EP2024943A1 - Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens - Google Patents
Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrensInfo
- Publication number
- EP2024943A1 EP2024943A1 EP07731339A EP07731339A EP2024943A1 EP 2024943 A1 EP2024943 A1 EP 2024943A1 EP 07731339 A EP07731339 A EP 07731339A EP 07731339 A EP07731339 A EP 07731339A EP 2024943 A1 EP2024943 A1 EP 2024943A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- article
- code
- chip
- management
- management code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/122—Online card verification
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
Definitions
- the invention relates to a method of securing an item and, in particular, a luxury item, according to which - it is customizable a contactless electronic chip by a management code, this management code can be read by means of a a suitable contactless reader, and - said chip is positioned in said article.
- the invention further relates to a system for implementing this method.
- a problem to be solved by the invention is to provide a method of securing articles, in particular luxury articles, which makes it possible to verify with certainty the authenticity of these articles and of ensure their traceability, the management of this process remains simple.
- the proposed solution of the invention to this problem posed firstly a method of securing an article comprising the following steps according to which: a contactless electronic chip is personalized by a management code, this management code being readable by means of a suitable contactless reader of the chip; and positioning said chip in said article; and, characterized in that it further comprises the following steps according to which: a secret secondary code associated with the management code is defined, said secondary code being known to the acquirer of the article; and verifying the authenticity of the article by reading the management code and verifying the knowledge, by the bearer of the article, of the secondary code.
- Its second object is a security system of an article; and a non-contact electronic chip positioned in said article, said chip being personalized by a management code, said management code being readable by means of a suitable contactless reader of the chip, and characterized in that a secondary secret code is defined and associated with the management code, said secondary code being known to the purchaser of the article, and in that the authenticity of the article is able to be verified by the knowledge of the holder of the article, said secondary code.
- the contactless electronic chip positioned in the article comprises a public management code, and therefore readable by appropriate readers.
- a secondary code is associated with this management code.
- This secondary code is not available to the public and is not coded on the chip.
- This secondary code is, however, known to the acquirer of the article, referenced in the database and associated with the management code of said acquired article.
- the knowledge of the article holder of the secondary code is verified. If this verification proves to be positive, that is to say if the bearer of the article actually has good knowledge of the secondary code, then the article is authentic and has been effectively marketed. Otherwise, the item is not genuine or has been stolen.
- the management code is a numeric or alphanumeric code which is specific to the article;
- the management and secondary codes are recorded in a database and, for verification of knowledge by the bearer of the article, the secondary code, said carrier reveals this secondary code and the correspondence between this secondary code and the management code in the database;
- the chip is personalized by a primary code and in that this primary code is stored in a database;
- the database also includes information relating to the identity of the purchaser of the article, for example, his date of birth, and preferably his surname and first name;
- the chip is formed of a capsule incorporating a semiconductor substrate connected to an antenna; and the chip is housed or included in a cavity of the article.
- FIG. 1 shows, schematically, a secured ring according to the invention
- FIG. 2 is a representation of the management code recorded in a chip for securing an article according to the invention
- Figure 3 is a diagram showing the different steps of securing an article according to the method of the invention
- Figure 4 shows, schematically, the system according to the invention.
- the method according to the invention is a method of securing articles. These items include luxury items.
- the articles may be jewelery pieces or watches such as pendants, rings, necklaces, bracelets, earrings or watches; leather goods such as wallets or purses or luggage; clothing or related articles such as belts or spectacles; decorative or sports articles such as bicycles or medals; or else, works of art such as sculptures, bronzes or paintings. It may also be bottles, especially wines or champagne; valuable cutlery such as knives; or much larger items such as vehicles, especially motorcycles, cars, or trucks. It is more generally any articles of metal, wood or textile that have a certain value, and are therefore likely to be counterfeited. According to the invention, the articles are secured by means of a contactless electronic chip. Such chips are for example so-called RFID chips or contactless electronic tags.
- the semiconductor substrate may be formed of a microcontroller comprising, for example, ROM and electrically erasable memories of the EEPROM type. In an alternative embodiment, it may be formed of a simple memory of the type found in telephone cards with units or in low-cost electronic tags. Examples of chips include chips marketed under the brand name Destron TM. These chips are formed of a semiconductor substrate connected to an antenna, the substrate and antenna assembly being included in a glass or plastic capsule. The dimensions of these chips are very small, from 12 to 28 mm in length for 2.1 to 3.5 mm in diameter. According to the invention, the chip is positioned fixed in the article. It can be included inside the article or placed on its surface.
- the chip is positioned to always perceive the communication without contact with a suitable reader and so to be destroyed during any attempt of removal or replacement.
- FIG. 1 An example of a secure article according to the invention is presented in FIG. 1.
- This is a ring 1.
- This ring 1 is for example made of a precious metal such as gold. It comprises, according to the invention, a cavity 2.
- This cavity 2 comprises a chip 3 of the type of those described above, formed of a glass capsule 4 and incorporating a semiconductor substrate 5 memory connected to a coil antenna 6 around a core 7.
- This capsule 4 is covered with a thin layer of gold and the cavity 2 is filled with a binder based on gold so that the chip 3 is not visible from the outside of ring 1. However, although invisible, the chip 3 is readable by a suitable reader.
- the memory of the chip 3 can be read at drive / chip coupling distances of the order of 50 cm.
- the chip can be positioned in the windshield or the steering wheel of a vehicle, the chip being covered with a resistant resin at temperatures up to 190 ° C., causing the destruction of the chip in case of attempted removal or replacement.
- the chip is positioned above the cap, between the cap and the iron plate, also called capsule, held on the cap by preformed wire, called muselet. This cap is taken up on the collar of the neck, and maintains the cap which can not then be ejected by the pressure in the bottle, any opening of the cap automatically causing the destruction of the glass envelope of the chip and therefore the chip herself.
- the chip is, according to the invention, capable of receiving a management code. The registration of this management code in the chip is called personalization.
- Management codes are numeric or alphanumeric codes encoded on a limited number of bits in the chip's memory.
- the management code has 15 digits from 0 to 9. It is generated randomly and corresponds to a given article.
- it has a meaning in relation to the article.
- the meaning of the digits of the management code presented in this figure is as follows, these digits being considered from left to right:
- the management code is encrypted according to known algorithms. Items are usually made in a specific manufacturing facility.
- the chips are for example customized ( Figure 3, step 30) or encoded in this factory. They are generally positioned in the articles (FIG. 3, step 32), once personalized, when said articles are finished.
- the articles manufactured are all, at the end of the manufacturing plant, provided with a chip comprising a management code, advantageously specific to the batch and / or the article itself.
- a preferably random primary code is assigned to each article (FIG. 3, step 31).
- This primary code is not necessarily stored in the chip.
- This primary code is known, for example, from the holder of the distribution mark of the articles and / or the manufacturer of the articles and / or the magazine for which said articles are intended. It is contained in a database, for example, managed by the owner of the mark and is associated with the management code of the article in question.
- the primary code is encrypted according to known algorithms. If one or more items in a batch are stolen during transportation from the manufacturing plant to the store, then these items are identified by their management code. For example, if a dozen items in a batch of a hundred items transported from a manufacturing plant to a distribution store are stolen, then it will be sufficient to locate the missing items in the following manner.
- the chips of the 90 items that have not been stolen are read and their management codes are detected.
- the management codes for these 90 items are transmitted for example by a TCP / IP type connection to the trademark holder who has a list of 100 items in the batch. He deduces the 10 missing articles. These are identified in the database, on the one hand, by their management code and, on the other hand, by their random primary code. Thus, the traceability of articles is ensured during their journey from the manufacturing plant to their place of marketing.
- a secret secondary code associated with the management code (FIG. 3, step 35) is defined, said secondary code being known to the acquirer of the article.
- a secret secondary code is defined either by the person who acquired the item or by the seller. In the case where the seller defines the code, this code is communicated to the purchaser of the article.
- the secondary code is a numeric or alphanumeric code comprising for example 4 digits. This code may include data indicative of the country of origin of the sale of the article, or the date of birth of the purchaser of the article.
- the secondary code is encrypted according to known algorithms.
- This code is then communicated, for example, through a computer network of the Internet type, to the trademark owner or preferably to a company managing the database containing the management codes. It is integrated with this database and associated with the management code corresponding to the article (FIG. 3, step 36).
- a customer record can be established, said sheet mentioning at least the date of birth of the purchaser and preferably his surname, first name and date of birth.
- This information is advantageously transmitted to the holder of the database and registered with respect to the article management code and the secondary code.
- this authenticity is verified, according to the invention, by verifying the knowledge, by the bearer of the article, of the secondary code.
- Figure 4 shows the various means of the system according to the invention for verifying the authenticity of an article including customs.
- the customs officers wish to verify the authenticity of the article and the fact that this article has in no way been the subject of a theft, then the customs officer approaches a contactless reader of article 40 in order to read the management code 41 normally contained in the chip 42 of the article.
- the chip is authentic and provided with a management code but that the item has been stolen during transport prior to the sale.
- the database will have indicated that the article corresponding to the given management code has been stolen.
- the customs officer will be made aware of this situation and the article will be considered stolen and will be seized.
- this management code 41 is read by the reader of the customs officer and is then introduced into a computer 43 connected by a computer network of the Internet type, to the database 45 of the trademark holder corresponding to the article or the company managing the database.
- the contactless reader is directly connected to the customs officer's computer so that it does not have to enter the code read by the reader.
- the code is then communicated by the computer network from the customs officer's computer to the manager of the database containing the management codes, in practice the trademark owner or an independent company.
- connection of the customs officer's computer to the database may be carried out via a website of the trademark owner or the company managing the database, by means of secure access, in particular by password, the data exchanged between the computer of the customs officer and the holder of the database being preferentially encrypted according to known algorithms.
- the database manager looks in the database for the existence of this code. If no secondary code 44 is associated with this management code, then the article was stolen before its sale. If, on the other hand, the management code is indeed associated with a secret secondary code, the database manager asks the customs officer for the secondary code 44 to be revealed by the bearer of the article. The customs officer then asks this holder to enter the secondary code for example on the keyboard of the computer or by means of a secondary keyboard. The secondary code entered is transmitted to the manager of the database. The verification of this secondary code is performed. If the secondary code is correct, a message is sent to the customs officer indicating a match and the authenticity of the article is validated. Otherwise, the article is declared stolen and the customs officer enters the article.
- this information is advantageously transmitted to the customs officer who may check that the identity of the carrier revealed by his passport or other piece of identity actually corresponds to that transmitted by the database.
- the security method according to the invention makes it possible to label articles, in particular jewelery articles, by replacing the punch with the chip. The introduction of this chip in the article thus offers a traceability of the article as well as a reference on its provenance.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0603530A FR2900258B1 (fr) | 2006-04-21 | 2006-04-21 | Procede de securisation d'un article et systeme pour la mise en oeuvre d'un tel procede |
| PCT/FR2007/000679 WO2007122331A1 (fr) | 2006-04-21 | 2007-04-23 | Procede de securisation d'un article et systeme pour la mise en œuvre d'un tel procede |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP2024943A1 true EP2024943A1 (de) | 2009-02-18 |
Family
ID=37478728
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP07731339A Withdrawn EP2024943A1 (de) | 2006-04-21 | 2007-04-23 | Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20090188971A1 (de) |
| EP (1) | EP2024943A1 (de) |
| FR (1) | FR2900258B1 (de) |
| WO (1) | WO2007122331A1 (de) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113327351A (zh) * | 2021-05-24 | 2021-08-31 | 李峰 | 带锁封盖的解锁方法和系统 |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2465850A (en) * | 2008-12-08 | 2010-06-09 | Rotary Watches Ltd | RFID Tags Mounted in Wristwatch Straps and Keepers |
| TW201417011A (zh) * | 2012-10-19 | 2014-05-01 | Dadny Inc | 驗證系統及其方法 |
| CA2848106C (en) * | 2013-04-02 | 2021-07-13 | McMole Technologies Inc. | System and method for identification and authentication of precious metals and small jewelry items using radio frequency identification ("rfid") technology |
| JP6231358B2 (ja) * | 2013-11-11 | 2017-11-15 | 株式会社日立システムズ | Rfidタグ組込リング |
| TR201706677A2 (tr) * | 2017-05-05 | 2017-09-21 | Sicpa Turkey Ueruen Guevenligi Sanayi Ve Ticaret Anonim Sirketi | Değerli maden ürünleri kimliklendirme ve takip sistemi |
| WO2021105829A1 (en) * | 2019-11-29 | 2021-06-03 | Fortitudo Diamonds S.R.L. | Jewel with wireless communication device |
| JP7394359B1 (ja) | 2022-10-14 | 2023-12-08 | KeepAlive株式会社 | 革小物、サーバー、及び、革小物の製造方法 |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050280534A1 (en) * | 2004-06-16 | 2005-12-22 | Navarro Pamela W | Clothing item registration system |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6442276B1 (en) * | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
| JP4434549B2 (ja) * | 2002-03-07 | 2010-03-17 | 株式会社日立製作所 | 管理装置および管理方法 |
| GB0310605D0 (en) * | 2003-05-08 | 2003-06-11 | Pa Knowledge Ltd | Authentication system |
| CA2445323A1 (en) * | 2003-10-06 | 2005-04-06 | Barry J. Fitzgerald | Bicycle identification system |
| US7698179B2 (en) * | 2005-06-27 | 2010-04-13 | Leung Andy S | Tracking system and label for use in conjunction therewith |
| JP2007164529A (ja) * | 2005-12-14 | 2007-06-28 | Fujitsu Ltd | 所有者確認方法および所有者確認装置 |
| US20070146141A1 (en) * | 2005-12-22 | 2007-06-28 | Popplewell Lewis M | Method for authenticating product |
-
2006
- 2006-04-21 FR FR0603530A patent/FR2900258B1/fr not_active Expired - Fee Related
-
2007
- 2007-04-23 WO PCT/FR2007/000679 patent/WO2007122331A1/fr not_active Ceased
- 2007-04-23 EP EP07731339A patent/EP2024943A1/de not_active Withdrawn
- 2007-04-23 US US12/297,890 patent/US20090188971A1/en not_active Abandoned
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050280534A1 (en) * | 2004-06-16 | 2005-12-22 | Navarro Pamela W | Clothing item registration system |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113327351A (zh) * | 2021-05-24 | 2021-08-31 | 李峰 | 带锁封盖的解锁方法和系统 |
Also Published As
| Publication number | Publication date |
|---|---|
| FR2900258A1 (fr) | 2007-10-26 |
| US20090188971A1 (en) | 2009-07-30 |
| FR2900258B1 (fr) | 2008-06-27 |
| WO2007122331A1 (fr) | 2007-11-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2024943A1 (de) | Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens | |
| US7852195B2 (en) | Authentication of source, plus, for goods and services system, method, and components | |
| US20070199988A1 (en) | Method and means for detection of counterfeit items and prevention of counterfeiting activities | |
| CA2587204A1 (fr) | Procede et dispositif de verification de non intrusion dans un systeme et / ou de non atteinte a l'integrite d'un objet ou de son contenu | |
| WO2014037666A1 (fr) | Dispositif d'authentification d'une bouteille et procede d'authentification utilisant ledit dispositif | |
| CN107316075A (zh) | 珠宝身份追溯物证一体多维绑定防伪方法及套件 | |
| CN103136682A (zh) | 应用覆盖式标签实现防伪的系统与方法 | |
| Kshetri | Blockchain and the economics of customer satisfaction | |
| WO2006042913A1 (fr) | Procede de securisation de transactions et d'authentification d'objets ou de documents | |
| FR2900486A1 (fr) | Procede de detection de la contrefacon ou de l'authenticite d'un produit | |
| EP0986804B1 (de) | Komplex und vorrichtung zur sicherung der originalität von dokumenten oder gütern | |
| EP2979393B1 (de) | Authentifizierungsverfahren | |
| EP3857425B1 (de) | Verfahren zur verfolgbarkeit und authentifizierung von produkten | |
| US20190156090A1 (en) | Warranty tracking method for a consumer product | |
| EP0869463A2 (de) | Kennzeichnungsvorrichtung | |
| FR2823898A1 (fr) | Griffe tissee d'identification puce integree de tracabilite avec interrogation a distance pour vetements ou analogues | |
| BE1017427A6 (fr) | Procede d'identification. | |
| FR2807191A1 (fr) | Systeme de consigne pour deposer et recuperer un objet | |
| CN111582890A (zh) | 防伪溯源、定位系统、商品、方法、装置、平台及介质 | |
| RU2687024C1 (ru) | Система идентификации изделий | |
| FR3147645A1 (fr) | Piece de monnaie ou medaille comportant un certificat numerique | |
| FR3070215A3 (fr) | Dispositif d’authentification autonome d’un marquage optique et procedes | |
| WO2004061755A1 (fr) | Système pour la mise à disposition d'articles marqués chacun d'une étiquette électronique | |
| CH719592B1 (fr) | Dispositif de suivi et d'authentification d'un article manufacturé. | |
| WO2022043377A1 (fr) | Système pour l'identification et le suivi du propriétaire d'un produit de luxe |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20081121 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
| 17Q | First examination report despatched |
Effective date: 20090422 |
|
| DAX | Request for extension of the european patent (deleted) | ||
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20161101 |