EP2892820A1 - Device for authenticating a bottle and authentication method using said device - Google Patents
Device for authenticating a bottle and authentication method using said deviceInfo
- Publication number
- EP2892820A1 EP2892820A1 EP13774717.6A EP13774717A EP2892820A1 EP 2892820 A1 EP2892820 A1 EP 2892820A1 EP 13774717 A EP13774717 A EP 13774717A EP 2892820 A1 EP2892820 A1 EP 2892820A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- bottle
- marker
- memory
- code
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D55/00—Accessories for container closures not otherwise provided for
- B65D55/02—Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
- B65D55/06—Deformable or tearable wires, strings, or strips; Use of seals, e.g. destructible locking pins
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
- G06K7/10415—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications the interrogation device being fixed in its position, such as an access control device for reading wireless access cards, or a wireless ATM
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D2203/00—Decoration means, markings, information elements, contents indicators
- B65D2203/10—Transponders
Definitions
- the present invention relates to a device for authenticating a bottle and to an authentication method using said device.
- a bottle of wine comprises at its neck a plug inserted into the neck and an overcap which covers the opening portion of the neck and the cylindrical upper end of the neck.
- This overcap is generally metallic.
- the bottle includes at its body a label to identify the contents of the bottle and possibly a counter-label on which there is additional information.
- the label includes information required by legislation as well as information to identify the contents of the bottle such as a brand.
- a first level of counterfeiting is to market any wine with a false container and false labels containing information close to the genuine labels. This level of counterfeiting can be easily foiled by an informed consumer.
- the fight against counterfeiting essentially involves raising awareness and training consumers in the world of wine. For this purpose, some applications offer in addition to the authentication of additional information on the wine contained in the bottle authenticated to educate the consumer.
- a second level of counterfeiting more sophisticated than the first, consists in marketing any wine with a false container and labels identical to the authentic labels. In this case, even an informed consumer can be deceived.
- a first solution is to use a bubble code on the label or a two-dimensional bar code also called "QR code" associated with a hologram also affixed to the label.
- the document WO2010 / 063909 describes a label with several visual security elements.
- this document does not describe any electronic type system for authentication whose operation is likely to be altered by a metal or metallized overcap.
- bubble code is more difficult to reproduce, its cost is relatively high because it is not widely used. In addition, few users intuitively know how to use it. In the case of bubble code by for example, this device with the complex appearance is difficult to reproduce. However, its reproduction is necessary only if the user tries to authenticate it with a very particular and very rare reader. But in reality, authentication is achieved in 99% of the cases by a simple visual comparison thanks to the reading of a Q code leading directly to a database referencing all the bubble codes. Thus, the user will be deceived with a simple photo taken by modest means since it will rely only on a 2D reading similar to reading a QRcode or code type "Datamatrix" .
- markers containing an electronic chip may be affixed to the crates of bottles or bottles. These markers also contain a temperature sensor and possibly a geolocation sensor for regularly measuring the temperature of the environment, the measurements being stored in the RFID chip.
- an RFID chip comprises a microprocessor associated with an antenna for the exchange of signals.
- the RFID chip makes it possible to ensure that the bottle or the box have been stored under suitable conditions throughout the distribution circuit.
- This solution could be diverted and used to authenticate a bottle as each RFID chip includes a unique identifier.
- each RFID chip Due to international standards, each RFID chip has a unique identifier. Thus, two RFID chips can not have the same identifier. According to another advantage, it is for the moment difficult to duplicate an RFID chip and to implement an identifier corresponding to that of another RFID chip. RFID chips can be passive and do not require the use of a battery. Therefore, the life of such a chip is almost infinite.
- NFC communication near field communication
- This solution could meet the authentication objectives by making it difficult to copy and easy to authenticate thanks to applications installed on a communicating device such as a "smartphone" -type telephone which, on the one hand, communicates with the RFID chip can read its identifier and secondly with a server compare it with those of a database to authenticate the bottle.
- a communicating device such as a "smartphone" -type telephone which, on the one hand, communicates with the RFID chip can read its identifier and secondly with a server compare it with those of a database to authenticate the bottle.
- the overcap comprises a precut line allowing during opening to separate the upper part of the overcap to remove the cap.
- the RFID tag is placed astride the precut line.
- the marker containing the RFID chip is in the form of a band affixed along a generatrix of the neck of the bottle from the glass of the bottle to above the neck from the bottle.
- the RFID chip and more particularly its antenna are irreparably damaged.
- This type of implantation is described in particular in US-6,360,208. In both cases, the RFID chip being irreparably damaged after the first opening of the bottle, the genuine bottle which would eventually be refilled could not be authenticated again.
- the present invention aims to overcome the disadvantages of the prior art.
- an object of the invention is to authenticate a bottle reliably without additional cost even when the bottle comprises a metal overcap.
- the invention proposes a device for authenticating a bottle which comprises, on the one hand, a neck with an overcap capsule delimited by a lower edge and, on the other hand, a marker with an electronic component and an antenna for communicating with a device, said electronic component and said antenna occupying a zone A which corresponds to at least a part of the area of the marker, characterized in that the marker is arranged astride the lower edge and in that at least 25% of the zone A covers the part of the bottle located under the lower edge of said overcap capsule in order to limit the disturbances induced by the overcap on the antenna.
- the marker comprises at its outer face a coating which forms a sealed barrier.
- This solution makes it possible to improve the resistance of the marker.
- the invention also proposes an authentication method which makes it possible to increase the level of security.
- FIG. 1 is a schematic representation of the device for authenticating a bottle according to the invention
- FIG. 2 is a front view of a neck of a bottle on which is affixed a marker according to the invention illustrating by transparency a FID chip,
- FIG. 3 is a front view of a neck of a bottle on which is affixed a marker according to a variant of the invention
- FIG. 4 is a section of a neck of a bottle to which a marker is affixed according to another variant of the invention
- FIG. 5 is a diagram illustrating an authentication method according to the invention.
- FIG. 6 is a diagram illustrating the implementation of an authentication method according to a first variant of the invention.
- FIG. 7A is a diagram illustrating the implementation of an authentication method according to a second variant of the invention.
- FIG. 7B is a diagram illustrating the implementation of an authentication method according to a third variant of the invention.
- FIG. 1 there is shown at 10 a bottle comprising a marker 12 according to the invention to authenticate.
- the bottle 10 comprises firstly a body on which is affixed a label 14 and possibly a back label, and secondly, a neck 16 surmounting the body in which is inserted a plug 18 (visible on FIG. 4), covered with an overcap 20.
- Legal and identifying information for the bottle (such as a mark) is provided on the label 14.
- the neck 16 generally comprises a collar 22 projecting from the outer surface of the neck and offset from the upper end of the neck.
- the overcap 20 is generally metallic (tin or aluminum) and comprises a skirt which extends from the upper end of the neck over a certain height, of the order of 5 to 6 cm.
- the lower edge 24 of the overcap is offset downwardly relative to the flange 22 by a distance of the order of 3 to 4 cm.
- the overcap 20 When opening the bottle, the overcap 20 is cut with a cutting tool along a cutting line 26 positioned just below the flange 22. Following this cutting, the upper part of the capsule overcap 20 is removed to allow the plug to be removed. The lower portion 28 of the overcap 20 in the form of a sleeve is retained on the bottle.
- a bottle comprises a marker 12.
- This marker is in the form of a label straddling the glass of the bottle and the overcap 20, on both sides of the lower edge 24 of said capsule.
- the marker 12 is a square of 30 mm side. Nevertheless, the marker is not limited to this geometry and may have dimensions and shapes (square, rectangular, round, ...) variables.
- This marker 12 is affixed to the bottle 10 by gluing.
- the marker 12 comprises at one of its faces an adhesive coating 29 allowing it to be fixed by gluing on the bottle, as illustrated in FIG. 4.
- This adhesive coating or this glue has a high adhesion power. in order to limit the risks of tearing off the marker 12.
- the marker 12 comprises a film 30 in the format of the marker on which are reported means for storing information and contactless communication means for exchanging information with a reader 32.
- the means of storing information and the means of communication are integrated in an FID chip. This solution makes it possible to reduce the costs of the marker insofar as the RFID chips are manufactured in large numbers.
- the invention is not limited to an RFID chip. It thus covers all electronic devices for storing at least one piece of information and communicating with another device according to a contactless communication protocol.
- the marker may integrate an NFC chip, and more particularly an "NFC inlay" chip.
- the marker 12 comprises an electronic device with at least one electronic component 34 with at least one memory, more particularly a microprocessor, and at least one antenna 36.
- the electronic device can be passive or be semi-passive and integrate a sensor such as a temperature sensor for example.
- the communication protocol is of the NFC type near-field communication type defined according to the standards recognized by the NFC Forum, including ISO / IEC 14443-1 to ISO / IEC 14443-4.
- NFC Forum including ISO / IEC 14443-1 to ISO / IEC 14443-4.
- ISO / IEC 14443-1 to ISO / IEC 14443-4.
- This solution has the advantage of using widely used devices and used as a reader, which reduces the authentication costs and democratize the authentication method very quickly.
- This technology is widely used because it is also used for contactless payment and its use is very intuitive.
- the electronic component 34 and the antenna 36 occupy a zone A which corresponds to at least a portion of the area of the marker 12. According to an important characteristic of the invention, at least 25% of the area A occupied by the electronic component 34 and the antenna 36 does not cover the overcap 20 and covers the portion of the bottle located under the lower edge 24 of said capsule not covered by the overcap.
- This solution makes it possible to limit the disturbances induced by the metal overcap on the marker and substantially increases the reliability of the authentication.
- this solution makes it possible to use FID chips widely marketed without adding isolation means that can significantly increase costs.
- the introduction of the marker 12 on the bottle can be performed during bottling using a machine to deposit labels.
- zone A situated under the lower edge 24 of the overcap is less than 90% of the total area of zone A.
- the zone A does not cover the collar 22 and does not extend above the cutting line 26 positioned just under the collar 22.
- the marker is irreparably damaged and no longer works not at the opening of the bottle but at the time of the attempted counterfeit and the reuse of the bottle, the removal of the rest of the overcap capsule being mandatory when repacking the bottle.
- the marker 12 is in the form of a label with at least one precut 38 (visible in Figure 3) so that the marker 12 is torn during an attempt to take off.
- the marker 12 is torn during an attempt to take off.
- an "NFC inlay” type marker the latter is positioned and processed in a specific manner so that it definitively destroys itself during any tearing attempts.
- the marker 12 comprises at its outer face 40 a coating 42 which forms a sealed barrier to enhance the moisture resistance of the marker.
- a coating 42 which forms a sealed barrier to enhance the moisture resistance of the marker.
- the coating 42 is made based on a polymer, in particular based on printable polyethylene.
- the design of the marker incorporating a FID chip, at least one precut 38 and a coating 42 and using an NFC type communication protocol makes it possible to meet the following objectives:
- the invention In parallel with an authenticating device using a marker affixed in a specific manner on the bottle, the invention also proposes an authentication method with a high level of security.
- the marker according to the invention comprises an electronic component 34 comprising at least one memory 44 and an antenna 36 making it possible to communicate information with a communicating device 32.
- the marker 12 is in the form of an RFID chip and the apparatus 32 integrates the NFC type near-field communication technology.
- the device 32 is a mobile phone type "smartphone". Nevertheless, the invention is not limited to this type of apparatus. Thus, a touch pad or any device incorporating the NFC protocol may also be suitable.
- the entire authentication device comprises at least one server 46 with at least one database 48 and a "server" application 50, said server 46 being capable of being connected by means of a telephone network or a computer network in particular Internet to a communicating device 32.
- the communicating device 32 comprises a mobile application 52 enabling it to communicate with the marker 12 on the one hand, and with the server 46 on the other, but also to interface with a user.
- the memory 44 of the marker 12 comprises on the one hand an identifier which is specific to each memory and which is assigned to the memory 44 during its manufacture, and on the other hand at least one code which is implemented in the memory during its use.
- the marker 12 comprises a visual cue 54, such as for example a serial number.
- each RFID chip includes an identifier that is unique to it and assigned to it during its manufacture.
- each marker 12 includes a code of its own.
- each bottle 10 is associated with the identifier of the memory 44 of the marker affixed to said bottle and a code corresponding to the code implemented in said memory 44.
- the code implemented in said memory 44 varies from a marker. to the other. Therefore, each code is unique.
- the code present in the memory is encrypted.
- the database associates with each bottle the identifier of the marker and an decrypted code which corresponds to the encrypted code implemented in the memory.
- the encryption means are not more detailed because they are known.
- the presence of the encrypted code makes it possible to significantly increase the degree of security since, unlike the identifier, it is not determined by the manufacturer of the RFID chips but by the company managing the authentication method according to the invention. invention.
- each bottle 10 is associated with at least one question relating to a characteristic of the bottle 10 and its response.
- this characteristic is visual and relates to at least one physical specificity of the container, for example to a detail appearing on the overcap 20, on the label 14 and / or at the bottom of the bottle.
- the question may consist in showing an image of a label and asking the user if this image corresponds to the label on the bottle that the user is trying to authenticate.
- each bottle is associated with several pairs of questions / answers.
- each bottle is associated with three pairs of questions / answers, a first question relating to a visual characteristic of the neck, a second question relating to a visual characteristic of the label and a third question relating to a visual characteristic of the bottle. bottom of the bottle.
- the invention is not limited to this series of question / answer pairs.
- the database associates for each bottle, an identifier, an encrypted code, at least one pair of question / answer relating to a characteristic of the bottle and an authentication certificate.
- the database associates for each bottle, an identifier, an encrypted code, at least one pair of question / answer relating to a characteristic of the bottle, a series of alphanumeric characters that corresponds to the visual cue 54 and an authentication certificate.
- the visual cue 54 allows the user to refer to a single visible security in order to testify to the invisible security (identifier and code implemented in the memory 44 of the marker).
- the nomad application 52 of the communicating device 32 performs several functions.
- the nomadic application comprises a read module of the marker 12 making it possible to read the identifier and the implemented encrypted code of the memory 44 of the marker.
- the mobile application also includes a communication module for exchanging information between the communicating device 32 and the server 46.
- the communication module ensures the transmission of the identifier and the encrypted code to the server 46 and the exchanges between the communicating device and the server relating to the question / answer couples and to the authentication certificate.
- the mobile application also includes an interface allowing, for each question / answer pair, to display the question and to enter the response of a user and to display the authentication certificate which integrates the visual cue 54, if the authentication is successful.
- the mobile application can be downloaded via a telephone or computer network.
- the memory 44 of the marker comprises at least one address of the URL type of a site on which the mobile application can be downloaded.
- the application "server” includes means of communication with a communicating device 32 which transmits a request and information processing means for:
- the answers provided by the user are correct, to transmit the authentication certificate including the visual cue 54 associated with the pair identifier / encrypted code / answers to the questions.
- the authentication method comprises an algorithm with the following steps:
- the communicating device transmits to the server a request mentioning the pair identifying / encrypted code
- the server After decrypting the code, the server compares this identifier / code pair with those present in the database.
- the server transmits a message to the communicating device which then indicates to the user that the bottle can not be authenticated
- the server transmits to the communicating device that made the request to the less a couple of questions / answers relating to one or more visual characteristics of the bottle,
- the nomad application indicates to the user that the bottle can not be authenticated
- the server transmits the authentication certificate to the communicating device having formulated the request which displays it,
- the user can compare the unique visual cue 54 present on both the tag 12 and the authentication certificate.
- the database associates for each bottle, an identifier, an decrypted code, at least one pair of question / answer relating to a characteristic of the bottle, a series of alphanumeric characters. which corresponds to the visual cue 54 and an authentication certificate.
- this visual cue 54 comprises a series of alphanumeric signs.
- This visual cue 54 is present on an authentic bottle, in particular on the marker 12. In a variant, it can be affixed to the label of the bottle as illustrated in FIG.
- the server transmits to the communicating device having formulated the request the visual cue associated with the bottle which displays it on the screen. If the user confirms the presence of this visual cue on the bottle, the server 46 then transmits the authentication certificate.
- the server transmits to the communicating device having formulated the The certificate of authentication, which includes the visual cue 54, is requested by the user so that the user can compare the transmitted visual cue 54 with that affixed to the bottle in order to carry out a final verification.
- the server 46 can transmit other information relating to wine, producers, traders, consumers or others. This feature allows you to authenticate, trace products, educate the consumer, promote products and brands, and exchange information.
- the nomad application asks the user if he wishes to declare the counterfeit.
- the application prompts him to take a picture of the bottle with his camera 32 and the latter accompanied by the geolocation coordinates of the camera 32 (provided by the geolocation system integrated into the camera) are transmitted to the camera. server 46. This feedback helps identify counterfeiting and intensify the fight against it.
- the authentication process can be used for other products, such as drugs or luxury goods.
- the authentication method is more particularly intended to be used with the marker 12 according to the invention, affixed in a certain way on the bottle.
- it could be used with other markers containing memory and using the near field communication protocol.
- the communicating device 32 could integrate the database 48 and all the features of the "server” application.
- the authentication device could comprise only one device communicating with the marker and no longer include a server.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Development Economics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Mechanical Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Electromagnetism (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Details Of Rigid Or Semi-Rigid Containers (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1258297A FR2994952B1 (en) | 2012-09-05 | 2012-09-05 | DEVICE FOR AUTHENTICATING A BOTTLE |
FR1258298A FR2995107A1 (en) | 2012-09-05 | 2012-09-05 | Product i.e. wine bottle, authenticating method, involves comparing deciphered code with code in database, and transmitting authentication certificate associated with deciphered code if responses provided by user are correct |
PCT/FR2013/052033 WO2014037666A1 (en) | 2012-09-05 | 2013-09-04 | Device for authenticating a bottle and authentication method using said device |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2892820A1 true EP2892820A1 (en) | 2015-07-15 |
Family
ID=49328548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13774717.6A Withdrawn EP2892820A1 (en) | 2012-09-05 | 2013-09-04 | Device for authenticating a bottle and authentication method using said device |
Country Status (3)
Country | Link |
---|---|
US (1) | US20150235234A1 (en) |
EP (1) | EP2892820A1 (en) |
WO (1) | WO2014037666A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3027700B1 (en) * | 2014-10-27 | 2018-01-19 | Les Bouchages Delage | METHOD OF AUTHENTICATING THE CLOSURE ASSEMBLY OF A CONTAINER |
TR201712426A2 (en) * | 2017-08-21 | 2017-09-21 | Sicpa Turkey Ueruen Guevenligi Sanayi Ve Ticaret Anonim Sirketi | Safe filling and consumption system in refillable drinking water packages |
CN111492376B (en) * | 2017-10-16 | 2024-01-23 | Gcl国际有限公司 | Closure member |
US11048892B2 (en) * | 2017-12-19 | 2021-06-29 | MS Shift, Inc. | System for tracking storage and dispatch of tagged items |
DE102019000327A1 (en) | 2019-01-21 | 2020-07-23 | Securovin GmbH | Penetration-proof, NFC-based bottle closure |
AU2020211640B2 (en) * | 2019-01-23 | 2021-03-04 | Cellr Pty Ltd | Beverage producer authenticity verification method and system |
WO2022087131A1 (en) * | 2020-10-20 | 2022-04-28 | Westrock Shared Services, Llc | Product packaging and associated system and method for authenticating a product |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2262425B1 (en) | 2005-02-24 | 2007-11-16 | Mobile Safe Data Services, Sl | CAPSULE FOR BOTTLES AND BOTTLE. |
US20070234058A1 (en) * | 2005-11-04 | 2007-10-04 | White Charles A | System and method for authenticating products |
US20090045959A1 (en) * | 2007-08-16 | 2009-02-19 | Lottabase, Llc. | Beverage container authenticity and provenance devices and methods |
FR2939542B1 (en) | 2008-12-04 | 2012-08-03 | Advanced Track & Trace | METHOD AND DEVICE FOR PROTECTING A CONTAINER AND LABEL FOR THEIR IMPLEMENTATION |
-
2013
- 2013-09-04 EP EP13774717.6A patent/EP2892820A1/en not_active Withdrawn
- 2013-09-04 WO PCT/FR2013/052033 patent/WO2014037666A1/en active Application Filing
- 2013-09-04 US US14/425,770 patent/US20150235234A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2014037666A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20150235234A1 (en) | 2015-08-20 |
WO2014037666A1 (en) | 2014-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2892820A1 (en) | Device for authenticating a bottle and authentication method using said device | |
EP1857374B1 (en) | Bottle cap and bottle | |
US9449325B2 (en) | System and method for authenticity verification | |
EP1578268B1 (en) | Method for identifying and authenticating without specific reader an identifier | |
JP4676558B1 (en) | Questionnaire system using container lid and container lid | |
CN105894307B (en) | Holographic anti-fake inquiry system and its anti-fake technology inquiry application method | |
WO2016207549A1 (en) | Bottle comprising a security closure | |
US11949768B2 (en) | Light-triggered transponder | |
CN101516635A (en) | Anti-counterfeit packaging | |
EP2882661B1 (en) | Method and device for authenticating a container cover | |
EP2724322B1 (en) | Method and apparatus of authenticating a label | |
CN102208043A (en) | Wine anti-counterfeiting identification method based on electronic tag and product information association processing | |
WO2018122362A1 (en) | System and method for tracing and authenticating a product | |
KR20140079555A (en) | Check system of authenticity product | |
FR3028844A1 (en) | METHOD AND DEVICE FOR SECURING A CONTAINER, CONTAINER CARRYING SUCH A DEVICE AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY AND INTEGRITY OF SUCH A CONTAINER | |
US20220085992A1 (en) | Devices, systems, and methods using microtransponders | |
WO2006042913A1 (en) | Method for making secure transactions and authentication of objects or documents | |
EP1483748A1 (en) | Method for product traceability and authentication | |
US20160300244A1 (en) | Method And System For Authenticating A Packaged Product From A Remote Location | |
FR2994952A1 (en) | Authenticating device for authenticating wine bottle, has marker mounted on lower edge of oversealing capsule, where specific percent of zone corresponding to portion of surface of marker covers portion of bottle located under edge | |
FR2995107A1 (en) | Product i.e. wine bottle, authenticating method, involves comparing deciphered code with code in database, and transmitting authentication certificate associated with deciphered code if responses provided by user are correct | |
JP2014521162A (en) | Identification of counterfeit goods | |
TWM454594U (en) | The mating positioning chip tag anti-fake system | |
Przyswa | Counterfeiting in the wine and spirits market | |
CN111582890B (en) | Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20150304 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20160321 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: HOEGH-GULDBERG, TANGUY |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: HOEGH-GULDBERG, TANGUY |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20160802 |