Nothing Special   »   [go: up one dir, main page]

WO2002073550A1 - A method for verifying the authenticity of an article - Google Patents

A method for verifying the authenticity of an article Download PDF

Info

Publication number
WO2002073550A1
WO2002073550A1 PCT/IB2001/000356 IB0100356W WO02073550A1 WO 2002073550 A1 WO2002073550 A1 WO 2002073550A1 IB 0100356 W IB0100356 W IB 0100356W WO 02073550 A1 WO02073550 A1 WO 02073550A1
Authority
WO
WIPO (PCT)
Prior art keywords
article
container
numbers
database
authenticity
Prior art date
Application number
PCT/IB2001/000356
Other languages
French (fr)
Inventor
Sergej Toedtli
Original Assignee
Orell Füssli Security Documents AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orell Füssli Security Documents AG filed Critical Orell Füssli Security Documents AG
Priority to PCT/IB2001/000356 priority Critical patent/WO2002073550A1/en
Priority to EP02714367A priority patent/EP1371033A1/en
Priority to AU2002246281A priority patent/AU2002246281A1/en
Priority to PCT/IB2002/000728 priority patent/WO2002073551A1/en
Publication of WO2002073550A1 publication Critical patent/WO2002073550A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • the invention relates to a method for verifying the authenticity of an article according to the preamble of claim 1.
  • EP 967 459 describes a system for verifying ownership of articles where a unique article number is affixed to each article. In addition to this, a certificate carrying a certification number is provided for each article. For verifying ownership of an article, both numbers are transferred to a database where they are checked.
  • this method requires the delivery of certificates, which, in many applications, requires further logistic and administrative efforts.
  • the problem to be solved by the present invention is to provide a method of this type where authenticity of articles can be verified reliably and with small logistic and administrative overhead.
  • each article number is affixed to each article and an individual container number is af- fixed to each container.
  • Each container contains at least one article, preferably a plurality of articles.
  • the article number as well as the number of the container it was located in is transferred through a communication network to a central database.
  • This database contains the article numbers of all registered articles as well as the container number for each article and can therefore be used for a redundant check of the received article number and container number .
  • the article and corresponding container number cannot be derived from each other in ob- vious manner.
  • a third party will be unable to generate article numbers for a given container number or vice versa.
  • at least one or both types of numbers can be cre- ated using random or pseudo-random algorithms, or they can be linked by cryptographic algorithms with sufficient security.
  • the container or containers can be placed in "super-containers" having su- per-container numbers affixed thereto, and the database can store the corresponding hierarchy of numbers.
  • the database can store the corresponding hierarchy of numbers.
  • Fig. 1 shows articles, containers and super- containers carrying identification numbers
  • Fig. 2 is a possible supply chain.
  • Fig. 1 The basic principle of the invention is shown in Fig. 1.
  • a plurality of articles 1 is to be packaged and shipped.
  • each article 1 is packaged in an individual package and a label 2 carrying a unique article number 3 is attached to each package.
  • the article number may be any numeric or alpha-numeric string of suitable length. It may be encoded as bar code (as shown) and/or in human readable digits or letters or in any other type of marking technique.
  • each container 4 holds three articles. However, this number may vary widely depending on the nature of the article and its distribution chain.
  • Each container is provided with a unique container number 5, which is e.g. again printed on a suitable label 6.
  • the container number may be any nu- meric or alpha-numeric string of suitable length and it can be encoded using any suited marking technique.
  • this process can be iterated by placing a plurality of containers 4 in a common super-container 7, which can again be marked with a label 8 carrying a unique super-container number 9, etc.
  • the labels are designed as seals that must be broken for accessing the in- sides of a package, container or supercontainer .
  • the articles packaged in this way can be any type of articles where authentication may be required. In particular, they might be brand articles where falsification may appear attractive, such as cigarettes, perfumes, fashion wear, etc.
  • Fig. 2 shows how the articles are distributed and how their authenticity is verified.
  • a manufacturer 10 packages the articles 1 and places them in containers 4 and super- containers 7 in the manner explained above. Whenever an item is placed in a next larger container, its number is scanned, e.g. by a suitable scanner device, and it is recorded together with the number of the container. The corresponding information in then sent to a secure database 11. In this way, database 11 can maintain a list of all article numbers 3 and, for each article, the number 5 of the container 4 it has been placed in. Similarly, it can maintain a list of all container numbers 5 and the numbers 9 the super-containers 7 they are placed in.
  • the numbers and corresponding items recorded in the database 11 are in the following called “registered numbers” and “registered items”.
  • the corresponding labels may e.g. manufactured and attached in a controlled manner such that the information of what article numbers are in which container is known without need to scan the numbers .
  • the manufacturer 10 will usually ship the largest type of container (the above "super-container” 7) to distributors 12.
  • the distributor 12 Upon receipt of a super-container 7, the distributor 12 should first check if the label 8 has been broken. If yes, he must assume that the super- container was opened and that the container-numbers 5 inside it may have been read by an unauthorised third party. If this is the case, he should alert database 11 or manufacturer 10 (who will in his turn alert database 11) . Database 11, which will mark the corresponding super-container number and container-numbers as insecure and possibly known (in their combination) to a third party.
  • distributor 12 accepts the super-container 7. He opens it and verifies its authenticity as follows:
  • the super-container number 9 For verifying the authenticity of the super-container 7, he may read or scan the super-container number 9 and the container number 5 of any container 4 inside it. He sends this pair of numbers to database 11, where it is checked if the container number 5 corresponds to a registered container number. If yes, it is further checked if the super-container number 9 corresponds to the super-container 7 that was registered for the given container number 5. If these conditions are fulfilled, database 11 affirms the authenticity of the number pair and therefore the authenticity of the super-container 7.
  • distributor 12 can send all container numbers 5 in the super-container to database 11, which then runs the same check for each container. In a next step, distributor 12 will sell the
  • the authenticity of containers 4 or super-containers 7 can be checked at any time, e.g. by custom authorities, by taking a sample, e.g. of a container 4, opening the same, and sending the container number 5 as well as an article number 2 of an article 1 inside it, to the database 11.
  • the present system allows a verification of authenticity using two numbers and not only one, which inherently increases the reliability of the method.
  • the system is immune to most attacks. For instance, in order to manufacture unauthorized articles, a fraudulent party would have to know not only individual article numbers 3 but also the corresponding container numbers 5. This would make it necessary to open containers to get access to the items inside, which would be detected in a next step of the distribution chain.
  • the number 3, 5 or 9 is printed on a label 2, 6 or 8 , which is then fixed to the article's package, a container or a super-container.
  • the number can e.g. be affixed to the article (container, super-container) by physically attaching the it thereto (e.g. by printing or engraving it on the same or by attaching a label with the number to the item) .
  • the number can also placed as a slip or certificate into the package of the article, the container or the super-container, respectively. It is preferred, however, to place the number on the outside of the item is belongs to such that it can be inspected without opening the item.
  • the system described here allows not only to verify the authenticity of the various items, but it allows also to track the items in the distribution chain, as each verification request can be recorded in database 11, together with information identifying the requester.
  • a precise analysis of the flow of items becomes possible. For example, the target market of each product can be determined easily, which can be of interest in case a batch of articles has to be called back to the manufacturer for repairs.
  • the system also allows to detect and monitor gray market activities.
  • the communication between database 11 and any parties checking authenticity of items can be carried out by means of any communication network, e.g. by phone or by Internet.
  • any communication network e.g. by phone or by Internet.
  • the present system allows to monitor articles, containers, super-containers and even larger container entities in hierarchic manner.
  • the following claims use the terms "article” and "container” to express one arbitrary step in this hierarchy.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)

Abstract

In a system for verifying the authenticity of articles individual article numbers (3) are affixed to each article (1). The articles are packed into containers (4), and an individual container number (5) is affixed to each container. A database is provided for storing the article numbers and the corresponding container numbers. For verifying an article or container, the article number (3) and the container number are fed to the database for verification. This increases the reliability as compared to systems based on a single number while being easy to implement.

Description

A method for verifying the authenticity of an article
Technical Field The invention relates to a method for verifying the authenticity of an article according to the preamble of claim 1.
Background Art
EP 967 459 describes a system for verifying ownership of articles where a unique article number is affixed to each article. In addition to this, a certificate carrying a certification number is provided for each article. For verifying ownership of an article, both numbers are transferred to a database where they are checked. However, this method requires the delivery of certificates, which, in many applications, requires further logistic and administrative efforts.
Disclosure of Invention
Hence, the problem to be solved by the present invention is to provide a method of this type where authenticity of articles can be verified reliably and with small logistic and administrative overhead.
This problem is solved by the method of claim 1. Accordingly, an individual article number is affixed to each article and an individual container number is af- fixed to each container. Each container contains at least one article, preferably a plurality of articles.
For checking the authenticity of an article, the article number as well as the number of the container it was located in is transferred through a communication network to a central database. This database contains the article numbers of all registered articles as well as the container number for each article and can therefore be used for a redundant check of the received article number and container number .
Preferably, the article and corresponding container number cannot be derived from each other in ob- vious manner. In other words, even after inspecting a plurality of containers and articles placed therein, a third party will be unable to generate article numbers for a given container number or vice versa. For this purpose, at least one or both types of numbers can be cre- ated using random or pseudo-random algorithms, or they can be linked by cryptographic algorithms with sufficient security.
The method is iterative, the container or containers can be placed in "super-containers" having su- per-container numbers affixed thereto, and the database can store the corresponding hierarchy of numbers. When opening a super-container, its authenticity as well as the authenticity of the containers it holds can be checked by submitting a super-container number and a con- tainer number to the database.
Brief Description of Drawings The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings, wherein:
Fig. 1 shows articles, containers and super- containers carrying identification numbers and
Fig. 2 is a possible supply chain.
Best Mode for Carrying out the Invention The basic principle of the invention is shown in Fig. 1. Here, a plurality of articles 1 is to be packaged and shipped. For this purpose, each article 1 is packaged in an individual package and a label 2 carrying a unique article number 3 is attached to each package. The article number may be any numeric or alpha-numeric string of suitable length. It may be encoded as bar code (as shown) and/or in human readable digits or letters or in any other type of marking technique.
A plurality of articles are packaged in a common container 4. In the present embodiment, each container 4 holds three articles. However, this number may vary widely depending on the nature of the article and its distribution chain.
Each container is provided with a unique container number 5, which is e.g. again printed on a suitable label 6. Again, the container number may be any nu- meric or alpha-numeric string of suitable length and it can be encoded using any suited marking technique.
As mentioned above, this process can be iterated by placing a plurality of containers 4 in a common super-container 7, which can again be marked with a label 8 carrying a unique super-container number 9, etc.
Preferably and for reasons that will become clearer as this description proceeds, the labels are designed as seals that must be broken for accessing the in- sides of a package, container or supercontainer . The articles packaged in this way can be any type of articles where authentication may be required. In particular, they might be brand articles where falsification may appear attractive, such as cigarettes, perfumes, fashion wear, etc. Fig. 2 shows how the articles are distributed and how their authenticity is verified.
In a first step, a manufacturer 10 packages the articles 1 and places them in containers 4 and super- containers 7 in the manner explained above. Whenever an item is placed in a next larger container, its number is scanned, e.g. by a suitable scanner device, and it is recorded together with the number of the container. The corresponding information in then sent to a secure database 11. In this way, database 11 can maintain a list of all article numbers 3 and, for each article, the number 5 of the container 4 it has been placed in. Similarly, it can maintain a list of all container numbers 5 and the numbers 9 the super-containers 7 they are placed in.
The numbers and corresponding items recorded in the database 11 are in the following called "registered numbers" and "registered items". Instead of reading the individual numbers before placing the items in their containers, the corresponding labels may e.g. manufactured and attached in a controlled manner such that the information of what article numbers are in which container is known without need to scan the numbers .
The manufacturer 10 will usually ship the largest type of container (the above "super-container" 7) to distributors 12. Upon receipt of a super-container 7, the distributor 12 should first check if the label 8 has been broken. If yes, he must assume that the super- container was opened and that the container-numbers 5 inside it may have been read by an unauthorised third party. If this is the case, he should alert database 11 or manufacturer 10 (who will in his turn alert database 11) . Database 11, which will mark the corresponding super-container number and container-numbers as insecure and possibly known (in their combination) to a third party.
If the label 8 is not broken, distributor 12 accepts the super-container 7. He opens it and verifies its authenticity as follows:
- For verifying the authenticity of the super-container 7, he may read or scan the super-container number 9 and the container number 5 of any container 4 inside it. He sends this pair of numbers to database 11, where it is checked if the container number 5 corresponds to a registered container number. If yes, it is further checked if the super-container number 9 corresponds to the super-container 7 that was registered for the given container number 5. If these conditions are fulfilled, database 11 affirms the authenticity of the number pair and therefore the authenticity of the super-container 7.
- For an even more thorough authentication, the distributor 12 can send all container numbers 5 in the super-container to database 11, which then runs the same check for each container. In a next step, distributor 12 will sell the
(unopened) containers 4 to retailers 13. Upon receipt of a container 4, a retailer can take similar steps for verifying it as the distributor 12. He first checks if the label 6 is broken and alerts distributor 12, manufac- turer 10 and/or database 11 if this is the case. If not, he opens container 4. He can then check the authenticity of the delivery by sending container number 5 together with at least one article number 3 to database 11 for verification. Finally, retailer 13 will sell the individual articles 1 to end users 14. If an end user 14 wants proof of the authenticity of an article, he can either query database 11 using the article number (which may then e.g. confirm that the article is a registered article) or, de- pending on the nature of the article to be sold, he can even request retailer 13 to provide the container number for the given article and send both these numbers to the database for verification in the manner described above. In addition to the above, the authenticity of containers 4 or super-containers 7 can be checked at any time, e.g. by custom authorities, by taking a sample, e.g. of a container 4, opening the same, and sending the container number 5 as well as an article number 2 of an article 1 inside it, to the database 11. As it becomes clear from the above, the present system allows a verification of authenticity using two numbers and not only one, which inherently increases the reliability of the method. Furthermore, the system is immune to most attacks. For instance, in order to manufacture unauthorized articles, a fraudulent party would have to know not only individual article numbers 3 but also the corresponding container numbers 5. This would make it necessary to open containers to get access to the items inside, which would be detected in a next step of the distribution chain.
In the above example, the number 3, 5 or 9 , respectively, is printed on a label 2, 6 or 8 , which is then fixed to the article's package, a container or a super-container. Generally, the number can e.g. be affixed to the article (container, super-container) by physically attaching the it thereto (e.g. by printing or engraving it on the same or by attaching a label with the number to the item) . The number can also placed as a slip or certificate into the package of the article, the container or the super-container, respectively. It is preferred, however, to place the number on the outside of the item is belongs to such that it can be inspected without opening the item.
The system described here allows not only to verify the authenticity of the various items, but it allows also to track the items in the distribution chain, as each verification request can be recorded in database 11, together with information identifying the requester. A precise analysis of the flow of items becomes possible. For example, the target market of each product can be determined easily, which can be of interest in case a batch of articles has to be called back to the manufacturer for repairs. The system also allows to detect and monitor gray market activities.
The communication between database 11 and any parties checking authenticity of items can be carried out by means of any communication network, e.g. by phone or by Internet. As mentioned above, the present system allows to monitor articles, containers, super-containers and even larger container entities in hierarchic manner. The following claims use the terms "article" and "container" to express one arbitrary step in this hierarchy.

Claims

Claims
1. A method for verifying the authenticity of an article (1), wherein an individual article number (3) is affixed to the article (1) , wherein the article (1) is placed in a container (4), and wherein a container number (5) is affixed to the container (4), comprising the steps of providing a database (11) with information on each of a plurality of authentic articles storing, for each authentic article, the corresponding article number (3) as well as the container number (5) the article is placed in, receiving through a communication network the article number (3) of the article (1) to be verified as well as the container number (5) of the container (4) containing the article to be verified, checking, in said database (11), if the received article number (3) corresponds to an authentic ar- tide and if the received container number (5) corresponds to the container the registered article is placed in, and if yes, affirming the authenticity of the article
(1) •
2. The method of claim 1 wherein a plurality of articles (1) with article numbers (3) is placed in each container (4) and wherein there are a plurality of containers (4) .
3. The method of any one of the preceding claims wherein the article number (3) is attached such that it is visible from an outside of said article (1) or, if said article is individually packaged in a package, from an outside of said package, and/or wherein the container number (5) is attached such that it is visible from an outside of said container (4) .
4. The method of any one of the preceding claims wherein the article number (3) and the container number (5) are not derivable from each other in obvious manner .
5. The method of claim 4, wherein the article number (3) and/or the container number (5) are created using random or pseudo-random algorithms.
6. The method of any one of the preceding claims wherein the authenticity of the article (1) is checked when the container (4) is opened.
7. The method of any one of the preceding claims wherein each article (1) is individually packaged in a package and wherein the article number (3) is attached to the package .
8. The method of any one of the preceding claims wherein the container numbers (5) and correspond- ing article numbers (3) are recorded when placing the articles (1) in the container (4) , wherein the container and article numbers (5, 3) are then transferred to the database (11) .
9. The method of any one of the preceding claims wherein the container number (5) and/or the article number (3) is/are placed on a label (2, 6, 8), which label must be broken for accessing the article (1) and/or insides of the container (4) , respectively.
10. The method of any one of the preceding claims wherein a plurality of containers (4) is placed in super-containers (7), wherein a unique super-container number (9) is affixed to each super-container (7) and registered in said database (11).
PCT/IB2001/000356 2001-03-14 2001-03-14 A method for verifying the authenticity of an article WO2002073550A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
PCT/IB2001/000356 WO2002073550A1 (en) 2001-03-14 2001-03-14 A method for verifying the authenticity of an article
EP02714367A EP1371033A1 (en) 2001-03-14 2002-03-12 A method for tracking and/or verifying articles
AU2002246281A AU2002246281A1 (en) 2001-03-14 2002-03-12 A method for tracking and/or verifying articles
PCT/IB2002/000728 WO2002073551A1 (en) 2001-03-14 2002-03-12 A method for tracking and/or verifying articles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2001/000356 WO2002073550A1 (en) 2001-03-14 2001-03-14 A method for verifying the authenticity of an article

Publications (1)

Publication Number Publication Date
WO2002073550A1 true WO2002073550A1 (en) 2002-09-19

Family

ID=11004057

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/IB2001/000356 WO2002073550A1 (en) 2001-03-14 2001-03-14 A method for verifying the authenticity of an article
PCT/IB2002/000728 WO2002073551A1 (en) 2001-03-14 2002-03-12 A method for tracking and/or verifying articles

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/IB2002/000728 WO2002073551A1 (en) 2001-03-14 2002-03-12 A method for tracking and/or verifying articles

Country Status (3)

Country Link
EP (1) EP1371033A1 (en)
AU (1) AU2002246281A1 (en)
WO (2) WO2002073550A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1420381A1 (en) 2002-11-12 2004-05-19 Hauni Maschinenbau AG Method and device for identification and checking of authentificity of products
GB2431494A (en) * 2005-10-18 2007-04-25 Aegate Ltd Authenticating products
GB0710467D0 (en) * 2007-06-01 2007-07-11 Simons Bright A Universal unique product authentication protocol & supply chain validation system
EP2172882A1 (en) * 2008-10-06 2010-04-07 JT International S.A. Method of cigarette packaging and cigarette packaging system
EP2201850A1 (en) 2008-12-24 2010-06-30 Philip Morris Products S.A. An article including identification information for use in an electrically heated smoking system
GB2547363A (en) 2009-06-08 2017-08-16 Kezzler As Method and system for storage and retrieval of track and trace information
JP5838785B2 (en) * 2011-12-21 2016-01-06 大日本印刷株式会社 Card box packing equipment
TWI610253B (en) 2012-12-17 2018-01-01 印奈克斯托股份有限公司 Method and apparatus for storage of data for tracking manufactured items
RS65854B1 (en) * 2015-01-28 2024-09-30 Inexto Sa Method and apparatus for unit and container identification and tracking
PL3051372T3 (en) 2015-01-31 2019-10-31 Inexto Sa Secure product identification and verification
US20180205543A1 (en) 2015-08-13 2018-07-19 Inexto Sa Enhanced obfuscation or randomization for secure product identification and verification
EA034935B1 (en) 2015-08-25 2020-04-08 Инексто Са Verification with error tolerance for secure product identifiers
WO2017032860A1 (en) 2015-08-25 2017-03-02 Inexto Sa Multiple authorization modules for secure production and verification
DE102018128498A1 (en) * 2018-11-14 2020-05-14 Bayerische Motoren Werke Aktiengesellschaft Component tracking procedures

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999004364A1 (en) * 1997-07-21 1999-01-28 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles
EP0967459A1 (en) 1998-06-26 1999-12-29 GretagMacbeth, L.L.C. Method and apparatus for surface effect characterization
DE10019721A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Product assurance procedures

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4816824A (en) * 1980-06-23 1989-03-28 Light Signatures, Inc. Merchandise verification and information system
IE77642B1 (en) * 1994-04-08 1997-12-31 Kepak Patents Package processing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999004364A1 (en) * 1997-07-21 1999-01-28 Assure Systems, Inc. Verification of authenticity of goods by use of random numbers
EP0957459A1 (en) * 1998-05-12 1999-11-17 Orell Füssli Graphische Betriebe AG Method and device for verifying ownership of articles
EP0967459A1 (en) 1998-06-26 1999-12-29 GretagMacbeth, L.L.C. Method and apparatus for surface effect characterization
DE10019721A1 (en) * 1999-08-25 2001-03-01 Giesecke & Devrient Gmbh Product assurance procedures

Also Published As

Publication number Publication date
WO2002073551A1 (en) 2002-09-19
AU2002246281A1 (en) 2002-09-24
EP1371033A1 (en) 2003-12-17

Similar Documents

Publication Publication Date Title
US12106311B2 (en) Methods and systems for making, tracking and authentication of products
US12086751B2 (en) Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
US8280817B2 (en) Authentication and tracking system
EP0996928B1 (en) Verification of authenticity of goods by use of random numbers
US8421593B2 (en) Apparatus, systems and methods for authentication of objects having multiple components
AU2010335543B2 (en) Method and apparatus for defining manufactured items and storing data relating to the manufactured items
US8615470B2 (en) Authentication and tracking system
WO2002073550A1 (en) A method for verifying the authenticity of an article
US8165964B2 (en) Detection of counterfeited products based on sensor measurements
US20040162828A1 (en) System and methods for monitoring items
US20240378543A1 (en) Method and apparatus for identifying, authenticating, tracking and tracing manufactured items
EP1727096A1 (en) Method for deterring counterfeiting of articles, for instance valuable articles, and system therefor
WO2006125757A1 (en) Information security method and system for deterring counterfeiting of articles.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP