Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD OF IDENTIFICATION OF PRODUCTS OR OBJECTS
Document Type and Number:
WIPO Patent Application WO/2023/027646
Kind Code:
A1
Abstract:
An alphanumeric code with a variable string is issued for the product in the input block, which when inserted into the access panel where certificate requests are entered, allows the user access to the required actions, while the input block is equipped with WLAN and WIFI connections, and the system is equipped with LCD a display for displaying information, then the data entered into the input block is connected with the unique data of the user card and sent to the blockchain and subsequently are registered and certified as a database key, where this data is then transformed into an encrypted alphanumeric string that is identified as a hardware key that consists of a specific security code and its characteristics consist of variable strings, then the same hardware key is inserted into a password-protected security folder in a hardware system that allows this hardware system to be recognized, whereby this hardware key cannot be read or copied, then the blockchain receives a request from the user by means of the hardware system and generates the sent key coming from the protected hardware key chain to obtain the access key of the private key in the final phase, then at the time of the request made by means of the access block, the system requests by means of the input panel to enter the personal identification code assigned to the user, then this identification code is checked in the waiting block to allow access and generate a private key to gain access to the inspection block, then the blockchain automatically acquires database keys from its databases and on its backups and then decodes them, to check the validity of the sent key, which the hardware system constantly sends, all checks are performed in the inspection block, where all the data needed for final verification is located. the validation of the communication immediately generates a private key and sends it to the hardware system, which will be used by the user to access the certificate creation services, then the private key generated in symbiosis between the hardware system and the blockchain is inserted into certificates, which are generated only in the presence of a verified private key, whereby this certificate access security system being enabled by the presence of a security hardware system that uniquely verifies who generates the certificates, which makes it impossible to perform this operation without the use of security hardware and user identification.

Inventors:
ALEMANNO COSIMO (IT)
FALICRO DELL AGATA (IT)
Application Number:
PCT/SK2021/050013
Publication Date:
March 02, 2023
Filing Date:
October 08, 2021
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
EN GROUP S R O (SK)
International Classes:
H04L9/32
Domestic Patent References:
WO2020106374A12020-05-28
WO2018176140A12018-10-04
WO2016164496A12016-10-13
Foreign References:
US10176481B22019-01-08
Other References:
See also references of EP 4165827A4
Attorney, Agent or Firm:
BELIČKA, Ivan (SK)
Download PDF:
Claims:
PATENT CLAIMS Method of identification of products or objects, characterized in that an alphanumeric code with a variable string is issued for a product in the input block, which, when inserted into the access panel where certificate requests are entered, allows the user to access the required actions, whereby the input block being equipped WLAN and WIFI connections, as well as the system is equipped with an LCD display for displaying information, then the data entered into the input block is connected with the unique data of the user card and sent to the blockchain and then registered and certified as a database key, where this data is then transformed into an encrypted alphanumeric string that is identified as a hardware key that consists of a specific security code and its characteristics consists of variable strings, then the same hardware key is inserted into a password-protected security folder in a hardware system that allows this hardware system to be recognized, whereby this hardware key cannot be read or copied, then the blockchain receives a request from the user by means of the hardware system and generates the sent key coming from the protected hardware key string to obtain the access string of the private key in the final phase, then at the time of the request made by means of the access block, the system requests by means of the input panel to enter the personal identification code assigned to the user, then this identification code is checked in the waiting block to allow access and generate a private key to gain access to the inspection block, then the blockchain automatically acquires database keys from its databases and on its backups and then decodes them, to check the validity of the sent key, which the hardware system constantly sends, all checks are performed in the inspection block, where all the data needed for the final verification is located, after verifying the validity of the communication, the system immediately generates a private key and sends it to the hardware system, which will serve the user to access certificate services, then the private key generated in symbiosis between the hardware system and the blockchain is inserted into certificates, which are generated only in the presence of an authenticated private key, while this certificate access security system is enabled by the presence of a security hardware system that allows unique authentication of who generates certificates, making it impossible to perform this operation without use of security hardware and user identification.

8

Description:
METHOD OF IDENTIFICATION OF PRODUCTS OR OBJECTS

Technical field

The invention relates to a method for identification of products or objects respectively identification system to identify food products, products and copyrighted works such as software, cinematographic works, works of art, musical works, literary works and others which may be protected by copyright and are tradable.

Background of the invention

On the present, the copying, selling of fakes and counterfeits is a big phenomenon. Also, the sale of products with unclear origin or country of origin. Various certificates or declarations of conformity, which are usually made like paper versions, are used to verify the authenticity of articles, products and copyrighted works. Alternatively, they refer to invoices or only to the merchant's declaration of authenticity. The main disadvantage is that these documents are easily counterfeited, and customers are not sure whether the purchased goods are original.

Subject of the invention

The deficiencies mentioned in the current state of the art are eliminated by the invention described in this patent application, the essence of which consists in the fact that the manufacturer, originator, author or producer or person who has the rights to place a product, food, product or work on the market (hereinafter "authorized person”) creates a protocol on the sold product, which contains information about the date and place of creation, information about the manufacturer or the author, information on the product itself or the author's work, or on the minimum durability, or information on the specific conditions of use, storage or holding of the sold product. Information about the sold product is converted into a QR code. The authorized person thus creates an electronic certificate for the sold product, in which the subsequent seller is also listed. This subsequent seller is entitled to supplement the details of the other seller when redistributing the sold product. When selling a product to an end customer, the customer has the opportunity to find out true and complete information about the product, its composition, date of manufacture, origin, previous sellers or previous owners by scanning the QR code with a smartphone with the appropriate application.

An alphanumeric code with a variable string is issued for the product in the input block, which, when is inserted into the access panel where certificate requests are entered, allows the user to access the required actions. The input block is equipped with WLAN and WIFI connections and the system also guarantees the display of information that the user can read by means of LCD displays. The input block with access panel and display allows interaction with the blockchain (distributed database).

In general, a system key can be public or private, depending on the operating procedure required by the act in the software. This key is identifiable by a unique alphanumeric string that allows the system certain identification. In a software protocol, which can often be used to increase security and identify a user or a unique action at runtime, several levels of keys are correlated, which are evaluated by the software to provide access to the system to various activities required by either user or protocol.

The data entered to the input block is combined with the unique data of the user card and sent to the blockchain and subsequently registered and certified as a database key.

This data is then transformed into an encrypted alphanumeric string, which is identified as a hardware key that consists of a specific security code and its characteristics consists of variable strings. The same hardware key is inserted in a password-protected security folder in the hardware system that allows the hardware system to be recognized, and the hardware key cannot be read or copied.

The blockchain receives a request from the user through the hardware system and generates a sent key originating from the protected string by the hardware key, to obtain the access string of the private key in the final stage. The private key is one of the 4 security keys that the system requires when accessing the certification panel.

A hardware key is an alphanumeric string written in a file, inside a password-protected folder (directory) located in the hardware operating system and stored in the hardware during configuration, i.e. before delivering the hardware to the customer. It consists of a special security code and is characterized by the fact that it is not standard but structured in variable strings, which means that its length is constantly changing in this way, and even if it can be detected, this key cannot be used as a reference point, because the data it contains is placed in an encrypted way at different places in the string using a variable algorithm.

Even compared to other files contained in other hardware, these files would be different, both in data (variable encryption) and in length (len).

The hidden data in this string is:

- Unique user ID.

- A unique user code referring to his position in the blockchain protocol.

- Hardware database key, generated by the system during the installation phase of the hardware, which is delivered to the customer and which is bound to MAC-ADDRESS (unique code issued by the hardware manufacturer).

- Other control codes.

At the time of submitting a request made by means of the input block, the system requests the input of a personal code of identification code, which is assigned to the user, by means of the input panel.

An identification key is a code delivered to a customer who physically owns the hardware through which access to a certification platform can be obtained. This key is required for the verification of hardware that requires access to the system. If the identification code is not recognized, the verification and private key assignment process will not even start.

This identification code is checked in the waiting block to allow access and to generate a private key to gain access to the inspection block. The waiting block is a virtual point of the blockchain authentication system, where, by verifying the properties of the check criterion, it verifies the applicants/users and requests that require some action from the system. This point is designed as a collection access/verification point that can separate all real requests from those unnecessary.

The inspection block manages the matching criteria using the database key required by the requests that are in the waiting block. After agreeing to the generation protocol, if necessary, it will allow the creation of the last access key, which will be displayed on the display of the hardware owned by the customer (private key).

This system makes it possible to prevent unnecessary blockchain overload due to incoming unnecessary or false demands.

Blockchain automatically acquires database keys from its databases and on its backups and then decodes them, to check the validity of the sent key, which the hardware system constantly sends. All inspections are performed in the inspection block, which contains all the data necessary for the final verification. After verifying the validity of the communication, the system immediately generates a private key and sends it to the hardware system, which will be used by the user to access the certificate creation services.

The private key generated in the symbiosis between the hardware system and the blockchain is inserted into the certificates, which are generated only in the presence of a verified private key.

This security system for access to certificates is enabled by the presence of a security hardware system that allows you to uniquely verify who generates the certificates, which makes it impossible to perform this operation without the use of security hardware and user identification.

The QR code is generated by a specific certification request that must be entered by the user, linked to a file or product. It is the blockchain protocol that issues the certificate and confirms it in the same protocol. The certificate is accompanied by a unique code "CBO" (a unique string identifying the certificate), which is part of the QR code, along with data for connection to websites, which display all the data of the product.

To create a certificate, it is necessary to have a sufficient status of purchased, prepaid credits for the generation of certificates.

Using smartphones, tablets or PDA devices, users can view the certificate, read information about the product, its origin and ownership. The QR code generated and present on the product can be read by any application capable of reading the QR code.

Examples of embodiments

An alphanumeric code with a variable string is issued for the product in the input block, which, when inserted into the access panel where certificate requests are entered, allows the user to access the required actions. The input block is equipped with WLAN and WIFI connections and the system also guarantees the display of information that the user can read by means of LCD displays. The input block with access panel and display allows interaction with the blockchain. In general, a system key can be public or private, depending on the operating procedure required by the act in the software. This key is identifiable by a unique alphanumeric string that allows the system a certain identification. In a software protocol, which can often be used to increase security and identify a user or a unique runtime task, several levels of keys are correlated, which are evaluated by the software to provide access to the system to various activities required by either user or protocol.

The data entered to the input block is connected with the unique data of the user card and sent to the blockchain and subsequently registered and certified as a database key.

This data is then transformed into an encrypted alphanumeric string, which is identified as a hardware key that consists of a specific security code and its characteristics consist of variable strings. The same hardware key is inserted in a password-protected security folder in the hardware system that allows the hardware system to be recognized, and the hardware key cannot be read or copied.

The blockchain receives a request from the user through the hardware system and generates a sent key originating from the protected string by the hardware key, to obtain the access string of the private key in the final stage. The private key is one of the 4 security keys that the system requires when accessing the certification panel.

A hardware key is an alphanumeric string written in a file, inside a password-protected folder (directory) located in the hardware operating system and stored in the hardware during configuration, i.e. before delivering the hardware to the customer. It consists of a special security code and is characterized by the fact that it is not standard but structured in variable strings, which means that its length is constantly changing in this way, and even if it can be detected, this key cannot be used as a reference point, because the data it contains is placed in an encrypted way at different places in the string using a variable algorithm.

Even compared to other files contained in other hardware, these files would be different, both in data (variable encryption) and in length (len).

The hidden data in this string is:

Unique user ID.

A unique user code referring to his position in the blockchain protocol.

Hardware database key, generated by the system during the installation phase of the hardware, which is delivered to the customer and which is bound to MAC-ADDRESS (unique code issued by the hardware manufacturer).

Other control codes.

At the time of submitting a request made by means of the input block, the system requests the input of a personal code of identification code, which is assigned to the user, by means of the input panel. An identification key is a code delivered to a customer who physically owns the hardware through which access to a certification platform can be obtained. This key is required for the verification of hardware that requires access to the system. If the identification code is not recognized, the verification and private key assignment process will not even start.

This identification code is checked in the waiting block to allow access and to generate a private key to gain access to the inspection block. The waiting block is a virtual point of the blockchain authentication system, where, by verifying the properties of the check criterion, it verifies the applicants/users and requests that require some action from the system. This point is designed as a collection access/verification point that can separate all real requests from those unnecessary.

The inspection block manages the matching criteria using the database key required by the requests that are in the waiting block. After agreeing to the generation protocol, if necessary, it will allow the creation of the last access key, which will be displayed on the display of the hardware owned by the customer (private key).

This system makes it possible to prevent unnecessary blockchain overload due to incoming unnecessary or false demands.

Blockchain automatically acquires database keys from its databases and on its backups and then decodes them, to check the validity of the sent key, which the hardware system constantly sends.

All inspections are performed in the inspection block, which contains all the data necessary for the final verification. After verifying the validity of the communication, the system immediately generates a private key and sends it to the hardware system, which will be used by the user to access the certificate creation services.

The private key generated in the symbiosis between the hardware system and the blockchain is inserted into the certificates, which are generated only in the presence of a verified private key. This security system for access to certificates is enabled by the presence of a security hardware system that allows you to uniquely verify who generates the certificates, which makes it impossible to perform this operation without the use of security hardware and user identification.

The QR code is generated by a specific certification request that must be entered by the user, linked to a file or product. It is the blockchain protocol that issues the certificate and confirms it in the same protocol. The certificate is accompanied by a unique code "CBO" (a unique string identifying the certificate), which is part of the QR code, along with data for connection to websites, which display all the data of the product.

To create a certificate, it is necessary to have a sufficient status of purchased, prepaid credits for the generation of certificates.

Using smartphones, tablets or PDA devices, users can view the certificate, read information about the product, its origin and ownership. The QR code generated and present on the product can be read by any application capable of reading the QR code.