EP2616997A1 - Traceable marker of a security feature - Google Patents
Traceable marker of a security featureInfo
- Publication number
- EP2616997A1 EP2616997A1 EP11767624.7A EP11767624A EP2616997A1 EP 2616997 A1 EP2616997 A1 EP 2616997A1 EP 11767624 A EP11767624 A EP 11767624A EP 2616997 A1 EP2616997 A1 EP 2616997A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security feature
- indivisible
- container
- security
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Definitions
- the present invention relates to a method for the unique tracing of a security feature, an indivisible security feature, a container for receiving an arbitrarily divisible security feature, and a system for unambiguously retrieving such security features.
- security features to secure valuable items and products, such as luxury goods or securities in the form of banknotes, identity documents, bank, account or cash cards, identity cards and the like.
- security features are usually applied firmly or applied to the product and at least guarantee or permit verification of the authenticity of the product.
- security features call e.g. difficult to forge or copy visual or other effects and are usually difficult to transfer from a genuine product to a counterfeit product.
- security features In terms of security, the production of security features and their application to the products in question is fundamentally to be distinguished between indivisible, countable security features and arbitrarily divisible security features. While the former include authenticity seals, security labels, or optically variable or electronic security elements that are manufactured separately and applied as a whole to the product being secured
- the latter include, for example, liquid, powdered or otherwise arbitrarily divisible security features, such as, for example, paints, varnishes, and other non-self-supporting materials, which only take on a concrete shape upon application to the product, or customizable, self-supporting safety materials, such as Safety strips, threads, foils or the like, which must be adapted to the product before application to the product.
- indivisible security features are often provided with unique, eg printed, embossed or inscribed identifications and are individually identifiable
- divisible security features are applied in predetermined amounts or concentrations to an object to be protected and act solely on the basis of the evoked optical and other effects.
- the consumption or circulation of an indivisible security feature can be quantified by the number of secured products, while the consumption or circulation of a divisible security feature can only be quantified in quantities, for example by weight or area consumption.
- all security features have in common that the security gain, in addition to the actual technical specification of the security feature, results from strict controls during manufacture, further processing and application to an object to be protected, which prevent indivisible security features or quantities of divisible security features Security features are stolen, manipulated or exchanged.
- a security feature is linked to a unique first identifier. If the security feature is passed on by a transferor to a recipient, a sequence identifier is formed and also linked to the security feature. The sequence identifier is formed by encrypting an identifier already associated with the security feature-that is, either the first identifier or a sequential identifier previously associated with the security feature-with a secret cryptographic key of the recipient.
- each sequence identifier is therefore clearly attributable to an identification previously linked to the security feature and, on the other hand, to the recipient concerned by the secret key used.
- the sequence identifiers linked to the security feature it is therefore possible to clearly trace back and subsequently check each forwarding of the security feature by hand-off agents to recipients over the entire life cycle of the security feature.
- the sequence identifier is not formed by encrypting any associated with the security feature label, but by encrypting the last associated with the security feature label, so usually with a sequence-Kenn- drawing that has formed the handler, as the security feature was passed to him.
- the first receiver of the security feature after its manufacture forms the first sequence label from the first label.
- a complete, logical structure for example a sequence or a tree of sequence markings is constructed, from which all transfers can be reconstructed and are clearly attributable to the security feature in question via the underlying initial identifier.
- the sequence identifier is preferably formed by the recipient himself and handed over to the transferor.
- the handler can then verify the validity of the received sequence identifier by the public key of the recipient.
- the subsequent identification is valid if, with the recipient's public key decrypted, it corresponds to the consecutive identification which the assignee has made when receiving the security feature.
- the valid consequence label thus provides proof to the discloser that he no longer possesses the security feature and has properly forwarded it to an authorized recipient.
- the cryptographic infrastructure provided according to the invention requires that all subscribers, that is, all potential recipients of a security feature during the life cycle of the security feature be equipped with a suitable cryptographic key pair, consisting of a secret encryption key and a public decryption key. Potential participants are therefore all those involved in the production, processing, handling or application of the security feature on a product and / or issue of the product to dealers or end users or responsible persons.
- all subscribers are provided with a suitable key pair, where the public keys of the subscribers can also be deposited with a trusted entity, such as electronically with a background system or From this background system, a redirector can then obtain the public key of the recipient.
- a trusted entity such as electronically with a background system or From this background system, a redirector can then obtain the public key of the recipient.
- all subsequent identifications can be centrally stored on the background system, so that the tracing back of the life cycle of the relevant security feature can be carried out centrally.
- the first identification is also stored centrally, so that each sequence identifier can be assigned to the relevant security feature, for example by specifying an identification of the security feature, which may correspond to the first identification.
- the centrally stored sequential identifiers are then in each case uniquely linked to the security feature via the associated first identifier, even if the sequential identifiers are not so firmly connected to the security feature as the first identifier.
- the sequence markings are associated with a container in which the divisible security feature is kept.
- security features which can not be unambiguously identified and counted, and which thus can not be directly connected to the first and subsequent identifiers, can be incorporated into the security infrastructure and can also be traced and verified, just like conventional indivisible security features Form of authenticity seals, security labels or security elements.
- transfers of sensitive feature types can be centralized along the lifecycle of the security feature in question to detect and locate unauthorized deviations based on the sequence of sequence identifiers, by: the last responsible recipient of the security feature is determined.
- the unambiguous link between the security feature or the container and the relevant initial marking is of central importance, since only in this way can it be ensured that a clear and always reproducible connection to the relevant protein is obtained during later tracing by stepwise checking of the sequence markings. safety feature.
- the Container-marking is so firmly connected to the indivisible security feature or the container of the divisible security feature that they without affecting the indivisible security feature or the container can not be separated from this.
- Particularly suitable for this purpose are appropriate printing and embossing methods with which the initial marking can be irrevocably printed on or stamped on the indivisible security feature or the container.
- the indivisible security feature or the container it is likewise possible for the indivisible security feature or the container to have an electronic storage device, for example in connection with a microchip mounted on the indivisible security feature or the container, into which the first identification is stored in such a way that it does not is more erasable without destroying the electronic memory device or the chip.
- the indivisible security feature or container comprises a memory device for storing the first identifier
- it is preferably firmly connected to the indivisible security feature or the container such that the memory device is not separated therefrom without adversely affecting the atomic security feature or the container can.
- this memory device all sequential identifications which are incurred during the life cycle of the security feature are preferably also stored.
- the associated public keys can also be stored there.
- the data stored in the storage device can thus be identical to the data stored on the trusted background system, so that the traceability of the security feature's life cycle can be carried out locally on the one hand using an existing security feature or container, or centrally by the trusted entity.
- the indivisible security feature or the container preferably comprises a radio device, with which the first identification and / or the sequential identification can be transmitted to the trusted location or centrally deposited public keys of a recipient can be requested by the handing over.
- a location device in addition to the radio device, which enables, for example via GPS or GSM, a local localization of the indivisible security feature or container.
- the participants i. all potential recipients of a security feature, equipped with suitable terminals to generate a sequence tag by encryption or to verify by decryption and to perform all other necessary data communication steps.
- suitable terminals to generate a sequence tag by encryption or to verify by decryption and to perform all other necessary data communication steps.
- PDAs personal digital assistants
- portable computers or even personal computers or the like.
- a system for uniquely tracing security features includes a trusted site or background server, as well as a plurality of indivisible security features and / or containers for holding an arbitrarily divisible security feature. Furthermore, a communication infrastructure is provided, via which electronic data communication between the background server and the indivisible security features and / or containers for the divisible security features is possible.
- the trusted background server and the security features / containers are each equipped with electronic commutation devices, for example for wireless data transmission via a mobile radio network or the like.
- the subscriber terminals may also be involved in the system and be equipped such that they can communicate with the security features / containers and / or the background system in data communication.
- a tree structure may be formed in a sharable security feature when a subset of the security feature set held in the container is shared by a handler and forwarded to two or more recipients becomes.
- the leaves of this sequential tag tree then represent all subscribers who own a subset of the security tag and thus the total amount of the sharable security tag in circulation.
- a complete accounting of the consumed indivisible security features of a specific feature type can take place. All follow-up markings of the security features of this type are taken into account. Since the markings in indivisible security features with memory device is also still evaluable when the security feature has been applied to the product to be protected and is in circulation, in addition to the balance of the applied security features also a remindverf olulation of the security features in circulation possible.
- a balance can be used to determine the total used quantity or number of labeled products on the basis of the subsequent identifiers in order to detect possible discrepancies between the quantity originally packaged in the container and the actually consumed quantity of the security feature.
- the container of an arbitrarily divisible security feature is equipped with a special locking mechanism, which only allows a removal of a subset of the security feature if the last identifier associated with the container is indicated by the withdrawing party. Simultaneously with the indication of the last tag associated with the container or the initial tag, the recipient may also indicate the sequential tag formed therefrom to gain access to the security feature in the bag.
- the closure mechanism of the container is designed in the form of a time lock, so that further withdrawals of the security feature from the container are possible only within a predetermined period of time.
- the container upon manufacture of the security feature, is filled with a predetermined amount, e.g. is required for a particular manufacturing layer and / or a specific production lot and / or a predetermined number of the objects to be secured with the security feature, so that a stealing of a subset of the security feature is possible by a final accounting, e.g. by a comparison of the originally filled in the container amount of security feature with the corresponding secured products.
- a predetermined amount e.g. is required for a particular manufacturing layer and / or a specific production lot and / or a predetermined number of the objects to be secured with the security feature, so that a stealing of a subset of the security feature is possible by a final accounting, e.g. by a comparison of the originally filled in the container amount of security feature with the corresponding secured products.
- Figure 1 shows a first preferred embodiment of the invention in the context of indivisible security features
- Figure 2 shows a second embodiment of the invention in the context of indivisible security features
- FIG. 3 shows further embodiments in connection with arbitrarily divisible security features.
- High-quality and tamper-proof security features for valuable items, banknotes, securities or the like can not be tampered with or manipulated at unreasonably high cost, e.g. because their optically variable or other effects are difficult or impossible to reproduce.
- the safety effect of such security features does not result solely from their technical complexity or heavy counterfeitability, but not least from the fact that they are closely monitored in their handling and further processing in the context of manufacturing and applying to a product to be secured to a misappropriation to avoid misuse for counterfeit products, or tampering and counterfeiting.
- indivisible, countable, ie discrete security features such as authenticity seals, security labels, or optically variable, electronic or other related and preproduced security elements
- any divisible security features that are quantified not by counting but as quantity, volume, weight or area of the security feature, such as security paints or lacquers, powders, liquids or even at the attachment to the product in question made up security threads, strips, security films or the like.
- the monitoring and control of the handling of such security features extends to, but is not limited to, the following and other stations in the life cycle of a security feature:
- FIG. 1 shows an embodiment of the present invention in which an indivisible security feature 1, for example a authenticity seal or a security seal, is used.
- safety label is provided with a first marking Co (step S), which is not to be removed from this without affecting or even destruction of the security feature 1.
- the first-mark Co can be imprinted on the security feature 1 printed imprinted, punched or irrevocably secured by other application and fastening techniques.
- All authorized subscribers Pi, P 2 , P 3 ie persons, organizations or other entities that come into contact with, receive or pass on this within the lifecycle of security feature 1, are used in a rollout process with a cryptographic process Key pair equipped, each consisting of a secret key SKi, SK 2 , SK3 and the respectively associated public key PKi, PKi, PKi.
- a sequence of labels is formed, starting with the first identifier Co and derived therefrom labels O, C2, C3, each of the immediately preceding prime or sequence identifier Co, O, C2 by a Cryptographic operation emerge.
- the life cycle of the security feature 1 can be fully traced and reconstructed so that deviations or irregularities in the handling of the security feature 1 can be detected, located and assigned to the relevant subscriber Pi P2, P3.
- An uninterrupted code sequence Co, Ci, C 2 , C3 for a security element 1 is an indication that it was handled correctly and correctly and that abuse can be ruled out.
- Both the first identifier Co and all subsequent identifiers O, Ci, C3 are uniquely associated with the security feature 1, so that a later evaluation of the life cycle of the security feature 1 on the code sequence Co, Q, C2, C3 can be made unambiguously. While the initial identifier Co is firmly connected to the security feature 1, the unique assignment of the sequence identifier Q, C 2 , C 3 to the security feature 1 by the unique combination of the sequence labels Q, C 2 , C 3 with the relevant initial marking Co possible.
- sequence identifiers O, C 2 , C 3 can also be stored on a background server 5 or in a memory 6 thereof, since the sequence identifiers O, C 2 , C 3 are stored via a Logical link with the initial identifier Co are assigned to the security feature 1 at any time.
- This logical connection is made by the most recently associated with the security feature 1 labeling Ci with its secret key SK 2 encrypted with a transfer of the security feature 1 of a relaying Pi to a receiver P 2 of the receiver P 2, and so the sequence identification C2 forms (step S2). Subsequently, the sequence identifier C 2 is sent to the background server 5 (step S3), for example via a wireless data communication connection, and stored there in the memory 6 in connection with the initial identifier C 0 and the already stored sequence identifiers O.
- the formed by the receiver P 2 sequence marking C 2 together with the public key PK2 of the recipient P 2, which corresponds to the just-used secret key SK2 of the recipient P2, is passed to the assignee ⁇ so that he can check the validity of the sequence identifier C2 by decrypting with the public key PK 2 of the recipient P 2 (step S4).
- the decrypted sequence identifier C2 must then match the sequence identifier Q previously generated by the handler Fi.
- the sequential identifier C2 can archive the Relaying Pi, since it serves as a proof of transfer, with which it can be proven that the security feature 1 has been passed on properly to the receiver P2.
- step S5 all the markings, that is, the initial marking Co and all sequence labels O, C2, C3 and additionally the associated public key ⁇ , PK 2 , PK3 deposited in the memory 6 to the code sequence Co, Q , C2, C3 in a traceability of the life cycle of the security feature 1 to successively check and to be able to refer back to the first identifier Co and thus to the security feature 1 (step S5).
- the participants Pi, P2 preferably have suitable terminals, such as mobile assistants, mobile devices, laptops or the like, which are configured to form a sequence identifier Ci, C2, a cryptographic examination of the sequence identifier C2 allow the receiver P2 through the Relaying Pi and perform the necessary data communication with the background server 5 to transmit at least the sequence tags Ci, C 2 , C3 to this.
- the public keys ⁇ , PK2, PK3 are in contrast already in the context of the "rollout" process on the one hand together with the associated secret keys SKi, SK2, SK3 to the Participants Pi, P 2 , P3 or transmit their terminals and the background server 5 passed.
- a sequence identifier Ci, C 2 , C3 by encrypting with a secret key SKi, SK 2 , SK3 corresponds to forming a cryptographic signal which can be verified by any other authority in possession of the associated public key PKi , PK., PK3 is.
- a sequence identifier C 2 it can be encrypted by the receiver P2 in addition to the public key PKi of the relaying Pi, so that only the relaying Pi is able to encrypt the encrypted sequence identifier C 2 with its secret key SKi to decrypt and verify their origin with the public key PK 2 of the recipient P 2 .
- FIG. 1 FIG.
- the security feature 1 comprises a memory device 3, for example as part of a microchip permanently connected to the security feature 1, into which the first identifier Co (step 1) as well as all sequence identifiers O, C 2 , C3 when the security feature is passed on 1 are stored (step 3).
- the checking of the forwarding of the security feature 1 from relaying Pi to the recipient P 2 in the course of the life cycle can thus take place locally on the basis of the data stored on the security feature 1.
- the respective public keys PKi, PK 2 , PK3 are deposited in the memory device 3, with their associated secret keys SKi, SK 2 , SK3 the sequence labels O, C 2 , C3 were generated.
- the identifiers Co, Ci, C2, C3 and possibly also the public keys PKi, PK2, PK3 can be sent to the background system 5 by a radio device of the security feature 1 and stored in the memory 6 (step 3 ').
- the sequence identifiers OL, C 2 / C3 and / or the public keys ⁇ 1 PK 2 / PK3 can also be sent directly from the subscribers Pi, P2, P3, eg via suitable portable terminals, to the background server 5.
- a central check based on the data in the memory 6 can also take place.
- the security feature 1 and / or the terminals of the subscriber P l P 2 is equipped with a wireless data communication device, such as a mobile device or the like.
- the security feature 1 is in particular an electronic label, an RFID tag or any other suitable electronic device.
- FIG. 3 shows variants of the two embodiments according to FIG. 1 and FIG. 2 when using an arbitrarily divisible security feature 1, for example a liquid or pulverulent security ink or a security lacquer or any security threads, strips, films or other safety applications that can not be assembled have given size or extent, but only when applied to the object to be protected are brought into the final form in which they are to act as a security element of the object.
- an arbitrarily divisible security feature 1 for example a liquid or pulverulent security ink or a security lacquer or any security threads, strips, films or other safety applications that can not be assembled have given size or extent, but only when applied to the object to be protected are brought into the final form in which they are to act as a security element of the object.
- the arbitrarily divisible security feature 1 is packaged in a container 2 which is permanently connected to the first identifier Co of the security feature 1. is the (step Sl), because on the liquid security feature 1 no initial marking Co can be attached.
- the first identifier Co can also be stored in a permanently connected to the container storage device 3, so that the initial marking Co on the one hand from the outside is visible and on the other hand can be evaluated electronically.
- an arbitrarily divisible security feature 1 does not necessarily form a successively widening identification sequence Co, C, C2, C3, in which each identification is derived from the immediately preceding identification.
- a tree structure (indicated in the memory 6), for example, by the receiver Pi enmimmt a subset of the security feature 1 from the container 2 and generates the sequence identifier Ci, while the subscriber P 2 also takes a subset directly from the container 2 and generates the sequence identifier C2, which is here with the sequence identifier O in no direct relation.
- the subset of the security element 1 removed from the container 2 by the subscriber P2 can, in turn, be taken over by a subscriber P3 after the corresponding processing, which in turn forms the sequence identifier C 2 of the person P 3 from the sequence identifier C 2 of the person P 3 , so that the tree structure indicated in the memory 6 of the background system 5 forms.
- the sequence markings C 1, C 2, C 3 can in turn be stored either in a storage device or in a storage device. 3 of the container 2 are stored securely (step 3) or in a memory 6 of the background system 5 (step 3 ').
- the sequence identifiers Q, C2, C3 both in the memory device 3 of the container 2 and in the memory 6 of the background system 5 in order to ensure both local and global verification and tracing of the security feature 1 to enable.
- each responsible for the security feature 1 participants Pi, P2, P3 can be determined by the public key ⁇ , PK3 those sequence identifier Ci , C3, which form the leaves of the tree structure and indicate that the respective participants Pi, P3 are still in possession of a certain amount of security feature 1.
- a complete traceability of all withdrawn from the container 2 subsets of the security feature 1 by a controller 7 of the background system 5 in a step S5 is possible, as well as the complete accounting of all removed from the container 2 sub-sets of security feature 1 to check whether the entire quantity of security feature 1 initially present in container 2 was also used to secure objects and products without partial quantities of security feature 1 being stolen without authorization. For example, it can be checked on the basis of the tree structure stored in the memory 6 whether the sum of all subsets of the security feature 1 represented by the leaves of the tree corresponds to the initial quantity of the security feature 1 in the container 2.
- the secret keys SKi, SK 2 , SK3 may include certain important information about the respective subscriber Pi, P 2 / P 3 , for example their function, workstation or the like, so that this information is also included in the following table. Designations Q, C2, C3 are received and verifiable.
- Such evaluations can either be carried out centrally by the background system 5 or its control device 7 (step S5), or after the return of the empty container 2 on the basis of the sequence markings O, C2, C3 stored in the storage device 3 and the corresponding public keys ⁇ , PK2, PK3.
- the container 2 preferably also comprises a closure device 4, which can then be opened to remove further subsets of the security element 1 if the person in question Pi, P2, P3 with the last created sequence code Q, C2 with the first Flag Co and / or its secret key SKi, SK2, SK3 legitimized. If, therefore, the subscriber P3 in FIG. 3 still requires a further subset of the security feature 1 from the container 2, he can, for example, use the sequence identifier C2, which is already present in the storage device 3, and / or his secret key SK3 Legitimate to the closure device 4.
- the container 2 can also be provided with a locating device, so that its location, for example, from the background system 5, via a suitable communication protocol, such as GPS or GSM, can be determined.
- This locating device is preferably linked to the memory device 3 or a corresponding microchip, which comprises the memory device 3 and the locating device as well as optionally a radio device.
- the closure device 4 also time-controlled, so that a further removal of subsets of the security element 1 is possible only within a certain time interval since the last removal.
- the container 2 may be equipped for further protection with a paint bomb.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102010045571A DE102010045571A1 (en) | 2010-09-16 | 2010-09-16 | Traceable marking of a security feature |
PCT/EP2011/004616 WO2012034691A1 (en) | 2010-09-16 | 2011-09-14 | Traceable marker of a security feature |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2616997A1 true EP2616997A1 (en) | 2013-07-24 |
Family
ID=44785800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11767624.7A Ceased EP2616997A1 (en) | 2010-09-16 | 2011-09-14 | Traceable marker of a security feature |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP2616997A1 (en) |
CN (1) | CN103140867B (en) |
DE (1) | DE102010045571A1 (en) |
WO (1) | WO2012034691A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107358440B (en) * | 2017-06-26 | 2020-09-15 | 中国人民银行数字货币研究所 | Method and system for customized tracking of digital currency |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001055882A2 (en) * | 2000-01-27 | 2001-08-02 | Crossoff Inc. | Authenticity verification method and apparatus |
US6883710B2 (en) * | 2000-10-11 | 2005-04-26 | Amerasia International Technology, Inc. | Article tracking system and method |
CN1588386B (en) * | 2004-08-02 | 2011-08-24 | 上海质尊电子科技有限公司 | System and method for realizing article information detection by radio frequency identification and mobile communication combination |
EP1645992A1 (en) * | 2004-10-08 | 2006-04-12 | Philip Morris Products S.A. | Methods and systems for marking, tracking and authentication of products |
JP4111529B2 (en) * | 2005-07-01 | 2008-07-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Traceability signature system, signature method, program |
GB0704900D0 (en) * | 2007-03-14 | 2007-04-18 | British Telecomm | Verification of movement of items |
DE102007051787A1 (en) * | 2007-10-30 | 2009-05-07 | Giesecke & Devrient Gmbh | Identity-based product protection |
EP2104067A1 (en) * | 2008-03-17 | 2009-09-23 | Philip Morris Products S.A. | Method and apparatus for identifying, authenticating, tracking and tracing manufactured items |
-
2010
- 2010-09-16 DE DE102010045571A patent/DE102010045571A1/en not_active Withdrawn
-
2011
- 2011-09-14 WO PCT/EP2011/004616 patent/WO2012034691A1/en active Application Filing
- 2011-09-14 EP EP11767624.7A patent/EP2616997A1/en not_active Ceased
- 2011-09-14 CN CN201180044616.3A patent/CN103140867B/en not_active Expired - Fee Related
Non-Patent Citations (2)
Title |
---|
RIVEST R L ET AL: "A method for obtaining digital signatures and public-key cryptosystems", COMMUNICATIONS OF THE ACM, ASSOCIATION FOR COMPUTING MACHINERY, INC, UNITED STATES, vol. 21, no. 2, 1 February 1978 (1978-02-01), pages 120 - 126, XP058222365, ISSN: 0001-0782, DOI: 10.1145/359340.359342 * |
See also references of WO2012034691A1 * |
Also Published As
Publication number | Publication date |
---|---|
CN103140867A (en) | 2013-06-05 |
WO2012034691A1 (en) | 2012-03-22 |
DE102010045571A1 (en) | 2012-03-22 |
CN103140867B (en) | 2017-11-14 |
WO2012034691A8 (en) | 2013-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2862131B1 (en) | Method for unambiguous marking of an object | |
DE112019001531B4 (en) | Method of manufacturing an authenticated packaged product and system for verifying the authenticity of a packaged product | |
WO2009007100A1 (en) | Method, apparatus and logistics system for carrying a mail dispatch | |
DE102018103150A1 (en) | Procedure for generating a claim | |
DE112007001726T5 (en) | Anti-counterfeiting packaging | |
EP2283456B1 (en) | Method and device for identifying objects | |
DE29813738U1 (en) | Device for tamper-evident marking of objects | |
DE10357196A1 (en) | A fastness label and method of operating a certificate of authenticity | |
DE102017128325A1 (en) | Charging station for electric vehicles | |
EP1593088B1 (en) | Product security system and method therefor | |
DE102006019557A1 (en) | Packing unit for retaining product, has codes that are visually encoded or masked by camouflage and applied on packing unit, where codes are imprinted, stamped, lasered, engraved or pasted, and transmitted to data carrier | |
DE102007034527B4 (en) | Method and system for identifying a product as original product of a commodity manufacturer | |
DE102011089579A1 (en) | Procedure for making authenticated payments | |
EP2616997A1 (en) | Traceable marker of a security feature | |
DE19606552A1 (en) | Method for providing data of a vehicle device | |
DE102005057799A1 (en) | Access authorization giving method for depot e.g. boot of motor vehicle, involves automatically transmitting data set to depot, where depot checks data set and automatically opens and/or closes based on checking of data set | |
DE102011054637A1 (en) | Method for configuring an electromechanical lock | |
WO2020069541A1 (en) | Electronic marking | |
DE102007051787A1 (en) | Identity-based product protection | |
DE102004032113A1 (en) | System protecting manufacturers and customers against product forgery, employs code and date communication with purchaser, coupled with plausibility testing | |
DE102007036212A1 (en) | Method for labeling product, involves providing product identification assigned to product and product labeling is formed by coding product identification and product identification is encrypted with secret coding key | |
EP1980977B1 (en) | Authenticable label and device for authenticating an authenticable label | |
DE10134336A1 (en) | Ticket system | |
WO2003005143A2 (en) | Labeling of objects | |
DE102012020367A1 (en) | Electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20130416 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: PAUL, OLIVER Inventor name: FIEDLER, MICHAEL |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20140213 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20180208 |