Unauthorized product detection techniques
An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authen...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Wood, Sarah Ann Chopra, Rajiv Mevawalla, Shehzad Sirosh, Joseph Bezos, Jeffrey P Herrington, Douglas James Renz, Maria Christine Chouksey, Sachin |
description | An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10482471B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10482471B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10482471B23</originalsourceid><addsrcrecordid>eNrjZNAMzUssLcnIL8qsSk1RKCjKTylNLlFISS1JTS7JzM9TANIZeZmFpanFPAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTk1L7UkPjTY0MDEwsjE3NDJyJgYNQBY5CmV</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Unauthorized product detection techniques</title><source>esp@cenet</source><creator>Wood, Sarah Ann ; Chopra, Rajiv ; Mevawalla, Shehzad ; Sirosh, Joseph ; Bezos, Jeffrey P ; Herrington, Douglas James ; Renz, Maria Christine ; Chouksey, Sachin</creator><creatorcontrib>Wood, Sarah Ann ; Chopra, Rajiv ; Mevawalla, Shehzad ; Sirosh, Joseph ; Bezos, Jeffrey P ; Herrington, Douglas James ; Renz, Maria Christine ; Chouksey, Sachin</creatorcontrib><description>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191119&DB=EPODOC&CC=US&NR=10482471B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20191119&DB=EPODOC&CC=US&NR=10482471B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Wood, Sarah Ann</creatorcontrib><creatorcontrib>Chopra, Rajiv</creatorcontrib><creatorcontrib>Mevawalla, Shehzad</creatorcontrib><creatorcontrib>Sirosh, Joseph</creatorcontrib><creatorcontrib>Bezos, Jeffrey P</creatorcontrib><creatorcontrib>Herrington, Douglas James</creatorcontrib><creatorcontrib>Renz, Maria Christine</creatorcontrib><creatorcontrib>Chouksey, Sachin</creatorcontrib><title>Unauthorized product detection techniques</title><description>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAMzUssLcnIL8qsSk1RKCjKTylNLlFISS1JTS7JzM9TANIZeZmFpanFPAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTk1L7UkPjTY0MDEwsjE3NDJyJgYNQBY5CmV</recordid><startdate>20191119</startdate><enddate>20191119</enddate><creator>Wood, Sarah Ann</creator><creator>Chopra, Rajiv</creator><creator>Mevawalla, Shehzad</creator><creator>Sirosh, Joseph</creator><creator>Bezos, Jeffrey P</creator><creator>Herrington, Douglas James</creator><creator>Renz, Maria Christine</creator><creator>Chouksey, Sachin</creator><scope>EVB</scope></search><sort><creationdate>20191119</creationdate><title>Unauthorized product detection techniques</title><author>Wood, Sarah Ann ; Chopra, Rajiv ; Mevawalla, Shehzad ; Sirosh, Joseph ; Bezos, Jeffrey P ; Herrington, Douglas James ; Renz, Maria Christine ; Chouksey, Sachin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10482471B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><toplevel>online_resources</toplevel><creatorcontrib>Wood, Sarah Ann</creatorcontrib><creatorcontrib>Chopra, Rajiv</creatorcontrib><creatorcontrib>Mevawalla, Shehzad</creatorcontrib><creatorcontrib>Sirosh, Joseph</creatorcontrib><creatorcontrib>Bezos, Jeffrey P</creatorcontrib><creatorcontrib>Herrington, Douglas James</creatorcontrib><creatorcontrib>Renz, Maria Christine</creatorcontrib><creatorcontrib>Chouksey, Sachin</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wood, Sarah Ann</au><au>Chopra, Rajiv</au><au>Mevawalla, Shehzad</au><au>Sirosh, Joseph</au><au>Bezos, Jeffrey P</au><au>Herrington, Douglas James</au><au>Renz, Maria Christine</au><au>Chouksey, Sachin</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Unauthorized product detection techniques</title><date>2019-11-19</date><risdate>2019</risdate><abstract>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10482471B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES HANDLING RECORD CARRIERS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR |
title | Unauthorized product detection techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T15%3A07%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Wood,%20Sarah%20Ann&rft.date=2019-11-19&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10482471B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |