WO2021144035A1 - Procédé de sortie d'un état d'au moins un sceau, sceau et système - Google Patents

Procédé de sortie d'un état d'au moins un sceau, sceau et système Download PDF

Info

Publication number
WO2021144035A1
WO2021144035A1 PCT/EP2020/051183 EP2020051183W WO2021144035A1 WO 2021144035 A1 WO2021144035 A1 WO 2021144035A1 EP 2020051183 W EP2020051183 W EP 2020051183W WO 2021144035 A1 WO2021144035 A1 WO 2021144035A1
Authority
WO
WIPO (PCT)
Prior art keywords
seal
identifier
data
processing unit
terminal
Prior art date
Application number
PCT/EP2020/051183
Other languages
German (de)
English (en)
Inventor
René TOTH
Mario STOFFEL
Original Assignee
Stoba Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stoba Ag filed Critical Stoba Ag
Priority to EP20701308.7A priority Critical patent/EP4091157A1/fr
Priority to PCT/EP2020/051183 priority patent/WO2021144035A1/fr
Publication of WO2021144035A1 publication Critical patent/WO2021144035A1/fr

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0297Forms or constructions including a machine-readable marking, e.g. a bar code
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0305Forms or constructions of security seals characterised by the type of seal used
    • G09F3/0329Forms or constructions of security seals characterised by the type of seal used having electronic sealing means
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0305Forms or constructions of security seals characterised by the type of seal used
    • G09F3/0329Forms or constructions of security seals characterised by the type of seal used having electronic sealing means
    • G09F3/0335Forms or constructions of security seals characterised by the type of seal used having electronic sealing means using RFID tags
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0305Forms or constructions of security seals characterised by the type of seal used
    • G09F3/0347Forms or constructions of security seals characterised by the type of seal used having padlock-type sealing means
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/03Forms or constructions of security seals
    • G09F3/0394Forms or constructions of security seals with violation indication by generating a random number
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/08Fastening or securing by means not forming part of the material of the label itself
    • G09F3/18Casings, frames or enclosures for labels
    • G09F3/20Casings, frames or enclosures for labels for adjustable, removable, or interchangeable labels
    • G09F3/208Electronic labels, Labels integrating electronic displays

Definitions

  • the present invention relates to a method for
  • Seals are used to seal containers such as
  • seals are used to make a manipulation that has taken place reliably recognizable.
  • seals can contain a lead seal, a security label or any other security element.
  • Seals can also include carriers serving the same purpose, which are or can be connected to a product and which allow a control function comparable to a seal. Seals can be issued by the publisher to customers or users, for example in the form of a batch.
  • the object of the present invention is to provide a method for outputting a status of at least one seal, a seal and a system for outputting a status of at least one seal which do not have the disadvantages mentioned above.
  • the method according to the invention for outputting at least one state of at least one seal comprises: in a security element of the seal, generating an identifier in connection with a state of the seal, and outputting the identifier; Reading of the issued identifier through a terminal; in the terminal, generating identification data in connection with the identification that has been read out; Transmitting the identification data from the terminal to a remote data processing unit; in the remote data processing unit, processing the identification data in such a way that status information about the status of the seal is generated; and outputting the status information to at least one further processing unit.
  • the scanned identifier can be compared with identifiers stored in the data processing unit.
  • the scanned identifier can be subjected to an operation in the data processing unit, by means of which it is determined whether the identifier is correct or whether it was issued by the publisher.
  • the identifier is not statically printed or applied to the seal, but is displayed on the display unit.
  • the identifier can be displayed in a changeable manner. This possibility of changing the identifier can make manipulation much more difficult.
  • the data processing unit can be associated with the publisher. Alternatively or additionally, the data processing unit can be associated with the customer.
  • the security element is designed to detect an unused or used state of the seal.
  • One advantage of this embodiment is the reliable determination of current set or used seals. This status can be sent to the data processing unit via the terminal essentially at the same time as a seal is set.
  • a further processing unit of the publisher which is in communication with this can, for example, always compare a batch stored in a database of the further processing unit to the seals issued for each customer. As soon as the status is reported that a seal has currently been set or is being used, this seal can be deducted from the stock of the issued batch that was originally delivered to the customer.
  • the identifier is displayed via a display unit attached to the seal.
  • the identifier can thus be reliably photographed or photographed by the display unit.
  • the scanned identifier can contain an allocation number of the seal.
  • the publisher may be able to prepare and send new seals in good time as soon as it can be seen that the inventory of seals per customer has fallen below a predetermined number.
  • the publisher can of course also provide the customer with information about the number of seals used or still available be made accessible.
  • the information can be exchanged, for example, via appropriate communication units on the part of the publisher and customer, for example via the Internet, via a data server (cloud), etc.
  • both the publisher and the customer know how many seals are left per batch.
  • both the publisher and the customer can be aware that the customer may be about to place a new order for seals.
  • the identifier is an optically scannable identifier, in particular a barcode or a 2D code.
  • the barcode or 2D code can be generated in a standardized manner and carry information about whether the seal has been set or not.
  • the code can contain information about the seal used, e.g. an identification number.
  • the code can carry any further information in connection with the seal, e.g. time, place and person in connection with the setting of the seal.
  • the code can be generated using a proprietary process, which can make manipulation by third parties more difficult.
  • the terminal includes an image recording device.
  • the terminal contains a wireless transmission unit.
  • the terminal is a mobile phone, in particular a smartphone.
  • a program issued by the publisher for example an app, can be stored in the smartphone, with the program having access to the camera of the smartphone can have.
  • the app can also be designed to convert and / or transmit the optical identifier into identifier data.
  • the identifier is generated as a function of a sealed or unsealed state of the seal.
  • the sealed state of the seal can thus be recorded in a tamper-proof manner and this information can be transmitted to the publisher.
  • other states of the seal can be indicated via the identifier.
  • the publisher's further processing unit is designed to verify the seal based on the status information.
  • the further processing unit of the publisher is designed to determine a number of sealed and / or unsealed seals from at least one set of seals based on the status information. This method can make it possible for the customer to receive new seals in good time if it turns out that the supply of seals falls below a predetermined number.
  • the set of seals contains a batch of seals which can be assigned to a customer.
  • the step of reading out the displayed identifier further includes the step of acquiring geolocation data of the respective location, acquiring login data, and / or acquiring time data.
  • the geolocation data are transmitted together with the identification data from the terminal to the remote data processing unit. The geolocation enables the publisher and / or customer to record at which place and, for example, at what time the seal was set. It is also possible to use login data, for example, to record which person has set the seal.
  • the status information is at least partially transmitted to a processing unit of the customer.
  • the customer can possibly also access information about the condition, number, etc. of his respective seals independently of the publisher.
  • a seal comprises a closure element, a security element and a display unit, the security element being designed to generate an identifier in connection with a state of the seal and to display the identifier on the display unit.
  • the seal according to the invention can be reliably verified on the basis of the displayed identifier by photographing the identifier. Since the identifier is not statically printed on the seal, but can be displayed variably via the display unit, manipulation is made more difficult. For example, the identifier can be compared with identifiers stored in a data processing unit. In another example, the detected identifier are subjected to an operation in the data processing unit, by which it is determined whether the identifier is correct or was issued by the publisher. Any known or future code verification processes can be used. It can also be identified promptly whether or not the seal has been set or used.
  • the security element is designed to generate the identifier as a function of at least one: the state of the seal and an identification of the seal.
  • the identifier can contain information about whether the seal is in use or not. The information can also carry an identification number of the seal and a variable code which can be used for verification.
  • the seal comprises at least one of a seal and a security label. Any known or future types of security element can be used as a seal.
  • a system for outputting at least one state of at least one seal comprises: at least one seal comprising a closure element, a security element and a display unit, the security element being designed to generate an identifier in connection with a state of the seal and the identifier on the Display unit display; on Terminal which is designed to read out the outputted identifier, to generate identifier data in connection with the readout identifier, and to transmit the identifier data; a remote data processing unit which is designed to receive the identification data, to process the identification data in such a way that status information about the status of the seal is generated, and to output the status information to at least one further processing unit.
  • a detected status of a seal is sent via the terminal to the data processing unit, and a further processing unit of the publisher in communication with this can currently compare a batch of seals issued per customer in a database. As soon as, for example, the status is reported that a seal is currently set or used, this seal can be deducted from the inventory of the batch issued.
  • the detected identifier can contain an allocation number of the seal, so that it is possible to determine exactly which seals are still available or not set and which of the respective seals are currently in use or are set. This means that new seals can be prepared and sent in good time.
  • FIG. 1 shows a schematic view of a seal according to the present invention in an unset state
  • FIG. 2 is a schematic view of the seal from FIG.
  • FIG. 1 shows schematically a seal 10 according to the present invention in an unset or unsealed state
  • FIG. 2 shows a schematic view of the seal from FIG. 1 in a set or sealed state.
  • the seal 10 is shown or embodied as a seal 10 in the examples shown.
  • the seal 10 can also be embodied as another security element, for example as a security label, etc.
  • the seal 10 contains a seal body 12 and a cable 14, for example a plastic strip, which is firmly connected at one end to the seal body 12 and is provided with latching elements 16 'at the other end.
  • the cable 14 can be severable and can contain, for example, a plastic material.
  • the latching elements 16 'at the end of the cable 14 can be correspondingly shaped in a bushing 17 Latching elements 16 ′′ are engaged (see FIG. 2).
  • the leadthrough 17 can be firmly attached to the seal body 12, for example it can be cast in one piece with it. In this state, the seal 10 is set or in use and fulfills its purpose for sealing.
  • the arrangement of cable 14, latching elements 16 ′, 16 ′′ and passage 17 can also be defined as a closure element.
  • the seal body 12 can contain a detection device 18 which detects the current state of the seal 10, i.e. whether the seal 10 is in an unset state (see FIG. 1) or in a set state (see FIG. 2).
  • the detection device 18 communicates the respective state of the seal 10 to a security element 20 which is also included in the seal body 12.
  • the security element 20 is adapted to generate an identifier 22 in connection with the state of the seal 10.
  • This identifier 22 can be communicated to a display unit 24 which displays the identifier 22 in an externally visible manner.
  • This identifier 22 can be a 2-dimensional code (2D code).
  • the identifier 22 can be any other optically scannable identifier, for example a barcode, etc.
  • the display unit 24 shows different identifiers 22 in connection with the set and unset state of the seal 10 . After the seal 10 has been set (see FIG. 2), the identifier 22 displayed or output via the display unit 24 can be read out by a terminal device 26.
  • the identifier 22 can be photographed or photographed by a mobile phone, for example a smartphone 26, of a customer, employee, etc., as shown in FIG. 2.
  • the identifier 22 can be displayed on a display of the smartphone 26.
  • identification data 28 can be generated in connection with the identification 22 that has been read out.
  • freely available or proprietary software (app) that is issued by an issuer H of the seal 10 can be used for this purpose.
  • identification data 28 can be transmitted directly or indirectly from the terminal 26 to a remote data processing unit 30 of the publisher H.
  • the identification data 28 can be stored in an accessible data server 32, also referred to as a cloud.
  • the identification data 28 can be processed, for example, in such a way that the
  • Status information about the status of the seal is generated and output. This status information can be output to at least one further processing unit 34 ′, 34 ′′ of the publisher H.
  • the identification data 28 in the data server 32 can alternatively or additionally be accessed by means of a processing unit 36 of the customer K.
  • the further processing unit 34 ′, 34 ′′ of the publisher H is designed, for example, to precisely verify a respective seal 10 based on the status information. For example, a number of sealed and / or unsealed seals are determined from at least one set of seals based on the status information, this set of seals corresponding to a batch of seals that can be assigned to a customer, for example an assignable delivery.
  • geolocation data of the respective location can also be recorded. Geolocation will make it possible to record exactly where and possibly also at what time the seal was scanned or scanned.
  • the geolocation data can be generated by the smartphone 26, for example by means of GPS, and transmitted together with the identification data 28 from the smartphone 26 to the remote data processing unit 30 or the data server 32.
  • login data can be generated which give an indication of which person has photographed the seal.
  • Time data can also be generated, which give a precise indication of the point in time at which the seal was scanned.
  • the login data and / or time data can be transmitted together with the identification data 28 to the remote data processing unit 30 or the data server 32.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne un sceau (10) qui comprend un élément de fermeture (14, 16', 16'', 17), un élément de sécurité (20) et une unité d'affichage (24). L'élément de sécurité (20) est conçu pour générer un code (22) associé à un état du sceau (10) et pour afficher ledit code (22) sur l'unité d'affichage (24).
PCT/EP2020/051183 2020-01-17 2020-01-17 Procédé de sortie d'un état d'au moins un sceau, sceau et système WO2021144035A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20701308.7A EP4091157A1 (fr) 2020-01-17 2020-01-17 Procédé de sortie d'un état d'au moins un sceau, sceau et système
PCT/EP2020/051183 WO2021144035A1 (fr) 2020-01-17 2020-01-17 Procédé de sortie d'un état d'au moins un sceau, sceau et système

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2020/051183 WO2021144035A1 (fr) 2020-01-17 2020-01-17 Procédé de sortie d'un état d'au moins un sceau, sceau et système

Publications (1)

Publication Number Publication Date
WO2021144035A1 true WO2021144035A1 (fr) 2021-07-22

Family

ID=69182521

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2020/051183 WO2021144035A1 (fr) 2020-01-17 2020-01-17 Procédé de sortie d'un état d'au moins un sceau, sceau et système

Country Status (2)

Country Link
EP (1) EP4091157A1 (fr)
WO (1) WO2021144035A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114664174A (zh) * 2022-02-28 2022-06-24 厦门英诺尔信息科技有限公司 一种不可逆的电子铅封封签方法及终端

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1450300A1 (fr) * 2003-02-24 2004-08-25 European Community Dispositif de scellé à transpondeur multiple
EP3065120A2 (fr) * 2015-03-04 2016-09-07 Kalvotuonti I.M.P.I. Oy Dispositif d'étanchéité de sécurité optique et système de suivi intelligent correspondant
WO2017184596A1 (fr) * 2016-04-18 2017-10-26 Thin Film Electronics Asa Étiquette intelligente d'étiquette ayant un capteur de continuité sur un substrat ayant une direction de déchirure préférentielle et système la comprenant
GB2562048A (en) * 2017-05-02 2018-11-07 Saralon Gmbh Security Label

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1450300A1 (fr) * 2003-02-24 2004-08-25 European Community Dispositif de scellé à transpondeur multiple
EP3065120A2 (fr) * 2015-03-04 2016-09-07 Kalvotuonti I.M.P.I. Oy Dispositif d'étanchéité de sécurité optique et système de suivi intelligent correspondant
WO2017184596A1 (fr) * 2016-04-18 2017-10-26 Thin Film Electronics Asa Étiquette intelligente d'étiquette ayant un capteur de continuité sur un substrat ayant une direction de déchirure préférentielle et système la comprenant
GB2562048A (en) * 2017-05-02 2018-11-07 Saralon Gmbh Security Label

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114664174A (zh) * 2022-02-28 2022-06-24 厦门英诺尔信息科技有限公司 一种不可逆的电子铅封封签方法及终端

Also Published As

Publication number Publication date
EP4091157A1 (fr) 2022-11-23

Similar Documents

Publication Publication Date Title
EP2849142B1 (fr) Maintenance assistée par smartphone d'un terminal en libre-service
EP0834155A1 (fr) Procede de distribution de cartes a puce
DE102013209055A1 (de) Datenquellenidentifizierung, Datensammlung und Datenspeicherung für Verkehrsereignisse
EP2070030A1 (fr) Système d'enregistrement automatique d'appareils avec reconnaissance de code a barres et génération d'informations d'entretien
DE10202743A1 (de) Fahrtenschreiber für ein Kraftfahrzeug und Datenlesevorrichtung für selbigen
EP2833329B1 (fr) Procédé et système destinés à améliorer un processus de stationnement payant de véhicule dans une installation de parking, programme informatique et produit-programme informatique
EP2626824A1 (fr) Gestion de portefeuilles virtuels préparés par un terminal mobile
EP1188151A1 (fr) Dispositifs et procede pour l'authentification biometrique
DE102018103150A1 (de) Verfahren zur Erzeugung einer Schadensmeldung
DE102019109289A1 (de) System und Verfahren zur Erkennung des potenziellen Betrugs seitens des Kassierers, sowie das Verfahren zur Bildung des Warenauszugs fürs Training des künstlichen Neuronennetzes
DE102020117545A1 (de) System und methode zur identifizierung von objekten in einem zusammengesetzten objekt
DE60103596T2 (de) Kommunikationsvorrichtung zum schnellen und gleichzeitigen beschreiben einer vielzahl von datenträgern und zugehörige datenträger
EP4091157A1 (fr) Procédé de sortie d'un état d'au moins un sceau, sceau et système
EP3567557A1 (fr) Système de fermeture
EP3239918A1 (fr) Procédé de validation du prélèvement d'une quantité d'énergie définie et dispositif de prélèvement
DE102015205298A1 (de) Vorrichtungen, Verfahren und Computerprogramm zum Bereitstellen einer Information über ein mobiles Logistikziel
EP3032501B1 (fr) Procédé destiné au fonctionnement d'un système de contrôle d'accès ID
EP3788807B1 (fr) Procédé pour établir un canal de communication entre un dispositif de données et un terminal d'un utilisateur
DE102020109525A1 (de) Anordnung für die Kommissionierung von Warenlieferungen
DE102007055704A1 (de) Vorrichtung und Verfahren zum Zählen von Tieren beim Transport
AT509336B1 (de) Chipkarte mit autorun-funktion
EP1927870B1 (fr) Support de données portatif
DE2858818C2 (de) Transportierbarer Informationsträger mit einem Mikroprozessor und einem programmierbaren Festwertspeicher
DE102019120301A1 (de) System und Verfahren zur Überprüfung der Zusammengehörigkeit eines Fahrzeugs und dieses identifizierende Identifizierungskennzeichen
EP3785236B1 (fr) Procédé pour le traitement d'informations d'environnement d'un véhicule automobile et système de traitement d'informations électronique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20701308

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020701308

Country of ref document: EP

Effective date: 20220817