced location 2605 depicts the final location of the exemplary dotafter the tag data was encoded as tag feature options. The differencebetween layout location 2603 and displaced location 2605 can beindistinguishable to the human eye, making it difficult to copy such atag. The tag generation systems are designed to make the grids much moreunpredictable than a standard grid. In some embodiments, resolutions canallow for displaced location 2605 to be adjusted from layout location2603 based on grid offsets, line length, angles, etc. In suchembodiments, these adjustments may allow additional information to beencoded into the tag.

FIG. 26D depicts an exemplary secure tag showing a dot connectionfeature option 2608. Dot connection feature option 2608 can span anydistance within the outer frame of the secure tag to reach other dots.In some embodiments, dot connection feature option 2608 can beestablished between dots as a straight line. Dot connection featureoption 2608 cannot go through the center image to reach another dot.

FIG. 26E depicts dot connection feature option 2608 after data has beenencoded to create splines and edge connections. The shapes formedthrough the splines are called glyphs. As discussed above, glyphs can beindividual shapes or characters generated within the tag, and can bewhere most of the data, keys, ID, etc., are stored. In some embodiments,spline mathematics can be used to contain encrypted or encodedinformation. For example, elliptical curve cryptography can be used.Edge joins can also be used to store data.

FIGS. 26F and 26G depict dots and connectors as vectors for the sameexemplary tag layout. The secure tags are generated in vector format,which are defined in terms of 2D points with connecting lines andcurves. The vectors in these images show variable spline origins and thethicknesses of splines, or connectors, which can be used to encode data.FIG. 26F depicts a first connection width 2607 and FIG. 26G depicts asecond connection width 2609. First connection width 2607 is depicted asgreater than second connection width 2609. First connection width 2607and second connection width 2609 can be encoded with the same ordifferent data.

FIG. 26H depicts an exemplary tag showing an edge connection featureoption 2610. Edge connections can be formed from any potential edgeconnector feature option 2610. Edge connector feature option 2610provides the possibility of forming an edge connection between eitherthe inner or outer frame. Once edge connector feature option 2610 hasbeen selected to be turned into an edge connection, data can be encodedthe shape. For example, edge connections can be encoded with data usedto represent a manufacturer number.

FIGS. 26H and 261 depict dots and edge connections as vectors for thesame exemplary tag layout. The vectors in these images show variableedge join origins and thicknesses which can be used to encode data. FIG.26I depicts a first edge connection size 2611 and FIG. 26H depicts asecond edge connection size 2613. First edge connection size 2611 isdepicted as greater than second edge connection size 2613. Firstconnection size 2611 and second edge connection size 2613 can be encodedwith the same or different data.

FIG. 26J depicts various glyphs and potential spline features for anexemplary secure tag. Glyph sets can be generated using a multitude ofsplines and placed within a flexible coordinates system. In someembodiments, glyphs can be generated mathematically using a blendcurvature algorithm. In other embodiments, glyphs can be generated basedon predetermined shapes. For example, a customer may request a glyph bein a specific shape based on the customer's product or service. In thisexample, the glyph set can be distinctly identified and specificallydesigned. The spline of a glyph can vary in thickness based on, in part,the spline's starting position on each dot. In some embodiments, glyphscan be formed between any number of dots. The around a glyph can containdata as a microstructure or within an algorithmic method which storesdata in the path. FIG. 26J depicts only a limited number of possibleglyphs and spline features.

FIG. 26K depicts a first ring deformation 2615, a second ringdeformation 2617, and a third ring deformation 2619, all of which can beused to encode data. First ring deformation 2615 can comprise adeformation on the inner edge of the outer frame. Second ringdeformation 2617 can comprise a deformation on the outer edge of theinner frame. Third ring deformation 2619 can comprise a deformation onthe outer edge of the outer frame.

FIG. 26L depicts microdots 2621 and microprinting 2623, both of whichcan be used to encode data. Microprinting 2623 can comprise a second setof binary data, which can be interpreted in a similar way as the outerframe and outer frame break data. At lower resolutions, microprinting2623 may appear as noise. At higher resolutions, microprinting 2623 cancomprise information on the grid positions of fingerprint data. Theinformation can comprise an X or Y grid number and the offset value. Insome embodiments, the tag can be encrypted provided there is enoughmicroprinting 2623. In other embodiments, microprinting 2623 cancomprise different colors. In such embodiments, microprinting 2623 canstore additional information in the same physical space. In otherembodiments still, the outer frame can contain microprinting 2623 onboth the inner and outer side of the line. In such embodiments, bmicroprinting 2623 on both the inner and outer side can be colored. Inother embodiments, microprinting 2623 can store additional binary databy varying the height of its blocked sections. In such embodiments thebinary code may be difficult to copy due to its small physical size.Microprinting 2623 can be used for advanced data storage and may beaccessible by very high-resolution cameras.

FIG. 26M depicts the same location with three different gradients ofcolor filling: unfilled 2625, filled a different color 2627, and filledthe same color 2629. Data can be encoded into the secure tag based onthe gradient and color of a location.

FIG. 26N depicts an exemplary tag feature 2631 and the data encoded intotag feature 2631. Tag feature 2631 depicts two dots connected by aconnection, or two bits connected by a third bit, with an area of detail2633 containing encoded data. Area of detail 2633 can comprise a splinewrapping around the edge of one of the dots. Area of detail 2633 can beread by beginning at start location 2635 and moving in the readdirection 2637. Area of detail 2633 can have a first spatial frequencywith the potential to encode three bits of data (value A) and a secondspatial frequency with the potential to encode 18 bits of data. Value Aset bit 2639 represents a 1 at the first spatial frequency and value Aunset bit 2641 represents a 0 at the first spatial frequency. Value Bunset B represents a 0 at the second spatial frequency and value set bit2645 represents a 1 at the second spatial frequency. Following the threeand 18 bits of encoded data, there is a repeat 2647.

FIGS. 27A through 27K depict the generation of an exemplary secure tag.Each figure is described in more detail below.

FIG. 27A depicts an exemplary grid used as a base in the process ofsecure tag generation. The grid comprises the potential first orderlocations 2701 and the potential second order locations 2703, which arethe bases for a glyph 2705. The formation of the grid is the first stagein the generation of secure tags and is done using specific algorithmsto create randomized designs. Potential first order locations 2701 andpotential second order locations 2703 dictate the final position andshape of glyph 2705. Glyph 2705 can span across any number of potentialfirst order locations 2701 and potential second order locations 2703.

FIG. 27B depicts selected first order location 2707 and unselected firstorder location 2709. At this stage in the tag generation process,potential first order locations 2701 are identified and selected. Thetag generation algorithm randomly selects a predetermined number ofpotential first order locations 2701. Selected first order location 2707will then be further used in the process of secure tag generation, whileunselected first order location 2709 is no longer part of the taggeneration process. In FIG. 27B, there are 26 selected first orderlocations 2707, selected at random, resulting in one ofseventy-two-thousand billion possible combinations.

FIG. 27C depicts the identification of a potential second order location2711. Potential second order location 2711 can comprise any second orderlocation located between selected first order locations 2707. In FIG.27C, there are 40 potential second order locations 2711 identified,resulting in the possibility of approximately one trillionsub-combinations.

FIG. 27D depicts unselected second order locations 2713 and selectedsecond order locations 2715. Selected second order locations 2715 arechosen from the potential second order locations 2711 identifiedpreviously. Selected second order locations 2715 can be chosen by thesystem based on a tag generation algorithm, and can be used to connectselected first order location 2707 to a separate selected first orderlocation 2707.

FIG. 27E depicts the secondary grid showing selected first orderlocations 2707 and selected second order locations 2715 immediatelyprior to and immediately after processing through the visualizationengine in the process of secure tag generation. The secondary gridcomprising selected first order locations 2707 and selected second orderlocations 2715, or the final secondary grid, can be passed on to thevisualization engine for further secure tag generation. Certain selectedfirst order locations 2707 are bridged by selected second orderlocations 2715. Selected second order locations 2715 are used to createconnections between selected first order locations 2707, resulting in aglyph. In some embodiments, the shapes of the curves on each glyph cancontain data. Additional code variations can be introduced into thestructures based on the shape build. Selected first order locations 2707that were not bridged by a selected second order location 2716 canremain as individual dots. In some embodiments, the dots can containdata.

FIGS. 27F through 27I depict different possible glyphs 2717 based on theselected first order location 2719 and selected second order location2721. In each figure, the tag generation algorithm may have identifiedany of the second order locations as potential connectors. Each figuredepicts a different possible glyph 2717 based on the selected secondorder locations 2721. FIGS. 27F and 27H both depict glyphs 2715 whereselected first order location 2719 is connected to at least one, but nomore than three, selected first order locations 2719, however FIG. 27Hdepicts selected first order locations 2719 connected in series. FIG.27G depicts glyph 2717 in which selected first order location 2719 isconnected to every selected first order location 2719. In this figure,selected second order locations 2721 can cause selected first orderlocations 2719 to form into a larger circle or dot. FIG. 27J depictsglyph 2717 where only three of five selected first order locations 2719are connected by selected second order locations 2721. In this figure,the final tag would include glyph 2717 and two individual dots. Eachglyph 2717 in FIGS. 27F through 27I can have data encoded into it.

FIG. 27J depicts an exemplary secure tag with the orientationinformation 2723. Orientation information 2723 can be placed in thecenter of the secure tag as the center image. Orientation information2723 can be used in the tag identification process to allow the opticalreader to properly identify the correct tag. In some embodiments,orientation information can comprises a logo, brand, or any otheridentifier.

FIGS. 28A through 28N depict exemplary secure tags. Each tag isdescribed in more detail below.

FIG. 28A depicts secure tags in various form factors. The outer frame ofa secure tag can be any shape. For example, a customer may request a tagdesigned to match a specific image. In this example, the desired imagecan act as both a secure tag and a trademark. In some embodiments, thesecure tag may not have a center image. In these embodiments, tagorientation can be achieved based on the design of the outer frame ofthe secure tag. In other embodiments, the center image can be a customimage provided by the customer. FIG. 28A depicts examples of possibleform factors, such as the shape of Australia and the Nike™ Swoosh.

FIG. 28B depicts a series of exemplary tags. Each of these tags have asymmetrical design and a series of dots without connectors or splines.In the normal secure tag generation process, the likelihood of asymmetrical secure tag being created is very low. However, the securetag generation process can also be controlled to create aestheticallyappealing tags, such as the examples provided in FIG. 28B. In theseexample, the designs are chosen, and the data can be encoded into thechosen design.

FIG. 28C depicts examples of secure tags integrated with barcodes. Insome embodiments, the secure tag can be read together with the barcode.In other embodiments, the secure tag and the barcode can be readseparately. Integrating the secure tag with a barcode can providebackward compatibility for SKU based barcode readers, as well as aunique identity. The secure tag can contain matching data relating tothe barcode. This can prevent fraudulent use or misuse of both thebarcode and the secure tag.

FIG. 28D depicts an exemplary secure tag. In some embodiments, theexemplary secure tag can have a center image overlaid on a colored orblack background. In other embodiments, the secure tag may not have aninner frame. In other embodiments still, the secure tag can have aninner frame that is a different shape from the outer frame.

FIG. 28E depicts an exemplary secure tag with a symmetrical pattern andLaava center image.

FIG. 28F depicts an exemplary secure tag with a symmetrical pattern andLaava center image.

FIG. 28G depicts an exemplary square secure tag with a symmetricalpattern and Laava center image.

FIG. 28H depicts an exemplary square secure tag with a symmetricalpattern and Laava center image.

FIG. 28I depicts an exemplary secure tag with no center image andwithout connectors between the dots.

FIG. 28J depicts an exemplary square secure tag with a Laava centerimage and no connectors between the dots.

FIG. 28K depicts an exemplary secure tag with a Laava center image andconnectors of narrow thickness.

FIG. 28L depicts an exemplary square secure tag with a Laava centerimage and connectors of narrow thickness.

FIG. 28M depicts an exemplary secure tag with a symmetrical pattern andLaava center image.

FIG. 28N depicts an exemplary square secure tag with a symmetricalpattern and Laava center image.

FIG. 29A depicts an exemplary user interface for managing secure tags.In FIG. 29A, the dashboard tab displays secure tag activity over a24-hour period. In some embodiments, the dashboard of the user interfacecan provide information comprising an overview of all secure tags for asingle customer, the number secure tags by location, associated userinformation, and associated reseller information. The user interface hasvarious tabs available for user interaction, these tabs can comprise:tag management, tag design, tag printing, reporting, statistics, accountinformation, API setup, user management, and the like.

FIG. 29B depicts an exemplary user interface for requesting a secure tagdesign. The tab design user interface can provide a user with a varietyof options for creating a secure tag. For example, the user has theoption of selecting whether it wants nested secure tags and if it wantsto pair secure tags. Other potential customizable options comprise: thecustomer center logo, encryption ID, custom DB sync, whether the securetag is user readable, whether or not to obfuscate the ID(s), readabilityoffline, whether or not to have a location embed, reseller access foreach ID, whether or not to use the Laava blockchain, and whether thesecure tags are killable. In FIG. 30B, the user has selected 4 layers ofnested tags, with the top layers being paired. Each layer of secure tagcan contain different information. In this example, the user has theability to control what information each layer can provide and what keysare required to access each secure tag.

In some embodiments, system 100 (e.g., authentication server 115 orprivate system 120) can be configured to identify one or more securetags as unauthorized copies of an authorized secure tag. System 100 canbe configured to index information about these unauthorized copies andgenerate a report containing information about the unauthorized copies.For example, system 100 can be configured to generate a heatmapdisplayable by the user interface of FIGS. 29A and 29B showing where andhow frequently unauthorized copies of the secure tag have been detected.

Exemplary Usage Cases

Secure tags can be used to assist both customers and retailers in thesale and purchase of products such as alcohol. Before purchasing, thecustomer can verify the authenticity of alcohol, such as, for example, awine bottle, and receive information about the wine bottle including:previous owners, the retailer, the manufacturer, the manufacture date,ingredients, use-by instructions, safety warnings, and any otherrelevant information. Before selling, the retailer can scan the tag toreview information, which can include: confirming arrival withlogistics, viewing retailer offers from the vineyard, viewing themanufacturer and manufacture data, viewing the stock of the wine bottle,viewing ingredients, viewing customer selling notes, determining storeposition, setting-up return policy, setting-up an offer ‘per bottle,’setting-up a lucky win to occur upon purchase of a bottle, viewingsafety warnings, viewing use-by instructions, and carrying out any otherrelevant action. Upon checkout, the retailer can transfer ownership ofthe wine bottle to the customer, and the customer can use the secure tagto take advantage of additional benefit (e.g., re-order, review, etc.).In some embodiments, the wine bottle can have a second secure tag placeon the inside of the wine bottle cap for additional authenticity afteropening the bottle, which can be paired with the secure tag on theoutside of the wine bottle.

Secure tags can be used to authenticate webpages, emails, or otherdigital products. For example, a website can have a unique secure tagfor every page, served as a digital token that is used to authenticatethe webpage itself. The secure tag can change after a predeterminedperiod of time and the tag can also be killed once displayed or timedout. A user can authenticate a webpage, email, etc., with a browser thatscans the secure tag itself using a secure plugin, or through the use ofan optical reading device such as a smartphone. The secure tag can beused to verify the serve date and time, website or email provider,webpage or email security information, or any other information uniqueto the webpage or email.

Multiple forms of membership can be managed within a single secured tagowned by a customer and paired with, or shared by, allowed business. Thecustomer can have various forms of ID and/or memberships, such as, forexample, a health insurance card, a student ID, a fitness membershipcard, a travel membership card, etc., encoded into a single personalphysical or digital secure tag. Each business associated with an encodedform of ID and/or membership can be given access to check the secure tagfor only the specific ID and/or membership it is associated with. Acustomer can therefore present the same single secure tag in eachsituation instead of carrying around multiple forms of ID.

Secure tags can be used to create authenticated protected personal IDsfor both online and offline use. The user can take their official ID(credit card, passport, etc.) to the relevant authority (a bank,passport office, etc.) where the ID is verified, and the confirmed IDsupplier is connected to the user's personal ID blockchain. Theauthenticated protected personal IDs can be read by the appropriateauthorities and can be used in situations such as: elections and voting,push bank statements, secure messaging, secure email, building entry,memberships, proof of age cards, or any other application that requirespersonal identification. The protected identity is owned by the user,but the relationship is paired with the formal ID issuers which meansthe formal ID issuer can revoke the ID.

Businesses can create authenticated personal IDs for customers usingsecure tags. A business, such as, for example, a bank, can provide acustomer with both a personal ID associated with that user's account anda reader with specific access allowances (e.g., through an app specificto that business). A physical or digital document with specificinformation for that customer can contain a tag that can only be read bythe user with the correct personal ID associated with that document. Ifthe user has the correct personal ID associated with the documents,access corresponding to the level allowed by the personal ID will begranted. Additionally, the authenticated personal ID can be used toverify the customer at, for example, an Automated Teller Machine orbank. A business can receive notification whenever a document is scannedby a user without the correct personal ID or when a personal ID cannotbe used to verify a customer.

Secure tags can be used to authenticate art and other valuable goods andallow the artist to potentially earn revenue from ongoing/future sales.A secure tag can be attached the original artwork and paired with both asecond secure tag representing ownership and a third secure tag retainedby the artist. Both the secure tag on the artwork and second secure tagrepresenting ownership can contain information about the art itself, thecurrent owner, the artist, and the art dealer, and both can be requiredfor a sale and transfer of ownership. The artist can retain his or herpaired tag and can receive notifications when ownership is transferred,which can potentially include a percentage of revenue from the ownershiptransfer. In some embodiments, art can be verified with proximityfingerprinting using, for example, the wood grain pattern on the artframe in proximity to the tag. The proximity fingerprint is invisible toa customer, and if the tag is moved it may not be validated and theauthenticity may not be proven.

Other valuable products with very specific requirements, such as babyformula, can be authenticated using secure tags. Baby formula can haveboth an external secure tag and internal secure tag. The external tagcan contain important information such as: use-by instructions,manufacturer ID, market information, safety information, or any otherrelevant information, which can be scanned by all potential customers.Once the baby formula has been purchased and the ownership transferred,the now-owner has access to the information contained on the internalsecure tag. The internal secure tag will typically be paired to thestock or retailer ID through the pallet or shipment ID, giving thecustomer access to full supply chain information about the specific babyformula purchased.

Secure tags can be used to track lost items and return them to theirowners. Users can print their own secure tags or buy secure tags invarious form factors containing information about the owner. The securetags can be paired to a ‘lost and found’ account, via app or anotherprogram, and attached to an item. The owner of the tag is sent anotification with information about a scan, such as time and location,anytime the tag is scanned. The owner can choose whether to disclosecertain information in the event that someone else scans the tag,including information on how to contact the owner or return the item.

Warranty and insurance registration can be handled through the use ofsecure tags. A customer can authenticate a vehicle through theblockchain and then purchase the vehicle. The ownership is thentransferred to the customer, the customer is registered for a warranty,and the vehicle is officially registered to the customer in theappropriate databases (e.g., the DMV). The customer's insurance companycan match the customers ID and vehicle data for the recently purchasedvehicle, and if the customer ID is confirmed, the insurance can beissued.

Secure tags can be used to authenticate casino chips or other gamblingchips. Each chip is given a secure tag which can be paired to anembedded RFID ID in the chip. The combination of the secure tag and RFIDcan be managed in the blockchain, allowing the casino to track each chipin various ways. Users can also check the secure tags with their ownreading devices to ensure they have legitimate chips in their hands. Inaddition, the unique tag on the chip can serve as a visual deterrent forcreating spoofed tags.

Lotteries and other promotions can be managed through the use of securetags. A company can create tickets on the blockchain. The customer canthen purchase digital or physical tickets associated with the tickets onthe blockchain and reveal the tags on the tickets. The tickets can thenbe scanned, the customer can receive information regarding whether theywon or lost, and the result of the win or loss can be updated in theblockchain. In some embodiments, the ticket can be a tag that can bescanned to reveal basic information about the lottery company, retailer,etc. before purchase, and has a portion that can be scratched away toreveal a new tag that can be scanned by the now-owner to reveal theresult of either a win or loss.

Secure tags can be used for serving promotional adverts to specificcustomers. A customer can be served a promotional advert online thatcontains a specific tag unique to that customer. The customer can thenvisit the website associated with the advert and print coupons with asecure tag that has a specific ID and promotional data embedded into it.The customer can then visit the physical store and redeem the coupon,and the physical sale will then be tied to the digital cookie associatedwith the original advert.

Secure tags can be used for general promotional activities as well. Forexample, a car company can create a custom tag to be advertised publiclythat is used for a giveaway of a vehicle or to book a test drive. Thesecure tag can be open to the public and scannable by anyone. The securetag can animate according to a set formula so that it contains thelocation, time, and other data necessary of every view so that eachcustomer scan is unique. Each scan is uploaded to the blockchain, andthe company can have set promotional rules in place to award certainscans.

Physical crypto-currency can be authenticated using secure tags. A usercan load a cryptocurrency, such as, for example, ‘bitcoin,’ onto aphysical note with a secure tag printed on it. The secure tag can betied to a specific owner by way of access key, or open to the public tobe available to anyone offline. The secure tag can be validated at acheckout station, and the information about the transaction can beuploaded to the blockchain. In some embodiments, the secure tag can bepaired with another form of identification, such as RFID.

Secure tags can be used to control access to confidential items, such asthose used by the military or other non-public organizations. A privatesecure tag can be created, with the information stored on a privateblockchain. Designated personnel can be granted different access levelsfor scanning and reading the tagged items. If the item is scanned by anon-authorized reader, the data about where, when, and who scanned thetag is sent back to the private blockchain. In the event that the itemis scanned by a non-authorized reader, an alarm or warning directedtowards the secure tag owner may be triggered.

Meat and livestock, or other organic products, can be validated usingsecure tags by way of proximity fingerprinting. For example, beef“texture” in proximity to a secure tag can be fingerprinted togetherwith the secure tag at the point of packaging. The secure tag canprovide information about the cut of the beef, the date of packaging,transportation, and any other information important to buying perishablegoods. The secure tag and texture must be scanned together to fullyauthenticate the product to an end user, and if the tag has been movedthe proximity fingerprinting will not validate the product as authentic.

Secure tags can be used to confirm and validate safety and inspectionreports. When a unit or device requiring inspection is being installed,the installer can create a secure tag for the whole unit, or individualparts, containing information about the installation and manufacturer.The tags can be scanned and updated during inspections and safetyevaluations by additional users with appropriate access. When a new userscans the secure tag, he can to receive information on the inspectionhistory, the replacement history, the users who have scanned the tagpreviously and the dates/times at which they did so, the warrantyinformation, who the part was supplied by, and any other informationdeemed relevant. A log of inspections can therefore be kept on theblockchain.

Secure tags can be used to authenticate medicine and prescriptions. Forexample, doctors can have a unique secure tag on every prescription pageto prevent stolen prescriptions. The doctor can scan a prescription whenshe is writing it down and give permission for a specific patient to usethat prescription. When a pharmacy is filling the prescription, it cancheck the secure tag to determine if the doctor has actually givensomeone permission to use the specific prescription page, and also ifthe proper medicine is being prescribed to the correct person. Inanother example, secure tags can be printed on medication packaging,blister packs, or even on the individual pills themselves. In theseexamples, the medicine is matched with a patient, thus providing thedoctor, nurse, or other approved medical provider with access to patientinformation when scanned. This can provide evidence that medicine isbeing taken as prescribed and help ensure that the correct person isbeing provided with the proper medication.

Taxes and expense reporting can be tracked and verified through the useof secure tags. A company can provide its employees with a specificreader for scanning receipts and invoices. Receipts and invoices can beprinted with a unique tag, which can then be scanned by the readerspecifically designed for this activity. The reader can be designed togive users the ability to only scan certain secure tags on receipts orinvoices. The scanned expenses are then stored in the blockchain and canbe accessed in the future by the company or tax agencies to verifyexpenses and costs.

Users can create customized secure tags in numerous configurations. Forexample, certain brands may wish to have tags designed in the same shapeas their trademarks. This can allow for different packaging options anddifferent levels of security. In some embodiments, the center logo canbe customized while keeping the shape of the secure tag fixed to astandard shape.

Grey products can be eliminated from the supply line by using securetags. Authentic parts for specific equipment and vehicles can be given asecure tag containing information about the manufacturer and about whattype of equipment or vehicle the part should be used in. Engineers ortechnicians inspecting and replacing parts in the future can scan theparts to determine whether the part is authentic and is being used inthe correct manner.

Secure tags can be used to identify and report counterfeit or fakeproducts. A customer can scan a secure tag on a product to check themanufacturer, licensed country of sale, approved retailer, etc. If anyof this information is off, the customer can report the item as fake,including information about the location and time of the scan. Thereport will be uploaded to the blockchain and the owner of the tag willbe notified. In addition, since each secure tag is unique, if the sametag reports being scanned more than once in multiple locations, theowner of the tag will automatically be notified of the discrepancy.

A company can limit the copying of products, such as, for example,shoes, using secure tags. In this example, the copier has gained accessto a single shoe produced by the company with a legitimate tag and madecopies of the legitimate tag to place on fake shoes. The copier thensells the shoes to numerous buyers, claiming the products are genuine.Only the first scan will result in a genuine product beingauthenticated, and the scan must be before the shoes are sold. If thetag reveals that this is not the first time the same tag has beenscanned, the tag is reported as counterfeit and the customer is savedfrom buying a counterfeit product. In the event that a legitimatecustomer is not the first to scan the shoe, the customer canauthenticate the product with the company itself.

The disclosed embodiments may be implemented in a system, a method,and/or a computer program product. The computer program product mayinclude a computer readable storage medium (or media) having computerreadable program instructions thereon for causing a processor to carryout aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general-purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowcharts and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowcharts or block diagrams may represent a software program, segment,or portion of code, which comprises one or more executable instructionsfor implementing the specified logical function(s). It should also benoted that, in some alternative implementations, the functions noted inthe block may occur out of the order noted in the figures. For example,two blocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

It is expected that during the life of a patent maturing from thisapplication many relevant virtualization platforms, virtualizationplatform environments, trusted cloud platform resources, cloud-basedassets, protocols, communication networks, security tokens andauthentication credentials will be developed, and the scope of theseterms is intended to include all such new technologies a priori.

It is appreciated that certain features of the invention, which are, forclarity, described in the context of separate embodiments, may also beprovided in combination in a single embodiment. Conversely, variousfeatures of the invention, which are, for brevity, described in thecontext of a single embodiment, may also be provided separately or inany suitable subcombination or as suitable in any other describedembodiment of the invention. Certain features described in the contextof various embodiments are not to be considered essential features ofthose embodiments, unless the embodiment is inoperative without thoseelements.

Although the invention has been described in conjunction with specificembodiments thereof, it is evident that many alternatives, modificationsand variations will be apparent to those skilled in the art.Accordingly, it is intended to embrace all such alternatives,modifications and variations that fall within the spirit and broad scopeof the appended claims.

1.-202. (canceled)
 203. A secure tag system, comprising: at least oneprocessor; and at least one non-transitory memory containinginstructions that, when executed by the at least one processor, causethe secure tag system to perform operations comprising: receiving arequest from a first user for a digital product; generating a firstsecure tag associated with the digital product and the first user,generation including selection of first tag features for inclusion inthe secure tag and selection of second tag features, the second tagfeatures being the presence of connections between first tag features;providing the first secure tag to the first user; and providing thedigital product.
 204. The system of claim 203, wherein: the first tagfeatures include at least one of a rim, rim deformation, or dot. 205.The system of claim 203, wherein: generating the secure tag furtherincludes selecting connection widths for the connections between thefirst tag features.
 206. The system of claim 203, wherein: theoperations further comprise: receiving a second secure tag from thefirst user; and comparing the second secure tag to the first secure tag;and the digital product is provided to the first user based on thecomparison.
 207. The system of claim 206, wherein: the comparing thefirst secure tag and the second secure tag comprises comparing aperceptual hash of the first secure tag and a perceptual hash of thesecond secure tag.
 208. The system of claim 203, wherein: the secondsecure tag is a mutable tag.
 209. The system of claim 203, wherein: thefirst secure tag is embedded into the digital product or displayedtogether with the digital product.
 210. The system of claim 203,wherein: the operations further comprise: receiving a transactionrequest from the first user; generating a second secure tag associatedwith the digital product and a second user, the second secure tag pairedwith the first secure tag; and providing the second secure tag to thesecond user.
 211. A secure tag method, comprising: receiving a requestfrom a first user for a digital product; generating a first secure tagassociated with the digital product and the first user, generationincluding selection of first tag features for inclusion in the securetag and selection of second tag features, the second tag features beingthe presence of connections between first tag features; providing thefirst secure tag to the first user; and providing the digital product.212. The method of claim 211, wherein: the first tag features include atleast one of a rim, rim deformation, or dot.
 213. The method of claim211, wherein: generating the secure tag further includes selectingconnection widths for the connections between the first tag features.214. The method of claim 211, wherein: the method further comprises:receiving a second secure tag from the first user; and comparing thesecond secure tag to the first secure tag; and the digital product isprovided to the first user based on the comparison.
 215. The method ofclaim 214, wherein: comparing the first secure tag and the second securetag comprises comparing a perceptual hash of the first secure tag and aperceptual hash of the second secure tag.
 216. The method of claim 211,wherein: the second secure tag is a mutable tag.
 217. The method ofclaim 211, wherein: the first secure tag is embedded into the digitalproduct or displayed together with the digital product.
 218. The methodof claim 211, wherein: the method further comprises: receiving atransaction request from the first user; generating a second secure tagassociated with the digital product and a second user, the second securetag paired with the first secure tag; and providing the second securetag to the second user.
 219. A non-transitory, computer-readable mediumcontaining instructions that, when executed by at least one processor ofa system, cause the system to perform operations comprising: receiving arequest from a first user for a digital product; generating a firstsecure tag associated with the digital product and the first user,generation including: selection of first tag features for inclusion inthe secure tag, the first tag features include at least one of a rim,rim deformation, or dot; and selection of second tag features forinclusion in the secure tag, the second tag features being the presenceof connections between first tag features; providing the first securetag to the first user; receiving a second secure tag from the firstuser; comparing the second secure tag to the first secure tag; and basedon the comparison, providing the digital product to the first user. 220.The non-transitory, computer-readable medium of claim 219, wherein:generating the secure tag further includes selecting connection widthsfor the connections between the first tag features.
 221. Thenon-transitory, computer-readable medium of claim 219, wherein:comparing the first secure tag and the second secure tag comprisescomparing a perceptual hash of the first secure tag and a perceptualhash of the second secure tag.
 222. The non-transitory,computer-readable medium of claim 219, wherein: the first secure tag ispresented to a first device of the first user; and the second secure tagis received from a second device of the first user.