WO2022229015A1 - Procédé d'enregistrement et de contrôle sécurisés de l'authenticité d'un produit emballé - Google Patents

Procédé d'enregistrement et de contrôle sécurisés de l'authenticité d'un produit emballé Download PDF

Info

Publication number
WO2022229015A1
WO2022229015A1 PCT/EP2022/060687 EP2022060687W WO2022229015A1 WO 2022229015 A1 WO2022229015 A1 WO 2022229015A1 EP 2022060687 W EP2022060687 W EP 2022060687W WO 2022229015 A1 WO2022229015 A1 WO 2022229015A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
data processing
code
frequency
processing device
Prior art date
Application number
PCT/EP2022/060687
Other languages
German (de)
English (en)
Inventor
Walter Braumandl
Original Assignee
Sensor-Instruments Entwicklungs- Und Vertriebs-Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sensor-Instruments Entwicklungs- Und Vertriebs-Gmbh filed Critical Sensor-Instruments Entwicklungs- Und Vertriebs-Gmbh
Publication of WO2022229015A1 publication Critical patent/WO2022229015A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/1205Testing spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2033Matching unique patterns, i.e. patterns that are unique to each individual paper

Definitions

  • the present invention relates to methods for securely registering a packaged product and for verifying the authenticity of the packaged product.
  • the present invention relates to a system for carrying out the methods mentioned, as well as other methods for checking the authenticity of an object using a determination of a characteristic variable that indicates a phosphorescence of at least one marker.
  • EP 2 318 286 B1 discloses an authentication method and system that is used in conjunction with a packaging film for product authentication.
  • the packaging film contains pigment particles which are present in a random distribution in one surface of the packaging film.
  • a product is packaged with a packaging film containing the randomly distributed pigment particles.
  • An identity code is derived from the relative position coordinates and optionally the color values of the pigment particles according to an encryption algorithm and recorded.
  • an imaging device records a digital image of the surface of the packaging film that contains the pigment particles. The digital image is evaluated by a computer, a check code being derived from the relative position coordinates of N different pigment particles and optionally the color values of the same, and compared with recorded identity codes with regard to a match.
  • DE 102015 005 304 B3 discloses a device having a UV lighting unit adapted to illuminate an object to be authenticated.
  • the device can also determine a characteristic decay behavior of a phosphorescence of a marker, which can be compared with a stored reference. In this way, it can be queried, for example, whether an object to be examined is a packaging film made by a specific manufacturer.
  • the object of the invention is to provide a way of being able to reliably and reliably check the authenticity of a packaged product, in particular at several points in a supply chain of the same.
  • Secure registration of a packaged product using two preferably different codes applied to a component of a package of the product enables increased security against counterfeiting compared to using only one code.
  • the codes are in a form that has to be read out using special devices or is not visible and/or evaluable with the naked eye. If the two codings are provided, for example, on a seal of the packaging of the product, a suitable query, for example with the end seller of the product, can ensure that the product is in its original packaging and therefore also the original product. In this way, security can be additionally increased if the two codes are not only provided on one component, for example the seal, but also on a second component, for example a closure of a container or the container itself. This can ensure that, in the event that counterfeiters get hold of a quota of the original seals, for example, they would also have to obtain the original containers in order to be able to counterfeit the product.
  • the codings are registered and securely stored at a first, trustworthy location, for example the manufacturer of the product, in association with one another (linked to one another). This can be done, for example, on a secure server owned by the manufacturer or by the trusted authority.
  • a secure server owned by the manufacturer or by the trusted authority.
  • a suitable selection of the two codes from a plurality of codes on the one hand allows increased flexibility and on the other hand a possible counterfeiting of the product is made more difficult since the counterfeiter cannot readily determine which codes are used for a specific product.
  • FIG. 1 is a schematic view of a system for performing the methods disclosed herein;
  • Fig. 2 is a schematic view showing different ways of applying different codes to a packaged product
  • FIG. 3 shows several examples of encodings that can be used in connection with the methods disclosed herein;
  • FIGS. 4 and 5 show schematic views of an exemplary detection device for performing the methods disclosed herein;
  • FIG. 7 shows a diagram that illustrates a determination of a cut-off frequency when a phosphorescent marker is excited with pulse sequences with different frequencies.
  • the packaged product 10 may, for example, comprise a package 14 in which an article or substance 11 is contained.
  • the packaging 14 can for example consist of two parts such as a container 17 plus a closure 15 and be closed by means of a seal 16 . This means that the pack 14 can only be opened by destroying the seal 16 in order to remove the article 11 .
  • the container 17 or the article or substance 11 contained therein are not particularly limited.
  • the container can be a plastic bottle or a glass bottle, which can be transparent or tinted.
  • loading containers made of metal or packaging made of paper and corrugated cardboard or blister packs made of plastic or composite materials can also be used.
  • the bottle could contain medicine such as a vaccine or the like, or the blister pack could also hold medicine such as tablets and the like.
  • the seal 16 can be formed, for example, as a transparent shrink tube, while in the case of blister packs, an aluminum foil or a marked plastic foil can represent the seal.
  • the system 200 has a plurality of detection devices 50, each of which is configured to detect a first and a second code 12, 18 applied to the package 14 or the seal 16 (see Fig. 2). .
  • the system 200 has a plurality of decoding devices 51 which are each associated with the plurality of detection devices 50 and are designed to decode first and second information which are each coded by the first coding 12 and the second coding 18 .
  • the respective decoding device 51 can be integrated into the detection device 50 .
  • a detection device 50 can be used, which is described in DE 102015 005 304 B3. Such an exemplary detection device 50 is shown in FIGS.
  • the detection device 50 can have a cover 210 for a mobile phone 216 .
  • the case 210 has a receptacle 214 for the mobile phone 216 .
  • the shell 210 has a bottom surface 211 which has an array 213 with a plurality of lighting units 217, 218 arranged around a camera aperture 219.
  • the lighting units can be a UV lighting unit 217 and a White light illumination unit 218 act.
  • the device shown in FIGS. 4 and 5 as well as other suitable detection devices for detecting the codings described below are known, so that further details thereof are omitted here.
  • suitable lighting units, detectors such as photodiodes and the like, filters etc. can be provided which are controlled by a suitable controller for emitting light and receiving or detecting secondary light emitted in response thereto.
  • the system 200 comprises a first data processing device 22 configured to receive the first and second information from a first of the decoding devices 51 and store them in association with one another in a memory 20 of the data processing device 22.
  • the first data processing device 22 is also designed to transmit the first information and second information stored in the memory 20 to a plurality of further data processing devices 32, 34, 36, 38, which are connected via a network 110 to the first data processing device 22 and respectively connected to each other.
  • the further data processing devices 32, 34, 36, 38 are designed to store the first information and the second information in association with one another in a memory 33, 35, 37, 39 of the same.
  • the first data processing device is a central data processing device 102 with a memory 120, which is connected via the network 110 to a plurality of further data processing devices 32, 34, 36, 38 and is designed to respond to a request from one of the further data processing devices 32, 34, 36, 38 to verify data transmitted by the further data processing device on the basis of the first and second information stored in the memory.
  • This alternative is shown in FIG. 1 by the dashed line. That is, in this case, the signal generated by the first detection device 50 shown in Fig.
  • recorded information can be forwarded to the central data processing device 102 directly or via the data processing device 22 .
  • the two alternatives are explained in more detail below.
  • the system 200 is used to enable secure registration and tracking of an originally packaged product 10, where at any point in the supply chain where one of the Detection devices 50 is present, the integrity or authenticity of the product 10 can be checked.
  • a first code 12 is applied to the package 14 of the product 10 or the package seal 16 and encodes first information.
  • the coding 12 represents the first piece of information, but this cannot be read directly. Instead, the coding 12 must be recorded and decoded in order to arrive at the first piece of information. Examples of the possible codings are explained in more detail below.
  • the first code 12 is provided on the seal 16 .
  • the second coding 18, which is different from the first coding (for example, is a different type of coding and/or encodes different information), is also applied to the seal 16.
  • the second coding 18 encodes second information.
  • the first coding 12 and the second coding 16 can be provided at different positions of the seal 16 .
  • the detection device 50 could detect the different codings, for example by rotating the container about its longitudinal axis relative to the detection device 50.
  • the first coding 12 and the second coding 18 are now initially detected by the detection device 50 .
  • the coding stanchions 12, 18 can be picked up by a camera of the cell phone 216 shown in FIGS. 4 and 5.
  • a corresponding field of view 53 of such a camera onto the first code 12 on the seal 16 is indicated in FIG.
  • the detected first coding 12 and the detected second coding 18 are shown in Fig. 1 by the decoding device 51, associated with the detection device 50 is decoded.
  • the decoded first information and the decoded second information are then stored in association with one another in the memory 20 of the first data processing device 22 .
  • the manufacturer of the product 10 or the person who packs the item 11 in its original packaging can carry out the method described above in order to register or identify the product 10 in its original packaging.
  • the first coding 12 and the second coding 18 do not necessarily have to be applied to the packaging 14 and/or the seal 16 by the manufacturer or packer of the product. Instead, the corresponding codes could already have been provided in packaging or seals made by other companies.
  • the first coding 12 and the second coding 18 can preferably be present in different forms as long as they are suitable for coding or representing corresponding information.
  • a known possibility is a machine-readable coding, for example a bar code or a QR code.
  • a coding can be recorded by a suitable camera, for example the mobile phone 216 shown in FIGS. 4 and 5, and evaluated and decoded by a corresponding decoding device or software running on a processor of the mobile phone 216 in order to to obtain first or second information.
  • a suitable camera for example the mobile phone 216 shown in FIGS. 4 and 5
  • a corresponding decoding device or software running on a processor of the mobile phone 216 in order to obtain first or second information.
  • the first and/or the second coding 12, 18 can be formed by at least one phosphorescent marker 24, which is present in a detection area 70 of the packaging (see FIG. 2), which is preferably a predetermined area (of a surface) the packaging is.
  • a detection area 70 of the packaging see FIG. 2
  • suitable markers or particles 24 can be applied to or contained in the seal 16, which, when excited by light in a specific wavelength range, produces a secondary emission, usually in a different wavelength range. show (afterglow). The encoded information is then that the presence or absence of the at least one phosphorescent marker 24 is indicated.
  • the detection device 50 detects the light emitted by the phosphorescent marker in response to an excitation and can determine a characteristic variable that is associated with the phosphorescence of the marker 24 based on this.
  • the characteristic variable can be, for example, a decay time (time constant) of the phosphorescence, or a limit frequency, which will be explained in more detail below. Decay time or time constant means that the time is determined during which the intensity of the secondary emission, starting from an initial value that corresponds to 100%, falls to a certain value, usually 1/e. Different markers have different decay times, so that information can be determined, for example, which of the different markers is or is not present.
  • the characteristic variable can also be the limit frequency mentioned. This can be determined using an optical low-pass characteristic of the respective phosphorescent markers 24 . This is explained below with reference to FIGS. 6 and 7 .
  • the first line in FIG. 6 shows a sequence of excitation light pulses which has a first frequency fi and a constant intensity of the individual pulses. In the sequence, each pulse has a certain duration t, and between two consecutive pulses the signal is, for example, zero for the same duration. In this case, the frequency fi or the associated period of the excitation signal corresponds to twice the pulse duration. As shown in the second line of Fig.
  • the primary emission of these excitation light pulses causes a secondary emission which increases to a maximum value if the excitation pulse is sufficiently long and then decreases with the already described sounding behavior after the respective excitation by one of the light pulses ends became.
  • This results in the secondary emission signal shown in the second line in FIG. 6 which can be detected by a suitable detector in the detection device 50 . It has now been shown that, as can also be seen from the course of the secondary emission in the fourth line in FIG , even if the intensity of the excitation light pulses remains unchanged. In other words, the maximum detected intensity of the secondary remission upon excitation with excitation light pulses whose sequence is above a specific limit frequency is reduced.
  • a ratio of the intensity at a sufficiently low frequency (or at 0 Hz) to the intensity detected at the respective higher frequencies can be formed.
  • the logarithm of the higher frequency signal SIGAC could be taken TO the signal SIGDC at the 0 Hz frequency.
  • this ratio decreases sharply when a limit frequency f c is reached.
  • a predetermined threshold of 50% (at -3 dB in FIG. 7) can be established, on the basis of which an assessment is made as to whether the determined ratio at the frequency used is greater or less than this threshold. It can be seen that by running through the frequency range from low to high frequencies in this way, reaching the limit frequency f c can be detected. In this way, the cut-off frequency fc can be determined as the characteristic variable for the respective marker 24.
  • a larger number of frequencies (or bursts with several consecutive pulses of different frequencies) or a continuously traversed frequency range can be used to determine the cut-off frequency f c or the presence of the marker 24 .
  • the test can be carried out in a time from a few hundred ps to a few ms.
  • a pulse duration is between 10 ps and 10,000 ps, and typical limit frequencies are 1 kHz to 20 kHz.
  • a limit frequency can also be determined for two or more different markers or it can be determined whether a specific combination of several markers is present or not.
  • two or more markers could be provided which can be excited with excitation light of the same wavelength (or with different wavelengths), but have secondary emission at different (central) wavelengths and/or each have different cut-off frequencies, as indicated by a dashed line is indicated in FIG.
  • pulse sequences can be emitted at different frequencies, and a cut-off frequency or a behavior of the combination that is expected at this cut-off frequency can then be determined using the total intensity of a secondary emission detected in one or more wavelength ranges.
  • a detector can be designed to detect the secondary emissions of a number of markers and to determine an overall intensity, for example at a specific wavelength, which can then be used to determine the limit frequency for the marker combination.
  • multiple detectors can also be provided for the multiple markers. Suitable filters can be used if necessary.
  • the respective intensities of the individual secondary emissions can then be determined, and a limit frequency can then be determined, for example, based on the sum of the individual intensities (i.e. with two markers, two intensities L and L could be detected (see Fig.
  • the cut-off frequency also depends on the relative concentrations or the mixing ratio of the different markers.
  • several limit frequencies of one and the same marker combination could be determined if different excitation light is used in each case. If, for example, only one of the markers is excited when excited with blue light, while two of the markers are excited when excited with green light, with suitable detection of the secondary emission there are different cut-off frequencies for both cases (in one case that of one marker, in the other case that of the mixture of both markers). For example, a two-stage test could be carried out.
  • the first or the second coding 12, 18 can represent information indicating the presence or absence of at least one phosphorescent marker 24 by determining whether the characteristic quantities associated with these markers can be detected or not.
  • the information could be represented by one bit indicating whether the marker has been detected or not. It goes without saying that when using, for example, five or more markers, a corresponding number of bits can be encoded. This is familiar to the person skilled in the art, so that no further details in this regard are described here.
  • the first code 12 or the second code 18 can be a code formed by a plurality of different markers each having different emission wavelengths in the visible wavelength range.
  • the information indicates the presence or absence of the plurality of markers 30 which, as shown for example in FIG.
  • the markers 30 can be fluorescent markers of different colors, for example, which can be excited by UV light or blue light, for example.
  • the markers 30 can also be passive color particles, in which case, for example, the white light of the mobile telephone 216 of the detection device 50 can be used to illuminate them, and the different reflected colors can then be detected in a known manner.
  • intensities of fluorescence or reflection in a plurality of different wavelength ranges are detected in response to the illumination, and the associated information is generated based on whether or not the detected intensities in the different wavelength ranges each exceed a predetermined threshold. If a respective threshold is exceeded, a bit of a corresponding code can then be set to 1.
  • the particles mentioned can be sprayed or printed onto the packaging 14 or the seal 16, for example.
  • colored particles for example so-called flakes, which are used in a similar way in metallic coatings in the automotive industry
  • a binary code can be generated by the corresponding coding, which can then be detected at a given point in time.
  • the first code 12 or the second code 18 can be a code formed by a plurality of optically detectable particles 26 in a predetermined detection area 28, as is shown in an exemplary manner in FIG.
  • the information indicates relative positional relationships between the particles 26, in a manner similar to that described in EP 2318 286 B1 mentioned at the outset.
  • the detection area 28 is recorded by the camera of the mobile phone 216, optionally after the particles 26 have been excited to fluoresce by irradiating suitable excitation light, for example in the UV range, and the particles are identified using the fluorescence.
  • the particles could be identified by their color, or by contrast to a background of the package 14 or seal 16 (e.g., in a black and white photograph or the like).
  • the individual particles in the detection area 28 can be identified and based thereon the relative positional relationships between them can be determined in a known manner, so that a corresponding code can be generated based thereon.
  • several different particles can also be used in combination in order to determine the code or the positional relationships. For example, blue and green reflecting or fluorescent particles could be combined.
  • FIG. 3a shows a known QR code.
  • Fig. 3b shows the use of a plurality of different markers 30, each with different emission wavelengths in the visible wavelength range, the presence or absence of the corresponding markers 30 being inferred depending on the number of, for example, red, orange, yellow, green and blue fluorescent particles can be. With five colors, there would thus be 32 possible codes that can be detected by the detection device 50 in a suitable manner.
  • 3c shows a detection of phosphorescent markers 24. In this case, for example, different markers can be used, which each have different decay times and/or limit frequencies. An excitation can take place, for example, with UV light, in the blue, in the red or in the infrared wavelength range.
  • the phosphorescent markers 24 may even be present in the same detection area 28 as the optically detectable particles 26 mentioned above. The same applies to the fluorescent particles shown in FIG. 3d, for example, whose relative positions in the detection area 28 are determined.
  • the method according to the invention for the secure registration of the product 10 is carried out in the first step. Irrespective of which codings 12 and 18 are used, it can be seen that the first information and the second information can be obtained by the detection device 50 in conjunction with the associated decoding device 51 . This is preferably done immediately after the product 10 has been manufactured or packaged, for example by the manufacturer. The first information and the second information, which now state that the product 10 is in its original packaging, are then stored in the first data processing device 22 in association with one another.
  • This data processing device 22 can be any known data processing device that has a memory 20, for example a conventional desktop computer, a server, a mobile phone with appropriate software, a tablet, etc. It is understood that it is of crucial importance that the Memory 20 stored first information and second information is safe, ie, can not be changed by a possible counterfeiter. Otherwise, at a later point in time, a counterfeit product could be brought into circulation, which, for example, has different codings or does not have one or both of these codings at all, and at the same time the stored information, which corresponds to the original codings, could also be manipulated in order to do so it again matches the counterfeit product. It is therefore important to have a mechanism in place to ensure that the information originally recorded cannot be subsequently altered.
  • the first data processing device is a secure server 102, which is operated by the manufacturer of the product 10, for example.
  • the information originally recorded is then stored in the memory 120 of this server 102, to which the other participants in the system 200 have no write access. They can only transmit a request from another data processing device 32, 34, 36, 38 for verifying transmitted data on the basis of the first and second information stored in memory 120 to server 102 and receive a corresponding result of the verification from server 102.
  • the shipping company that transports the packaged product 10 could use another detection device 50 to re-read the first and second codes 12, 18, the corresponding decoding device 51 can then decode the coding genes, and the first information and second information thereby obtained can then be transmitted to the server 102 as the data. Only when this transmitted data matches the data stored in memory 120 is it the originally packaged original product. A corresponding notification can be transmitted from the server 102 to the querying data processing device.
  • Such a distributed, secure system such as the blockchain is based on the fact that all the information on each node of the network 110, ie the data processing device of each user (manufacturer, freight forwarder, distributor, intermediary dealer, end seller) is preferably stored unencrypted.
  • the user who owns the first data processing device 22 would send the information stored in the memory 220 to the other data processing devices 32, 34, 36, 38, which are connected to the first data processing device 22 via the network 110 and to each other are connected, and these would be in Allocation to each other stored in each of the memory of the other data processing devices.
  • the detection of the first coding and the second coding described above would be carried out again.
  • the newly decoded information would then be added to the original information stored in memories 20, 33, 35, 37, 39, as is conventional in the blockchain, with additional information, if any, associated with re-entry existing information, for example an identification of the person who carries out the detection and/or an identifier of the detection device used, a time stamp or the like.
  • the blockchain would then indicate, for example, that after packaging by the manufacturer, the first piece of information and the second piece of information had specific values, and would further indicate what those values were at the time the truck was loaded by the carrier.
  • each of the participants in the system could then determine or trace back that the product 10 was manipulated or exchanged on the way between the manufacturer and the carrier.
  • the end seller for example a pharmacy
  • the security mechanism consists, as is usually the case with blockchain, in that the individual data processing devices 22, 32, 34, 36, 38 are networked and synchronized with one another via the network 110.
  • the manipulated information in the memory 35 does not match the information in all the other memories 20, 33, 37, 39 . In this way, the incorrect information in the memory 35 would then be replaced by the correct information be replaced.
  • each of the data processing devices queries, for example at regular intervals, the information stored in the memories of all data processing devices, and in the event of discrepancies between the information stored in the querying data processing device from another data processing device, valid information would be obtained, for example by majority vote scheid on the basis of all stored information, and this valid information would then be stored again in the querying data processing device.
  • the blockchain used in connection with the system described here is, for example, a so-called “private blockchain” as is known to the person skilled in the art. Therefore, further explanations of details of this technology are omitted herein.
  • first coding 12 being recorded again and the first information being decoded
  • second coding 18 also being recorded and the second information is decoded
  • the first and the second information are compared with reference data stored, for example, in the memory 37 of the data processing device 36. If the first and second information and the reference data match, it is then determined that a genuine product 10 is involved.
  • security is increased in that two preferably different and mutually independent codes 12, 18 are used, both of which must match the reference data.
  • the reference data is stored in a secure manner so that manipulation of the same can be ruled out.
  • the reference data has first reference data and second reference data, which are stored in association with one another. These first and second reference data correspond, for example, to the first information and the second information that were originally recorded, for example, by the manufacturer.
  • the check can now proceed in such a way that the first coding 12 is detected first and the first information is derived from it.
  • the first coding 12 could be a QR code. This QR code could then be used to e.g. way in the memory 37 of the data processing device 39, in which the check is carried out, to determine the second reference data based on the assignment to the first reference data.
  • the currently determined second piece of information is then compared with the second reference data, and the authenticity of the packaged product is established if the second piece of information and the second reference data match.
  • the detected QR code could indicate that a specific decay time of a marker 24 represents the second information, or that the second information indicates that the marker 24 with the specific decay time is present.
  • the decay time determined as part of the test could be compared with the decay time stored in the memory 37 and the authenticity or intactness of the product 10 could be determined in this way.
  • the invention provides that after the check has been carried out, the newly acquired information is also stored in the memory of the corresponding data processing device and the memories of all other data processing devices in the manner described above, as is the case with a blockchain, for example.
  • the QR code could indicate a storage address or a link to the central server 102 where the (second) reference data is stored.
  • first code 12 and the second code 18 provision can be made for the first code 12 and the second code 18 to be provided together on at least two different components of the packaging, including the seal 16 .
  • a first coding 12 and a second coding 18 are therefore provided on a first component (e.g. seal) of the packaging and an identical or different first coding 12 and an identical or different second coding 18 on a second component (e.g. base) of the packaging .
  • the first code 12 and the second code 18 are each recorded for the at least two different components, and the authenticity of the packaged product 10 is then determined when for each of the at least two different components the match between the first and the second information and the reference data is present. For example, as shown in FIG.
  • the first and second codes 12, 18 could be provided on both the seal 16 and the container 17 of the package 14 and the closure 15 of the same, so that a total of three tests are carried out. Therefore, if a counterfeiter wants to put a counterfeit product into circulation, he would have to he not only have, for example, possibly stolen original containers, but also additionally have the original closures and the original seals 16 in their possession. This makes counterfeiting or manipulation even more difficult. It goes without saying that all of the recorded or decoded information for all components is stored in the respective memories either of the server 102 or of the distributed data processing devices 22, 32, 34, 36, 38 (for example as part of the blockchain).
  • first code 12 and the second code 18 are both applied to either the seal 16 or the package 14 . In other embodiments, however, it is also possible that, for example, the first code 12 is applied to the seal 16 and the second code 18 is applied to the packaging 14 . Any combinations of the individual positions of the codes are conceivable.
  • the trans port or delivery of high-value and sensitive goods for example ampoules with vaccines and the like or hazardous substances such as toxic chemicals, etc.
  • high-value and sensitive goods for example ampoules with vaccines and the like or hazardous substances such as toxic chemicals, etc.
  • both the authenticity and the integrity of the product can be checked and tampering can be detected.
  • the method for determining the limit frequency of at least one phosphorescent marker can also be used to determine the authenticity of any object, for example a banknote, an identity document or other reliable proof.
  • the object to be checked could have a security feature (for example a marking, a band or the like) in which the at least one marker 24 is provided (applied or present in the starting material of the security feature) in the manner explained above.
  • One or more limit frequencies or the presence of the same can then be determined using the methods described above.
  • the presence of a (further) fluorescent marker can also be determined whose cut-off frequency is “infinity” (since the detected secondary remission is frequency-independent). Accordingly, the following further aspects can be obtained:
  • a method for determining a characteristic variable that indicates a phosphorescence of at least one marker (24), with the following steps:
  • detecting intensities of phosphorescence at the different frequencies determining whether or not the detected intensity of phosphorescence falls below a predetermined threshold above a predetermined cut-off frequency (f c ); and determining the authenticity of the object if the threshold above the cut-off frequency (f c ) is undershot.
  • detecting a second intensity associated with the second frequency forming a ratio of the second intensity to the first intensity; and determining that the intensity of the phosphorescence above the predetermined cutoff frequency (f c ) falls below the predetermined threshold if the ratio is less than a predetermined value.
  • Device for checking the authenticity of an object (10), for example a banknote with: an illumination device which is designed to illuminate a detection area (70) on the object (10) with a plurality of pulse sequences (72, 74) of an excitation light, each having different frequencies; a detection device configured to detect intensities of phosphorescence at the different frequencies; and a determination unit that is designed to determine whether the detected intensity of the phosphorescence above a predetermined cut-off frequency (f c ) falls below a predetermined threshold or not, and to determine the authenticity of the object if the threshold falls below the cut-off frequency (f c ). becomes.
  • an illumination device which is designed to illuminate a detection area (70) on the object (10) with a plurality of pulse sequences (72, 74) of an excitation light, each having different frequencies
  • a detection device configured to detect intensities of phosphorescence at the different frequencies
  • a determination unit that is designed to determine whether the detected intensity of the phosphorescence above a predetermined cut-off frequency (f

Landscapes

  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Investigating, Analyzing Materials By Fluorescence Or Luminescence (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

L'invention concerne des procédés de suivi et de contrôle de produits (10) de haute qualité ou sensibles. Selon un premier procédé, le produit (10) est enregistré de manière sûre par le fait que deux codages différents (12, 18), qui sont appliqués sur un emballage ou un scellement du produit (10), sont détectés et les informations codées sont stockées de manière sécurisée. Ce procédé est de préférence effectué dans un système réparti en utilisant par exemple une chaîne de blocs. Un nouveau contrôle du produit (10) peut être effectué à chaque autre endroit de la chaîne de distribution, les informations pouvant être à nouveau détectées étant également mémorisées en tant que partie de la chaîne de blocs. De cette manière, l'authenticité du produit peut être contrôlée en tout point de la chaîne, en particulier lors de la remise finale du produit (10), et toute manipulation en un emplacement déterminé dans la chaîne peut être déterminée.
PCT/EP2022/060687 2021-04-29 2022-04-22 Procédé d'enregistrement et de contrôle sécurisés de l'authenticité d'un produit emballé WO2022229015A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102021111015.7A DE102021111015A1 (de) 2021-04-29 2021-04-29 Verfahren zur sicheren registrierung und prüfung einer echtheit eines verpackten produkts
DE102021111015.7 2021-04-29

Publications (1)

Publication Number Publication Date
WO2022229015A1 true WO2022229015A1 (fr) 2022-11-03

Family

ID=81842121

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/060687 WO2022229015A1 (fr) 2021-04-29 2022-04-22 Procédé d'enregistrement et de contrôle sécurisés de l'authenticité d'un produit emballé

Country Status (2)

Country Link
DE (1) DE102021111015A1 (fr)
WO (1) WO2022229015A1 (fr)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004070667A2 (fr) * 2003-02-05 2004-08-19 Informium Ag Procede de production de marques de securite
US20060011504A1 (en) * 2002-11-12 2006-01-19 Hauni Maschinenbau Ag Object provided with an individual characterizing system enabling its identification, and methods and devices for characterizing and identifying objects, in particular packages, labels or the like
US20070267581A1 (en) * 2006-05-17 2007-11-22 Ncr Corporation Secure tag validation
EP2318286A1 (fr) 2008-07-11 2011-05-11 Klöckner Pentaplast GmbH & Co. KG Film d'emballage pour l'authentification d'un produit, procédé et système d'authentification
US20160078706A1 (en) * 2014-09-17 2016-03-17 Thomas D. Pawlik Method of authenticating an object
DE102015005304B3 (de) 2015-04-27 2016-08-18 Sensor Instruments Entwicklungs- Und Vertriebs Gmbh Vorrichtung für ein portables Smart-Gerät
US20180173916A1 (en) * 2016-12-21 2018-06-21 Merck Patent Gmbh Reader device for reading a marking comprising a physical unclonable function
US20210049852A1 (en) * 2017-04-26 2021-02-18 Sensor Instruments Entwicklungs- Und Vertriebs Gmbh Optical product checking system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060011504A1 (en) * 2002-11-12 2006-01-19 Hauni Maschinenbau Ag Object provided with an individual characterizing system enabling its identification, and methods and devices for characterizing and identifying objects, in particular packages, labels or the like
WO2004070667A2 (fr) * 2003-02-05 2004-08-19 Informium Ag Procede de production de marques de securite
US20070267581A1 (en) * 2006-05-17 2007-11-22 Ncr Corporation Secure tag validation
EP2318286A1 (fr) 2008-07-11 2011-05-11 Klöckner Pentaplast GmbH & Co. KG Film d'emballage pour l'authentification d'un produit, procédé et système d'authentification
EP2318286B1 (fr) 2008-07-11 2012-01-25 Klöckner Pentaplast GmbH & Co. KG Film d'emballage pour l'authentification d'un produit, procede et systeme d'authentification
US20160078706A1 (en) * 2014-09-17 2016-03-17 Thomas D. Pawlik Method of authenticating an object
DE102015005304B3 (de) 2015-04-27 2016-08-18 Sensor Instruments Entwicklungs- Und Vertriebs Gmbh Vorrichtung für ein portables Smart-Gerät
US20180173916A1 (en) * 2016-12-21 2018-06-21 Merck Patent Gmbh Reader device for reading a marking comprising a physical unclonable function
US20210049852A1 (en) * 2017-04-26 2021-02-18 Sensor Instruments Entwicklungs- Und Vertriebs Gmbh Optical product checking system

Also Published As

Publication number Publication date
DE102021111015A1 (de) 2022-11-03

Similar Documents

Publication Publication Date Title
AU2006214762B2 (en) Method for encoding materials with a luminescent tag and apparatus for reading same
DE69824291T2 (de) Überprüfen der echtheit von gütern unter verwendung von zufallszahlen
EP1561198B1 (fr) Objet dote d'un systeme de caracterisation individuel qui permet son identification, et procedes et dispositifs pour caracteriser et identifier des objets, notamment des emballages, des etiquettes ou analogues
EP2534221B1 (fr) Procédé d'identification d'un objet
EP1459266B1 (fr) Procédé pour protéger l'authenticité de documents
DE2623708A1 (de) Sicherungsanordnung fuer dokumente, insbesondere kreditkarten
US20070256136A1 (en) Methods for making an authenticating system for an object
WO2020001696A1 (fr) Procédé pour prouver l'authenticité de produits et représentation imprimée
EP3746992B1 (fr) Procédé pour le contrôle de l'authenticité et/ou de l'intégrité d'un document de sécurité comprenant une caractéristique de sécurité imprimée, caractéristique de sécurité et dispositif pour la vérification
WO2017012602A1 (fr) Procédé de contrôle d'authenticité des informations d'origine et des informations de durabilité de produits
DE102006019557B4 (de) Verpackungseinheit
DE102007034527B4 (de) Verfahren und System zur Kennzeichnung einer Ware als Originalware eines Warenherstellers
EP1673231B2 (fr) Document de valeur comprenant differentes substances caracteristiques
WO2022229015A1 (fr) Procédé d'enregistrement et de contrôle sécurisés de l'authenticité d'un produit emballé
EP2383705B1 (fr) Emballage sous blister protégé contre la falsification
WO2010037429A1 (fr) Procédé de génération d’un code de vérification, code de vérification, procédé et dispositif de vérification de l’authenticité d’objets
CN103826617B (zh) 用于药物片剂及可摄取材料的可验证涂层
EP4323197A1 (fr) Procédé de marquage et d'identification univoques de produits
WO2005035270A2 (fr) Document de valeur
DE102020131382A1 (de) Methode zur Kennzeichnung von Produkten mit optischem Sicherheitsmerkmal mit zeitlicher Dimension
WO2023135234A1 (fr) Procédé hors ligne de marquage clair et d'identification d'objets physiques
EP3356980B1 (fr) Procédé et appareil pour l'authentification d'un objet ou d'une personne moyennant un élément de sécurité construit de manière modulaire
DE10328792A1 (de) Fälschungssicheres Dokument und Verfahren zu seiner Herstellung

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22725188

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22725188

Country of ref document: EP

Kind code of ref document: A1