EP2011040A1 - Etude d'authenticite conviviale - Google Patents

Etude d'authenticite conviviale

Info

Publication number
EP2011040A1
EP2011040A1 EP07748357A EP07748357A EP2011040A1 EP 2011040 A1 EP2011040 A1 EP 2011040A1 EP 07748357 A EP07748357 A EP 07748357A EP 07748357 A EP07748357 A EP 07748357A EP 2011040 A1 EP2011040 A1 EP 2011040A1
Authority
EP
European Patent Office
Prior art keywords
layout
data
element variation
variation
authenticity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07748357A
Other languages
German (de)
English (en)
Inventor
Ingrid Rokahr
Sari Hakli
Kirsi Viskari
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trackway Oy
Original Assignee
Trackway Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trackway Oy filed Critical Trackway Oy
Publication of EP2011040A1 publication Critical patent/EP2011040A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the present invention relates to the investigation of the authenticity of objects.
  • the invention more particularly relates to a method, device and computer program for enabling the investigation of the authenticity of an object as well as a method, authentication data handling device and computer program product for investigating the authenticity of an object.
  • Illegal copying of objects is a big problem for companies, organisations and individuals. Illegal copying involves such things as copying products to be sold, counterfeiting, as well as copying of security items, such as identity cards, credit cards, bank cards and certificates. Counterfeiting is an increasing problem for manufacturers and users. Through counterfeiting copies of goods appear that resemble the goods of the rightful owners. This can lead to considerable economical losses for the companies that provide products.
  • an object may be a product or the package provided for a product.
  • the objects are here identified by their unique code.
  • a system for identifying a code then normally involves the reading of the code, which code is attached to or integrated into the object. Reading of the code is then performed using a reading device.
  • the code is originally in a non-numerous mode like an image, a barcode, or a combination of properties or numeric values, that information is used for calculation of an identification number, an ID.
  • the object is uniquely identified by its code, and it's ID.
  • the code and the ID can be identical or unambiguously correlated to each other.
  • the ID is entered into a system which enables information exchange.
  • the system provides information related to the specific ID, which information has been stored to the system at an earlier stage.
  • systems for providing information about the whereabouts of an item by reading the item's unique ID are known. This is commonly used in track & trace systems. It is also known in the art that the unique ID of an item or product can be used for authenticity requests.
  • For authentication of a product it is checked whether the product's ID has been issued by the manufacturer and whether it is currently in circulation. Further rules may be applied to include analysis of geographical information, time stamps, or supply chain information prior to authentication.
  • the authentication database of issued IDs is maintained by the manufacturer or by a third party on behalf of the manufacturer. It can also contain further data related to the product or production.
  • Systems providing track & trace or authentication information are either based on a centralized database or the database is distributed among several information providers. In the latter case software is used for compiling the information from several information providers.
  • the information can be exchanged remotely as long as a connection is established between a requesting party and the database.
  • connection to the centralized or distributed database can be made via a network connection.
  • the network can be a private network or it can be internet-based. It can also include additional telecommunication means like mobile phones or Bluetooth etc.
  • the information which is stored in connection to track & trace information related to a product is usually product name, tracking history (where and when the ID of an item has been read), expiry date of product, and further product description (for example dosage and package size).
  • Connected to the network are at least one or several databases for maintaining the database information.
  • Connected to the network are also one or more reader or interface devices which enable input of ID for requests or for registration of a reading event.
  • Systems are also known in the art for integration of security features in a product.
  • devices are used for detecting and controlling security features on products.
  • security features which have been applied to products are: fluorescent markers in packaging materials, metal threads in banknotes, micro-text o printing, code printing, taggants, and many, many others.
  • signature is used here.
  • the signatures are either detected on-site by appropriate equipment (for example an UV- lamp is used to look at UV-fluorescent features), or specialized readers that signal 5 authenticity in case they detect a certain fluorescence pattern.
  • appropriate equipment for example an UV- lamp is used to look at UV-fluorescent features
  • specialized readers that signal 5 authenticity in case they detect a certain fluorescence pattern.
  • proprietary signatures are read by proprietary readers designed for detection of the proprietary signature.
  • the present invention is therefore directed towards providing a user-friendly authenticity investigation.
  • One object of the present invention is to provide a method for enabling user-friendly investigation of the authenticity of an object.
  • This object is according to a first aspect of the present invention achieved through a method for enabling the investigation of the authenticity of an object comprising the steps of: selecting at least one detectable element variation from a limited number of element variations that may be provided in relation to a layout, which layout is common to at least one group of such objects, storing at least a reference to an identity of the object together with reference object specifying data in a product database, providing an area of the object with said layout including said selected element variation, and providing the object with an identity, wherein the object specifying data includes reference element variation data identifying the selected element variation.
  • Another object of the present invention is to provide a device for enabling user-friendly investigation of the authenticity of an object.
  • This object is according to a second aspect of the present invention achieved through a device for enabling the investigation of the authenticity of an object comprising: at least one object modifying unit arranged to provide the object with an identity, and provide an area of the object with a graphical layout, a control unit arranged to select at least one detectable element variation from a limited number of element variations that may be provided in relation to the layout, which layout is common to at least one group of objects, store at least a reference to the identity together with reference object specifying data in a product database, where the reference object specifying data includes reference element variation data identifying the selected element variation, order the object modifying unit to provide the object with said layout including said selected element variation, and order the object modifying unit to provide the object with the identity.
  • Another object of the present invention is to provide a computer program product for enabling user-friendly investigation of the authenticity of an object.
  • This object is according to a third aspect of the present invention achieved through a computer program product for enabling the investigation of the authenticity of an object
  • a computer program product for enabling the investigation of the authenticity of an object
  • Another object of the present invention is to provide a method for investigating the authenticity of an object that is more user-friendly.
  • This object is according to a fourth aspect of the present invention achieved through a 5 method for investigating the authenticity of an object comprising the steps of: receiving an identity associated with an object, and locating reference object specifying data including reference element variation data for an element variation for the object in a product database based on the identity, in order to allow a comparison of said reference element variation data with at least one o detectable element variation provided in a layout to be made for indicating the authenticity of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be provided in the layout.
  • Another object of the present invention is to provide an authentication data handling device for investigating the authenticity of an object that is more user-friendly.
  • an authentication data handling device for investigating the authenticity of an object 0 comprising: an authenticating unit arranged to receive an identity associated with an object, and locate reference object specifying data including reference element variation data for the object in a product database based on the identity, 5 in order to allow a comparison of said reference element variation data with at least one detectable element variation provided in a layout to be made for indicating the authenticity of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be 0 provided in the layout.
  • Another object of the present invention is to provide a computer program product for investigating the authenticity of an object that in a more user-friendly way.
  • This object is according to a sixth aspect of the present invention achieved through a computer program product for investigating the authenticity of an object, comprising computer program code to make an authentication data handling device perform when said computer program code is loaded into said authentication data handling device: 5 receive an identity associated with an object, and locate reference object specifying data including reference element variation data for the object in a product database based on the identity, in order to allow a comparison of said reference element variation data with at least one detectable element variation provided in a layout to be made for indicating the authenticity o of the object, where the layout is located in an area of the object and is common to at least one group of such objects and said at least one element variation is one of a limited number of element variations that may be provided in the layout.
  • An element variation as used here is intended to cover variations of an element of a 5 layout provided for an object.
  • This element may be visual such as a special font used in characters in the layout, a special colour, a special icon, a special string of characters or image or a special pattern. It may also be tactile in that such an element, like a special string of characters or a pattern may be embossed in a layout.
  • the element may also be a special odour provided to a product.
  • the manufacturing method for such element variation is based on digital marking technologies like digital printing, laser writing, or digital embossing, so that each layout is digitally defined and applied. When the element variation is digitally defined, its data are easily stored in the database.
  • digital marking technologies give a good data basis for calculation of images that possibly represent how a certain product should look 5 like including its element variation or variations.
  • digital printing as printing method for the product makes it possible to integrate the added element variations in the print jobs without any additional printing steps, whereby the manufacturing is facilitated.
  • the present invention has many advantages. It allows a user to determine the authenticity 0 of an object in a fast and simple way and without requiring any complicated and expensive equipment for investigation of an object.
  • the authentication is furthermore not limited to being carried out in any special place like a laboratory, but can be carried out virtually anywhere. This means that the invention can be carried out without having to resort to various security technologies, although it may very well be combined with such security technologies if it is deemed necessary.
  • the present invention thus lowers the technology threshold while keeping a high security level.
  • fig. 1 schematically shows an authenticity investigation enabling device and an authentication data handling device both connected to a database, as well as an object being provided with a graphical layout
  • fig. 2 shows a graphical layout of the object according to a first embodiment of the present invention
  • fig. 3 shows a graphical layout of the object according to a second embodiment of the present invention
  • fig. 4 shows a table of how content is organised in the database according to some variations of the present invention
  • fig. 5 shows a flow chart outlining a number of method steps taken in a method for enabling the investigation of the authenticity of an object according to the present invention being performed in the authenticity investigation enabling device, fig.
  • FIG. 6 shows a flow chart outlining a number of method steps taken in a method for performing investigations about an object according to the present invention performed in the authentication data handling device
  • fig. 7 shows a block schematic of the relevant parts of an object investigating device
  • fig. 8 shows a table of how content is organised in the database according to some other variations of the present invention
  • fig. 9 schematically shows a computer program product in the form of a CD ROM disc comprising computer program code for carrying out a method of the present invention.
  • Fig. 1 schematically shows a device for enabling the investigation of the authenticity of an object or an authenticity investigation enabling device 10 together with such an object 18.
  • Fig. 1 also shows an authentication data handling device 22. Both these devices 10 and 22 are furthermore connected to a product database 20. These devices 10 and 22 and the database 20 may communicate with each other using a network, which is with advantage
  • a computer network like a LAN, the Internet or some other type of network. It is also possible that they communicate with each other via some form of telecommunication network or a short-range wireless network, like Bluetooth.
  • the devices may be co-located, but they may also be provided in different locations.
  • the authenticity investigation enabling device 10 may be located at the premises of a producer of the object or product, while the authentication data handling device 22 may be located at the premises of a company providing authenticity checks, such as at a retail company selling the object or a product associated with the object.
  • An object may be a package for a product or the product itself. It may furthermore be the combination of product and package. It is then possible that the identity is provided on the product while the graphical layout is provided on the package for the product or vice versa.
  • the authenticity investigation enabling device 10 here includes a first interface 12 for communicating with the database 20 and which is connected to a control unit 14, which in turn is connected to an object modifying unit 16.
  • the object modifying unit 16 may be digital marking equipment that can perform digital printing, laser marking, digital 35 embossing etc. It is capable of providing differentiated layouts of the object 18, which will be described in more detail later in relation to a graphical layout.
  • the authentication data handling device 22 includes a second interface 24 for communicating with the database 20.
  • the second interface 24 is connected to an authenticating unit 26, which in turn is connected to an element variation comparing unit 28 as well as to a display 30 and a 5 keyboard or keypad 32.
  • Fig. 2 and 3 show two different ways in which a graphical layout of the object can be provided.
  • the object is provided with an identity ID1 as well as with a graphical layout 34.
  • the identity is provided in the actual o graphical layout 34. It should however be realised that this identity may be provided on the object separately from the graphical layout 34.
  • the object may be provided in relation to a group of products of a product producer. This means that the object may be provided in relation to a group of products out of several different groups of products provided by the producer.
  • This graphical layout 34 has a main part that is common to at least one 5 group of such objects. It may also be common to a number of such groups or even to all the products of the producer.
  • the graphical layout may also include at least one section 36 that is varied, i.e. is not common.
  • this section 36 at least one detectable element variation 37 is provided.
  • This element variation is one out of a number of selectable element variations from a limited number of element variations that may be provided.
  • the graphical layout 34 includes only one image 38 that is printed on the object and in this embodiment shown in fig. 3, a section 36 is provided as a perceptible, and here visible, part of this image, where this section includes one element variation.
  • the element variation is coded into the common element of the graphical layout. The element variation 5 is thus here concealed by the common elements and not directly perceptible.
  • the element variation 37 is in both these embodiments shown as a special font of a piece of text in the graphical layout. Here it is possible to select various fonts for this piece of text. It should however be realised that the element variations may be provided in some other way like for instance applied to a company logotype or areas having certain colours or 0 combinations of colours, icons or images, character strings or special patterns. It is furthermore possible to apply a certain type of odour to the layout.
  • the product identity ID1 may here be provided as a bar code.
  • the first embodiment may be varied in that there may be more than one section. In this case the element variation may be provided in more than one such section.
  • the provision of more than one element variation e.g. at least a first and a second element variation, gives rise to a quite large number of different layouts when combining the element variations in different ways. This facilitates for the producer of the product as the limited number of element variations for each element variation can be kept small but still enables a safe authentication.
  • an element variation of the same or different types there may be provided more that one element variation of the same or different types.
  • the above described element variations need furthermore not be printed, but can be embossed or provided in any other suitable way in the layout. This means that an element variation does not have to be a variation of a visual element, but can be provided as a variation of an element that is perceived through other senses, like touch, smell, taste, or sound.
  • Fig. 4 depicts a table 40, which shows how content in the database 38 is organised according to a first variation of the present invention.
  • identity ID of an object there is corresponding reference element variation data (EV) identifying the corresponding selected element variation.
  • a number of identities are typically a production batch.
  • object identities ranging from 001 - 099 have received first reference element variation data EV1
  • object identities ranging from 100 - 199 have received second reference element variation data EV2
  • object identities ranging from 200 - 299 have received third reference element variation data EV3
  • object identities ranging from 300 - 399 have received fourth reference element variation data EV4.
  • each object's ID may, e.g. be randomly matched with a specific element variation data.
  • fig. 1 - 4 shows a flow chart outlining a number of method steps taken in a method for enabling the investigation of the authenticity of an object according to the present invention.
  • a detectable element variation 37 to be provided in a section 36 of the graphical layout 34 is here first selected by the control unit, step 42. It here selects one of a number of variations, which is here a 5 special font that is to be applied for a production batch. This means that all objects with identities within a range, which is here range 001 - 099 are provided with the selected element variation.
  • the object identities of the batch and reference object specifying data are then sent form the control unit 14 via the interface 12 to the database 20, where they are stored in the table 38, step 44.
  • the reference object specifying data includes o reference element variation data, which identifies the selected element variation. Since there is one element variation for the whole batch there may be an indicator of the identity interval of the batch stored. This can be seen as storing a reference to the identity together with the reference object specifying data.
  • the control unit 14 orders the object modifying unit 16 to provide the object with the object identity, step 46, and to 5 print the graphical layout with the selected element variation, step 48.
  • the graphical layout 34 is thus here provided in an area of the object and includes the selected element variation.
  • the section with the element variation is included in this image where the graphical layout is provided, while if two images are printed the graphical layout is provided in the first image, while the element variation is 0 provided in the second image. It should here be realised that it is possible to store the specific object identity together with the data identifying the selected element variation. It is also possible that the reference object specifying data includes also data identifying the common layout, which is then stored together with the reference element variation data.
  • the user may here access the authentication data handling device 22. This may be done through directly using it via a user interface in 5 the form of the display 30 and keyboard 32.
  • the authentication data handling device 22 may also be provided through a server on the Internet or any other suitable network, which the user who wants to investigate the authenticity of the object may access via his/her own computer. In this case the interface 24 would be used for communication with the computer of the user. This solution is very attractive since then a 5 user can authenticate a product from virtually every location on earth.
  • the user When a product is to be investigated the user thus gets in contact with the authenticating unit 26 of the authentication data handling device 22 via any of these interfaces 24 or 30 and 32. The user is then presented with the possibility to enter a product identity and
  • the object specifying data that should be entered then includes at least object element variation data identifying the selected detectable element variation, which data can be provided in a drop down list.
  • object element variation data identifying the selected detectable element variation, which data can be provided in a drop down list.
  • the user may thus be presented with a number of different fonts and be made to select one. It is also possible that the user may have to enter the element variation data
  • the authenticating unit 26 thus receives the object identity ID1 , step 50, which is here 20 ID1 , and object specifying data comprising the object element variation data EV1 ', step 52. After this has been done the authenticating unit 26 connects to the database 20 via the interface 24 and locates the reference element variation data EV1 of the object 18 having the received identity ID1 in the interval ID 001 - 0099 in the database 20, step 54. Thereafter this reference element variation data EV1 is sent from the authenticating unit 25 26 to the element variation comparing unit 28 together with the object element variation data EV1 ' received from the user.
  • the element variation comparing unit 28 compares the reference element variation data EV1 with the object element variation data EV1 ', step 56, and determines if there is a match or not, step 58. If there is a match, step 58, the authenticating unit 26 then indicates authenticity of the product, step 62, while if there is 30 no match, step 58, the authenticating unit 26 indicates a mismatch, step 60, which is an indication that the object is related to counterfeit goods.
  • a product identifier is entered by the user and the reference element variation data retrieved from the authentication database and presented to the user. It may here be displayed, for instance through showing the actual graphical layout with the reference element variation or be presented as description of varied markings, possibly also pointing out common security identification means to the group of products which this product belongs to.
  • variable data are displayed to the user
  • the actual authentication is performed by the user by comparing the described features and the product with the ones he/she can directly perceive from the object.
  • the device When the device performs the authentication, it is also possible that the user is made to indicate the common layout of the object, which is then compared with data identifying the common layout from the database. Further rules may also be applied to include analysis of geographical information, time stamps, or supply chain information prior to authentication.
  • the element variation is coded in the common elements of the graphical layout, it is still possible for the user to investigate the element variation. If the user in this case has a special lens, foil or filter, which reveals the element variation in the second image when being placed over the first image. Such a foil may be small and the user can carry it around with him/her.
  • the graphical layout of the object may be photographed by the user. If the camera used has image analysis capability it is here possible for the user to see the element variation and then enter or send the object element variation data to the authentication data handling device. This may then be done using a mobile phone.
  • the element variation comparing unit includes an image analysing unit.
  • the object specifying data may comprise a scanned image of the graphical layout, which may be sent to the authenticating unit of the authentication data handling device.
  • the authentication data handling device may then analyse the image, present the data in the second image to the user, who in turn enters the object element variation data. It is also possible that the user is directed to another device where such image analysis may be performed.
  • the database includes a reference image which is obtained and provided to the image analysing unit of the element variation comparing unit, which thereafter compares the elements of the two images and indicates a match based on the comparison.
  • the authenticity investigation enabling device 10 in this embodiment stores further reference object specifying data in the database 20.
  • This further reference object specifying data is here material properties related to an area of an object group and measurement specifying data in the form of a number of settings S for how to perform measurements in those areas of the object group.
  • the table in fig. 7 is similar to the table in fig. 4, however it includes two extra columns. These columns include sets of material properties P and measurement specifying data S for how to perform measurements in areas of the objects.
  • the material property data are preferably pre-measured properties of the object. These measurements have then been performed beforehand, for instance by the object provider, preferably before shipping of said objects
  • Fig. 8 shows a block schematic that outlines the general structure of an object investigating device 64, with which the user can inspect the object and to be connected to the authentication data handling device.
  • the object 18 is made of a certain type of material and is provided with a code field, that in this embodiment is provided as a bar code BC providing an code C corresponding to the object identity ID1.
  • the code C may be an identity ID1 or it may be a code, which enables the identity to be determined based 5 on some code determining algorithm. Such a determination of the identity corresponding to the code may be provided in the authentication data handling device 22.
  • the code C may be identical with the identity ID1 for a correctly identified object.
  • the object 18 furthermore has one area A, where the structure of the material has been tampered with in order to provide a signature that can be detected.
  • the measured material properties o that thus indicate the signature are denoted as P1 '.
  • the signature has been embedded through the area A comprising a fluorescent taggant or marker in order to define a selective fluorescence pattern.
  • the taggant may be provided through adding small particles having a certain fluorescence that differs from the fluorescence of the box material at selected positions within the area A. There are several ways in which this 5 tampering can be made, a few of which will be described further on in the description. It should here be realised that the material need not be tampered with at all.
  • the device 64 is provided with an object identity detector 68 which is here provided as a bar code reader. It also has a 0 material properties measurement unit 70, which in this embodiment is made up of a light source 72 arranged to move over the area A and one or a number of light detectors 74 that move in parallel with the light source 72 and detect light reflected from the surface of the object. In the figure, only one such detector 74 is shown in order to simplify the understanding of the present invention. However, it should be realised that there may be 5 several such detectors.
  • the device furthermore includes an object investigation control unit 66 controlling the units 68 and 70 as well as a communication interface 76 to the network.
  • the object investigation control 0 unit 66 orders the bar code reader 68 to read the bar code BC.
  • the bar code reader 68 then obtains the identity ID1 of the object 18 by detecting it through reading the code C provided by the bar code BC.
  • the thus detected identity ID1 is then forwarded to the authentication data handling device 22.
  • This may be accompanied by the previously mentioned object element variation data.
  • the authentication data handling device 22 then 5 obtains the settings S1 that are associated with the identity ID1 from the database 20. This can be done simultaneously with the locating of reference element variation data described above and here it is possible that also the pre-stored material property data P1 associated with the object 18 are fetched at the same time.
  • the authentication data handling device 22 then sends the settings S1 to the object investigating device 64, where the control unit 66 applies the settings S1 on the material properties measurement unit 70. In this way the material properties measurement unit 70 is adjusted according to the received settings S1 .
  • Typical settings may here include data indicating where the area A is located. Other information may be coordinates where to o scan, the direction and size of scan area, scanning speed, detector sensitivity, calibration parameters, frequency and resolution (both in time and space). Also the analysis parameters may be varied and specified.
  • the light source 72 which may with advantage be a laser, is set to scan the area A with light L having a certain frequency profile.
  • the light detector 74 which may with advantage be a 5 diode laser, then detects or measures the material properties P1 '.
  • the fluorescence in a certain area is measured while scanning the irradiating frequency. This can be done by tuning a laser or by irradiation with multi-frequency light which passes a prism. Then these measured properties P1 ' are provided to the authentication data handling device 22. 0
  • the authentication data handling device 22 compares the received material properties P1 with the measured material properties P1 ' and bases the indication of authenticity also on this comparison.
  • the measurements can be multi-tasks like for example frequency scanning in certain sequences and frequency bands whereas the response is delivered to the authentication system and a comparison with identity related data is performed to check the identity of the object having a certain identity.
  • the fluorescence in a certain area may be measured while scanning the irradiating frequency. This can be done by tuning a laser or by irradiation with multifrequency light which passes a prism.
  • the fluorescence profile would depend on the materials used in manufacturing of the object. In many cases, materials have very specific fluorescence 5 profiles and can as such reveal copied materials with different origin. This is the case, for example, for some paperboard substrates.
  • fluorescent taggants or markers can be used to define a selective fluorescence pattern. This would provide the object with an additional security feature since it is not sufficient to provide a feature giving a certain response at a o certain frequency but the response would have to be correlated for several frequencies.
  • any measurements that characterize an item in a physical or chemical manner can be used.
  • Other examples are: electrical nose (chemical analysis), atomic force microscopy, air 5 leakage, profile scanning, weight, inertia, x-ray, acoustic sensing.
  • the measurement specifying data can be provided in the form of pre-defined measurement protocols.
  • item-related pre-defined measurement protocols or analysis enables the detection of statistical variations inherent in material through so- 0 called micro-level analysis, even though the material is considered to be identical on a macro-level.
  • Micro-level analysis can reveal signature information that identifies a certain part of a material. This signature can be unique or sufficiently distinct to be used as a specific object property.
  • One embodiment of the invention could use unique identities for each item and a signature would be unambiguous for authentication of an item. 5
  • One embodiment of this invention is related to communication about any kind of measurement protocols to be applied for testing the identity of an object and communication of results for comparison with data from the database.
  • measurement instructions are coordinates where to scan, the direction and size of scan 0 area, scanning speed, resolution (in time and in space), frequency, magnetic or electronic parameters, but the invention is not limited to the parameters mentioned here.
  • analysis parameters like calibration, normalization or reference data can be communicated too.
  • Other data can be parameter settings, localization of measurement 5 points etc.
  • a combination of measurements is possible. For example image analysis from a white light reflection scan may be used for identifying the relevant area when performing a signature scan.
  • each object is identified by a code, which above was provided as a 5 barcode.
  • a code written to an RFID tag.
  • the object identity can be unique for each object or it can be the same for a group of objects. It is also possible that the material properties are common for a group of objects.
  • the control unit of the authenticity investigation enabling device and the authenticating unit and element variation comparing unit of the authentication data handling device may each be implemented through one or more processors together with computer program code for performing their functions.
  • the authentication data handling device may here 0 also be provided as a mobile phone.
  • the program code mentioned above may also be provided as a computer program product, for instance in the form of one or more data carriers carrying computer program code for performing the functionality of the present invention when being loaded into a device having computing functionality, such as a computer or a mobile phone.
  • One such carrier 78, in the form of a CD ROM disc is 5 generally outlined in fig. 9. It is however feasible with other data carriers, like diskettes, memory sticks or USB memories.
  • the computer program code can furthermore be provided as pure program code on an external server and fetched from there for provision in the device or entity that is to receive it.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Dispositif (10) d'étude de l'authenticité d'un objet (18), comprenant un module (16) de modification d'objet servant à doter l'objet (18) d'une identité et une région de l'objet d'une structure graphique, et un module de commande (14) servant à sélectionner une variation élémentaire détectable, à donner au module (16) de modification d'objet l'instruction de doter l'objet (18) d'une structure graphique incorporant la variation élémentaire sélectionnée, et à stocker l'identité ainsi que des données de variation élémentaire de référence identifiant la variation élémentaire sélectionnée dans une base de données de produits (20). Un dispositif (22) de traitement de données d'authentification reçoit une identité d'un objet (18) et localise des données de variation élémentaire de référence dans une base de données de produits (20) de manière à comparer les données à une variation élémentaire de l'objet et à établir l'authenticité de l'objet.
EP07748357A 2006-03-29 2007-03-29 Etude d'authenticite conviviale Withdrawn EP2011040A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US78738706P 2006-03-29 2006-03-29
PCT/SE2007/050196 WO2007111569A1 (fr) 2006-03-29 2007-03-29 Etude d'authenticite conviviale

Publications (1)

Publication Number Publication Date
EP2011040A1 true EP2011040A1 (fr) 2009-01-07

Family

ID=38541396

Family Applications (2)

Application Number Title Priority Date Filing Date
EP06824634A Withdrawn EP2008221A4 (fr) 2006-03-29 2006-12-12 Etude polyvalente d'authenticite
EP07748357A Withdrawn EP2011040A1 (fr) 2006-03-29 2007-03-29 Etude d'authenticite conviviale

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP06824634A Withdrawn EP2008221A4 (fr) 2006-03-29 2006-12-12 Etude polyvalente d'authenticite

Country Status (2)

Country Link
EP (2) EP2008221A4 (fr)
WO (2) WO2007111548A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
DE602005014755D1 (de) 2004-03-12 2009-07-16 Ingenia Technology Ltd Verfahren und vorrichtungen zur erzeugung authentifizierbarer gegenstände und ihrer nachfolgenden überprüfung
AU2005220385B2 (en) 2004-03-12 2010-07-15 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
GB2417592B (en) 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
RU2417448C2 (ru) 2005-07-27 2011-04-27 Инджениа Холдингс Лимитед Верификация аутентичности
CN101923647B (zh) 2005-12-23 2013-01-09 英根亚控股有限公司 光学鉴别
GB2460625B (en) * 2008-05-14 2010-05-26 Ingenia Holdings Two tier authentication
GB2466311B (en) 2008-12-19 2010-11-03 Ingenia Holdings Self-calibration of a matching algorithm for determining authenticity
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation
EP2990988A1 (fr) 2014-09-01 2016-03-02 Authentic Vision GmbH Procédé et système d'authentification destiné à l'enregistrement d'une caractéristique de sécurité aléatoire
CN105069385A (zh) * 2015-07-25 2015-11-18 合肥玖德电子科技有限公司 一种基于身份证的身份认证系统
EP3699856A1 (fr) * 2019-02-21 2020-08-26 INL - International Iberian Nanotechnology Laboratory Marquage d'un objet

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU1895992A (en) * 1992-05-06 1993-11-29 Cias, Inc. Counterfeit detection using random number field IDs
US5592561A (en) * 1994-04-14 1997-01-07 Moore; Lewis J. Anti-counterfeiting system
US6459825B1 (en) * 1999-02-18 2002-10-01 Phillips M. Lippincott Method and apparatus for a self learning automatic control of photo capture and scanning
US6874639B2 (en) * 1999-08-23 2005-04-05 Spectra Systems Corporation Methods and apparatus employing multi-spectral imaging for the remote identification and sorting of objects
EA003919B1 (ru) * 1999-12-08 2003-10-30 Валентин Александрович Мищенко Способ и система для маркировки и идентификации изделий
AU2003902702A0 (en) * 2003-05-30 2003-06-19 Astrosys International Ltd Currency note identification and validation
AU2005220385B2 (en) * 2004-03-12 2010-07-15 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
BRPI0400727A (pt) * 2004-03-17 2005-11-01 Ricardo Cardoso Mendonc Barros Placa de blindagem e veìculo blindado

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2007111569A1 *

Also Published As

Publication number Publication date
WO2007111548A1 (fr) 2007-10-04
EP2008221A1 (fr) 2008-12-31
WO2007111569A1 (fr) 2007-10-04
EP2008221A4 (fr) 2010-07-07

Similar Documents

Publication Publication Date Title
WO2007111569A1 (fr) Etude d'authenticite conviviale
US20090283583A1 (en) Two Tier Authentication
JP5148996B2 (ja) 認証可能な印刷物品を作成し、その後に検証するための方法および装置
EP1784757B1 (fr) Procedes, produits et instruments de verification d'authenticite
CN101602296B (zh) 创建可验证打印物品并随后验证它们的装置
US20080294900A1 (en) Authenticity Verification of Articles Using a Database
US20140119615A1 (en) Product, image, or document authentication, verification, and item identification
US20160140427A1 (en) Security coding system and marker, optoelectronic scanner and method of coding articles
US20040172537A1 (en) System and method for tracking and authenticating items through an internet web site
RU2651167C2 (ru) Способ и система для маркировки изделия, изделие, промаркированное таким образом, и способ и система для аутентификации промаркированного изделия
RU2463662C2 (ru) Виртуальное окно кода
EP4242950A1 (fr) Système et procédé mis en uvre par ordinateur pour détecter des articles contrefaits ou des articles produits de manière illicite
GB2462029A (en) A system for tracking an article
CN112689838B (zh) 光致发光鉴定装置、系统和方法
KR101906480B1 (ko) 진위판별용 보안시트 및 이를 이용한 진위판별 방법
Lancaster Detecting counterfeits in the supply chain: how to use authentication methods
RU2205452C1 (ru) Способ идентификации музыкальных инструментов
HK1139901B (en) Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
WO2003005310A2 (fr) Mesures anti-contrefaçon

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20081029

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20101001