EP3117643A1 - Verfahren zur überwachung der originalität eines objekts - Google Patents

Verfahren zur überwachung der originalität eines objekts

Info

Publication number
EP3117643A1
EP3117643A1 EP15715422.0A EP15715422A EP3117643A1 EP 3117643 A1 EP3117643 A1 EP 3117643A1 EP 15715422 A EP15715422 A EP 15715422A EP 3117643 A1 EP3117643 A1 EP 3117643A1
Authority
EP
European Patent Office
Prior art keywords
information
checked
verification center
verification
visible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15715422.0A
Other languages
English (en)
French (fr)
Inventor
Eric Bauer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP3117643A1 publication Critical patent/EP3117643A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • the present invention relates to a method of controlling an object, more particularly to a method which makes it possible to verify the authenticity of an object such as a watch, a jewel, a medicine or any other valuable object.
  • This method is particularly suitable for example during customs controls to ensure that the controlled object comes from a specific manufacturer and that it is not a counterfeit.
  • the method which is the subject of the invention implements data acquisition and transmission means between a control station and a verification center in which all the data circulating on the telecommunication networks are encrypted. All sensitive data to verify that there is an original object is kept in one place and are not accessible when transmitting bidirectional information between the control point and the central verification .
  • the problem to be solved by the present invention is not to transmit sensitive information between the control point and the central verification that will attest to the authenticity of the object controlled by a quick and unambiguous verification. It should also be noted that all the information relating to the object to be checked is kept only at the place where the verification center is located.
  • each original object comprises at least two distinct identification means.
  • a first identification means is visible from outside the object. It may be for example a bar code or a QR code affixed to the object or its packaging.
  • a second identification means in the form of an electronic tag or an RFID tag or any other such device that can be read remotely by a suitable reader is installed in the object and preferably is not visible from outside the object.
  • the watch case is provided on its outer part with a barcode or a QR code affixed to the back of the box.
  • An RFID tag serving as the second means of identification is integrated with its antenna in the watch case.
  • the RFID tag or electronic tag is a simple and compact device that usually has a unique serial number that can be read without contact with a reader emitting a radiant field that activates the tag when the latter is located within the range of action of the reader. It should also be noted that these passive tags, in their simplest version, do not offer any possibility of writing data. They consist of a unique serial number that can be read remotely when the tag is activated by the reader but can not be modified.
  • the identification element visible for example the QR code on the object carries some of the information necessary to identify the object.
  • the visible identification element In order to prevent the visible identification element from being reproduced or falsified, it contains only part of the information necessary to identify the object. In the same way, the tag alone does not guarantee the authenticity of the object. It is indeed a combination of the information carried by the QR code and information relating to the unique serial number of the electronic tag that determines the authenticity of the object to be controlled.
  • the manufacturer chooses which information he wishes to use from those on the visible element, the first means of identification and those carried by the tag to verify the authenticity of the object.
  • the manufacturer may for example use the unique serial number of the electronic tag in combination with all or part of the information carried by the QR code.
  • the fraudulent installation of a tag in the object does not allow to uniquely identify the object because it will miss the information carried by the first piece of information.
  • the manufacturer of the object to be controlled decides how he wishes to combine the information carried by the visible element and that contained in the tag to establish a unique correspondence list between the combination of this information and the internal references of the original object. This increases the reliability of the system since only the manufacturer knows how the information carried by the different identification elements must be combined.
  • the manufacturer establishes a list in a computer file that contains all the information relating to the object (reference, date of manufacture, place of manufacture, specific characteristics of the object, etc.).
  • This computer file further comprises the combination of the information contained in the tag and those carried by the visible information element.
  • the file computer thus constituted references all the original objects as well as the chosen combination of information enabling it to be authenticated. Any combination between the first and second pieces of information is conceivable.
  • the object to be verified is presented to a combined reader which will read both the QR code and the serial number of the electronic tag.
  • An appropriate reader will preferably be used which includes an optical reader for reading the visible element and a high frequency reader which enables the electronic tag to be activated and to retrieve its serial number.
  • the combined reader is coupled to a data transmission device such as a laptop or a mobile phone which can transmit the data acquired by the reader to the control unit.
  • a data transmission device such as a laptop or a mobile phone which can transmit the data acquired by the reader to the control unit.
  • the data acquired by the reader are encrypted by the transmission device before being transmitted to the verification center.
  • any known form of encryption can be used, for example an RSA-type asymmetric encryption or a DES-type symmetric encryption.
  • the computer equipment of the verification center decrypts the received data, then applies the matching rule defined by the manufacturer to obtain a number or a sequence of characters which corresponds to an entry in the database of the articles. originals.
  • the verification center then accesses the database using the information transmitted and the number obtained by the concordance rule and checks whether this information corresponds to a specific object.
  • the central verification system transmits to the control station by the means of transmission a positive signal indicating that it is indeed an original article. If the matching rule applied to the received information elements does not uniquely identify an original article, a negative signal is transmitted to the transmission means of the control station.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Electromagnetism (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)
  • Near-Field Transmission Systems (AREA)
EP15715422.0A 2014-03-12 2015-03-06 Verfahren zur überwachung der originalität eines objekts Withdrawn EP3117643A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CH00367/14A CH709353A2 (fr) 2014-03-12 2014-03-12 Procédé de contrôle de l'authenticité d'un objet.
PCT/IB2015/051638 WO2015136419A1 (fr) 2014-03-12 2015-03-06 Procédé de contrôle de l'authenticité d'un objet

Publications (1)

Publication Number Publication Date
EP3117643A1 true EP3117643A1 (de) 2017-01-18

Family

ID=52823719

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15715422.0A Withdrawn EP3117643A1 (de) 2014-03-12 2015-03-06 Verfahren zur überwachung der originalität eines objekts

Country Status (4)

Country Link
US (1) US20170053292A1 (de)
EP (1) EP3117643A1 (de)
CH (1) CH709353A2 (de)
WO (1) WO2015136419A1 (de)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10395231B2 (en) * 2016-06-27 2019-08-27 Altria Client Services Llc Methods, systems, apparatuses, and non-transitory computer readable media for validating encoded information
WO2020130932A1 (en) * 2018-12-19 2020-06-25 Singapore Diamond Investment Exchange Pte. Ltd. System and method of packaging and/or authenticating fungible baskets of investment grade gemstones and/or precious metals
CN113344496A (zh) * 2021-06-16 2021-09-03 国家珠宝检测中心(广东)有限责任公司 一种多策略珠宝鉴定的方法和系统

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6069955A (en) * 1998-04-14 2000-05-30 International Business Machines Corporation System for protection of goods against counterfeiting
US7222791B2 (en) * 2004-03-30 2007-05-29 International Business Machines Corporation Counterfeit detection method
US20050289061A1 (en) * 2004-06-24 2005-12-29 Michael Kulakowski Secure authentication system for collectable and consumer items
US8791794B2 (en) * 2006-03-31 2014-07-29 British Telecommunications Plc Method and device for obtaining item information using RFID tags
US8249350B2 (en) * 2006-06-30 2012-08-21 University Of Geneva Brand protection and product autentication using portable devices
US8376133B2 (en) * 2006-07-26 2013-02-19 Goldfinch Design Studio LLC Protection, authentication, identification device for a collectable object
US20090295144A1 (en) * 2008-06-02 2009-12-03 Winkelhorn Karin-Maria K System and Method for Printing, Protecting and Authenticating Packaging, Tangible Entertainment Media and Other Printed Products
US8421593B2 (en) * 2008-08-07 2013-04-16 Bertil A. Brandin Apparatus, systems and methods for authentication of objects having multiple components
US8791428B2 (en) * 2009-10-14 2014-07-29 Honeywell International Inc. Authentication systems for discriminating value documents based on variable luminescence and magnetic properties
US8622555B2 (en) * 2010-08-31 2014-01-07 3M Innovative Properties Company Security article having a switching feature
US20130173484A1 (en) * 2010-09-18 2013-07-04 Philip Wesby System and Method for Encoding and Controlled Authentication
CN102609846B (zh) * 2011-03-18 2014-02-05 诺美网讯应用技术有限公司 基于通信网络的防伪验证方法及系统
US20120310848A1 (en) * 2011-05-31 2012-12-06 Gao Zeming M Anti-counterfeiting marking with asymmetrical concealment
US10482471B2 (en) * 2013-01-16 2019-11-19 Amazon Technologies, Inc. Unauthorized product detection techniques

Also Published As

Publication number Publication date
WO2015136419A1 (fr) 2015-09-17
US20170053292A1 (en) 2017-02-23
CH709353A2 (fr) 2015-09-15

Similar Documents

Publication Publication Date Title
US10387695B2 (en) Authenticating and managing item ownership and authenticity
US10637854B2 (en) User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US10164959B2 (en) Systems and methods for performing secure financial transactions
US20160210547A1 (en) Identification Tag with Magnet Attachment and System for Supply Chain Management
US20090219132A1 (en) System for product authentication and tracking
US20170333768A1 (en) Authentication Tags and Systems for Golf Clubs
WO2019244139A1 (en) Secure tracking of items utilizing distributed computing
EP2800403A1 (de) Kommunikationsetikett, System und Verfahren
US10154031B1 (en) User-wearable secured devices provided assuring authentication and validation of data storage and transmission
CA3041572A1 (en) System and method for authentication using a mobile device
US20100313037A1 (en) Collectible case authentication system, device and method
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
FR2864380A1 (fr) Procede d'interrogation anti-collision d'un systeme rfid multiple
WO2018208190A1 (ru) Способ проверки подлинности товаров или услуг
US20090204417A1 (en) System for product authentication using covert codes
FR3021785A1 (fr) Procede pour securiser la revente d’un objet equipe d’une etiquette nfc
EP3117643A1 (de) Verfahren zur überwachung der originalität eines objekts
WO2001082035A2 (en) Method and apparatus verifying parts and parts lists in an assembly
US20140252080A1 (en) Method, apparatus and system for crowd sourced counterfeit detection and brand assurance
EP1851901A1 (de) Verfahren zur schnellen vorauthentifikation durch distanzerkennung
GB2495480A (en) Product authentication using unique code
US20120030474A1 (en) System and Method for Personal Biometric Data Sequestering and Remote Retrieval with Power Checking
JP2004299864A (ja) 流通情報管理装置、流通情報管理方法、流通情報管理プログラム、記録媒体
CN111062458A (zh) 利用无线射频标签的防伪系统
WO2020202216A1 (en) System and method to determine the authenticity of a wireless communication device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20160817

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20170503