Pre and post purchase identification of  counterfeit products

ABSTRACT

A method, system, and computer usable program product for pre and post purchase identification of counterfeit products in a supply chain are provided in the illustrative embodiments. A customer reference number (CRN) associated with a unit of product is identified. The unit of product has associated therewith a unique set of identifiers including the CRN, a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The CRN is sent to a second application and a message is received from the second application in response to sending the CRN. If the message includes a second CAN that is not the same as the CAN associated with the unit, the unit is determined to be a counterfeit product.

RELATED APPLICATION

The present invention is related to similar subject matter of co-pendingand commonly assigned U.S. patent application Ser. No. ______ (AttorneyDocket No. AUS920100078US1) entitled “MITIGATING DISTRIBUTION ANDCONSUMPTION OF COUNTERFEIT PRODUCTS,” filed on ______, 2010, and U.S.patent application Ser. No. ______ (Attorney Docket No. AUS920100190US1)entitled “IMPROVED MANUFACTURING AND DISTRIBUTION TO AVOID COUNTERFEITPRODUCTS,” filed on ______, 2010, which are hereby incorporated byreference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to an improved data processingsystem, and in particular, to a computer implemented method for managinginformation about products in a supply chain. Still more particularly,the present invention relates to a computer implemented method, system,and computer usable program code for pre and post purchaseidentification of counterfeit products.

2. Description of the Related Art

Today, distribution and selling of counterfeit products has become asignificant problem in the global marketplace. Almost every country,every region, every industry suffers some loss due to the presence ofcounterfeit products along with the original products.

An original product is a product distributed, sold, or consumedaccording to the instructions of the rightful manufacturer of theproduct. A counterfeit product is a product that is not an originalproduct. For example, a product that is a copy or a replica of anoriginal product, intended for distribution, sale, or consumption as theoriginal product, without the authorization of the manufacturer of theoriginal product, is a counterfeit product. As another example, anoriginal product that is distributed, sold, or consumed outside a daterange or time period suggested by the manufacturer of the originalproduct may also be considered a counterfeit product.

Some anti-counterfeit solutions currently exist in the market. However,none of these solutions provide a robust enough method to reduce oreliminate the distribution and selling of counterfeit products. Theadverse effects of counterfeit products are diverse and far-reaching.For example, the pharmaceutical industry is one of the most widelyaffected industries when it comes to counterfeit products. Both thedeveloped and the developing countries are suffering from counterfeitdrugs that harm the health of the people, infringe upon the rights ofthe pharmaceutical companies, and violate the laws of sovereign nationsand states.

As another example, nearly forty percent of consumer package goods (CPG)sold around the world are regarded as counterfeit for one reason oranother. As another example, the Automobile Manufacturers Associationindicates that counterfeit auto parts are a twelve billion dollarproblem globally, causing a loss of approximately three billion dollarsin the United States alone.

The list of counterfeit products is ever growing. Some of the producttypes that are most susceptible to counterfeiting includepharmaceuticals, CPG, Apparels, automotive parts, electronics andelectrical equipment, beverages and tobacco products, toys, baby food,construction materials, agricultural products, and food products.

The effects of counterfeiting can be direct or indirect. For example,health problems, harm to equipment, loss of goodwill, and loss ofrevenue are some of the direct problems associated with counterfeiting.Local and global economic crisis, child labor, and violation of humanrights are some of the indirect consequences of counterfeiting.

SUMMARY OF THE INVENTION

The illustrative embodiments provide a method, system, and computerusable program product for pre and post purchase identification ofcounterfeit products. An embodiment identifies, using a firstapplication executing in a first data processing system, a customerreference number (CRN) associated with a unit of product. The unit ofproduct has associated therewith a unique set of identifiers includingthe CRN, a customer acknowledgment number (CAN), and a merchantacknowledgment number (MAN). The embodiment sends the CRN to a secondapplication and receives from the second application a message inresponse to sending the CRN. If the message includes a second CAN thatis not the same as the CAN associated with the unit, the embodimentdetermines that the unit is a counterfeit product.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself; however, as well asa preferred mode of use, further objectives and advantages thereof, willbest be understood by reference to the following detailed description ofan illustrative embodiment when read in conjunction with theaccompanying drawings, wherein:

FIG. 1 depicts a pictorial representation of a network of dataprocessing systems in which the illustrative embodiments may beimplemented;

FIG. 2 depicts a block diagram of a data processing system in which theillustrative embodiments may be implemented;

FIG. 3 depicts a flowchart of an example process of pre purchaseidentification of counterfeit products in accordance with anillustrative embodiment; and

FIG. 4 depicts a flowchart of an example process of post purchaseidentification of a counterfeit product in accordance with anillustrative embodiment.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The invention recognizes that the introduction of counterfeit productscan occur at any of the several points in a given supply chain. Forexample, shops, distributors, retail outlets, suppliers, brokers,export/import points, warehouses, or transportation between points caneach potentially be a point where a counterfeit product may beintroduced. Accordingly, the invention recognizes that tracking themovement of products from a producer to a consumer is not always easy,practicable, or even sufficient for reducing or eliminatingcounterfeits.

For example, the invention recognizes that a common supply chain mayinclude hundreds if not thousands of manufacturers. Each manufacturermay produce several brands or types of products. Each brand or type ofproduct may include thousands of product items. Each distributor,broker, or distribution point may receive products for several supplychains from several suppliers. Each supplier may stock several productsof several brands or types from several manufacturers. A retailer maysource from several suppliers and/or distribution points.

Thus, the invention recognizes that between the producer and theconsumer of a specific product, the transactions become complex andintermingled with many other factors affecting the supply chain.Accordingly, simply tracking a product is insufficient for preventingthe introduction, distribution, and consumption of counterfeit productsin a supply chain.

The invention recognizes that in many cases, a producer cannot answeraffirmatively and with confidence whether the product that is sold isthe original product the producer manufactured. Similarly, in manycases, a consumer cannot answer affirmatively and with confidencewhether the product that was purchased is the original product that wasmanufactured.

Preventing counterfeits from entering the market is not always possiblefor the producers due at least to the size of the global supply chain ingeneral. Detecting a counterfeit is not always possible for a consumerdue to the striking similarities between the counterfeit and theoriginal products and many other reasons.

The illustrative embodiments used to describe the invention generallyaddress and solve the above-described problems and other problemsrelated to counterfeit products in a supply chain. The illustrativeembodiments provide a method, computer usable program product, and dataprocessing system for improved manufacturing and distribution to avoidcounterfeit products.

With reference to the figures and in particular with reference to FIGS.1 and 2, these figures are example diagrams of data processingenvironments in which illustrative embodiments may be implemented. FIGS.1 and 2 are only examples and are not intended to assert or imply anylimitation with regard to the environments in which differentembodiments may be implemented. A particular implementation may makemany modifications to the depicted environments based on the followingdescription.

FIG. 1 depicts a pictorial representation of a network of dataprocessing systems in which illustrative embodiments may be implemented.Data processing environment 100 is a network of computers in which theillustrative embodiments may be implemented. Data processing environment100 includes network 102. Network 102 is the medium used to providecommunications links between various devices and computers connectedtogether within data processing environment 100. Network 102 may includeconnections, such as wire, wireless communication links, or fiber opticcables. Server 104 and server 106 couple to network 102 along withstorage unit 108. Software applications may execute on any computer indata processing environment 100.

In addition, clients 110, 112, and 114 couple to network 102. A dataprocessing system, such as server 104 or 106, or client 110, 112, or 114may contain data and may have software applications or software toolsexecuting thereon.

Server 104 may include CDS 105. Server 106 may include registrationapplication 107 usable by a manufacturer in accordance with anillustrative embodiment. POS 113 may be a point of sale applicationusable by a merchant in accordance with an illustrative embodiment.Mobile device 116 may be any mobile device, such as a cellular phone,usable by a consumer in accordance with an illustrative embodiment.

Servers 104 and 106, storage unit 108, and clients 110, 112, and 114 maycouple to network 102 using wired connections, wireless communicationprotocols, or other suitable data connectivity. Clients 110, 112, and114 may be, for example, personal computers or network computers.

In the depicted example, server 104 may provide data, such as bootfiles, operating system images, and applications to clients 110, 112,and 114. Clients 110, 112, and 114 may be clients to server 104 in thisexample. Clients 110, 112, 114, or some combination thereof, may includetheir own data, boot files, operating system images, and applications.Data processing environment 100 may include additional servers, clients,and other devices that are not shown.

In the depicted example, data processing environment 100 may be theInternet. Network 102 may represent a collection of networks andgateways that use the Transmission Control Protocol/Internet Protocol(TCP/IP) and other protocols to communicate with one another. At theheart of the Internet is a backbone of data communication links betweenmajor nodes or host computers, including thousands of commercial,governmental, educational, and other computer systems that route dataand messages. Of course, data processing environment 100 also may beimplemented as a number of different types of networks, such as forexample, an intranet, a local area network (LAN), or a wide area network(WAN). FIG. 1 is intended as an example, and not as an architecturallimitation for the different illustrative embodiments.

Among other uses, data processing environment 100 may be used forimplementing a client server environment in which the illustrativeembodiments may be implemented. A client server environment enablessoftware applications and data to be distributed across a network suchthat an application functions by using the interactivity between aclient data processing system and a server data processing system. Dataprocessing environment 100 may also employ a service orientedarchitecture where interoperable software components distributed acrossa network may be packaged together as coherent business applications.

With reference to FIG. 2, this figure depicts a block diagram of a dataprocessing system in which illustrative embodiments may be implemented.Data processing system 200 is an example of a computer, such as server104 or client 110 in FIG. 1, in which computer usable program code orinstructions implementing the processes may be located for theillustrative embodiments.

In the depicted example, data processing system 200 employs a hubarchitecture including North Bridge and memory controller hub (NB/MCH)202 and south bridge and input/output (I/O) controller hub (SB/ICH) 204.Processing unit 206, main memory 208, and graphics processor 210 arecoupled to north bridge and memory controller hub (NB/MCH) 202.Processing unit 206 may contain one or more processors and may beimplemented using one or more heterogeneous processor systems. Graphicsprocessor 210 may be coupled to the NB/MCH through an acceleratedgraphics port (AGP) in certain implementations.

In the depicted example, local area network (LAN) adapter 212 is coupledto south bridge and I/O controller hub (SB/ICH) 204. Audio adapter 216,keyboard and mouse adapter 220, modem 222, read only memory (ROM) 224,universal serial bus (USB) and other ports 232, and PCI/PCIe devices 234are coupled to south bridge and I/O controller hub 204 through bus 238.Hard disk drive (HDD) 226 and CD-ROM 230 are coupled to south bridge andI/O controller hub 204 through bus 240. PCI/PCIe devices may include,for example, Ethernet adapters, add-in cards, and PC cards for notebookcomputers. PCI uses a card bus controller, while PCIe does not. ROM 224may be, for example, a flash binary input/output system (BIOS). Harddisk drive 226 and CD-ROM 230 may use, for example, an integrated driveelectronics (IDE) or serial advanced technology attachment (SATA)interface. A super I/O (SIO) device 236 may be coupled to south bridgeand I/O controller hub (SB/ICH) 204.

An operating system runs on processing unit 206. The operating systemcoordinates and provides control of various components within dataprocessing system 200 in FIG. 2. The operating system may be acommercially available operating system such as Microsoft® Windows®(Microsoft and Windows are trademarks of Microsoft Corporation in theUnited States and other countries), or Linux® (Linux is a trademark ofLinus Torvalds in the United States and other countries). An objectoriented programming system, such as the Java™ programming system, mayrun in conjunction with the operating system and provides calls to theoperating system from Java™ programs or applications executing on dataprocessing system 200 (Java is a trademark of Sun Microsystems, Inc., inthe United States and other countries).

Instructions for the operating system, the object-oriented programmingsystem, and applications or programs are located on storage devices,such as hard disk drive 226, and may be loaded into main memory 208 forexecution by processing unit 206. The processes of the illustrativeembodiments may be performed by processing unit 206 using computerimplemented instructions, which may be located in a memory, such as, forexample, main memory 208, read only memory 224, or in one or moreperipheral devices.

The hardware in FIGS. 1-2 may vary depending on the implementation.Other internal hardware or peripheral devices, such as flash memory,equivalent non-volatile memory, or optical disk drives and the like, maybe used in addition to or in place of the hardware depicted in FIGS.1-2. In addition, the processes of the illustrative embodiments may beapplied to a multiprocessor data processing system.

In some illustrative examples, data processing system 200 may be apersonal digital assistant (PDA), which is generally configured withflash memory to provide non-volatile memory for storing operating systemfiles and/or user-generated data. A bus system may comprise one or morebuses, such as a system bus, an I/O bus, and a PCI bus. Of course, thebus system may be implemented using any type of communications fabric orarchitecture that provides for a transfer of data between differentcomponents or devices attached to the fabric or architecture.

A communications unit may include one or more devices used to transmitand receive data, such as a modem or a network adapter. A memory may be,for example, main memory 208 or a cache, such as the cache found innorth bridge and memory controller hub 202. A processing unit mayinclude one or more processors or CPUs.

The depicted examples in FIGS. 1-2 and above-described examples are notmeant to imply architectural limitations. For example, data processingsystem 200 also may be a tablet computer, laptop computer, or telephonedevice in addition to taking the form of a PDA.

With reference to FIG. 3, this figure depicts a flowchart of an exampleprocess of pre purchase identification of counterfeit products inaccordance with an illustrative embodiment. Process 300 may beimplemented in a consumer application, such as in an application onmobile device 116 in FIG. 1. Process 300 may also be implemented in adata processing system at a kiosk at a retailer as described elsewherein the disclosure.

Process 300 begins by considering or selecting a unit of manufacture ofa product for purchase (step 302). Process 300 identifies a CRNassociated with the unit of the product, from the unit of the product(step 304). Process 300 sends the CRN (step 306). For example, process300 may send the CRN to a CDS, such as CDS 105 in FIG. 1.

Process 300 may receive a CAN in response to sending the CRN (step 308).In one embodiment, instead of a CAN, process 300 may receive an errorcode or other information (not shown).

If no CAN is received (“No” path of step 308), process 300 deems theproduct a counterfeit or an expired product and proceeds to abort thepurchase (step 310). Process 300 may end thereafter. In one embodiment,process 300 may take additional actions with respect to the unit ofproduct deemed to be counterfeit or expired. For example, process 300may notify a process at a manufacturer, such as a process executing inregistration application 107 in FIG. 1, with the CRN of the unit.

If a CAN is received (“Yes” path of step 308), process 300 matches thereceived CAN with the CAN available from the unit of the product (step312). For example, process 300 may scan a bar code representing a CANthat may be printed on the unit and compare the scanned CAN identifierwith the received CAN.

Process 300 determines whether the received CAN matches the CAN from theunit of the product (step 314). If the two CANs do not match (“No” pathof step 314), process 300 proceeds to step 310. If the two CANs match(“Yes” path of step 314), process 300 may submit the unit of product forpurchase (step 316). Process 300 may end thereafter.

With reference to FIG. 4, this figure depicts a flowchart of an exampleprocess of post purchase identification of a counterfeit product inaccordance with an illustrative embodiment. Process 400 may beimplemented in a consumer application, such as in an application onmobile device 116 in FIG. 1.

Process 400 begins by detecting a mismatch between a MAN associated witha purchased unit of a product and a MAN received for the unit of productfrom a record of sale of that unit (step 402). The mismatch of step 402identifies a product as a counterfeit or expired product after theproduct has been purchased.

For example, a retailing process may print a MAN identifier on aninvoice, receipt, statement, or a bill of sale associated with the unit.A consumer application may be able to scan a bar coded MAN, RFID codedMAN, or a MAN identifier in another form printed on or affixed to theunit. The consumer application may be able to perform a match betweenMAN identifiers presented in different forms on the record of sale andthe unit of product.

Depending on a particular implementation, process 400 may notify a CDSabout the mismatch for the unit's CRN (step 404). Process 400 may notifythe retailer about the mismatch for the product CRN (step 406). Process400 may notify a manufacturer about the mismatch for the product CRN(step 408). Process 400 may perform all or some of steps 404, 406, and408 in any combination. Process 400 may end thereafter.

The components in the block diagrams and the steps in the flowchartsdescribed above are described only as examples. The components and thesteps have been selected for the clarity of the description and are notlimiting on the illustrative embodiments of the invention. For example,a particular implementation may combine, omit, further subdivide,modify, augment, reduce, or implement alternatively, any of thecomponents or steps without departing from the scope of the illustrativeembodiments. Furthermore, the steps of the processes described above maybe performed in a different order within the scope of the invention.

Thus, a computer implemented method, apparatus, and computer programproduct are provided in the illustrative embodiments for pre and postpurchase identification of counterfeit products. Using an embodiment ofthe invention, a consumer can take steps to identify counterfeitproducts before purchasing the product as well as after purchasing theproduct as needed. A manufacturer, a distributor, or a retailer canfurther use an embodiment to notify one or more entities about thedistribution of counterfeit products.

The invention can take the form of an entirely software embodiment, oran embodiment containing both hardware and software elements. In apreferred embodiment, the invention is implemented in software orprogram code, which includes but is not limited to firmware, residentsoftware, and microcode.

Furthermore, the invention can take the form of a computer programproduct accessible from a computer-usable or computer-readable mediumproviding program code for use by or in connection with a computer orany instruction execution system. For the purposes of this description,a computer-usable or computer-readable medium can be any tangibleapparatus that can contain, store, communicate, propagate, or transportthe program for use by or in connection with the instruction executionsystem, apparatus, or device.

The medium can be an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system (or apparatus or device) or apropagation medium. Examples of a computer-readable medium include asemiconductor or solid state memory, magnetic tape, a removable computerdiskette, a random access memory (RAM), a read-only memory (ROM), arigid magnetic disk, and an optical disk. Current examples of opticaldisks include compact disk—read only memory (CD-ROM), compactdisk—read/write (CD-R/W) and DVD.

Further, a computer storage medium may contain or store acomputer-readable program code such that when the computer-readableprogram code is executed on a computer, the execution of thiscomputer-readable program code causes the computer to transmit anothercomputer-readable program code over a communications link. Thiscommunications link may use a medium that is, for example withoutlimitation, physical or wireless.

A data processing system suitable for storing and/or executing programcode will include at least one processor coupled directly or indirectlyto memory elements through a system bus. The memory elements can includelocal memory employed during actual execution of the program code, bulkstorage media, and cache memories, which provide temporary storage of atleast some program code in order to reduce the number of times code mustbe retrieved from bulk storage media during execution.

A data processing system may act as a server data processing system or aclient data processing system. Server and client data processing systemsmay include data storage media that are computer usable, such as beingcomputer readable. A data storage medium associated with a server dataprocessing system may contain computer usable code. A client dataprocessing system may download that computer usable code, such as forstoring on a data storage medium associated with the client dataprocessing system, or for using in the client data processing system.The server data processing system may similarly upload computer usablecode from the client data processing system. The computer usable coderesulting from a computer usable program product embodiment of theillustrative embodiments may be uploaded or downloaded using server andclient data processing systems in this manner.

Input/output or I/O devices (including but not limited to keyboards,displays, pointing devices, etc.) can be coupled to the system eitherdirectly or through intervening I/O controllers.

Network adapters may also be coupled to the system to enable the dataprocessing system to become coupled to other data processing systems orremote printers or storage devices through intervening private or publicnetworks. Modems, cable modem and Ethernet cards are just a few of thecurrently available types of network adapters.

The description of the present invention has been presented for purposesof illustration and description, and is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the art. Theembodiment was chosen and described in order to explain the principlesof the invention, the practical application, and to enable others ofordinary skill in the art to understand the invention for variousembodiments with various modifications as are suited to the particularuse contemplated.

1. A computer implemented method for identifying a counterfeit product,the computer implemented method comprising: identifying, using a firstapplication executing in a first data processing system, a customerreference number (CRN) associated with a unit of product, the unit ofproduct having associated therewith a unique set of identifiersincluding the CRN, a customer acknowledgment number (CAN), and amerchant acknowledgment number (MAN), wherein the CRN uniquelyidentifies the product, the CAN is used by a customer for determiningauthenticity of the product, and the MAN is used by a merchant fordetermining authenticity of the product; sending the CRN to a secondapplication; receiving a message responsive to sending the CRN from thesecond application; and determining, responsive to the message includinga second CAN that is not the same as the CAN associated with the unit,that the unit is a counterfeit product.
 2. The computer implementedmethod of claim 1, further comprising: notifying a counterfeit detectionservice about the counterfeit product by transmitting a messageincluding the CRN and the CAN associated with the unit.
 3. The computerimplemented method of claim 1, further comprising: determining,responsive to the message including an error, that the unit is thecounterfeit product.
 4. The computer implemented method of claim 1,determining, responsive to the second CAN matching the CAN associatedwith the unit, that the unit is an original product.
 5. The computerimplemented method of claim 1, further comprising: comparing a secondMAN identified on a record of sale of the unit with the MAN associatedwith the unit; and determining, responsive to the second MAN notmatching the MAN associated with the unit, that the unit is thecounterfeit product.
 6. The computer implemented method of claim 5,further comprising: notifying a counterfeit detection service about thecounterfeit product by transmitting a message including the CRN and theMAN associated with the unit.
 7. The computer implemented method ofclaim 5, further comprising: notifying a third application used by aretailer about the counterfeit product by transmitting a messageincluding the CRN and the MAN associated with the unit.
 8. A computerusable program product comprising a computer usable storage mediumincluding computer usable code for identifying a counterfeit product,the computer usable code comprising: computer usable code foridentifying, using a first application executing in a first dataprocessing system, a customer reference number (CRN) associated with aunit of product, the unit of product having associated therewith aunique set of identifiers including the CRN, a customer acknowledgmentnumber (CAN), and a merchant acknowledgment number (MAN), wherein theCRN uniquely identifies the product, the CAN is used by a customer fordetermining authenticity of the product, and the MAN is used by amerchant for determining authenticity of the product; computer usablecode for sending the CRN to a second application; computer usable codefor receiving a message responsive to sending the CRN from the secondapplication; and computer usable code for determining, responsive to themessage including a second CAN that is not the same as the CANassociated with the unit, that the unit is a counterfeit product.
 9. Thecomputer usable program product of claim 8, further comprising: computerusable code for notifying a counterfeit detection service about thecounterfeit product by transmitting a message including the CRN and theCAN associated with the unit.
 10. The computer usable program product ofclaim 8, further comprising: computer usable code for determining,responsive to the message including an error, that the unit is thecounterfeit product.
 11. The computer usable program product of claim 8,determining, responsive to the second CAN matching the CAN associatedwith the unit, that the unit is an original product.
 12. The computerusable program product of claim 8, further comprising: computer usablecode for comparing a second MAN identified on a record of sale of theunit with the MAN associated with the unit; and computer usable code fordetermining, responsive to the second MAN not matching the MANassociated with the unit, that the unit is the counterfeit product. 13.The computer usable program product of claim 12, further comprising:computer usable code for notifying a counterfeit detection service aboutthe counterfeit product by transmitting a message including the CRN andthe MAN associated with the unit.
 14. The computer usable programproduct of claim 12, further comprising: computer usable code fornotifying a third application used by a retailer about the counterfeitproduct by transmitting a message including the CRN and the MANassociated with the unit.
 15. The computer usable program product ofclaim 8, wherein the computer usable code is stored in a computerreadable storage medium in a data processing system, and wherein thecomputer usable code is transferred over a network from a remote dataprocessing system.
 16. The computer usable program product of claim 8,wherein the computer usable code is stored in a computer readablestorage medium in a server data processing system, and wherein thecomputer usable code is downloaded over a network to a remote dataprocessing system for use in a computer readable storage mediumassociated with the remote data processing system.
 17. A data processingsystem for identifying a counterfeit product, the data processing systemcomprising: a storage device including a storage medium, wherein thestorage device stores computer usable program code; and a processor,wherein the processor executes the computer usable program code, andwherein the computer usable program code comprises: computer usable codefor identifying, using a first application executing in a first dataprocessing system, a customer reference number (CRN) associated with aunit of product, the unit of product having associated therewith aunique set of identifiers including the CRN, a customer acknowledgmentnumber (CAN), and a merchant acknowledgment number (MAN), wherein theCRN uniquely identifies the product, the CAN is used by a customer fordetermining authenticity of the product, and the MAN is used by amerchant for determining authenticity of the product; computer usablecode for sending the CRN to a second application; computer usable codefor receiving a message responsive to sending the CRN from the secondapplication; and computer usable code for determining, responsive to themessage including a second CAN that is not the same as the CANassociated with the unit, that the unit is a counterfeit product. 18.The data processing system of claim 17, further comprising: computerusable code for determining, responsive to the message including anerror, that the unit is the counterfeit product.
 19. The data processingsystem of claim 17, determining, responsive to the second CAN matchingthe CAN associated with the unit, that the unit is an original product.20. The data processing system of claim 17, further comprising: computerusable code for comparing a second MAN identified on a record of sale ofthe unit with the MAN associated with the unit; and computer usable codefor determining, responsive to the second MAN not matching the MANassociated with the unit, that the unit is the counterfeit product.