Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

A technique to allow consumers to quickly determine the legitimacy of a single or a group of items purchased through POS or Online ordering systems.

IP.com Disclosure Number: IPCOM000235864D
Publication Date: 2014-Mar-28
Document File: 4 page(s) / 52K

Publishing Venue

The IP.com Prior Art Database

Abstract

This article provides a mechanism for conusmers to quickly and easily validate if the items they have purchased are authentic or not even without having to look at all the individual items they have purchased. The proposed mechanism provides a soultion to notify the user about the existence of a counterfeit item by means of an icon or code that enables the customer to understand there is atleast one counterfeit item in a group of items. This further allows the customer to take decisive action to verify the items which the system notifies to be counterfiet.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 34% of the total text.

Page 01 of 4

A technique to allow consumers to quickly determine the legitimacy of a single or a group of items purchased through POS or Online ordering systems .

Generally, consumers tend to buy a lot of items during shopping (typical example is from a medical store or from retail outlets or super markets). It becomes a great challenge for the consumer to verify if all the items he/she has purchased or really genuine or if there are some items that are counterfeit in nature. Hence, the existing solution creates couple of challenges for the consumers:
1. If the consumer has purchased large number of products/items, it is a tedious effort for the consumer to manually validate the authenticity of each of the product
2. It's a well known fact that for experts in this area, it is easy to forge the POS devices such that they just scan the product information and can reprint all or portion of the data on the bill without even contacting the central server. This can become a serious breach of trust and can go un-noticed.

Let's take a couple of examples to explain the above 2 problems in detail.

Problem 1:


Let's assume that Jack was not keeping well and was admitted in the hospital for sometime. Post the discharge; doctors have given him medicine list that he needs to intake for another one month. Jack goes to the pharmaceutical store to purchase medicines that is required for him to get well. It is expected that the total number of individual items purchased can be very high (in this case, let's assume they had purchased 30 individual items). As per the above existing solutions, the bill will contain the description of all the items along with the CRN and MAN numbers (refer patents US20110302093, US20110302094, US20110302095 on the definition of CRN and MAN). Now it is the responsibility of Jack to go home and verify each of the items with the numbers that are printed on the bill with the numbers actually printed on the product. This can become a tedious process if we assume all of the items were original, Jack have to still validate it individually. Worst scenario is that there are only one or two counterfeit products in the list, and then also they have to spend lot of time validating the details.

This scenario can be easily extrapolated to any other industry segment, for example retail outlet, agriculture, software piracy and any other industry where consumers need to buy products.

Problem 2:


The existing solutions rely upon the POS or billing devices at the retailer location to capture information about the products being purchased and send the CRN numbers to the central server, the central server than validates the CRN numbers and send the MAN numbers back to the POS or billing devices which will then print the information on the bill itself.

It is a well known fact that for experts in this area can easily "forge" the POS or billing devices itself. It is possible for the POS or billing machines to be tampered such that they can capture the MAN nu...