WO2003058520A1 - Personne en charge d'ecritures, lecteur et procede d'analyse - Google Patents
Personne en charge d'ecritures, lecteur et procede d'analyse Download PDFInfo
- Publication number
- WO2003058520A1 WO2003058520A1 PCT/JP2002/010443 JP0210443W WO03058520A1 WO 2003058520 A1 WO2003058520 A1 WO 2003058520A1 JP 0210443 W JP0210443 W JP 0210443W WO 03058520 A1 WO03058520 A1 WO 03058520A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tag
- information
- writing
- unit
- product
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000012216 screening Methods 0.000 claims description 3
- 230000015654 memory Effects 0.000 description 15
- 230000008676 import Effects 0.000 description 14
- 238000004891 communication Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000032258 transport Effects 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009499 grossing Methods 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 239000000123 paper Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the present invention relates to a writing device, a reading device, and an examination method that can determine the authenticity of a brand product in customs clearance procedures, and can achieve uniform and quick customs clearance procedures.
- Customs Law stipulates that importers and exporters must declare their luggage to customs, etc., and obtain permission for import and export. By going through these customs procedures, you can import and export your luggage.
- the staff examines whether the cargo to be imported / exported matches the contents declared in advance, and based on the examination result, whether to permit the import / export of the baggage. to decide.
- the package is required to be approved or approved by other laws and regulations, such as the Food Sanitation Law, it is checked whether legitimate procedures have been taken.
- the package concerned is one whose import / export is regulated by the Customs Law or other laws and regulations.
- One of the illegal imports and exports is the so-called fake branded goods.
- a fake brand product is a product made by imitating and imitating a trademark, design, or mark.
- the import and export of such fake branded products are also suspended.
- a customs official or the like checks the package visually and determines the authenticity.
- import / export may be permitted as genuine products even if they are fake brand products.
- Bill of lading (B, L) Is required). If clearance is granted by a clerk during customs clearance at the time of export, the package will be loaded into Container and the container will be sealed with a seal. Such containers are transported to the ship and transported by ship to the destination landing port.
- the BZL includes the BZL number that uniquely identifies the B / L, the name of the shipping company in charge of the transportation, the quantity of the package, etc., and the container number of the container that loaded the package, and the container was sealed. The seal number and the like of the seal are described.
- customs clearance procedures are time-consuming because many decisions are made based on information written on paper or the like and necessary processing is performed, resulting in a problem that costs are increased.
- the present invention has been made in view of such circumstances, and aims to speed up customs clearance procedures, including authenticity determination of branded goods, and as a result, reduce labor costs and reduce costs by reducing the number of palaces. It is intended to provide a device, a reading device, and an examination method.
- the present invention has been made to achieve the above object, and the present invention is to provide a customs clearance procedure for determining the authenticity of a product provided with an ID tag capable of writing and reading data without contact.
- a writing unit that writes a company code of a company that manufactures or sells the product into the ID tag.
- an encryption unit for encrypting the business code with an encryption key for encrypting data is further provided, and the writing unit stores the encrypted business code in the ID tag. You may write it.
- the present invention is a writing device which is an ID tag capable of writing and reading data in a contactless manner and writes information to an ID tag attached to a product in a customs clearance procedure, wherein the writing device is A writing unit for writing a declaration number uniquely identifying a declaration required for customs clearance in the ID tag. Further, in the above invention, the writing unit of the writing device may further write a part or all of the information described in the report to the ID tag. In the above invention, a part or all of a business code of a business that manufactures or sells the product, the declaration number, and a part or all of information described in the declaration is included in data. And an encryption unit that obtains encrypted information by encrypting the encrypted information with an encryption key that encrypts the encrypted information. The writing unit may write the encrypted information to the ID tag.
- the present invention is an ID tag capable of writing and reading data in a non-contact manner in a customs clearance procedure, wherein the reading apparatus reads information in the ID tag attached to the product, Comparing the information read from the ID tag with the company code stored in the storage unit, which stores the company code of the company that manufactures or sells the product in advance, and determines whether they match. And an output unit that outputs the result of the determination.
- the storage unit further stores a decryption key corresponding to an encryption key obtained by encrypting data stored in the ID tag, and reads the decryption key from the ID tag using the decryption key.
- a decoding unit that decodes information to obtain decoding information, wherein the determination unit compares the decoding information with a company code stored in the storage unit and determines whether or not they match. The determination may be made.
- the determination unit compares a part of the decryption information with a company code stored in the storage unit to determine whether they match
- the output unit includes: The decoding information of the other part compared by the determination unit may be output.
- the present invention is a screening method for judging the authenticity of a product provided with an electronic device capable of writing and reading data in a non-contact manner in a customs clearance procedure, wherein the company manufactures or sells the product.
- the examination device Storing the information, the examination device comparing the information read from the electronic device with the stored business code, and determining whether or not they match, the examination device performs the determination. And outputting the result.
- the writing device, the reading device, and the examination method according to the present invention it is possible to determine the authenticity of a branded product at the time of customs clearance without manual operation, and it is possible to perform an artificial authentication determination error. Avoidance, speed up customs clearance procedures, and reduce labor costs.
- customs clearance procedures can be speeded up and costs can be reduced by making it paperless.
- the information attached to the package is encrypted, the information can be read out only by a specific device having a decryption key corresponding to the encrypted key, and the information can be leaked to a malicious third party. Can be prevented.
- FIG. 1 is a diagram illustrating an outline of an embodiment of the present invention.
- FIG. 2 is a diagram illustrating the configuration of an ID tag in the embodiment.
- FIG. 3 is a diagram illustrating a configuration of a writing device in the embodiment.
- FIG. 4 is a diagram illustrating the configuration of the examination device in the embodiment.
- FIG. 5 is a diagram for explaining the operation in the embodiment.
- FIG. 6 is a diagram showing an example of information stored in the storage unit of the writing device of the business operator in the embodiment.
- FIG. 7 is a diagram showing an example of information stored in the storage unit of the examination device used in the customs clearance procedure at the time of traveling out in the same embodiment.
- FIG. 8 is a diagram showing an example of information stored in the storage unit of the writing device used in the customs clearance procedure at the time of export in the embodiment.
- FIG. 9 is a diagram showing an example of information stored in the storage unit of the examination device used in the customs clearance procedure at the time of import in the embodiment.
- FIG. 1 is a diagram illustrating an outline of the present embodiment using RFID (Radio Frequency Identification) technology.
- RFID Radio Frequency Identification
- a company that manufactures or sells brand-name products applies the product to a cardboard box or a product itself.
- An ID (Identification) tag that stores a business code that uniquely identifies the business is attached, and the ID tag is read at the time of customs clearance, and compared with the business code stored in advance to identify the brand.
- the procedure at customs clearance is simplified.
- reference numeral 1 denotes an ID tag, which stores data.
- ID tag 1 is attached to a cardboard box packing a brand-name product.
- Reference numeral 2 denotes a writing device, which has a function of writing data into the ID tag 1.
- Reference numeral 3 denotes a screening device, which has a function of reading data in the ID tag 1 and further determining the authenticity of the brand product.
- the writing device 2 used by the business operator is the writing device 2a
- the writing device 2 used in the customs clearance procedure for export and the examination device 3 is the writing device 2b and the examination device 3b
- the import device Examination device 3 used in customs clearance procedures is also referred to as examination device 3c.
- a to () is added to each unit constituting each device described later to distinguish each unit of each device.
- reference numeral 11 denotes an antenna.
- Reference numeral 12 denotes a modulation / demodulation circuit.
- 13 is an MPU (Micro Processing Unit).
- 14 is a memory.
- 15 is a power storage unit.
- the ID tag 1 receives the radio wave (signal) transmitted from the writing device 2 or the examination device 3 by the antenna 11, converts the received analog signal into a digital signal by the modulation / demodulation circuit 12, and the MPU 13 stores the memory 1 Processing is performed using various data and the like stored in 4.
- a magnetic field is generated when the antenna 11 as a coil receives a radio wave transmitted from the writing device 2 or the examination device 3 or the like.
- the generated current is used, and in other cases, the power stored in the power storage unit 15 in advance is used.
- a rectifier and a smoothing circuit may be further provided in addition to the above configuration.
- the configuration of the ID tag is not limited to the configuration shown in FIG.
- the ID tag refers to an electronic device that includes at least an antenna and an arithmetic processing unit such as an MPU and a CPU (Central Processing Unit) and is capable of writing and reading data without contact.
- the configuration of the writing device 2 will be described with reference to FIG.
- reference numeral 21 denotes an antenna for communicating with the ID tag 1.
- 22 is a control unit, which controls the writing device 2.
- An encryption / decryption unit 23 encrypts or decrypts data using a key stored in the storage unit 25 or the like.
- the encryption and the decryption use the public key cryptosystem.
- Reference numeral 24 denotes an input / output device, which includes a liquid crystal display screen, speed, a numeric keypad, a keyboard, and the like.
- 25 is a storage unit.
- Reference numeral 26 denotes a communication interface for communicating with another system (not shown) by wire or wirelessly.
- 31 is an antenna for communicating with the ID tag 1.
- 3 2 is a control unit, which controls the examination device 3.
- Reference numeral 33 denotes a decryption unit that decrypts data using a key stored in the storage unit 36 or the like. Here, the encryption and decryption use the public key cryptosystem.
- Reference numeral 34 denotes a discriminating unit for discriminating whether or not the branded product packed in the cardboard box provided with the ID tag 1 is genuine.
- Reference numeral 35 denotes an input / output device, such as a liquid crystal display screen, speakers, numeric keys, and a keyboard.
- 36 is a storage unit.
- Reference numeral 37 denotes a communication interface for communicating with another system (not shown) by wire or wirelessly.
- This cardboard box is provided with an ID tag 1 in advance.
- the shipping person in charge of the business company specifies the type of the product packed in the cardboard box by using the input / output device 24a of the writing device 2a, and instructs writing to the 10 tag 1.
- the storage unit 25a of the writing device 2a uniquely identifies the company code, the product name of the product manufactured or sold by the company, and the product.
- Stores company information such as product code, key information such as secret key A, public key a corresponding to the secret key, and public key certificate of public key a.
- the company code is data for uniquely identifying the company that is the intellectual property right owner of the branded product.
- the product code is the type of product manufactured or sold by the business operator. This is data for uniquely identifying.
- the control unit 22a of the writing device 2a instructs the encryption / decryption unit 23a to perform encryption.
- Encryption The decryption unit 23a encrypts the operator code stored in the storage unit 25a using the secret key A stored in the storage unit 25a (Fig. 5 Step S 10). Further, the product code is encrypted using the secret key A stored in the storage unit 25a.
- the encryption procedure is not limited to this.For example, the hash value of the company code obtained in the procedure described in the public key certificate of the public key a contains the public key certificate of the public key a.
- the data to which the hash value of the product code obtained by the procedure described in this document is added may be encrypted with the secret key A.
- the encryption / decryption unit 23a transmits the encrypted data obtained by encrypting the company code and the product code to the control unit 22a.
- the control unit 22a transmits the encrypted data to the ID tag 1 via the antenna 21 (step S11 in FIG. 5).
- the ID tag 1 or the writing device 2a generates a one-time password that is valid only for one-time use using a pseudo-random number or the like, and determines whether the ID tag 1 is valid.
- an authentication procedure for determining whether or not the writing device 2a is valid may be included.
- the ID tag 1 receives the encrypted data and stores it in the memory 14 (step S12 in FIG. 5).
- the cardboard box packed with the product is shipped, and the customs clearance procedure at the time of export such as a port or off deck is carried out. It is transported to a place where it can be made.
- a customs official or the like who examines customs procedures at the time of export uses the examination device 3b to determine the authenticity of the brand product.
- the storage unit 36b of the examination device 3b stores business information such as business code, business name, product code, public key a, and public key certificate of public key a. Key information is stored. Such information is obtained in advance from a customs clearance system (not shown) or the like via the communication interface 37b.
- the clerk specified the exporter of the product using the input / output device 35b of the examination device 3b, or received the information via the communication interface 37b from a customs clearance system (not shown). Specify the company that manufactures or sells the product by information, etc., Instruct discrimination.
- the control unit 32b of the examination device 3b transmits a signal requesting transmission of the encrypted data to the ID tag 1 via the antenna 31b (step S13 in FIG. 5).
- the ID tag 1 reads the encrypted data obtained by encrypting the business code and the product code from the memory 14 and transmits the encrypted data to the examination device 3b (step S14 in FIG. 5).
- the ID tag 1 or the examination device 3b generates a one-time passcode that is valid for only one use using a pseudo-random number or the like, and determines whether the ID tag 1 is valid or not.
- Device 3b may include an authentication procedure to determine whether it is legitimate.
- the control unit 32b of the examination device 3b instructs the decryption unit 33b to decrypt.
- the decryption unit 33b reads the public key of the business operator designated as the clerk from the storage unit 36b, and decrypts the encrypted data using the read public key (step S15 in FIG. 5). ).
- the decrypted data that is the result of decrypting the encrypted data with the public key a is obtained.
- the control unit 32b instructs the determination unit 34b to make a determination.
- the discriminating unit 34 b reads out the company code and product code of the company specified by the staff from the storage unit 36.
- the decrypted data obtained by the decrypting unit 33b is compared with the read-out company code and product code, and it is determined whether or not they match (step S16 in FIG. 5).
- the judgment result is transmitted to the control unit 32b.
- the control unit 32b causes the input / output device 35b to output the result based on the determination result of the determination unit 34b (step S17 in FIG. 5). At this time, only information indicating whether or not the product in the cardboard box is genuine is output to the input / output device 35b.
- FIG. 8 shows an example of information stored in the storage section 25b of the writing device 2b.
- the storage unit 25b has Customs brokers who perform customs procedures, BZL numbers that uniquely identify B / Ls, names of shipping companies that carry the containers, shipping ports where the vessels loaded with the containers depart, landing ports, and containers Stores BZL information such as the container number to be identified, the seal number of the seal attached to the container, the name, the freight, the gross weight, the capacity, the number of packages, the shipping date, etc. of the package packed and transported in the carton. .
- the B / L information may be transmitted from a customs clearance system (not shown) or the like via a communication interface 26 b and may be acquired. It may be obtained by inputting using 4b.
- the storage unit 25b stores the operator's public key a, the operator key information such as the public key certificate of the public key, the shipping company's private key B, the public key b corresponding to the secret key B, Key information, such as a public key certificate of the public key b, is stored in advance.
- the control unit 22b of the writing device 2b transmits a signal requesting transmission of encrypted data to the ID tag 1 via the antenna 21b.
- the ID tag 1 reads the encrypted data obtained by encrypting the business code and the product code from the memory 14 and sends it to the writing device 2b.
- the control unit 22b of the writing device 2b instructs the encryption / decryption unit 23b to perform decryption.
- the encryption / decryption unit 23b recognizes the business name from the storage unit 25b, reads the public key a of the business from the storage unit 36b, and encrypts using the read public key a. Decrypt the data and obtain the business code and product code.
- the control unit 22b instructs the encryption / decryption unit 23b to perform encryption.
- the encryption-decryption unit 22b uses the private key B as the data obtained by adding the acquired company code to the acquired product code and the BZL information stored in the storage unit 25b. To obtain encrypted data.
- the control unit 22b transmits the obtained encrypted data to the ID tag 1 (step S19 in FIG. 5).
- the ID tag 1 or the writing device 2b generates a one-time password that is valid only for one-time use using a pseudo-random number or the like, and determines whether or not the ID tag 1 is valid.
- an authentication procedure for determining whether or not the writing device 2b is valid may be included.
- the ID tag 1 stores the received encrypted data in the memory 14 (step S20 in FIG. 5). At this time, add additional information so that the information stored by the T JP02 / 10443
- Vessels equipped with containers that store luggage such as cardboard boxes will depart the port after performing other procedures, etc., and head to the unloading port where the containers will be transported.
- the shipping company or customs broker transmits the information described in BZL to a computer or the like of the recipient of the package via a communication network such as the Internet.
- FIG. 9 shows an example of information stored in the storage unit 36c of the examination device 3c.
- the storage unit 36c stores the business information such as the business code, the business name, and the product code, and the public key a, the public key certificate of the public key a, the public key b, and the public key b. Key information such as a public key certificate is stored.
- the operator information and the key information may be information transmitted from a customs clearance system or the like (not shown) via the communication interface 37c, and a clerk may use the input / output device 35c. May be information obtained by inputting the information.
- the clerk uses the input / output device 35c of the examination device 3c to specify the company that exported the product, or to send information transmitted from a customs clearance system (not shown) via the communication interface 37c. Instruct the discrimination, for example, by identifying the business operator.
- the control unit 32c of the examination device 3c transmits a signal requesting transmission of the encrypted data of the company code and the product code to the ID tag 1 via the antenna 31c (Step S in FIG. 5). twenty one ).
- the ID tag 1 reads out the encrypted data obtained by encrypting the business code and the product code from the memory 14 and sends it to the examination device 3c (step S22 in FIG. 5).
- the ID tag 1 or the examination device 3c generates a one-time password that is valid only for one-time use using a pseudo-random number or the like, and whether the ID tag 1 is valid or not, or However, the examination device 3c may include an authentication procedure to determine whether or not it is valid.
- the control unit 32c of the examination device 3c instructs the decryption unit 33c to perform decryption.
- the decryption unit 33c reads the public key of the specified business entity from the storage unit 36c, and decrypts the encrypted data using the read public key (step S23 in FIG. 5). here, Obtain the decrypted data that is the result of decrypting the encrypted data with the public key a.
- the control unit 32c instructs the determination unit 34c to determine.
- the discriminating unit 34c reads out the company code and the product code of the specified company from the storage unit 36c.
- the decryption data acquired by the decryption unit 33c is compared with the business code and the product code, and it is determined whether or not they match (step S24 in FIG. 5). ).
- the judgment result is transmitted to the control unit 32c.
- the control unit 32c causes the input / output device 35c to output the result based on the determination result of the determination unit 34c (step S25 in FIG. 5). At this time, only information indicating whether or not the product in the cardboard box is genuine is output to the input / output device 35c.
- the clerk when the clerk wants to refer to the BZL information, the clerk specifies the shipping company that transported the branded product by using the input / output device 35c of the examination device 3c, and instructs the output of the BZL information.
- the control unit 32c of the examination device 3c transmits a signal to the ID tag 1 via the antenna 31c requesting transmission of the business code, the product code, and the encrypted data of the BL information. I do.
- the ID tag 1 Upon receiving the request signal, the ID tag 1 reads the encrypted data obtained by encrypting the business code, the product code, and the B / L information from the memory 14 and transmits the data to the examination device 3c (step S2 in FIG. 5). 6).
- the control unit 32c of the examination device 3c instructs the decryption unit 33c to perform decryption.
- the decryption unit 33c reads the public key of the shipping company designated by the clerk from the storage unit 36c, and decrypts the encrypted data using the read public key (step S2 in FIG. 5). 7).
- the decrypted data that is the result of decrypting the encrypted data using the public key b is obtained.
- the controller 32c causes the input / output device 35c to output the obtained decrypted data (step S28 in FIG. 5).
- the clerk determines whether to permit the import of the product based on the output results of the authenticity determination and other examination results, the contents of the declaration at the time of import, and the like.
- the package can be delivered to the recipient.
- the shipping company will notify the recipient that the package has arrived by telephone, e-mail or fax.
- the recipient prints the BZL information received by a personal computer or the like with a printer or the like and mails it, or sends it via a communication network such as the Internet. And send it to the shipping company.
- the shipping company passes the delivery order in exchange for the BZL information submitted by the recipient.
- the recipient can receive the transported cardboard boxes in exchange for the delivery instructions for the book to be delivered to the master of the ship that transported the package.
- the ID tag is given to the cardboard box in which the product is packed.However, the ID tag is not limited thereto. And so on.
- brand goods are subjected to authenticity determination.
- brand goods here are goods with trademarks registered or unregistered as industrial property rights, and are not necessarily manufactured by famous manufacturers. It does not indicate what has been done.
- the company code and the product code are respectively encrypted, but the present invention is not limited to this.
- the company code, product code, and B / L information are added, and this is encrypted, but this is not a limitation.
- the data obtained by adding the hash value of the product code to the business code may be encrypted, and the hash value of the data obtained by adding the product code to the business code may be encrypted.
- the data obtained by adding the product code to the company code and the BZL information may be encrypted.
- what is encrypted and what is encrypted is not limited in the present embodiment, and it is only necessary to be able to determine whether or not the decrypted data of the encrypted data matches the carrier code stored in advance. I wish I could encrypt it.
- only the carrier code may be encrypted, or only part of the B / L information may be encrypted.
- the writing device does not need to store all the B / L information in the ID tag, and may store only the BZL number or only a part of the BZL information in the ID tag.
- the B / L information is written by the shipping company employee or the like on the ID tag.
- the present invention is not limited to this.
- a part or all of the B / L information may be stored, or a customs broker performing a customs clearance procedure may store part or all of the B / L information.
- a part of the BZL information may be stored in the ID tag before a person in charge of customs or the like determines the authenticity.
- the information written on the BZL includes the customs broker that performs the customs clearance procedure, the BZL number that uniquely identifies the B / L, the name of the shipping company that transports the container, and the departure port of the ship equipped with the container. Departure port, landing port, container number that uniquely identifies the container, seal number of the seal attached to the container, product name of the package packed and transported in cardboard boxes, fare, gross weight, volume, number of packages, shipping It is not limited to the date and may include other information.
- the information described in the B / L including the BZL number is written to the ID tag.
- the information to be written is not limited to the information described in the BZL.
- an air waybill an import declaration, a purchase slip that shows the price and quantity of the cargo to be imported, a certificate showing that import / export is permitted by other laws and regulations, etc.
- the storage unit 25, the storage unit 36, and the memory 14 are non-volatile memories such as a hard disk device, a magneto-optical disk device, and a flash memory, and a storage medium such as a CD-ROM that can only be read.
- a volatile memory such as RAM (Random Access Memory), or a combination thereof.
- Each of the units shown in FIGS. 2, 3, and 4 may be realized by dedicated hardware, and each unit is configured by a memory and a CPU (Central Processing Unit).
- the function may be realized by loading a program for realizing the function into the memory and executing the program.
- a program for realizing the functions of the respective units in FIGS. 2, 3, and 4 is recorded on a computer-readable recording medium, and the program recorded on the recording medium is read into a computer system and executed. It may be realized by doing so.
- the “computer system” includes hardware such as OS and peripheral devices.
- computer system also includes a homepage providing environment (or display environment) if a WWW (World Wide Web) system is used.
- WWW World Wide Web
- computer readable—“ functional recording media ” refers to portable media such as flexible disks, magneto-optical disks, KOMS, and CD-ROMs, and storage devices such as hard disks built into computer systems. That means.
- combiner-readable recording medium refers to communication such as Internet-based communication lines such as the Internet [intermediate transmission lines for transmitting program V via a line.
- a short-term question such as the one that keeps the program dynamically, in which case it becomes a server / client:--Like the volatile memory inside the data system,--keeps the program for a certain period of time What you do is also included.
- the above-mentioned Zog gym may be used to indicate the-part of the above-mentioned function, and furthermore, the above-mentioned function is compared with the Z-pi gushim already recorded in the computer system.
- the embodiment of the present invention has been described above in detail with reference to 1. However, the present invention is not limited to this embodiment. The present invention also includes design changes that do not depart from the scope of the present invention. Possibility of industrial use
- the authenticity of a Zoland product at the time of m-fh can be determined without manual operation.
- all or part of the information written on the B / L may be attached to the exporter's package.
- to encrypt the information attached to the package return the key corresponding to the encrypted key. Information can be read out only by a specific device or the like having the above, and it is possible to prevent leakage of information to a malicious i3 person.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02806056A EP1460570A1 (en) | 2001-12-28 | 2002-10-08 | Writer, reader, and examining method |
US10/499,481 US20050068152A1 (en) | 2001-12-28 | 2002-10-08 | Writer, reader, and examining method |
AU2002367335A AU2002367335A1 (en) | 2001-12-28 | 2002-10-08 | Writer, reader, and examining method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001399578A JP2003196360A (ja) | 2001-12-28 | 2001-12-28 | 書き込み装置、読み取り装置、及び審査方法 |
JP2001-399578 | 2001-12-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003058520A1 true WO2003058520A1 (fr) | 2003-07-17 |
Family
ID=19189496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/010443 WO2003058520A1 (fr) | 2001-12-28 | 2002-10-08 | Personne en charge d'ecritures, lecteur et procede d'analyse |
Country Status (5)
Country | Link |
---|---|
US (1) | US20050068152A1 (ja) |
EP (1) | EP1460570A1 (ja) |
JP (1) | JP2003196360A (ja) |
AU (1) | AU2002367335A1 (ja) |
WO (1) | WO2003058520A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
TWI277006B (en) * | 2002-10-04 | 2007-03-21 | Hon Hai Prec Ind Co Ltd | Shipment management system and method |
US8710990B2 (en) * | 2003-04-09 | 2014-04-29 | Visible Assets, Inc. | Visibility radio cap and network |
KR100877943B1 (ko) | 2003-10-06 | 2009-01-12 | 인터내셔널 비지네스 머신즈 코포레이션 | 컨테이너 선적 프로세스의 보안 관련 태양들을 문서화하는방법 및 시스템 |
GB2426365A (en) * | 2004-03-10 | 2006-11-22 | Advanced Analysis And Integrat | A microcircuit for product authentication in which an identifier and a count of the number of times the circuit has been interrogated are stored. |
US20050258228A1 (en) * | 2004-05-20 | 2005-11-24 | Xerox Corporation | Control of programmable modules |
JP2006067160A (ja) | 2004-08-26 | 2006-03-09 | Fujitsu Ltd | 無線タグシステム、無線タグアクセス制御装置、無線タグアクセス制御方法、無線タグアクセス制御プログラム、及び無線タグ |
JP4604612B2 (ja) * | 2004-09-07 | 2011-01-05 | 日本電気株式会社 | Icタグ管理装置、それを含むロボットおよびicタグ管理方法 |
MX2007005616A (es) * | 2004-11-09 | 2007-11-21 | Neology Inc | Sistemas y metodos para rastrear recipientes. |
JP4550601B2 (ja) * | 2005-01-25 | 2010-09-22 | 株式会社トリニティーセキュリティーシステムズ | 認証装置、情報管理装置、idタグ、認証方法、および認証プログラム |
US7677461B2 (en) * | 2005-03-10 | 2010-03-16 | Mil. Digital Labeling Inc. | Digital labels for product authentication |
US7647499B2 (en) * | 2005-03-24 | 2010-01-12 | Avaya Inc | Apparatus and method for ownership verification |
JP2007026844A (ja) * | 2005-07-15 | 2007-02-01 | Matsushita Electric Ind Co Ltd | 電池 |
JP4711124B2 (ja) * | 2005-08-31 | 2011-06-29 | ブラザー工業株式会社 | 無線タグ回路素子、タグラベル作成装置、及び無線タグ情報読み取り装置 |
US8441342B2 (en) * | 2006-05-15 | 2013-05-14 | Nxp B.V. | Pseudo-random authentification code altering scheme for a transponder and a base station |
US7690559B2 (en) | 2006-05-24 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Self-referential integrity checking system and method |
EP2097867A4 (en) * | 2006-09-12 | 2012-01-11 | Intermec Ip Corp | SYSTEMS AND METHODS FOR RFID MONITORING |
JP5137422B2 (ja) * | 2007-03-02 | 2013-02-06 | 日本パレットレンタル株式会社 | 物流容器管理システム |
US7902964B2 (en) * | 2007-06-05 | 2011-03-08 | Xerox Corporation | Hybrid system option key |
US20090021347A1 (en) * | 2007-07-18 | 2009-01-22 | U.S. Security Associates, Inc. | Systems and methods for monitoring and actuating a vehicle gate |
DE102007034527B4 (de) * | 2007-07-24 | 2010-12-16 | Siemens Ag | Verfahren und System zur Kennzeichnung einer Ware als Originalware eines Warenherstellers |
US7895131B2 (en) * | 2008-01-04 | 2011-02-22 | Tracking Innovations, Inc. | Cargo tracking apparatus, system and method |
US7995196B1 (en) | 2008-04-23 | 2011-08-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8954742B2 (en) * | 2008-07-28 | 2015-02-10 | Wisekey S.A. | Method and apparatus for digital authentication of valuable goods |
US8447987B1 (en) | 2008-11-20 | 2013-05-21 | Katerina Polonsky | Authentication of brand name product ownership using public key cryptography |
JP2010239257A (ja) * | 2009-03-30 | 2010-10-21 | Nec Corp | 暗号タグ管理システム、情報端末、タグ情報の隠蔽方法およびプログラム |
DE102009039823A1 (de) * | 2009-09-02 | 2011-03-03 | Siemens Aktiengesellschaft | Verfahren zur Überprüfung einer Ware als Orginalware eines Warenherstellers |
US8548880B2 (en) | 2010-03-02 | 2013-10-01 | Sap Ag | Methods, apparatus, systems and computer readable mediums for use in association with determination of customs duties |
US8417646B2 (en) | 2010-03-02 | 2013-04-09 | Sap Ag | Methods, apparatus, systems and computer readable mediums for use in generating a customs export document |
KR101328731B1 (ko) | 2013-01-30 | 2013-11-20 | 에스케이플래닛 주식회사 | 영유아를 위한 인터랙션 서비스를 제공하는 장치 및 방법, 이를 이용한 시스템 |
WO2015053924A1 (en) * | 2013-10-10 | 2015-04-16 | Jvl Ventures, Llc | Systems, methods, and computer program products for storing and managing program data |
JP6047679B1 (ja) | 2016-05-23 | 2016-12-21 | 株式会社Acd | 商取引システム、管理サーバおよびプログラム |
US10640273B2 (en) * | 2018-05-29 | 2020-05-05 | International Business Machines Corporation | Authentication of packaged products |
US20220222618A1 (en) * | 2019-04-30 | 2022-07-14 | Traceback Pty Ltd | An inventory verification and tracking system |
KR102081906B1 (ko) | 2019-06-11 | 2020-02-26 | 김동현 | 상품 감정 서비스 제공장치 및 방법 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000011114A (ja) * | 1998-06-23 | 2000-01-14 | Hitachi Ltd | 製品認証システムおよびそれに用いる商品タグ |
WO2001056907A1 (fr) * | 2000-01-31 | 2001-08-09 | Ishikawajima-Harima Jukogyo Kabushiki Kaisha | Procede et dispositif pour la gestion de conteneurs |
JP2001328711A (ja) * | 2000-05-18 | 2001-11-27 | Ishikawajima Harima Heavy Ind Co Ltd | 商品の配送管理方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6624752B2 (en) * | 1999-11-15 | 2003-09-23 | Bluetags A/S | Object detection system |
WO2001080139A2 (en) * | 2000-04-17 | 2001-10-25 | International Paper | Tax stamp authentication and product control |
-
2001
- 2001-12-28 JP JP2001399578A patent/JP2003196360A/ja active Pending
-
2002
- 2002-10-08 AU AU2002367335A patent/AU2002367335A1/en not_active Abandoned
- 2002-10-08 US US10/499,481 patent/US20050068152A1/en not_active Abandoned
- 2002-10-08 WO PCT/JP2002/010443 patent/WO2003058520A1/ja not_active Application Discontinuation
- 2002-10-08 EP EP02806056A patent/EP1460570A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000011114A (ja) * | 1998-06-23 | 2000-01-14 | Hitachi Ltd | 製品認証システムおよびそれに用いる商品タグ |
WO2001056907A1 (fr) * | 2000-01-31 | 2001-08-09 | Ishikawajima-Harima Jukogyo Kabushiki Kaisha | Procede et dispositif pour la gestion de conteneurs |
JP2001328711A (ja) * | 2000-05-18 | 2001-11-27 | Ishikawajima Harima Heavy Ind Co Ltd | 商品の配送管理方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Also Published As
Publication number | Publication date |
---|---|
EP1460570A1 (en) | 2004-09-22 |
US20050068152A1 (en) | 2005-03-31 |
JP2003196360A (ja) | 2003-07-11 |
AU2002367335A1 (en) | 2003-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003058520A1 (fr) | Personne en charge d'ecritures, lecteur et procede d'analyse | |
EP1205405B1 (en) | Information recording medium and access device | |
ES2221710T3 (es) | Verificacion de autenticidad de articulos utilizando numeros aleatorios. | |
Karygiannis et al. | Guidelines for securing radio frequency identification (RFID) systems | |
US7415613B2 (en) | System and method for detecting alteration of objects | |
AU2014207456B2 (en) | Unauthorized product detection techniques | |
EP1609115B1 (en) | Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not | |
US20050275531A1 (en) | Methods and systems for verifying the position and status of hierarchically arranged objects | |
US20020004767A1 (en) | Identification code management method and management system | |
EP2471032A1 (en) | Trans-security components system and methods | |
JP2001307055A (ja) | 情報記憶媒体、非接触icタグ、アクセス装置、アクセスシステム、ライフサイクル管理システム、入出力方法及びアクセス方法 | |
CN105790956A (zh) | 使用端对端密码方案的产品认证 | |
KR20060119990A (ko) | 컨테이너 선적 프로세스의 보안 관련 태양들을 문서화하는방법 및 시스템 | |
US7860797B2 (en) | Method for documenting property or possession and transfer of property or possession of a merchandise | |
US20020034305A1 (en) | Method and system for issuing service and method and system for providing service | |
JP2000148950A (ja) | 非接触タグ及びこれを用いた偽造品判別システム | |
CN110503499B (zh) | 一种用于确认产品信息的方法及系统 | |
JPWO2005098696A1 (ja) | 偽装もしくは偽造商品の判別システム | |
JP2006161302A (ja) | 電子封印管理タグ、rfidカード、電子封印管理タグによる封印方法、rfidカードへの情報記録方法、電子封印管理タグによる封印用プログラム、rfidカードへの情報記録用プログラム、電子封印管理タグ利用輸送管理システム、rfidカード利用輸送管理システム | |
CN114616605A (zh) | 用于去除安全标签的方法和设备 | |
CN116596017B (zh) | 一种基于电子标签的防伪溯源系统及防伪方法 | |
JP2006273471A (ja) | 物品輸送管理システム、方法、端末、およびプログラム | |
JP2007164290A (ja) | 判定システム、生成装置、判定装置及び判定方法等 | |
JP2007008129A (ja) | 小荷物等の配達における個人情報の保護 | |
US20070132549A1 (en) | Method and device for verifying owner of article |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10499481 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20028259963 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002806056 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002806056 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2002806056 Country of ref document: EP |