专利摘要:
The present invention relates to a system for traceability and authentication of a product (1) on which an identification and authentication marking (2) is used, the marking (2) comprising on the one hand a first identifier ( 31) encrypted comprising at least one set of basic information about the product (1) and / or its provider and / or recipient and secondly a second encrypted identifier (32) comprising a series of confidential information; the system comprising at least one information system (4) able to authenticate or not the product (1), and at least one device (5) for reading and communicating or processing the encrypted information contained in the identifiers (31, 32) identification and authentication marking (2); the second identifier (32) also includes encrypted information concerning the integrity of the product (1); the second encrypted identifier (32) being affixed under the first identifier (31) encrypted so as to be masked by the first identifier (31), and the first encrypted identifier (31) is destroyed to allow access to the second identifier (32); ) encrypted.
公开号:FR3061582A1
申请号:FR1663498
申请日:2016-12-29
公开日:2018-07-06
发明作者:Francois Dubois;Patrick Deschamps;Marion Drollet
申请人:Genetiq;Worldline SA;
IPC主号:
专利说明:

® Agent (s): CABINET YVES DEBAY.
(54) SYSTEM AND METHOD FOR TRACEABILITY AND AUTHENTICATION OF A PRODUCT.
FR 3,061,582 - A1 (57) The present invention relates to a system for traceability and authentication of a product (1) on which is used an identification and authentication marking (2), the marking (2) comprising on the one hand a first encrypted identifier (31) comprising at least one series of basic information on the product (1) and / or its supplier and / or its recipient and on the other hand a second encrypted identifier (32) comprising a series of confidential information; the system comprising at least one information system (4) capable of authenticating or not authenticating the product (1), and at least one device (5) for reading and communicating or processing the encrypted information contained in the identifiers (31, 32) identification and authentication marking (2); the second identifier (32) also includes encrypted information relating to the integrity of the product (1); the second encrypted identifier (32) being affixed under the first encrypted identifier (31) so as to be masked by the first identifier (31), and the encrypted first identifier (31) is destroyed to allow access to the second identifier (32 ) encrypted.

i
System and method for product traceability and authentication
TECHNICAL FIELD OF THE INVENTION
The present invention relates to the field of traceability and authentication systems for a product, more particularly, on which is affixed an identification and authentication device. The present invention also relates to a method of traceability and authentication of at least one product on which is affixed an identification and authentication device.
TECHNOLOGICAL BACKGROUND OF THE INVENTION
A problem in the field of traceability and product authentication systems concerns the reliability of the system, all fields combined.
Indeed, most manufactured products have a marking in order to guarantee their traceability and their identification, for example when packaging the product with the manufacturer or the issuer, when the product is shipped by the manufacturer, each time stage of product delivery by one or more conveyor (s) or intermediary (ies), and upon receipt of the product by a sender or a receiver. To protect against loss, theft or counterfeiting of the product; it is necessary, on the one hand, to trace the delivery of a product, and on the other hand, to identify and be able to authenticate the product upon receipt of the product by the recipient.
It is known from the prior art that most manufactured products have a unique identifier, coded and difficult to reproduce. In the prior art, there are different coding and identifier systems for products known to those skilled in the art. Two-dimensional codes are particularly frequently used. These are generally presented in the form of a matrix made up of dark squares and white or translucent squares, whose relative position makes it possible to code a specific chain of characters on the product. The character string can be a keyword, or a concatenation of different keywords, which refer to data included in a database. In this family of two-dimensional coding systems, one of the most popular is the QR Code. It is generally small in order to be discreet about the product, and, to complicate the illegal reproduction of the product identifier. The QR Code is used in particular to store digital information (texts, website addresses, etc.) and can be decrypted from a mobile phone equipped with a camera and appropriate decoding software.
This solution of the prior art has the drawback of using a single identifier encrypted by a two-dimensional code both for the traceability and the authentication of a manufactured product. The information encrypted for product traceability is the same as for product authentication. Thus, once the encrypted identifier has been decrypted by a device including appropriate software, it is easy to copy the original identifier and create a falsified identifier containing the same encrypted information and, for example, use it on a other product. The falsified identifier contains the same information as the encrypted original identifier, which makes it possible to fake identification and authentication of a product of different origin when the product is received by the recipient. It will also be difficult to know at what point in the delivery stage the product has been changed and tampered with. This traceability and authentication system using a unique encrypted identifier to track and authenticate a product is easily falsifiable and therefore not reliable in use.
It also known from the prior art a system and a method for authenticating a medicinal product with a mobile computing device, as for example described in US Pat. No. 8,534,543. This system, intended to protect a medicinal product against counterfeiting, comprises a inactive ingredient in the product to create a first encrypted identifier on a surface of the product and comprising information that only distinguishes the product from another similar or different product; a second identifier is applied to the surface of the product, so as not to mask the first identifier and this second identifier is encrypted to authenticate the product and its manufacturer.
The disadvantage of the system described in the document of the prior art above, is that it does not make it possible to trace the product during its transit from the manufacturer to the recipient. Indeed, the two identifiers contained in the system of the previous document only allow the product to be authenticated against another product and the manufacturer of the product. In addition, unlike the first identifier placed in the product, the second system identifier, which is placed on the product, is easy to access for a counterfeiter who can decrypt and copy and / or falsify this second identifier, or even the two identifiers. To overcome this drawback, this system provides for the introduction of the first identifier into the product, which limits the scope of application to products comprising transparent packaging so that the first identifier is visible to authenticate the product. This feature also has the disadvantage that the customer or the receiver can be wrong in the order of scanning the labels and trigger an inappropriate system error.
In this context, it is interesting to propose a solution which makes it possible to overcome the drawbacks of the prior art by facilitating and improving the traceability and authentication system of a product.
GENERAL DESCRIPTION OF THE INVENTION
The purpose of the present invention is to overcome certain drawbacks of the prior art by proposing a solution making it more reliable a system of traceability and authentication of a product on which an identification and authentication marking is used.
To this end, the present invention relates to a system of traceability and authentication of a product on which an identification and authentication marking is used, the marking comprising on the one hand a first encrypted identifier comprising at least one series basic information on the product and / or its supplier and / or its recipient and on the other hand a second encrypted identifier comprising a series of confidential information; the system comprising at least one information system capable of authenticating or not authenticating the product, and at least one device for reading and communicating or processing the encrypted information contained in the identifiers of the identification and authentication marking; the second identifier also includes encrypted information relating to the integrity of the product; the second encrypted identifier being affixed under the first encrypted identifier so as to be masked by the first identifier, and the first encrypted identifier is destroyed to allow access to the second encrypted identifier.
According to another particular feature, the identification and authentication marking comprises a first layer comprising the second encrypted identifier and a second layer comprising the first encrypted identifier and covering the second identifier.
According to another particular feature, data for operational management (recipient address, handling precautions, etc.) and / or marketing data (Url of the brand's website, loyalty program, etc.) are incorporated into the first identifier.
According to another particularity, the encrypted information relating to the integrity of the product contained in the second identifier, includes confidential information on the physical and / or technological characteristics of the product, or confidential information that only the recipient or the supplier can consult on the information system so as to ensure authenticity of the product, the link between these two encrypted information being only known and recorded in the information system or in the reading and communication or processing device.
According to another particular feature, the first and second encrypted identifiers are two-dimensional codes.
According to another particularity, the two-dimensional codes are QR Codes.
According to another particular feature, the identification and authentication marking is a sticker.
According to another particular feature, the first encrypted identifier is destroyed by peeling it off or by scratching it.
According to another particular feature, when the first encrypted identifier is destroyed, a message appears in a frame of the destroyed layer making it possible to invalidate its use.
According to another particular feature, the reading and communication or processing device is a scanner or a mobile device comprising
- either an appropriate decryption software allowing to decrypt the encrypted information contained in the identifiers of the marking and having received, before or after reading the first information, the link between the two encrypted information to verify it and attest to the authenticity ,
- Either means of communication to send either the encrypted information to the information system which alone knows in this case, the link between the two encrypted information, or send to the information system a signal attesting to the authenticity and in this case , the reading and communication or processing device is the only one to know the connection between the two encrypted information.
Another subject of the present invention is a method of traceability and reliable authentication of a product on which an identification and authentication marking is used.
This object is achieved by the process of traceability and authentication of at least one product on which at least one identification and authentication marking is used, the process comprises the following successive steps:
- a step of writing encrypted information at least in a first and a second identifier by an information system,
- a step of printing the second encrypted identifier on the identification and authentication marking,
- a step of affixing the second encrypted identifier on a surface of the product,
- a step of printing the first encrypted identifier
- a step of affixing a layer containing or supporting the first encrypted identifier on the second encrypted identifier of the same marking so as to mask the second identifier,
- at least one step of reading and communicating the first identifier encrypted by a reading and communication or processing device identified in an information system with its location, the reading and communication or processing device sending at least the result reading and the device identifier to provide information on the transit of the product to the information system,
a step of destruction by manual action of the first encrypted identifier of the product so as to access the second encrypted identifier on receipt of the product by a recipient,
- a step of reading the encrypted information contained in the second identifier by the reading and communication or processing device followed:
o either sending encrypted information to the information system so that it certifies the authenticity, o either processing by the appropriate means of the reading device which in this case informs the information system of the authentication or not of the product.
According to another particular feature, a storage of the first encrypted identifier is activated in the information system by a reading and communication device of an entity issuing the product after the step of affixing the first identifier to the second identifier.
According to another particularity, the method also comprises one or more steps of reading, by at least one intermediary during the transit of the product, by a device previously identified and located in the information stored by the information system, of the first identifier encrypted before the step of reading and recording the second identifier encrypted by a reading and communication or processing device (the same or not), upon delivery to the recipient.
According to another particularity, the information system firstly stores in its memory a series of encrypted information contained in the first identifier, when affixing the identification and authentication marking on the product by the issuing entity, in association with the second identifier and the relationship between the first and the second identifier, to attest to their authenticity and for the traceability of the product, in a second step with each communication by the reading and communication device during transit of the product through at least one intermediary and finally upon delivery records either the authenticity established by the reading and communication device, or the information transmitted concerning the second identifier and verifies the authenticity, ensuring that the relationship initially memorized between the first and the second identifier is still respected.
According to another particular feature, the second encrypted identifier is destroyed by taking off or scratching during the destruction step defined by the issuing entity (for example upon receipt of the product).
According to another particular feature, at each stage of delivery, the intermediary transporting or handling the product scans the identification and authentication marking with a reading and communication or processing device identified and located beforehand by the system of information; and the information of the first identifier is transmitted to be registered in a traceability tracking system, in order to follow the entire life cycle of the product; the traceability system is managed by the information system.
Other features and advantages of the present invention are detailed in the description which follows.
DESCRIPTION OF ILLUSTRATIVE FIGURES
Other particularities and advantages of the present invention will appear more clearly on reading the description below, made with reference to the appended drawings, in which:
FIG. 1 represents a diagram according to an embodiment of a traceability and authentication system for a product on which an identification and authentication marking is used, the system further comprising a reading device and registration and information system;
- Figure 2 shows a perspective view of an embodiment of the identification and authentication marking comprising a first encrypted identifier and a second encrypted identifier, before the affixing of the first identifier to the second identifier;
- Figure 3 shows a diagram showing an embodiment of a method of traceability and authentication of a product on which is used an identification and authentication marking.
DESCRIPTION OF THE PREFERRED EMBODIMENTS OF THE INVENTION
The invention, with reference to Figures 1 to 3, will now be described.
The present invention relates to a traceability and authentication system for at least one product (1) on which at least one identification and authentication marking (2) is used.
In certain embodiments, for example as shown in FIGS. 1 and 2, the marking (2) of identification and authentication of the traceability and authentication system of the product (1) comprises, on the one hand, a first encrypted identifier (31) comprising at least one series of basic information on the product and / or its supplier and / or its recipient, and on the other hand, a second encrypted identifier (32) comprising a series of confidential information . Thus, the marking is made up of a double identifier comprising encrypted information making it possible to facilitate and secure the identification, authentication and traceability of a product issued by a supplier and received by a recipient. The first encrypted identifier includes basic information on the product (for example the order number, type of product, etc.), and / or the supplier (for example such as name, physical address and / or web, the number of the supplier) and / or the recipient (for example such as the name, the address of the recipient) so that the product is properly distributed by one or more intermediaries or conveyors; while the second identifier includes confidential information so as to securely and reliably authenticate the product. In this embodiment, the second identifier (32) also includes information, concerning the integrity of the product (1), encrypted. Indeed, the encrypted information on the integrity of the product makes it possible to distinguish without confusion, for example an original and legitimate product from a counterfeit. In this embodiment, for example as shown in FIG. 2, the second encrypted identifier (32) is affixed under the first encrypted identifier (31) so as to be masked by the ίο first identifier (31). Thus, it will be difficult to falsify the second encrypted identifier masked by the first encrypted identifier. The first encrypted identifier (31) is destroyed to allow access to the second encrypted identifier (32). This constitutes a reliable means to secure and strengthen access to confidential information held by the first identifier.
In certain embodiments, the system of traceability and authentication of at least one product (1) on which at least one marking (2) of identification and authentication is used, also comprises at least one system of information (4). This information system makes it possible, on the one hand, to generate the identifiers of the identification and authentication marking, and on the other hand, to trace the product distribution route and to deny or not integrity of the marking and therefore of the product on which the marking is affixed.
Indeed, in one embodiment, the link between the two encrypted identifiers is only known in the information system, and on the other hand each reading and communication or processing device is recorded with its identifier and its location on the route in the information system, so that the distribution route and product validation are stored in the information system.
In some embodiments, the system further comprises at least one device (5) for reading and communicating and processing the encrypted information contained in the identifiers (3, 31, 32) of the identification marking (2) and d 'authentication. The device makes it possible to decrypt and / or process, using for example and without limitation a camera and appropriate decryption software, the encrypted information contained in the identifiers of the marking. Then, the device communicates this information or the result of the processing to the information system and vice versa, the information system is able to communicate with the device (5), for example to identify and / or authenticate the product. For example as shown in FIG. 1, the device (5) processes (53) the information of the identifiers (3, 31, 32) and the device (5) communicates (54) this information processed to the information system ( 4) so that it memorizes them.
In certain embodiments, for example as shown in FIG. 2, the identification and authentication marking (2) comprises a first layer (21) comprising the second encrypted identifier (32) and a second layer (22) comprising the first encrypted identifier (31) and covering the second identifier (32). The marking is composed of double layers intended to each receive an encrypted identifier, so as to distinctly separate the information from the identifiers and simplify the carrying out of the identification marking and authentication.
In certain embodiments, data for operational management (recipient address, handling precautions, etc.) and / or marketing data (Url of the brand website, loyalty program, etc.) are incorporated. in the first identifier (31). This data is basic information enabling the product to be distributed and identified at each stage of product delivery until the product is received by the recipient.
In certain embodiments, the encrypted information relating to the integrity of the product (1) contained in the second identifier (32), includes confidential information on the physical and / or technological characteristics of the product, or confidential information that only the recipient or the supplier can consult on the information system (4) so as to ensure authenticity of the product (1), the link between these two encrypted information is, in one embodiment, only known in the information system ( 4). Confidential data contained in the second identifier is encrypted and masked by the first identifier, which secures access and falsification of this data. In this embodiment, only these confidential data on the integrity of the product which are known to the information system, make it possible to confirm or not the authenticity of the product when the product is received by the recipient.
In some embodiments, the first (31) and second (32) encrypted identifiers are in the form of two-dimensional codes. The identifiers are encrypted, that is to say that the identifiers include a computer protection system intended to guarantee the integrity and inviolability of the data during their transmission or storage. A two-dimensional code is used in one embodiment so as to store more information than a conventional bar code and the data is directly recognized by the reading and recording or communication apparatus.
In certain embodiments, for example as shown in FIG. 2, the two-dimensional codes are QR Codes. QR Codes can be created and used quickly and easily. Indeed, the QR Code can be easily read with a reading device, for example such as a scanner or a mobile phone equipped with a QR Code reading application.
In certain embodiments, the identification (2) and authentication marking is carried out on a sticker (2) or a sticker (2). The self-adhesive sticker is an easy-to-use support comprising an adhesive layer allowing the sticker to be affixed easily and directly on any type of surface. Similarly, the self-adhesive sticker allows you to print identifiers in all types of formats, easy installation, good resistance to peeling and to communicate at low cost.
In other embodiments, the identification (2) and authentication marking is carried out by affixing one or more layers of paint or ink on the product, constituting each support layer of the markings, with for the second layer on which the first information is printed, the particularity of being able to scrape this second layer without destroying the first layer, nor the second information printed on the first layer.
In some embodiments, the first encrypted identifier (31) is destroyed by peeling off or scraping it off. In certain embodiments, when the first encrypted identifier (31) is destroyed, for example by peeling it off, a message appears in a frame of the destroyed layer (22) making it possible to invalidate its use. Indeed, the first identifier is destroyed manually by peeling off or scraping the second layer of the marking so as to access the confidential information contained in the second identifier. In some embodiments, the issuing entity defined and informs whether the encrypted second identifier (32) must be destroyed during the destruction step for example and in a nonlimiting manner upon receipt of the product (1). Thus, the second encrypted identifier (32) is destroyed by taking off or scraping at the destruction stage which is a decisive stage in the life of the product (1) allowing authentication of the product (1).
In certain embodiments, the reading and communication or processing device (5) is a scanner (5) or a mobile device (5) comprising
- or an appropriate decryption software allowing to decrypt the encrypted information contained in the identifiers (3, 31, 32) of the marking (2) and having received, before or after reading the first information, the link between the two information encrypted to verify it and certify authenticity,
- Either means of communication to send either the encrypted information to the information system which alone knows in this case, the link between the two encrypted information; either send the information system a signal attesting to the authenticity and in this case, the reading and communication or processing device is the only one to know the connection between the two encrypted information.
In fact, in one embodiment, the device (5) comprises reading software for reading the encrypted information contained in the identifiers (3, 31, 32) and communicating them with the identifier of the device (5) and the location data from the device (5) to the information system (4). Thus, the reading apparatus (5) is able to transmit the reading of a first encrypted information contained in the first identifier (31) and of a second encrypted information contained in the second identifier (32), to the system of information (4). The information system, knowing the information of the two identifiers (31, 32) and the link between these two identifiers (31, 32), is capable of verifying the information transmitted by the device (5) to attest to the authenticity identifiers (31, 32) and therefore of the product (1), as well as ensuring the traceability of the delivery.
In another embodiment, the device (5) for reading and communication or processing is a scanner (5) or a mobile device (5) comprising appropriate decryption software making it possible to decrypt the encrypted information contained in the identifiers (3, 31, 32) of the marking (2) and having received, before or after reading the first information, the information defining the connection between the two encrypted information to verify this connection and attest to the authenticity, The apparatus (5), knowing the information and the link between the information contained in the identifiers (31, 32), is capable of sending the product authentication signal (1) to the information system, with its identifiers and its location, thus confirming the receipt of the product (1) by the recipient or the passage of the product through an intermediary and thus ensuring traceability.
The present invention also relates to a method of traceability and authentication of at least one product (1) on which at least one identification and authentication marking (2) is used.
In certain embodiments, as shown for example and without limitation in FIG. 3, the method comprises the following successive steps:
- a step of writing encrypted information (E1, E11, E12) at least in a first (31) and a second (32) identifiers by an information system (4),
- a printing step (E2a) of the second identifier (32) encrypted on the identification and authentication marking (2),
- a step of affixing (E2b) the second identifier (32) encrypted on a surface of the product (1),
- a printing step (E3a) of the first encrypted identifier (31),
- a step of affixing (E3b) a layer (22) containing or supporting the first identifier (31) encrypted on the second identifier (32) encrypted with the same marking (2) so as to mask the second identifier (32) ,
- at least one reading and communication step (E4) of the first identifier (31) encrypted by an apparatus (5) for reading and communication or processing identified in an information system (4) with its location, the apparatus (5) for reading and communication or processing sending at least the result of the reading and the identifier of the device (5) to thereby supply information on the transit of the product (1) to the information system (4) ,
a step of destruction (E5) by manual action of the first encrypted identifier (31) of the product (1) so as to access the second encrypted identifier (32) on receipt of the product (1) by a recipient,
a step of reading (E6) the encrypted information contained in the second identifier (32) by an apparatus (5) for reading and communication or processing followed:
o either sending encrypted information to the information system (4) so that it certifies the authenticity, o or processing by the appropriate means of the reading device (5) which in this case informs the system information (4) of the authentication or not of the product (1).
The traceability and authentication process has the advantage of making the monitoring and authentication of at least one product more reliable, with at least one identification and authentication marking affixed. Indeed, the use of marking makes it possible to secure and protect the product against any falsification of data and to ensure the monitoring of the distribution of the product as well as its authentication when it is delivered to the recipient. In one embodiment, only the information system knows the information and the link between the information contained in the identifiers of the marking to certify the authenticity of the marking and therefore of the product.
In certain embodiments, a storage of the first encrypted identifier (31) is activated in the information system (4) by a device (5) for reading and communication of the entity issuing the product (1) after the affixing step (E2b) of the first identifier (31) to the second identifier (32).
In certain embodiments, the method also comprises one or more reading steps (E4), by at least one device (5) previously identified and located in the information stored by the information system (4) and associated with an intermediary involved in the transit of the product (1), the first identifier (31) encrypted before the reading step and a reading and recording step (E6) of the second identifier (32) encrypted by a reading device (4) and communication or processing (the same or not in the case of several intermediaries), when delivering the product to the recipient.
In certain embodiments, the information system (4) firstly stores in its memory a series of encrypted information contained in the first identifier (31), when the identification marking (2) is affixed. and authentication on the product (1) by an issuing entity, in association with the second identifier (32) and the relationship existing between the first (31) and the second (32) identifier to attest to their authenticity and in a second time for product traceability (1) the identifiers and location data of the devices involved in the delivery process, for each communication by a device (5) for reading and communication or processing during the transit of the product (1) by at least one intermediary and finally during delivery records either the authenticity established by the reading and communication device (5) or the information transmitted concerning the second identifier (32) and verifies the authenticity, making sure that the relationship initially memorized between the first (31) and the second (32) identifier is still respected.
In certain embodiments, at each stage of delivery, the intermediary transporting or handling the product (1) scans the marking (2) of identification and authentication with an apparatus (5) for reading and communication identified and previously located by the information system (4); and the information of the first identifier (31) is transmitted in order to be registered in a traceability monitoring system (for example and without limitation by EPCIS monitoring), in order to follow the entire life cycle of the product; the traceability system is managed by the information system (4). This embodiment makes it possible to know each participant transporting and distributing the product at all times, so as to detect any anomaly, for example loss or theft of the product, which may occur during the distribution of the product. Likewise, this embodiment makes it possible to obtain a history of the last owners of the product and / or a geolocation of the product so as to detect and ensure prevention, for example when fraud is suspected.
In certain embodiments, the second encrypted identifier (32) is destroyed by taking off or scraping on receipt of the product (1). Indeed, during the delivery of the product to the recipient, the product intermediary will scan the first identifiers (31) with a device (5) for reading and communication or processing, then destroy this first identifier (31) by taking off or scraping to scan the second identifier (32) so that the information system (4) does or does not invalidate the integrity of the identification and authentication marking (2).
The system and the method of traceability and authentication of at least one product on which is affixed at least one identification and authentication marking, are applicable to different fields, such as for example and in a non-limiting manner the tracking and authentication of spare parts, management of guaranteed returns or after-sales service, luxury products, management of seals, authentication of works of art or wines and spirits.
The present application describes various technical characteristics and advantages with reference to the figures and / or to various embodiments. Those skilled in the art will understand that the technical characteristics of a given embodiment can in fact be combined with characteristics of another embodiment unless the reverse is explicitly mentioned or it is obvious that these characteristics are incompatible or that the combination does not provide a solution to at least one of the technical problems mentioned in the present application. In addition, the technical characteristics described in a given embodiment can be isolated from the other characteristics of this mode unless the reverse is explicitly mentioned.
It should be obvious to those skilled in the art that the present invention allows embodiments in many other specific forms without departing from the scope of the invention as claimed. Therefore, the present embodiments should be considered by way of illustration, but may be modified in the field defined by the scope of the appended claims, and the invention should not be limited to the details given above.
权利要求:
Claims (16)
[1" id="c-fr-0001]
1. Traceability and authentication system for a product (1) on which an identification and authentication marking (2) is used, the marking (2) comprising on the one hand a first encrypted identifier (31) comprising at least one series of basic information on the product (1) and / or its supplier and / or its recipient and on the other hand a second encrypted identifier (32) comprising a series of confidential information; the system comprising at least one information system (4) capable of authenticating or not authenticating the product (1), and at least one device (5) for reading and communicating or processing the encrypted information contained in the identifiers (31, 32) identification and authentication marking (2); the system being characterized in that the second identifier (32) also includes encrypted information relating to the integrity of the product (1); the second encrypted identifier (32) being affixed under the first encrypted identifier (31) so as to be masked by the first identifier (31), and the encrypted first identifier (31) is destroyed to allow access to the second identifier (32 ) encrypted.
[2" id="c-fr-0002]
2. System according to claim 1, characterized in that the identification and authentication marking (2) comprises a first layer (21) comprising the second encrypted identifier (32) and a second layer (22) comprising the first identifier (31) encrypted and covering the second identifier (32).
[3" id="c-fr-0003]
3. System according to claim 1 or 2, characterized in that data for operational management (recipient address, handling precautions, etc.) and / or also marketing data (Url of the brand website, program loyalty, etc.) are incorporated in the first identifier (31).
[4" id="c-fr-0004]
4. System according to one of claims 1 to 3, characterized in that the encrypted information relating to the integrity of the product (1) contained in the second identifier (32), includes confidential information on the physical and / or technological characteristics of the product (1), or confidential information that only the recipient or the supplier can consult on the information system (4) so as to ensure the authenticity of the product (1), the link between these two encrypted information being only known and recorded in the information system (4) or in the device (5) for reading and communication or processing.
[5" id="c-fr-0005]
5. System according to one of claims 1 to 4, characterized in that the first (31) and the second (32) encrypted identifiers are two-dimensional codes.
[6" id="c-fr-0006]
6. System according to claim 5, characterized in that the two-dimensional codes are QR Codes.
[7" id="c-fr-0007]
7. System according to claim 1 to 6, characterized in that the marking (2) of identification and authentication is a sticker (2).
[8" id="c-fr-0008]
8. System according to one of claims 1 to 7, characterized in that the first encrypted identifier (31) is destroyed by peeling off or scraping it off.
[9" id="c-fr-0009]
9. System according to one of claims 2 to 8, characterized in that, when the first encrypted identifier (31) is destroyed, a message appears in a frame of the destroyed layer (22) making it possible to invalidate its use.
[10" id="c-fr-0010]
10. System according to one of claims 1 to 9, characterized in that the device (5) for reading and communication or processing is a scanner (5) or a mobile device (5) comprising
- either an appropriate decryption software making it possible to decrypt the encrypted information contained in the identifiers (31, 32) of the marking (2) and having received, before or after reading the first information, the link between the two encrypted information for check it and certify authenticity,
- Either means of communication to send either the encrypted information to the information system (4) which alone knows in this case, the link between the two encrypted information; either send to the information system (4) a signal attesting to the authenticity and in this case, the device (5) for reading and communication or processing is the only one to know the connection between the two encrypted information.
[11" id="c-fr-0011]
11. A method of traceability and authentication of at least one product (1) on which at least one identification and authentication marking (2) is used, characterized in that the method comprises the following successive steps:
- a step of writing encrypted information at least in a first (31) and a second (32) identifiers by an information system (4),
- a step of printing the second identifier (32) encrypted on the identification and authentication marking (2),
- a step of affixing the second encrypted identifier (32) on a surface of the product (1),
- a step of printing the first encrypted identifier (31)
- a step of affixing a layer (22) containing or supporting the first identifier (31) encrypted on the second identifier (32) encrypted with the same marking (2) so as to mask the second identifier (32),
- at least one step of reading and communicating the first identifier (31) encrypted by an apparatus (5) for reading and communicating or processing identified in an information system (4) with its location, the apparatus (5) of reading and communication or processing sending at least the result of the reading and the identifier of the device to thereby supply information on the transit of the product (1) to the information system (4),
a step of destruction by manual action of the first encrypted identifier (31) of the product (1) so as to access the second encrypted identifier (32) on receipt of the product (1) by a recipient,
- a step of reading the encrypted information contained in the second identifier (32) by the device (5) for reading and communication or processing followed:
o either sending encrypted information to the information system (4) so that it certifies the authenticity, o or processing by the appropriate means of the reading device (5) which in this case informs the system information (4) of the authentication or not of the product (1).
[12" id="c-fr-0012]
12. Method according to claim 11, characterized in that a storage of the first encrypted identifier (31) is activated in the information system (4) by a reading and communication device of an entity issuing the product (1 ) after the step of affixing the first identifier (31) to the second identifier (32).
[13" id="c-fr-0013]
13. Method according to claim 12, characterized in that it also comprises one or more reading steps, by at least one intermediary during the transit of the product (1), by a device (5) previously identified and located in the information. memorized by the information system (4) of the first identifier (31) encrypted before the step of reading and recording the second identifier (32) encrypted by an apparatus (5) for reading and communication or processing (the even or not), upon delivery to the addressee.
[14" id="c-fr-0014]
14. Method according to one of claims 11 to 13, characterized in that the information system (4) firstly stores in its memory a series of encrypted information contained in the first identifier (31), during the affixing of the identification and authentication marking (2) on the product (1) by the issuing entity, in association with the second identifier (32) and the relationship existing between the first (31) and the second (32) identifier to attest to their authenticity and for the traceability of the product (1), in a second time each communication by the device (5) for reading and communication during the transit of the product (1) by at least one intermediary and finally during the delivery, records either the authenticity established by the reading and communication device (5) or the information transmitted concerning the second identifier (32) and checks the authenticity, ensuring that the relationship memorized e initially between the first (31) and second (32) identifier is still observed.
[15" id="c-fr-0015]
15. Method according to one of claims 11 to 14, characterized in that
5 that the second encrypted second identifier (32) is destroyed by taking off or scraping during the destruction step defined by the issuing entity, for example upon receipt of the product (1).
[16" id="c-fr-0016]
16. Method according to one of claims 11 to 15, characterized in that at each stage of delivery, the intermediary transporting or handling the product (1) scans the identification and authentication marking (2) with a reading and communication or processing apparatus (5) identified and located beforehand by the information system (4); and the information of the first identifier (31) is transmitted to be registered in a traceability tracking system, in order to follow the entire life cycle of the product 15 (1); the traceability system is managed by the information system (4).
2/2
类似技术:
公开号 | 公开日 | 专利标题
JP6189454B2|2017-08-30|Unlicensed product detection techniques
US8245927B2|2012-08-21|Method and system for deterring product counterfeiting, diversion and piracy
FR3061582B1|2019-10-11|SYSTEM AND METHOD FOR TRACEABILITY AND AUTHENTICATION OF A PRODUCT
US20160027021A1|2016-01-28|Product Authenticator
US20070228166A1|2007-10-04|System for detecting couterfeiting products using camera
CH679255A5|1992-01-15|
FR2836247A1|2003-08-22|Print management system for production of printed documents with owner's rights management has printer that receives protected document file and in response to authorisation signal for printing at least one printed document
WO2005091232A1|2005-09-29|Method for authentication of products
FR2900486A1|2007-11-02|Original product or detached part individualizing method for Internet, involves associating confidential code and identifying codes in database on server connected to Internet, and verifying authenticity of product via connection to server
US20180019872A1|2018-01-18|Open registry for internet of things including sealed materials
EP2562958A1|2013-02-27|Digital signature method and apparatus
EP1788516B1|2016-04-06|Method and device for authentication and identification
WO2010063909A2|2010-06-10|Method and device for protecting a container, and tag for implementing same
CN110998634A|2020-04-10|Product authentication system using blockchain
US20020073312A1|2002-06-13|Secure electronic software distribution
CN108629603B|2021-09-21|Commodity anti-counterfeiting method based on two-dimensional code
WO2014090804A1|2014-06-19|Method for securing a document comprising printed information and corresponding document
WO2018064329A1|2018-04-05|Open registry for internet of things including sealed materials
CN110675171A|2020-01-10|Anti-counterfeiting tracing method based on block chain
FR2783077A1|2000-03-10|Labelling system for genuine merchandise includes self-adhesive label with visible and machine-readable sections which must tally to provide evidence of validity
EP3686761A1|2020-07-29|Secure marking element and methods for encoding and authenticating said marking element
EP2330567A1|2011-06-08|Method for establishing a test element while inspecting a person using an electronic document belonging to said person
US20200226617A1|2020-07-16|Certified quick response codes associated with top-level domains verified by trusted product certificate authority
EP3032450B1|2020-03-25|Method for checking the authenticity of a payment terminal and terminal thus secured
EP1980982A1|2008-10-15|Control and authentication method and system
同族专利:
公开号 | 公开日
FR3061582B1|2019-10-11|
WO2018122362A1|2018-07-05|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20120254052A1|2011-04-04|2012-10-04|Gao Zeming M|Anti-counterfeiting marking with dual-code and partial concealment|
US20160027021A1|2014-07-24|2016-01-28|Andrew Kerdemelidis|Product Authenticator|
WO2016081352A1|2014-11-17|2016-05-26|Amazon Technologies, Inc.|Tracking and verifying authenticity of items|
CN205810263U|2016-07-12|2016-12-14|厦门智盛包装有限公司|A kind of antifalsification label|WO2020183017A1|2019-03-14|2020-09-17|Novatec|Method for producing a label comprising a hidden security code and method for implementing said label|US8534543B1|2012-05-18|2013-09-17|Sri International|System and method for authenticating a manufactured product with a mobile device|US10810393B1|2019-03-29|2020-10-20|At&T Intellectual Property I, L.P.|Apparatus and method for identifying and authenticating an object|
WO2021055557A1|2019-09-20|2021-03-25|Sun Chemical Corporation|Self-disabling tamper-evident gift cards|
法律状态:
2017-11-20| PLFP| Fee payment|Year of fee payment: 2 |
2018-07-06| PLSC| Publication of the preliminary search report|Effective date: 20180706 |
2018-12-31| PLFP| Fee payment|Year of fee payment: 3 |
2020-02-12| PLFP| Fee payment|Year of fee payment: 4 |
2020-12-29| PLFP| Fee payment|Year of fee payment: 5 |
2021-12-27| PLFP| Fee payment|Year of fee payment: 6 |
优先权:
申请号 | 申请日 | 专利标题
FR1663498A|FR3061582B1|2016-12-29|2016-12-29|SYSTEM AND METHOD FOR TRACEABILITY AND AUTHENTICATION OF A PRODUCT|
FR1663498|2016-12-29|FR1663498A| FR3061582B1|2016-12-29|2016-12-29|SYSTEM AND METHOD FOR TRACEABILITY AND AUTHENTICATION OF A PRODUCT|
PCT/EP2017/084785| WO2018122362A1|2016-12-29|2017-12-28|System and method for tracing and authenticating a product|
[返回顶部]