Product authentication system

ABSTRACT

A method and system for authenticating a variety of consumer products is provided. The system includes a plurality of near field communication (NFC) tags configured for coupling to a variety of consumer products, the tags programmed to provide identifying data associated with a single consumer product to an NFC-capable mobile computing device, the NFC having a structure that detects opening of the consumer product, a central database for storing said data, a server communicably connected to a communications network and configured to access the database, and a mobile application executing on a mobile computing device, configured to read said identifying data from the NFC tag and communicate said identifying data to the server.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims priority to provisional patentapplication 63/018,577 filed May 1, 2020 and titled “ProductAuthentication System.” The subject matter of provisional patentapplication 63/018,577 is hereby incorporated by reference in itsentirety.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not applicable.

INCORPORATION BY REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC

Not applicable.

TECHNICAL FIELD

Not applicable.

BACKGROUND

The authenticity of consumer products has consistently been of theutmost importance to consumers and vendors alike. In the technologicalage, verifying the authenticity of products has become both increasinglyimportant and challenging as the methods of counterfeiting have improvedand the distance between manufacturers and consumers has grown furtherapart. Studies by the Organization for Economic Co-operation andDevelopment estimated that in 2019 the global market for counterfeitgoods reached $501,000,000,000 (501 Billion USD). This number is up 0.8%from the previous year and is growing at an unprecedented rate.According to the Commission on the Theft of American IntellectuallyProperty, this results in estimated lost revenue of anywhere from 255billion dollars to 600 billion dollars annually for US companies andindustries alone.

There are currently various methods of authenticating a product orshowing its authenticity to the end user. These exist largely in marketareas that battle higher levels of counterfeiting, with the fashion orcigar industries as prime examples. In many cases, vendors or consumerslooking to verify the authenticity of a pair of shoes or a handbagresort to close and tedious examination of the details of the product.This includes searching for specific types of stitching, semi-concealedmarks, or comparing the tags inside or on the product with the tags onthe packaging when available. Carrying out these examinations leavevendors and consumers susceptible to human error in investigation andoften do not guarantee the authenticity of the product, as manycounterfeiters are privy to the steps taken to verify authenticity andconsider them when replicating a product. In addition, this may resultin increased labor costs to vendors and lower profit margins.

Some companies use other methods or systems for facilitatingauthentication, the existing systems and methods taking various formsand typically being tightly catered to the specific type of product themanufacturer or vendor is looking to sell. For example, manylimited-release shoes can be found to include zip-tie authenticatorsthat generally contain information about the product like the productname, its source, and the release batch printed on the tag of thezip-tie. Other industries, such as the cigar industry, regulate theauthenticity of its products by publishing guides to help the end-userverify the authenticity or including Warranty Seals which require closeexamination and may require the use of tools, like a magnifying glass.As was the case with the previously mentioned authentication processes,tags and seals can similarly be replicated by counterfeiters. Inaddition, it places an unreasonable burden on the consumer or vendor whomay not be knowledgeable or skilled enough to detect the minute detailsthat the original manufacturer may have included to convey authenticity.

While many of these methods of authentication prove successful at times,they tend to only provide confirmation of the product's source andintended nature, quality, or presentation. They are less successful inconveying whether a product or its packaging has been tampered with,whether the product has been opened and/or used, pertinent product andwarranty information, or information surrounding the product such aspotential uses, similar or complimentary products, and other informationthat the consumer may find important or beneficial.

Due to the shortfalls of the currently existing methods and systems ofproduct authentication, a need exists for a system and method for usersto verify the authenticity of a product quickly and easily they havepurchased or are looking to purchase. Specifically, a need exists for acentralized system and method of product authentication, package qualityverification, and product related content delivery.

SUMMARY

A method and system for authenticating a variety of consumer products isprovided. This Summary is provided to introduce a selection of disclosedconcepts in a simplified form that are further described below in theDetailed Description including the drawings provided. This Summary isnot intended to identify key features or essential features of theclaimed subject matter. Nor is this Summary intended to be used to limitthe claim subject matter's scope.

In one embodiment, system for facilitating the authentication ofconsumer products includes a near field communication (NFC) tagconfigured for coupling to the consumer product, wherein said NFC tag isprogrammed to provide the following identifying data to an NFC-capablemobile computing device when said NFC tag is tapped or scanned: a uniqueproduct identifier, a URL containing an encrypted packet that uniquelyidentifies said NFC tag, and a counter value that represents a number oftimes said NFC tag has been tapped or scanned, the NFC tag comprising amain portion adhered to a stationary portion of the cigar box, and alead portion adhered to a movable portion of the cigar box, wherein whenthe movable portion is moved, the lead portion is detached from the mainportion, and the NFC tag is configured to record that the cigar box hasbeen opened, a database for storing data about a plurality of consumerproducts, including a product name, a unique product identifier, acounter value, a hash algorithm and a unique identifier, wherein saiddatabase is communicatively coupled to a communications network, amobile application executing on an NFC-capable mobile computing devicecommunicatively coupled to the communications network, wherein saidmobile application is configured to read identifying data from the NFCtag and transmit said identifying data to a server via thecommunications network, and the server communicably coupled with thecommunications network, wherein the server is configured for: a)receiving said identifying data from the mobile application, b)accessing a record in the database that corresponds to the uniqueproduct identifier, c) comparing the hash in the identifying data to ahash algorithm in the record, and comparing the counter value of theidentifying data to a counter value in the record, and d) if the hash inthe identifying data matches the hash algorithm in the record, and ifthe counter value of the identifying data matches the counter value inthe record, then transmitting an approval of authentication to themobile application.

In another embodiment, a method for facilitating the authentication ofconsumer products includes coupling a near field communication (NFC) tagto the consumer product, wherein said NFC tag is programmed to providethe following identifying data to an NFC-capable mobile computing devicewhen said NFC tag is tapped or scanned: a unique product identifier, aURL containing an encrypted packet that uniquely identifies said NFCtag, and a counter value that represents a number of times said NFC taghas been tapped or scanned, the NFC tag comprising a main portionadhered to a stationary portion of the cigar box, and a lead portionadhered to a movable portion of the cigar box, wherein when the movableportion is moved, the lead portion is detached from the main portion,and the NFC tag is configured to record that the cigar box has beenopened, storing in a database data about a plurality of consumerproducts, including a product name, a unique product identifier, acounter value, a hash algorithm and a unique identifier, wherein saiddatabase is communicatively coupled to a communications network,executing a mobile application on an NFC-capable mobile computing devicecommunicatively coupled to the communications network, wherein saidmobile application is configured to read identifying data from the NFCtag and transmit said identifying data to a server via thecommunications network, receiving, on the server communicably coupledwith the communications network, said identifying data from the mobileapplication, accessing, by the server, a record in the database thatcorresponds to the unique product identifier, comparing, by the server,the hash in the identifying data to a hash algorithm in the record, andcomparing the counter value of the identifying data to a counter valuein the record, and if the hash in the identifying data matches the hashalgorithm in the record, and if the counter value of the identifyingdata matches the counter value in the record, then transmitting, by theserver, an approval of authentication to the mobile application.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this disclosure, illustrate various example embodiments. In thedrawings:

FIG. 1 is a block diagram of an operating environment that supports aprocess for facilitating the authentication of, and interaction with, avariety of consumer products, according to an example embodiment;

FIG. 2A is a diagram showing the data flow of the process forfacilitating the authentication of and interaction with a variety ofconsumer products, according to an example embodiment;

FIG. 2B is a diagram showing the data flow of a process for facilitatingthe dissemination of commercial content about a variety of consumerproducts, according to an example embodiment;

FIG. 2C is a diagram showing the data flow of the process forfacilitating the administration of a consumer loyalty program for avariety of consumer products, according to an example embodiment;

FIG. 3A is a flow chart of a method for identifying a product forauthentication and returning the related results to the reader,according to an example embodiment;

FIG. 3B is a flow chart of a method for disseminating commercial contentabout a variety of consumer products, according to an exampleembodiment;

FIG. 3C is a flow chart of a method for administering a consumer loyaltyprogram for a variety of consumer products, according to an exampleembodiment;

FIG. 4 is a drawing depicting the process of transmitting data from atag on a consumer product to a consumer mobile device, according to anexample embodiment;

FIG. 5A is a diagram showing the interaction between a tag on a consumerproduct, a consumer mobile device, and a server during the process ofauthentication of and interaction with a variety of consumer products,according to an example embodiment;

FIG. 5B is a diagram showing the interaction between a tag on a consumerproduct, a consumer mobile device, and a server during the process forfacilitating the dissemination of commercial content about a variety ofconsumer products, according to an example embodiment;

FIG. 5C is a diagram showing the interaction between a tag on a consumerproduct, a consumer mobile device, and a server during the process forfacilitating the administration of a consumer loyalty program for avariety of consumer products, according to an example embodiment;

FIG. 6 is a block diagram of a system including a computing device,according to an example embodiment; and

FIG. 7 presents two drawings depicting a tag on a consumer product,according to an example embodiment.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawings.Wherever possible, the same reference numbers are used in the drawingsand the following description to refer to the same or similar elements.While embodiments may be described, modifications, adaptations, andother implementations are possible. For example, substitutions,additions, or modifications may be made to the elements illustrated inthe drawings, and the methods described herein may be modified bysubstituting, reordering, or adding stages to the disclosed methods.Accordingly, the following detailed description does not limit theclaimed subject matter. Instead, the proper scope of the claimed subjectmatter is defined by the appended claims.

The claimed subject matter improves over the prior art by providing asimple, cost-effective and user-friendly method for authenticatingconsumer products and providing end-users with relevant product andcommercial content. The claimed subject matter reduces or eliminates therisk of purchasing or selling counterfeit products since it quickly andconveniently provides a user with information regarding the authenticityof the product at question, as well as information about its use,source, and other relevant information. Also, the claimed subject matterreduces the amount of time and money a consumer or business may spendinspecting products for authenticity by eliminating the need for manualinspection and authentication. In addition, the claimed subject matterhelps the consumer access information about their product includingwarranty information, exclusive commercial content, interactive content,and other content relevant to the product and consumer. Therefore, theclaimed subject matter reduces or eliminates the burden placed onconsumers, vendors, and manufacturers looking to verify or convey theauthenticity of a consumer product.

FIG. 1 is a block diagram of an operating environment 100 that supportsa method and system for verifying the authenticity of a consumer producton a server communicatively coupled with a communications network 106.The server 102 or device 120 may be communicatively coupled with acommunications network 106, according to an example embodiment. Theenvironment 100 may comprise mobile computing device 120, which maycommunicate with server 102 via a communications network 106. Mobilecomputing device 120 may comprise a cellular/mobile telephone, smartphone, tablet computer, laptop computer, handheld computer, desktopcomputer, wearable computer, or the like. The mobile computing device120 may be connected either wirelessly or in a wired or fiber optic formto the communications network 106. Communications network 106 may be apacket switched network, such as the Internet, or any local areanetwork, wide area network, enterprise private network, cellularnetwork, phone network, mobile communications network, or anycombination of the above.

FIG. 1 also shows an identification device or tag 121 placed on, in, oraround consumer product 111. Tag 121 may be a near field communication(NFC) tag that emits radio frequency signals that comport with theISO/IEC 18092 and ECMA 340 communications protocol standards. Tag 121may also include encryption and authentication standards such as thosedescribed in ISO/IEC 18000, 29167 and ISO/IEC 20248. The tag 121 mayalso store additional data about a consumer product, such as any of thedata in the consumer product's record, described in further detailbelow. In generally, the tag 121 may be any radio frequency device thatis configured to transmit a radio frequency signal that is readable overshort distances. The tag 121 may also be configured for attachment toproduct packaging in such a way that the tag is able to detect if theproduct packaging has been opened. For example, one or more conductiveterminals may be disposed on the surface of the tag and the surface ofthe tag may be applied (such as by adhesive) to the product packagingalong a rip line or other line in which the product must be opened. Whenthe product packaging is opened, the one or more conductive terminalsare no longer conductively coupled, which may be detected by the tag.The tag 121 may also include temperature and humidity data and beconfigured to keep a log of temperature and humidity data regardingshipment and storage of the consumer product to which it is affixed.

The environment 100 shows that device 120 is operated by a user 110,which may be a consumer. The term “consumer” is used to refer to aperson, an end-user of the consumer product 111, a retailer of theconsumer product, a distributor of the consumer product, an intermediateuser of the consumer product, or the like. Server 102, tag 121 anddevice 120 may each comprise a computing device 600, described below ingreater detail with respect to FIG. 6.

In another embodiment, the device 120 may also calculate currentgeographical position (otherwise referred to as geographical locationdata) using a sub-system, an on-board processor or a connectedprocessor. In one embodiment, the device 120 may calculate currentposition using a satellite or ground based positioning system, such as aGlobal Positioning System (GPS) system, which is a navigation devicethat receives satellite or land based signals for the purpose ofdetermining the device's current geographical position on Earth.Generally, device 120 calculates global navigation satellite system(GNSS) data. A GNSS or GPS receiver, and its accompanying processor, maycalculate latitude, longitude and altitude information. In thisdocument, the terms GNSS and GPS are used generally to refer to anyglobal navigation satellite system, such as GLONASS, GALILEO, GPS, etc.In this embodiment, a radio frequency signal is received from asatellite or ground based transmitter comprising a time the signal wastransmitted and a position of the transmitter. Subsequently, the device120 calculates current geographical location data of the device based onthe signal. In another embodiment, the device 120 calculates currentgeographical location using alternative services, such as control planlocating, GSM localization, dead reckoning, or any combination of theaforementioned position services. The term spatial technologies orspatial processes refers generally to any processes and systems fordetermining one's position using radio signals received from varioussources, including satellite sources, land-based sources and the like.

Computing device 102 includes a software engine that deliversapplications, data, program code and other information to networkeddevices, such as device 120. The software engine of device 102 mayperform other processes such as transferring multimedia data in a streamof packets that are interpreted and rendered by a software applicationas the packets arrive. FIG. 1 further shows that device 102 includes adatabase or repository 104, which may be a relational databasecomprising a Structured Query Language (SQL) database stored in a SQLserver. Mobile computing device 120 may also include its own database,either locally or via the cloud. The database 104 may serve useridentifying data, as well as related information from a product'scorresponding product record (located in database 104), which may beused by device 102 and mobile computing device 120.

Device 102, mobile computing device 120 and tag 121 may each includeprogram logic comprising computer source code, scripting language codeor interpreted language code that perform various functions of thedisclosed embodiments. In one embodiment, the aforementioned programlogic may comprise program module 606 in FIG. 6. It should be noted thatalthough FIG. 1 shows only one mobile computing device 120, one tag 121and one server 102, the system of the disclosed embodiments supports anynumber of servers, tags and mobile computing devices connected vianetwork 106. Also note that although server 102 is shown as a single andindependent entity, in one embodiment, server 102 and its functionalitycan be realized in a centralized fashion in one computer system or in adistributed fashion wherein different elements are spread across severalinterconnected computer systems.

The database 104 may include a consumer product record for each consumerproduct 111. A consumer product record may include: the consumer productname, a consumer product identifier, information about the authenticityof the consumer product, consumer product packaging information,exclusive commercial content relating to the consumer product, pairingsrelating to the consumer product, instructions for use related to theconsumer product, warranty information, rewards or benefits related tothe consumer product, interactive content, augmented reality media,information regarding upcoming events related to the brand of theconsumer product, information regarding integration with socialnetworks, redirect links to the vendor or manufacturer's website, nearbyevents relating to the consumer product, etc. A consumer product recordmay further include a unique code, such as a UPC code or a QR code,corresponding to the consumer product.

A consumer product record may also include a unique identifier. A uniqueidentifier is an identifier that is registered to a specific unit of theconsumer product. Unique identifiers avoid shortcomings that areassociated with the use of product identifiers alone, giving each unitof the consumer product its own identifier to facilitate in therecognition and verification of authenticity of the consumer product.

The method and system for verifying a consumer product is described inmore detail below, with reference to FIGS. 2A, 3A and 5A. FIG. 2A is adiagram showing the data flow 200 of the process for facilitating theauthentication of and interaction with a variety of consumer products,FIG. 3A is a flow chart 300 of a method for identifying a product forauthentication and returning the related results to the reader, and FIG.5A is a diagram 500 showing the interaction between a tag on a consumerproduct, a consumer mobile device, and a server during the process ofauthentication of, and interaction with, a variety of consumer products.

The process of authenticating a consumer product 111 begins with step302 of FIG. 3A. In step 302, the reader on mobile device 120 pollsinformation 202 from the tag 121. For reference, FIG. 4 shows the tag121 placed in close proximity to the mobile device 120 (also be referredto herein as “reader”) to initiate the process of FIG. 3A. This processis initiated by the user 110 by either tapping or scanning the NFC tag,depending on which type of tag has been placed on the consumer product111 or its packaging.

In step 302, in one option, some or all of the data 202 read by device120 is displayed on device 120. This may include, for example, theconsumer product name, a product identifier, a unique identifier, aproduct description, warranty information, and/or a photo of theproduct. In another embodiment, the data 202 includes a hash that isproduced by the tag 121 wherein encoded in said hash is the uniqueidentifier that identifies the tag itself. The hash may be referred toas an encrypted packet that includes the unique identifier thatidentifies the tag itself. The data 202 may also include a counter,which is a numerical value that represents how many times the tag 121has been tapped to provide data 202, and which is increased sequentiallyeach time the tag is tapped. The data 202 may also include a URL thatincludes both the unique identifier that identifies the tag itself andthe counter as parameters in the URL. The data 202 may also include avalue that indicates whether the product packaging has been opened yet.The data 202 may also include any data that the tag is capable ofstoring.

In step 304, the reader on the device 120 gathers data 202 (also seeFIGS. 2A and 5A) from the onboard system, and in step 306 the readergenerates a URL, and sends a request 204 via the network 106 to theserver 102. The data sent in request 204 may include the productidentifier and unique identifier which the server will use to processthe request, authenticate the consumer product, and return the relevantinformation. This will be explained in further detail below in steps308-316. The data sent to the server may also include the hash describedabove, the unique identifier that identifies the tag itself and thecounter as parameters in the URL.

Next, in step 308, the server processes and logs the data from therequest 204 sent in step 306. The product identifier and uniqueidentifier sent in the request are used in this step by the server toidentify the correct product record in database 104 and ensure that allof the relevant information and the authentication will be transmittedto the user 110 via the device 120.

Once the server has logged the data, the product is authenticated instep 310 using the unique identifier. In step 310, the server may usemirroring processes and reading counter processes to authenticate theproduct. Mirroring processes are replica processes for servicesaccessible through the communications protocol, wherein identical ornear-identical authentication processes are executed. In step 312, theserver generates data and a URL containing the relevant consumer productinformation pulled from database 104 that is to be conveyed to the user110 via the mobile device 120. This information may include theinformation previously disclosed to the user, as well as informationregarding the authenticity of the product, warranty information, linksto exclusive commercial content and loyalty programs sign-up pages,interactive content, and any other content relevant to the product andconsumer.

In one embodiment, the server 102 may compare any of the data 204 (thatwas sent to the server) to data located in a product record (in database104) that corresponds to the product identifier in the data 204. If anyof the data does not match, then there is a denial of validation andauthentication. If all said data matches, then there is a validation andauthentication that occurs. In one embodiment, the server 102 may alsocompare the counter value in data 204 to a running counter value locatedin the product record that corresponds to the product identifier in thedata 204. If the counter value does not match, then there is a denial ofvalidation and authentication. If the counter value matches, then thereis a validation and authentication that occurs. In another embodiment,the server 102 may also compare the hash in data 204 to the result of ahash algorithm located in the product record that corresponds to theproduct identifier in the data 204. If the values do not match, thenthere is a denial of validation and authentication. If the values match,then there is a validation and authentication that occurs.

In step 314, the server transmits said data and URL (i.e., data 206) tothe reader over the communications network, wherein a web page locatedat said URL includes the data pulled from database 104 and is configuredfor the user to interact therein.

In step 316, the user engages with the mobile device 120 to access theURL and view the data 206 delivered to the device by server 102 over thecommunications network 106. In step 316, the user may interact with thedata in any manner permitted by the application, and in doing so maysend additional requests 208 to the server 102 via the communicationsnetwork 106. The server will then reengage in step 208 and log the datain the request before generating the new data 210 and URL, as shown instep 312. The server will then carry out step 314 and send the new data210 and URL to the mobile device 120 for the user 110 to access andview, as described in step 316.

Additional functionality of server 102 is provided as follows. Once aconsumer has navigated to the appropriate URL (see the processesdescribed above), the consumer 110 may author and post comments, reviewsor pairing suggestions about the consumer product 111. Additionally, theconsumer 110 may engage in an online chat, and interact with, amanufacturer, a store, a retailer, distributor, other end users, etc.Also, the consumer 110 may engage in an online chat, and interact with,a brand or company regarding questions, complaints, etc. about theconsumer product 111. In another embodiment, the server 102 may confirmwhen a sale of a consumer product 111 occurs (at a retailer, forexample) and send confirmation of said sale to the brand, retailer,distributor, etc. in real time. Further, the server 102 may provide toretailers, distributors, etc. with certain online training tools, suchas webinars, talks and courses that provide training regarding how tosell the consumer product 111 to end-consumers. Moreover, the mobileapplication is further configured to read from the NFC tag thetemperature and humidity at which the consumer product has been situatedduring shipping and storage. Additional example processes are furtherdescribed below with reference to FIGS. 3B and 3C.

Regarding the pairing functionality, once a consumer has navigated tothe appropriate URL (see the processes described above), the consumer110 may author and post comments and reviews about pairings for theconsumer product 111. For example, if the consumer product were a wine,the consumer may author and post comments and reviews about food, andcigar pairings for the wine. In another example, if the consumer productwere a cigar, the consumer may author and post comments and reviewsabout food/meal, and wine pairings for the cigar. In another example, ifthe consumer product were a liquor, the consumer may author and postcomments and reviews about food/meal, and cigar pairings for the liquor.In one embodiment, an algorithm executing on the server 102 may suggestpairings for the consumer product 111. In one embodiment, the server 102may include a communications module that puts the user 110 in contactwith an expert that suggests pairings for the consumer product 111. Forexample, if the consumer product were a wine, the expert may be asommelier. In another example, if the consumer product were a cigar, theexpert may be a cigar aficionado. In another example, if the consumerproduct were a liquor, the expert may be a liquor expert.

Additional functionality of server 102 may include providing nearbysmoking locations. Once a consumer has navigated to the appropriate URL(see the processes described above), the server 102 may suggest a nearbysmoking location based on the current location of the user 110. If theconsumer product were a cigar, the consumer would benefit from havingquick and easy access to a smoking location. The server 102 receives thecurrent location of the user 110 (as described more fully herein), andcalculates the closest smoking location to the user's location, andsubsequently displays this information to the user so that he may enjoyhis cigar at said location. The server 102 may come up with a pluralityof smoking locations within a preset distance from the user 110. In thiscase, the server 102 may filter the smoking location results bydistance, type of establishment, etc. Once the consumer has navigated tothe appropriate URL (see the processes described above), the consumer110 may author and post comments and reviews about the smokinglocation(s) he utilized, so that other consumers may benefit from hisreview.

The method and system for providing commercial content such as webinars,videos, interactive virtual reality experiences, etc. is described inmore detail below, with reference to FIGS. 2B, 3B and 5B. FIG. 2B is adiagram showing the data flow 250 of the process for facilitating theprovision of commercial content regarding a variety of consumerproducts, FIG. 3B is a flow chart 350 of a method for the provision ofcommercial content regarding a variety of consumer products, and FIG. 5Bis a diagram 550 showing the interaction between a tag on a consumerproduct, a consumer mobile device, and a server during the provision ofcommercial content regarding a variety of consumer products.

The method and system for providing commercial content begins with step352 (see FIG. 3B), wherein the user 110 taps or scans the tag 121 on aconsumer product 111 using device 120. Once the user has scanned ortapped the tagged consumer product, as shown in step 352, the readergathers data 252 (see FIG. 2B) from the onboard system and sends arequest 254 to the server. Once the server logs the data in the requestand authenticates the product in step 356, the server generates data anda URL in step 358 and sends said data and URL 256 to the reader in step360. The URL may contain any such commercial content as a manufacturer,retailer, brand, etc. may want to share with the end-user of theirproduct. This may include information relating to upcoming events,infographics, websites, loyalty programs, blogs, videos, and any othercommercial content deemed relevant to the related product. Afterdeciding which commercial content to engage with, a user sends a request258 for the selected commercial content in step 362. The request isprocessed by the server in step 364 and the relevant commercial contentdata 260 delivered to the user's mobile device in step 366.

The method and system for enrolling and tracking progress in loyaltyprograms associated with the manufacturer or vendor of a consumerproduct is described in more detail below, with reference to FIGS. 2C,3C and 5C. FIG. 2C is a diagram showing the data flow 270 of the processfor facilitating the administration of a consumer loyalty programregarding a variety of consumer products, FIG. 3C is a flow chart 370 ofa method for the administration of a consumer loyalty program regardinga variety of consumer products, and FIG. 5C is a diagram 570 showing theinteraction between a tag on a consumer product, a consumer mobiledevice, and a server during the administration of a consumer loyaltyprogram regarding a variety of consumer products.

The administration of a consumer loyalty program likewise begins withstep 372 (see FIG. 3C), wherein the user 110 taps or scans the tag 121on a consumer product 111 using device 120. In step 374 the readergathers data 272 from the onboard system and sends a request 274 to theserver in step 376. The server then logs the data, authenticates theproduct, and generates data and a URL in steps 378, and 380,respectively. The data and URL generated by the server are sent toreader/mobile device in step 382 utilizing data packet 276, therebyallowing the user to access said data and URL as shown in step 384. Asmentioned above, the data and displayed materials on the URL page mayinclude information regarding customer loyalty programs, commercialcontent, FDA status, etc. In step 386 the user selects “Customer LoyaltyProgram.” The term “Customer Loyalty Program” is used in this embodimentas an example of displayed text used to signal to a user that uponinteract with said text, they will be taken through the steps ofenrolling in a loyalty program associated with the scanned product.Other embodiments may include any such text that conveys substantiallythe same message, such as “Loyalty Program Sign-Up” or other similaroptions.

Once a user has selected “Customer Loyalty Program,” the reader sends arequest 278 to server 102 in step 388. Upon receiving said request, theserver generates a loyalty program form and sends it to the reader insteps 390 and 392 respectively, utilizing data packet 280. The user thenfills out the form with user data in step 394 and the reader returns theform to the server via data packet 282, in step 396. User data mayinclude any such data requested by a loyalty program owner, includingbut not limited to name, address, demographic data, email address, phonenumber, etc. The server enrolls the user in the relevant loyalty programupon receipt of the loyalty program form in step 398.

The tag produces a unique hash that is distinctive and exclusive for theparticular interaction. This hash is included as a query stringparameter, URL with UID and Counter mirroring.

FIG. 7 presents two drawings depicting a tag 700 on a consumer product,according to an example embodiment. The left drawing in FIG. 7 shows thetop of an alcoholic beverage bottle or container, which may be liquor,beer, wine, spirits or any other beverage containing alcohol and locatedin a container. The container comprises a stationary reservoir 704 and amovable cap, plug or cork 702. The tag 700 comprises a main portion 711,which may have a round shape, wherein the main portion is attached tothe movable cap, plug or cork 702, such as via adhesive. The tag 700also comprises a lead portion 712, which may have a rectangular shape,wherein the lead portion is attached to the stationary reservoir 704,such as via adhesive. When the movable cap, plug or cork 702 is removedor otherwise moved by the consumer, the main portion 711 is detachedfrom the lead portion 712, which cuts or otherwise alters conductiveterminals or conductive lead lines in the tag 700. Said detachment isdetectable by the tag 700, which is configured to record that thealcoholic beverage product has been opened.

The right drawing in FIG. 7 shows a cigar box. The cigar box comprises astationary box 704 and a movable top 702. The tag 700 comprises a mainportion 711 attached to the movable top 702, such as via adhesive. Thetag 700 also comprises a lead portion 712 attached to the stationary box704, such as via adhesive. When the movable top 702 is opened orotherwise moved by the consumer, the main portion 711 is detached fromthe lead portion 712, which cuts or otherwise alters conductiveterminals or conductive lead lines in the tag 700. Said detachment isdetectable by the tag 700, which is configured to record that the cigarbox has been opened.

FIG. 6 is a block diagram of a system including an example computingdevice 600 and other computing devices. Consistent with the embodimentsdescribed herein, the aforementioned actions performed by device 102,device 120 may be implemented in a computing device, such as thecomputing device 600 of FIG. 6. Any suitable combination of hardware,software, or firmware may be used to implement the computing device 600.The aforementioned system, device, and processors are examples and othersystems, devices, and processors may comprise the aforementionedcomputing device. Furthermore, computing device 600 may comprise anoperating environment for system 100 and processes 200, 250, 270, 300,350, 370, as described above. Processes 200, 250, 270, 300, 350, 370 mayoperate in other environments and are not limited to computing device600.

With reference to FIG. 6, a system consistent with an embodiment mayinclude a plurality of computing devices, such as computing device 600.In a basic configuration, computing device 600 may include at least oneprocessing unit 602 and a system memory 604. Depending on theconfiguration and type of computing device, system memory 604 maycomprise, but is not limited to, volatile (e.g. random-access memory(RAM)), non-volatile (e.g. read-only memory (ROM)), flash memory, or anycombination or memory. System memory 604 may include operating system605, and one or more programming modules 606. Operating system 605, forexample, may be suitable for controlling computing device 600'soperation. In one embodiment, programming modules 606 may include, forexample, a program module 607 for executing the actions of device 102,device 120. Furthermore, embodiments may be practiced in conjunctionwith a graphics library, other operating systems, or any otherapplication program and is not limited to any particular application orsystem. This basic configuration is illustrated in FIG. 6 by thosecomponents within a dashed line 620.

Computing device 600 may have additional features or functionality. Forexample, computing device 600 may also include additional data storagedevices (removable and/or non-removable) such as, for example, magneticdisks, optical disks, or tape. Such additional storage is illustrated inFIG. 6 by a removable storage 609 and a non-removable storage 610.Computer storage media may include volatile and nonvolatile, removableand non-removable media implemented in any method or technology forstorage of information, such as computer readable instructions, datastructures, program modules, or other data. System memory 604, removablestorage 609, and non-removable storage 610 are all computer storagemedia examples (i.e. memory storage.) Computer storage media mayinclude, but is not limited to, RAM, ROM, electrically erasableread-only memory (EEPROM), flash memory or other memory technology,CD-ROM, digital versatile disks (DVD) or other optical storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to storeinformation and which can be accessed by computing device 600. Any suchcomputer storage media may be part of device 600. Computing device 600may also have input device(s) 612 such as a keyboard, a mouse, a pen, asound input device, a camera, a touch input device, etc. Outputdevice(s) 614 such as a display, speakers, a printer, etc. may also beincluded. Computing device 600 may also include a vibration devicecapable of initiating a vibration in the device on command, such as amechanical vibrator or a vibrating alert motor. The aforementioneddevices are only examples, and other devices may be added orsubstituted.

Computing device 600 may also contain a network connection device 615that may allow device 600 to communicate with other computing devices618, such as over a network in a distributed computing environment, forexample, an intranet or the Internet. Device 615 may be a wired orwireless network interface controller, a network interface card, anetwork interface device, a network adapter or a LAN adapter. Device 615allows for a communication connection 616 for communicating with othercomputing devices 618. Communication connection 616 is one example ofcommunication media. Communication media may typically be embodied bycomputer readable instructions, data structures, program modules, orother data in a modulated data signal, such as a carrier wave or othertransport mechanism, and includes any information delivery media. Theterm “modulated data signal” may describe a signal that has one or morecharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationmedia may include wired media such as a wired network or direct-wiredconnection, and wireless media such as acoustic, radio frequency (RF),infrared, and other wireless media. The term computer readable media asused herein may include both computer storage media and communicationmedia.

As stated above, a number of program modules and data files may bestored in system memory 604, including operating system 605. Whileexecuting on processing unit 602, programming modules 606 (e.g. programmodule 607) may perform processes including, for example, one or more ofthe stages of the processes 200, 250, 270, 300, 350, 370 as describedabove. The aforementioned processes are examples, and processing unit602 may perform other processes. Other programming modules that may beused in accordance with embodiments herein may include electronic mailand contacts applications, word processing applications, spreadsheetapplications, database applications, slide presentation applications,drawing or computer-aided application programs, etc.

Generally, consistent with embodiments herein, program modules mayinclude routines, programs, components, data structures, and other typesof structures that may perform particular tasks or that may implementparticular abstract data types. Moreover, embodiments herein may bepracticed with other computer system configurations, including hand-helddevices, multiprocessor systems, microprocessor-based or programmableconsumer electronics, minicomputers, mainframe computers, and the like.Embodiments herein may also be practiced in distributed computingenvironments where tasks are performed by remote processing devices thatare linked through a communications network. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

Furthermore, embodiments herein may be practiced in an electricalcircuit comprising discrete electronic elements, packaged or integratedelectronic chips containing logic gates, a circuit utilizing amicroprocessor, or on a single chip (such as a System on Chip)containing electronic elements or microprocessors. Embodiments hereinmay also be practiced using other technologies capable of performinglogical operations such as, for example, AND, OR, and NOT, including butnot limited to mechanical, optical, fluidic, and quantum technologies.In addition, embodiments herein may be practiced within ageneral-purpose computer or in any other circuits or systems.

Embodiments herein, for example, are described above with reference toblock diagrams and/or operational illustrations of methods, systems, andcomputer program products according to said embodiments. Thefunctions/acts noted in the blocks may occur out of the order as shownin any flowchart. For example, two blocks shown in succession may infact be executed substantially concurrently or the blocks may sometimesbe executed in the reverse order, depending upon the functionality/actsinvolved.

While certain embodiments have been described, other embodiments mayexist. Furthermore, although embodiments herein have been described asbeing associated with data stored in memory and other storage mediums,data can also be stored on or read from other types of computer-readablemedia, such as secondary storage devices, like hard disks, floppy disks,or a CD-ROM, or other forms of RAM or ROM. Further, the disclosedmethods' stages may be modified in any manner, including by reorderingstages and/or inserting or deleting stages, without departing from theclaimed subject matter.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing the claims.

What is claimed is:
 1. A system for authenticating a consumer productcomprising a cigar box, the system comprising: a near fieldcommunication (NFC) tag configured for coupling to the consumer product,wherein said NFC tag is programmed to provide the following identifyingdata to an NFC-capable mobile computing device when said NFC tag istapped or scanned: a unique product identifier, a URL containing anencrypted packet that uniquely identifies said NFC tag, and a countervalue that represents a number of times said NFC tag has been tapped orscanned; the NFC tag comprising a main portion adhered to a stationaryportion of the cigar box, and a lead portion adhered to a movableportion of the cigar box, wherein when the movable portion is moved, thelead portion is detached from the main portion, and the NFC tag isconfigured to record that the cigar box has been opened; a database forstoring data about a plurality of consumer products, including a productname, a unique product identifier, a counter value, a hash algorithm anda unique identifier, wherein said database is communicatively coupled toa communications network; a mobile application executing on anNFC-capable mobile computing device communicatively coupled to thecommunications network, wherein said mobile application is configured toread identifying data from the NFC tag and transmit said identifyingdata to a server via the communications network; and the servercommunicably coupled with the communications network, wherein the serveris configured for: a) receiving said identifying data from the mobileapplication; b) accessing a record in the database that corresponds tothe unique product identifier; c) comparing the hash in the identifyingdata to a hash algorithm in the record, and comparing the counter valueof the identifying data to a counter value in the record; d) if the hashin the identifying data matches the hash algorithm in the record, and ifthe counter value of the identifying data matches the counter value inthe record, then transmitting an approval of authentication to themobile application; e) transmitting to the mobile application a pairingsuggestion for the consumer product; and f) transmitting to the mobileapplication a nearby smoking location for the consumer product.
 2. Thesystem of claim 1, wherein the NFC tag is further programmed to providethe following identifying data to an NFC-capable mobile computing devicewhen said NFC tag is tapped or scanned: a value that indicates whetherthe consumer product has been opened.
 3. The system of claim 2, whereinthe server is further configured for: transmitting to the mobileapplication the value that indicates whether the consumer product hasbeen opened.
 4. The system of claim 1, wherein the NFC tag is furtherprogrammed to provide the following data to an NFC-capable mobilecomputing device when said NFC tag is tapped or scanned: a log oftemperature and humidity data regarding shipment and storage of theconsumer product.
 5. The system of claim 4, wherein the server isfurther configured for: transmitting to the mobile application the logof temperature and humidity data regarding shipment and storage of theconsumer product.
 6. The system of claim 5, wherein the server isfurther configured for: transmitting to the mobile application exclusivecommercial content relating to the consumer product, including audio,video, and augmented reality media.
 7. The system of claim 6, whereinthe server is further configured for: transmitting to the mobileapplication information such as pairings related to the consumerproduct.
 8. The system of claim 7, wherein the server is furtherconfigured for: transmitting to the mobile application information aboutjoining a consumer loyalty program.
 9. The system of claim 8, whereinthe server is further configured for: transmitting to the mobileapplication information about joining a consumer loyalty program. 10.The system of claim 9, wherein the server is further configured for:transmitting to the mobile application URL to a manufacturer website forpurchasing the consumer product an additional time.