Unauthorized product detection techniques

An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Wood, Sarah Ann, Chopra, Rajiv, Mevawalla, Shehzad, Sirosh, Joseph, Bezos, Jeffrey P, Herrington, Douglas James, Renz, Maria Christine, Chouksey, Sachin
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Wood, Sarah Ann
Chopra, Rajiv
Mevawalla, Shehzad
Sirosh, Joseph
Bezos, Jeffrey P
Herrington, Douglas James
Renz, Maria Christine
Chouksey, Sachin
description An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10482471B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10482471B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10482471B23</originalsourceid><addsrcrecordid>eNrjZNAMzUssLcnIL8qsSk1RKCjKTylNLlFISS1JTS7JzM9TANIZeZmFpanFPAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTk1L7UkPjTY0MDEwsjE3NDJyJgYNQBY5CmV</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Unauthorized product detection techniques</title><source>esp@cenet</source><creator>Wood, Sarah Ann ; Chopra, Rajiv ; Mevawalla, Shehzad ; Sirosh, Joseph ; Bezos, Jeffrey P ; Herrington, Douglas James ; Renz, Maria Christine ; Chouksey, Sachin</creator><creatorcontrib>Wood, Sarah Ann ; Chopra, Rajiv ; Mevawalla, Shehzad ; Sirosh, Joseph ; Bezos, Jeffrey P ; Herrington, Douglas James ; Renz, Maria Christine ; Chouksey, Sachin</creatorcontrib><description>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191119&amp;DB=EPODOC&amp;CC=US&amp;NR=10482471B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191119&amp;DB=EPODOC&amp;CC=US&amp;NR=10482471B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Wood, Sarah Ann</creatorcontrib><creatorcontrib>Chopra, Rajiv</creatorcontrib><creatorcontrib>Mevawalla, Shehzad</creatorcontrib><creatorcontrib>Sirosh, Joseph</creatorcontrib><creatorcontrib>Bezos, Jeffrey P</creatorcontrib><creatorcontrib>Herrington, Douglas James</creatorcontrib><creatorcontrib>Renz, Maria Christine</creatorcontrib><creatorcontrib>Chouksey, Sachin</creatorcontrib><title>Unauthorized product detection techniques</title><description>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNAMzUssLcnIL8qsSk1RKCjKTylNLlFISS1JTS7JzM9TANIZeZmFpanFPAysaYk5xam8UJqbQdHNNcTZQze1ID8-tbggMTk1L7UkPjTY0MDEwsjE3NDJyJgYNQBY5CmV</recordid><startdate>20191119</startdate><enddate>20191119</enddate><creator>Wood, Sarah Ann</creator><creator>Chopra, Rajiv</creator><creator>Mevawalla, Shehzad</creator><creator>Sirosh, Joseph</creator><creator>Bezos, Jeffrey P</creator><creator>Herrington, Douglas James</creator><creator>Renz, Maria Christine</creator><creator>Chouksey, Sachin</creator><scope>EVB</scope></search><sort><creationdate>20191119</creationdate><title>Unauthorized product detection techniques</title><author>Wood, Sarah Ann ; Chopra, Rajiv ; Mevawalla, Shehzad ; Sirosh, Joseph ; Bezos, Jeffrey P ; Herrington, Douglas James ; Renz, Maria Christine ; Chouksey, Sachin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10482471B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><toplevel>online_resources</toplevel><creatorcontrib>Wood, Sarah Ann</creatorcontrib><creatorcontrib>Chopra, Rajiv</creatorcontrib><creatorcontrib>Mevawalla, Shehzad</creatorcontrib><creatorcontrib>Sirosh, Joseph</creatorcontrib><creatorcontrib>Bezos, Jeffrey P</creatorcontrib><creatorcontrib>Herrington, Douglas James</creatorcontrib><creatorcontrib>Renz, Maria Christine</creatorcontrib><creatorcontrib>Chouksey, Sachin</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wood, Sarah Ann</au><au>Chopra, Rajiv</au><au>Mevawalla, Shehzad</au><au>Sirosh, Joseph</au><au>Bezos, Jeffrey P</au><au>Herrington, Douglas James</au><au>Renz, Maria Christine</au><au>Chouksey, Sachin</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Unauthorized product detection techniques</title><date>2019-11-19</date><risdate>2019</risdate><abstract>An unauthorized-product detection system may compare data representing various authentication markers of items presumed to have been produced or sourced by a particular entity with stored data representing valid authentication markers of items produced or sourced by the particular entity. The authentication markers may represent inherent physical characteristics of the items or their packaging, or may be generated and applied to the items or their packaging to facilitate counterfeit detection and/or for other purposes. The data (some of which may be encrypted) may be captured using high-resolution cameras, scanners, or other devices, and then communicated to the unauthorized-product detection system for analysis. The system may maintain a data store of data representing captured or valid authentication markers and may store tracking information reflecting the use of various authentication markers. The system may provide various unauthorized product detection services to consumers, retailers, or members of a supply-chain.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US10482471B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
title Unauthorized product detection techniques
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T15%3A07%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Wood,%20Sarah%20Ann&rft.date=2019-11-19&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10482471B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true