UNAUTHORIZED PRODUCT DETECTION TECHNIQUES

An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HERRINGTON, DOUGLAS JAMES, BEZOS, JEFFREY P, MEVAWALLA, SHEHZAD, CHOUKSEY, SACHIN, SIROSH, JOSEPH, CHOPRA, RAJIV, RENZ, MARIA CHRISTINE, WOOD, SARAH ANN
Format: Patent
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator HERRINGTON, DOUGLAS JAMES
BEZOS, JEFFREY P
MEVAWALLA, SHEHZAD
CHOUKSEY, SACHIN
SIROSH, JOSEPH
CHOPRA, RAJIV
RENZ, MARIA CHRISTINE
WOOD, SARAH ANN
description An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CA2898102A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CA2898102A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CA2898102A13</originalsourceid><addsrcrecordid>eNrjZNAM9XMMDfHwD_KMcnVRCAjydwl1DlFwcQ1xdQ7x9PdTANIefp6Boa7BPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3tnRyMLSwtDAyNHQmAglABUfJE0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>UNAUTHORIZED PRODUCT DETECTION TECHNIQUES</title><source>esp@cenet</source><creator>HERRINGTON, DOUGLAS JAMES ; BEZOS, JEFFREY P ; MEVAWALLA, SHEHZAD ; CHOUKSEY, SACHIN ; SIROSH, JOSEPH ; CHOPRA, RAJIV ; RENZ, MARIA CHRISTINE ; WOOD, SARAH ANN</creator><creatorcontrib>HERRINGTON, DOUGLAS JAMES ; BEZOS, JEFFREY P ; MEVAWALLA, SHEHZAD ; CHOUKSEY, SACHIN ; SIROSH, JOSEPH ; CHOPRA, RAJIV ; RENZ, MARIA CHRISTINE ; WOOD, SARAH ANN</creatorcontrib><description>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</description><language>eng ; fre</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140724&amp;DB=EPODOC&amp;CC=CA&amp;NR=2898102A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140724&amp;DB=EPODOC&amp;CC=CA&amp;NR=2898102A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HERRINGTON, DOUGLAS JAMES</creatorcontrib><creatorcontrib>BEZOS, JEFFREY P</creatorcontrib><creatorcontrib>MEVAWALLA, SHEHZAD</creatorcontrib><creatorcontrib>CHOUKSEY, SACHIN</creatorcontrib><creatorcontrib>SIROSH, JOSEPH</creatorcontrib><creatorcontrib>CHOPRA, RAJIV</creatorcontrib><creatorcontrib>RENZ, MARIA CHRISTINE</creatorcontrib><creatorcontrib>WOOD, SARAH ANN</creatorcontrib><title>UNAUTHORIZED PRODUCT DETECTION TECHNIQUES</title><description>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAM9XMMDfHwD_KMcnVRCAjydwl1DlFwcQ1xdQ7x9PdTANIefp6Boa7BPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3tnRyMLSwtDAyNHQmAglABUfJE0</recordid><startdate>20140724</startdate><enddate>20140724</enddate><creator>HERRINGTON, DOUGLAS JAMES</creator><creator>BEZOS, JEFFREY P</creator><creator>MEVAWALLA, SHEHZAD</creator><creator>CHOUKSEY, SACHIN</creator><creator>SIROSH, JOSEPH</creator><creator>CHOPRA, RAJIV</creator><creator>RENZ, MARIA CHRISTINE</creator><creator>WOOD, SARAH ANN</creator><scope>EVB</scope></search><sort><creationdate>20140724</creationdate><title>UNAUTHORIZED PRODUCT DETECTION TECHNIQUES</title><author>HERRINGTON, DOUGLAS JAMES ; BEZOS, JEFFREY P ; MEVAWALLA, SHEHZAD ; CHOUKSEY, SACHIN ; SIROSH, JOSEPH ; CHOPRA, RAJIV ; RENZ, MARIA CHRISTINE ; WOOD, SARAH ANN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CA2898102A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>2014</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><toplevel>online_resources</toplevel><creatorcontrib>HERRINGTON, DOUGLAS JAMES</creatorcontrib><creatorcontrib>BEZOS, JEFFREY P</creatorcontrib><creatorcontrib>MEVAWALLA, SHEHZAD</creatorcontrib><creatorcontrib>CHOUKSEY, SACHIN</creatorcontrib><creatorcontrib>SIROSH, JOSEPH</creatorcontrib><creatorcontrib>CHOPRA, RAJIV</creatorcontrib><creatorcontrib>RENZ, MARIA CHRISTINE</creatorcontrib><creatorcontrib>WOOD, SARAH ANN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HERRINGTON, DOUGLAS JAMES</au><au>BEZOS, JEFFREY P</au><au>MEVAWALLA, SHEHZAD</au><au>CHOUKSEY, SACHIN</au><au>SIROSH, JOSEPH</au><au>CHOPRA, RAJIV</au><au>RENZ, MARIA CHRISTINE</au><au>WOOD, SARAH ANN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>UNAUTHORIZED PRODUCT DETECTION TECHNIQUES</title><date>2014-07-24</date><risdate>2014</risdate><abstract>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre
recordid cdi_epo_espacenet_CA2898102A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
title UNAUTHORIZED PRODUCT DETECTION TECHNIQUES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T12%3A49%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HERRINGTON,%20DOUGLAS%20JAMES&rft.date=2014-07-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECA2898102A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true