WO2012128724A1 - Étiquettes basées sur un désordre inhérent, dotées d'une fonction d'identification amovible - Google Patents

Étiquettes basées sur un désordre inhérent, dotées d'une fonction d'identification amovible Download PDF

Info

Publication number
WO2012128724A1
WO2012128724A1 PCT/SG2012/000101 SG2012000101W WO2012128724A1 WO 2012128724 A1 WO2012128724 A1 WO 2012128724A1 SG 2012000101 W SG2012000101 W SG 2012000101W WO 2012128724 A1 WO2012128724 A1 WO 2012128724A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
specific
inherent disorder
feature
inherent
Prior art date
Application number
PCT/SG2012/000101
Other languages
English (en)
Inventor
Adrian Paul Burden
Winston Cheng Lock Tan
Peter Malcolm Moran
Original Assignee
Bilcare Technologies Singapore Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bilcare Technologies Singapore Pte. Ltd. filed Critical Bilcare Technologies Singapore Pte. Ltd.
Publication of WO2012128724A1 publication Critical patent/WO2012128724A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns

Definitions

  • Embodiments of the invention relate to the field of tags that include authentication and identification features based on inherent disorder.
  • Identification features such as barcodes, optical characters, Radio Frequency Identification (RFID), magnetic or optical stripes, and other means of identifying or authenticating objects have been used for purposes of identification, authentication, and tracking and tracing.
  • RFID Radio Frequency Identification
  • An "inherent disorder”-based feature is a feature based on a disordered material, wherein the structure of the disorder is used to identify or authenticate the object.
  • the disordered material may be a part of the object itself, or may be part of a tag that is affixed to the object or its packaging. Further, the disordered material may include a disordered coating, composite, or structure.
  • a "fingerprint" for each such tag may be read and stored in a database, typically at the time that the tag is manufactured (though later reading and storing, such as at the time that a tag is applied to an object is also possible).
  • Storing information in the database typically involves use of a database index number or identifier (sometimes referred to as a "primary key"), which may be uniquely associated with the tag, and marked on the tag using a barcode or other conventional identification means.
  • the tag is looked up in the database using the index number, and authenticated using the inherent disorder feature.
  • the tag is authenticated if there is a close match between the inherent disorder feature as read from the tag, and the inherent disorder feature as stored in the database under the tag's index number. Note that this match typically need not be perfect. For examples differences in the reader or the reading conditions between when the tag was entered in the. database and when the tag is read may lead to differences in the data that are read from the inherent disorder features of the tag. Because of these differences, the data of the inherent disorder feature itself may be difficult to use as a database index, and a second, conventional identification feature, such as a barcode number may be used to provide the database index for the tag.
  • a method of associating a database index with an authentication tag includes reading an object-specific ID from an object to which the tag is to be attached, and reading a tag- specific ID from the tag.
  • a database storing data relating to an inherent disorder feature of the tag sufficient to authenticate the tag is instructed to allow the data associated with the tag-specific ID (which was used as a database index to access the data) to be accessed using the object-specific ID as an index.
  • the tag-specific ID may be removed from the tag, and the tag may be attached to the object.
  • removing the tag-specific ID from the tag includes removing a removable portion of the tag on which the tag-specific ID is disposed.
  • the removable portion includes a barcode that encodes the tag- specific ID.
  • removing the removable portion is accomplished by peeling the tag away from a backing, (also known as the "liner") leaving excess material on which the tag-specific ID is disposed. In some embodiments, removing the removable portion is accomplished by peeling a backing off of the tag, wherein the tag-specific ID is disposed on the backing. In some embodiments, removing the removable portion is accomplished by removing a tear-off portion of the tag, wherein the tag-specific ID is disposed on the tear-off portion. In some embodiments the tag may be punched out, for example as part of a heat-stamping process, leaving the tag-specific ID behind. In some embodiments, the tag-specific ID may be discarded and/or destroyed.
  • Some embodiments of the invention also provide a method for enrolling data relating to an authentication tag in a database, for example during a manufacturing process of the tag.
  • the method includes enrolling data relating to an inherent disorder feature of the authentication tag in a database, the data sufficient to use the inherent disorder feature to authenticate the tag.
  • the method also includes associating a tag- specific ID with the authentication tag, the tag-specific ID usable as a database index to access the data, relating to the inherent disorder feature of the authentication tag in the database, and removably recording the tag-specific ID on a portion of the tag.
  • removably recording the tag-specific ID includes printing a barcode on a removable portion of the tag. In some embodiments removably recording the tag-specific ID includes recording the tag-specific ID on an excess portion of the tag that remains when the tag is peeled away from a backing. In some embodiments removably recording the tag-specific ID includes recording the tag-specific ID on a backing portion of the tag that is removed when the tag is attached to an object. In some such embodiments, the tag-specific ID is recorded on a back surface of the backing portion of the tag. In some embodiments, removably recording the tag-specific ID includes recording the tag-specific ID on a tear-away portion of the tag.
  • Some embodiments of the invention provide a tag for use in authentication applications.
  • the tag includes an inherent disorder feature disposed on a first portion of the tag, the inherent disorder feature usable to authenticate the tag.
  • the tag also includes a tag-specific ID disposed on a second portion of the tag, the tag-specific ID usable as a database index to access data relating to the inherent disorder feature in a database to authenticate the tag.
  • the second portion of the tag is removable, such that the tag-specific ID is removed from the tag when the tag is affixed to an object.
  • the tag-specific ID is recorded as a barcode.
  • This barcode may use any barcode symbology, including linear or one-dimensional barcode symbolizes, or two-dimensional barcode symbologies.
  • the inherent disorder feature includes an inherent disorder feature based on magnetic particles.
  • the inherent disorder feature may include an inherent disorder feature based on the three-dimensional layout of bubbles in a transparent polymer. It will be understood that other inherent disorder features may also be used.
  • the second portion of the tag, on which the tag-specific ID is disposed is an excess portion that is left after the tag is removed from its backing.
  • the second portion of the tag is a backing portion that is separated from the tag when the tag is affixed to an object.
  • the tag- specific ID is disposed on a back surface of this backing portion.
  • the second portion of the tag is a tear-away portion that is configured to be separated from the tag.
  • Some embodiments of the invention provide a method of adding authentication data relating to an inherent-disorder feature to an object-specific tag.
  • the method which is generally used with local authentication, includes determining an object-specific ID for an object to which the tag is to be attached, reading a tag-specific ID from the tag, the tag-specific ID including authentication data sufficient to authenticate an inherent disorder feature of the tag, producing an object-specific tag including the object-specific ID and the authentication data, removing the tag-specific ID from the tag that includes the inherent disorder feature, and attaching the object-specific tag and the inherent disorder feature to the object.
  • reading a tag-specific ID includes decrypting the authentication data.
  • producing an object-specific tag includes encrypting the authentication data.
  • the object-specific tag is produced (for example, by printing) on a non-removable portion of a tag that includes the inherent disorder feature.
  • Some embodiments of the invention provide a method of producing a tag including an inherent disorder-based authentication feature. The method includes reading an inherent disorder feature on a tag to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag, and removably recording a tag- specific ID on the tag, the tag-specific ID including the authentication data. In some embodiments, removably recording the tag-specific ID on the tag includes encrypting the authentication data.
  • FIGs. 1A and IB show top and perspective views, respectively, of magnetic particles used in a tag to be read as an inherent disorder feature in accordance with an embodiment of the invention
  • FIGs. 2A and 2B show further example tags with identification features that can be read in accordance with an embodiment of the invention
  • FIG. 3 shows an overall view of an anti-counterfeit system utilizing a reading device that reads inherent disorder features
  • FIGs. 4A and 4B show a method of applying a tag to an object so that an identifier associated with the tag is replaced with an identifier associated with the object, in accordance with an embodiment of the invention
  • FIG. 5 shows an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention
  • FIGs. 6A and 6B show a front and back view, respectively, of another example of an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention
  • FIG. 7 shows a further example of an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention.
  • FIGs. 8A and 8B show an additional method in accordance with an embodiment of the invention for use with tags for local authentication.
  • Tags based on inherent disorder provide strong authentication capabilities, since such tags are extremely difficult to counterfeit, and the likelihood of any two such tags returning the same reading are extremely low. Because such tags are based on inherent disorder, rather than on a predictable pattern, it is generally necessary to store a known authentic reading for such tags in a database, so that the known reading can be looked up later from a trustworthy source when the tag is later used for authentication. Alternatively, information relating to an inherent disorder feature can be stored on a second identification feature, such as a barcode, that is associated with a tag. By reading this information, the inherent disorder feature may be authenticated without going back to a database.
  • a second identification feature such as a barcode
  • readings of such inherent disorder-based tags may be consistent enough to permit authentication with a high degree of certainty when a reading from a known tag is compared with its entry in a trusted database
  • the readings may not be consistent enough to permit the tag to be authenticated without also knowing the index number of the tag in the database. That is, the readings may not be consistent enough in practical terms to permit the inherent disorder tag itself, or data computed from a reading of the inherent disorder tag (e.g., by computing a hash based on a numerical representation of particular features read from the tag) to be used as a unique database index to look up the information on the tag.
  • a second identification feature such as a barcode or other ordered identification feature (i.e., an identification feature into which pre-determined information, such as a database index number, can be written) with the tag.
  • a barcode or other ordered identification feature i.e., an identification feature into which pre-determined information, such as a database index number, can be written
  • the ordered identification feature is visible (or in some cases, even if it is not)
  • the tag will include two barcodes - one object- specific barcode, and one tag-specific barcode.
  • a tag including an inherent disorder feature and a removable barcode or other "ordered" secondary identification is provided.
  • removing the barcode or other secondary identification feature from the tag there is no longer a conflict with information printed or otherwise disposed on an identification feature associated with the object.
  • this can be done by updating the database index, so that it uses an object- specific identifier as the key to access the information on the inherent disorder feature.
  • a second reason for using a removable identification feature in association with inherent disorder-based tags arises from the desire to read the disordered feature on a production line controlled by the manufacturer of the tag, while still being able to print product information "on-the-fly" at the brand-owner's production line (such information may include batch number, serial number and manufacturing date which may be impractical to preprint on a label) and/or to store encrypted information within the second identification feature which allows the inherent disorder-based feature to be authenticated without going back to a database.
  • product information may include batch number, serial number and manufacturing date which may be impractical to preprint on a label
  • An example of this arises when a system is required that can achieve local authentication (i.e. the authentication does not send a signal back to a remote database / server) using the inherent disorder-based feature.
  • information required to authenticate the inherent disorder-based identification feature is generally compressed, encrypted and stored in a second (or even a third) identification feature, for example a standard datamatrix barcode.
  • a second (or even a third) identification feature for example a standard datamatrix barcode.
  • the inherent disorder-based identification feature is read on a specialized production line which is suited to such reading and also to performing the necessary quality control steps on the tags (e.g. rejecting the tag if the inherent disorder-based feature is not suitable) rather than doing this on a brand-owner's production line, which is generally not the ideal place for reading and associated quality control steps of tags provided by external suppliers.
  • the inherent disorder-based identification feature is read and information about it is encrypted and stored into the removable identification feature.
  • the removable identification feature is read prior to printing, and may be decrypted by the printing device or a computer linked to the printing device, and then may be re-encrypted into the new identification feature. Alternately the information in the removable identification feature is not decrypted, but the encrypted version is read, added to the new information following some known format and then the new identification feature is printed.
  • FIGs. 1A and FIG. IB respectively show a top view and a perspective view of magnetic particles 104 (preferably of high magnetic coercivity) used in a tag 102 to be read as an inherent disorder feature in accordance with an embodiment of the invention.
  • particles 104 of high coercivity magnetic materials which have a high magnetic flux forming the magnetic fingerprint region 106 should be used.
  • FIG. IB shows that in this embodiment, the magnetic particles 104 form a layer sandwiched between a base layer 108 and a cover layer 1 10.
  • the base layer 108 and cover layer 110 are generally formed from films of material, with the base layer 108 providing a support for the magnetic particles 104 and the cover layer 1 10 providing protection from the environment and from abrasion.
  • the maximum thickness that can be used for the cover layer 1 10 is dependent on the strength of the magnetic fields produced by the magnetic particles 104 (the strength of the magnetic field is itself a function, for example of the remnance magnetization of the magnetic particles 104, their size, the orientation of the magnetic particles 104 and the direction of magnetism), the size and distance between the particles, the sensitivity of the reading element being used to read the magnetic fields, and the expected resolution of the overall system.
  • the magnetic particles 104 may be distributed within a non-magnetic (or weakly magnetic) matrix material, such as a polymeric material, a metallic material, a glass material, or a ceramic material.
  • the non-magnetic or weakly magnetic material provides one or more of: protection for the particles (particularly protection against moisture if the particles are prone to corrosion), cohesion between the particles and the other layers present (i.e. the non-magnetic material locks the magnetic particles in place - a form of adhesive, for example), and ease of application of the particles to the base or cover layer.
  • the "magnetic particles 104" is understood to include the non-magnetic or weakly magnetic matrix material where applicable.
  • the magnetic particles 104 may include a high coercivity material.
  • a high coercivity material is a neodymium magnet comprising Nd, Fe and B.
  • the magnetic particles 104 may include a ferrimagnetic material, an antiferromagnetic material, a ferromagnetic material, or domains of varying magnetic properties within a continuous material (including voids causing variable magnetic properties) and combinations thereof.
  • the ferromagnetic material may be selected from the group consisting of MnBi, CrTe, EuO, Cr0 2 , MnAs, Fe, Ni, Co, Gd, Dy, corresponding alloys and oxides of Fe, Ni, Co, Sm, Gd, Dy, and combinations thereof.
  • FIGs. 2A and 2B show further examples of tags 102 with additional identification features.
  • these additional identification features may include, for example, an index into a database where a signature of the tag based on inherent disorder features, made at the time that the tag was manufactured can be found, so that the inherent disorder features can be used to authenticate the tag.
  • These additional identification feature may include, but are not limited to, magnetic barcodes, magnetic borders, magnetic alphanumeric characters, magnetic fiducial marks, optical barcodes (linear and 2-dimensional, including, various industry standards such as Code 128, QR- code, and DataMatrix), optical fiducial marks, optical alphanumeric characters, and other visible markings.
  • the tag 102 may include a Radio Frequency Identification (RFID) chip, security inks or a hologram. As noted above, these additional identification features may be unacceptable in some applications.
  • RFID Radio Frequency Identification
  • a barcode 202 is shown in FIG. 2A as overlapping with the magnetic fingerprint region 106.
  • the barcode 202 may be printed in regular ink, or in some embodiments may be printed using covert inks such as ultraviolet or infrared "optical" inks that cannot be easily detected by the naked human eye under white light but can be detected and read by using a suitably adapted reading device or by illuminating the tag 102 with one or more particular wavelengths of the electromagnetic spectrum.
  • Magnetic and optical identification features may be positioned at the same position with respect to the scan area by means of using multiple layers, or may be positioned in any other spatial relationship to each other (including both overlapping and non-overlapping configurations).
  • FIG. 2A shows a tag 102 with a magnetic fingerprint region 106.
  • a two- dimensional barcode 202 is partially overlapping the magnetic fingerprint region 106 and a plurality of magnetic alphanumeric characters 206 are positioned at the four corners of the two-dimensional barcode 202.
  • the magnetic fingerprint region 106 is shown in FIG. 2A and FIG. 2B, the fingerprint region 106 may be situated behind an opaque cover layer that the barcode 202 is printed on. Therefore, a user may not actually see the fingerprint region 106.
  • magnetic and optical features may overlap while placed on the same or different layers of a tag 102.
  • FIG. 2B shows another example of a tag 102 with a magnetic fingerprint region 106.
  • a two-dimensional barcode 202 is overlapping the magnetic fingerprint region 106.
  • the two-dimensional barcode 202 is surrounded by a border 208, and a first fiducial marking 210 is positioned at the upper-right corner of the border 208.
  • a second fiducial marking 212 is positioned on the upper-left corner, adjacent to the second fiducial marking 208.
  • Magnetic alphanumeric characters 214 are positioned adjacent to the border 208.
  • a reading element may read overlapping optical and magnetic features of the tag 102. Overlapping and similar terms are to be understood to mean located in the same area, superimposed, or on top of each other.
  • Optical and magnetic features of the tag 102 may overlap on the same or different layers of the tag 102.
  • a reader for reading such tags is described in international application PCT/SG2010/000259, by Bilcare Technologies Singapore Pte. Ltd., published on 13 January 201 1 as publication WO/201 1/005222.
  • FIG. 3 shows an overall view of an authentication system 300 utilizing a tag 302 such as is described above, including both an inherent disorder feature and an additional identification feature.
  • the system 300 shown here includes a reading device 304, which communicates with a data server 308.
  • the reading device 304 may include integrated communication capabilities, or may be adapted to be attached to a mobile device or computer with communication capabilities.
  • the reading device 304 may, for example, communicate with the database or data server 308 via methods such as using data cables, local area networks, Bluetooth, Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX) technology, General Packet Radio Service (GPRS), 3G/Universal Mobile Telecommunication System (UMTS), or other communication protocols or technologies.
  • WiMAX Worldwide Interoperability for Microwave Access
  • GPRS General Packet Radio Service
  • UMTS Universal Mobile Telecommunication System
  • the reading device 304 may also include methods for direct communication with the user, for example a screen and a keyboard, which may allow the user to read and enter information on the reading device 304.
  • the tag 302 shown in FIG. 3 includes both an inherent disorder feature 312 - in this example, a disordered array of magnetic or magnetisable particles forming a magnetic fingerprint region, as well as an additional identification feature - in this example, a barcode 314.
  • the authentication data from the inherent disorder feature 312 was read and entered into a database on the data server 308 at the time that the tag 302 was manufactured.
  • the tag 302 was assigned a database index number, which was recorded in the barcode 314 at the time that the tag 302 was manufactured.
  • Each tag 302 is attached to an object or an item of value 362 to be authenticated.
  • the tag 302 is attached to the object 362 in such a way that it is difficult or practically impossible to remove the tag without altering or destroying the inherent disorder feature 312. If there is an indication that the object 362 to which the tag 302 has been attached may be counterfeit, or that the tag 302 has been altered or tampered with, then the reading device 304 can be used to read the magnetic fingerprint region to verify the tag 302. It is generally more difficult to counterfeit, alter, or tamper with the inherent disorder features of the tag 302 than other features, such as a barcode.
  • the barcode 314 on the tag is also read, in order to be used as a database index.
  • the reading device 304 uses the database index contained in the barcode 314 to look up information on the inherent disorder feature 312 from the data server 308.
  • a comparison for example a statistical comparison, between the data read from the inherent disorder feature 312 and the data on the inherent disorder feature stored on the data server 308 is performed, and the tag 302 is authenticated if a close enough match is found. It will be understood that this statistical comparison could be performed on the reading device 304 with data downloaded from the data server 308, or on the data server 308, using data on the inherent disorder feature 312 uploaded from the reading device 304. Either way, a database index read from the barcode 314 is used to access the correct information from a database on the data server 308.
  • the reading device 304 has the capability to communicate with the data server 308 regarding a signal generated from reading identification features in order to authenticate a tag. Encrypted signals from the reading device 304 can be sent either through a wireless connection or a wired connection. Some examples of wireless connection include Bluetooth and Wi-Fi and some examples of wired connection include Recommended Standard 232 (RS232) and Universal Serial Bus (USB). As noted above the communication may be direct, or through a network or other intervening communication infrastructure, such as the Internet, or General Packet Radio Service (GPRS) or 3G/UTMS technology, for example.
  • GPRS General Packet Radio Service
  • 3G/UTMS 3G/UTMS technology
  • the tag 302 when a tag 302 is attached to an object that already includes a barcode, the tag provides an additional barcode. Having multiple barcodes on the same object may be undesirable in many applications.
  • the inherent disorder feature 312 is to be useful for authentication of the tag and/or object, then it is necessary to include a database index that permits information on the inherent disorder feature 312 to be accessed in a database on the data server 308.
  • this difficulty can be addressed by providing a tag with an inherent disorder feature and a removable barcode feature (or other suitable identification feature such as an RFID tag or characters which can be machine recognized).
  • the removable barcode feature is used to provide an index when the tag is manufactured.
  • the tag is affixed to an object, the barcode from the tag is removed, and an object-specific identifier is associated with the tag in the database. This object-specific identifier may then serve as an index in the database for accessing data on the inherent disorder feature of the tag.
  • FIGs. 4A and 4B show a method in accordance with an embodiment of the invention.
  • FIG 4A shows the portion of the method in which the tag is initially enrolled in the database and associated with an initial tag-specific identifier that may be used as an index into the database.
  • the steps shown in FIG. 4A may be carried out by the manufacturer of the tag, but may be carried out by other parties (e.g., the party that controls the database in which tags are enrolled) in some instances.
  • a tag including an inherent disorder feature is read, for example by the manufacturer of the tag, and data relating to the inherent disorder feature, sufficient to authenticate the tag, is enrolled in a database using a tag-specific ID as a database index.
  • the tag-specific ID is removably recorded on a portion of the tag.
  • the tag-specific ID may be recorded on a removable portion of the tag.
  • the tag-specific ID may be represented as a barcode, but it will be understood that other writable identification features, such as printed digits or other visual identifiers may be used.
  • the removable portion of the tag may be on a back surface of a tag liner, in a cut-out portion of a tag, on a portion of a tag liner or tag that is peeled away when the tag is applied, on excess material that remains when a tag is peeled away from its backing, or any other place that is in close proximity to the tag when the tag is enrolled in the database, and that can be separated from the tag when the tag is placed on an object.
  • FIG. 4B shows a portion of the method in which the tag is attached to an object.
  • the tag-specific ID is read before placing the tag on an object.
  • an object-specific ID is determined for the object to which the tag is being applied. This may involve reading the object-specific ID from the object, or (as discussed below) otherwise determining an object-specific ID for the object.
  • the object-specific ID may be encoded in a barcode, but other forms of identifier may also be used.
  • the database is instructed to allow the inherent disorder data associated with the tag-specific ID to be accessed using the object-specific ID as an index. Once this step is taken, it is possible to use the object-specific ID to access the data on the inherent disorder feature of the tag in the database.
  • the tag-specific ID may be replaced by the object-specific ID or otherwise removed from the database, while in other embodiments, the tag-specific ID will remain in the database along with the object-specific ID.
  • the tag-specific ID is removed from the tag, and the tag is applied to the object.
  • removing the tag-specific ID may be accomplished by removing the tag from its backing for application to the object.
  • the tag-specific ID may be printed on a removable portion of the tag, which may be removed either before or after the tag is applied to the object.
  • the tag may be manufactured with the tag-specific ID pre-printed on a removable portion of the tag, so that printing the tag-specific ID is done prior to reading the inherent disorder feature for enrollment in the database using the tag-specific ID as a database index.
  • the object-specific ID may be read before the tag-specific ID when applying a tag to an object and replacing the tag-specific ID with the object-specific ID as an index with which to access the inherent disorder information in the database.
  • the object-specific ID may not exist prior to reading the tag-specific ID, instead it may be created after, or shortly before, reading the tag-specific ID such that it is "known” without being read. For example, if the product number (the object-specific ID) is being printed on-the-fly as the product is being manufactured and the tag is being applied, the program which controls the printing of the object-specific ID (or some other program linked to it in some way) can read only the tag-specific ID as the tag is applied as it already "knows" the object-specific ID. These two numbers can be linked in the database such that the object-specific ID becomes the primary key for searching the database, alternately the tag-specific ID can be replaced in the database by the tag- specific ID.
  • steps described with reference to FIGs. 4A and 4B may be carried our manually, using tag readers to read the inherent disorder feature, the tag-specific ID, and the object-specific ID, or in an automated manner.
  • steps of the process shown in FIG. 4A may be carried out in some embodiments by machinery that manufactures the tags
  • steps of FIG. 4B may be carried out in some embodiments by an applicator device, that applies the tags to the objects.
  • FIG. 5 shows an example of a tag with a removable portion, in accordance with an embodiment of the invention.
  • the tag 500 includes an inherent disorder feature 501, such as the magnetic feature described above, on a peel-off portion 502. The location of this feature is shown by fiducial marks 504 and 506, so that a reader (not shown) can be properly aligned to read the tag 500.
  • the peel-off portion 502 may be applied to an object.
  • the tag also includes excess material 508 that remains after the peel-off portion 502, including the inherent disorder feature has been peeled off and applied to an object.
  • a barcode 510 is printed on the excess material 508 proximate to the peel-off portion 502. The barcode 510 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 501 in the database.
  • the object-specific ID is read, the tag-specific ID in the barcode 510 is read, and the tag-specific-ID is replaced by the object-specific ID as a database index for accessing data related to the inherent disorder feature 501.
  • the peel-off portion 502, which includes the inherent disorder feature 501 is then peeled away from its backing, and the excess material 508, and is applied to an object.
  • the excess material 508, including the barcode 510, which encodes the (now replaced) tag-specific ID can then be disposed of. It will be understood that peeling the peel-off portion 502 from its backing and applying it to an object can be performed manually, or by an applicator device.
  • the barcode 510 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 510. Additionally, it will be understood that in some embodiments, the barcode 510 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID, or an RFID or memory chip device. As with other embodiments, although the inherent disorder feature 501 is described as being a magnetic inherent disorder feature, the embodiment shown in FIG. 5 could be used with other types of inherent-disorder features, such as the bubble tag inherent disorder feature discussed below with reference to FIG. 6. Where the inherent disorder feature is visible to the unaided eye, fiducial marks 504 and 506 may not be needed, and may be omitted.
  • FIGs. 6A and 6B show another embodiment, in which the tag-specific ID is printed on a back surface of the backing of a tag, wherein the backing peels off when the tag is applied.
  • FIG. 6A shows the front side of a tag 600, including an inherent disorder feature 601 affixed to a tamper-evident adhesive substrate 602.
  • the inherent disorder feature 601 uses the three-dimensional layout of the bubbles within a transparent polymer for authentication purposes, as discussed in U.S. Patent 7,380,128, assigned to Novatec, SA, of Montauben, France.
  • the tag 600 includes a peel- off backing 604, which is peeled away from the tamper-evident adhesive substrate 602 when the tag 600 is applied to an object.
  • FIG. 6B shows a back surface of the peel-off backing 604, on which a barcode 606 is printed.
  • the barcode 606 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 601 in the database.
  • the object-specific ID is read, the tag-specific ID in the barcode 606 is read, and the tag-specific-ID is replaced by the object-specific ID as a database index for accessing data related to the inherent disorder feature 601.
  • the peel-off backing 604 is then peeled away from the tag 600, which is applied to the object.
  • the peel-off backing 604, which includes on its back surface the barcode 606, may be discarded and may be destroyed.
  • the barcode 606 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 606. Additionally, it will be understood that in some embodiments, the barcode 606 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID, or even electronic based identification features such as an RFID or contact memory chip.
  • FIG. 7 shows a third example embodiment, in which the tag-specific ID is on a tear-away portion 702 of a tag 700.
  • the tag 700 includes an inherent disorder feature 701, such as the magnetic feature described above, which, along with the tear-away- portion 702, is located on the tag 700 that is attached to the object. Because the magnetic inherent disorder feature may not be visible to the unaided eye, the location of the magnetic inherent disorder feature may be shown by fiducial marks 704 and 706, so that a reader (not shown) can be properly aligned to read the tag 700.
  • a barcode 708 is printed on the tear-away portion 702 of the tag 700. The barcode 708 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 701 in the database.
  • the object-specific ID is read, the tag- specific ID in the barcode 708 is read, and the tag-specific-ID is replaced by the object- specific ID as a database index for accessing data related to the inherent disorder feature 701.
  • the tear-away portion 702 of the tag 700 may be torn off of the tag 700 or otherwise separated from the tag 700, and discarded.
  • the tear-away portion 702 may be removed either before the tag 700 is attached to an object, or, in some embodiments, after the tag 700 has been attached to the object. It will be understood that, as in other embodiments, attaching the tag to an object and removing the tear-away portion 702 may be performed manually, or by an applicator device.
  • the barcode 708 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 708. Additionally, it will be understood that in some embodiments, the barcode 708 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID. As with other embodiments, although the inherent disorder feature 701 is shown as being a magnetic inherent disorder feature, a similar tear-off portion could be used to hold the tag-specific ID with other types of inherent-disorder features, such as the bubble tag inherent disorder feature discussed with reference to FIG. 6. Where the inherent disorder feature is visible to the unaided eye, fiducial marks 704 and 706 will generally not be needed, and may be omitted.
  • FIGs. 8A and B shows a method according to a further embodiment of the invention, for use with tags where authentication may be handled locally, i.e., without accessing a remote database.
  • the tag-specific ID includes authentication information sufficient to authenticate the inherent disorder feature of the tag. This authentication information may, for example, be placed in the tag-specific ID information when the tag was originally manufactured, and may be used, for example, for quality control by the manufacturer of the tag.
  • FIG 8A shows such a method of producing a tag for use with such systems.
  • step 800 a tag including an inherent disorder feature is read, for example by the manufacturer of the tag, in order to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag.
  • the authentication data is removably recorded on a removable portion of the tag.
  • recording the tag- specific ID may include encrypting at least the authentication data in the tag-specific ID.
  • the tag-specific ID may be represented as a datamatrix or other two-dimensional barcode, but it will be understood that other writable identification features, such as linear barcodes, printed digits, or other visual identifiers may be used.
  • the removable portion of the tag may be on a back surface of a tag liner, in a cut-out portion of a tag, on a portion of a tag liner or tag that is peeled away when the tag is applied, on excess material that remains when a tag is peeled away from its backing, or any other place that is in close proximity to the tag, and that can be separated from the inherent disorder feature when the tag is placed on an object.
  • FIG. 8B shows a portion of the method in which the tag is attached to an object.
  • the tag-specific ID including the authentication data is read from the removable portion of the tag. In some embodiments, this may include decrypting at least the authentication data in the tag-specific ID.
  • an object-specific ID is determined for the object to which the tag is being applied. This may involve reading the object-specific ID from the object, or (as discussed above) otherwise determining an object-specific ID for the object.
  • the object-specific ID may include information such as a serial number, a batch number, and/or a manufacturing date.
  • an object-specific tag including the object-specific ID and the authentication data from the tag-specific data is produced. In some embodiments, this may include encrypting at least the authentication data. In some embodiments, producing the object-specific tag may be accomplished by printing the object-specific ID, for example, as a datamatrix or other two-dimensional barcode.
  • the tag-specific ID is removed from the tag, and the object-specific tag and the inherent-disorder feature (from which the tag-specific ID has been removed) are applied to the object. In some embodiments, removing the tag-specific ID may be accomplished by removing the tag from its backing for application to the object.
  • the tag-specific ID may be printed on a removable portion of the tag, which may be removed either before or after the tag is applied to the object.
  • the object specific tag may be printed or otherwise produced on a nonremovable portion of a tag that includes the inherent disorder feature. For example, when the magnetic particle-based inherent disorder feature discussed above is used, the object- specific tag, including the authentication data, could be printed over the area that includes the inherent disorder feature. As above, it will be understood that the steps shown in FIGs. 8A and 8B need not be applied in the order in which they are shown and described.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Dans ses modes de réalisation, la présente invention se rapporte à une étiquette adaptée pour être utilisée dans des applications d'authentification. L'étiquette selon l'invention comprend une fonction de désordre inhérent qui peut être utilisée pour authentifier l'étiquette. L'étiquette comprend également un ID spécifique à l'étiquette, qui peut être utilisé comme index dans une base de données pour accéder à des données relatives à la fonction de désordre inhérent dans une base de données. Ceci a pour but de permettre une authentification de l'étiquette. La partie de l'étiquette qui comprend l'ID spécifique à l'étiquette peut être retirée. De cette manière, l'ID spécifique à l'étiquette est retiré de l'étiquette lorsque l'étiquette est apposée sur un objet. Dans ses modes de réalisation, la présente invention se rapporte d'autre part à un procédé dans lequel une base de données contenant des données relatives à une fonction de désordre inhérent de l'étiquette, qui suffit à authentifier l'étiquette, reçoit une instruction commandant de permettre l'accès aux données associées à l'ID spécifique à l'étiquette, au moyen d'un ID spécifique à un objet utilisé en tant qu'index. L'invention est caractérisée en ce que l'ID spécifique à l'objet est associé à un objet auquel l'étiquette doit être attachée.
PCT/SG2012/000101 2011-03-24 2012-03-26 Étiquettes basées sur un désordre inhérent, dotées d'une fonction d'identification amovible WO2012128724A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161466980P 2011-03-24 2011-03-24
US61/466,980 2011-03-24

Publications (1)

Publication Number Publication Date
WO2012128724A1 true WO2012128724A1 (fr) 2012-09-27

Family

ID=46879628

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2012/000101 WO2012128724A1 (fr) 2011-03-24 2012-03-26 Étiquettes basées sur un désordre inhérent, dotées d'une fonction d'identification amovible

Country Status (1)

Country Link
WO (1) WO2012128724A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015140731A1 (fr) * 2014-03-18 2015-09-24 3D-Oxides Procédé de dépôt basé sur un masque de pochoir et son application à la fabrication d'étiquettes comportant des codes traçables multifonctionnels

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006016114A1 (fr) * 2004-08-13 2006-02-16 Ingenia Technology Limited Vérification de l’authenticité d’articles employant une banque de données
WO2009105040A1 (fr) * 2008-02-19 2009-08-27 Bilcare Technologies Singapore Pte. Ltd. Dispositif de lecture destiné à identifier une étiquette ou un objet prévu pour être identifié, procédés et systèmes apparentés
US20100179914A1 (en) * 2008-12-08 2010-07-15 Basf Se Marking of products
WO2012033467A1 (fr) * 2010-09-08 2012-03-15 Bilcare Technologies Singapore Pte. Ltd. Unité d'un seul tenant pour lire des informations d'identification basées sur un désordre inhérent

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006016114A1 (fr) * 2004-08-13 2006-02-16 Ingenia Technology Limited Vérification de l’authenticité d’articles employant une banque de données
WO2009105040A1 (fr) * 2008-02-19 2009-08-27 Bilcare Technologies Singapore Pte. Ltd. Dispositif de lecture destiné à identifier une étiquette ou un objet prévu pour être identifié, procédés et systèmes apparentés
US20100179914A1 (en) * 2008-12-08 2010-07-15 Basf Se Marking of products
WO2012033467A1 (fr) * 2010-09-08 2012-03-15 Bilcare Technologies Singapore Pte. Ltd. Unité d'un seul tenant pour lire des informations d'identification basées sur un désordre inhérent

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015140731A1 (fr) * 2014-03-18 2015-09-24 3D-Oxides Procédé de dépôt basé sur un masque de pochoir et son application à la fabrication d'étiquettes comportant des codes traçables multifonctionnels
US10280506B2 (en) 2014-03-18 2019-05-07 3D-Oxides Deposition process based on stencil mask and application to the fabrication of tags supporting multi-functional traceable codes
CN110079783A (zh) * 2014-03-18 2019-08-02 3D-奥克赛茨公司 标签装置、其用途和用于标签装置的包装

Similar Documents

Publication Publication Date Title
JP5235868B2 (ja) オブジェクト識別方法並びに読み取りデバイス
US8297523B2 (en) Secure barcode
US20090309733A1 (en) Identification tags, objects adapted to be identified, and related methods, devices and systems
US20170355215A1 (en) Process of forming an identification marking, and an identification marking formed by way of such a process
CN104428798A (zh) 用于明确标记对象的方法
US8469282B2 (en) Optically readable identification security tag or stamp
WO2011077459A2 (fr) Procédé d'extraction de caractéristiques naturellement chiffrées d'une surface naturelle d'un produit
US20220085992A1 (en) Devices, systems, and methods using microtransponders
JP2010518473A (ja) 仮想コード窓
CN111882327A (zh) 一种具备身份特征可主动向系统反馈信息的防伪溯源方法
CN103857531B (zh) 用于印刷产品的防伪标记的方法和系统
BG66377B1 (bg) Шифриранамаркировкаиметодзазащитаиудостоверяванеоригиналносттанапродукти
WO2012128724A1 (fr) Étiquettes basées sur un désordre inhérent, dotées d'une fonction d'identification amovible
RU2165643C1 (ru) Способ подтверждения подлинности информации
CN201662818U (zh) 激光标刻多重加密二维码指纹防伪认证装置
RU2759259C1 (ru) Система маркировки и проверки подлинности объекта
WO2024033960A1 (fr) Étiquette d'identification d'article, système d'identification d'article et procédé d'identification d'article
AU2021243749B2 (en) Mechanically stamped unique features for authenticity and provenance tracking
Jotcham Authentication, antitamper, and track-and-trace technology options to protect foods
CN104881784A (zh) 产品验证
WO2013064806A1 (fr) Agencement d'identification
AU2013101090A4 (en) Secure Object System
GB2524099A (en) Secure product authentication
JP2005010948A (ja) 真偽判定システム
CZ20002052A3 (cs) Magnetický, kovový nebo magneticko-kovový ochranný prostředek mající vícenásobné ochranné charakteristické znaky, způsob jeho výroby a způsob ověřování jeho pravosti

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12760361

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12760361

Country of ref document: EP

Kind code of ref document: A1