EP3117643A1 - Verfahren zur überwachung der originalität eines objekts - Google Patents
Verfahren zur überwachung der originalität eines objektsInfo
- Publication number
- EP3117643A1 EP3117643A1 EP15715422.0A EP15715422A EP3117643A1 EP 3117643 A1 EP3117643 A1 EP 3117643A1 EP 15715422 A EP15715422 A EP 15715422A EP 3117643 A1 EP3117643 A1 EP 3117643A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- information
- checked
- verification center
- verification
- visible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Definitions
- the present invention relates to a method of controlling an object, more particularly to a method which makes it possible to verify the authenticity of an object such as a watch, a jewel, a medicine or any other valuable object.
- This method is particularly suitable for example during customs controls to ensure that the controlled object comes from a specific manufacturer and that it is not a counterfeit.
- the method which is the subject of the invention implements data acquisition and transmission means between a control station and a verification center in which all the data circulating on the telecommunication networks are encrypted. All sensitive data to verify that there is an original object is kept in one place and are not accessible when transmitting bidirectional information between the control point and the central verification .
- the problem to be solved by the present invention is not to transmit sensitive information between the control point and the central verification that will attest to the authenticity of the object controlled by a quick and unambiguous verification. It should also be noted that all the information relating to the object to be checked is kept only at the place where the verification center is located.
- each original object comprises at least two distinct identification means.
- a first identification means is visible from outside the object. It may be for example a bar code or a QR code affixed to the object or its packaging.
- a second identification means in the form of an electronic tag or an RFID tag or any other such device that can be read remotely by a suitable reader is installed in the object and preferably is not visible from outside the object.
- the watch case is provided on its outer part with a barcode or a QR code affixed to the back of the box.
- An RFID tag serving as the second means of identification is integrated with its antenna in the watch case.
- the RFID tag or electronic tag is a simple and compact device that usually has a unique serial number that can be read without contact with a reader emitting a radiant field that activates the tag when the latter is located within the range of action of the reader. It should also be noted that these passive tags, in their simplest version, do not offer any possibility of writing data. They consist of a unique serial number that can be read remotely when the tag is activated by the reader but can not be modified.
- the identification element visible for example the QR code on the object carries some of the information necessary to identify the object.
- the visible identification element In order to prevent the visible identification element from being reproduced or falsified, it contains only part of the information necessary to identify the object. In the same way, the tag alone does not guarantee the authenticity of the object. It is indeed a combination of the information carried by the QR code and information relating to the unique serial number of the electronic tag that determines the authenticity of the object to be controlled.
- the manufacturer chooses which information he wishes to use from those on the visible element, the first means of identification and those carried by the tag to verify the authenticity of the object.
- the manufacturer may for example use the unique serial number of the electronic tag in combination with all or part of the information carried by the QR code.
- the fraudulent installation of a tag in the object does not allow to uniquely identify the object because it will miss the information carried by the first piece of information.
- the manufacturer of the object to be controlled decides how he wishes to combine the information carried by the visible element and that contained in the tag to establish a unique correspondence list between the combination of this information and the internal references of the original object. This increases the reliability of the system since only the manufacturer knows how the information carried by the different identification elements must be combined.
- the manufacturer establishes a list in a computer file that contains all the information relating to the object (reference, date of manufacture, place of manufacture, specific characteristics of the object, etc.).
- This computer file further comprises the combination of the information contained in the tag and those carried by the visible information element.
- the file computer thus constituted references all the original objects as well as the chosen combination of information enabling it to be authenticated. Any combination between the first and second pieces of information is conceivable.
- the object to be verified is presented to a combined reader which will read both the QR code and the serial number of the electronic tag.
- An appropriate reader will preferably be used which includes an optical reader for reading the visible element and a high frequency reader which enables the electronic tag to be activated and to retrieve its serial number.
- the combined reader is coupled to a data transmission device such as a laptop or a mobile phone which can transmit the data acquired by the reader to the control unit.
- a data transmission device such as a laptop or a mobile phone which can transmit the data acquired by the reader to the control unit.
- the data acquired by the reader are encrypted by the transmission device before being transmitted to the verification center.
- any known form of encryption can be used, for example an RSA-type asymmetric encryption or a DES-type symmetric encryption.
- the computer equipment of the verification center decrypts the received data, then applies the matching rule defined by the manufacturer to obtain a number or a sequence of characters which corresponds to an entry in the database of the articles. originals.
- the verification center then accesses the database using the information transmitted and the number obtained by the concordance rule and checks whether this information corresponds to a specific object.
- the central verification system transmits to the control station by the means of transmission a positive signal indicating that it is indeed an original article. If the matching rule applied to the received information elements does not uniquely identify an original article, a negative signal is transmitted to the transmission means of the control station.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Electromagnetism (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
- Near-Field Transmission Systems (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CH00367/14A CH709353A2 (fr) | 2014-03-12 | 2014-03-12 | Procédé de contrôle de l'authenticité d'un objet. |
| PCT/IB2015/051638 WO2015136419A1 (fr) | 2014-03-12 | 2015-03-06 | Procédé de contrôle de l'authenticité d'un objet |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP3117643A1 true EP3117643A1 (de) | 2017-01-18 |
Family
ID=52823719
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP15715422.0A Withdrawn EP3117643A1 (de) | 2014-03-12 | 2015-03-06 | Verfahren zur überwachung der originalität eines objekts |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20170053292A1 (de) |
| EP (1) | EP3117643A1 (de) |
| CH (1) | CH709353A2 (de) |
| WO (1) | WO2015136419A1 (de) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10395231B2 (en) * | 2016-06-27 | 2019-08-27 | Altria Client Services Llc | Methods, systems, apparatuses, and non-transitory computer readable media for validating encoded information |
| WO2020130932A1 (en) * | 2018-12-19 | 2020-06-25 | Singapore Diamond Investment Exchange Pte. Ltd. | System and method of packaging and/or authenticating fungible baskets of investment grade gemstones and/or precious metals |
| CN113344496A (zh) * | 2021-06-16 | 2021-09-03 | 国家珠宝检测中心(广东)有限责任公司 | 一种多策略珠宝鉴定的方法和系统 |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6069955A (en) * | 1998-04-14 | 2000-05-30 | International Business Machines Corporation | System for protection of goods against counterfeiting |
| US7222791B2 (en) * | 2004-03-30 | 2007-05-29 | International Business Machines Corporation | Counterfeit detection method |
| US20050289061A1 (en) * | 2004-06-24 | 2005-12-29 | Michael Kulakowski | Secure authentication system for collectable and consumer items |
| US8791794B2 (en) * | 2006-03-31 | 2014-07-29 | British Telecommunications Plc | Method and device for obtaining item information using RFID tags |
| US8249350B2 (en) * | 2006-06-30 | 2012-08-21 | University Of Geneva | Brand protection and product autentication using portable devices |
| US8376133B2 (en) * | 2006-07-26 | 2013-02-19 | Goldfinch Design Studio LLC | Protection, authentication, identification device for a collectable object |
| US20090295144A1 (en) * | 2008-06-02 | 2009-12-03 | Winkelhorn Karin-Maria K | System and Method for Printing, Protecting and Authenticating Packaging, Tangible Entertainment Media and Other Printed Products |
| US8421593B2 (en) * | 2008-08-07 | 2013-04-16 | Bertil A. Brandin | Apparatus, systems and methods for authentication of objects having multiple components |
| US8791428B2 (en) * | 2009-10-14 | 2014-07-29 | Honeywell International Inc. | Authentication systems for discriminating value documents based on variable luminescence and magnetic properties |
| US8622555B2 (en) * | 2010-08-31 | 2014-01-07 | 3M Innovative Properties Company | Security article having a switching feature |
| US20130173484A1 (en) * | 2010-09-18 | 2013-07-04 | Philip Wesby | System and Method for Encoding and Controlled Authentication |
| CN102609846B (zh) * | 2011-03-18 | 2014-02-05 | 诺美网讯应用技术有限公司 | 基于通信网络的防伪验证方法及系统 |
| US20120310848A1 (en) * | 2011-05-31 | 2012-12-06 | Gao Zeming M | Anti-counterfeiting marking with asymmetrical concealment |
| US10482471B2 (en) * | 2013-01-16 | 2019-11-19 | Amazon Technologies, Inc. | Unauthorized product detection techniques |
-
2014
- 2014-03-12 CH CH00367/14A patent/CH709353A2/fr not_active Application Discontinuation
-
2015
- 2015-03-06 US US15/119,779 patent/US20170053292A1/en not_active Abandoned
- 2015-03-06 WO PCT/IB2015/051638 patent/WO2015136419A1/fr not_active Ceased
- 2015-03-06 EP EP15715422.0A patent/EP3117643A1/de not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| WO2015136419A1 (fr) | 2015-09-17 |
| US20170053292A1 (en) | 2017-02-23 |
| CH709353A2 (fr) | 2015-09-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10387695B2 (en) | Authenticating and managing item ownership and authenticity | |
| US10637854B2 (en) | User-wearable secured devices provided assuring authentication and validation of data storage and transmission | |
| US10164959B2 (en) | Systems and methods for performing secure financial transactions | |
| US20160210547A1 (en) | Identification Tag with Magnet Attachment and System for Supply Chain Management | |
| US20090219132A1 (en) | System for product authentication and tracking | |
| US20170333768A1 (en) | Authentication Tags and Systems for Golf Clubs | |
| WO2019244139A1 (en) | Secure tracking of items utilizing distributed computing | |
| EP2800403A1 (de) | Kommunikationsetikett, System und Verfahren | |
| US10154031B1 (en) | User-wearable secured devices provided assuring authentication and validation of data storage and transmission | |
| CA3041572A1 (en) | System and method for authentication using a mobile device | |
| US20100313037A1 (en) | Collectible case authentication system, device and method | |
| WO2017116303A1 (en) | Secure dual-mode anti-counterfeit product authentication methodology and system | |
| FR2864380A1 (fr) | Procede d'interrogation anti-collision d'un systeme rfid multiple | |
| WO2018208190A1 (ru) | Способ проверки подлинности товаров или услуг | |
| US20090204417A1 (en) | System for product authentication using covert codes | |
| FR3021785A1 (fr) | Procede pour securiser la revente d’un objet equipe d’une etiquette nfc | |
| EP3117643A1 (de) | Verfahren zur überwachung der originalität eines objekts | |
| WO2001082035A2 (en) | Method and apparatus verifying parts and parts lists in an assembly | |
| US20140252080A1 (en) | Method, apparatus and system for crowd sourced counterfeit detection and brand assurance | |
| EP1851901A1 (de) | Verfahren zur schnellen vorauthentifikation durch distanzerkennung | |
| GB2495480A (en) | Product authentication using unique code | |
| US20120030474A1 (en) | System and Method for Personal Biometric Data Sequestering and Remote Retrieval with Power Checking | |
| JP2004299864A (ja) | 流通情報管理装置、流通情報管理方法、流通情報管理プログラム、記録媒体 | |
| CN111062458A (zh) | 利用无线射频标签的防伪系统 | |
| WO2020202216A1 (en) | System and method to determine the authenticity of a wireless communication device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20160817 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| AX | Request for extension of the european patent |
Extension state: BA ME |
|
| DAV | Request for validation of the european patent (deleted) | ||
| DAX | Request for extension of the european patent (deleted) | ||
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20170503 |