CA02668021
2009-06-02

Abstract
A digital method linking product authentication and product
return. The method allows user to restore product authenticity without
involvement of the product manufacturer. The method includes creation
of new authentication key for the returned product by the user,
limited only by the number of returns defined by the manufacturer.
Only originally authentic products can be restored by the user.

Claims
We claim:
1.A method for restoring authenticity of returned products, each
said product identified by a serial number and by an
authentication key, the method comprising the steps:
(1) Entering product serial number and product
authentication key by one or more users on one or more
input end and interface end;
(2) Matching up to the product serial number and product
authentication key by a server end for authentication,
going to step(3)for those succeeded in the
authentication, and ending the process for those failed
in the authentication;
(3) Inspecting the current number of the product return by
a server end counting the returns, and going to step
(4) if number of the return is less or equal to an
allowed maximum number of returns, and ending the
process for those return entries exceeding the allowed
number of returns;
(4) Generating a new authentication key by a server end and
incrementing the number of returns by a server;
(5) End of the process.
2.The method of claim 1 wherein inspection of the number of product
returns by a server end in step (3) results in matching the said
allowed number of returns, the result communicated to the product
manufacturer.
3.The method of claim 1 wherein inspection of the number of product
returns by a server end in step (3) results in less than the said
allowed number of returns, the result communicated to the product
manufacturer.
4.A method for restoring authenticity of returned products, each
said product identified by a serial number and by an
authentication key, the method comprising the steps:
(1) Entering product serial number and product authentication
7
key by one or more users on one or more input end and
interface end;
(2) Matching up to the product serial number and product
authentication key by a server end for authentication, going
to step(3)for those succeeded in the authentication, and
ending the process for those failed in the authentication;
(3) Generating a new authentication key by a server end and
incrementing the number of returns by a server;
(4) End of the process.
5.The method of claim 1 or claim 4 wherein failing the
authentication in step (2) generates the information that the
product is counterfeit.
6. The method of claim 1 or claim 4 wherein the last step is
followed by printing of the new authentication key.
7. The method of claim 1 or claim 4 wherein the basic activity of
the user includes production, promotion, market research,
customer feedback, counterfeit prevention and electronic
business.
8.The method of claim 1 or claim 4 wherein the input end is
select d from the group consisting of a telephone voice system, a
mobile communication short message system, a network system, and
select Ed communication interface systems.
9.The method of claim 1 or claim 4 wherein the interface end is a
combination of a telephone switch system, an automatic voice
system, a short message display system and a fire-wall system.
10.The me hod of claim 1 or claim 4 wherein the server end includes
a database system, a backup system, an administration system, a
technical system, and a network access system.
Back to Top