WO2001015097A1 - Procede de garantie produit - Google Patents

Procede de garantie produit Download PDF

Info

Publication number
WO2001015097A1
WO2001015097A1 PCT/EP2000/008135 EP0008135W WO0115097A1 WO 2001015097 A1 WO2001015097 A1 WO 2001015097A1 EP 0008135 W EP0008135 W EP 0008135W WO 0115097 A1 WO0115097 A1 WO 0115097A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification
product
products
packaging
label
Prior art date
Application number
PCT/EP2000/008135
Other languages
German (de)
English (en)
Inventor
Wolfram Seidemann
Walter Hinz
Jürgen Moll
Original Assignee
Giesecke & Devrient Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE10019721A external-priority patent/DE10019721A1/de
Application filed by Giesecke & Devrient Gmbh filed Critical Giesecke & Devrient Gmbh
Priority to EP00958478A priority Critical patent/EP1218857A1/fr
Priority to AU69978/00A priority patent/AU6997800A/en
Publication of WO2001015097A1 publication Critical patent/WO2001015097A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • the invention relates to a system for checking the authenticity and / or completeness of goods as well as a method for product security of goods.
  • Another way of securing the product is to secure the packaging, not the product itself.
  • tear threads for packaging with luminescent substances EP 0 901 970 A2
  • tax stamps as are customary, for example, in the case of cigarettes or alcohols, with holograms.
  • this type of protection has the disadvantage that it can be determined whether the packaging is authentic, but it is not possible to say with certainty whether the products contained in the packaging are actually authentic.
  • the invention is therefore based on the object of developing a product assurance system and a method for product assurance with which products can be labeled in a cost-effective and economical manner and which at the same time makes it possible to determine whether these products are of authentic origin.
  • the system for checking the authenticity and / or completeness of goods consists of at least one product and an associated packaging, the product bearing a first identification and the packaging a second identification.
  • the first and second labeling are in a predetermined relationship to one another, so that by checking the first and second labeling, conclusions can be drawn as to whether they belong together and, if necessary, the authenticity of the product and packaging.
  • the system consists of at least a first product and a second product, the first product carrying a first label and the second product a second label.
  • the first and second identification have a predetermined relationship to one another, so that by checking the first and second identification, conclusions can be drawn as to whether the two products belong together and, if appropriate, are genuine.
  • the system consists of a product which is composed of different individual parts, the individual parts each bearing the same or different, in particular individual, first identification and at least one of these individual parts additionally or exclusively bearing a second identification.
  • first or first markings and the second markings are in a predetermined relationship to one another, so that by checking the first and second markings, conclusions can be drawn about the togetherness and, if appropriate, the authenticity of the product.
  • the system can also consist of several products or a product of several individual parts and a data carrier assigned to these products, the products or the individual parts of the one product each being provided with a first identification and the data carrier bearing a second identification.
  • the first and second identification have a predetermined relationship to one another, so that by checking the first and second identification, conclusions can be drawn about the belonging together and, if appropriate, the authenticity of the products or individual parts.
  • the product security system according to the invention has the advantage that very simple, inexpensive methods can be used for the production of the first and second labeling, since the security aspect lies in the correlation between the two labels. The given relationship should therefore be as difficult to understand as possible and not recognizable to counterfeiters.
  • the second identification is therefore preferably calculated using cryptographic methods from the first identification or parts of the first identification.
  • the security of the Systems can be further enhanced by using cryptographic techniques that use secret keys that are not known to the general public. Additional information can also be taken into account when calculating the second identification.
  • date information and / or information relating to the manufacturing site of the product in question can be taken into account when calculating the second identification. In this way, the age and / or the origin of the product can be safely monitored at the same time during the completeness check. Taking this additional information into account also increases the security against counterfeiting.
  • the expiry date or the date information can also directly represent the first label.
  • the type or method with which the marking is generated can contribute to the security of the system. Because the more inconspicuous the labeling, ie the more difficult it is to identify the labeling as such, the less there is a risk that a potential counterfeiter will try to imitate the labeling.
  • the first label therefore forms an individual parameter inherent in the product. This means that a special, characteristic parameter of the product itself, such as a specific pressure tolerance, a specific dimension or a specific physical, chemical or optical property, is determined and used as the first identifier for the calculation of the second identifier. If the product is, for example, a paper product, the cloudiness of the paper can be evaluated at a specific point and used as an individual parameter. The evaluation of angular relationships between Print images or markers positioned at random to one another are possible.
  • the second identification can be applied to the packaging in such a way that it is not visually recognizable, e.g. by printing it on using a visually invisible luminescent substance or recording it in a storage medium provided on or in the packaging.
  • first and second labeling are described below.
  • the type of labeling that is sensibly used in an individual case depends on the goods to be secured and the desired security standard.
  • the first marking does not consist of an individual parameter of the product and is additionally applied to the product, it can be provided as plain text information or in the form of a coding, such as a binary coding, a one- or two-dimensional bar code or another, under certain circumstances random geometric pattern. It can represent a serial number, the date of manufacture or expiry of a product, a random number, pseudo-random number or other information.
  • the label can also be defined at a specific point on the product or, possibly under several circumstances, distributed randomly on the product. The application of a magnetic strip is also conceivable.
  • the first identification can be printed using any printing method, with certain printing methods having a higher level of counterfeiting offer security, such as intaglio printing, which creates a tangible, relief-like print image.
  • printing inks also influences the degree of protection against forgery of the marking.
  • feature substances with at least one special visual and / or machine-checkable physical property can be added to a printing ink.
  • These can be, for example, electrically conductive, magnetic, luminescent or optically variable properties such as those shown by liquid crystal pigments or interference layer pigments.
  • These can be luminescent substances that are both excitable and emit in the invisible spectral range.
  • the luminescent label In order to ensure that the luminescent label is as easy to read as possible, it may also be useful to underlay the background in the area of the label with a luminescent substance and to label the label itself with e.g. black, non-luminescent printing ink.
  • a luminescent substance e.g. black, non-luminescent printing ink.
  • the entire area is illuminated with excitation radiation. Since only the luminescent background that is not covered by the marking emits radiation, the marking emerges as dark information that strongly contrasts with the luminescent environment.
  • the marking can be created by punching, embossing or material removal.
  • the material can be removed by means of a laser, for example.
  • one or more layers of color can be arranged one above the other, which can be removed in a targeted manner, so that a single-color or multi-color identification that contrasts with the surroundings is created.
  • the laser can also be used to create hole coding or perforation.
  • the marking can be embedded in a perforated environment by varying the hole diameter and / or spacing as visually recognizable information.
  • the marking can also be shown by varying the hole shape or phase shift of two rows of holes.
  • a regular perforation can also be provided so that no visually recognizable information is created.
  • a certain parameter of the perforation e.g. the hole diameter and / or hole spacing.
  • the laser can also be used directly for labeling the product.
  • a laser for example a CO2 or Nd: Y AG laser
  • the laser beam is controlled electronically using suitable software.
  • the laser radiation creates an irreversible color change in the product.
  • the material usually blackens. If the product itself cannot be labeled or can only be inadequately inscribed with a laser, the product can be printed with at least in the area of the marking with a varnish which contains laser radiation absorbing additives which ensure that the varnish in the area of a blackening occurs. With a correspondingly high laser intensity, the product material is also blackened, so that a manipulation attempt in the area of the paint or a scratching off of the paint can be easily recognized.
  • the marking can also be generated by means of optical diffraction structures.
  • special diffraction gratings or groups of diffraction gratings can serve as identification.
  • Certain parameters of a diffraction structure on the product, such as the grating spacing, can also serve as the first identifier.
  • the first label can also be composed of several individual labels which have been produced using various of the methods described above. In addition, other methods for generating identifications, which are not mentioned here, can also be used.
  • the second identification can also be generated according to one of the methods explained above in connection with the first identification.
  • the packaging material can be provided with a storage medium in which the second identification is stored. This can be, for example, a chip, a magnetic memory or an optical memory.
  • the first and second identification can also be applied to a label which is applied to the respective product and / or the respective packaging. It is also possible to prepare the first and second labeling on a transfer material. In this case, the labels are transferred from the carrier tape of the transfer material to the product or packaging. This procedure is Particularly useful if diffractive structures are used to generate the markings or parts of the markings.
  • the step of generating the first label is preferably integrated into the manufacturing process of the product.
  • a manufacturing stage is preferably selected in which a fixed assignment between the goods and the packaging is already possible, so that it is not necessary to read the first identification again later. This presupposes that the first identification can be called up in a corresponding data memory and stored in correlation to the product.
  • the packaging can also be provided with the second label before the final merging of goods and packaging, once it is clear which products are assigned to it.
  • the first labels must be read from the products and encrypted shortly before or already in the packaging.
  • the second label is then generated on the packaging.
  • the first label on the product is read.
  • a verification code is then calculated from the first identification using the same encryption method that was used to calculate the second identification, and this verification code code compared with the second identification that was also read. If the test code and the second identification match, it can be concluded from this that the correct number of authentic products is contained in the packaging.
  • the second label is decrypted and the test label obtained from it is compared with the associated first label on the respective products.
  • This procedure is used if a public key procedure is used to encrypt the first identifier. This is because a secret key known only to the issuing body is used for the process of encrypting the first identifier. A publicly known key can be used for the decryption. In this way, the secret key does not have to be communicated to the corresponding test centers.
  • an authenticity check of the product and the packaging can take place before or after the completeness check. If, for example, both the first and the second identification are shown by means of a luminescent substance, it can be determined in a first test step whether the product and the packaging show luminescence in the correct wavelength range. If not, the test can already be stopped at this point because the product or the packaging is a counterfeit. However, if the product and packaging show the correct luminescence, the information content of the first and second identification is determined and the corresponding relationship between the first and second identification is checked.
  • the principle of the invention is explained in more detail below with reference to the figure. It is pointed out that the figures are merely schematic representations which are neither true to scale nor claim to be complete.
  • FIGS. 1a and 1b Columns AI to Cl or A2 to D2 indicate the different labeling and packaging stages of different products, which are listed in lines Pl to P8.
  • the goods offered for sale can be divided into two categories.
  • first category individual products or several similar products combined into one sales unit are offered in one package as goods.
  • This category includes the designated Pl to P 4 and shown in Fig. La.
  • second category several different products are combined into a sales unit and possibly also offered as a product in packaging.
  • the products shown in FIG. 1b and designated P5 to P8 belong to this category.
  • the product 10 shown in the position P1 / AI bears a first identification 11 which is introduced directly into this product 10.
  • the first identification 11 consists of an individual characteristic variable derived from the product 10 itself or a separately applied identification.
  • the first identification 11 is encrypted using cryptographic methods and the resulting encoded information is applied as the second identification 12 to the packaging 13 belonging to the product 10.
  • the packaging 13 provided with the second identification is shown under position P1 / B1. Frequently, after the product 10 and packaging 13 have been brought together, several such goods are combined to form a larger packaging unit. In this case too, a relationship can be established between the individual packages 13 and the larger packaging unit 14.
  • the second markings 12 applied to the individual packagings 13 are read and second coded information is also calculated from these second markings 12 by means of cryptographic methods.
  • This second coded information is applied to the larger packaging unit 14 in the form of a third identification 15.
  • the size- right packaging unit 14 with the third identification 15 is shown under position Pl / Cl.
  • this type of correlation between a packaging unit and the next largest packaging unit can be repeated as often as desired, as indicated by the dashed arrow 16. It is also not necessary to follow the chain of labeling and packaging stages AI to C2 or A2 to D2 in the order shown. Depending on the application, individual stages of labeling and packaging can be omitted or skipped.
  • the labeling and packaging stages Bl and Cl are identical for the products shown in lines P2 to P4, so that only the products and labeling types shown under items P2 / AI to P4 / AI are explained in more detail below.
  • the item P2 / AI shows a plurality of individual products 17 of the same type, each of which has a first identification 18 introduced directly into the product. These products 17 form a sales unit and are jointly offered as goods for sale in a packaging 13 which bears the second identification 12 according to the invention.
  • the item P3 / AI also shows products 19 of the same type, which are combined to form a sales unit.
  • the products 19 themselves consist of several individual products, each of which has its own first identification 20, 21, 22. These first identifiers 20, 21, 22 can be different or identical and are encrypted according to the invention.
  • the encrypted information is applied to the packaging 13 as a second identification 12.
  • Position P4 / AI shows a number of similar products 24, which in turn have a number of individual products. In this case, however, only product 24 bears a first label 25, which can be different for each of the similar products 24.
  • the first labels 25, 26 and 27 represent thereby represents a type of group coding for the individual products contained in the products 24.
  • the first identifications 25, 26, 27 are encrypted and stored on the associated packaging 13 in the form of the second identification 12
  • Labeling systems shown, however, not similar products form one unit here, but several different products.
  • the labeling and packaging stages C2 and D2 correspond to the labeling and packaging stages designated m Bl and Cl in Fig. 1a. They are therefore not discussed in more detail below
  • step B2 is inserted between steps A2 and C2.
  • This step B2 does not represent a real packaging step and is therefore explicitly shown as a further possible application of the principle according to the invention.
  • the packaging is after transport or at the latest when it is used of the product removed from the product.
  • the label carriers shown in column B2 on the other hand, remain connected to the product throughout the life of the product and thus ensure that their togetherness and completeness can be checked at any time, even while using the products.
  • the products 34, 35, 36, 37 shown under item P6 / A2 form a product.
  • Products 34, 35, 36, 37 form individual parts of an overall system, products 34, 35, 36, 37 being able to functionally interact and product 37 including individual parts 34, 35, 36, for example.
  • Only products 34, 35, 36 are provided with the same first identification 38.
  • the coded information is applied to the product 37 as a second identifier, as indicated under position P6 / B2.
  • the procedure for packaging already described can be applied with a corresponding assignment between the packaged product and packaging, as indicated under P6 / C2 and P6 / D2.
  • the individual parts can also bear individual first markings.
  • a number of products 40, 41, 42 of one product are also shown under position P7 / A2.
  • the products 40, 41 have an individual first identifier 43, 44.
  • the first identifiers 43, 44 are encrypted according to the invention and the encrypted information in the form of the second identifier 45 is applied to the product 42, which likewise belongs to the goods. This procedure is indicated under item P7 / B2.
  • a plurality of products 46, 47, 48 combined to form one good are again provided with an individual first identifier 49, 50, 51.
  • the encrypted first identifiers 49, 50, 51 are in this case stored on a data carrier 52 assigned to the products 46, 47, 48 in the form of a second Marking 53 provided.
  • the products 46, 47, 48 and the data carrier 52 can then be subjected to the packaging and allocation processes already described.
  • the data carrier 52 can be a certificate which, for example, verifies the authenticity of the products 46, 47, 48. To further increase counterfeit security, this certificate can consist of a security paper which has several security features, such as a security thread, watermark or the like. Alternatively, the data carrier can also be designed as an identification card which contains further information about the products 46, 47, 48.
  • FIG. 2a schematically shows an embodiment for the sequence of the labeling method according to the invention using the product 10 designated Pl in FIG. 1a.
  • the product 10 is provided with an additional first label.
  • a number sequence is generated in a number generator 60.
  • This sequence of digits is forwarded to a printing station 61, which prints the sequence of digits as the first identification 11 in plain text on the product 10.
  • the sequence of digits generated in the number generator 60 is passed on to a station 62, in which a coding is generated using mathematical algorithms and encryption methods. Under certain circumstances, this can be done using secret keys, which are provided by a protected central key generator 63.
  • the coding generated is also fed to a printing device 64, which prints the coding as a second identification 12 on the packaging 13.
  • an individual parameter of the product 10 is used as the first identifier.
  • a certain property of the product 10 is measured, which results from the manufacture of the product.
  • the example shown is an optically measurable property, such as the reflection properties or certain pressure tolerances.
  • the property can also consist in the distribution of certain additional elements introduced during the manufacture of the product.
  • the paper web can have fibers with luminescent properties, randomly distributed, in a certain area. The distribution of these fibers can be measured and used as an individual parameter.
  • the product 10 is irradiated with light from an illumination device 70.
  • the reflected radiation is detected via the measuring cell 71 and passed on to the evaluation unit 72.
  • the characteristic variable is determined there, which is then passed on to the encryption unit 73.
  • a coding is also calculated in this station 73, possibly using keys of a key generator 74. This is sent to a printing station 75, which prints the second identification 12 on the associated packaging 13.
  • the encryption units 62, 73 can also be supplied with further information, such as the date, manufacturer, etc., which are encrypted together with the first identification.
  • a public key method is preferably used for the encryption.
  • Example 1 (Pl, Fig. 3)
  • the product 10, designated Pl and shown under position Pl / AI can be, for example, a gold bar, as shown in FIG. 3. Such gold bars can be bought in different weight classes at appropriate places.
  • the first marking 11 introduced into the gold bar can, for example, be engraved.
  • the gold bar is presented in a packaging, for example a box, which bears the second identification 12.
  • the relationship between the gold bar and the packaging can be checked via the predetermined relationship between the first marking 11 on the gold bar and the second marking 12 on the packaging. If the gold bar and packaging belong together, this can be seen as an indication that the gold bar is a real product.
  • FIG. 4 shows the mouthpiece of a cigarette which is provided with a perforation which forms the first identification 18.
  • This perforation is provided in a ring in the entire circumference of the mouthpiece and is preferably produced with the aid of a laser.
  • the first identification 18 results from the arrangement of the perforation holes. If the presence of a hole is evaluated as a logical "1" and the absence of a logical "0", then a coding can be generated via the special arrangement of the holes, which coding is the first identifier forms. This is encrypted according to the invention and recorded as a second identifier, for example on a magnetic strip provided on the cigarette box.
  • the two rows of holes arranged in a ring are offset somewhat from one another so that the holes are not arranged exactly one above the other. This offset can also be used as the first identifier.
  • Cigarettes often have a perforation that consists only of a series of equally spaced and ring-shaped holes.
  • the air permeability of the cigarette can be adjusted via this perforation.
  • the hole diameter or the hole spacing can be used as the first identification.
  • certain holes can have a different outline shape, e.g. oblong, or another hole diameter can be given, a parameter of this particular hole shape can serve as the first identifier.
  • FIG. 5 shows an example of a product 19 according to the position P3 / AI in FIG. Fig. 5 shows a medicament packaging in supervision, how it is often used for tablets.
  • It consists of several individual chambers 81, each of which contains a tablet.
  • the individual chambers 81 each have an all-round edge weld, by means of which the chambers are hermetically sealed.
  • a perforation 80 is located within the edge weld between two chambers.
  • the individual chambers 81 can be easily separated from one another along this perforation 80.
  • Each of the chambers 81 is provided with a first individual identification 20, 21, 23. This can be a random number or a serial number.
  • first markings 20, 21, 22 can be printed, for example, with a luminescent printing ink.
  • a luminescent substance which is transparent in the visible spectral range is preferably used, which can be excited by means of invisible radiation and, for example, also emits in the invisible spectral range.
  • the ink can also be mixed with appropriate color pigments that are transparent in the spectral range of the excitation and emission wavelengths.
  • medication strips 19 usually form a sales unit.
  • the desired number of medication strips 19 is summarized as goods in a sales packaging, as shown under position P3 / B1.
  • Fig. 6 shows another very frequently used dosage form for tablets. It corresponds to a product 24 according to position P4 / AI in Fig. La. This is a so-called "blister pack".
  • One of the Like blister pack 24 consists of a stable plastic layer that is drawn deep during its manufacture, so that chambers 85 are formed at regular intervals. A tablet is filled into each of the chambers 85. The flat surface of the plastic layer is then laminated with a thin metal foil. Only in the area of the chambers 85 is there no connection between the plastic layer and the metal foil. In this area, the tablets can be pressed out of the chambers 85.
  • This blister pack 24 is additionally provided with a first identification 25 in the form of a sequence of digits. This is preferably produced by removing the metal layer in the form of the marking 25. Since transparent plastics are usually used for blister packs, the marking 25 can be read very easily in transmission.
  • blister packs 24 of this type are combined in one sales pack. Since each of the blister packs 24 bears an individual sequence of digits 25, all the first identifiers provided on the blister packs 24 belonging to a sales unit are taken into account when calculating the second identifier intended for the pack.
  • Another example are technical devices, which usually consist of several individual parts and which are often packed in their individual parts for transport and delivered to the customer.
  • the individual parts correspond to products 28, 29, 30 and these individual components of the device are directly provided with an individual first identification.
  • these first labels are cryptographically encrypted and the coding is then applied as a second label in the sense of the invention to the associated packaging of the device.
  • each gear has the first identification and the watch case the second Label carries.
  • the gears of the watch correspond to products 34, 35, 36 shown in position P6 / A2 in FIG. 1b and the watch case corresponds to product 37.
  • the predefined relationship between the first and second identification now enables a check of the relationship between the individual components and the associated housing.
  • the entire housing provided with the second identification can, of course, be combined according to the invention with a packaging likewise labeled according to the invention.
  • the products 40, 41, 42 shown under position P7 / A2 can form, for example, the functionally interacting individual parts of a production machine. All individual parts, with the exception of one, are each provided with an individual first identification. The coded second identification is applied to the unmarked individual part of the machine.
  • An example of the product P8 is a work of art consisting of several components.
  • a valuable painting with a frame for example, it can make sense to individually label the work of art and the frame, and to combine and encrypt these first labels with one another in order to store a second label on the associated certificate of authenticity. It can be used to check whether the certificate of authenticity, the frame and the picture actually belong together. Furthermore, it can be concluded from the togetherness that this is an authentic work of art.
  • Bottles or other containers which contain the actual goods to be secured but are difficult to label, such as e.g. Liquids, blood preserves, cream products etc.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)

Abstract

L'invention concerne un système permettant de vérifier l'authenticité et/ou la complétude de marchandises composées d'au moins un produit (10) et d'un emballage (13) associé. Le produit porte une première identification (11) et l'emballage (13) une deuxième identification (12). La première et la deuxième identification ont une relation telle que le contrôle de la première et de la deuxième identification permet de tirer des conclusions sur l'appartenance et éventuellement sur l'authenticité du produit (10) et de l'emballage (13).
PCT/EP2000/008135 1999-08-25 2000-08-21 Procede de garantie produit WO2001015097A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP00958478A EP1218857A1 (fr) 1999-08-25 2000-08-21 Procede de garantie produit
AU69978/00A AU6997800A (en) 1999-08-25 2000-08-21 Method for product assurance

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE19940359 1999-08-25
DE19940359.7 1999-08-25
DE10019721.3 2000-04-20
DE10019721A DE10019721A1 (de) 1999-08-25 2000-04-20 Verfahren zur Produktsicherung

Publications (1)

Publication Number Publication Date
WO2001015097A1 true WO2001015097A1 (fr) 2001-03-01

Family

ID=26005405

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2000/008135 WO2001015097A1 (fr) 1999-08-25 2000-08-21 Procede de garantie produit

Country Status (3)

Country Link
EP (1) EP1218857A1 (fr)
AU (1) AU6997800A (fr)
WO (1) WO2001015097A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002013150A1 (fr) * 2000-08-04 2002-02-14 De La Rue International Limited Système et procédés de surveillance d'articles
EP1250261A1 (fr) 2000-01-28 2002-10-23 Hauni Maschinenbau AG Procede et dispositif pour marquer des elements d'emballage d'un emballage
WO2003036556A2 (fr) * 2001-10-25 2003-05-01 Koninklijke Philips Electronics N.V. Procede et systeme d'authentification d'un produit emballe
EP1561198A1 (fr) 2002-11-12 2005-08-10 Hauni Maschinenbau AG Objet dote d'un systeme de caracterisation individuel qui permet son identification, et procedes et dispositifs pour caracteriser et identifier des objets, notamment des emballages, des etiquettes ou analogues
WO2009004011A1 (fr) * 2007-07-05 2009-01-08 Scriba Nanotecnologie S.R.L. Système, procédé et marquage pour identifier et valider des éléments de produits individuels
DE102011122604B3 (de) * 2011-12-30 2013-01-24 Yavuz Demirörs Objektträger für Edelmetalle sowie Verfahren zum Authentifizieren des Objektträgers
EP2924916A1 (fr) * 2014-03-28 2015-09-30 Enceladus IP Holdings LLC Système de sécurité pour authentifier des entités numériques et ajouter des origines d'objet
US9619706B2 (en) 2014-03-28 2017-04-11 Enceladus Ip Holdings Llc Security scheme for authenticating object origins

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1980002757A1 (fr) * 1979-06-06 1980-12-11 H Winderlich Procede de protection de supports d'enregistrement du son et de leurs etiquettes et/ou emballages contre l'imitation
WO1982001778A1 (fr) * 1980-11-21 1982-05-27 Hermann Stockburger Procede et dispositif pour le marquage et/ou l'identification d'un support de donnees
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
WO1993022745A1 (fr) * 1992-05-06 1993-11-11 Cias, Inc. Detection de contrefaçons a l'aide de codes d'identification contenant des zones de chiffres aleatoires
DE4341880A1 (de) * 1993-12-08 1995-06-14 Dinkel Doris Kontrollsystem für Objekte und Verfahren zur Kontrolle von Objekten
EP0889448A2 (fr) * 1997-07-01 1999-01-07 Pitney Bowes Inc. Procédé pour empêcher la falsification d'articles de fabrication
WO1999004364A1 (fr) * 1997-07-21 1999-01-28 Assure Systems, Inc. Erification de l'authenticite d'articles au moyen de nombres aleatoires
WO2000023954A1 (fr) * 1998-10-17 2000-04-27 Nicholas Paul Elliott Procede de verification

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1980002757A1 (fr) * 1979-06-06 1980-12-11 H Winderlich Procede de protection de supports d'enregistrement du son et de leurs etiquettes et/ou emballages contre l'imitation
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
WO1982001778A1 (fr) * 1980-11-21 1982-05-27 Hermann Stockburger Procede et dispositif pour le marquage et/ou l'identification d'un support de donnees
WO1993022745A1 (fr) * 1992-05-06 1993-11-11 Cias, Inc. Detection de contrefaçons a l'aide de codes d'identification contenant des zones de chiffres aleatoires
DE4341880A1 (de) * 1993-12-08 1995-06-14 Dinkel Doris Kontrollsystem für Objekte und Verfahren zur Kontrolle von Objekten
EP0889448A2 (fr) * 1997-07-01 1999-01-07 Pitney Bowes Inc. Procédé pour empêcher la falsification d'articles de fabrication
WO1999004364A1 (fr) * 1997-07-21 1999-01-28 Assure Systems, Inc. Erification de l'authenticite d'articles au moyen de nombres aleatoires
WO2000023954A1 (fr) * 1998-10-17 2000-04-27 Nicholas Paul Elliott Procede de verification

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1250261A1 (fr) 2000-01-28 2002-10-23 Hauni Maschinenbau AG Procede et dispositif pour marquer des elements d'emballage d'un emballage
WO2002013150A1 (fr) * 2000-08-04 2002-02-14 De La Rue International Limited Système et procédés de surveillance d'articles
WO2003036556A2 (fr) * 2001-10-25 2003-05-01 Koninklijke Philips Electronics N.V. Procede et systeme d'authentification d'un produit emballe
WO2003036556A3 (fr) * 2001-10-25 2004-12-29 Koninkl Philips Electronics Nv Procede et systeme d'authentification d'un produit emballe
EP1561198A1 (fr) 2002-11-12 2005-08-10 Hauni Maschinenbau AG Objet dote d'un systeme de caracterisation individuel qui permet son identification, et procedes et dispositifs pour caracteriser et identifier des objets, notamment des emballages, des etiquettes ou analogues
WO2009004011A1 (fr) * 2007-07-05 2009-01-08 Scriba Nanotecnologie S.R.L. Système, procédé et marquage pour identifier et valider des éléments de produits individuels
DE102011122604B3 (de) * 2011-12-30 2013-01-24 Yavuz Demirörs Objektträger für Edelmetalle sowie Verfahren zum Authentifizieren des Objektträgers
EP2924916A1 (fr) * 2014-03-28 2015-09-30 Enceladus IP Holdings LLC Système de sécurité pour authentifier des entités numériques et ajouter des origines d'objet
US9619706B2 (en) 2014-03-28 2017-04-11 Enceladus Ip Holdings Llc Security scheme for authenticating object origins
US10320567B2 (en) 2014-03-28 2019-06-11 Signet Ip Holdings Llc Security scheme for authenticating object origins

Also Published As

Publication number Publication date
EP1218857A1 (fr) 2002-07-03
AU6997800A (en) 2001-03-19

Similar Documents

Publication Publication Date Title
DE10019721A1 (de) Verfahren zur Produktsicherung
EP1561198B1 (fr) Objet dote d'un systeme de caracterisation individuel qui permet son identification, et procedes et dispositifs pour caracteriser et identifier des objets, notamment des emballages, des etiquettes ou analogues
EP0998396B1 (fr) Document de securite
DE69721858T2 (de) Fälschungssichere Verpackung
EP1459266A2 (fr) Proc d pour prot ger l'authenticit de documents
DE102015207032A1 (de) System und Verfahren zur Kennzeichnung eines Produkts
EP2279083A2 (fr) Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat
CZ200353A3 (cs) Optická struktura
DE10047450A1 (de) Erzeugnis mit einem Sicherheitselement
WO2011006640A2 (fr) Élément de sécurité pour la caractérisation ou l'identification d'objets et d'êtres vivants
DE102006006323B4 (de) Mehrschichtkörper mit einer optisch maschinell lesbaren Kennung
EP1218857A1 (fr) Procede de garantie produit
EP1015253B1 (fr) Document de valeur et mode de fabrication
DE60217386T2 (de) Antifälschungsmassnahmen
EP2383705B1 (fr) Emballage sous blister protégé contre la falsification
WO2002095661A1 (fr) Procede de caracterisation de produits en vue de determiner leur authenticite
DE102017110892A1 (de) Verfahren zur Authentifizierung eines Gegenstands, insbesondere eines Sicherheitselements, sowie Sicherheitselement
DE60018457T2 (de) Verfahren und vorrichtung zur identifizierung verpackter gegenstände
WO2014124829A1 (fr) Objet doté d'éléments graphiques, ensemble d'objets, procédé de fabrication et procédé d'authentification
EP2849121B1 (fr) Identification d'emballage et procédé d'identification d'un emballage et de vérification d'un produit emballé
DE102008016435A1 (de) Haftetikett und Verfahren zum Kennzeichnen und zum Authentifizieren eines Gegenstandes mit Haftetiketten
DE19904282C2 (de) Informationsträger
EP0618084A1 (fr) Support de marques d'identification
DE10137695B4 (de) Verfahren und Vorrichtung zum Identifizieren eines Gegenstands innerhalb einer Mehrzahl von Gegenständen
DE102012010223A1 (de) Verfahren zum Kennzeichnen von Produkten

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2000958478

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2000958478

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWR Wipo information: refused in national office

Ref document number: 2000958478

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2000958478

Country of ref document: EP