EP1371033A1 - Procede de localisation et/ou de verification d'articles - Google Patents
Procede de localisation et/ou de verification d'articlesInfo
- Publication number
- EP1371033A1 EP1371033A1 EP02714367A EP02714367A EP1371033A1 EP 1371033 A1 EP1371033 A1 EP 1371033A1 EP 02714367 A EP02714367 A EP 02714367A EP 02714367 A EP02714367 A EP 02714367A EP 1371033 A1 EP1371033 A1 EP 1371033A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- article
- container
- database
- articles
- given
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
Definitions
- the invention relates to a method for tracking and/or verifying articles according to the preamble of claim 1.
- EP 967 459 describes a system for verifying ownership of articles where a unique article number is affixed to each article. In addition to this, a certifi- cate carrying a certification number is provided for each article. For verifying ownership of an article, both numbers are transferred to a database where they are checked.
- this method requires the delivery of certificates, which, in many applications, requires fur- ther logistic and administrative efforts.
- the problem to be solved by the present invention is to provide a method of the type mentioned above that alleviates at least some of these problems.
- This problem is be solved by the method of the independent claims.
- the path information is kept up-to-date by storing the number of the container the article is placed in.
- the container number is scanned and the records of all articles in the container are located for being updated. This allows to update the records of a large number of articles with a single operation.
- the database also stores the container number of each article.
- the article number as well as the number of the container it was located in is transferred through a communication network to a central data- base.
- This database contains the article numbers of all registered articles as well as the container number for each article and can therefore be used for a redundant check of the received article number and container number .
- the two numbers can be scanned and entered into the database in a flexible manner, there is no need to ensure that a certain article goes into a certain container while commissioning the articles. Rather, when packaging an article in its container, the article and container numbers can be read quickly on-site and be sent to the database for updating the article's record, without need to synchronize the flow of articles and containers .
- the article and corresponding container number cannot be derived from each other in obvious manner.
- a third party will be unable to generate article numbers for a given container number or vice versa.
- at least one or both types of numbers can be created independently using random or pseudo-random algorithms .
- the method is iterative, i.e. the container or containers can be placed in "super-containers" having super-container numbers affixed thereto, and the database can store the corresponding hierarchy of numbers.
- the container or containers can be placed in "super-containers" having super-container numbers affixed thereto, and the database can store the corresponding hierarchy of numbers.
- Fig. 1 shows articles, containers and super- containers carrying identification numbers
- Fig. 2 is a possible supply chain
- Fig. 3 is a second embodiment of the invention.
- Fig. 4 shows a repackaging of containers.
- a plurality of arti- cles 1 is to be packaged and shipped.
- each article 1 is packaged in an individual package and a label 2 carrying a unique article number 3 is attached to each package.
- the article number may be any numeric or alpha-numeric string of suitable length. It may e.g. be encoded as bar code (as shown) and/or in human readable digits or letters or in any other type of marking technique.
- the article number may also be encoded in an RF tag or a magnetic stripe affixed to each package or article.
- a plurality of articles are packaged in a common container 4. In the present embodiment, each container 4 holds three articles.
- each container is provided with a unique container number 5, which is e.g. again printed on a suitable label 6 or directly on the container's surface.
- the container number may be any numeric or alphanumeric string of suitable length and it can be encoded using any suited marking technique.
- this process can be iterated by placing a plurality of containers 4 in a common super-container 7, which can again be marked with a label 8 carrying a unique super-container number 9, etc.
- the labels can be designed as seals that must be broken for accessing the insides of a package, container or supercon- tainer .
- the articles packaged in this way can be any type of articles where authentication may be required.
- Fig. 2 shows how the articles are distributed and how they can be tracked and/or their authenticity can be verified.
- a manufacturer 10 packages the articles 1 and places them in containers 4 and super- containers 7 in the manner explained above. Whenever an item is placed in a next larger container, its number is read or scanned, e.g. manually or by a suitable scanner device, and it is recorded together with the number of the container. The corresponding information (the container number and the article number (s) of the article (s) going into the container) is then sent to a secure data- base 11. In this way, database 11 can maintain a list of all article numbers 3 and, for each article, the number 5 of the container 4 it has been placed in. Similarly, it can maintain a list of all container numbers 5 and the numbers 9 the super-containers 7 they are placed in. The numbers and corresponding items recorded in the database 11 are in the following called “registered numbers” and "registered items”.
- the corre- sponding labels may e.g. manufactured and attached in a controlled manner such that the information of what article numbers are in which container is known without need to scan the numbers. This type of procedure requires, however, a controlled flow of articles and containers.
- the manufacturer 10 will usually ship the largest type of container (the above "super-container” 7) to distributors 12. Before shipping a "super-container” 7, the manufacturer scans again its label 8 and instructs database 11 that the super-container is being shipped to a given destination. This allows database 11 to identify and locate the records of all containers and articles within it and update them to specify that the container/article is on its way to the given destination.
- the distributor 12 Upon receipt of a super-container 7, the distributor 12 should first check if the label 8, which acts as a seal, has been broken. If yes, he must assume that the super-container was opened and that the container- numbers 5 inside it may have been read by an unauthorised third party. If this is the case, he should alert database 11 or manufacturer 10 (who will in his turn alert database 11) . Database 11 will mark the corresponding su- per-container number and container-numbers as insecure and possibly known (in their combination) to a third party.
- distributor 12 accepts the super-container 7. He scans the label 8, which tells database 11 that all containers and articles within it have arrived at the distributor 12, which allows it to update all corresponding records.
- distributor 12 wants to verify the authenticity of the shipment more carefully, he can open the super-container and proceed as follows:
- the distributor 12 can send all container numbers 5 in the super-container to database 11, which then runs the same check for each container.
- distributor 12 will sell the (e.g. unopened) containers 4 to retailers 13. Again, when a container 4 leaves the distributor or arrives at a retailer, its label 6 is scanned in order to let database 11 update the records of all articles within the container.
- a retailer can take similar steps for verifying the shipment as the distributor 12. He first checks if the label 6 is broken and alerts distributor 12, manufacturer 10 and/or database 11 if this is the case. If not, he can open container 4. He can then check the authenticity of the delivery by sending container number 5 together with at least one article number 3 to database 11 for verification.
- retailer 13 will sell the individual articles 1 to end users 14. If an end user 14 wants proof of the authenticity of an article, he can either query database 11 using the article number (which may then e.g. confirm that the article is a registered article) or, depending on the nature of the article to be sold, he can even request retailer 13 to provide the container number for the given article and send both these numbers to the database for verification in the manner described above.
- the authenticity of containers 4 or super-containers 7 can be checked at any time, e.g. by custom authorities, by taking a sample, e.g. of a container 4, opening the same, and sending the container number 5 as well as an article number 2 of an article 1 inside it, to the database 11.
- the present system allows to track and/or verify articles and containers easily.
- the verification of authenticity uses two independent numbers and not only one, which inher- ently increases the reliability of the method.
- the system is immune to most attacks. For instance, in order to manufacture unauthorized articles, a fraudulent party would have to know not only individual article numbers 3 but also the corresponding container numbers 5. This would make it necessary to open containers to get access to the items inside, which would be detected in a next step of the distribution chain.
- the labels and numbers on the articles and containers need not have the same format and encoding scheme.
- a particularly preferred embodiment of the invention is shown in Fig. 3, where the individual articles 1 are trousers.
- the label 2 carrying article number 3 is affixed to a part of each pair of trousers, either on the in-side, the outside or e.g. within a pocket.
- trousers are design items whose visual appearance must not be impaired, label 2 is as compact as possible.
- article number 3 is encoded in a two-dimensionally modulated graphical pattern.
- Various techniques for encoding data as two-dimensional dot or bar patterns are known, such as Data MatrixTM by RVSI Acuity CiMatrix, Canton, USA.
- the labels 6 and 8 on the containers 4 and the super-containers 7 may also be encoded using another standard encoding format, such as "Code 39", “Code 128", “Interleaved 2 of 5" or "Plessey Code”, which can be used alternatively or in combination.
- the present system can be optimized for any type of application.
- the encoding used on the articles 1 is preferably more dense (i.e. it holds more information per area) than the encoding used on the containers 4 (or super-containers 7), and the latter is preferably one of the standard encodings mentioned above, in particular UCC/EAN 128.
- the labels 6, 8 on the containers and super- containers are primarily used for tracking and tracing containers and articles, while the labels 2 on the articles are primarily used for authentication of the arti- cles.
- the item numbers are printed on a label 2, 6 or 8, which is then affixed to the article's package, a container or a super-container.
- the number can e.g. be affixed to the article (container, super-container) by physically attaching it thereto (e.g. by printing or engraving it on the same or by attaching a label with the number to the item) .
- the number can also placed as a slip or certificate into the package of the article, the container or the super- container, respectively. It is preferred, however, to place the number on the outside of the object it belongs to such that it can be inspected without opening the ob- ject.
- the individual articles 1 are preferably marked inconspicuously by using small labels attached to their insides.
- the system described here allows not only to verify the authenticity of the various items, but it allows also to track the items in the distribution chain, as each verification request can be recorded in database 11, together with information identifying the requester, i.e. the origin of the request.
- a precise analysis of the flow of items becomes possible. For example, the target market of each product can be determined easily, which can be of interest in case a batch of articles has to be called back to the manufacturer for repairs.
- the system also allows to detect and monitor gray market activities. Furthermore, the system can be used to store and manage guarantee rights and expiry dates of the items it monitors .
- data- base 11 can be designed to determine the origin of each verification request or request regarding other information regarding an article or type of article.
- the number of such requests originating from a given area is counted for each type of arti- cle. If the given area is an area where the article or type of article is not intended to be sold, the corresponding count allows to easily obtain an estimate for the number of observations of the type of article in a given area, which is an indication of the gray market ac- tivity in this area. If this activity is found to exceed a given threshold, further measures can be taken.
- a bill of lading When articles are shipped through customs, they are generally accompanied by a "bill of lading" or another shipment document that indicates at least the following items of information: the origin of the articles the destination of the articles the type and number of articles .
- a bill of lading carries usually a unique identifier.
- database 11 In order to link a bill of lading with the present system, database 11 either stores the identifier of the bill of lading attributed to a given article, or the bill of lading lists the container number of the out- most container (or, e.g. if there is no such container, the article number) .
- a customs officer wants to check the authenticity of a shipment, he sends either the identifier of the bill of lading or the container or article number (s) listed in the bill of lading to the data- base.
- distributor 12 may wish to repackage the containers 4 in new super-containers 7 as shown in Fig. 4.
- distributor 12 receives two super- containers 7a, 7b.
- Each super-container stores a plurality of identical containers 4a, 4b respectively.
- Dis- tributor 12 may open the super-containers and to check their authenticity as described above.
- he alerts, via a suitable communication network, database 11 that the corresponding containers 4a, 4b have now been removed from their super-containers. This information is received by and recorded in database 11.
- distributor 12 packages one container 4a from super- container 7a and one container 4b from super-container 7b in a common super-container 7c. He alerts database 11 that the super-container for containers 4a, 4b is now super-container 7c, providing it with the super-container- number of the new super-container. This information is again received by and recorded in database 11, such that database 11 correctly reflects that the items 4a, 4b are now in super-container 7c. This allows to track all containers within super-container 7c using the super- container's number only, and a receiver of super- container 7c can again check its authenticity by using database 11.
- the number of times a given type of article is removed from its container and placed in a new con- tainer at a given distributor is preferably counted. If the corresponding count is very high, the distributor might be involved in gray market activities.
- Fig. 4 was described at the level of containers and super-containers, but it can similarly be used at the level of articles and containers or any other level of the packaging hierarchy.
- the communication between database 11 and any parties checking authenticity of items can be carried out by means of any communication network, e.g. by phone or by Internet.
- Database 11 stores, for each article 1, its article number, the number 5 of its container, as well as (where applicable) the number 9 of its super-container.
- further data can be stored for each article.
- each record holds path information of the corresponding article. This path information can e.g. contain a history of the path of said article through the distribution network, a desired path of the article through the distribution network, and/or a target market of the article indicating where a given article is allowed to be sold.
- the path information may have to be changed for a plurality of articles 1 at the same time, e.g. for all articles 1 in a given container 4 when this article passes a given point in the distribution network.
- database 11 is designed to receive a container number and an update to be stored in or added to the path information of each article 1 in the container 4.
- the present system allows to monitor articles, containers, super-containers and even larger container entities in hierarchic manner.
- article and "container” to express one arbitrary step in this hierarchy. For certain types of goods, such as cigarettes, the number of individual items (cigarette packets) can become exceedingly large.
- each article 1 would correspond to cigarette cartons (each carton containing a plurality of packets)
- the containers 4 would correspond to packages of cigarette cartons.
- each article 1 would contain several "items" (cigarette packets) .
- the items themselves may also carry a number, the item number, but for saving storage capacity in database 11 and for simplifying the production process, the item numbers are not independent of the article numbers. Rather, all item numbers share a common feature that allows to check if they belong to an article having a given article number.
- the following is a list of possible implementations of article numbers: a) If the article number is e.g. XXX, the items in the article carry the numbers XXX-1, XXX-2, XXX- 3, etc., or the items may simply carry the same number as the article. b)
- the item number is a number derived from the article number in non-obvious manner.
- the algorithm for deriving the item number is preferably one- directional such that the article number cannot be derived from the item number.
- the item number can comprise a hash-value of the article number, or a cryptographically secure algorithm such as used for the generation of public and private key pairs may be applied.
- the items in an article may e.g. carry the numbers YYY-1, YYY-2, YYY-3, where the value YYY is stored in database 11 together with the corresponding article number. Again, this makes it impossible to forge a valid container number from an article number without access to database 11, while keeping database requirements low.
- the connection between item number and article number is non-obvious, i.e. it is virtually impossible, for a potential forger, to check if a given pair of article and item numbers match.
- a match can only be verified by feeding both numbers to database 11 (implementation c) or an algorithm (implementation b) to check for consistency of the numbers.
- the item number is derived from the article number using an algorithm and the same algorithm can be used for checking if an item belongs to a given article.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Details Of Rigid Or Semi-Rigid Containers (AREA)
Abstract
Dans un système de localisation d'articles et de vérification de leur authenticité, des numéros (3) d'article individuel sont fixés sur chaque article (1). Les articles sont placés dans des contenants (4), et un numéro (5) de contenant individuel est fixé sur chaque contenant. Une base de données sert à stocker les numéros d'articles ainsi que les numéros de contenants correspondants. La base de données permet d'utiliser le numéro (5) de contenant pour localiser facilement tous les articles d'un contenant. Afin de vérifier un article ou un contenant, on charge le numéro (3) d'article et le numéro de contenant dans la base de données. Ce système offre une fiabilité accrue par rapport à des systèmes basés sur un seul numéro, tout en étant facile à mettre en oeuvre.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
WOPCT/IB01/00356 | 2001-03-14 | ||
PCT/IB2001/000356 WO2002073550A1 (fr) | 2001-03-14 | 2001-03-14 | Procede pour verifier l'authenticite d'un article |
PCT/IB2002/000728 WO2002073551A1 (fr) | 2001-03-14 | 2002-03-12 | Procede de localisation et/ou de verification d'articles |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1371033A1 true EP1371033A1 (fr) | 2003-12-17 |
Family
ID=11004057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02714367A Withdrawn EP1371033A1 (fr) | 2001-03-14 | 2002-03-12 | Procede de localisation et/ou de verification d'articles |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1371033A1 (fr) |
AU (1) | AU2002246281A1 (fr) |
WO (2) | WO2002073550A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112567403A (zh) * | 2018-11-14 | 2021-03-26 | 宝马股份公司 | 用于跟踪构件的方法 |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1420381A1 (fr) | 2002-11-12 | 2004-05-19 | Hauni Maschinenbau AG | Procédé et dispositif de caractérisation et de contrôle d'authentificité de produits |
GB2431494A (en) * | 2005-10-18 | 2007-04-25 | Aegate Ltd | Authenticating products |
GB0710467D0 (en) * | 2007-06-01 | 2007-07-11 | Simons Bright A | Universal unique product authentication protocol & supply chain validation system |
EP2172882A1 (fr) | 2008-10-06 | 2010-04-07 | JT International S.A. | Procédé et système de conditionnement de cigarettes |
EP2201850A1 (fr) | 2008-12-24 | 2010-06-30 | Philip Morris Products S.A. | Article incluant des informations d'identification à utiliser dans un système de fumée chauffé thermiquement |
GB2470900B (en) * | 2009-06-08 | 2017-06-14 | Kezzler As | Method and system for storage and retrieval of track and trace information |
JP5838785B2 (ja) * | 2011-12-21 | 2016-01-06 | 大日本印刷株式会社 | カード箱詰め装置 |
TWI610253B (zh) | 2012-12-17 | 2018-01-01 | 印奈克斯托股份有限公司 | 用於儲存追踪製造品項用的資料之方法及設備 |
EP3051469B1 (fr) * | 2015-01-28 | 2024-05-22 | Inexto Sa | Procédé et appareil pour l'identification et le suivi d'une unité et d'un récipient |
EP3051372B1 (fr) | 2015-01-31 | 2019-03-06 | Inexto Sa | Identification et vérification de produits sécurisés |
US20180205543A1 (en) | 2015-08-13 | 2018-07-19 | Inexto Sa | Enhanced obfuscation or randomization for secure product identification and verification |
US10594494B2 (en) | 2015-08-25 | 2020-03-17 | Inexto Sa | Multiple authorization modules for secure production and verification |
CN108140076B (zh) | 2015-08-25 | 2022-04-05 | 英艾克斯图股份有限公司 | 用于安全产品标识符的具有容错的验证 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4816824A (en) * | 1980-06-23 | 1989-03-28 | Light Signatures, Inc. | Merchandise verification and information system |
IE77642B1 (en) * | 1994-04-08 | 1997-12-31 | Kepak Patents | Package processing |
US6442276B1 (en) * | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
EP0957459A1 (fr) * | 1998-05-12 | 1999-11-17 | Orell Füssli Graphische Betriebe AG | Méthode et dispositif pour vérifier le droit de propriété d'objets |
US6226085B1 (en) | 1998-06-26 | 2001-05-01 | Gretagmacbeth Llc | Method and apparatus for surface effect characterization |
DE10019721A1 (de) * | 1999-08-25 | 2001-03-01 | Giesecke & Devrient Gmbh | Verfahren zur Produktsicherung |
-
2001
- 2001-03-14 WO PCT/IB2001/000356 patent/WO2002073550A1/fr active Application Filing
-
2002
- 2002-03-12 WO PCT/IB2002/000728 patent/WO2002073551A1/fr not_active Application Discontinuation
- 2002-03-12 EP EP02714367A patent/EP1371033A1/fr not_active Withdrawn
- 2002-03-12 AU AU2002246281A patent/AU2002246281A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO02073551A1 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112567403A (zh) * | 2018-11-14 | 2021-03-26 | 宝马股份公司 | 用于跟踪构件的方法 |
Also Published As
Publication number | Publication date |
---|---|
WO2002073551A1 (fr) | 2002-09-19 |
AU2002246281A1 (en) | 2002-09-24 |
WO2002073550A1 (fr) | 2002-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220309517A1 (en) | Methods and systems for making, tracking and authentication of products | |
US20170270467A1 (en) | Method and Apparatus for Identifying, Authenticating, Tracking and Tracing Manufactured Items | |
US8543411B2 (en) | Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale | |
EP0996928B1 (fr) | Verification de l'authenticite d'articles au moyen de nombres aleatoires | |
US7917443B2 (en) | Authentication and tracking system | |
US7277601B2 (en) | Remote authentication system | |
EP2002382B1 (fr) | Procédé et dispositif d'obtention d'informations d'article à l'aide d'étiquettes rfid | |
US20150143128A1 (en) | Method and device for product and document authentication | |
EP1371033A1 (fr) | Procede de localisation et/ou de verification d'articles | |
US9473303B2 (en) | Method and system for product authentication | |
CN105427117A (zh) | 一种基于电子数据保全技术的农产品通用溯源防伪系统及方法 | |
US20040162828A1 (en) | System and methods for monitoring items | |
US20130317996A1 (en) | Systems and Methods for Tracking Status of Random Unique Code Strings and Generation of Random Unique Code Strings | |
Stein | Supply chain with blockchain—showcase RFID | |
CN113366518A (zh) | 物体的标记 | |
Tan et al. | A robust and secure RFID-based pedigree system (short paper) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030825 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20051001 |