WO2011110973A2 - A method of content authentication inside a sealed box using special labels - Google Patents

A method of content authentication inside a sealed box using special labels Download PDF

Info

Publication number
WO2011110973A2
WO2011110973A2 PCT/IB2011/050859 IB2011050859W WO2011110973A2 WO 2011110973 A2 WO2011110973 A2 WO 2011110973A2 IB 2011050859 W IB2011050859 W IB 2011050859W WO 2011110973 A2 WO2011110973 A2 WO 2011110973A2
Authority
WO
WIPO (PCT)
Prior art keywords
labels
imaging
box
authentication
pattern
Prior art date
Application number
PCT/IB2011/050859
Other languages
English (en)
French (fr)
Other versions
WO2011110973A3 (en
Inventor
Ashish Anand
Original Assignee
Ashish Anand
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ashish Anand filed Critical Ashish Anand
Priority to CN201180023176.3A priority Critical patent/CN102959563B/zh
Priority to JP2012556621A priority patent/JP5826774B2/ja
Priority to AU2011225766A priority patent/AU2011225766B2/en
Priority to KR1020127024515A priority patent/KR101759664B1/ko
Priority to EP11752928.9A priority patent/EP2545496A4/en
Publication of WO2011110973A2 publication Critical patent/WO2011110973A2/en
Publication of WO2011110973A3 publication Critical patent/WO2011110973A3/en
Priority to US14/252,392 priority patent/US9122971B2/en
Priority to US14/813,487 priority patent/US9361532B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • G06F18/2155Generating training patterns; Bootstrap methods, e.g. bagging or boosting characterised by the incorporation of unlabelled data, e.g. multiple instance learning [MIL], semi-supervised techniques using expectation-maximisation [EM] or naïve labelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection

Definitions

  • This invention belongs to the field of content verification in terms of count and originality inside a sealed container as it transits between point-of-packaging and point-of-delivery.
  • Today customer can track & trace their consignment but this invention enables them to monitor and verify the content at each point during transit.
  • Direct benefit is that if item gets stolen and replaced with fake item of same shape, size and weight tagged with genuine labels, then point-of-intrusion is identified and logistics companies can investigate the matter with precise information. Thus it installs accountability at each point of transit.
  • Core purpose of this invention is to detect those kind of intrusions which results in concealed loss and remain un-detectable and un-traceable and only gets exposed at point-of-delivery after box is opened.
  • This method is just not about item count but also detects if items are reshuffled or replaced with fake item of same shape, size and weight.
  • Disclosed is an improved and stronger method of item theft/replacement detection technology that is even insider threat protected.
  • This invention proposes special-purpose labels with internal layering of radio-opaque material aligned randomly and embedded inside.
  • labels For human eye all labels look symmetrical in shape size and application. These labels are to be tagged item-wise or box-wise at a designated place. While externally all tags look similar on human visual inspection but internally they have radio-opaque layering done in random orientation. After tagging items are stacked in box in multiple layers arranged in row and column. X-ray imaging of box should show the row-wise and column-wise matrix of tagging. If any item is stolen then overlapped imaging will be different. Assuming replacement with fake item even tagged with label at designated place still orientation will be different and imaging comparison module will catch this.
  • these labels can have randomly printed patterns with invisible ink and can be scanned by special purpose camera. If invisible ink is difficult to use then these labels with black pattern can be hidden from human vision by placing them under a red and blue colour screen. This embodiment is only establishes that box has not been opened in transit channel and repackaged with genuinely looking tapes.
  • Diagram 1 Diagram of tagging with internal layering of radio-opaque material.
  • Diagram 2 D iagram of internals of tagging showing radio-opaque layering done in random orientation but externally to human eye all tags appear symmetric.
  • Diagram 3 Diagram of item tagged on two different sides of the box.
  • Diagram 4 Diagram showing x-ray imaging of items stacked in box after they are tagged with labels having different orientation of radio-opaque layering request. (004) and (005) are X- ray images from two different sides of the box.
  • Diagram 5 D iagram showing x-ray imaging after one item is taken out.
  • Diagram 6 D iagram showing x-ray imaging after one item is replaced with fake item but tagged with similar labels.
  • Diagram 7 Diagram showing top face of items tagged with labels which are symmetric in imaging with all item intact inside container.
  • Diagram 8 Diagram showing top face of items tagged with labels which are symmetric in imaging, wherein imaging showing inter-pattern distance changed due to one item has been taken out of container.
  • Diagram 9 Diagram showing side face x-ray of 5 items stacked depth-wise and each tagged with labels showing only 4 patterns at a given row and column as one pattern is hidden due to overlap.
  • Diagram 10 Diagram showing side face x-ray of 5 items stacked depth-wise and each tagged with labels showing all 5 patterns at a given row and column as angular x-ray exposes hidden pattern.
  • Diagram 11 Diagram showing two labels with invisible ink pattern wherein the one label has reference pattern and another label has actual comparison pattern and both reference line and comparison pattern are printed on label from inks. These are invisible to human eye and can only be digitally scanned by appropriate infrared camera.
  • Diagram 12 Diagram showing another type of two labels wherein Reference circular adhesive label has two circles printed by invisible ink. Another circle is on base tape. Angle with respect to base adhesive tape is calculated using image processing which depends on orientation of circular adhesive tape. These adhesive tapes are self-destroyable to prevent re-use.
  • Diagram 13 Diagram showing an embodiment of randomly oriented radio-opaque label wherein, radio-opaque material layering which is non-visible is in form of small circle randomly embedded anywhere within the larger circular radio-transparent label and depending on orientation of larger circular label unique imaging signature is auto-acquired.
  • Diagram 14 Diagram showing x-ray imaging of box with bundle of currency bills with 4 bundles length-wise, 5 bundles height-wise and 5 bundles depth-wise and each bundle is tagged with smart labels.
  • Diagram 15 Diagram showing x-ray imaging of box padded with thermocol block to ensure radio-transparent media in path of x-ray beam with two circular labels under plastic strapping such that any pilferage requires tampering with plastic strapping and that will change the orientation of labels.
  • Diagram 16 Diagram showing 360 degree scanning of trapezoidal shaped box, wherein scanning includes all faces and edges of box by using a image acquisition platform with two cameras.
  • references in the specification to 'embodiment' indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure or characteristic in connection with other embodiments whether or not explicitly described.
  • the term 'radio-opaque layering' inside the tag has been shown as straight line, triangles or circles, but this should not be understood to be a specific shape as it can be manufactured any different random shapes. How the labels are applied item-wise inside the box OR outside of box will depend on exact customized requirements of specific deployment. Similarly this invention proposes use of circular labels for best level of security but it can be of any other shape as well.
  • Radio-opaque layering Each item needs to be tagged with a special-purpose label.
  • diagram 1 the label as appears to human eye (001) and with embedded radio-opaque layer (002) is shown. Externally to human eye all tags look symmetrical but internally they have random orientation of radio-opaque layering as in diagram 2.
  • Another format of labels is shown in diagram 13 wherein symmetrically looking circular labels has internal layer of radio opaque material (018).
  • each box is tagged with one label. But the box can be tagged with more than one label (003) as in diagram 3.
  • These labels acquire their credential only at time of application and they auto-acquire their new credential on each re-use.
  • second embodiment which will be external scanning solution without using xray labels will have invisible patterns and can be digitally scanned by special purpose camera and auto-acquires its credential, which is determined by orientation of invisible pattern with respect to pattern on reference label.
  • Reference X-ray imaging This imaging has to be done at point-of-packaging in high physical security and surveillance area.
  • the images of sealed box are to be taken from two different sides of the box such that overlapped orientation (004) and individual orientation (005) are received as in diagram 4.
  • overlapped orientation 004) and individual orientation (005) are received as in diagram 4.
  • internal imaging 004) and (005) is done and reference imaging will show the overlapped imaging of randomly orientated radio-opaque layering from different tags in stacked item.
  • Reference image indexed with unique-ID of box is sent to central server after digitally signing.
  • Transit and delivery point X-ray imaging X-ray imaging of box at each transit and delivery point is compared with reference images showing the matrix of labels wherein x-ray imaging of randomly orientated radio-opaque layering will be overlapped. If anybody reshuffles the items, steals the item or replaces with fake item the imaging comparison module will catch it during comparison with reference images of that particular box.
  • Item loss/theft detection If any of the item is lost or have been stolen the overlapped imaging from stacked item from that particular row or column will be significantly different (006) and (007) and image comparison module will catch and raise the alert.
  • Item replacement detection If any of the item is replaced with fake item of similar shape size and weight, still the overlapped imaging (008) and (009) will be different for stacked item in that particular row or column. Image comparison module will catch and raise the alert.
  • Item reshuffle detection If position of two similar items is inter-changed then also the overlapped imaging will be different for stacked item in that particular row or column. Image comparison module will catch and raise the alert.
  • Corner possibility of same orientation of labels on stacked item By any chance if two items have got exactly same orientation then the loss or theft might not get detected. Replacement will still get detected as replaced item will not have same orientation again for all practical purpose. However even to mitigate this corner possibility two tags can be used such that this scenario is effectively ruled out by combining mathematical probability of exact overlapping.
  • Image indexing at central server During reference imaging each box is assigned a randomly generated unique-ID which is pasted on box preferably on same side on which the reference imaging has been taken. Unique reference imaging of each box is digitally signed and during comparison reference image is fetched indexed with unique-Id of box. All subsequent imaging needs to be taken from same side on which the reference imaging was taken. For added protection of network channel fetching reference imaging can be crypto-protected using known protocols like IPSEC/SSL.
  • Image normalization Perfect comparison requires cleaning-up the x-ray imaging. Wooden or corrugated box might have metallic parts like nails. So each time the x-ray imaging is taken it has to be subtracted with x-ray imaging of standard empty boxes.
  • Item horizontal movement detection Once image capture module concludes the difference between normalized reference image and normalized current-hop captured image, it further examines whether difference is on account of slight horizontal movement of items during transit. Full imaging of box is cropped in multiple portions length-wise and height-wise wherein, each cropped portion represents items stacked depth-wise. Horizontal movement detection is done by subtracting of cropped portion from respective cropped portion from reference image and second subtraction of cropped portion from reference image from respective cropped portion from recently captured image. After these two subtractions each pixel can be verified for a horizontal shift. If it is not a genuine horizontal movement then number of pixels with horizontal shift will be minimal.
  • Size based analysis for item count This mode is used to count the number of items. In this case all labels will have symmetrical and identical layering of radio-opaque material and not randomly oriented layering. Example sake if tags are circular then radio-opaque layering will also be same sized circle. These tags are applied on top face of each item at a place which is radio-transparent in direction of x-ray beam. In x-ray imaging wherein x-ray beam is downward to upward the size of label closest to flat panel detector will be larger. In case of any item is taken out depending on largest size of circle in x-ray imaging pattern it can be calculated number of item taken out of box. If no items are taken out then all circle (010) in x-ray imaging are of same size as shown in diagram 7. Amount of size variation (011) as in diagram 8, will depend on how many items are taken out. This method will work best on flat panel detector x-ray machines and if all items within box are of standard size and shape and some benchmarking is known beforehand.
  • an area of 1 inch x 1 inch is cropped from full box imaging, which represents imaging of five items stack depth-wise at given row and column.
  • an elongated area 1 inch x 1.5 inch is cropped, wherein hidden pattern 'E' is exposed and this information is digitally recorded during reference imaging itself and can be verified at point-of-delivery.
  • Count of partially overlapped circular pattern in x-ray imaging This method is only applicable to partially overlapped and if patterns are circular. This method exploits the fact that as circle is traversed along its circumference, then aggregated value of absolute difference (whether positive or negative) of both x-coordinate and y-coordinate between two equidistant points on circumference remains same. If two or more circles are partially overlapping then the periphery will not be geometrically circular and in that case aggregated value of absolute difference of x-coordinate and y-coordinate will not remain same for same distance parsed along the edge of overlapped pattern. Every time the aggregated value of absolute differences in x-coordinate and y-coordinate changes, the count of overlapped pattern is increased, and this traversal continues till original start point on periphery of pattern is reached.
  • Covert feature for anti-counterfeiting associated with overt feature Often there is need of covert feature of anti-counterfeiting.
  • the authentication of the box is described. Once the box is sealed labels with invisible patterns printed on it is applied on to the box. Noteworthy to mention that in this application labels used are not radio-opaque layered but have invisible patterns printed. Patterns are externally and digitally scanned by special-purpose camera which can scan in non-visible range for human eye. Patterns can be any shape/size or as simple as one line randomly oriented and in that case degree of orientation can be imaging credential.
  • Imaging credential can be associated with a random number printed on packaging and thus becomes a unique signature per-piece which is not re-clonable and non-replaceable even by an insider.
  • a scheme of multi-number random number system for anti-counterfeiting has been disclosed in Indian patent number 41/CHE/2009 and PCT international application PCT/IB2010/050940 .
  • On production-line special-purpose camera image acquisition system scans each packaging externally and associates their imaging credential with unique alpha-numeric credential and this association is recorded in database. Random pattern can be any shape and size.
  • Reference imaging captured by special cameras like infrared cameras and associating this imaging with unique ID per-piece. At time of verification in field, again imaging is compared programmatically with reference imaging associated with unique-ID.
  • Two label approach for external scanning in direction-agnostic manner is possibly useful for high volume logistics industry, wherein item level tagging with smart labels with internal random radio-opaque layering is not possible and thus only box level authentication is desired and box sizes are different or custom-made. If boxes are of trapezoidal shape then all faces and edges can be scanned with top and bottom scanning.
  • Two labels are used in this embodiment as illustrated in diagram 11. One is base or reference label which gives reference pattern (014). Another comparison label (015) has comparison pattern (016). Imaging of reference pattern is used to determine orientation of comparison pattern image. So irrespective of box scanning direction, image analysis is done based on orientation of comparison image with respect to reference image.
  • Both patterns will be invisible to naked eye (preferably printed from an ink those are non-visible to human eye) but can be digitally scanned by appropriate camera.
  • these labels should be self destroyable for better security.
  • Comparison label should look symmetrical to human eye in shape, size and application and only differs in terms of pattern's orientation, pattern's shape and pattern's size, which is printed from non-invisible ink to human eye.
  • These labels are to be applied in a manner such that opening point will be sealed.
  • These labels can also be two concentric labels and smaller diameter base label can be applied on top of larger diameter reference label.
  • These labels can bear unique-ID printed by non-visible ink as well to index the images in database.
  • Another embodiment can have two invisible circles on reference label (017) and angle with respect to circle on base label is calculated as shown in diagram 12. If using invisible inks to make patterns is not feasible one can use combination of red and blue screens as adhesive tapes over label, wherein pattern is printed in black colour. Example-sake if, pattern is printed in black on reference label of red background then using a semi-transparent deep blue coloured tape will make pattern invisible but still digitally scan-able by InfraRed camera.
  • box can contain any item that may be metallic or non-metallic. Box is padded and strapped along thermocol block or any other radio-transparent material. Thermocol block padding is suitable for flat panel x-ray detectors however in case of normal baggage scanning x-ray machines thermocol block might not be needed and in exceptional cases wherein the x-ray imaging of metallic content inside the box overlaps with imaging of smart-labels, the internal metallic content might need to be rearranged a bit. Before plastic strapping two labels are placed on thermocol block and after tight strapping these labels auto-acquires their imaging credential.
  • credential can be relative orientation (019) and (020) but not limited to this.
  • This box is placed inside larger container and x-ray imaging is used to validate credentials. Any intrusion that will un-detectable requires strapping to be cut and thus labels will change their orientation and imaging credential will change automatically.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Analysing Materials By The Use Of Radiation (AREA)
  • Burglar Alarm Systems (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)
  • Lock And Its Accessories (AREA)
PCT/IB2011/050859 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels WO2011110973A2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
CN201180023176.3A CN102959563B (zh) 2010-03-10 2011-03-01 利用特殊标签对密封箱内的物品进行验证的方法
JP2012556621A JP5826774B2 (ja) 2010-03-10 2011-03-01 内容物を認証する方法及び内容物を認証する為の特殊ラベル
AU2011225766A AU2011225766B2 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels
KR1020127024515A KR101759664B1 (ko) 2010-03-10 2011-03-01 특별한 라벨들을 사용한 밀봉 상자 내부의 내용물 인증방법
EP11752928.9A EP2545496A4 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels
US14/252,392 US9122971B2 (en) 2010-03-10 2014-04-14 Label for enabling verification of an object
US14/813,487 US9361532B2 (en) 2010-03-10 2015-07-30 Label for enabling verification of an object

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN625/CHE/2010 2010-03-10
IN625CH2010 2010-03-10

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13521733 A-371-Of-International 2011-03-01
US13/590,871 Continuation-In-Part US8740076B2 (en) 2010-03-10 2012-08-21 Label for enabling verification of an object

Publications (2)

Publication Number Publication Date
WO2011110973A2 true WO2011110973A2 (en) 2011-09-15
WO2011110973A3 WO2011110973A3 (en) 2012-07-05

Family

ID=44563933

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2011/050859 WO2011110973A2 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels

Country Status (6)

Country Link
EP (1) EP2545496A4 (ko)
JP (1) JP5826774B2 (ko)
KR (1) KR101759664B1 (ko)
CN (2) CN102959563B (ko)
AU (1) AU2011225766B2 (ko)
WO (1) WO2011110973A2 (ko)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366336A (zh) * 2013-07-12 2013-10-23 陕西理工学院 一种基于人眼对比度敏感视觉特性的图像水印方法
EP2618323A3 (en) * 2012-08-21 2014-01-01 Ashish Anand Label for enabling verification of an object
WO2014069491A1 (ja) * 2012-10-30 2014-05-08 株式会社アイビット 放射線造影材の計数装置及び計数方法
US8740076B2 (en) 2012-07-11 2014-06-03 Linksmart Technologies Pvt. Ltd. Label for enabling verification of an object
US9558544B2 (en) 2011-04-29 2017-01-31 Monnaie Royale Canadienne/Royal Canadian Mint Method and apparatus for authentication of a coin or other manufactured item
WO2018046122A1 (de) * 2016-09-07 2018-03-15 Giesecke+Devrient Currency Technology Gmbh Verfahren, vorrichtung und system zum bearbeiten eines transportbehälters für wertgegenstände
US9922486B2 (en) 2013-01-24 2018-03-20 Arjo Solutions Unique identification of coin or other object

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9773220B2 (en) * 2013-09-10 2017-09-26 Sicpa Holding Sa Master case tracking mesh for data transmission in highly shielded environment
WO2015189764A1 (en) * 2014-06-09 2015-12-17 Ashish Anand Automated verification of optical randomness in security label
US9576166B2 (en) * 2015-02-18 2017-02-21 Fedex Corporate Services, Inc. Apparatus, non-transient computer readable media, and methods for automatically quantifying space within a logistics container using a scanning sensor node disposed within the container
JP2019501373A (ja) * 2015-12-02 2019-01-17 パワー フィンガープリンティング インコーポレイテッド 電力署名の偽造分析を使用して封止パッケージ内の異常を識別するための方法および装置
KR20180061687A (ko) * 2016-11-30 2018-06-08 동명대학교산학협력단 물품 포장 관리 시스템
EP3460722A1 (en) * 2017-09-22 2019-03-27 Authentic Vision GmbH Tamper-activated authenticable security device
DK3799655T3 (da) * 2018-06-06 2022-12-19 Invaluable Invent Forbedrede selvdestruerende dokumenter til informationssikkerhed og privatlivsbeskyttelse
CN109444219B (zh) * 2018-12-25 2021-02-12 北京食安链科技有限公司 一种肉类食品营养品质快速检测探针及其检测方法
JP7253305B2 (ja) * 2018-12-28 2023-04-06 大阪シーリング印刷株式会社 粘着テープ、梱包体及び梱包方法
JP6622937B1 (ja) * 2019-03-05 2019-12-18 株式会社日立パワーソリューションズ 流通管理方法
JP6944985B2 (ja) * 2019-03-05 2021-10-06 株式会社日立パワーソリューションズ 流通管理方法
CN112926617A (zh) * 2019-12-06 2021-06-08 顺丰科技有限公司 包装变更检测方法、装置、云端计算机设备和存储介质
CN116601097A (zh) 2021-01-19 2023-08-15 三菱电机株式会社 电梯的控制装置
CN116433097B (zh) * 2023-04-19 2023-11-21 北京市永康药业有限公司 一种注射剂包装质量检测方法及系统

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5346259A (en) * 1992-07-16 1994-09-13 Avery Dennison Corporation Anti-theft label construction
US5642442A (en) * 1995-04-10 1997-06-24 United Parcel Services Of America, Inc. Method for locating the position and orientation of a fiduciary mark
GB0129369D0 (en) * 2001-12-07 2002-01-30 Filtrona United Kingdom Ltd Method and apparatus for marking articles
EP1420381A1 (de) * 2002-11-12 2004-05-19 Hauni Maschinenbau AG Verfahren und Einrichtung zur Kennzeichnung und Authentizitatskontrolle von Produkten
GB0321090D0 (en) * 2003-09-10 2003-10-08 Abs Systems Inc Baggage screening system
JP4734893B2 (ja) * 2004-11-04 2011-07-27 凸版印刷株式会社 偽造防止媒体、偽造防止シールおよびその読み取り方法
US7856116B2 (en) 2004-11-09 2010-12-21 Digimarc Corporation Authenticating identification and security documents
EP1801593A1 (en) * 2005-12-22 2007-06-27 Koninklijke Philips Electronics N.V. A method of imaging biological specimens using inorganic nanoparticles as label agents
CN101583865A (zh) * 2006-12-14 2009-11-18 安东尼奥斯·艾卡特林尼迪斯 用于集装箱检查的方法和装置
US8090952B2 (en) * 2007-07-06 2012-01-03 Harris Scott C Counterfeit prevention system based on random positioning on a pattern
CN201138489Y (zh) * 2007-11-09 2008-10-22 北京博世金电科技开发有限公司 具有数字签名及电子标签和彩色图像的票据安全认证终端
WO2009105040A1 (en) 2008-02-19 2009-08-27 Bilcare Technologies Singapore Pte. Ltd. A reading device for identifying a tag or an object adapted to be identified, related methods and systems
CN101286203A (zh) * 2008-03-24 2008-10-15 陆航程 一种无芯片准rfid多重验证的低成本加密epc复合标签及系统
DE102008032781A1 (de) * 2008-07-11 2010-01-21 Klöckner Pentaplast GmbH & Co. KG Verpackungsfolie für Produktauthentifizierung, Authentifizierungsverfahren und -system
US8087585B2 (en) * 2008-07-15 2012-01-03 Morton Greene Baggage handling system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9122971B2 (en) 2010-03-10 2015-09-01 Linksmart Technologies Pvt. Ltd. Label for enabling verification of an object
US9361532B2 (en) 2010-03-10 2016-06-07 Linksmart Technologies Pvt. Ltd. Label for enabling verification of an object
US9558544B2 (en) 2011-04-29 2017-01-31 Monnaie Royale Canadienne/Royal Canadian Mint Method and apparatus for authentication of a coin or other manufactured item
US8740076B2 (en) 2012-07-11 2014-06-03 Linksmart Technologies Pvt. Ltd. Label for enabling verification of an object
EP2618323A3 (en) * 2012-08-21 2014-01-01 Ashish Anand Label for enabling verification of an object
WO2014069491A1 (ja) * 2012-10-30 2014-05-08 株式会社アイビット 放射線造影材の計数装置及び計数方法
US9922486B2 (en) 2013-01-24 2018-03-20 Arjo Solutions Unique identification of coin or other object
CN103366336A (zh) * 2013-07-12 2013-10-23 陕西理工学院 一种基于人眼对比度敏感视觉特性的图像水印方法
WO2018046122A1 (de) * 2016-09-07 2018-03-15 Giesecke+Devrient Currency Technology Gmbh Verfahren, vorrichtung und system zum bearbeiten eines transportbehälters für wertgegenstände
US10854030B2 (en) 2016-09-07 2020-12-01 Giesecke+Devrient Currency Technology Gmbh Method, device and system for handling a transport container for valuable objects

Also Published As

Publication number Publication date
JP2013527486A (ja) 2013-06-27
EP2545496A4 (en) 2017-08-23
CN102959563B (zh) 2016-11-16
KR101759664B1 (ko) 2017-07-19
EP2545496A2 (en) 2013-01-16
KR20130060169A (ko) 2013-06-07
AU2011225766A1 (en) 2012-11-08
JP5826774B2 (ja) 2015-12-02
CN107025424A (zh) 2017-08-08
WO2011110973A3 (en) 2012-07-05
CN102959563A (zh) 2013-03-06
AU2011225766B2 (en) 2014-11-13

Similar Documents

Publication Publication Date Title
WO2011110973A2 (en) A method of content authentication inside a sealed box using special labels
US9361532B2 (en) Label for enabling verification of an object
US11544996B2 (en) Gaming chip with a stripe pattern and management system for identification of the gaming chip based on imaging
CN104428798B (zh) 用于明确标记对象的方法
US8985471B2 (en) Optically readable identification security tag or stamp
CN115761977A (zh) 检查系统、检查装置及游戏币
CN115995131A (zh) 检查系统和检查装置
US10192299B2 (en) Method of and system for verifying authenticity of packaged items
US11347901B2 (en) Frangible security device
EP2618323B1 (en) Label for enabling verification of an object
CN110929296B (zh) 一种嵌套式二维码编码方法及解码方法
CN210824185U (zh) 一种高风险行李拦截系统
CN109328360B (zh) 信息介质及其制造方法、验证方法及验证系统

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180023176.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11752928

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 4781/CHENP/2012

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2012556621

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 0165612

Country of ref document: KE

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20127024515

Country of ref document: KR

Kind code of ref document: A

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2011752928

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2011225766

Country of ref document: AU

Date of ref document: 20110301

Kind code of ref document: A