EP2024943A1 - Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens - Google Patents

Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens

Info

Publication number
EP2024943A1
EP2024943A1 EP07731339A EP07731339A EP2024943A1 EP 2024943 A1 EP2024943 A1 EP 2024943A1 EP 07731339 A EP07731339 A EP 07731339A EP 07731339 A EP07731339 A EP 07731339A EP 2024943 A1 EP2024943 A1 EP 2024943A1
Authority
EP
European Patent Office
Prior art keywords
article
code
chip
management
management code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07731339A
Other languages
English (en)
French (fr)
Inventor
Marcel Chambon
Frédéric Chambon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP2024943A1 publication Critical patent/EP2024943A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS

Definitions

  • the invention relates to a method of securing an item and, in particular, a luxury item, according to which - it is customizable a contactless electronic chip by a management code, this management code can be read by means of a a suitable contactless reader, and - said chip is positioned in said article.
  • the invention further relates to a system for implementing this method.
  • a problem to be solved by the invention is to provide a method of securing articles, in particular luxury articles, which makes it possible to verify with certainty the authenticity of these articles and of ensure their traceability, the management of this process remains simple.
  • the proposed solution of the invention to this problem posed firstly a method of securing an article comprising the following steps according to which: a contactless electronic chip is personalized by a management code, this management code being readable by means of a suitable contactless reader of the chip; and positioning said chip in said article; and, characterized in that it further comprises the following steps according to which: a secret secondary code associated with the management code is defined, said secondary code being known to the acquirer of the article; and verifying the authenticity of the article by reading the management code and verifying the knowledge, by the bearer of the article, of the secondary code.
  • Its second object is a security system of an article; and a non-contact electronic chip positioned in said article, said chip being personalized by a management code, said management code being readable by means of a suitable contactless reader of the chip, and characterized in that a secondary secret code is defined and associated with the management code, said secondary code being known to the purchaser of the article, and in that the authenticity of the article is able to be verified by the knowledge of the holder of the article, said secondary code.
  • the contactless electronic chip positioned in the article comprises a public management code, and therefore readable by appropriate readers.
  • a secondary code is associated with this management code.
  • This secondary code is not available to the public and is not coded on the chip.
  • This secondary code is, however, known to the acquirer of the article, referenced in the database and associated with the management code of said acquired article.
  • the knowledge of the article holder of the secondary code is verified. If this verification proves to be positive, that is to say if the bearer of the article actually has good knowledge of the secondary code, then the article is authentic and has been effectively marketed. Otherwise, the item is not genuine or has been stolen.
  • the management code is a numeric or alphanumeric code which is specific to the article;
  • the management and secondary codes are recorded in a database and, for verification of knowledge by the bearer of the article, the secondary code, said carrier reveals this secondary code and the correspondence between this secondary code and the management code in the database;
  • the chip is personalized by a primary code and in that this primary code is stored in a database;
  • the database also includes information relating to the identity of the purchaser of the article, for example, his date of birth, and preferably his surname and first name;
  • the chip is formed of a capsule incorporating a semiconductor substrate connected to an antenna; and the chip is housed or included in a cavity of the article.
  • FIG. 1 shows, schematically, a secured ring according to the invention
  • FIG. 2 is a representation of the management code recorded in a chip for securing an article according to the invention
  • Figure 3 is a diagram showing the different steps of securing an article according to the method of the invention
  • Figure 4 shows, schematically, the system according to the invention.
  • the method according to the invention is a method of securing articles. These items include luxury items.
  • the articles may be jewelery pieces or watches such as pendants, rings, necklaces, bracelets, earrings or watches; leather goods such as wallets or purses or luggage; clothing or related articles such as belts or spectacles; decorative or sports articles such as bicycles or medals; or else, works of art such as sculptures, bronzes or paintings. It may also be bottles, especially wines or champagne; valuable cutlery such as knives; or much larger items such as vehicles, especially motorcycles, cars, or trucks. It is more generally any articles of metal, wood or textile that have a certain value, and are therefore likely to be counterfeited. According to the invention, the articles are secured by means of a contactless electronic chip. Such chips are for example so-called RFID chips or contactless electronic tags.
  • the semiconductor substrate may be formed of a microcontroller comprising, for example, ROM and electrically erasable memories of the EEPROM type. In an alternative embodiment, it may be formed of a simple memory of the type found in telephone cards with units or in low-cost electronic tags. Examples of chips include chips marketed under the brand name Destron TM. These chips are formed of a semiconductor substrate connected to an antenna, the substrate and antenna assembly being included in a glass or plastic capsule. The dimensions of these chips are very small, from 12 to 28 mm in length for 2.1 to 3.5 mm in diameter. According to the invention, the chip is positioned fixed in the article. It can be included inside the article or placed on its surface.
  • the chip is positioned to always perceive the communication without contact with a suitable reader and so to be destroyed during any attempt of removal or replacement.
  • FIG. 1 An example of a secure article according to the invention is presented in FIG. 1.
  • This is a ring 1.
  • This ring 1 is for example made of a precious metal such as gold. It comprises, according to the invention, a cavity 2.
  • This cavity 2 comprises a chip 3 of the type of those described above, formed of a glass capsule 4 and incorporating a semiconductor substrate 5 memory connected to a coil antenna 6 around a core 7.
  • This capsule 4 is covered with a thin layer of gold and the cavity 2 is filled with a binder based on gold so that the chip 3 is not visible from the outside of ring 1. However, although invisible, the chip 3 is readable by a suitable reader.
  • the memory of the chip 3 can be read at drive / chip coupling distances of the order of 50 cm.
  • the chip can be positioned in the windshield or the steering wheel of a vehicle, the chip being covered with a resistant resin at temperatures up to 190 ° C., causing the destruction of the chip in case of attempted removal or replacement.
  • the chip is positioned above the cap, between the cap and the iron plate, also called capsule, held on the cap by preformed wire, called muselet. This cap is taken up on the collar of the neck, and maintains the cap which can not then be ejected by the pressure in the bottle, any opening of the cap automatically causing the destruction of the glass envelope of the chip and therefore the chip herself.
  • the chip is, according to the invention, capable of receiving a management code. The registration of this management code in the chip is called personalization.
  • Management codes are numeric or alphanumeric codes encoded on a limited number of bits in the chip's memory.
  • the management code has 15 digits from 0 to 9. It is generated randomly and corresponds to a given article.
  • it has a meaning in relation to the article.
  • the meaning of the digits of the management code presented in this figure is as follows, these digits being considered from left to right:
  • the management code is encrypted according to known algorithms. Items are usually made in a specific manufacturing facility.
  • the chips are for example customized ( Figure 3, step 30) or encoded in this factory. They are generally positioned in the articles (FIG. 3, step 32), once personalized, when said articles are finished.
  • the articles manufactured are all, at the end of the manufacturing plant, provided with a chip comprising a management code, advantageously specific to the batch and / or the article itself.
  • a preferably random primary code is assigned to each article (FIG. 3, step 31).
  • This primary code is not necessarily stored in the chip.
  • This primary code is known, for example, from the holder of the distribution mark of the articles and / or the manufacturer of the articles and / or the magazine for which said articles are intended. It is contained in a database, for example, managed by the owner of the mark and is associated with the management code of the article in question.
  • the primary code is encrypted according to known algorithms. If one or more items in a batch are stolen during transportation from the manufacturing plant to the store, then these items are identified by their management code. For example, if a dozen items in a batch of a hundred items transported from a manufacturing plant to a distribution store are stolen, then it will be sufficient to locate the missing items in the following manner.
  • the chips of the 90 items that have not been stolen are read and their management codes are detected.
  • the management codes for these 90 items are transmitted for example by a TCP / IP type connection to the trademark holder who has a list of 100 items in the batch. He deduces the 10 missing articles. These are identified in the database, on the one hand, by their management code and, on the other hand, by their random primary code. Thus, the traceability of articles is ensured during their journey from the manufacturing plant to their place of marketing.
  • a secret secondary code associated with the management code (FIG. 3, step 35) is defined, said secondary code being known to the acquirer of the article.
  • a secret secondary code is defined either by the person who acquired the item or by the seller. In the case where the seller defines the code, this code is communicated to the purchaser of the article.
  • the secondary code is a numeric or alphanumeric code comprising for example 4 digits. This code may include data indicative of the country of origin of the sale of the article, or the date of birth of the purchaser of the article.
  • the secondary code is encrypted according to known algorithms.
  • This code is then communicated, for example, through a computer network of the Internet type, to the trademark owner or preferably to a company managing the database containing the management codes. It is integrated with this database and associated with the management code corresponding to the article (FIG. 3, step 36).
  • a customer record can be established, said sheet mentioning at least the date of birth of the purchaser and preferably his surname, first name and date of birth.
  • This information is advantageously transmitted to the holder of the database and registered with respect to the article management code and the secondary code.
  • this authenticity is verified, according to the invention, by verifying the knowledge, by the bearer of the article, of the secondary code.
  • Figure 4 shows the various means of the system according to the invention for verifying the authenticity of an article including customs.
  • the customs officers wish to verify the authenticity of the article and the fact that this article has in no way been the subject of a theft, then the customs officer approaches a contactless reader of article 40 in order to read the management code 41 normally contained in the chip 42 of the article.
  • the chip is authentic and provided with a management code but that the item has been stolen during transport prior to the sale.
  • the database will have indicated that the article corresponding to the given management code has been stolen.
  • the customs officer will be made aware of this situation and the article will be considered stolen and will be seized.
  • this management code 41 is read by the reader of the customs officer and is then introduced into a computer 43 connected by a computer network of the Internet type, to the database 45 of the trademark holder corresponding to the article or the company managing the database.
  • the contactless reader is directly connected to the customs officer's computer so that it does not have to enter the code read by the reader.
  • the code is then communicated by the computer network from the customs officer's computer to the manager of the database containing the management codes, in practice the trademark owner or an independent company.
  • connection of the customs officer's computer to the database may be carried out via a website of the trademark owner or the company managing the database, by means of secure access, in particular by password, the data exchanged between the computer of the customs officer and the holder of the database being preferentially encrypted according to known algorithms.
  • the database manager looks in the database for the existence of this code. If no secondary code 44 is associated with this management code, then the article was stolen before its sale. If, on the other hand, the management code is indeed associated with a secret secondary code, the database manager asks the customs officer for the secondary code 44 to be revealed by the bearer of the article. The customs officer then asks this holder to enter the secondary code for example on the keyboard of the computer or by means of a secondary keyboard. The secondary code entered is transmitted to the manager of the database. The verification of this secondary code is performed. If the secondary code is correct, a message is sent to the customs officer indicating a match and the authenticity of the article is validated. Otherwise, the article is declared stolen and the customs officer enters the article.
  • this information is advantageously transmitted to the customs officer who may check that the identity of the carrier revealed by his passport or other piece of identity actually corresponds to that transmitted by the database.
  • the security method according to the invention makes it possible to label articles, in particular jewelery articles, by replacing the punch with the chip. The introduction of this chip in the article thus offers a traceability of the article as well as a reference on its provenance.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
EP07731339A 2006-04-21 2007-04-23 Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens Withdrawn EP2024943A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0603530A FR2900258B1 (fr) 2006-04-21 2006-04-21 Procede de securisation d'un article et systeme pour la mise en oeuvre d'un tel procede
PCT/FR2007/000679 WO2007122331A1 (fr) 2006-04-21 2007-04-23 Procede de securisation d'un article et systeme pour la mise en œuvre d'un tel procede

Publications (1)

Publication Number Publication Date
EP2024943A1 true EP2024943A1 (de) 2009-02-18

Family

ID=37478728

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07731339A Withdrawn EP2024943A1 (de) 2006-04-21 2007-04-23 Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens

Country Status (4)

Country Link
US (1) US20090188971A1 (de)
EP (1) EP2024943A1 (de)
FR (1) FR2900258B1 (de)
WO (1) WO2007122331A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113327351A (zh) * 2021-05-24 2021-08-31 李峰 带锁封盖的解锁方法和系统

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2465850A (en) * 2008-12-08 2010-06-09 Rotary Watches Ltd RFID Tags Mounted in Wristwatch Straps and Keepers
TW201417011A (zh) * 2012-10-19 2014-05-01 Dadny Inc 驗證系統及其方法
CA2848106C (en) * 2013-04-02 2021-07-13 McMole Technologies Inc. System and method for identification and authentication of precious metals and small jewelry items using radio frequency identification ("rfid") technology
JP6231358B2 (ja) * 2013-11-11 2017-11-15 株式会社日立システムズ Rfidタグ組込リング
TR201706677A2 (tr) * 2017-05-05 2017-09-21 Sicpa Turkey Ueruen Guevenligi Sanayi Ve Ticaret Anonim Sirketi Değerli maden ürünleri kimliklendirme ve takip sistemi
WO2021105829A1 (en) * 2019-11-29 2021-06-03 Fortitudo Diamonds S.R.L. Jewel with wireless communication device
JP7394359B1 (ja) 2022-10-14 2023-12-08 KeepAlive株式会社 革小物、サーバー、及び、革小物の製造方法

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050280534A1 (en) * 2004-06-16 2005-12-22 Navarro Pamela W Clothing item registration system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6442276B1 (en) * 1997-07-21 2002-08-27 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
JP4434549B2 (ja) * 2002-03-07 2010-03-17 株式会社日立製作所 管理装置および管理方法
GB0310605D0 (en) * 2003-05-08 2003-06-11 Pa Knowledge Ltd Authentication system
CA2445323A1 (en) * 2003-10-06 2005-04-06 Barry J. Fitzgerald Bicycle identification system
US7698179B2 (en) * 2005-06-27 2010-04-13 Leung Andy S Tracking system and label for use in conjunction therewith
JP2007164529A (ja) * 2005-12-14 2007-06-28 Fujitsu Ltd 所有者確認方法および所有者確認装置
US20070146141A1 (en) * 2005-12-22 2007-06-28 Popplewell Lewis M Method for authenticating product

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050280534A1 (en) * 2004-06-16 2005-12-22 Navarro Pamela W Clothing item registration system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113327351A (zh) * 2021-05-24 2021-08-31 李峰 带锁封盖的解锁方法和系统

Also Published As

Publication number Publication date
FR2900258A1 (fr) 2007-10-26
US20090188971A1 (en) 2009-07-30
FR2900258B1 (fr) 2008-06-27
WO2007122331A1 (fr) 2007-11-01

Similar Documents

Publication Publication Date Title
EP2024943A1 (de) Verfahren zum sichern eines artikels und system zur verwendung eines solchen verfahrens
US7852195B2 (en) Authentication of source, plus, for goods and services system, method, and components
US20070199988A1 (en) Method and means for detection of counterfeit items and prevention of counterfeiting activities
CA2587204A1 (fr) Procede et dispositif de verification de non intrusion dans un systeme et / ou de non atteinte a l'integrite d'un objet ou de son contenu
WO2014037666A1 (fr) Dispositif d'authentification d'une bouteille et procede d'authentification utilisant ledit dispositif
CN107316075A (zh) 珠宝身份追溯物证一体多维绑定防伪方法及套件
CN103136682A (zh) 应用覆盖式标签实现防伪的系统与方法
Kshetri Blockchain and the economics of customer satisfaction
WO2006042913A1 (fr) Procede de securisation de transactions et d'authentification d'objets ou de documents
FR2900486A1 (fr) Procede de detection de la contrefacon ou de l'authenticite d'un produit
EP0986804B1 (de) Komplex und vorrichtung zur sicherung der originalität von dokumenten oder gütern
EP2979393B1 (de) Authentifizierungsverfahren
EP3857425B1 (de) Verfahren zur verfolgbarkeit und authentifizierung von produkten
US20190156090A1 (en) Warranty tracking method for a consumer product
EP0869463A2 (de) Kennzeichnungsvorrichtung
FR2823898A1 (fr) Griffe tissee d'identification puce integree de tracabilite avec interrogation a distance pour vetements ou analogues
BE1017427A6 (fr) Procede d'identification.
FR2807191A1 (fr) Systeme de consigne pour deposer et recuperer un objet
CN111582890A (zh) 防伪溯源、定位系统、商品、方法、装置、平台及介质
RU2687024C1 (ru) Система идентификации изделий
FR3147645A1 (fr) Piece de monnaie ou medaille comportant un certificat numerique
FR3070215A3 (fr) Dispositif d’authentification autonome d’un marquage optique et procedes
WO2004061755A1 (fr) Système pour la mise à disposition d'articles marqués chacun d'une étiquette électronique
CH719592B1 (fr) Dispositif de suivi et d'authentification d'un article manufacturé.
WO2022043377A1 (fr) Système pour l'identification et le suivi du propriétaire d'un produit de luxe

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20081121

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

17Q First examination report despatched

Effective date: 20090422

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20161101