WO2010037429A1 - Procédé de génération d’un code de vérification, code de vérification, procédé et dispositif de vérification de l’authenticité d’objets - Google Patents
Procédé de génération d’un code de vérification, code de vérification, procédé et dispositif de vérification de l’authenticité d’objets Download PDFInfo
- Publication number
- WO2010037429A1 WO2010037429A1 PCT/EP2008/065924 EP2008065924W WO2010037429A1 WO 2010037429 A1 WO2010037429 A1 WO 2010037429A1 EP 2008065924 W EP2008065924 W EP 2008065924W WO 2010037429 A1 WO2010037429 A1 WO 2010037429A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- random
- verification code
- string
- permutation
- generating
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
- G09C1/02—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
Definitions
- the invention relates to a method for generating a verification code for an article, a correspondingly produced verification code and a method and a device for verifying the authenticity of articles.
- Product piracy is a major problem in the manufacture and distribution of mass-produced goods, especially pharmaceuticals. Products that have a certain associated value are often copied and distributed by counterfeiters. These counterfeit products are then channeled into sales and distribution channels and offered to end-users or distributors. This violates trademark rights, competition regulations, copyrights, designs and patents.
- DE 698 24 291 T2 It is known (see DE 698 24 291 T2) to provide products with labels or labels containing a verification code. Reading devices or optical devices can be used to capture the verification code on a product and pass it on to a corresponding device that determines whether this is a valid verification code. DE 698 24 291 T2 provides for this, a combination code from a Random number and a non-random section, wherein the non-random section provides information about whether the object is real or fake.
- the specified procedure has some weaknesses. Thus, it is possible for counterfeiters who have spied the non-random portion of the combination code to label a plurality of counterfeit products as genuine.
- the verification codes must be part of or easily attachable to the product.
- the cost of equipping a product with a verification code must be very low for mass-produced products, as the
- the costs required for the equipment should amount to only a few euro cents.
- a corresponding system for the production and verification of such verification codes must be so flexible that, when a part of the system or the whole system becomes known, a change is possible at any time, which the information rendered useless or at least limits its economic value.
- verification codes are to be provided which enable secure and efficient authentication of objects. Furthermore, a corresponding verification code and a method as well as a device for verifying the authenticity of objects should be pointed out.
- the object is achieved by a method for generating a verification code for an object, the method comprising the following steps:
- this object is achieved by a method for generating a verification code for an object, the method comprising the following steps:
- the methods relate to various character strings. These are to be understood according to the invention not only as simple sequences of characters, but also as matrices comprising several of these character sequences.
- the mapping of the random string to a permutation string may include a permutation of the random string. However, any illustration is conceivable at this point.
- An essential idea of the present invention is to split the individual pieces of information necessary for generating a valid verification code and its verification into two parts and to keep these parts separate from one another. That a first part, e.g. the first random substring is affixed to the product or article while the second part, e.g. the second random substring, central, e.g. B. is stored on a database. Thus, it is only possible to generate a valid verification code when accessing the
- the assignment of a verification code on an object to a specific data record can be done via the identification number mentioned.
- the identification number can be dispensed with and a plurality of data records containing the second random string can be checked. In the latter case, it should be prevented that identical records are created in the database. In the present invention, it is thus true that the random character string, the mapping function and the permutation character string are closed
- the random string can be a binary string. In particular, it may be a matrix of binary characters generated at random.
- Step d) may include mapping the permutation string and / or the identification number and / or the first random string to a raster graphic having a plurality of pixels.
- raster graphics are known. They can be detected easily and quickly with appropriate reading devices or scanners. The production of corresponding raster graphics can be done using conventional printers or labellers. The cost of producing a label with corresponding raster graphics is very low.
- the mapping of the information elements used represents a first coding of the information that can not be readily decrypted. Thus, this is already a first security mechanism to see.
- the raster graphics may include a data area for representing the identification number, a plaintext area for representing the first random string, a permutation area for representing the permutation string, where the plaintext area may have n pixels and the permutation area may have 2 * n pixels.
- the random character string may be divided into two equal length random substrings, with a representation of the first random substring affixed to the article. Even with the evaluation of a large number of objects equipped with a verification code, it is therefore difficult or impossible to reconstruct the schema used when generating the random character strings for the individual objects.
- the data area, the plaintext area and the permutation area can be arranged in blocks, in particular in contiguous blocks.
- the individual information on a corresponding label can better capture. It is possible to assign a meaning to the individual pixels or pixels based on their position (row and column) within the raster graphics.
- the application of self-describing data is not necessary.
- the raster graphics can be designed to contain only the essential information. Already with a raster graphics with 20 * 20 pixels 2 400 bits can be coded. Thus, it is possible to use very long and secure random strings and identification numbers.
- the mapping function for an object may be selected from a variety of mapping functions, in particular randomly.
- mapping function there is no obvious systematics in the choice of mapping function that could be grasped and exploited based on the analysis of a variety of verification codes.
- the individual mapping functions are stored in the database.
- the step a) may comprise the generation of at least one random number by means of a non-deterministic random generator, in particular using a quantum random generator. It is known that even very sophisticated algorithms can only generate pseudorandom numbers. In order to increase the security of the verification code and to avoid exploitable systematics, non-deterministic random numbers are preferably used.
- the method may include corrupting the raster graphics by multiplying by a noise matrix, in particular random numbers.
- a noise matrix in particular random numbers.
- a plurality of requests from a plurality of different certification authorities in particular in a predetermined order may be necessary.
- appropriate certification bodies may be set up in product manufacturing, packaging and licensing of the product.
- the above object is also achieved by a verification code for an article produced according to the method described above.
- the object is achieved by a method for verifying the authenticity of objects, the method comprising the following steps:
- a verification code attached to the article and / or its packaging, in particular a verification code, generated according to claim 12, the verification code comprising a first permutation string and a first random substring;
- the steps b), c), d) and e) can be performed several times to determine the authenticity of the object. It is therefore possible to read out a large number of comparison data sets, to generate a multiplicity of output character strings, to map them using the associated mapping functions and thus to obtain a multiplicity of second permutation character strings.
- the item is considered true only if one of the plurality of second permutation strings matches the first permutation string on the item.
- the item may be deemed non-genuine if step e) has not been performed for any or a predetermined set of comparison records without a second permutation string matching the first permutation string being found.
- the object is achieved by a method for verifying the authenticity of objects, the method comprising the following steps:
- Step e) may include determining if the verification code has been activated, and only activating a verification code if the verification code has been certified by at least one certification authority.
- the mapping function can be a bijective mapping function, in particular a permutation. In a bijective mapping, any information contained in the random string is mapped to the permutation string. Thus, an encryption of the random string and a decryption of the permutation string are possible.
- a permutation is used as a map.
- an apparatus for verifying the authenticity of objects comprising:
- a generating device for generating a multiplicity of verification codes, in particular according to the method described above,
- a verification device for verifying at least one verification code, in particular according to the method described above,
- At least one database for storing random substrings and at least one mapping function for the verification codes.
- this device for verifying the authenticity of objects, this device comprising:
- a generating device for generating a multiplicity of verification codes, in particular according to the method described,
- a verification device for verifying at least one verification code, in particular according to the described method
- At least one database for storing random substrings, mapping functions and identification numbers for the verification codes.
- this device comprises a non-deterministic random number generator, in particular a quantum random generator for generating random numbers. This increases the security of the generated verification code.
- the device may comprise at least one reading device for detecting a raster graphic.
- the reading device can be designed such that it can deliberately filters out noise placed over the representation of the verification code.
- the reading device can also perform the task of reading the verification code from a raster graphic. Thus, the underlying information can be transmitted much more efficiently.
- the apparatus may include a monitoring device that monitors requests directed to the verification device and, after a critical request, alters at least a portion of a random substring and mapping function associated with a verification code, wherein upon the change, a verification code generated using the mapping function and the random characters remains identical. It is conceivable to equip the device with a request device which answers corresponding verification requests (is this a permitted verification code or not?). In order to prevent a spying out of the database, it is conceivable to change the data contained therein so that the requested information becomes useless after each request. It is possible to change mapping function and random substrings in the database such that an adaptation of the verification code on the objects is not necessary. Changes to the random substring are thus compensated by the change of the mapping function.
- the monitoring device can be configured such that it randomly classifies a request as critical and / or when fulfilling a predetermined criterion. It is thus possible to either make random changes to the data stored in the database or to provide algorithms that change the data at a necessary time.
- the monitoring device can be designed in such a way that, in the case of a critical query, a multiplicity of mapping functions and random symbols are changed. It would therefore be conceivable to change the entire database or only individual records in a critical request.
- the device may include an activation device that communicates with at least one certification authority that collects items that are equipped with the verification code, wherein the activation device does not activate a verification code until the associated item has been detected by the at least one certification authority. It is thus possible to follow the individual manufacturing and / or quality inspection and / or sales steps of an object. Just if a given sequence is followed, the printed verification code is activated and confirms the authenticity of the item.
- FIG. 1 shows a device according to the invention for verifying the authenticity of objects
- FIG. 5 shows a schematic extract from a database for verifying a verification code.
- an embodiment of the apparatus for verifying the authenticity of objects comprises a server 20 and a client 40 which communicate with each other via a network, in particular a WAN 1 (Wide Area Network) or LAN (Local Area Network).
- the server 20 includes a database 30 configured to store information. This information includes information related to an individual verification code.
- the client 40 has a reader 10 that allows it to scan and process a representation of a verification code. According to the invention, the verification code is located on a label 60, which is attached to a product 50 (see FIG. After acquiring the verification code by the reader 10, the client 40 sends a request to the server 20 to verify the authenticity of the product 50.
- the server 20 processes the request and determines by means of a predetermined algorithm, for example according to the method described below, whether the verification code and thus the product 50 with the verification code is authentic.
- the device according to FIG. 1 can comprise further clients 40, which likewise communicate with the server via the WAN 1.
- these clients 40 may comprise a printer device and be designed to produce corresponding labels 60.
- a corresponding printing device can be connected directly to the server 20.
- certification authorities can communicate with the server 20, which are similarly equipped as the client 40 shown. These certification authorities are geographically distributed at individual stations that pass through the designated product 50. By means of the certification authorities, it is logged that the product 50 has passed through a specific station. For example, a certification authority may document the manufacture of product 50. Another certification body covers the packaging of the product 50 and a third the shipment from a country of manufacture.
- the server 20 may process and store the information that the individual certification authorities forward to a product 50. It is possible to use the collected information in later verification of the authenticity of a product 50. For example, only the products 50 that have passed through predetermined stations can be considered genuine. Thus, the manufacturing and / or transportation and / or distribution history of a product 50 is detected and processed in the assessment of authenticity. It can be considered that fake products usually have a different history than an original product.
- the label 60 comprises a representation of the verification code. This representation is subdivided into three areas, namely a plaintext area 62, a data area 64 and a permutation area 66.
- the representation of the verification code according to the embodiment shown in FIG. 2 is a two-dimensional data matrix with the dimension 20 ⁇ 20 (20 columns by 20 lines). It is a raster graphic. The individual places of the
- the data area 64 comprises 10 ⁇ 10 pixels and is used to store an identification number ID of the product 50. Furthermore, this area can be used to store necessary open data, such as the company, the type of product, the series, or an expiration date. Furthermore, this area may contain a number that references a particular database used to verify the authenticity of the product.
- codes stored in the database are used to identify the companies, the products, the expiration date, the series or batch of a
- Identification number ID serves to reference a corresponding data record 31 in the database 30.
- the identification number ID thus establishes a relationship between a particular database entry and a particular verification code.
- the data area 64, plaintext area 62 and the permutation area 66 serve to verify the authenticity of the object.
- a random number ZZ is generated in a non-deterministic manner to generate this part of the verification code (compare FIG. 4).
- This random number of the present exemplary embodiment is a 200-bit long character string which, according to the invention, can be divided into a first random substring ZZ1 and a second random substring ZZ2.
- a permutation function p to the random character string ZZ, a permutation character string PZZ is obtained. While the permutation function p and the second random substring ZZ2 are stored in a data record 31 in the database 30 together with the identification number ID (see Fig.
- the first random substring ZZl and the permutation string PZZ are deposited in the plaintext area 62 and permutation area 66, respectively , Ie. the plaintext area 62 contains a graphic representation of the first random substring ZZ1, and the permutation area 66 contains a representation of the permutation string PZZ.
- the plaintext area 62 contains a graphic representation of the first random substring ZZ1
- the permutation area 66 contains a representation of the permutation string PZZ.
- the permutation function p is a permutation function p selected at random for the particular product 50 from a plurality of permutation functions.
- the associated data record for example the data record 31 of FIG. 5, is modified. That is, the second random substring ZZ2 and the Permutation function p are modified such that, although the same permutation string PZZ results, but the individual entries in the database 30 are changed. Thus, any insight gained from a previous query over a particular record becomes useless.
- a data record 31 of the database 30 further includes a column describing the status of a particular verification code.
- a verification code may be considered disabled until a particular status is reached.
- a certification authority enters a "1" in product manufacturing when the product 50 has been created, and a second certification authority at a packaging station adds a "2" when packaging the product 50.
- a third certification body completes the status by a "3" upon delivery of the product 50. Only after the entry of the code "1, 2, 3" the corresponding verification code is considered active. Thus, the history of a product 50 can be monitored. Because a change of status only by the individual
- both the label 60 and the associated data record 31 of the database 30 each contain an identification number ID which makes it possible to uniquely assign a corresponding data record 31 to a given product 50 or label 60.
- the record 31 does not need an ID column for storing the identification numbers ID in order to associate a product 50 and / or a label 60 with the record 31.
- the permutation function p and / or the random character string ZZ and / or the permutation character string PZZ such that there is only one suitable permutation character string PZZ for each random character string ZZ for a given permutation function p.
- the random substrings ZZ1, ZZ2 can also be designed such that only one pair of random substrings ZZ1, ZZ2 leads to a suitable random string ZZ.
- the label 60 contains only the first random partial character string ZZ1 and the permutation character string PZZ.
- This data is transmitted to the server 20 in a verification request.
- the server 20 searches all stored ones Data records 31 according to a data set 31 matching the given permutation string PZZ and the given first random substring ZZl.
- the server 20 may select a first data set 31 that respectively reads out the second random substring ZZ2 and a permutation function p. Thereafter, the given first random substring ZZl transmitted to the server 20 is connected to the read-out second random substring ZZ2 to generate a random string ZZ. As already described, the random character string ZZ is mapped by means of the read-out permutation function p and compared with the transmitted permutation character string PZZ. Only in the presence of the
- the server 20 transmits a message indicating that it is a valid verification code. Otherwise, the next record 31 is selected and read out. Insofar as the verification request is a "false" verification code, all data records 31 must be processed before a corresponding message can be returned.
- the representation of the verification code can be changed as desired. It is possible to choose a representation with fewer pixels 61, 61 'or more pixels 61, 61'.
- the raster graphic does not have to have the same number of rows and columns. Depending on the requirement, the associated matrix can be varied.
- square pixels 61, 61 ' were used to encode individual bits in a representation. It is conceivable to use circles instead of the square pixels 61, 61 '.
- the verification code for example, in the form of a bar code on the product. It is also possible to carry out purely digital storage, for example on an RFID tag or any other readable memory.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Credit Cards Or The Like (AREA)
Abstract
L’objet de l’invention est un procédé permettant de générer un code de vérification pour un objet et comprenant les étapes consistant à : a) générer une chaîne de caractères aléatoires (zz) qui peut être divisée en une première chaîne de caractères aléatoires (zz1) et une seconde chaîne de caractères aléatoires (zz2), b) générer une chaîne de caractères de permutation (pzz) en reproduisant la chaîne de caractères aléatoires (zz) selon une fonction de reproduction (p), c) enregistrer la seconde chaîne de caractères aléatoires (zz2) de la fonction de reproduction (p) et un numéro d’identification dans une banque de données, d) générer une représentation de la chaîne de caractères de permutation (p22), du numéro d’identification et de la première chaîne de caractères aléatoires (zz1) en tant que code de vérification.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IB2008002992 | 2008-09-30 | ||
IBPCT/IB2008/002992 | 2008-09-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010037429A1 true WO2010037429A1 (fr) | 2010-04-08 |
Family
ID=41110986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2008/065924 WO2010037429A1 (fr) | 2008-09-30 | 2008-11-20 | Procédé de génération d’un code de vérification, code de vérification, procédé et dispositif de vérification de l’authenticité d’objets |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010037429A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017071541A1 (fr) * | 2015-10-28 | 2017-05-04 | 北京金山办公软件股份有限公司 | Procédé et dispositif de génération de code de vérification numérique |
CN111144161A (zh) * | 2020-04-03 | 2020-05-12 | 支付宝(杭州)信息技术有限公司 | 条形码的识别方法及装置、商品信息确定方法及支付方法 |
CN111835505A (zh) * | 2019-04-16 | 2020-10-27 | 上海擎感智能科技有限公司 | 一种激活码生成方法、装置及计算机存储介质 |
CN112084511A (zh) * | 2020-08-27 | 2020-12-15 | 欧菲微电子技术有限公司 | 使用期限信息的加密方法、装置、存储介质及电子设备 |
CN114584327A (zh) * | 2022-05-09 | 2022-06-03 | 山东捷瑞数字科技股份有限公司 | 一种客户端生成的图形验证码的验证方法及系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4972475A (en) * | 1987-02-10 | 1990-11-20 | Veritec Inc. | Authenticating pseudo-random code and apparatus |
WO2004070682A2 (fr) * | 2003-02-04 | 2004-08-19 | Dietrich Heinicke | Systeme de garantie de produit et procede associe |
WO2007120247A2 (fr) * | 2005-12-29 | 2007-10-25 | Chemimage Corporation | Procede et appareil destines a la protection contre la contrefacon |
-
2008
- 2008-11-20 WO PCT/EP2008/065924 patent/WO2010037429A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4972475A (en) * | 1987-02-10 | 1990-11-20 | Veritec Inc. | Authenticating pseudo-random code and apparatus |
WO2004070682A2 (fr) * | 2003-02-04 | 2004-08-19 | Dietrich Heinicke | Systeme de garantie de produit et procede associe |
WO2007120247A2 (fr) * | 2005-12-29 | 2007-10-25 | Chemimage Corporation | Procede et appareil destines a la protection contre la contrefacon |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017071541A1 (fr) * | 2015-10-28 | 2017-05-04 | 北京金山办公软件股份有限公司 | Procédé et dispositif de génération de code de vérification numérique |
US10565366B2 (en) | 2015-10-28 | 2020-02-18 | Beijing Kingsoft Office Software, Inc. | Numerical verification code generation method and device |
CN111835505A (zh) * | 2019-04-16 | 2020-10-27 | 上海擎感智能科技有限公司 | 一种激活码生成方法、装置及计算机存储介质 |
CN111835505B (zh) * | 2019-04-16 | 2023-06-30 | 上海擎感智能科技有限公司 | 一种激活码生成方法、装置及计算机存储介质 |
CN111144161A (zh) * | 2020-04-03 | 2020-05-12 | 支付宝(杭州)信息技术有限公司 | 条形码的识别方法及装置、商品信息确定方法及支付方法 |
CN112084511A (zh) * | 2020-08-27 | 2020-12-15 | 欧菲微电子技术有限公司 | 使用期限信息的加密方法、装置、存储介质及电子设备 |
CN114584327A (zh) * | 2022-05-09 | 2022-06-03 | 山东捷瑞数字科技股份有限公司 | 一种客户端生成的图形验证码的验证方法及系统 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69824291T2 (de) | Überprüfen der echtheit von gütern unter verwendung von zufallszahlen | |
DE60221700T2 (de) | Systeme zum sicheren markieren von daten | |
EP2433239B1 (fr) | Code original, procédé de génération et utilisation dudit code original | |
DE69415053T2 (de) | Verfahren und Vorrichtung zur Kreditkartenechtheitsprüfung | |
DE10328328B4 (de) | Produktschutz-Portal und Verfahren zur Echtheitsprüfung von Produkten | |
EP2465078B1 (fr) | Marquage sécurisé d'un produit | |
EP1944716B1 (fr) | Procédé et dispositif de sécurisation d'un document comportant une signature apposée et des données biométriques dans un système informatique | |
DE202004021547U1 (de) | Etikett zum Aufbringen auf ein Produkt oder seine Verpackung | |
EP2984814B1 (fr) | Production et reconnaissance de données d'informations d'images imprimables infalsifiables | |
DE10204870B4 (de) | Verfahren zur Fälschungssicherung eines Wertträgers, Wertträger und Verfahren zur Überprüfung seiner Echtheit | |
WO2020001695A1 (fr) | Procédé permettant de produire des éléments de sécurité qui sont non visibles à l'œil humain et ne peuvent pas être copiés, dans une représentation, et représentation imprimée | |
DE102015009123B4 (de) | Verfahren zur Echtheitskontrolle der Herkunftskennzeichnung und der Haltbarkeitsangaben von Produkten | |
DE112007001726T5 (de) | Antifälschungsverpackung | |
WO2010037429A1 (fr) | Procédé de génération d’un code de vérification, code de vérification, procédé et dispositif de vérification de l’authenticité d’objets | |
DE102008001880B4 (de) | Verfahren und Vorrichtung zum Kennzeichnen von Objekten | |
DE69737806T2 (de) | Datenverschlüsselungsverfahren | |
DE19824435A1 (de) | Verfahren und Vorrichtung zur Prüfung und/oder Registrierung von Banknoten oder dgl. | |
DE102007034527B4 (de) | Verfahren und System zur Kennzeichnung einer Ware als Originalware eines Warenherstellers | |
EP3658384B1 (fr) | Tampon encreur manuel | |
DE102018115348A1 (de) | Fälschungssicherung und Abgabekontrolle von Verbrauchsgütern | |
WO2005010814A1 (fr) | Document non falsifiable et son procede d'obtention | |
DE10256260A1 (de) | Verfahren und Vorrichtung zur Verifikation eines Erzeugnisses | |
DE69928914T2 (de) | Elektronisches Identifizierungssystem und -verfahren mit Ursprungsechtheit | |
DE10137695B4 (de) | Verfahren und Vorrichtung zum Identifizieren eines Gegenstands innerhalb einer Mehrzahl von Gegenständen | |
CH700859A2 (de) | Kennzeichen zur Prüfung der Authentizität eines Erzeugnisses und Verfahren dazu. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08875347 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08875347 Country of ref document: EP Kind code of ref document: A1 |