Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM AND METHOD FOR GENERATING AND VERIFYING HOLOGRAPHIC TAGS
Document Type and Number:
WIPO Patent Application WO/2019/116385
Kind Code:
A1
Abstract:
The present invention provides a system and method for generating and verifying holographic tags for identifying counterfeit items. The method comprises of combining the use of moire hidden text or flip-flop text with a uniquely coded holographic tag wherein the code itself is printed on the hologram using QR Code, data matrix code or a similar encoding pattern. To verify the holographic tag, the user scans the tag using a mobile application on the user device. If it's a genuine item, the user is indicated of the same and on the other hand if it's a counterfeit item then the user is notified of the same. This enables the users to make an informed choice on their purchase by verifying the authenticity of an item.

Inventors:
KUMAR VIKAS (IN)
Application Number:
PCT/IN2018/050827
Publication Date:
June 20, 2019
Filing Date:
December 11, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KUMAR VIKAS (IN)
JAIN DINESH KUMAR (IN)
JAIN MUKESH KUMAR (IN)
International Classes:
G03H1/00
Foreign References:
US20060209412A12006-09-21
CN106339979A2017-01-18
US20140136583A12014-05-15
Attorney, Agent or Firm:
KUMAR, Birendra (IN)
Download PDF:
Claims:
aim:

1. A method for generating one or more holographic tags, the method comprising: defining one or more texts;

performing a first process to design and generate the one or more holographic tags by embossing the one or more defined texts;

hiding the embossed texts on the holographic tags using a moire pattern; generating alphanumeric random values using a natural entropy;

performing one-way hashing function on the generated alpha numeric random value to generate one or more hashed value and save it to a database; performing a second process to encrypt and encode the unhashed value; and printing the encrypted and encoded value on the one or more holographic tags as a 2D code.

2. The method as claimed in claim 1 further comprising:

performing a 2-way encryption function on the alpha numeric random values followed by an encode process; and

adding meta data to the output of the 2-way encryption function to enable decoding during a verification process. 3. The method as claimed in claim 1 further comprising:

storing the one or more defined texts in a database.

4. The method as claimed in claim 1 further comprising:

storing the one or more hashed codes in a database.

5. The method as claimed in claim 1 further comprising:

performing a verification process using one or more reference markers on the holographic tag.

6. The method as claimed in claim 1, wherein the encrypted and encoded value are printed on the one or more holographic tags using at least one of a QR code, and data matrix.

7. A method for verifying one or more holographic tags, the method comprising: scanning, by an application module of a user device, one or more codes printed on the one or more Holographic tags,

extracting one or more value from the one or more scanned codes;

performing a process to decode and decrypt, using meta data, the extracted value to obtain one or more decoded and decrypted codes;

hashing the one or more decoded and decrypted codes value with the same hashing function used during code generation process;

comparing the one or more hashed results with one or more hashed value stored in the database to verify the decoded and decrypted codes;

notifying the user that the holographic tag failed to verify, if the hashed value does not match with a value stored in the database;

fetching corresponding moire decode key and one or more security parameters, if the hashed value matches with the value stored in the database; capturing image frames using the moire decode key from the tag using an image processing library and reference markers to obtain a text decoded using the moire decode key;

comparing the decoded text with a text stored in the database for verification;

notifying the user that the holographic tag failed to verify, if the decoded text mismatched with the text stored in the database; and

indicating to the user that the holographic tag verified, if the decoded text matched with the text stored in the database.

8. A method for generating one or more holographic tags, the method comprising: defining one or more flip-flop texts; performing a first process to design and generate the one or more holographic tags by embossing the one or more defined flip-flop texts;

capturing one or more security parameters, one or more flip-flop texts, and one or more angles at which the texts being visible;

generating alphanumeric random value using natural entropy;

performing one-way hashing function on the generated alpha numeric random value to generate one or more hashed value and save it to a database; performing a process to encrypt and encode the unhashed value; and printing the encrypted and encoded value on the one or more holographic tags as a 2D code

9. The method as claimed in claim 8 further comprising:

performing a 2-way encryption function on the alpha numeric random values followed by an encode process; and

adding meta data to the output of the 2-way encryption function to enable decoding during a verification process

10. The method as claimed in claim 8 further comprising:

storing the one or more hashed codes in a database.

11. The method as claimed in claim 8 further comprising:

storing the one or more security parameters, one or more flip-flop texts, and one or more angles at which the texts are visible, in a database.

12. The method as claimed in claim 8, wherein the encrypted and encoded value are printed on the one or more holographic tags using at least one of a QR code, and data matrix.

13. A method for verifying one or more holographic tags, the method comprising: extracting one or more values from the one or more scanned code; performing a process to decode and decrypt using meta data the extracted first value to obtain one or more decoded and decrypted codes;

hashing the one or more decoded and decrypted values with the same hashing function used during code generation process;

comparing the one or more hashed results with one or more hashed values stored in the database to verify the decoded and decrypted codes;

notifying the user that the holographic tag failed to verify, if the hashed value does not match with any value stored in the database;

instructing the user to move the user device at different angles to capture the different flip-flop texts embossed on the holographic tags, if the decrypted codes matched with the codes stored in the database;

comparing the captured flip-flop texts with one or more flip-flop texts stored in the database for verification;

notifying the user that the holographic tag failed to verify, if the flip-flop texts mismatched with the texts stored in the database; and

indicating to the user that the holographic tag verified, if the flip-flop texts matched with the texts stored in the database.

14. A system for verifying one or more holographic tags, the system comprising: a memory unit for storing one or more instructions; and

a processing unit connected to the memory unit, wherein the processing unit is adapted to perform the steps comprising:

scanning, by an application module of a user device, one or more 2D codes printed on the one or more Holographic tags, wherein the one or more codes include one or more encoded key parameters;

extracting one or more first value from the one or more scanned code; performing a process to decrypt and decode the extracted first value to obtain one or more decrypted codes;

hashing the one or more decrypted and decoded value with a hashing function comparing the one or more hashed values with one or more values stored in a database to verify the decrypted and decoded codes;

notifying the user that the holographic tag failed to verify, if the read, decrypted, hashed value mismatched with the value stored in the database; fetching a moire decode key and one or more security parameters, read, decrypted, hashed value matched with the value stored in the database; capturing image frames by the moire decode key from the tag using an image processing library to obtain a text decoded by the moire decode key;

comparing the decoded text with a text stored in the database for verification;

notifying the user that the holographic tag failed to verify, if the decoded text mismatched with the text stored in the database; and

indicating to the user that the holographic tag verified, if the decoded second text matched with the text stored in the database.

15. The system as claimed in claim 14, wherein the database is configured to be in at least one of the memory unit and a network server.

16. The system as claimed in claim 14, wherein the processing unit is adapted to communicate with the network server through a communication unit to store or extract the content in the network server.

17. A system for verifying one or more holographic tags, the system comprising: a memory unit for storing one or more instructions; and

a processing unit connected to the memory unit, wherein the processing unit is adapted to perform the steps comprising:

scanning, by an application module of a user device, one or more 2D codes printed on the one or more Holographic tags, wherein the one or more codes include one or more encoded key parameters; extracting one or more first value from the one or more scanned code; performing a process to decrypt and decode the extracted first value to obtain one or more decrypted codes;

hashing the one or more decrypted and decoded value with a hashing function

comparing the one or more hashed values with one or more values stored in a database to verify the decrypted codes;

notifying the user that the holographic tag failed to verify, if the read, decrypted, hased value mismatched with the value stored in the database; instructing the user to move the user device at different angles to capture the different flip-flop texts embossed on the holographic tags, if the read, decrypted, hashed value matched with the value stored in the database; comparing the captured flip-flop texts with one or more flip-flop texts stored in the database for verification;

notifying the user that the holographic tag failed to verify, if the flip-flop texts mismatched with the texts stored in the database; and

indicating to the user that the holographic tag verified, if the flip-flop texts matched with the texts stored in the database.

Description:
SYSTEM AND METHOD FOR GENERATING AND VERIFYING

HOLOGRAPHIC TAGS

RELATED APPLICATION

The present invention claims benefit of the Indian Provisional Application No. 201741044803 titled “SYSTEM AND METHOD FOR GENERATING AND VERIFYING HOLOGRAPHIC TAGS” filed on 13 th December 2017 by Vikas Kumar, Dinesh Kumar Jain, and Mukesh Kumar Jain, which is herein incorporated in its entirety by reference for all purposes.

FIELD OF THE INVENTION

The present invention relates to system and method for generating and verifying holographic tags and more particularly the method for combining the use of hidden security features like moire hidden text, multi-dimensional security elements like flip- flop text with uniquely coded holographic tag wherein the code itself is printed on the hologram for verification using a smart communication device.

BACKGROUND OF THE INVENTION

Since decades holograms have been used as a security feature for identifying the authenticity of the products. Presently, holograms are now widely available in variety of formats such as holographic shrink sleeves, blister packaging aluminum foil, holographic induction cap seals, polyester-based tamper evident labels, and holographic hot stamping foils etc., However, it is found that it is rather easy to counterfeit the holograms that are used, though it was commonly believed that holograms are not possible to counterfeit. Also, another major disadvantage of holograms is that it is impractical to communicate the features the end user need to look for in holograms. Presently, multiple methods are being employed to prevent counterfeiting such as RFID, Holograms, Unique codes with holograms, labels, holograms with visible security patterns verified using app, etc. However, these are cumbersome, expensive, and difficult to verify and not always provide complete security. Among the above, holograms with unique QR code and holograms with visible security patterns, which are then verified using mobile application, stand out, however these methods also suffer from few drawbacks and do not provide a foolproof authentication method. Also counterfeiters have been able to hack holograms with visible security patterns by simply using photocopies of the holograms.

Though hologram tags coded with QR or Data matrix Code are easy to set up, install and verify, however in case if a counterfeiter obtains a list of codes from products on shelf, he can get the hologram replicated to look exactly same as the hologram on the product and use these counterfeit tags on a small set of items. While this may not be an issue for low value items, high value items are at risk where even a single counterfeit sold badly impacts the brand’s reputation and revenues.

According, there is still a huge need for a method and system for generating and verifying holographic tags which overcomes the above shortcomings and other problems associated with the known verification methods. All the above methods employ a code or pattern that is visible to the naked eye and hence are relatively easy to hack. It is need of the hour a method is employed wherein the unique elements are not visible to the naked eye and also verifiable through a modern communication device.

The above-mentioned shortcomings, disadvantages and problems are addressed herein and which will be understood by reading and studying the following specification. The method employs a pattern that is not visible to the naked eye and/or a pattern that is visibly different when viewed at different angles or conditions and also discernable using a communication device. SUMMARY OF THE INVENTION

An object of the present invention is to provide a holographic tag which combines a hidden security feature like hidden text or a multi-dimensional feature like a flip-flop text and a unique code printed on the holographic tag to be applied to the products, thereby making it difficult to replicate, tamper, or use in a fraudulent manner.

Another object of the present invention is to provide a method that facilitates the usability of holographic tags with unique codes that enhances its security features.

Yet another object of the present invention is to provide a method that incorporates hidden elements using a moire pattern for verification so that the same is not easily accessible to counterfeiters. Further object of the present invention is to provide a method that incorporates partial hidden elements for verification so that the same is not easily accessible to counterfeiters.

The various embodiments of the present invention disclose system and method for generating and verifying the holographic tags to eliminate the likelihood of counterfeiting.

According an embodiment of the present invention, the present invention describes a method for generating one or more holographic tags. The method comprises defining one or more texts, performing a first process to design and generate the one or more holographic tags by embossing the one or more defined texts, hiding the embossed texts on the holographic tags using a moire pattern, generating alphanumeric random values using a natural entropy, performing one-way hashing function on the generated alpha numeric random value to generate one or more hashed value and save it to a database, performing a second process to encrypt and encode the unhashed value, and printing the encoded value on the one or more holographic tags as a 2D code such as using at least one of a QR code, and data matrix.

In one embodiment, the method further comprises performing a 2-way encryption function on the alpha numeric random values followed by an encode process, and adding meta data to the output of the 2-way encryption function to enable decoding and/or decryption during a verification process.

In another embodiment, the method comprises storing the one or more defined texts and one or more hashed codes in a database.

In yet another embodiment, the method comprises performing a verification process using one or more reference markers on the holographic tag.

According another embodiment of the present invention, the present invention describes a method for verifying one or more holographic tags. The method comprises scanning, by an application module of a user device, one or more codes printed on the one or more Holographic tags, extracting one or more value from the one or more scanned codes, performing a process to decode and decrypt, using meta data, the extracted value to obtain one or more decoded and decrypted codes, hashing the one or more decoded and decrypted codes value with the same hashing function used during code generation process, comparing the one or more hashed results with one or more hashed value stored in the database to verify the decrypted codes, notifying the user that the holographic tag failed to verify, if the hashed value does not match with a value stored in the database, fetching corresponding moire decode key and one or more security parameters, if the hashed value matches with the value stored in the database, capturing image frames using the moire decode key from the tag using an image processing library and reference markers to obtain a text decoded using the moire decode key, comparing the decoded text with a text stored in the database for verification, notifying the user that the holographic tag failed to verify, if the decoded text mismatched with the text stored in the database, and indicating to the user that the holographic tag verified, if the decoded text matched with the text stored in the database. According yet another embodiment of the present invention, the present invention describes a method for generating one or more holographic tags, the method comprises defining one or more flip-flop texts, performing a first process to design and generate the one or more holographic tags by embossing the one or more defined flip-flop texts, capturing one or more security parameters, one or more flip-flop texts, and one or more angles at which the texts being visible, generating alphanumeric random value using natural entropy, performing one-way hashing function on the generated alpha numeric random value to generate one or more hashed value and save it to a database, performing a process to encrypt and encode the unhashed value, and printing the encoded value on the one or more holographic tags as a 2D code. According yet another embodiment of the present invention, the present invention describes a method for verifying one or more holographic tags. The method comprises extracting one or more values from the one or more scanned code, performing a process to decode and decrypt using meta data, the extracted first value to obtain one or more decoded and decrypted codes, hashing the one or more decoded and decrypted values with the same hashing function used during code generation process, comparing the one or more hashed results with one or more hashed values stored in the database to verify the decoded and decrypted codes, notifying the user that the holographic tag failed to verify, if the hashed value does not match with any value stored in the database, instructing the user to move the user device at different angles to capture the different flip-flop texts embossed on the holographic tags, if the decrypted codes matched with the codes stored in the database, comparing the captured flip-flop texts with one or more flip-flop texts stored in the database for verification, notifying the user that the holographic tag failed to verify, if the flip-flop texts mismatched with the texts stored in the database, and indicating to the user that the holographic tag verified, if the flip-flop texts matched with the texts stored in the database.

According yet another embodiment of the present invention, the present invention describes a system for verifying one or more holographic tags. The system comprises a memory unit for storing one or more instructions, and a processing unit connected to the memory unit. The processing unit is adapted to perform the steps of a method that verifies one or more holographic tags according to an embodiment disclosed above. In one embodiment, the database is configured to be in at least one of the memory unit and a network server.

In one embodiment, the processing unit is adapted to communicate with the network server through a communication unit to store or extract the content in the network server. According further embodiment of the present invention, the present invention describes a system for verifying one or more holographic tags. The system comprises a memory unit for storing one or more instructions, and a processing unit connected to the memory unit. The processing unit is adapted to perform the steps of a method that verifies one or more holographic tags according to an embodiment disclosed above in which text is a flip-flop text.

BRIEF DESCRIPTION OF THE DRAWINGS

The other objects, features and advantages will occur to those skilled in the art from the following description of the preferred embodiment and the accompanying drawings in which:

Figure 1 is a flow chart illustrating the steps of a method of generating the holographic tags, according to an embodiment of the present invention. Figure 2 is a flow chart illustrating the steps of a method of verifying the holographic tags by the user, according to an embodiment of the present invention. Figure 3 is an illustration of steps of method of generating a holographic tag, in accordance with another embodiment of the present invention.

Figure 4 is an illustration of steps of a method of verifying the holographic tags, in accordance with another embodiment of the present invention.

Figure 5 is a schematic diagram illustrating a system for verifying the holographic tags by the user, according to an embodiment of the present invention.

Although specific features of the present invention are shown in some drawings and not in others, this is done for convenience only as each feature may be combined with any or all of the other features in accordance with the present invention.

BRIEF DESCRIPTION OF THE INVENTION In the following description of the embodiments of the invention, reference is made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims.

The specification may refer to“an”, “one” or“some” embodiment(s) in several locations. This does not necessarily imply that each such reference is to the same embodiment(s), or that the feature only applies to a single embodiment. Single features of different embodiments may also be combined to provide other embodiments.

As used herein, the singular forms“a”,“an” and“the” are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms“includes”,“comprises”,“including” and/or“comprising” when used in this specification, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term“and/or” includes any and all combinations and arrangements of one or more of the associated listed items.

Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure pertains. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.

The present invention describes a system and method for generating and verifying the holographic tags to eliminate the likelihood of counterfeiting. The method of generating the holographic tag combines the use of moire pattern text with uniquely coded holographic tag wherein the code itself is printed on the hologram using QR Code, data matrix or any other similar encoding pattern. The tag has a predefined hidden text embossed at the time of manufacturing the hologram along with a reference marker simultaneously or at a later point of time using a thermal transfer printer or a similar device. The text is made hidden by using a Moire Pattern on the text. The hidden text is only visible when a tag is viewed using a complementary moire pattern key at a predefined angle or overlapped on the image of the label captured via communication device using image-processing technology. The holographic tag is then encrypted and followed by encoded with a unique code printed as a QR code, data matrix code or a similar code. The code is generated by a function that uses random system noise or from any other source providing randomness and it is hashed using SHA256 or a similar hashing method. The hashed code is then stored in the database for verification later and the original unhashed code is then encoded using a 2-way encryption function. This encrypted code is printed on the holographic tag using a thermal printer or a similar device and the holographic tag can be verified by the customer using a mobile application on their device.

According to the present invention, the method of verifying the holographic tag comprises of scanning the unique code printed on the holographic tag in the form of QR code or data matrix. The scanned code is then decoded and decrypted using the decryption function to arrive at the original code. The original unhashed code is then hashed and matched with the hashed value stored in the database. In case of code mismatch, the customer is notified of the same and if the code is matched with the value stored on the database then the customer is guided to the next step along with the system fetching the holographic security parameters like moire pattern key and the moire pattern angle and other security parameters. The holographic parameters are used to verify the holographic tag. In the next step the user could be directed to align the reference markers shown on his device to the reference markers on the holographic tag. In the subsequent step the image or frames captured through the communication device are processed through an image processor wherein the holographic parameters stored earlier are used to verify the presence of the hidden elements. The complementary of Moire pattern Key used to hide the text is overlaid with the image captured to expose the hidden elements. Further using image-processing technology the processed frame or image is analyzed for the presence of the hidden text. The text is only visible if the tag is authentic and the right parameters and decode Key are used. Optical Character Recognition (OCR) is used to capture the text. The captured digital text is matched with the expected text. If the text matches then the user is notified of the valid tag and in case of mismatch the user is notified that the holographic tag is an invalid one.

Figure 1 is an illustration of steps 100 of method of generating a holographic tag, in accordance with an embodiment of the present invention. The method is depicted as a collection of steps in a logical flow diagram, which represents a sequence of steps that can be implemented in hardware, software, or a combination thereof.

Initially, the one or more texts are defined for embossing on the holographic tag. At step 102, the Holographic tag is designed and generated with one or more predefined hidden text and other security features and also reference markers if required. The security features and/or reference markers are defined by the manufacturer and included in the Holographic tag based on the customer requirements. The predefined text is converted into a hidden text by using a moire pattern. In one embodiment, the text is a human-readable sequence of characters and/or words. The tag is designed with the custom logo of the desired brand/design or any image. The moire pattern that enables viewing of the hidden text is designed and captured. Thereafter, Holographic parameters including the Moire Pattern and other security parameter are stored.

At step 104, the required quantities of tags are manufactured using any standard hologram manufacturing process.

Next, at step 106, a required number of alphanumeric codes or alphanumeric random values are generated by providing cryptographic random codes by using natural entropy drawn from the environmental noise collected from the device drivers and other sources or any other similar process which is employed to ensure that the code is always unique.

Subsequently, at step 108, one-way hashing function such as SHA256 or any other similar hashing function, is performed on the alphanumeric random values generated in the step 106, to generate one or more hashed value before storing in the database. Also, at step 110, the key parameters from step 102 are also mapped to the hashed value stored in the database for use in verification process later. At step 112, the originally generated code is passed through a 2-way encryption function followed by an encode process. Further, at a step 114, the Meta data is added to the output of the 2-way encryption function to enable decoding during the verification process. In one embodiment, the method includes either encryption or encoding process.

Next, at step 116, the encrypted and/or encoded value is printed on the tag manufactured in the step 106, using any standard bar printer in form of 2D code such as QR Code, data matrix code or any other similar coding methodology. It should be noted here that the steps 102 to 116 are only illustrative and other alternatives can also be provided where one or more steps are added, one or more steps are removed, or one or more steps are provided in a different sequence without departing from the scope of the invention. Figure 2 is an illustration of steps 200 of a method of verifying the holographic tags, in accordance with an embodiment of the present invention. The method is depicted as a collection of steps in a logical flow diagram, which represents a sequence of steps that can be implemented in hardware, software or a combination thereof. At step 202, the user verifies the authenticity of an item by scanning the tag applied to the item using an application module of a user device. The application module scans the code printed on the tag generated at the step 116 of the Figure 1. In one embodiment, the user device is a smart phone or computing device. Next at step 204, the one or more value is extracted from the scanned code using a standard 2d code library, wherein the extracted value further passes through a process of decoding and decrypting using the Meta data available with the extracted code. In one embodiment, the method includes either decoding or decrypting process.

Further at step 206, the decoded and/or decrypted codes are passed through the same one-way hashing function which is then verified with the database.

At step 208, the one or more hashed results (of step 206) are compared with the one or more hashed value stored in the database to verify the decoded and/or decrypted codes. If the code is not matching with any value stored in the database then the same is notified to a user as an invalid code at step 210. If the code match is found in the database then the user is taken to step 212 for further verification.

Next at step 212, the moire decode key and one or more security parameters saved in the step 102 and mapped in 110 of the Figure 1 are fetched.

Further at step 214, the device continuously captures frames of the tag via an image processing library and overlaps with the key to arrive at the decoded text. In one embodiment, the reference marker provided on tag/labels is used for fast detection. The overlapped image is continuously passed through an OCR (optical character recognition) library to read the covert text from the overlapped image. If the text is not found in the OCR then step 214 is again repeated till a text is visible for a certain pre defined duration. If text is found then the decoded and/or decrypted text is then matched with the text saved in database during the steps illustrated in Figure 1.

At step 216, the text is checked to find out if the text if matching with any of the value in database. If the text is not matching, then the user is notified of the same at step 218 and the user comes to know that the holographic tag applied to the item is fake and the item is a counterfeit. Subsequently at step 220, if the text is matching the value stored in the database then a valid code message is indicated to the user. Based on the valid code displayed, the user comes to know that the holographic tag applied to the item is not a fake and that the item is an authentic product.

It should be noted here that the steps 202 to 216 are only illustrative and other alternatives can also be provided where one or more steps are added, one or more steps are removed, one or more steps are provided in a different sequence without departing from the scope of the claims herein.

According to another embodiment, the present invention describes a system and method for generating a holographic tag by using a flip-flop text, and also verifying the same by using a smart device to eliminate the likelihood of counterfeiting. The flip flop text is considered to be partially hidden as text is only visible when it is viewed at the correct angle.

At the generating end, the Holographic tag is designed by defining the one or more predefined flip-flop texts and also specifying the location of the same on the holographic tag. Then, the tag is designed with the custom logo of the desired brand/design or any image. The Holographic security parameters includes but not limited to the flip-flop texts, holographic colors and other security parameters are stored.

Subsequently, the encryption and/or encoding process is performed. Once all the steps mentioned in Figure 2 are carried out, the required quantities of tags are manufactured using any standard hologram manufacturing process and the encoded value is printed on the tag.

At the verification end, the authentication of Holographic tag and flip-flop texts are carried out according to the steps mentioned in Figure 4. Figure 3 is an illustration of steps 300 of method of generating a holographic tag, in accordance with another embodiment of the present invention. The method is depicted as a collection of steps in a logical flow diagram, which represents a sequence of steps that can be implemented in hardware, software, or a combination thereof.

Initially, the one or more texts are defined for embossing on the holographic tag. At step 302, the Holographic tag is designed and generated with one or more predefined flip-flop texts. The tag is designed by embossing the one or more flip-flop texts and their location on the holographic tag. The tag is also designed with the custom logo of the desired brand/design or any image. Thereafter, Holographic security parameters like the flip-flop texts, holographic colors and one or more security parameters are stored. The one or more security parameters are defined by the manufacturer and included in the Holographic tag based on the customer requirements. Then required quantities of tags are manufactured using any standard hologram manufacturing process.

At step 304, a required number of alphanumeric codes or alphanumeric random value are generated by providing cryptographic random codes by using natural entropy drawn from the environmental noise collected from a device driver and other sources or any other similar process which is employed to ensure that the code is always unique.

Subsequently, at step 306, one-way hashing function such as SHA256 or any other similar hashing function, is performed on the generated alphanumeric random value at step 304, to generate one or more hashed value before storing in the database. Also, at step 308, the key parameters from step 302 are mapped to the hashed value stored in the database for use in verification process later.

At step 310, the originally generated code is passed through a 2-way encryption function followed by an encode process. Further, at a step 312, the Meta data is added to the output of the 2-way encryption function to enable decoding during the verification process. In one embodiment, the method includes either encryption or encoding process.

Next, at step 314, the decrypted and/or encoded value is printed on the tag manufactured in the step 304, using any standard bar printer in form of 2D code such as QR Code, data matrix code or any other similar coding methodology.

It should be noted here that the steps 302 to 314 are only illustrative and other alternatives can also be provided where one or more steps are added, one or more steps are removed, or one or more steps are provided in a different sequence without departing from the scope of the invention.

Figure 4 is an illustration of steps 400 of a method of verifying the holographic tags 400, in accordance with another embodiment of the present invention. The method is depicted as a collection of steps in a logical flow diagram, which represents a sequence of steps that can be implemented in hardware, software or a combination thereof.

At step 402, the user verifies the authenticity of an item by scanning the tag applied to the item using an application module of a user device. The mobile application scans the code printed on the tag generated from the step 314 of the Figure 3. In one embodiment, the user device is a smart phone or a computing device.

Next at step 404, one or more value is extracted from the scanned code using a standard 2d code library, wherein the extracted value further passes through the decode and decryption process using Meta data available with the extracted code. In one embodiment, the method includes either decoding or decrypting process.

Further at step 406, the decoded and/or decrypted code is then passed through the same one-way hashing function which is then verified with the database. At step 408, the one or more hashed result (generated at step 406) is compared with the one or more hashed values stored in the database to verify decoded and/or decrypted code. If the code is not matching with any value stored in the database then the same is notified to user as an invalid code. If the code match is found in the database then the user is taken to step 410 for further verification.

Next at step 410, the user is requested to move his device at different angles to capture the different flip-flop texts embossed on the hologram. Using the image processing technology, the hologram is scanned for visible text using OCR and at each angle the captured text is compared with the known text available in the database. In one embodiment, a reference marker is used as a filter to capture text only from a particular area of the tag or label. Additionally, one embodiment also verifies other security features like the holographic colors reflected at the respective angles etc.

At step 414, each flip-flop text and other parameters are checked to verify if they match values in database. In case text does not match, the user is notified of an invalid tag.

If the text matches, the user is notified of a valid tag at step 416.

It should be noted here that the steps 402 to 414 are only illustrative and other alternatives can also be provided where one or more steps are added, one or more steps are removed, one or more steps are provided in a different sequence without departing from the scope of the claims herein.

Figure 5 is a schematic diagram illustrating a system 500 for verification of the holographic tags, according to an embodiment of the present invention. According to the Figure 5, the system 500 comprises of an input device 502, a memory unit 504, a processing unit (also refer as image processing unit) 506, a communication unit 508, a network server 510 and a display unit 512. The image processing unit 506, as used herein, means specially configured computational circuit, such as, but not limited to, a microprocessor, microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.

The memory Unit 504 includes a plurality of modules stored in the form of executable program which instructs the image processing unit 504 to perform the method steps illustrated in Figure 2 & 4

The input unit 502 instructs the image processing unit 506 to perform the step 202 & 402 of the Figure 2 & 4 respectively. In one embodiment, the image processing unit 506 is adapted to communicate with the network sever through a communication unit, to store or extract the content in the network server. The image processing unit 506 executes the instruction to scan the text and verifies the text with the database either locally present in the device or with the database in the network server 510 via the communication unit 508. The display unit 512 displays the results to the user performing the verification process.

Although the embodiments herein are described with various specific embodiments, it will be obvious for a person skilled in the art to practice the invention with modify citations. However, all such modifications are deemed to be within the scope of the claims. It is also to be understood that the following claims are intended to cover all of the generic and specific features of the embodiments described herein and all the statements of the scope of the embodiments which as a matter of language might be said to fall there between.