EP0986804B1 - Complex and device for guaranteeing the tamper-protection and authenticity of a document or goods - Google Patents

Complex and device for guaranteeing the tamper-protection and authenticity of a document or goods Download PDF

Info

Publication number
EP0986804B1
EP0986804B1 EP98929501A EP98929501A EP0986804B1 EP 0986804 B1 EP0986804 B1 EP 0986804B1 EP 98929501 A EP98929501 A EP 98929501A EP 98929501 A EP98929501 A EP 98929501A EP 0986804 B1 EP0986804 B1 EP 0986804B1
Authority
EP
European Patent Office
Prior art keywords
complex
authentication
code
authentication code
tamper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP98929501A
Other languages
German (de)
French (fr)
Other versions
EP0986804A1 (en
Inventor
Claude Trapletti
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sequoias SAS
Original Assignee
Sequoias SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sequoias SAS filed Critical Sequoias SAS
Publication of EP0986804A1 publication Critical patent/EP0986804A1/en
Application granted granted Critical
Publication of EP0986804B1 publication Critical patent/EP0986804B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D55/00Accessories for container closures not otherwise provided for
    • B65D55/02Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
    • B65D55/06Deformable or tearable wires, strings, or strips; Use of seals, e.g. destructible locking pins
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0291Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time
    • G09F3/0292Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time tamper indicating labels
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F2003/0208Indicia
    • G09F2003/0213Concealed data
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F2003/0272Labels for containers
    • G09F2003/0273Labels for bottles, flasks
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F2003/0276Safety features, e.g. colour, prominent part, logo
    • G09F2003/0277Tamper resistant

Definitions

  • the present invention relates to a complex and a device to guarantee the inviolability and authenticity of a document or of goods, in order to avoid their counterfeiting.
  • the present invention aims to eliminate these drawbacks by proposing a device which also makes it possible to guarantee the inviolability of a product.
  • the invention therefore makes it possible to exercise all of the controls achievable during the life of a product, i.e. before its sale, during its sale or its entry into service, during its life at a consumer and until the end of his life.
  • the invention applies generally to any object, the latter can for example be a paper document, a envelope, goods or its packaging.
  • the basic support can consist of the packaging of the object or even a part of the object likely to receive a printing, or by a label stuck firmly on the object.
  • the label and protective sheet can be made of different materials such as paper, material plastic, fabric, wood, leather etc ...
  • the identification code can be printed by any process known printing on the base support. We can use this effect a fluorescent ink, invisible to the human eye and requiring a special reading device.
  • the authentication code printed on the basic support is preferably masked by an opaque layer of a scrapable material, that is, a material that can be scraped off to reveal the authentication code, such as the one we use to hide authentication codes on banknotes state lotteries.
  • the protective sheet can be transparent, which shows the consumer that he will have the means checking the authenticity of the product and that the manufacturer will monitor the product, which is a guarantee of the quality of this latest.
  • the protective sheet In the absence of a removable opaque layer on the code (s) authentication, the protective sheet must be opaque.
  • the protective sheet provides double protection of the object because it makes it inaccessible and possibly invisible the authentication code and that it constitutes a witness inviolability for the protected object, thus guaranteeing that the latter was neither opened nor used.
  • Information about the object itself is for example information carried on the basic support by the manufacturer of the object at the time of its manufacture. It can be the date and place of production, production team, type of product, etc ...
  • the complex according to the invention is intended to be used works in combination with files kept by the manufacturer of complexes and by the user of said complexes, who applies them on objects to be protected.
  • the present invention therefore also relates to a device intended to guarantee the inviolability and authenticity of a object, characterized in that it comprises complexes such as described above and at least one link file containing the code identification of each complex in relation to its code authentication, as well as an authentication file containing, in relation to the authentication code of each complex, the information concerning the protected object carried on the part not covered with the base support of said complex.
  • the manufacturer of the complexes which is generally a printer working in a secure environment, that is to say respecting different procedures guaranteeing the confidentiality of information, knows the file of links which links identification codes and authentication codes carried by the complexes.
  • the whole system allows you to check the authenticity of the object at different stages of its life.
  • a sworn inspector by the manufacturer retrieves an authentication code carried by the complex by opening the window intended for it or by reading, through the protective sheet and using a magnetic reader, the authentication code intended for him, if the latter is printed with magnetic ink.
  • the inspector sends the recovered authentication code to manufacturer of objects, which consults its authentication file and indicates to the inspector on the one hand, if the object belongs to all the objects put into circulation by the manufacturer and other part, the information concerning the object contained by the file, information that the inspector can compare to that printed in clear on the complex.
  • This exchange of data can of course be automated by telematic means.
  • the transmission of the authentication code is accompanied by a password known only to the inspector. AT defect of correct password, manufacturer detects an attempt fraudulent and does not provide the expected response.
  • the manufacturer records in the authentication file the trace of the control carried out, by example by memorizing the date and the nature of the control.
  • the distributor When the object is sold, the distributor does the same using the authentication code intended for it and the password assigned to him.
  • the manufacturer checks on this occasion that the object is indeed saved in its authentication file as being in condition to be sold. If the item has already been sold, an anomaly is detected.
  • the trace of the control is also recorded in the authentication file, with other information related to the sale such as its date, place and information relating to on the consumer and enabling subsequent statistics.
  • the merchant send the manufacturer the preprinted warranty card number or an after-sales service slip, issues this voucher or slip, then prints on it a new authentication code which is provided in response by the manufacturer to link the number of the voucher or slip to the protected object.
  • the new code authentication is simultaneously saved in the file authentication required by the manufacturer.
  • the consumer who bought the object can also verify authenticity. To this end, when opening the object, it permanently destroys the protective sheet which testified to the inviolability of the object and discovered the code authentication intended for him. The consumer can also read this code before opening the object, opening a window in the opaque sheet and scraping the layer scratchable which masks its code of authenticity. Knowing this code, the consumer can question the manufacturer either by telephone, either by telematic means. The manufacturer can thus verify that the object is registered as having been sold and refers to the consumer of general information about the object, information that the consumer can compare to those shown in clear on the complex associated with the object.
  • the consumer can call the manufacturer's after-sales service.
  • the warranty card or the after-sales service slip then provides a code authentication which allows the same checks to be carried out with the manufacturer, who can also update their authentication file by recording the trace of after-sales service intervention.
  • the complex includes, in the part of the base support not covered by the protective sheet, a control key generated by an algorithm based on part of the complex's authentication code, on the other hand, information specific to the object protected, by example its date and time of manufacture. This information specific must appear legibly on the base support.
  • a code is used authentication printed with magnetic ink so that ability to read it through the protective sheet using a magnetic reader.
  • the magnetic reader is supplied to each participant in the distribution network, for example to the merchant who sells the object.
  • a microprocessor running the same algorithm as that which was used to generate the control key is integrated in the reader magnetic. This microprocessor is enclosed in a capsule inviolable so as to destroy itself in the event of an attempt to read the algorithm.
  • the merchant can thus verify the authenticity of the object by having the authentication code read by the magnetic reader and entering the information specific to the object it reads on the visible part of the base support.
  • the microprocessor included in the magnetic reader again generates a control key to from the authentication code read and specific information foreclosures.
  • the merchant only has to compare the control key as well generated with that printed in plain text on the base support for verify the authenticity of the object.
  • This embodiment allows, without degrading the complex, to verify the authenticity of almost an entire stock of objects. This verification does not guarantee the same reliability as that consisting in interrogating the manufacturer's authentication file but it can complement it. Indeed, we can limit querying the manufacturer's file for a sample relatively small stock and check the rest of the stock with control keys.
  • the microprocessor can be mounted on a smart card can be plugged into the reader. Each manufacturer then provides its own smart card to the merchant.
  • control key is masked by a removable layer of opaque material, possibly protected by a window of the protective sheet.
  • the key control is generated by the algorithm based on the code of authentication of the complex and the identification code of the protected object.
  • control key thus obtained is printed in the section the base support covered by the protective sheet, preferably by being drowned in the authentication code.
  • the authentication codes and are read again and the control key is regenerated then compared to that printed under the protective sheet and the microprocessor provides a positive or negative response depending on whether the regenerated key is identical to the one embedded in the code authentication.
  • the microprocessor is preferably integrated in a smart card, also called smart card memory, pluggable into a reading device.
  • the microprocessor has a memory which contains the algorithm of generation of the control key and the positions of the key control to read on the base medium between characters constituting the authentication code.
  • the authentication code can be found at positions 1, 3, 5, 6, 7, 9 of a sequence of 9 characters including the positions 2, 4, 8 correspond to the control key.
  • This variant makes it possible to provide a presumption authentication and then carry out a check complete product by consulting the central file, in grouping together several complete controls in a single transaction regular time intervals, for example every two or three hours.
  • This variant can in particular be used in professional applications in the fields of pharmacy, spare parts for motor vehicles or the distribution of State lottery tickets, where the systematic establishment of communications for consultation of the central file risks posing practical problems.
  • the device according to the invention therefore makes it possible to fight effectively against counterfeits of marketed objects and follow the evolution of protected objects since their manufacture until they are used by a consumer.
  • the complex shown in Figure 1 has a label 1 as a base support and an opaque protective sheet 2.
  • the label is rectangular, it is made in paper covered on its back with a layer of strong glue.
  • the opaque sheet has the shape of a T. It is produced PVC.
  • the opaque sheet 2 partially covers the label 1 in the central part of the latter.
  • the label comprises, in its part not covered by the opaque sheet, a code identification 3 as well as information 4 concerning the object to which the complex is to be pasted.
  • the label also includes three identification codes 5,6,7 masked each by a layer of opaque scrapable material 8,9,10.
  • Full-flesh cutouts 14 of the opaque sheet 2 allow to reveal that the latter was detached from the object, if applicable.
  • these cuts are found in correspondence with other full cuts flesh produced in the label to reveal any attempt to peeling off the opaque sheet and / or the label.
  • Identification signs 15 are also placed on horseback on opaque sheet 2 and on label 1. These signs identification are destroyed when the opaque sheet is separated of the label, for example when opening the protected object.
  • authentication signs may be provided such as an intaglio, an impression iridescent or security threads.
  • Figure 1 The complex of Figure 1 is intended to be glued on a bottle, for example a perfume bottle as shown in the figure 2.
  • the bottle 16 of FIG. 2 has a stopper 17 which covers his neck.
  • the large front face 18 of the bottle 16 is flat and is lies in the same plane as a flat 19 of the plug 17.
  • the complex is glued on the one hand to the large front face 18 of the bottle, which receives the label 1 and the vertical part of the T of the sheet opaque 2, while the cap receives the horizontal part of the T glued to its side surface and glued to itself at its end.
  • Figure 3 is a flowchart of the different stages of the manufacturing of complexes.
  • the graphics of the complexes are determined by drawing on the one hand the labels, and on the other hand, the opaque sheets.
  • the code is printed on the label 3 and authentication codes 5,6,7 prepared by computer means during a step 32.
  • step 33 an opaque material is coated on the codes authentication to hide them, then we shape the label and the opaque sheet and they are combined in step 34.
  • a control of quality is performed in step 35 to remove the complexes showing a defect.
  • the means computer generated a link file 36 which establishes the relationship between each identification code and the codes corresponding identification.
  • step 35 of quality control the means are informed computerization of the elimination of defective labels with a view to deletion of the corresponding records in the file links 36.
  • the link file 36 and the stock of complexes obtained are delivered in step 37 to a user who is here a manufacturer of bottles.
  • the flowchart in Figure 4 shows the steps implemented work by the manufacturer to personalize the complexes.
  • the manufacturer prints on parts not covered by the label 1 of the information 4 concerning the bottles it wishes to protect.
  • This complex customization information is simultaneously updated in a central file 42 built on the base of the link file 36 and of which each record includes personalization information 4.
  • the manufacturer then splits the central file 42 into one authentication file 43 and a management file 44.
  • the authentication file 43 contains, for each bottle, the three authentication codes of the corresponding complex and personalization information 4, as well as fields free for further information.
  • the management file 44 contains the identification code 3 as well as other information allowing the organization of the commercial distribution of vials.
  • Management file 44 is entrusted to logistics teams 45 while the authentication file 43 remains between the only hands of the manufacturer.
  • the manufacturer loses all possibility of establishing a link between the information about a bottle and the identification code worn by this bottle.
  • a sworn inspector responsible for check the authenticity of a bottle, tear off window 15 of the opaque sheet 2 and scrapes the opaque layer 10 to discover the authentication code 7 intended for him, then sends this code 7 with its password 51 to the manufacturer.
  • step 52 the manufacturer queries his file 43 and returns its response 53, thus indicating to the inspector whether or not the bottle is authentic.
  • step 54 the inspector decides whether it is necessary to initiate a control procedure based on the response received from the manufacturer.
  • step 55 the manufacturer enriches his file authentication 43 by recording the trace of the control performed, if the latter was positive.
  • step 60 the dispenser tears off window 14, scrapes the opaque layer 9 and discovers the authentication code 6 which it sends to the manufacturer together with his personal password.
  • connection 61 connected to the manufacturer.
  • the latter interrogates its authentication file 43 and in step 62, checks the authenticity of the bottle. Answer 63 of manufacturer returned to distributor with new code authentication that the distributor enters in step 64.
  • the manufacturer enriches his file in step 65 by registering the name of the sales and general consumer information.
  • step 65 the distributor issues a guarantee voucher numbered 66 on which he prints the new authentication code received from the manufacturer.
  • Figure 7 illustrates an authenticity check operation made by a consumer 70 who bought the bottle.
  • the consumer After seeing window 13 torn off and discovering the code authentication 5 masked by the removable layer 8, the consumer questions the manufacturer either by telephone or by telematic means.
  • the latter interrogates his authentication file 43 and confirms to the consumer the authenticity of the bottle.
  • step 80 the consumer sends the manufacturer the code on his warranty card and his own authentication code.
  • Manufacturer queries authentication file 43 at step 81 and verifies that the guarantee bond thus identified is the one linked to the bottle in the consumer's possession.
  • the manufacturer's response is addressed to the consumer at step 82.
  • This authenticity check operation after the sale of the product can also be executed by an after-sales service or by the distributor.
  • step 83 the manufacturer enriches his file authentication by recording, for example, the date of of the warranty.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Credit Cards Or The Like (AREA)

Description

La présente invention concerne un complexe et un dispositif pour garantir l'inviolabilité et l'authenticité d'un document ou d'une marchandise, en vue d'éviter leur contrefaçon.The present invention relates to a complex and a device to guarantee the inviolability and authenticity of a document or of goods, in order to avoid their counterfeiting.

On connaít déjà des dispositifs destinés à garantir l'authenticité d'un document ou d'un produit, comme, par exemple, celui décrit par US-A-5 267 756. Ces dispositifs utilisent des techniques relativement complexes, souvent combinées entre elles.We already know devices intended to guarantee the authenticity of a document or a product, such as, for example, that described by US-A-5,267,756. These devices use relatively complex techniques, often combined between them.

Cependant, ces dispositifs connus ne donnent pas entière satisfaction, notamment du fait qu'ils sont souvent copiés, qu'ils ne permettent pas de contrôler l'authenticité d'un produit aux différentes étapes de sa vie, ni de détecter une copie frauduleuse d'un produit authentique existant.However, these known devices do not give whole satisfaction, especially the fact that they are often copied, that they do not allow the authenticity of a product to be checked different stages of his life, nor to detect a fraudulent copy of an existing authentic product.

La présente invention vise à éliminer ces inconvénients en proposant un dispositif qui permet en outre de garantir l'inviolabilité d'un produit.The present invention aims to eliminate these drawbacks by proposing a device which also makes it possible to guarantee the inviolability of a product.

L'invention permet donc d'exercer l'ensemble des contrôles réalisables au cours de la vie d'un produit, c'est-à-dire avant sa vente, lors de sa vente ou de sa mise en service, durant sa vie chez un consommateur et jusqu'à la fin de sa vie.The invention therefore makes it possible to exercise all of the controls achievable during the life of a product, i.e. before its sale, during its sale or its entry into service, during its life at a consumer and until the end of his life.

L'invention s'applique d'une manière générale à tout objet, ce dernier pouvant être par exemple un document papier, une enveloppe, une marchandise ou son emballage.The invention applies generally to any object, the latter can for example be a paper document, a envelope, goods or its packaging.

La présente invention a tout d'abord pour objet un complexe destiné à garantir l'inviolabilité et l'authenticité d'un objet comprenant :

  • un support de base solidarisé de manière définitive à l'objet et sur lequel sont imprimés un code d'identification et au moins un code d'authentification,
  • une feuille protectrice recouvrant partiellement le support de base pour protéger le code d'authentification et apte à être appliquée sur l'objet de manière à en assurer l'inviolabilité,
  • des informations concernant l'objet lui-même portées sur la partie non recouverte du support de base.
The present invention firstly relates to a complex intended to guarantee the inviolability and authenticity of an object comprising:
  • a basic support permanently attached to the object and on which an identification code and at least one authentication code are printed,
  • a protective sheet partially covering the base support to protect the authentication code and suitable for being applied to the object so as to ensure its inviolability,
  • information concerning the object itself carried on the part not covered with the basic support.

Le support de base peut être constitué par l'emballage de l'objet ou même une partie de l'objet susceptible de recevoir une impression, ou encore par une étiquette collée fermement sur l'objet.The basic support can consist of the packaging of the object or even a part of the object likely to receive a printing, or by a label stuck firmly on the object.

L'étiquette et la feuille protectrice peuvent être constituées en différents matériaux tels qu'un papier, une matière plastique, un tissu, du bois, du cuir etc...The label and protective sheet can be made of different materials such as paper, material plastic, fabric, wood, leather etc ...

Le code d'identification peut être imprimé par tout procédé connu d'impression sur le support de base. On peut utiliser à cet effet une encre fluorescente, invisible à l'oeil humain et nécessitant un dispositif de lecture particulier.The identification code can be printed by any process known printing on the base support. We can use this effect a fluorescent ink, invisible to the human eye and requiring a special reading device.

Le code d'authentification imprimé sur le support de base est de préférence masqué par une couche opaque d'un matériau grattable, c'est-à-dire d'un matériau qui peut être éliminé par grattage pour révéler le code d'authentification, tel que celui que l'on utilise pour masquer des codes d'authentification sur des billets de loteries d'Etat.The authentication code printed on the basic support is preferably masked by an opaque layer of a scrapable material, that is, a material that can be scraped off to reveal the authentication code, such as the one we use to hide authentication codes on banknotes state lotteries.

Dans ce cas, la feuille protectrice peut être transparente, ce qui permet de montrer au consommateur qu'il disposera de moyens de contrôle de l'authenticité du produit et que le fabricant assurera un suivi du produit, ce qui est un gage de qualité de ce dernier.In this case, the protective sheet can be transparent, which shows the consumer that he will have the means checking the authenticity of the product and that the manufacturer will monitor the product, which is a guarantee of the quality of this latest.

En l'absence de couche opaque grattable sur le ou les codes d'authentification, la feuille protectrice sera obligatoirement opaque.In the absence of a removable opaque layer on the code (s) authentication, the protective sheet must be opaque.

La feuille protectrice assure une double protection de l'objet du fait qu'elle rend inaccessible et éventuellement invisible le code d'authentification et qu'elle constitue un témoin d'inviolabilité pour l'objet protégé, garantissant ainsi que ce dernier n'a été ni ouvert ni utilisé.The protective sheet provides double protection of the object because it makes it inaccessible and possibly invisible the authentication code and that it constitutes a witness inviolability for the protected object, thus guaranteeing that the latter was neither opened nor used.

Les informations concernant l'objet lui-même sont par exemple des informations portées sur le support de base par le fabricant de l'objet au moment de sa fabrication. Il peut s'agir de la date et du lieu de production, de l'équipe de production, du type de produit, etc...Information about the object itself is for example information carried on the basic support by the manufacturer of the object at the time of its manufacture. It can be the date and place of production, production team, type of product, etc ...

Le complexe selon l'invention est destiné à être mis en oeuvre en combinaison avec des fichiers tenus par le fabricant des complexes et par l'utilisateur desdits complexes, qui les applique sur des objets à protéger.The complex according to the invention is intended to be used works in combination with files kept by the manufacturer of complexes and by the user of said complexes, who applies them on objects to be protected.

La présente invention a donc également pour objet un dispositif destiné à garantir l'inviolabilité et l'authenticité d'un objet, caractérisé par le fait qu'il comprend des complexes tels que décrits ci-dessus et au moins un fichier de liens contenant le code d'identification de chaque complexe en relation avec son code d'authentification, ainsi qu'un fichier d'authentification contenant, en relation avec le code d'authentification de chaque complexe, les informations concernant l'objet protégé portées sur la partie non recouverte du support de base dudit complexe.The present invention therefore also relates to a device intended to guarantee the inviolability and authenticity of a object, characterized in that it comprises complexes such as described above and at least one link file containing the code identification of each complex in relation to its code authentication, as well as an authentication file containing, in relation to the authentication code of each complex, the information concerning the protected object carried on the part not covered with the base support of said complex.

Selon l'invention, seul le fabricant des complexes, qui est en général un imprimeur travaillant en univers sécurisé, c'est-à-dire respectant différentes procédures garantissant la confidentialité des informations, connaít le fichier de liens qui relie les codes d'identification et les codes d'authentification portés par les complexes.According to the invention, only the manufacturer of the complexes, which is generally a printer working in a secure environment, that is to say respecting different procedures guaranteeing the confidentiality of information, knows the file of links which links identification codes and authentication codes carried by the complexes.

Etant donné qu'à ce stade, on ne connaít pas la destination des complexes, toute copie frauduleuse du fichier de liens serait infructueuse car il est impossible de savoir sur quels objets les complexes vont être appliqués.Since at this point we don't know the destination complex, any fraudulent copy of the link file would be unsuccessful because it is impossible to know on which objects the complex will be applied.

La mise en oeuvre des complexes s'effectue de la manière suivante :

  • 1°) Le fabricant des complexes imprime sur chaque support de base un code d'identification et au moins un code d'authentification et met à jour son fichier de liens, mémorisant ainsi les n-uplets (code d'identification, codes d'authentification) qu'il crée sans connaítre la destination des complexes.
  • 2°) Le fabricant recouvre ensuite avec une feuille protectrice la partie du support de base portant le ou les codes d'authentification, après avoir éventuellement masqué ces codes d'authentification avec une couche opaque d'un matériau grattable. La feuille protectrice dépasse éventuellement du support de base de manière à pouvoir être collée sur l'ouverture d'un objet à protéger pour en assurer l'inviolabilité.
  • Cette feuille comporte également des découpes délimitant une ou plusieurs fenêtres qui donnent accès chacune à un code d'authentification du complexe. Chaque fenêtre ne peut être ouverte que d'une manière définitive, ce qui permet de déceler tout accès non autorisé à un code d'authentification.The implementation of the complexes is carried out as follows:
  • 1 °) The manufacturer of the complexes prints on each basic support an identification code and at least one authentication code and updates its file of links, thus memorizing the tuples (identification code, codes of authentication) that it creates without knowing the destination of the complexes.
  • 2 °) The manufacturer then covers with a protective sheet the part of the base support carrying the authentication code (s), after having possibly masked these authentication codes with an opaque layer of removable material. The protective sheet possibly protrudes from the base support so that it can be glued to the opening of an object to be protected to ensure inviolability.
  • This sheet also includes cutouts delimiting one or more windows which each give access to an authentication code of the complex. Each window can only be opened in a definitive manner, which makes it possible to detect any unauthorized access to an authentication code.

    Dans une variante, un code d'authentification peut être imprimé avec une encre magnétique, ce qui permet de lire ce code à travers la feuille et éventuellement la couche opaque qui le recouvre. On utilise à cet effet un lecteur magnétique.

  • 3°) L'utilisateur des complexes, qui est en général un fabricant d'objets à protéger, reçoit du fabricant des complexes une copie du fichier de liens et un lot de complexes correspondant.
  • 4°) L'utilisateur applique sur chaque objet qu'il souhaite protéger un complexe qu'il personnalise en imprimant sur ce dernier des informations concernant l'objet, comme par exemple un code produit, une date de fabrication, un numéro de lot etc...
  • 5°) Simultanément, l'utilisateur met à jour un fichier central construit sur la base du fichier de liens, en y reportant toutes les informations concernant l'objet, en relation avec le code d'authentification.
  • 6°) L'utilisateur scinde ensuite ce fichier central en deux fichiers distincts, à savoir un fichier d'authentification qui contient les codes d'authentification et les informations concernant les objets préalablement mises à jour et un fichier de gestion qui ne contient que les codes d'identification et des informations destinées à organiser la distribution des objets par des moyens logistiques traditionnels.
  • In a variant, an authentication code can be printed with magnetic ink, which makes it possible to read this code through the sheet and possibly the opaque layer which covers it. A magnetic reader is used for this purpose.
  • 3 °) The user of the complexes, who is generally a manufacturer of objects to be protected, receives from the manufacturer of the complexes a copy of the link file and a corresponding batch of complexes.
  • 4 °) The user applies to each object that he wishes to protect a complex that he personalizes by printing on it information relating to the object, such as for example a product code, a date of manufacture, a batch number, etc. ...
  • 5 °) Simultaneously, the user updates a central file constructed on the basis of the file of links, by reporting there all the information concerning the object, in relation to the authentication code.
  • 6 °) The user then splits this central file into two separate files, namely an authentication file which contains the authentication codes and the information concerning the previously updated objects and a management file which contains only the identification codes and information intended to organize the distribution of objects by traditional logistical means.
  • L'ensemble du dispositif permet de contrôler l'authenticité de l'objet à différents stades de sa vie.The whole system allows you to check the authenticity of the object at different stages of its life.

    Tout d'abord, chez un distributeur, un inspecteur assermenté par le fabricant recupère un code d'authentification porté par le complexe en ouvrant la fenêtre qui lui est destinée ou en lisant, à travers la feuille protectrice et à l'aide d'un lecteur magnétique, le code d'authentification qui lui est destiné, si ce dernier est imprimé avec une encre magnétique.First, at a distributor, a sworn inspector by the manufacturer retrieves an authentication code carried by the complex by opening the window intended for it or by reading, through the protective sheet and using a magnetic reader, the authentication code intended for him, if the latter is printed with magnetic ink.

    L'inspecteur envoie le code d'authentification récupéré au fabricant des objets, lequel consulte son fichier d'authentification et indique à l'inspecteur d'une part, si l'objet appartient à l'ensemble des objets mis en circulation par le fabricant et d'autre part, les informations concernant l'objet contenues par le fichier, informations que l'inspecteur peut comparer à celles imprimées en clair sur le complexe.The inspector sends the recovered authentication code to manufacturer of objects, which consults its authentication file and indicates to the inspector on the one hand, if the object belongs to all the objects put into circulation by the manufacturer and other part, the information concerning the object contained by the file, information that the inspector can compare to that printed in clear on the complex.

    Cet échange de données peut bien entendu être automatisé par des moyens télématiques.This exchange of data can of course be automated by telematic means.

    En cas d'inexistence du code d'authentification dans le fichier d'authentification tenu par le fabricant ou de discordance entre les informations portées en clair sur le complexe et celles contenues dans le fichier, une contrefaçon est présumée et une procédure de contrôle peut être déclenchée.If the authentication code does not exist in the Manufacturer-maintained authentication or mismatch file between the information brought in clear on the complex and that contained in the file, an infringement is presumed and a control procedure can be triggered.

    Pour éviter que ce contrôle ne soit effectué par une personne non habilitée, la transmission du code d'authentification s'accompagne d'un mot de passe connu seulement de l'inspecteur. A défaut du mot de passe correct, le fabricant détecte une tentative frauduleuse et ne fournit pas la réponse attendue.To prevent this check from being carried out by a person not authorized, the transmission of the authentication code is accompanied by a password known only to the inspector. AT defect of correct password, manufacturer detects an attempt fraudulent and does not provide the expected response.

    Lors de chaque contrôle, le fabricant enregistre dans le fichier d'authentification la trace du contrôle effectué, par exemple en mémorisant la date et la nature du contrôle.During each inspection, the manufacturer records in the authentication file the trace of the control carried out, by example by memorizing the date and the nature of the control.

    Lors de la vente de l'objet, le distributeur procède de même en utilisant le code d'authentification qui lui est destiné et le mot de passe qui lui a été attribué.When the object is sold, the distributor does the same using the authentication code intended for it and the password assigned to him.

    Le fabricant vérifie à cette occasion que l'objet est bien enregistré dans son fichier d'authentification comme se trouvant en état d'être vendu. Si l'objet a déjà été vendu, une anomalie est détectée.The manufacturer checks on this occasion that the object is indeed saved in its authentication file as being in condition to be sold. If the item has already been sold, an anomaly is detected.

    La trace du contrôle est également enregistrée dans le fichier d'authentification, avec d'autres informations relatives à la vente telles que sa date, son lieu et des informations portant sur le consommateur et permettant de réaliser ultérieurement des statistiques.The trace of the control is also recorded in the authentication file, with other information related to the sale such as its date, place and information relating to on the consumer and enabling subsequent statistics.

    Dans le cas, d'un bien d'équipement ou plus généralement d'un produit garanti, une fois le contrôle effectué, le commerçant envoie au fabricant le numéro préimprimé d'un bon de garantie ou d'un bordereau de service après vente, émet ce bon ou ce bordereau, puis imprime sur ce dernier un nouveau code d'authentification qui est lui fourni en réponse par le fabricant pour lier le numéro du bon ou du bordereau à l'objet protégé. Le nouveau code d'authentification est simultanément enregistré dans le fichier d'authentification tenu par le fabricant.In the case of a capital good or more generally of a guaranteed product, once the check has been carried out, the merchant send the manufacturer the preprinted warranty card number or an after-sales service slip, issues this voucher or slip, then prints on it a new authentication code which is provided in response by the manufacturer to link the number of the voucher or slip to the protected object. The new code authentication is simultaneously saved in the file authentication required by the manufacturer.

    Le consommateur ayant acheté l'objet peut également en vérifier l'authenticité. A cet effet, lors de l'ouverture de l'objet, il détruit définitivement la feuille protectrice qui témoignait de l'inviolabilité de l'objet et découvre le code d'authentification qui lui est destiné. Le consommateur peut également prendre connaissance de ce code avant d'ouvrir l'objet, en ouvrant une fenêtre dans la feuille opaque et en grattant la couche grattable qui masque son code d'authenticité. Connaissant ce code, le consommateur peut interroger le fabricant soit par téléphone, soit par des moyens télématiques. Le fabricant peut ainsi vérifier que l'objet est bien enregistré comme ayant été vendu et renvoie au consommateur des informations générales sur l'objet, informations que le consommateur peut comparer à celles portées en clair sur le complexe associé à l'objet.The consumer who bought the object can also verify authenticity. To this end, when opening the object, it permanently destroys the protective sheet which testified to the inviolability of the object and discovered the code authentication intended for him. The consumer can also read this code before opening the object, opening a window in the opaque sheet and scraping the layer scratchable which masks its code of authenticity. Knowing this code, the consumer can question the manufacturer either by telephone, either by telematic means. The manufacturer can thus verify that the object is registered as having been sold and refers to the consumer of general information about the object, information that the consumer can compare to those shown in clear on the complex associated with the object.

    Plus tard, après avoir utilisé l'objet, le consommateur peut faire appel au service après-vente du fabricant. Le bon de garantie ou le bordereau de service après-vente fournit alors un code d'authentification qui permet d'effectuer les mêmes vérifications auprès du fabricant, ce dernier pouvant en outre mettre à jour son fichier d'authentification en y enregistrant la trace de l'intervention du service après-vente.Later, after using the object, the consumer can call the manufacturer's after-sales service. The warranty card or the after-sales service slip then provides a code authentication which allows the same checks to be carried out with the manufacturer, who can also update their authentication file by recording the trace of after-sales service intervention.

    Dans un mode de réalisation particulier, le complexe comporte, dans la partie du support de base non recouverte par la feuille protectrice, une clé de contrôle générée par un algorithme sur la base d'une part du code d'authentification du complexe, d'autre part, d'une information spécifique à l'objet protégé, par exemple sa date et son heure de fabrication. Cette information spécifique doit apparaítre de façon lisible sur le support de base.In a particular embodiment, the complex includes, in the part of the base support not covered by the protective sheet, a control key generated by an algorithm based on part of the complex's authentication code, on the other hand, information specific to the object protected, by example its date and time of manufacture. This information specific must appear legibly on the base support.

    Dans ce mode de réalisation, on utilise un code d'authentification imprimé avec une encre magnétique de manière à pouvoir le lire à travers la feuille protectrice à l'aide d'un lecteur magnétique.In this embodiment, a code is used authentication printed with magnetic ink so that ability to read it through the protective sheet using a magnetic reader.

    Le lecteur magnétique est fourni à chaque intervenant du réseau de distribution, par exemple au commerçant qui vend l'objet. The magnetic reader is supplied to each participant in the distribution network, for example to the merchant who sells the object.

    Un microprocesseur exécutant le même algorithme que celui qui a servi à générer la clé de contrôle est intégré au lecteur magnétique. Ce microprocesseur est enfermé dans une capsule inviolable de manière à s'autodétruire en cas de tentative de lecture de l'algorithme.A microprocessor running the same algorithm as that which was used to generate the control key is integrated in the reader magnetic. This microprocessor is enclosed in a capsule inviolable so as to destroy itself in the event of an attempt to read the algorithm.

    Le commerçant peut ainsi vérifier l'authenticité de l'objet en faisant lire le code d'authentification par le lecteur magnétique et en saisissant les informations spécifiques à l'objet qu'il lit sur la partie visible du support de base. Le microprocesseur inclus dans le lecteur magnétique génère à nouveau une clé de contrôle à partir du code d'authentification lu et des informations spécifiques saisies.The merchant can thus verify the authenticity of the object by having the authentication code read by the magnetic reader and entering the information specific to the object it reads on the visible part of the base support. The microprocessor included in the magnetic reader again generates a control key to from the authentication code read and specific information foreclosures.

    Le commerçant n'a qu'à comparer la clé de contrôle ainsi générée avec celle imprimée en clair sur le support de base pour vérifier l'authenticité de l'objet.The merchant only has to compare the control key as well generated with that printed in plain text on the base support for verify the authenticity of the object.

    Ce mode de réalisation permet, sans dégrader le complexe, de vérifier l'authenticité de la quasi-totalité d'un stock d'objets. Cette vérification ne garantit pas la même fiabilité que celle consistant à interroger le fichier d'authentification du fabricant mais elle peut la compléter. En effet, on peut limiter l'interrogation du fichier du fabricant à un échantillon relativement réduit du stock et vérifier le reste du stock grâce aux clés de contrôle.This embodiment allows, without degrading the complex, to verify the authenticity of almost an entire stock of objects. This verification does not guarantee the same reliability as that consisting in interrogating the manufacturer's authentication file but it can complement it. Indeed, we can limit querying the manufacturer's file for a sample relatively small stock and check the rest of the stock with control keys.

    Afin de pouvoir utiliser un même lecteur magnétique pour 5 effectuer un contrôle sur des objets provenant de fabricants différents, le microprocesseur peut être monté sur une carte à puce enfichable dans le lecteur. Chaque fabricant fournit alors sa propre carte à puce au commerçant.In order to be able to use the same magnetic reader for 5 carry out a check on objects from manufacturers different, the microprocessor can be mounted on a smart card can be plugged into the reader. Each manufacturer then provides its own smart card to the merchant.

    Dans une variante, la clé de contrôle est masquée par une couche grattable de matériau opaque, et éventuellement protégée par une fenêtre de la feuille protectrice.In a variant, the control key is masked by a removable layer of opaque material, possibly protected by a window of the protective sheet.

    Dans une variante préférée de ce mode de réalisation, la clé de contrôle est générée par l'algorithme sur la base du code d'authentification du complexe et du code d'identification de l'objet protégé. In a preferred variant of this embodiment, the key control is generated by the algorithm based on the code of authentication of the complex and the identification code of the protected object.

    La clé de contrôle ainsi obtenue est imprimée dans la partie du support de base recouverte par la feuille protectrice, de préférence en étant noyée dans le code d'authentification.The control key thus obtained is printed in the section the base support covered by the protective sheet, preferably by being drowned in the authentication code.

    Lors du contrôle, les codes d'authentification et d'identification sont relus et la clé de contrôle est régénérée puis comparée à celle imprimée sous la feuille protectrice et le microprocesseur fournit une réponse positive ou négative selon que la clé régénérée est identique à celle qui est noyée dans le code d'authentification.During the check, the authentication codes and are read again and the control key is regenerated then compared to that printed under the protective sheet and the microprocessor provides a positive or negative response depending on whether the regenerated key is identical to the one embedded in the code authentication.

    Comme cela a déjà été précisé, le microprocesseur est de préférence intégré dans une carte à puce, également désignée carte à mémoire, enfichable dans un dispositif de lecture. Le microprocesseur comporte une mémoire qui contient l'algorithme de génération de la clé de contrôle ainsi que les positions de la clé de contrôle à lire sur le support de base entre les caractères constituant le code d'authentification.As already stated, the microprocessor is preferably integrated in a smart card, also called smart card memory, pluggable into a reading device. The microprocessor has a memory which contains the algorithm of generation of the control key and the positions of the key control to read on the base medium between characters constituting the authentication code.

    Par exemple le code d'authentification peut se trouver aux positions 1, 3, 5, 6, 7, 9 d'une suite de 9 caractères dont les positions 2, 4, 8 correspondent à la clé de contrôle.For example the authentication code can be found at positions 1, 3, 5, 6, 7, 9 of a sequence of 9 characters including the positions 2, 4, 8 correspond to the control key.

    Cette variante permet de fournir une présomption d'authentification et de réaliser, dans un second temps, un contrôle complet du produit par consultation du fichier central, en regroupant plusieurs contrôles complets en une seule transaction à intervalles de temps réguliers, par exemple toutes les deux ou trois heures.This variant makes it possible to provide a presumption authentication and then carry out a check complete product by consulting the central file, in grouping together several complete controls in a single transaction regular time intervals, for example every two or three hours.

    Cette variante peut notamment être utilisée dans des applications professionnelles dans les domaines de la pharmacie, des pièces détachées de véhicules automobiles ou de la distribution de tickets de loterie d'Etat, où l'établissement systématique de communications pour consultation du fichier central risque de poser des problèmes pratiques.This variant can in particular be used in professional applications in the fields of pharmacy, spare parts for motor vehicles or the distribution of State lottery tickets, where the systematic establishment of communications for consultation of the central file risks posing practical problems.

    Le dispositif selon l'invention permet donc de lutter efficacement contre des contrefaçons d'objets commercialisés et de suivre l'évolution des objets protégés depuis leur fabrication jusqu'à leur utilisation par un consommateur. The device according to the invention therefore makes it possible to fight effectively against counterfeits of marketed objects and follow the evolution of protected objects since their manufacture until they are used by a consumer.

    Dans le but de mieux faire comprendre l'invention, on va en décrire maintenant un mode de réalisation donné à titre d'exemple non limitatif, en référence au dessin annexé dans lequel :

    • la figure 1 représente un complexe destiné à être appliqué sur un flacon,
    • la figure 2 représente le goulot du flacon recouvert par le complexe de la figure 1,
    • les figures 3 à 8 sont des organigrammes retraçant les différentes étapes des opérations de contrôle d'authenticité.
    In order to better understand the invention, we will now describe an embodiment given by way of non-limiting example, with reference to the accompanying drawing in which:
    • FIG. 1 represents a complex intended to be applied to a bottle,
    • FIG. 2 represents the neck of the bottle covered by the complex of FIG. 1,
    • Figures 3 to 8 are flowcharts showing the different stages of the authenticity control operations.

    Le complexe représenté sur la figure 1 comporte une étiquette 1 en tant que support de base et une feuille protectrice opaque 2.The complex shown in Figure 1 has a label 1 as a base support and an opaque protective sheet 2.

    L'étiquette est de forme rectangulaire, elle est réalisée en papier recouvert sur son verso d'une couche de colle forte.The label is rectangular, it is made in paper covered on its back with a layer of strong glue.

    La feuille opaque présente la forme d'un T. Elle est réalisée en PVC.The opaque sheet has the shape of a T. It is produced PVC.

    La feuille opaque 2 recouvre partiellement l'étiquette 1 dans la partie centrale de cette dernière.The opaque sheet 2 partially covers the label 1 in the central part of the latter.

    Conformément à l'invention, l'étiquette comporte, dans sa partie non recouverte par la feuille opaque, un code d'identification 3 ainsi que des informations 4 concernant l'objet sur lequel le complexe doit être collé.In accordance with the invention, the label comprises, in its part not covered by the opaque sheet, a code identification 3 as well as information 4 concerning the object to which the complex is to be pasted.

    Dans sa partie centrale, l'étiquette comporte en outre trois codes d'identification 5,6,7 masqués chacun par une couche d'un matériau opaque grattable 8,9,10.In its central part, the label also includes three identification codes 5,6,7 masked each by a layer of opaque scrapable material 8,9,10.

    Ces trois codes d'identification et leur couche grattable sont recouverts par la partie de la feuille opaque 2 qui est collée sur l'étiquette.These three identification codes and their removable layer are covered by the part of the opaque sheet 2 which is glued on the label.

    Des fenêtres 11,12,13 sont découpées dans la feuille opaque en regard de chaque couche grattable 8,9,10.Windows 11,12,13 are cut from the opaque sheet opposite each removable layer 8,9,10.

    Des découpes pleine chair 14 de la feuille opaque 2 permettent de révéler que cette dernière a été décollée de l'objet, le cas échéant.Full-flesh cutouts 14 of the opaque sheet 2 allow to reveal that the latter was detached from the object, if applicable.

    Dans la partie de la feuille opaque recouvrant l'étiquette, ces découpes se trouvent en correspondance d'autres découpes pleine chair réalisées dans l'étiquette afin de révéler toute tentative de décollement de la feuille opaque et/ou de l'étiquette. In the part of the opaque sheet covering the label, these cuts are found in correspondence with other full cuts flesh produced in the label to reveal any attempt to peeling off the opaque sheet and / or the label.

    Des signes d'identification 15 sont en outre placés à cheval sur la feuille opaque 2 et sur l'étiquette 1. Ces signes d'identification se détruisent lorsque l'on sépare la feuille opaque de l'étiquette, par exemple lorsque l'on ouvre l'objet protégé.Identification signs 15 are also placed on horseback on opaque sheet 2 and on label 1. These signs identification are destroyed when the opaque sheet is separated of the label, for example when opening the protected object.

    D'autres signes d'authentification (non représentés) peuvent être prévus comme par exemple une taille douce, une impression iridescente ou des fils de sécurité.Other authentication signs (not shown) may be provided such as an intaglio, an impression iridescent or security threads.

    Le complexe de la figure 1 est destiné à être collé sur un flacon, par exemple un flacon de parfum comme représenté à la figure 2.The complex of Figure 1 is intended to be glued on a bottle, for example a perfume bottle as shown in the figure 2.

    Le flacon 16 de la figure 2 comporte un bouchon 17 qui coiffe son goulot. La grande face frontale 18 du flacon 16 est plane et se situe dans le même plan qu'un méplat 19 du bouchon 17. Le complexe est collé d'une part sur la grande face frontale 18 du flacon, qui reçoit l'étiquette 1 et la partie verticale du T de la feuille opaque 2, tandis que le capuchon reçoit la partie horizontale du T collée sur sa surface latérale et collée sur elle-même à son extrémité.The bottle 16 of FIG. 2 has a stopper 17 which covers his neck. The large front face 18 of the bottle 16 is flat and is lies in the same plane as a flat 19 of the plug 17. The complex is glued on the one hand to the large front face 18 of the bottle, which receives the label 1 and the vertical part of the T of the sheet opaque 2, while the cap receives the horizontal part of the T glued to its side surface and glued to itself at its end.

    On comprend que le complexe peut ainsi constituer un témoin d'inviolabilité du flacon car toute action exercée sur le capuchon entraínerait la destruction des différents signes d'authentification prévus sur la feuille opaque et sur l'étiquette, voire la destruction de ces dernières.We understand that the complex can thus constitute a witness inviolability of the bottle because any action exerted on the cap would destroy the various signs of authentication provided on the opaque sheet and on the label, or even the destruction of the latter.

    On va maintenant expliquer, en référence aux figures 3 à 8, la mise en oeuvre du complexe précédemment décrit.We will now explain, with reference to FIGS. 3 to 8, the implementation of the complex described above.

    La figure 3 est un organigramme des différentes étapes de la fabrication des complexes.Figure 3 is a flowchart of the different stages of the manufacturing of complexes.

    Lors d'une étape 30, on détermine le graphisme des complexes en dessinant d'une part les étiquettes, et d'autre part, les feuilles opaques.During a step 30, the graphics of the complexes are determined by drawing on the one hand the labels, and on the other hand, the opaque sheets.

    Lors d'une étape 31, on imprime sur l'étiquette le code d'identification 3 et les codes d'authentification 5,6,7 préparés par des moyens informatiques lors d'une étape 32.During a step 31, the code is printed on the label 3 and authentication codes 5,6,7 prepared by computer means during a step 32.

    A l'étape 33, on couche un matériau opaque sur les codes d'authentification pour les masquer, puis on façonne l'étiquette et la feuille opaque et on les réunit à l'étape 34. Un contrôle de qualité est effectué à l'étape 35 pour éliminer les complexes présentant un défaut.In step 33, an opaque material is coated on the codes authentication to hide them, then we shape the label and the opaque sheet and they are combined in step 34. A control of quality is performed in step 35 to remove the complexes showing a defect.

    Parallèlement à la fabrication des complexes, les moyens informatiques génèrent un fichier de liens 36 qui établit la relation entre chaque code d'identification et les codes d'identification correspondants.In addition to manufacturing the complexes, the means computer generated a link file 36 which establishes the relationship between each identification code and the codes corresponding identification.

    A l'étape 35 de contrôle de qualité, on informe les moyens informatiques de l'élimination des étiquettes défectueuses en vue de la suppression des enregistrements correspondants dans le fichier de liens 36.In step 35 of quality control, the means are informed computerization of the elimination of defective labels with a view to deletion of the corresponding records in the file links 36.

    Le fichier de liens 36 et le stock de complexes obtenus sont livrés à l'étape 37 à un utilisateur qui est ici un fabricant de flacons.The link file 36 and the stock of complexes obtained are delivered in step 37 to a user who is here a manufacturer of bottles.

    L'organigramme de la figure 4 indique les étapes mises en oeuvre par le fabricant pour personnaliser les complexes.The flowchart in Figure 4 shows the steps implemented work by the manufacturer to personalize the complexes.

    A partir des flacons 40 manufacturés par le fabricant et des complexes 1+2 reçus de l'imprimeur, le fabricant imprime sur les parties non recouvertes de l'étiquette 1 des informations 4 concernant les flacons qu'il désire protéger.From 40 bottles manufactured by the manufacturer and 1 + 2 complexes received from the printer, the manufacturer prints on parts not covered by the label 1 of the information 4 concerning the bottles it wishes to protect.

    Ces informations de personnalisation des complexes sont simultanément mises à jour dans un fichier central 42 construit sur la base du fichier de liens 36 et dont chaque enregistrement comprend les informations de personnalisation 4.This complex customization information is simultaneously updated in a central file 42 built on the base of the link file 36 and of which each record includes personalization information 4.

    Le fabricant scinde ensuite le fichier central 42 en un fichier d'authentification 43 et un fichier de gestion 44.The manufacturer then splits the central file 42 into one authentication file 43 and a management file 44.

    Le fichier d'authentification 43 contient, pour chaque flacon, les trois codes d'authentification du complexe correspondant et les informations de personnalisation 4, ainsi que des champs libres pour des informations ultérieures.The authentication file 43 contains, for each bottle, the three authentication codes of the corresponding complex and personalization information 4, as well as fields free for further information.

    Le fichier de gestion 44 contient le code d'identification 3 ainsi que d'autres informations permettant l'organisation de la distribution commerciale des flacons.The management file 44 contains the identification code 3 as well as other information allowing the organization of the commercial distribution of vials.

    Le fichier de gestion 44 est confié à des équipes logistiques 45 tandis que le fichier d'authentification 43 demeure entre les seules mains du fabricant.Management file 44 is entrusted to logistics teams 45 while the authentication file 43 remains between the only hands of the manufacturer.

    En scindant le fichier central 42 en deux fichiers distincts, le fabricant perd toute possibilité d'établir un lien entre les informations concernant un flacon et le code d'identification porté par ce flacon.By splitting the central file 42 into two separate files, the manufacturer loses all possibility of establishing a link between the information about a bottle and the identification code worn by this bottle.

    Le contrôle de l'authenticité d'un flacon s'effectue suivant l'organigramme représenté à la figure 5.The authenticity of a bottle is checked according to the flowchart shown in Figure 5.

    Lors d'une étape 50, un inspecteur assermenté chargé de contrôler l'authenticité d'un flacon, arrache la fenêtre 15 de la feuille opaque 2 et gratte la couche opaque 10 pour découvrir le code d'authentification 7 qui lui est destiné, puis envoie ce code d'authentification 7 accompagné de son mot de passe 51 au fabricant.During a step 50, a sworn inspector responsible for check the authenticity of a bottle, tear off window 15 of the opaque sheet 2 and scrapes the opaque layer 10 to discover the authentication code 7 intended for him, then sends this code 7 with its password 51 to the manufacturer.

    Lors de l'étape 52, le fabricant interroge son fichier d'authentification 43 et retourne sa réponse 53, indiquant ainsi à l'inspecteur si le flacon est ou non authentique.During step 52, the manufacturer queries his file 43 and returns its response 53, thus indicating to the inspector whether or not the bottle is authentic.

    Simultanément, les informations concernant le flacon sont envoyées à l'inspecteur pour comparaison avec celles figurant sur l'étiquette 1.At the same time, the information about the bottle is sent to the inspector for comparison with those on label 1.

    A l'étape 54, l'inspecteur décide s'il est nécessaire de déclencher une procédure de contrôle en fonction de la réponse reçue du fabricant.In step 54, the inspector decides whether it is necessary to initiate a control procedure based on the response received from the manufacturer.

    A l'étape 55, le fabricant enrichit son fichier d'authentification 43 en y enregistrant la trace du contrôle effectué, si ce dernier a été positif.In step 55, the manufacturer enriches his file authentication 43 by recording the trace of the control performed, if the latter was positive.

    Sur la figure 6, on a représenté un organigramme du contrôle d'authenticité mis en oeuvre par un distributeur au moment de la vente du flacon.In Figure 6, there is shown a flowchart of the control authenticity implemented by a distributor at the time of sale of the bottle.

    A l'étape 60, le distributeur arrache la fenêtre 14, gratte la couche opaque 9 et découvre le code d'authentification 6 qu'il envoie au fabricant en même temps que son mot de passe personnel.In step 60, the dispenser tears off window 14, scrapes the opaque layer 9 and discovers the authentication code 6 which it sends to the manufacturer together with his personal password.

    Cet envoi peut s'effectuer au travers d'un dispositif de connexion 61 relié au fabricant.This can be done through a connection 61 connected to the manufacturer.

    Ce dernier interroge son fichier d'authentification 43 et vérifie à l'étape 62 l'authenticité du flacon. La réponse 63 du fabricant est retournée au distributeur avec un nouveau code d'authentification que le distributeur saisit à l'étape 64.The latter interrogates its authentication file 43 and in step 62, checks the authenticity of the bottle. Answer 63 of manufacturer returned to distributor with new code authentication that the distributor enters in step 64.

    Simultanément, le fabricant enrichit son fichier d'authentification à l'étape 65 en enregistrant le nom du point de vente et des informations générales sur le consommateur. Simultaneously, the manufacturer enriches his file in step 65 by registering the name of the sales and general consumer information.

    A l'étape 65, le distributeur émet un bon de garantie numéroté 66 sur lequel il imprime le nouveau code d'authentification reçu du fabricant.In step 65, the distributor issues a guarantee voucher numbered 66 on which he prints the new authentication code received from the manufacturer.

    La figure 7 illustre une opération de contrôle d'authenticité effectuée par un consommateur 70 ayant acheté le flacon.Figure 7 illustrates an authenticity check operation made by a consumer 70 who bought the bottle.

    Après voir arraché la fenêtre 13 et découvert le code d'authentification 5 masqué par la couche grattable 8, le consommateur interroge le fabricant soit par téléphone, soit par des moyens télématiques.After seeing window 13 torn off and discovering the code authentication 5 masked by the removable layer 8, the consumer questions the manufacturer either by telephone or by telematic means.

    En fonction du code d'authentification fourni au fabricant, ce dernier interroge son fichier d'authentification 43 et confirme au consommateur l'authenticité du flacon.Depending on the authentication code provided to the manufacturer, the latter interrogates his authentication file 43 and confirms to the consumer the authenticity of the bottle.

    Ultérieurement, si le flacon s'avère défectueux, le consommateur peut faire jouer la garantie en mettant en oeuvre les étapes illustrées à la figure 8.Subsequently, if the bottle turns out to be defective, the consumer can exercise the guarantee by implementing the steps illustrated in Figure 8.

    A l'étape 80, le consommateur envoie au fabricant le code d'authentification figurant sur son bon de garantie ainsi que son propre code d'authentification.In step 80, the consumer sends the manufacturer the code on his warranty card and his own authentication code.

    Le fabricant interroge le fichier d'authentification 43 à l'étape 81 et vérifie que le bon de garantie ainsi identifié est bien celui qui est lié au flacon en possession du consommateur.Manufacturer queries authentication file 43 at step 81 and verifies that the guarantee bond thus identified is the one linked to the bottle in the consumer's possession.

    La réponse du fabricant est adressée au consommateur à l'étape 82.The manufacturer's response is addressed to the consumer at step 82.

    Cette opération de contrôle d'authenticité après la vente du produit peut aussi être exécutée par un service après-vente ou par le distributeur.This authenticity check operation after the sale of the product can also be executed by an after-sales service or by the distributor.

    A l'étape 83, le fabricant enrichit, son fichier d'authentification en y enregistrant, par exemple, la date de mise en oeuvre de la garantie.In step 83, the manufacturer enriches his file authentication by recording, for example, the date of of the warranty.

    Il est bien entendu que le mode de réalisation qui vient d'être décrit ne présente aucun caractère limitatif et qu'il pourra recevoir toutes modifications désirables sans sortir pour cela du cadre de l'invention.It is understood that the embodiment which comes to be described has no limiting nature and that it may receive all desirable modifications without leaving the part of the invention.

    Claims (9)

    1. Complex intended to guarantee the tamper-resistance and authenticity of an object comprising:
      a base support (1) solidly secured to the object (16) and on which are printed an identification code (3) and at least one authentication code (5, 6, 7), characterized in that it furthermore comprises:
      a protective foil (2), possibly opaque, partially covering the base support (1) so as to protect the authentication code (5, 6, 7) and able to be applied to the object (16) in such a way as to ensure the tamper-resistance thereof, and
      information (4) which relates to the object (16) itself and which is carried on the uncovered part of the base support (1).
    2. Complex according to Claim 1, characterized in that the authentication code (5, 6, 7) printed on the base support is masked by an opaque layer of a scratch-off material (8, 9, 10).
    3. Complex according to either of Claims 1 and 2, characterized in that the protective foil (2) constitutes proof of tamper-resistance of the protected object (16), guaranteeing that the latter has been neither opened nor used.
    4. Complex according to any one of Claims 1 to 3, characterized in that it comprises an authentication code printed with a magnetic ink readable through the protective foil.
    5. Complex according to Claim 4, characterized in that it comprises, in that part of the base support (1) not covered by the protective foil (2), a checking key generated by an algorithm on the basis, on the one hand, of the authentication code (5, 6, 7) of the complex, and, on the other hand, of an item of information specific to the protected object (16) appearing in a readable manner on the base support (1).
    6. Device intended to guarantee the tamper-resistance and authenticity of an object, characterized in that it comprises complexes (1, 2) according to any one of Claims 1 to 5 and at least one file of links (36) containing the identification code or codes (3) of each complex in conjunction with its authentication code (5, 6, 7), as well as an authentication file (42) containing, in conjunction with the authentication code (5, 6, 7) of each complex, the information (4) which relates to the protected object (16) and is carried on the uncovered part of the base support (1) of the said complex.
    7. Device intended to guarantee the tamper-resistance and authenticity of an object, characterized in that it comprises a complex (1, 2) according to Claim 5, and a magnetic reader built into which is a microprocessor executing the same algorithm as that which served to generate the checking key printed on the complex.
    8. Device according to Claim 7, characterized in that the microprocessor is supported by a chip card which plugs into the magnetic reader.
    9. Device according to either of Claims 7 and 8, characterized in that the microprocessor is enclosed in a tamper-resistant capsule.
    EP98929501A 1997-06-06 1998-06-05 Complex and device for guaranteeing the tamper-protection and authenticity of a document or goods Expired - Lifetime EP0986804B1 (en)

    Applications Claiming Priority (3)

    Application Number Priority Date Filing Date Title
    FR9707051 1997-06-06
    FR9707051A FR2764422B1 (en) 1997-06-06 1997-06-06 COMPLEX AND DEVICE FOR GUARANTEEING THE INVIOLABILITY AND AUTHENTICITY OF A DOCUMENT OR GOODS
    PCT/FR1998/001150 WO1998055984A1 (en) 1997-06-06 1998-06-05 Complex and device for guaranteeing the tamper-protection and authenticity of a document or goods

    Publications (2)

    Publication Number Publication Date
    EP0986804A1 EP0986804A1 (en) 2000-03-22
    EP0986804B1 true EP0986804B1 (en) 2002-03-13

    Family

    ID=9507708

    Family Applications (1)

    Application Number Title Priority Date Filing Date
    EP98929501A Expired - Lifetime EP0986804B1 (en) 1997-06-06 1998-06-05 Complex and device for guaranteeing the tamper-protection and authenticity of a document or goods

    Country Status (4)

    Country Link
    EP (1) EP0986804B1 (en)
    DE (1) DE69804219T2 (en)
    FR (1) FR2764422B1 (en)
    WO (1) WO1998055984A1 (en)

    Families Citing this family (10)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    GB9809810D0 (en) * 1998-05-07 1998-07-08 Redcliffe Magtronics Limited Improvements relating to tamper proof closures
    FR2828316A1 (en) 2001-08-02 2003-02-07 Sequoias Method for prevention of fraudulent reproduction of documents by provision of layers of increasing security on the same area of a document, the delamination of which will lead to document destruction
    ITMI20040524A1 (en) * 2004-03-18 2004-06-18 Exp Box Madeinitaly Com S R L METHOD AND APPARATUS TO VERIFY THE AUTHENTICITY OF PRODUCTS
    DE102006019557B4 (en) * 2006-04-27 2010-04-08 Karl Knauer Kg Packaging Unit
    FR2914767B1 (en) * 2007-04-05 2009-08-21 Neopost Technologies Sa MAIL TREATMENT MACHINE HOUSING WITH DETACHABLE IDENTIFICATION PLATE.
    DE102007022460A1 (en) 2007-05-09 2008-11-13 Horatio Gmbh Object e.g. driving license, possession verification method, involves generating certificate, if necessary with ascertained integrity, where certificate is transferred to distant verification instance over telecommunication devices
    DE102011018620A1 (en) * 2011-04-21 2012-10-25 Jochen Claussen System of consumer goods with information carrier and server
    ITPI20120008A1 (en) * 2012-01-20 2013-07-21 Giorgio Romi "ANTI-COUNSELING LABELING SYSTEM OF PRODUCTS"
    EP2874136A1 (en) * 2013-11-15 2015-05-20 Matteo Marchesano Device for recognising the authenticity of a packaged product to be sold
    IT201700122710A1 (en) 2017-10-27 2019-04-27 Gfl S A FLIP TOP TUBE WITH GUARANTEE SEAL

    Family Cites Families (4)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US5346259A (en) * 1992-07-16 1994-09-13 Avery Dennison Corporation Anti-theft label construction
    US5267756A (en) * 1992-09-30 1993-12-07 The Upper Deck Company Authentication system
    FR2713380B1 (en) * 1993-12-03 1996-01-19 Soltex Soc Civ Device to certify the authenticity or the absence of violation of an object such as a document or packaging.
    FR2719687B1 (en) * 1994-05-04 1996-09-06 Hologram Ind Sarl Method for marking products or documents, product thus marked and means for implementing the method and a device for verifying such a product or document.

    Also Published As

    Publication number Publication date
    FR2764422A1 (en) 1998-12-11
    WO1998055984A1 (en) 1998-12-10
    DE69804219T2 (en) 2002-11-07
    DE69804219D1 (en) 2002-04-18
    FR2764422B1 (en) 1999-08-20
    EP0986804A1 (en) 2000-03-22

    Similar Documents

    Publication Publication Date Title
    EP1810266B1 (en) Method and device for verification of non intrusion into a system and/or non-violation of the integrity of an object or the contents thereof
    HU223693B1 (en) Tamper-evident form for securely carrying information
    US6226619B1 (en) Method and system for preventing counterfeiting of high price wholesale and retail items
    FR2900486A1 (en) Original product or detached part individualizing method for Internet, involves associating confidential code and identifying codes in database on server connected to Internet, and verifying authenticity of product via connection to server
    WO2005091232A1 (en) Method for authentication of products
    EP0986804B1 (en) Complex and device for guaranteeing the tamper-protection and authenticity of a document or goods
    EP1200270A1 (en) Element d'emballage a marquage imprime, son utilisation, et procede de fabrication
    WO2010086522A1 (en) Customised secure document and procedure for securing a document
    EP3857425A1 (en) Method for the traceability and authentication of products
    FR2783077A1 (en) Labelling system for genuine merchandise includes self-adhesive label with visible and machine-readable sections which must tally to provide evidence of validity
    EP1340212B1 (en) Method for secure authentication and monitoring of a product in particular a bottle
    JP2004258583A (en) Information recording medium and authenticity judgement method using this
    CA2656121A1 (en) Tamperproof information ticket
    FR2867590A1 (en) Object e.g. travel document, protection method, involves applying decoding films with decoding patterns on object such that shallow image can be readable by indirect visualization across decoding pattern superposed with source pattern
    WO2020183017A1 (en) Method for producing a label comprising a hidden security code and method for implementing said label
    EP4260518A1 (en) Device and method for authenticating products
    FR2949588A1 (en) METHOD AND DEVICE FOR PROTECTING A PRODUCT AGAINST COUNTERFEIT
    FR2974756A1 (en) Safety device for protecting visible personal information e.g. cryptogram, on personal payment card i.e. smartcard, has protective layer including opaque part for masking cryptogram, and transparent windows to expose selected areas of card
    WO2001025981A1 (en) System for identifying and validating data, in particular loyalty points for promoting sales outlets
    WO2006120333A2 (en) Device for protecting and proving the authenticity of an object or document and/or making a packaging tamper-evident
    WO2008135662A1 (en) Checking and authentication method and system
    FR2629936A1 (en) Device allowing permanent identification of all administrative documents whether official or otherwise, public or private, and also ensuring integrity against falsification
    FR2610748A1 (en) Method of personalising documents preventing their fraudulent use
    WO2006077293A1 (en) Multilayer plate for producing self-adhesive labels, method for the production of one such plate, and label comprising the same
    BE898148A (en) Marking kit for vehicles - has identity card for user and adhesive tickets for attachment to vehicle

    Legal Events

    Date Code Title Description
    PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

    Free format text: ORIGINAL CODE: 0009012

    17P Request for examination filed

    Effective date: 19991227

    AK Designated contracting states

    Kind code of ref document: A1

    Designated state(s): CH DE ES FR GB GR IT LI PT

    GRAG Despatch of communication of intention to grant

    Free format text: ORIGINAL CODE: EPIDOS AGRA

    17Q First examination report despatched

    Effective date: 20010411

    GRAG Despatch of communication of intention to grant

    Free format text: ORIGINAL CODE: EPIDOS AGRA

    GRAH Despatch of communication of intention to grant a patent

    Free format text: ORIGINAL CODE: EPIDOS IGRA

    GRAH Despatch of communication of intention to grant a patent

    Free format text: ORIGINAL CODE: EPIDOS IGRA

    REG Reference to a national code

    Ref country code: GB

    Ref legal event code: IF02

    GRAA (expected) grant

    Free format text: ORIGINAL CODE: 0009210

    AK Designated contracting states

    Kind code of ref document: B1

    Designated state(s): CH DE ES FR GB GR IT LI PT

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: GR

    Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

    Effective date: 20020313

    Ref country code: GB

    Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

    Effective date: 20020313

    REG Reference to a national code

    Ref country code: CH

    Ref legal event code: EP

    REF Corresponds to:

    Ref document number: 69804219

    Country of ref document: DE

    Date of ref document: 20020418

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: PT

    Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

    Effective date: 20020614

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: LI

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20020630

    Ref country code: CH

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20020630

    GBV Gb: ep patent (uk) treated as always having been void in accordance with gb section 77(7)/1977 [no translation filed]

    Effective date: 20020313

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: ES

    Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

    Effective date: 20020925

    PLBE No opposition filed within time limit

    Free format text: ORIGINAL CODE: 0009261

    STAA Information on the status of an ep patent application or granted ep patent

    Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

    REG Reference to a national code

    Ref country code: CH

    Ref legal event code: PL

    26N No opposition filed

    Effective date: 20021216

    PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

    Ref country code: FR

    Payment date: 20050518

    Year of fee payment: 8

    PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

    Ref country code: DE

    Payment date: 20050729

    Year of fee payment: 8

    PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

    Ref country code: IT

    Payment date: 20060630

    Year of fee payment: 9

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: DE

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20070103

    REG Reference to a national code

    Ref country code: FR

    Ref legal event code: ST

    Effective date: 20070228

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: FR

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20060630

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: IT

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20070605