WO2009081149A1 - Procédé et système d'authentification de la distribution de marchandises - Google Patents
Procédé et système d'authentification de la distribution de marchandises Download PDFInfo
- Publication number
- WO2009081149A1 WO2009081149A1 PCT/GB2008/004242 GB2008004242W WO2009081149A1 WO 2009081149 A1 WO2009081149 A1 WO 2009081149A1 GB 2008004242 W GB2008004242 W GB 2008004242W WO 2009081149 A1 WO2009081149 A1 WO 2009081149A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- recipient
- goods
- token
- identification token
- security code
- Prior art date
Links
- 238000012384 transportation and delivery Methods 0.000 title claims abstract description 69
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012795 verification Methods 0.000 claims abstract description 22
- 239000003814 drug Substances 0.000 claims description 14
- 229940079593 drug Drugs 0.000 claims description 10
- 238000004806 packaging method and process Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 2
- 238000009795 derivation Methods 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 15
- ATJFFYVFTNAWJD-UHFFFAOYSA-N Tin Chemical compound [Sn] ATJFFYVFTNAWJD-UHFFFAOYSA-N 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 239000011159 matrix material Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 238000002716 delivery method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004049 embossing Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 229940126532 prescription medicine Drugs 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/02—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
- G07F7/025—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
Definitions
- This invention relates to methods and systems for authenticating delivery of goods. It is particularly, but not exclusively, concerned with delivery of goods to the correct recipient.
- the recipient is required to sign for them to acknowledge receipt.
- This signature has little security value as the delivering party, which is often a contracted third party, has no mechanism for checking the authenticity of the signature.
- the signature provides little more than an indication that the goods were delivered by the delivery company to a party who purported to be the addressee ⁇
- Fraud with 'customer not present transactions' is endemic and is categorised as friendly fraud to distinguish it from the use of counterfeit credit cards which is also a significant problem.
- Friendly fraud exploits weaknesses in the security of the delivery chain and exists in a number of forms. These include the interception of goods by a person falsely claiming to be the intended recipient. Here the bogus recipient will claim to be the intended recipient and take delivery of the goods and sign for them if required. As the signature is not authenticated, the false identity will not be detected. Another example is claimed non-delivery of goods where the recipient maintains falsely that the goods were not delivered or that they were not the person who signed for the goods. In this latter case the supplier is obliged to re-send the goods.
- the present invention therefore aims to meet this need and to provide a method and system which can increase the security of goods deliveries and reduce losses due to fraud and which can easily be integrated into conventional modes of goods delivery.
- the invention provides a pair of tokens which link goods to a recipient.
- One of the tokens is a goods token and the other is a recipient token.
- data in the tokens is compared, preferably after some processing, to determine whether the tokens match. If there is a match, the delivery is authenticated.
- a pair of tokens is provided.
- a security code from one entity is encrypted into a token provided to a second entity.
- the relationship between the two entities is authenticated by recreation of the encrypted security code from a code provided by the first entity and a unique identifier contained in a first entity token.
- Embodiments of the invention have the advantage that fraud caused by interception of goods, or alleged non-receipt of goods can be reduced, thereby saving retailers significant amounts of money.
- the recipient enters a security code such as a PIN when ordering the goods.
- this security code is encrypted in the goods identification token as a value determined by hashing the security code with a unique identifier for the recipient i entification token.
- the encryption uses a public key related to a private key held at the token creation point and is used to encrypt data in the token pair.
- the recipient enters their security code into a PDA or other device which scans the goods identification token and the recipient identification token.
- the unique identifier is extracted from the recipient identification token and hashed with the security code using the same public key. This hashed value is then compared with the encrypted value of the security code held in the goods identification token.
- This preferred embodiment of the invention has the advantage that the comparison of the token pairs can take place remotely and be performed by a device that does not need to refer back to the system that generated the tokens. It can therefore be performed off-line. Because the security value is encrypted within the goods identification token there is no need to store security codes on the device.
- Figure 1 is an overview of the method and system embodying the invention
- Figure 2 is a similar view to figure 1 of an alternative embodiment of the invention
- Figure 3 is a schematic diagram showing the creation and authentication of a token
- Figure 4 is a flow chart showing steps performed in the authentication process.
- Figure 1 shows an on-line retailer 10 which takes orders from a customer 20. As well as details of the goods, the customer will supply payment details and a delivery address to the on-line retailer at 10.
- the goods are ordered on-line and communication between the retailer and customer is on-line but the invention may also be embodied in an off-line system such as a mail order system which the customer communicates with the retailer by telephone or mail, or where goods are to be collected from a pick up point or purchased for later collection.
- the on-line retailer On receipt of the customer order, the on-line retailer sends a communication to the customer, at 30, which confirms the order. This may be sent, for example, by fax or email. In the off-line example this may be by fax or mail or by text message. Details of the goods and the delivery address are then sent to a delivery company shown as logistics company 35 which is responsible for delivery of the goods to the customer at 40.
- logistics company 35 which is responsible for delivery of the goods to the customer at 40.
- the embodiment of the invention uses a token which is associated with the goods and which has two verification or authentication components. One relates to the identity of the goods or the package and the other relates to the identity of the recipient. On delivery, both identity components must be present for the delivery to be authenticated.
- the data checking service 40 communicates with verification databases 45.
- the data checking services also communicate with a token generation and storage provider 50 which is described in more detail below.
- This provider in response to an order notified by the on-line retailer, creates a dual identity for the order.
- this dual identity comprises a matched pair of secured digital tokens. Matched tokens are not necessarily identical but include at least some data that can be compared between tokens of the pair to verify that the tokens form a pair.
- the token provider returns a two part token, or two matched or linked tokens to the on-line retailer which sends one of the tokens to the customer with the order acknowledgement and sends the other to the logistics company to be associated with the goods.
- the token sent to the customer is a recipient identity token and the token sent to the logistics company is a goods identity token.
- the goods identity token is typically fixed to the goods or their packaging, for example by printing or embossing or by printing onto a label which is fixed to the goods or the packaging.
- both the recipient identity token and the goods identity token are encoded onto a glyph, this may be a data matrix or a PDF417 or other suitable bar code.
- the tokens may be encoded in RFID tags.
- the goods identity token are particularly suitable for the goods identity token as they allow a parcel to be tracked to a place where a data transaction takes place when the parcel passes a sensor.
- the despatcher has confirmation that, for example, the goods have left the despatch depot. It is unlikely that there is a RFID sensor at the point of delivery but the PDA used to read the recipient identification token can also be used to read the RFID tag.
- the different methods of encoding may be used for the two tokens of a token pair such that the customer ID token may be encoded in a PDF417 bar code, for example, and the goods identification token in an RFID tag.
- the two tokens must be matched for the delivery authentication process to begin. This may be done on-line or off-line.
- a PDA or similar device can scan the token as the goods and the token supplied to the customer and return the tokens on-line to the authentication server. If the tokens form a matched pair, the delivery can be authenticated. This may or may not require the recipient to input a security code such as a PIN as described below.
- the authenticationxan be performed-off-line by - the PDA. This is described below.
- the degree of identity required for there to be a match will vary depending on what additional data is carried by the tokens, but at least some part of the data in one token must be identical to data in the other token although in the preferred embodiment the match is achieved only after data is input from the recipient and some processing of the token data.
- the term matching indicates that the two tokens belong together.
- the customer may input a PIN (Personal Identification Number) during the online purchase process.
- PIN Personal Identification Number
- This PIN may be required as well as the recipient identity token for verification.
- Embodiments of the invention ensure that only the intended recipient of the goods, or a party trusted by them, may authenticate delivery as only they have the recipient identity token, and if applicable the PIN. This removes the risk of fraud both by customers alleging that they have not received goods when they have received them and also removes the risk of fraud by interception of goods by someone other than the intended recipient.
- the order identification carried in the goods identification token may be additional to an order identification used by the delivery company.
- the delivery company may adopt the order identification used in the token as its own order identification.
- the authentication of matched tokens may be time stamped and authentication details including the time stamp may be returned to the retailer for their records.
- the time stamp may further assist in restoring delivery queries from customers.
- Embodiments of the present invention reduce the attractiveness of using stolen identities or cards as the perpetrator of the fraud has to be present to take delivery of the goods and pTo ⁇ ide ⁇ th ⁇ encipienficientification ⁇ okenT ⁇ This ⁇ adds ⁇ another process which requires more time and so makes this type of crime less attractive.
- Figure 2 shows an alternative embodiment of the invention in which the goods are delivered by a secure delivery company. This embodiment is particularly suited to delivering high value goods, foreign exchange, bank notes, traveller cheques and the like.
- the goods to be delivered are foreign currency which is supplied from an on-line foreign exchange provider 110.
- This provider receives orders from customers 120, for example companies or individuals who order the currency via purchase interface screens 122 on their computer web browser.
- the customer may be given a choice or delivery methods for the currency. This example assumes that the customer selects secure delivery.
- the customer at 124, enters a PIN to further secure the identity.
- the on-line retailer passes the order details and the customer details, including the PIN, to the data checking service 130 which includes authentication server 135.
- the authentication server creates the token pair as in the previous example, a first token of the pair comprising a unique recipient identification token and the second token comprising a unique goods identification token.
- the encoding of the tokens onto a glyph such as a data matrix or PDF417 or an RFID tag takes place at the authentication server.
- the tokens may be valid for a single use only or for multiple instances of authentication. The latter enables a trusted recipient status who can re-use a recipient identification token for more than one delivery.
- a single recipient token may validate a batch of packages each of which carry a unique goods identification token.
- the authentication server as well as generating the tokens has reporting and auditing functions and stores the tokens for authentication and reconciliation.
- An example of a suitable system is disclosed in WO20.06/O.59124Jh.e_coOte_nis_ofj ⁇ reference.
- This publication entitled 'On-line generation and authentication of items' discloses a core system which generates tokens based on parameters supplied by an application specific wrapper which interfaces between the core and the application.
- the core also includes a store for generated tokens which is used for authentication. It will be appreciated that where authentication is performed on-line, the authentication server generates the unique identifiers and the tokens, holds the PINs or other security codes, and authenticates the goods identifications tokens to the recipient identification tokens.
- authentication is performed off-line by a remote device.
- the server is used to generate the identities and the tokens, to encrypt token data and to provide the appropriate public keys to the remote device to enable authentication, and to receive and store the results of authentications. This latter step is important as it enables the results of verifications / authentications to be tracked and details to be provided to the merchants.
- the pair of tokens generated by the authentication server is returned to the on-line provider which sends the recipient identification token to the customer with an invoice or a confirmation of the order, and the goods identification token to the secure delivery company who is responsible for delivery.
- the customer may print their token or store it in a PDA, mobile telephone or other communications device which can display for scanning the token encoded in its glyph.
- RFID tag may be applied as a secondary label in addition to the standard delivery label.
- the deliverer is provided with a PDA (Personal Digital Assistant).
- the PDA has authentication application software installed and is used to read both the goods glyph or tag and the customer glyph at the point of delivery.
- the recipient glyph is also scanned and the customer is required to input the PIN assigned to the transaction. If this is accepted the retrieved token can be verified at the token generation and storage process which must confirm both that the token is correct and that it is a matched pair with the package token. If this is so, the customer is authenticated and can receive the package.
- FIG. 3 illustrates the generation of the tokens in more detail.
- the tokens illustrated in this example are particularly suited to an off-line authentication and use a security code such as a PIN.
- the generic structure of the token is preferably of the form:
- 'Type' enables devices to recognise the token as either a recipient identification token or a goods identification token.
- TIN is a Token Identification Number and is a unique number assigned to each token and ensures that each token and each token pair can be uniquely validated.
- the TIN is unique for all tokens irrespective of type.
- the PIN flag is a single value indication as to whether a PIN is present on the recipient identification token and is set to zero if no PIN is present. Where PINs are used, the recipient identification token does not carry the PIN and so this flag is set to zero. The goods identification token does carry the PIN and this flag is set to 1.
- An example of the recipientidentification-token-(202)_and_the_goodsJdentificationJoken (204) is_sho_wn in Figure 3.
- the Payload may in some circumstances be omitted but is preferred to be an order reference number.
- the payload of the recipient identification token is just this reference whereas the payload of the Goods identification token is the order reference and the PIN.
- the security section of each token is a digital signature.
- the value is generated in the authentication server, as disclosed in WO2006/059124 referred to above, by generating a hash of the entire token data (preceding the security component) using a private key held at the authentication server. This enables a remote off-line handheld device to validate the contents of the tokens to ensure that they have not changed using the associated public key.
- the authentication of the public key is validated by a digital certificate stored on the PDA.
- the PIN stored on the goods identification token is an encrypted value which may be created by generating an encrypted hash of the TIN of the recipient token and the PIN value using the same public key as is used to validate the digital signature.
- the PIN cannot be decrypted by a third party as it is encrypted with the public key and can only be decrypted by the private key held at the authentication server.
- the TIN of the recipient identification token which is different from that of the goods identification token within which the encrypted PIN is stored. If a third party could read the goods identification token they would not have access to the customer ID token needed to obtain the TIN value.
- a recipient token may be used against a single goods identification token or multiple packages having the same order reference. In the latter case, each goods identification token may have a unique identifier and an identification of how many packages are in the order.
- the private keys used in the digital signature generation are stored at the token generation and storage process and the customer and goods identifications generated by the process are linked to customer verification data and purchase data received from the merchant.
- the PDA device has an authentication software application installed and is provided with the public keys and associated digital certificates. These may be distributed by a Certificate Authority such as WiseKey or Verisign Inc.
- the PDA scans each of the goods identification token and the recipient identification token at 300.
- the device checks the hash using the public key for each token and the digital certificate verifies that the public key is valid thus validating the contents of the tokens at 310.
- the software application recognises the token type from the Type information and retrieves the order references from both tokens to check that they match at 320.
- the customer is then prompted to enter a PIN at 330 and the PIN value entered is added to the unique reference number in the recipient token. .
- the encrypted PIN value is then recreated at 340 by adding the PIN to the recipient token TIN and hashing using the public key to produce an encrypted value at 350.
- the encrypted value is then compared to the value in the package token at 360. If the values are the same, the device displays a message that the delivery may proceed and the delivery is authenticated at 370. The customer is then required to re-enter their PIN at 380 to confirm receipt of the goods.
- the device can then communicate the delivery at 390 individually or as a batch back to the token generation and storage process.
- the receipt of authentication date by the authentication server is useful as it-allows-recor_ds_of authentications to be stored which can _be used . agajnst_ queries from customers, whether fraudulent or not. Moreover it provides an audit trail of the authentication process and can provide data regarding authentication back to the on- or off-line merchant who sold the goods, and to delivery companies.
- the application running on the PDA device may send further information about the verifications that have taken place.
- the PDA application may encrypt the PIN entered by the recipient using the public key and send it back to the token generation and storage process which can decrypt it with the private key and compare the PIN against the original PIN entered into the system at time of purchase. Where the PDA verifies on-line, this may be part of the authentication process. Where verification is off-line it may be used as an additional level of security as part of the audit of the off-line process and token transaction status update.
- the verification process in this embodiment is off-line; that is the PDA does not have to communicate with the authentication server to authenticate the matching pair of tokens. Moreover, the PDA does not need to have knowledge of the PINs as it compares an encrypted version of the PIN and order number with a previously stored encrypted value. It merely needs to have the public key.
- the embodiment described enables authentication of delivery of given goods to a designated recipient and relies on the use of a pair of linked tokens. This concept may be applied to other areas and various modifications to the embodiments described are possible. Broadly, the embodiment described may be used to authenticate the relationship between a first entity and a second entity.
- the first entity may be a person, group of people or a legal entity and the second entity may be goods, but could be a second person, group of people or legal entity.
- embodiments of the invention may be used for the collection of goods.
- a typical scenario is where a party has purchased goods from, for example, a department store and has to collect them.
- the goods will carry the goods identification token as before and the purchaser will receive the recipient identification token as before and will present this for scanning at the collection point.
- the two tokens are scanned as in the embodiment described and, if the tokens match, the goods are released.
- the token content may vary and the authentication may be performed on-line where the scanner is owned and used by the company selling the goods. Collection of goods may be viewed as an alternative type of delivery.
- the scanner is in possession of the customer, who subscribes to a verification service.
- an off-line verification such as is described with reference to Figure 3 is preferred.
- a further advantage of embodiments of the invention relates to hire purchase transactions. Many customers purchase goods on credit, entering into an agreement with the retailer to repay the loan over a prescribed period. The loan is underwritten by a loan company who will not release the value of the goods to the retailer until supplied with proof of delivery of the goods. This can lead to customers paying off loans for goods they did not receive, as the delivery was intercepted, or alleging non-receipt and refusing to pay off the loan.
- Embodiments of the invention provide non-repudiable proof of receipt which eliminates, or at least significantly mitigates these problems.
- the invention may be applied to other areas such as prescription medicines.
- the goods are the medicines to be dispensed and the recipient is the patient.
- This may be used to confirm that the correct patient is picking up a prescription but, advantageously, also to confirm that a patient is being given the correct drugs. This can be a significant issue within hospitals in particular.
- Embodiments of the invention can overcome this problem by incorporating into the payload a product identification of the type typically applied to pharmaceuticals on their packaging either as an alphanumeric code or within a bar code or other glyph.
- This identifier is encoded into the payload of both the goods identification token and the recipient identification token.
- the recipient identification token may form a part of the prescription given to the patient or may be sent directly to the patient for example by email or to a mobile telephone. This option is particularly advantageous for the delivery of drugs and medical equipment direct from the manufacturer to be patient which is desirable where the drugs or medical equipment is specifically tailored to a particular patient.
- the goods identification token which carries or links to the unique identification of the medication, such as that proposed by the FDA in the United Sates or EFPIA in Europe, may also be used as a means for indicating whether a patient has both received and is taking their prescribed medication.
- the token identifying the medication and the recipient identification token, identifying the patient may be sent by the patient, or their carer to the token generation and storage system where they can be monitored. This enables the status of adherence by the patient to their medication regime to be monitored. It will be appreciated that the tokens remain live and that each time medicine is taken, the patient can send the details back to the system.
- tokens may remain live after the original transaction has been completed.
- the payload of the tokens may include a product serial number or a link to a serial number held elsewhere.
Landscapes
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
L'invention concerne des marchandises commandées en ligne, ou à distance, qui reçoivent un jeton d'identification de marchandise qui contient un identifiant unique. Le destinataire des marchandises reçoit un jeton d'identification de destinataire qui comprend également une référence unique. Au point de livraison, les deux jetons sont scannés et la livraison est authentifiée seulement si les jetons forment une paire correspondante. Dans un mode de réalisation, le destinataire peut en outre sécuriser le processus de vérification à l'aide d'une valeur de code de sécurité qui peut être validée en ligne ou hors ligne.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0725148A GB2455812A (en) | 2007-12-21 | 2007-12-21 | Method and system for authenticating delivery of goods |
GB0725148.1 | 2007-12-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009081149A1 true WO2009081149A1 (fr) | 2009-07-02 |
Family
ID=39048692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2008/004242 WO2009081149A1 (fr) | 2007-12-21 | 2008-12-19 | Procédé et système d'authentification de la distribution de marchandises |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2455812A (fr) |
WO (1) | WO2009081149A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014078400A1 (fr) * | 2012-11-13 | 2014-05-22 | Tracelink, Inc. | Titres électroniques numériquement sécurisés pour des produits dans des chaînes logistiques |
WO2016029319A1 (fr) * | 2014-08-27 | 2016-03-03 | Samer Ziade | Systèmes et procédés permettant de faciliter la commande, le paiement et la livraison sécurisés de biens ou de services |
US11210623B2 (en) | 2013-05-01 | 2021-12-28 | Barclays Execution Services Limited | Authentication system for purchase delivery |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103703480B (zh) | 2011-03-24 | 2017-02-15 | 联邦快递服务公司 | 电子签收投递的包裹的系统和方法 |
CN110889659A (zh) | 2012-09-03 | 2020-03-17 | 手持产品公司 | 利用标记解码装置认证包裹收件人的方法及解码装置 |
US10275733B2 (en) * | 2014-08-15 | 2019-04-30 | Paypal, Inc. | Delivery confirmation using a wireless beacon |
US20170243315A1 (en) * | 2016-02-24 | 2017-08-24 | David Ellerstein | System for verifying a consumers biometric communication device through a digital wallet for the delivery of a product |
EP3499440A1 (fr) * | 2017-12-18 | 2019-06-19 | Mastercard International Incorporated | Authentification de marchandises |
EP3503001A1 (fr) | 2017-12-20 | 2019-06-26 | Mastercard International Incorporated | Authentification de marchandises |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030208406A1 (en) * | 2001-03-28 | 2003-11-06 | Okamoto Steve Atsushi | Method and apparatus for processing one or more value bearing instruments |
EP1521205A2 (fr) * | 2003-10-02 | 2005-04-06 | Neopost Industrie Sa | Authentification d'un objet |
WO2006059129A1 (fr) * | 2004-12-03 | 2006-06-08 | First Ondemand Ltd | Generation et verification en ligne de monnaie personnalisee |
WO2006059124A1 (fr) * | 2004-12-03 | 2006-06-08 | First Ondemand Ltd | Generation et authentification d'articles en ligne |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020111914A1 (en) * | 2000-08-31 | 2002-08-15 | Shuji Terada | Method for specifying product delivery destinations |
WO2002031629A2 (fr) * | 2000-10-11 | 2002-04-18 | Amerasia International Technology, Inc. | Procede et systeme de poursuite faisant appel a des etiquettes intelligentes multiples |
US7341186B2 (en) * | 2003-06-20 | 2008-03-11 | United Parcel Service Of America, Inc. | Proof of presence and confirmation of parcel delivery systems and methods |
-
2007
- 2007-12-21 GB GB0725148A patent/GB2455812A/en not_active Withdrawn
-
2008
- 2008-12-19 WO PCT/GB2008/004242 patent/WO2009081149A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030208406A1 (en) * | 2001-03-28 | 2003-11-06 | Okamoto Steve Atsushi | Method and apparatus for processing one or more value bearing instruments |
EP1521205A2 (fr) * | 2003-10-02 | 2005-04-06 | Neopost Industrie Sa | Authentification d'un objet |
WO2006059129A1 (fr) * | 2004-12-03 | 2006-06-08 | First Ondemand Ltd | Generation et verification en ligne de monnaie personnalisee |
WO2006059124A1 (fr) * | 2004-12-03 | 2006-06-08 | First Ondemand Ltd | Generation et authentification d'articles en ligne |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014078400A1 (fr) * | 2012-11-13 | 2014-05-22 | Tracelink, Inc. | Titres électroniques numériquement sécurisés pour des produits dans des chaînes logistiques |
KR20150084946A (ko) * | 2012-11-13 | 2015-07-22 | 트레이스링크, 인코퍼레이티드 | 공급 사슬들에서 제품들에 관해 디지털 방식으로 보안된 전자 타이틀들 |
JP2015537472A (ja) * | 2012-11-13 | 2015-12-24 | トレースリンク インコーポレイテッド | サプライ・チェーン製品用のデジタル的に保護された電子タイトル |
US9922329B2 (en) | 2012-11-13 | 2018-03-20 | Tracelink, Inc. | Digitally secured electronic titles for products in supply chains |
KR102008777B1 (ko) | 2012-11-13 | 2019-08-08 | 트레이스링크, 인코퍼레이티드 | 공급 체인들에서 제품들에 관해 디지털 방식으로 보안된 전자 타이틀들 |
US11210623B2 (en) | 2013-05-01 | 2021-12-28 | Barclays Execution Services Limited | Authentication system for purchase delivery |
WO2016029319A1 (fr) * | 2014-08-27 | 2016-03-03 | Samer Ziade | Systèmes et procédés permettant de faciliter la commande, le paiement et la livraison sécurisés de biens ou de services |
Also Published As
Publication number | Publication date |
---|---|
GB2455812A (en) | 2009-06-24 |
GB0725148D0 (en) | 2008-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7213748B2 (en) | Anonymous mailing and shipping transactions | |
US8111431B2 (en) | Printer for printing packaging | |
WO2009081149A1 (fr) | Procédé et système d'authentification de la distribution de marchandises | |
US20040260653A1 (en) | Anonymous transactions | |
CN101236677B (zh) | 一种商品防伪及防伪税控综合系统 | |
US20090293112A1 (en) | On-line generation and authentication of items | |
JP2002109409A (ja) | 電子商取引システムにおける電子商取引方法 | |
HU216671B (hu) | Üzletkötő rendszer, vevő és szolgáltató megbízott ügynöke, eljárás elektronikus jegy és pénz cseréjére, meghatalmazásalapú tranzakcióra, személyazonosság-alapú, pénzmodulos fizetésre | |
US20140094965A1 (en) | Method of dispensing a product item | |
CN104182866A (zh) | 适合于转手贸易等情况的产品或物品的防伪的系统及方法 | |
AU2005243108A1 (en) | Pharmaceutical product tracking | |
WO2005006155A2 (fr) | Systeme securise pour effectuer des transactions de service postal et procede d'utilisation correspondant |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08864880 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08864880 Country of ref document: EP Kind code of ref document: A1 |