WO2015058793A1 - Procédé de production d'un produit support avec un code d'authentification - Google Patents
Procédé de production d'un produit support avec un code d'authentification Download PDFInfo
- Publication number
- WO2015058793A1 WO2015058793A1 PCT/EP2013/072167 EP2013072167W WO2015058793A1 WO 2015058793 A1 WO2015058793 A1 WO 2015058793A1 EP 2013072167 W EP2013072167 W EP 2013072167W WO 2015058793 A1 WO2015058793 A1 WO 2015058793A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication code
- bearing
- product
- parameter
- formula
- Prior art date
Links
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 18
- 238000000034 method Methods 0.000 claims abstract description 22
- 238000004590 computer program Methods 0.000 claims description 13
- 229920000642 polymer Polymers 0.000 claims description 12
- 238000005096 rolling process Methods 0.000 claims description 7
- FZNCGRZWXLXZSZ-CIQUZCHMSA-N Voglibose Chemical compound OCC(CO)N[C@H]1C[C@](O)(CO)[C@@H](O)[C@H](O)[C@H]1O FZNCGRZWXLXZSZ-CIQUZCHMSA-N 0.000 claims description 3
- 238000001514 detection method Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000010330 laser marking Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 150000001875 compounds Chemical group 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005530 etching Methods 0.000 description 1
- 239000004519 grease Substances 0.000 description 1
- 238000001746 injection moulding Methods 0.000 description 1
- 238000010329 laser etching Methods 0.000 description 1
- 238000007648 laser printing Methods 0.000 description 1
- 238000003754 machining Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000000691 measurement method Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 229910001220 stainless steel Inorganic materials 0.000 description 1
- 239000010935 stainless steel Substances 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F16—ENGINEERING ELEMENTS AND UNITS; GENERAL MEASURES FOR PRODUCING AND MAINTAINING EFFECTIVE FUNCTIONING OF MACHINES OR INSTALLATIONS; THERMAL INSULATION IN GENERAL
- F16C—SHAFTS; FLEXIBLE SHAFTS; ELEMENTS OR CRANKSHAFT MECHANISMS; ROTARY BODIES OTHER THAN GEARING ELEMENTS; BEARINGS
- F16C41/00—Other accessories, e.g. devices integrated in the bearing not relating to the bearing function as such
- F16C41/008—Identification means, e.g. markings, RFID-tags; Data transfer means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
Definitions
- the invention relates to a method for producing a bearing product having an authentication code, to a computer program for authenticating such a bearing product and to a portable computer device with means to execute such a computer program.
- the document DE 10201 107641 1 A1 discloses a method for authenticating a bearing.
- a product is provided with an identifier in the form of a data-matrix-code applied using etching, laser marking or printing in a permanent way.
- the authentication code is read by a mobile device and sent to a central data processing which checks whether or not an authentication code corresponds to an existing product or not. In cases of doubt, the user may be requested to provide further data of the product.
- the method disclosed in DE 10201 107641 1 A1 is unable to detect counterfeits which are copies from existing products including a valid authentication code, wherein the authentication code is copied as well.
- the invention seeks to solve the above drawbacks of the prior art and to provide a method for manufacturing a bearing product provided with an authentication code which is difficult or impossible to imitate and/or which enables a reliable detection of counterfeits even when the counterfeits are provided with a copy of an existing authentication code.
- the invention starts from a method for producing a bearing product associated with at least one product parameter.
- the method comprises the steps of generating at least one authentication code using at least one formula and applying the authentication code to the product.
- Parameters for the formula may include the location of production, e.g. the country, factory and general number, the time of production, i.e. the year, the date, the hour, the minute and the second. It is proposed that the parameters used by the method include at least one geometrical property of the product.
- the geometrical properties include in particular macro- geometrical properties like bore diameter, width, number of rolling elements.
- the method may comprise the step of measuring at least one parameter describing a geometrical property of the product. The parameter describing the geometrical property is then used as at least one of the input parameters of the at least one formula. Authenticating the product is possible if the geometrical property and the formula are known.
- Copying the authentication code and applying it onto a product not sharing the geometrical property with the genuine product will result in a counterfeit being easily detectable.
- the detection of counterfeits may be facilitated and simplified.
- the bearing product may be a roller bearing, a ball bearing of any kind, a bearing part such as a bearing ring or a compound unit including a bearing.
- the bearing product may or may not include a bearing package and the authentication code may be applied directly onto the bearing or bearing product, i.e. to a stainless steel part thereof, or onto a package or onto a seal of the package.
- this step of generating at least one authentication code includes converting the results of the formula into a baseN number.
- the baseN number may be a base-6-Number of base-36-Number and enables qualifying more authentication information into a given number of digits.
- Parameters for the formula may include the location of production, e.g. the country, factory and general number, the time of production, i.e. the year, the date, the hour, the minute and the second.
- the geometrical property may in particular include a macro-geometrical property such as the bore diameter, outer diameter, width, number of rolling elements, etc. and/or a micro-geometrical property such as the exact outer diameter within a range of tolerance, which can be considered a random outcome of production, the exact inner diameter or the width.
- the micro-geometrical property may include the exact diameter of the rolling elements and should preferably be a property that is not subject to wear during the bearing operation, e.g. the exact raceway shoulder height. Since these properties are random, a bearing produced by a counterfeiter will most likely have a different set of properties since it is impossible to machine e.g. an inner diameter with an accuracy as high as the measurement accuracy.
- the counterfeiter cannot copy a valid security number from an existing bearing of the same type since the micro-geometry will still be different.
- the requirement to reproduce exactly the same geometry will eliminate the cost advan- tages of a counterfeiter such that copying the product will no longer be financially attractive.
- the formula may contain a random element, such that the factors of the formula change depending on the value of the random factor.
- the first digit of the security number could be random and determine the factors used to compute the other digits, e.g. as a seed of a random number generator.
- the formula contains multiple complexity levels, e.g. including multiplications with large digits or prime numbers and modulo divisions of the result such that the formula is practically impossible to reverse.
- a further potential security feature could include small dimples provided at a defined location of the bearing, wherein the position, depth or arrangement of the dimples could be used as input parameter for the formula used to generate the authentication code for the product.
- the authentication code could be applied e.g. using laser marking, etching or other permanent printing techniques or the product could be provided with an RFID tag containing the security number in an encrypted format that cannot be created by the counterfeiter without knowing an encryption key and which cannot be read without knowledge of the encryption key from an existing bearing.
- the bearing is provided with a polymer cage, polymer seal or a rubber seal, wherein the RFID tag is integrated into the cage or seal during injection molding. This prevents the possibility of re-using RFID tags from existing bearings.
- the box or package of the bearing is provided with a code that is linked with the security number of the bearing as described above and to the geometrical properties.
- This code could be provided as a further input parameter for the formula.
- the provision of such an additional code on the package makes it impossible to counterfeit a properly packaged bearing.
- the code could be directly printed onto the box, or a sticker could be put on the box or used as a seal for the box.
- the bearing with at least one molded polymer part, wherein the authentication code is applied on means integrally molded with the polymer part.
- the polymer part should be a part constitutive for the function of a bearing which is difficult to remove or to exchange, preferably, the polymer part is a cage for guiding rolling elements of the bearing.
- a further aspect of the invention relates to a computer program for authenticating the bearing product produced as described above.
- the computer product could be configured to read an authentication code and a measured parameter describing the geometrical property from an input interface.
- the input interface could be a user interface wherein the user may input the required data manually or could be formed as a camera or scanner or the like, wherein the geometrical properties could be determined automatically or semi-automatically using suitable image processing algorithms.
- the computer program then internally generates the authentication code using the at least one formula and the parameters input via the input interface and compares the thus generated authentication code with the authentication code read from the interface. If the authentication codes are identical, the product is a genuine product and the product is a counterfeit if this is not the case. Finally, the result of the comparison is outputted as authentication result information.
- the step of generating the authentication code includes sending the measured parameter describing the geometrical property to a secure server and receiving in response the authentication code and/or other parameters such as random numbers or decryption keys for use in the formula from the security server.
- Fig. 1 illustrates a bearing product provided with a security code applied to one of the bearing rings according to a first embodiment of the invention.
- Fig. 2 illustrates a bearing product provided with a security code stored in an RFID tag integrally molded with a polymer cage of the bearing.
- Fig. 3 illustrates a method for providing a bearing with an authentication code according to the invention.
- Fig. 4 illustrates a flow diagram of a computer program for authenticating a product according to the invention.
- Fig. 5 illustrates a computer system for authenticating bearings according to the invention. Detailed Description of the Embodiments
- Fig. 1 illustrates a bearing including an outer ring 12, an inner ring 10, a plurality of rolling elements 14 arranged in between and a cage 16.
- the outer ring 12 is provided with an engraved or laser-printed authentication code 18 in a base36 format (digits from 0-9 and capital letters).
- the inner ring 10 is provided with further engraved information numbers 20a, 20b, including a product identifier 20a describing the bearing type and a further code 20b describing the production factory and production time.
- Fig. 2 is a further embodiment of the invention, wherein an RFID tag 22 is integrally molded with the cage 16 of the bearing, which is formed as a polymer part in this case.
- the authentication code 18 is stored in an encrypted form on the RFID tag 22. This makes it very difficult or impossible to counterfeit a bearing even if the formula is known, as long as the secret encryption key to program and read the RFID tag 22 is not disclosed.
- the authentication code 18 is applied in a separate production step using a dedicated machine employing a technology which may be different from the technology employed for writing the further engraved information numbers 20a, 20b on the inner ring 10.
- FIG. 1 For embodiments where the authentication code 18 is printed onto a package box (not illustrated) of the bearing or onto a seal of this box or where the polymer part into which the storage means, such as the RFID tag, 22 is integrated, is a rubber seal of the bearing.
- the authentication code 18 may comprise multiple portions applied to different parts of the product using different technologies.
- the method for generating the authentication code 18 is illustrated very schematically in Fig. 3.
- Step S1 various micro-geometrical properties and/or macro-geometrical properties are measured.
- these properties include, but are not limited to:
- parameters representative of a machining texture of machined surfaces of the bearing may be measured in Step S1 .
- this step S1 is executed in an at least semi-automated, preferably fully automated way using microscopes or laser measurement techniques and suitable image processing algorithms.
- step S1 The parameters obtained in step S1 describing geometrical properties of the bearing in a wide sense could be used as input parameters for step S2.
- the actual authentication code 18 is then generated in Step S2 using a formula, which is preferably difficult to invert based on an analysis of the measurable parameters measured in Step 1 alone.
- Step S2 of generating the at least one authentication code 18 includes converting the result of the formula into the base36 number which will be applied to for example the outer ring 12 or encoded into the RFID tag 22.
- the step of generating the at least one authentication code 18 includes an encrypting step, wherein a quantity at least depending on at least one of the parameters determined in step 2 is encrypted using a predetermined encryption key.
- step S2 maps the parameter space of the parameters measured in step S1 onto a dilute subset of the natural numbers repre- sentable as the base36 numbers with the given number K of digits used for the authentication code 18, wherein "dilute” may mean e.g. that only one randomly generated base36 number with K digits per 100.000 is compatible with a specific set of input parameters.
- step S3 the thus generated authentication code 18 is finally applied to the product using any of the technologies outlined above.
- Fig. 4 schematically illustrates a flow diagram for a computer program for authenticating a bearing product produced as described above.
- a computer provided with the program is configured to read in step C1 the authentication code 18 and a set of measured parameters corresponding to the parameters measured in step S1 of the production method from an input interface such as a keyboard, camera or communication interface.
- step C2 the authentication code 18 is generated based on the measured parameters using the same formula as the one used in step S2 above, wherein the parameters read in step S1 are used as input parameters.
- step C3 the thus generated authentication code 18 is compared with the authentication code 18 read from the interface.
- step C4 the authentication result information depending on the result of the comparison is output to a communication inter face and/or to a display.
- the parameters of the authentication procedure i.e. the parameters and the authentication code 18 received in step C1 and the result of the authentication, are stored in a database.
- the database may be used to make statistics on counterfeits detected for the given product and/or for given 5 regions in the world, in order to monitor trends or activities helping the anti- counterfeiting. If a record for a given authentication code 18 exists in the database when an inquiry with the same authentication code 18 is received, this means that either the same bearing was examined twice or that one of the two bearings carrying the same unique authentication code 18 is a i o counterfeit. A corresponding warning message may then be issued.
- Fig. 5 illustrates a system setup implementing an authentication method according to the invention.
- the setup includes a microscope 24 for measuring the parameters, a mobile device 26, such as a notebook computer or smartphone running a suitable 15 application software, and a remote security server 28.
- the computer program as described above with reference to Fig. 4 is implemented in the security server 28.
- the computer program is modified such that the step of generating the one authentication code 18 includes 20 receiving the measured parameter describing the geometrical property by the
- security server 28 from the mobile device 26 and sending in response the authentication code 18 and/or other parameters for use in the formula from the security server 28.
- step C1 The receipt of the data packet with the measured parameters and the authentication code 18 in the security server 28 corresponds to step C1 above, and the sending of the response corresponds to step C4.
- the computer program is implemented in the 30 mobile device 26, wherein the step of generating the authentication code 18
- the parameters may include encryption keys or other secret parameters needed in the formula.
- the invention makes it impossible for a counterfeiter not knowing the formula used by the manufacturer to generate a correct authentication code 18 for the counterfeit bearing.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Human Resources & Organizations (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Mechanical Engineering (AREA)
- Rolling Contact Bearings (AREA)
Abstract
La présente invention concerne un procédé de fabrication d'un produit support doté d'un code d'authentification (18) qui est difficile voire impossible à imiter et/ou qui permet une détection fiable des contrefaçons, même lorsque les contrefaçons sont fournies avec une copie d'un code d'authentification (18) existant. Le procédé comprend les étapes de génération d'au moins un code d'authentification (18) à l'aide d'au moins une formule et d'application du code d'authentification (18) au produit. Le procédé peut aussi comprendre l'étape de détermination d'au moins un paramètre du produit. Le paramètre est ensuite utilisé comme paramètre d'entrée de la au moins une formule.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2013/072167 WO2015058793A1 (fr) | 2013-10-23 | 2013-10-23 | Procédé de production d'un produit support avec un code d'authentification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2013/072167 WO2015058793A1 (fr) | 2013-10-23 | 2013-10-23 | Procédé de production d'un produit support avec un code d'authentification |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015058793A1 true WO2015058793A1 (fr) | 2015-04-30 |
Family
ID=49474419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2013/072167 WO2015058793A1 (fr) | 2013-10-23 | 2013-10-23 | Procédé de production d'un produit support avec un code d'authentification |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2015058793A1 (fr) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020186134A1 (en) * | 2001-06-11 | 2002-12-12 | The Timken Company | Bearing with data storage device |
GB2411997A (en) * | 2004-03-10 | 2005-09-14 | Advanced Analysis And Integrat | Product authentication |
US20060290507A1 (en) * | 2005-06-23 | 2006-12-28 | Roland Greubel | Linear motion device with an RFID tag |
WO2011076229A1 (fr) | 2009-12-22 | 2011-06-30 | Aktiebolaget Skf | Procédé de fabrication d'un élément de roulement |
WO2011076294A1 (fr) * | 2009-12-22 | 2011-06-30 | Aktiebolaget Skf | Procédé de marquage d'une surface d'élément métallique avec modification des séquences dans lesquelles les segments des marquages sont formés |
DE102011076411A1 (de) | 2011-05-24 | 2012-11-29 | Schaeffler Technologies AG & Co. KG | Verfahren und Vorrichtung zum Authentisieren eines Produkts |
-
2013
- 2013-10-23 WO PCT/EP2013/072167 patent/WO2015058793A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020186134A1 (en) * | 2001-06-11 | 2002-12-12 | The Timken Company | Bearing with data storage device |
GB2411997A (en) * | 2004-03-10 | 2005-09-14 | Advanced Analysis And Integrat | Product authentication |
US20060290507A1 (en) * | 2005-06-23 | 2006-12-28 | Roland Greubel | Linear motion device with an RFID tag |
WO2011076229A1 (fr) | 2009-12-22 | 2011-06-30 | Aktiebolaget Skf | Procédé de fabrication d'un élément de roulement |
WO2011076294A1 (fr) * | 2009-12-22 | 2011-06-30 | Aktiebolaget Skf | Procédé de marquage d'une surface d'élément métallique avec modification des séquences dans lesquelles les segments des marquages sont formés |
DE102011076411A1 (de) | 2011-05-24 | 2012-11-29 | Schaeffler Technologies AG & Co. KG | Verfahren und Vorrichtung zum Authentisieren eines Produkts |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11374756B1 (en) | Tracking apparel items using distributed ledgers | |
US10320567B2 (en) | Security scheme for authenticating object origins | |
US10142833B2 (en) | Methods, systems and apparatus for recognizing genuine products | |
JP2017174456A (ja) | 可搬物品のモニター | |
CN105469132A (zh) | 二联编码的物联网溯源防伪标签及二维码防伪溯源方法 | |
US20070170240A1 (en) | Method and system for deterring product counterfeiting, diversion and piracy on a single system | |
JP2020516092A (ja) | 複合二次元バーコード、電子証書媒体、生成、読取装置および方法 | |
US20070215685A1 (en) | System and Method of Product Identification Using a URL | |
US20070234058A1 (en) | System and method for authenticating products | |
CN108352066B (zh) | 密封件篡改检测方法 | |
CN112258376B (zh) | 一种加密文档的处理方法及系统 | |
RU2651167C2 (ru) | Способ и система для маркировки изделия, изделие, промаркированное таким образом, и способ и система для аутентификации промаркированного изделия | |
CN101388086A (zh) | 产品防伪及物流监控系统的数字编码方法 | |
CN110310130B (zh) | 一种防伪方法及系统 | |
CA2857917A1 (fr) | Procede de protection de l'authenticite d'un article contre l'imitation et la contrefacon | |
US8243930B2 (en) | Counterfeit prevention system based on random processes and cryptography | |
Ting et al. | A two-factor authentication system using radio frequency identification and watermarking technology | |
CN103857531A (zh) | 用于印刷产品的防伪标记的方法和系统 | |
US20200311245A1 (en) | Authenticating object instances | |
WO2015058793A1 (fr) | Procédé de production d'un produit support avec un code d'authentification | |
CN116091087A (zh) | 一种基于区块链和nfc的量子加密防伪溯源方法及终端 | |
WO2013120511A1 (fr) | Système permettant de fournir des informations supplémentaires sur un produit à la vente, en particulier pour prévenir les pratiques de fraude | |
CN105631678A (zh) | 部件防伪方法和装置 | |
WO2021251849A1 (fr) | Protection contre les contre-façons et les faux à l'aide de codes uniques | |
HU226286B1 (hu) | Jogjegyrendszer termékek jogosítottságának megjelölésére és ellenõrzésére, és eljárás adott termék forgalomba hozatali jogosítottságának feltüntetésére |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13780141 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13780141 Country of ref document: EP Kind code of ref document: A1 |