![]() METHOD AND APPARATUS FOR MARKING MANUFACTURED ITEMS
专利摘要:
method and apparatus for producing manufactured items and suitable method for fiscal verification. The present invention relates to methods and apparatus for marking manufactured items. in particular, the present invention relates to marked packaged goods, for example, packages or packages of cigarettes and other tobacco products. the method for producing manufactured items comprises: providing a cryptographic key in an inactive state (211) to a point in a supply chain for the manufactured items; providing the cryptographic key in an active state (209) and an activation code (213) for activating the cryptographic key in the inactive state (211) to form the cryptographic key in the active state (209) to a verification center (114); provide the activation code (213) to the point in the supply chain in response to the point in the supply chain that transmits information related to the received cryptographic key, whereby the activation code (213) allows the cryptographic key in the inactive state (211 ) at the point in the supply chain is activated to form the cryptographic key in the active state (209); generate, at the point in the supply chain, an identification code (id) (221) for each manufactured item, the id code (221) being derived from the cryptographic key in the active state (209) and a dynamic key (219 ) generated for each batch of manufactured items; provide the dynamic key (219) for each batch of items manufactured to the checking center (114); mark each manufactured item with the id code (221); and count the number of id codes (221) marked on the manufactured items. 公开号:BR112013016754B1 申请号:R112013016754-8 申请日:2011-12-21 公开日:2021-07-27 发明作者:Philippe Chatelain;Alain Sager;Erwan Fradet;Patrick Chanez 申请人:Digital Coding And Tracking Association; IPC主号:
专利说明:
FIELD OF THE INVENTION [001] The present invention relates to methods and apparatus for marking manufactured items. In particular, the present invention relates to marked packaged goods, for example, packages or packages of cigarettes and other tobacco products. BACKGROUND OF THE INVENTION [002] Counterfeit and contraband goods cause a significant loss of revenue for producers and government authorities. Inferior quality counterfeit goods that are illegally sold are also harmful to the customer and the manufacturer. Customers are affected as they could get possibly harmful inferior quality goods. This is particularly important for products such as pharmaceuticals. Manufacturers are affected as they may suffer a loss of reputation, an increase in competition with their own products and infringement of other legal rights. Contraband goods, which are goods manufactured for the purpose of evading taxes or government regulations, are also a considerable problem for producers and government officials. These goods are illegally traded or imported and can result in significant loss of revenue. [003] The problems of smuggling and counterfeiting are also particularly acute for goods subject to taxation, eg tobacco products. Problems also exist for many other types of traded products that carry strong brand equity. These include many internationally traded products such as perfumes, spirits, watches and luxury goods. Thus, manufacturers, customers, distributors, wholesalers, importers, government authorities and other authorized parties need to be able to easily verify which particular goods are genuine. Furthermore, government authorities and other authorized parties need to be able to easily verify that the volume of manufactured items equals the authorized volumes, particularly for goods subject to taxation. Government authorities and other authorized parties additionally need to be able to verify tax status for goods subject to taxation and protect revenues derived from such taxation. [004] There is a need for an improved method and apparatus for marking manufactured items, particularly one that can be used for fiscal verification, production volume verification and authentication of manufactured items. DESCRIPTION OF THE INVENTION [005] According to a first aspect of the invention, a method of marking manufactured items is provided which comprises: providing a cryptographic key in an inactive state to a point in a supply chain for the manufactured items; providing the cryptographic key in an active state and an activation code for activating the cryptographic key in the inactive state to form the cryptographic key in the active state to a verification center; provide the activation code to the point in the supply chain in response to the point in the supply chain that transmits information that relates to the received cryptographic key, whereby the activation code allows the cryptographic key in the inactive state at the point in the chain of supply is activated to form the cryptographic key in the active state; generate, at the point in the supply chain, an identification code (ID) for each manufactured item, the ID code being derived from the cryptographic key in the active state and a dynamic key generated for each batch of manufactured items; provide the dynamic key for each batch of items manufactured for the checking center; tag each manufactured item with the ID code; and count the number of ID codes marked on the manufactured items. [006] The invention provides an improved method for marking manufactured items. This method can be used for fiscal verification (for manufactured items that are subject to taxation), for production volume verification, and for authenticating manufactured items. An ID code is stamped on each manufactured item so that each manufactured item can be uniquely identified. Counting the number of ID codes marked on manufactured items ensures that rejected or removed manufactured items are not identified. This means that the correct or actual number of marked manufactured items is counted. [007] Manufactured items may be any manufactured items, including tobacco products such as cigarette packages or packs or other items that carry a strong brand value or subject to taxation. The point in the supply chain can comprise any location, site, location or position within a supply chain for the manufactured items. For example, the point in the supply chain can comprise an import point, a distribution point, a buyer, a wholesaler, or any other link in the supply chain. Most preferably, however, the point in the supply chain comprises a production center or production line for the manufactured items. [008] The steps of marking each manufactured item may comprise inkjet printing, holographic printing, laser printing or any other printing or marking that allows the printing or marking of ID codes on each item. The steps of marking each manufactured item may comprise printing or marking each item, printing or marking outer packaging, printing or marking adhesive labels or tags, or any other appropriate printing or marking. The point in the supply chain can comprise a sensor for detecting the ID codes marked on the manufactured items. The sensor can confirm that each ID code has been properly marked on the manufactured item. The sensor can only count the number of ID codes properly marked on the manufactured items. [009] In one embodiment, the cryptographic key is generated in a key generator separate from the point in the supply chain. [010] A cryptographic key is simply any piece of information (eg, a number) that can be used in combination with other parameters to form a code. The cryptographic key in the active state is preferably the cryptographic key in an unencrypted state. The cryptographic key in the inactive state is preferably the cryptographic key in an encrypted state. Thus, the activation code is preferably a decryption mechanism to convert the encrypted key into the unencrypted key. The cryptographic key can include a number of portions including a plurality of secret codes. [011] The step of providing the cryptographic key in an inactive state to a point in a supply chain may comprise sending the cryptographic key in an inactive state from the key generator to the point in the supply chain on a data carrier non-volatile. Non-volatile data carrier is a data carrier including non-volatile computer memory, this means that computer memory can retain the stored information even when it is not activated. Examples include, but are not limited to, a CD-ROM, DVD-ROM, or removable hard drive. Alternatively, the steps of providing the cryptographic key in an inactive state to a point in a supply chain may comprise providing the cryptographic key in an inactive state via a secure network connection. [012] The key generator preferably forms part of the verification center. In that case, the steps of providing the cryptographic key in an active state and the activation code to the verification center may comprise storing the cryptographic key and activation code in a database accessible to the verification center. No transfer of cryptographic key or activation code is required. [013] The step of providing the activation code to the point in the supply chain preferably comprises sending the activation code from the verification center to the point in the supply chain. [014] The step of the point in the supply chain that transmits the information that relates to the received cryptographic key preferably comprises sending information that relates to the cryptographic key received from the point in the supply chain to the verification center. [015] Preferably, the steps of providing the activation code to the point in the supply chain in response to the point in the supply chain that transmits the information that relates to the received cryptographic key constitutes the registration of the point in the supply chain. Preferably, information relating to the received cryptographic key and activation code is transmitted via an asymmetric key pair exchange. In that case, the cryptographic key can include a cryptographic digital certificate and the asymmetric key pair can comprise a public key and a private key associated with the cryptographic digital certificate. The point in the supply chain can provide the information that relates to the received cryptographic key encrypted using the public key of the asymmetric key pair. This allows the recipient, eg the verification center, to decrypt information relating to the received cryptographic key using the private key from the asymmetric key pair. Information relating to the received cryptographic key can be sent along with information identifying the point in the supply chain, for example, the production center. These can also be encrypted using the public key from the asymmetric key pair. Thus, a private key is linked to a particular production center or other point in the supply chain. The point in the supply chain can receive the activation code, for example, from the verification center, encrypted by the public key of the asymmetric key pair. This allows the point in the supply chain to decrypt the activation code using the asymmetric key pair's private key. [016] The information relating to the cryptographic key is preferably stored in a database accessible to the verification center. Preferably, information relating to the cryptographic key is stored along with information identifying the point in the supply chain associated with the key. Preferably, the information identifying the point in the supply chain is stored along with the cryptographic key. [017] The step of providing the dynamic key for each batch of items manufactured to the checking center can comprise sending the dynamic key from the point in the supply chain to the checking center. The dynamic key can be sent over a secure internet connection. Preferably, the dynamic key for a batch of manufactured items is sent along with information regarding the batch of manufactured items. Dynamic keys are preferably stored in a database accessible to the verification center. Preferably, each dynamic key is stored along with information regarding the associated manufactured item batch. [018] A dynamic key is simply any piece of information (eg a number) that can be used in combination with other parameters to form a code. In one realization, the dynamic key is a secret code that is defined for a particular batch of items. The ID code for each manufactured item can be derived from the cryptographic key in the active state and the dynamic key by any number of mechanisms. In one embodiment, the dynamic key and the cryptographic key are combined to form a pseudo-random noise code that can be used as a digital signature for the ID code. The noise code can be further derived from the ID code itself. [019] In a preferred embodiment, the generated ID codes are not stored. This reduces the possibilities for counterfeiters to access valid ID codes. [020] The method can be used for fiscal verification and the method can further comprise reporting to a government authority the number of ID codes marked on the manufactured items; and where the verification center stores the information that connects the ID codes marked on the manufactured items to information specific to those manufactured items so that taxes paid or due can be verified against the actual number of manufactured items. [021] Thus, the count of codes marked on manufactured items can be used for fiscal verification or for collection purposes. This means that counting the correct or actual number of marked manufactured items can be used for tax verification or collection purposes. This provides an entirely electronic means for a government official to access information as to whether the correct amount of tax has been paid. Of course, the report can be made to any interested third parties although, for fiscal verification, the third party will normally comprise a government official. Potential tax collection, based on the number of reported ID codes, can be compared and reconciled with actual taxes paid, for example, based on actual tax receipts. The verification center can be managed by a trusted party independent of the manufacturer of the manufactured items. For example, the verification center may be managed by a government authority. This is particularly advantageous for tax verification. [022] Reporting can be done by shipment and by tax warehouse so that taxes paid or due can be verified or calculated by shipment and by tax warehouse. This is advantageous since, in many jurisdictions, shipping products from a tax warehouse is the trigger for paying taxes. Reporting can be done by shipment only. The report can only be carried out by tax warehouse. Reporting can be performed for any desired unit. The method may further comprise automatically calculating the taxes due per shipment and per tax warehouse. The method may further comprise automatically collecting taxes due by shipment and by tax warehouse. The method may comprise monitoring the payment of taxes due by shipment and by tax warehouse. [023] The method can be used for tax verification and the method can additionally comprise, before the steps of generating an ID code for each manufactured item, the steps of authorization by a government authority for the point in the chain source generates a defined number of ID codes. [024] Authorization can be transmitted from the government authority to the point in the supply chain. Alternatively, authorization can be transmitted from the government authority to a manufacturing portal in communication with the point in the supply chain. Authorization can be transmitted from government authority through a secure communication channel. The secure communication channel can be dedicated to communication between the government authority and that point in the supply chain or manufacturing portal. [025] Preferably, the defined number of ID codes corresponds to a lot of manufactured items. Preferably, the authorization corresponds to a defined number of manufactured items that have common fiscal restrictions. [026] The method can further comprise, before the steps of authorization by the government authority for the point in the supply chain to generate a defined number of ID codes, the steps of requesting authorization from the government authority. [027] The request can be transmitted to the government authority from the point in the supply chain. Alternatively, the request can be transmitted to the government authority from a manufacturing portal in communication with the point in the supply chain. Preferably, the request is transmitted through the secure communication channel. The secure communication channel can be dedicated to communication between the government authority and that point in the supply chain or manufacturing portal. [028] The method may further comprise reporting to the government authority the number of ID codes marked on the manufactured items. [029] Reporting can be performed by point in the supply chain. Alternatively, reporting can be performed by a manufacturing portal in communication with the point in the supply chain. This step allows the government authority to verify that the actual number of ID codes marked on the manufactured items matches the defined number of ID codes authorized by the government authority. The report can be made to any interested third parties although, for fiscal verification, the third party will normally comprise a government official. The verification center can store information that connects the ID codes marked on manufactured items to information specific to those manufactured items, so that taxes paid or due can be verified against the actual or correct number of manufactured items. Thus, counting ID codes marked on manufactured items can be used for fiscal verification or collection purposes. This provides an entirely electronic means for a government official to access information as to whether the correct amount of tax has been paid. The point in the supply chain can also report to the government authority the tax range for each manufactured item. If the defined number of ID codes corresponds to a manufactured item lot, preferably each manufactured item in the manufactured item batch will be associated with a single tax range. [030] The method may further comprise transmitting by the user the ID code marked on a selected manufactured item to the checking center; where the verification center derives, from the ID code, the fiscal information that relates to the selected manufactured item; and the checking center transmits at least some of the fiscal information that relates to the selected manufactured item to the user. The user may be a government official or other official body. [031] The use of the method of the invention for fiscal verification provides several advantages. Prior art methods and systems typically use tax stamps or tax stickers for tax verification. Both are typically in the form of adhesive labels directly attached to consumer packaging on manufactured items. The tax label typically includes visible and invisible security features. Tax stamps are used for tax collection and verification of paid tax status. Tax stamps typically carry the actual tax amount due on the specific item on which the tax stamp is applied. Tax stickers are also used for tax collection and verification of paid tax status, but this is usually done through production volume verification. Generally, the number of fiscal stickers sold or shipped to a manufacturer will need to match the actual or correct number of manufactured items sold or distributed for sale. Tax stickers usually do not carry a particular tax amount, but the manufacturer will need to pay a price per tax sticker issued. [032] Although there is a widespread belief that tax stickers and tax stamps still provide a safe and effective means of protecting tax revenue, recent developments have shown that even the most sophisticated paper stamps have been successfully counterfeited. Such counterfeiting will only increase as counterfeiting technology and knowledge increases. Furthermore, valid seals can be diverted, for example, from an authorized manufacturing center to another unauthorized manufacturing center. Thus, the unauthorized manufacturing site appears to be authorized once the tax stamps are valid. [033] The use of the method of the invention for fiscal verification provides several advantages. First, there is no need to distribute physical markers (eg, sticky labels) that could easily be intercepted. This also results in a lower environmental impact. Second, preferably, ID codes are not stored, which reduces the possibilities for counterfeiters to access valid ID codes. The method is extremely secure against tampering and tampering with valid codes and against code theft. It also prevents counterfeiters from cyber hacking against the valid ID code database and entering unauthorized codes, thus making it impossible to distinguish between valid and invalid codes. Third, compared to other tax verification technology, the method of the invention is inexpensive to implement, which allows it to be more widely used than existing systems, particularly for small and medium-sized manufacturers. In addition, many manufacturers already use an ID code system to identify manufactured items. This type of system can easily be adapted to be used with the method of the invention for fiscal verification purposes. Finally, if desired, users, government authorities or other parties can easily access tax information regarding a particular manufactured item in real time. No specialized system or training is required and any interested parties, for example, importers, point of sale entities and other supply chain members can access fiscal information. [034] The verification center may be managed by a trusted party independent of the manufacturer of the manufactured items. For example, the verification center may be managed by a government authority. This is particularly beneficial for tax verification. [035] The method can be used for verification of production volume and the method can further comprise reporting to third parties the number of ID codes marked on the manufactured items. [036] The production volume verification is the verification of the actual volumes produced, for example, the actual number of items manufactured. Reporting can be performed by point in the supply chain. Alternatively, reporting can be performed by a manufacturing portal in communication with the point in the supply chain. Preferably, reporting comprises reporting securely, for example via a secure network connection. Preferably, the verification center stores information that connects the ID codes marked on manufactured items to information specific to those manufactured items. Thus, ID codes tagged on manufactured items can be linked to specific information to the actual or correct number of tagged manufactured items. The number of ID codes tagged on manufactured items can be reported by fiscal level, by time unit, or by Stock Keeping Unit (SKU). [037] This allows third parties to verify the number of manufactured items produced and distributed. Reporting can take place at regular time periods. Reporting does not need to take place immediately after manufactured items have been checked. The third party can be a government official or another party that has an interest in the number of items manufactured, for example, manufactured in a particular production center. The report can comprise sending the ID codes marked on the manufactured items to third parties. [038] Reporting can be done by shipment and by fiscal warehouse so that production volumes can be checked or calculated by shipment and by fiscal warehouse. This is advantageous since, in many jurisdictions, shipping products from a tax warehouse is the trigger for paying taxes, so the volume of goods leaving a particular warehouse is critical. [039] The use of the method of the invention for verification of production volume provides several advantages. For example, many manufacturers already use a system of ID codes to identify manufactured items. This type of system can easily be adapted to be used with the method of the invention for production volume verification purposes. Furthermore, production volumes can be reported to third parties, eg a government official, on a regular basis and in real time. [040] The verification center may be managed by a trusted party independent of the manufacturer of the manufactured items. For example, the verification center may be managed by a government authority. This is particularly advantageous for checking production volume. [041] The method can be used for authentication of a selected manufactured item and the method may further comprise: transmitting by the user the ID code marked on the selected manufactured item to the verification center; wherein the verification center derives, from the ID code, the cryptographic key and the dynamic key used to generate the ID code; the verification center derives information relating to the selected manufactured item from the cryptographic key and the dynamic key; and the verification center transmits at least some of the information that relates to the selected manufactured item to the user. [042] This allows a user to verify that the selected manufactured item is genuine. This also allows the user to obtain selected information regarding the manufactured item. Information can include information about the manufacturing center or manufacturing site of the manufactured item, information about the code generator that generated the ID code on the manufactured item, information about time (eg date , hour, minute) of production and other information that can be associated with the ID code. The user may comprise a government official or other official body, an importer, point of sale entity or member of the supply chain, a final consumer or any other interested party. [043] Preferably, the cryptographic key is stored in a database accessible to the verification center. Preferably, the cryptographic key is stored together with information that identifies the point in the supply chain, for example, the production center. In this case, the verification center steps that derive the information relating to the selected manufactured item from the cryptographic key can comprise the verification center's access to the database and obtaining the information that identifies the point in the associated supply chain to the cryptographic key. [044] Preferably, the dynamic key is stored in a database accessible to the verification center. Preferably, the dynamic key is stored along with information regarding the associated manufactured item batch. In this case, the verification center steps that derive from the dynamic key the information relating to the selected manufactured item may comprise the verification center's access to the database and obtaining information regarding the associated manufactured item batch to the dynamic key. If the dynamic key and the cryptographic key are combined to form a pseudorandom noise code used as a digital signature for the ID code, the unsigned ID code can be derived from the digitally signed ID code. Then, the verification center can determine the dynamic key and the cryptographic key from the database and independently derive the noise code for comparison with the received digitally signed ID code. [045] The ID code transmitted from the user to the verification center can be transmitted through a secure or insecure internet connection. Information transmitted from the verification center to the user can be transmitted over a secure or insecure internet connection. [046] The verification center can be managed by a trusted party independent of the manufacturer of the manufactured items. For example, the verification center may be managed by a government authority. [047] According to the invention, there is also provided an apparatus for marking manufactured items comprising: a key generator for generating a cryptographic key, the cryptographic key having an active state and an inactive state; at least one point in a supply chain for the manufactured items, with the key generator being arranged to send the cryptographic key, in idle state, to the point in the supply chain, where the point in the supply chain is arranged to receive, in response to the point in the supply chain that transmits information relating to the received cryptographic key, an activation code for activating the cryptographic key, being activation code allows the cryptographic key in the inactive state to be activated to form the key cryptographic in active state; a verification center for verifying the properties of the manufactured items, the key generator is arranged to provide the cryptographic key in the active state and the activation code to the verification center; a code generator, at the point in the supply chain, to generate an identification code (ID) for each manufactured item, the ID code is derived from the cryptographic key in the active state and a dynamic key generated for each batch of manufactured items, where the dynamic key for each batch of manufactured items is provided to the checking center; a point marker in the supply chain for marking each manufactured item with the ID code; and a counter for counting the number of ID codes marked on manufactured items. [048] The device is a device for marking manufactured items that can be used for fiscal verification (for manufactured items that are subject to taxation), for verification of production volume and for authentication of manufactured items. The correct or actual number of manufactured items marked is counted. An ID code is stamped on each manufactured item so that each manufactured item can be uniquely identified. [049] The apparatus may additionally comprise a database accessible to the verification center or which forms part of it. The cryptographic key can be stored in the database. The cryptographic key can be stored in the database along with information identifying the point in the supply chain associated with the key. The dynamic key can be stored in the database. Each dynamic key can be stored in the database along with information regarding the associated manufactured item batch. The key generator can form part of the verification center. [050] The features described in relation to the method of the invention may also be applicable to the apparatus of the invention. [051] According to the invention, a method of marking manufactured items is also provided, the method being used for fiscal verification and comprises: generating a plurality of identification codes (ID) for the manufactured items; marking each manufactured item with an ID code from the plurality of ID codes; counting the actual number of ID codes from the plurality of ID codes marked on the manufactured items, wherein the actual number of ID codes is the same or less than the plurality of ID codes; report to a government official the actual number of ID codes marked on manufactured items; and store information that links ID codes tagged on manufactured items to information specific to those manufactured items so that taxes paid or due can be verified against the actual number of tagged items. [052] ID codes can be generated and tagged on items at any point in the supply chain for manufactured items, for example, at an import point, a distribution point, a buyer, a wholesaler or any other binder in the supply chain. Most preferably, however, the point in the supply chain where ID codes are generated and tagged on manufactured items comprises a production center or production line for the manufactured items. [053] The method may further comprise, before the step of generating a plurality of ID codes for the manufactured items: requesting authorization from a government authority to generate ID codes for the manufactured items; and receive authorization from the government authority to generate a defined number of ID codes for the manufactured items. [054] The step of requesting authorization from a government authority may comprise transmitting a request to the government authority through a secure communication channel. The request can be transmitted from any point in the supply chain, for example, a production plant. Alternatively, the request can be transmitted from a manufacturing portal in communication with the point in the supply chain. The secure communication channel can be dedicated to communication between the government authority and that point in the supply chain or manufacturing portal. [055] The step of receiving authorization from the government authority may comprise receiving authorization from the government authority through a secure communication channel. Authorization can be transmitted to any point in the supply chain. Alternatively, authorization can be transmitted from a manufacturing portal in communication with the point in the supply chain. The secure communication channel can be dedicated to communication between the government authority and that point in the supply chain or manufacturing portal. Preferably, the defined number of ID codes corresponds to a batch of manufactured items. [056] The step of reporting to the government authority the number of ID codes marked on the manufactured items may comprise reporting to the government authority through a secure communication channel. Reporting can be performed at any point in a supply chain for manufactured items. Alternatively, reporting can be performed by a manufacturing portal in communication with the point in the supply chain. The secure communication channel can be dedicated to communication between the government authority and that point in the supply chain or manufacturing portal. This step allows the government authority to verify the number of ID codes marked on manufactured items. Information that connects the ID codes tagged on manufactured items to information specific to those manufactured items can be stored so that the tax paid or due can be checked against the actual or correct number of manufactured items. Thus, counting ID codes marked on manufactured items can be used for tax verification or collection purposes. This provides an entirely electronic means for a government official to assess whether the correct amount of tax has been paid. The tax rate for each manufactured item may also be reported to the government authority. If the actual number of ID codes matches a manufactured item batch, preferably each manufactured item in the manufactured item batch is associated with a single tax rate. [057] The method may further comprise a user transmitting the ID code marked on a selected manufactured item to a verification center; the check center derives from the ID code tax information related to the selected manufactured item; and the checking center transmits at least part of the tax information related to the selected manufactured item to the user. User may be a government official or other official body. The verification center can be managed by a trusted third party independent of the manufacturer of the manufactured items. For example, the verification center may be managed by a government authority. [058] The method of this aspect of the invention provides numerous advantages. As already discussed, prior art methods and systems typically use tax stamps or tax tags for tax verification. Although there is a widespread belief that tax labels and tax stamps still provide a safe and effective means of protecting production revenues, recent developments have shown that even the most sophisticated paper stamps have been successfully counterfeited. Such counterfeiting will only increase as counterfeiting technology and knowledge increase. Additionally, valid seals can be diverted, for example, from an authorized manufacturing center to another unauthorized manufacturing center. [059] The method of this aspect of the invention provides numerous advantages. First, there is no need to distribute physical markers (eg sticky labels) that could easily be intercepted. This also results in a lower environmental impact. Second, ID codes are preferably not stored, which reduces the possibilities for spoofing to access valid ID codes. The method is extremely secure against tampering and tampering with valid codes and against code theft. Thirdly, compared to other fiscal verification technology, the method of the invention is not costly to implement, which allows it to be more widely used than existing systems, particularly for small and medium sized manufacturers. Additionally, many manufacturers already use a system of ID codes to identify manufactured items. Such a system can be easily adapted to be used with the method of the invention for fiscal verification purposes. Finally, if desired, users, government authorities or other parties can easily access tax information about a particular manufactured item in real time. No specialized system or training is required and any interested parties, for example importers, point of sale entities and other members of the supply chain can access fiscal information. [060] In a particular embodiment, the step of generating the plurality of ID codes for the manufactured items comprises generating the ID codes from a cryptographic key in an active state and at least one dynamic key, each dynamic key being associated with a batch of manufactured items. The cryptographic key can be generated in a key generator. The cryptographic key in the active state can be provided to the verification center along with an activation code to activate the cryptographic key in an inactive state to form the cryptographic key in the active state. The cryptographic key in inactive state can be supplied to the code generator. The verification center may provide the activation code to the code generator in response to the code generator transmitting information related to the received cryptographic key, thus enabling the code generator for code generation. Cryptographic keys can be stored in a database. Cryptographic keys can be stored in a database. Preferably, ID codes are not stored. [061] Features of one aspect of the invention may be applicable to another aspect of the invention. In addition, the features described in relation to the tax verification may be applicable to the production volume verification and authentication, the features described in relation to the production volume verification may be applicable to the tax verification and authentication, and the features described in relation to authentication may apply to fiscal verification and verification of production volume. BRIEF DESCRIPTION OF THE DRAWINGS [062] Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, of which: Figure 1 is a schematic view of a production system according to an embodiment of the invention; Figure 2 is a flowchart showing three steps of the method of an embodiment of the invention that can be performed in the system of Figure 1; Figure 3 shows a further step of the method of Figure 2 when the system of Figure 1 is used for a first performance of the fiscal verification; Figure 4 shows an additional step of the method of Figure 2 when the system of Figure 1 is used for a second realization of the fiscal verification; Figure 5 shows an additional step of the method of Figure 2 when the system of Figure 1 is used to check a production volume; and Figure 6 shows an additional step of the method of Figure 2 when the system of Figure 1 is used to authenticate a manufactured item. DESCRIPTION OF ACHIEVEMENTS OF THE INVENTION [063] Figure 1 is a schematic view of a production system according to an embodiment of the invention. In that embodiment, the system 101 comprises one or more production centers 103, 105, 107 for producing manufactured items 109. Each production center may comprise a production line or facilities which may be a cigarette production or packaging line. Production is preferably carried out in batches, with each batch dedicated to the production of a certain number of individual manufactured items. If there are two or more production centers, these may be physically located at the same manufacturing site or at different manufacturing sites. In this preferred embodiment, the system includes the production centers 103, 105, 107, but the invention can actually be carried out and an import point, a distribution point, a buyer, a wholesaler or any other point in the chain of supply. [064] Each production center includes code generator 111 to generate codes for manufactured items 109. Preferably, code generator 111 is a completely autonomous computer or microcomputer dedicated to a particular production center. In that embodiment, each production center also includes a marker 113 for marking the codes generated on the manufactured items 109. The marker 113 may comprise any suitable production means, for example, but not limited to, a continuous ink jet printer, a printer drop-on-demand inkjet printer, a holographic printer, a laser printer, or any other printer or marker that allows the printing and marking of the codes generated on the individual manufactured items. The printing or marking of the generated codes can be on each item, on an external packaging, on labels or in any other convenient way. In one embodiment, the generated codes are printed on stickers or sticky labels to be applied to manufactured items, preferably non-removably. In one embodiment, the generated codes are printed by a laser beam on a each of laser sensitive material deposited on the manufactured item or on the item's packaging. This method allows the code to be printed through a transparent packaging layer. [065] The system 101 further comprises a verification center 114 which includes a key generator 115 for generating keys 209, 211 for use in the production and authentication of the manufactured items and the central server 117. In this embodiment, the code generator 111 can communicate with the verification center 114 via a secure internet connection 119 and a server 121 local to the production center or by other data communication means. Alternatively, the code generator 111 can communicate with the verification center via a manufacturing portal dedicated to one or more production centers. [066] Figure 2 is a flowchart showing three steps of the method of an embodiment of the invention that can be performed in the system 101 of Figure 1. Referring to Figures 1 and 2, in the first step 201 of the method, the generator of key 115 generates a cryptographic key in the form of a machine key. Key generator 115 generates an unencrypted version of the machine key and an encrypted version of the machine key. The unencrypted version of the machine key, known as the active machine key 209, is shown with a solid border in Figures 1 and 2. The encrypted version of the machine key, known as the inactive machine key 211, is shown with a dotted border in Figures 1 and 2. The active machine key 209, that is, the unencrypted version of the machine key, is generated in the key generator 115 and is thus accessible to the central server 117. This is shown in both Figures 1 and 2. Key generator 115 sends idle machine key 211 to code generator 111 at production center 103, 105, 107. This is shown in both Figures 1 and 2. [067] The idle machine key 211 can be sent from the key generator 115 to the code generator 111 on a non-volatile data carrier, for example, a CD-Rom, a DVD-Rom or a removable hard disk. The data carrier is physically transferred to code generator 111 at production center 103, 105, 107. Alternatively, idle machine key 211 can be sent from key generator 115 to code generator 111 via a network connection secure, for example, one involving encryption. This can be at the request of code generator 111. This guarantees the authenticity, confidentiality and integrity of the machine key. [068] The key generator 115 also generates the activation code 213, which comprises the key or code for decrypting the idle machine key 211 to form the active machine key 209. This activation code 213 is also accessible by the central server 117 and this is also seen in Figures 1 and 2. Preferably, the active machine key 209 and the activation code 213 are stored together with identification of the production center 103, 105, 107 in which they are allocated. [069] In one embodiment, the machine key comprises numerous portions. The primary portion can be a plurality of secret codes, for example a saline matrix. A salt matrix can be, for example, a long string of pseudorandom digits of characters. The various portions may further include a unique identifier for the machine key, a serial code defining how the machine key is to be combined with a dynamic key (discussed below), a digital cryptographic certificate associated with the unique machine key identifier. and a machine key policy or license containing the digital cryptographic certificate generated above. [070] Preferably, the inactive machine key, that is, the encrypted version of the machine key, and particularly the plurality of secret codes, is encrypted using a strong cipher. An example of a suitable cipher is a Triple DES (Data Encryption Standard) lock cipher or a Triple DES/Rijandel lock cipher. Both apply the Data Encryption Pattern cipher algorithm three times to each block of data and Triple DES/Rijandel is a minor variation of Triple DES that was developed by IBM. In this case, the Triple DES or Triple Des/Rijandel key comprises the activation code 213. Thus, in a preferred embodiment, the active machine key 209 is decrypted, the inactive key 211 is encrypted using the Triple DES or Triple key Des/Rijandel and activation code 213 comprise this Triple DES or Triple Des/Rijandel key. [071] In the next step 203, the idle machine key 211 received by the code generator 111 is registered. This is done by the code generator 111 which sends to the checking center 114 information 215 about the received machine key and any relevant machine information (not shown). These are preferably sent over a secure internet connection 119, as shown in Figure 1, but can be sent over another suitable route. The verification center 114 sends back to the code generator 111 the activation code 213. The activation code 213 allows the idle machine key 211 to be activated and this is shown schematically at 217. The activation code 213 is preferably also sent via secure internet connection 119, as shown in Figure 1. The registration procedure is preferably arranged so that the active machine key 209 is never transferred over the internet. [072] The registration procedure may take the form of a conventional public/private key pair exchange mechanism. It can use an asymmetric key pair with the cryptographic digital certificate that forms part of the machine key, as discussed above. In that case, the public key of the asymmetric key pair may be in the form of a key issued by a third party, for example, a government authority. The information 215 about the received machine key that is sent from the code generator 111 to the checking center 114 may comprise the unique identifier for the machine key that forms part of the machine key, as discussed above. Relevant machine information (not shown) which is also sent from code generator 111 to verification center 114 may comprise an identifier or certificate unique to code generator 111 or production center. This unique identifier may include information about the location and identity of the code generator or production center, which was previously authorized for production. Preferably, the unique machine key identifier and the code generator or production center identifier are encrypted using the public key of the asymmetric key pair associated with the machine key certificate. [073] Once the verification center 114 receives the encrypted machine key unique identifier and the code generator or production center identifier, the verification center 114 can decrypt the private key using the peer's private key. of asymmetric keys associated with the machine key certificate. The verification center can then check whether the unique machine key identifier and the code generator or the production center identifier are valid. Then, the verification center 114 sends back to the code generator 111 the activation code 213. As already mentioned, preferably the activation code 213 is in the form of a Triple DES or Triple DES/Rijandel cipher. The verification center encrypts the activation code (for example, the Triple DES or Triple DES/Rijandel cipher) with the public key of the asymmetric key pair associated with the machine key certificate. This allows the activation code (for example, the Triple DES or Triple DES/Rijandel cipher) to be decrypted by the code generator using the asymmetric key pair private key associated with the machine key certificate. Then, the inactive machine key 211 can be activated using the decrypted activation code 213 in order to form the active machine key 209. [074] Once inactive machine key 211 in code generator 111 has been activated, the production center is able to manufacture items and produce codes for the items manufactured in code generator 111. As shown in the next step 205, code generator 111 generates a dynamic key 219 per batch of manufactured items. Dynamic key 219 is preferably a random dynamic secret code. The code generator uses dynamic key 219 for a batch, along with active machine key 209, to generate 221 codes (eg, alphanumeric codes) for the items manufactured in that batch. As mentioned previously, the particular mechanism for combining the dynamic key 219 for a batch with the active machine key 209 is defined in the serial code that forms part of the machine key. Codes 221 can be tagged on items by tag 113. Only one code is tagged on each manufactured item 109. Code generator 111 or production center 103, 105, 107 keeps a 223 count of the codes that are tagged on manufactured items. [075] Additionally, the code generator 111 sends the dynamic key 219 for each batch, along with the batch information (not shown), to checking center 114. This can be done via secure internet connection 119. Batch information can include various information, for example, but not limited to, brand, intended market, or intended destination. Dynamic keys 219 do not need to be sent to verification center 114 in real time and can be communicated to verification center at any appropriate time, for example, monthly. The dynamic keys 219 sent to the verification center 114 are stored in a database (for example, on the central server 117) at or accessible from the verification center 114. The dynamic key 219 for each batch is preferably stored together with the batch information sent to checking center 114 at the same time. [076] As already discussed, the particular mechanism for combining the dynamic key 219 for a batch with the active machine key 209 is defined in the serial code that forms part of the machine key. In one embodiment, dynamic key 219 and active machine key 209 are combined by the code generator to form a pseudorandom noise code that is secure from cryptographic attacks. The noise code does not allow reconstruction of dynamic key 219 and active machine key 209 from the noise code. A variety of known techniques are available for generating noise code, including, but not limited to, table replacement, indexing, hashing, and variations thereof. The noise code is preferably used as a digital signature for the ID code. The noise code can be derived from the ID code itself. Dynamic key 219 and active machine key 209 are known only to verification center 114 and code generator 111. [077] Preferably, the active machine key 209 is cleared when the code generator 111 at a particular production center 103, 105, 107 is taken out of service. This prevents a malicious user from gaining access to active machine key 209 without proper registration. Additional means for disabling the code generator 111 and preventing unauthorized use of the code generator 111 and the production center can be provided. [078] Figure 3 shows an additional step 207 of the method of Figure 2 when the system of Figure 1 is used for a first fiscal verification. In this case, the method steps are carried out in order 201, 203, 205, 207. The production volumes, for example, the number of items produced in each production lot by each production center, as well as the statistical production data by brand or by intended market, it can be collected and stored. Such production volume information can be used to verify tax collection. The system can be used instead of, or in addition to, a conventional system of tax stamps or tax stickers to enable verification of paid tax status, to protect disc revenue and to prevent counterfeiting of tax stamps or tax stickers. [079] In the third step 205 of the method of Figure 2, the code generator 111 or the production center 103, 105, 107 keeps a count 223 of the codes that are marked on the items manufactured during the production process. Counting can be done by code generator 111 and marker 113 at each production center or at another appropriate location. If the production center includes a sensor to detect the ID codes marked on the manufactured items, the sensor can carry out the count. This produces the exact number of 221 codes that have been printed or marked and that 223 count can be reported to a third party, for example a 301 government official. This is shown in Figures 1 and 3. [080] The tax rate for each manufactured item can be sent to government authority 301, or other relevant third party, along with the count 223. Taxes due can then be computed by multiplying all printed codes associated with a tax rate specific by the tax rate itself. This makes it possible for a government authority to verify or compute taxes due or taxes already paid. The system can be used with different tax rates if desired, in which case taxes can be entered as part of the batch information before producing a batch of items. Preferably, verification center 114 stores information and links the ID codes tagged on the actual or correct number of manufactured items to information specific to those tagged manufactured items. Then, tax paid or due can be verified against manufactured items. Checkpoint 114 can be managed by a trusted third party, for example, the government authority itself. [081] Production volume information that is reported to the 301 government authority may be reported by shipment or by tax warehouse or by shipment and by tax warehouse. Production volume information can be reported by categories such as volume by SKU (Stock Keeping Unit), volume by resale price, volume by domestic production, volume by export production, volume by tax exemption. Production volume information can be reported periodically, for example, every month or at another appropriate time. [082] In some cases, government authority 301 or another party may submit a request to verification center 114 for production information such as production volume. In that case, the verification center 114 can be maintained by a trusted third party independent of the producer of the manufactured items. The verification center 114, in response to such a request, can then obtain the data from the relevant production centers 103, 105, 107. This can enable government authorities to verify the declared production volumes. [083] One of the advantages of performing Figure 3 is that no preliminary authorization is required for each batch of manufactured items. As long as the particular production center or code generator is registered with the government authority, the code generator can simply produce as many codes as needed. Then, the actual and correct number of codes used can be reported once items have been manufactured and tagged. [084] Figure 4 shows an additional step 204 of the method of Figure 2 when the system of Figure 1 is used for a second realization of the fiscal verification. In this case, step 204 shown in Figure 4 is performed before step 205, or after or in parallel with steps 201 and 203. The system can be used instead of, or in addition to, a conventional system of tax stamps or tax stickers to enable verification of tax paid status, to protect disc revenue, and to prevent counterfeiting of tax stamps or tax stickers. [085] In step 204, code generator 111 and marker 113 at each production center request authorization from a government authority 301 to generate a defined number of ID codes. This is shown schematically at 403. Alternatively, the request can be submitted from a dedicated manufacturing portal to one or more production centers. In response, the government authority 301 authorizes the production center to generate a defined number of ID codes. This is shown schematically at 405. [086] Preferably, request 403 triggers payment for the requested amount of ID codes. The authorization may therefore indicate a tax paid situation. The production center is only eligible to manufacture items and produce codes for the items manufactured in code generator 111 once authorization is received. A request can be submitted for each production batch of manufactured items. Preferably, all items manufactured in the batch have the same associated tax rate. [087] The step in Figure 4 can be combined with reporting to the government authority the actual or correct number of ID codes marked on the manufactured items, as described in relation to Figure 3. This can provide confirmation of production volume. [088] Figure 5 shows an additional step 208 of the method of Figure 2 when the system of Figure 1 is used to verify a production volume. In this case, the method steps are performed in order 201, 203, 205, 208. The production volumes, for example, the number of items produced in each production lot by each production center, as well as the statistical production data by brand or by intended market, it can be collected and stored. Such production volume information may be used for production management or for official purposes and may be available to selected users. [089] In the third step 205 of the method of Figure 2, the code generator 111 or the production center 103, 105, 107 keeps a count 223 of the codes that are marked on the items manufactured during the production process. Counting can be done by code generator 111 and marker 113 at each production center or at another appropriate location. If the production center includes a sensor to detect the ID codes marked on the manufactured items, the sensor can carry out the count. This produces the exact number of 221 codes that have been printed or marked. As shown in Figure 5, the fourth step 208 of the method for verifying production volume is to report the count 223 to an interested party, for example, a government official 301. This is shown in Figures 1 and 5. [090] Preferably, checking center 114 stores information that connects the ID codes tagged on manufactured items to information specific to those tagged manufactured items. In some cases, government authority 301 or another party may submit a request to verification center 114 for production information such as production volume. In that case, the verification center 114 can be maintained by a trusted third party independent of the producer of the manufactured items. The verification center 114, in response to such a request, can then obtain the data from the relevant production centers 103, 105, 107. This can enable government authorities to verify the declared production volumes. [091] Production volume information that is reported to government authority 301 may be reported by shipment or by tax warehouse or by shipment and by tax warehouse. Production volume information can be reported by categories such as volume by SKU (stock holding unit), volume by resale price, volume by domestic production, volume by export production, volume by tax-free production (if the manufactured items were subject to special taxes). Production volume information can be reported periodically, for example, every month or at another appropriate time. [092] Figure 6 shows an additional step 210 of the method of Figure 2 when the system of Figure 1 is used to authenticate a manufactured item. In this case, the method steps are performed in order: 201, 203, 205, 210. In step 210, when a user 601 wants to authenticate an individual manufactured item, the user sends code 221 on the item to checking center 114. This is shown in Figures 1 and 6. User 601 can send the code to verification center 114 by any suitable means such as a secure or insecure internet connection. From code 221, verification center 114 can derive dynamic key 219 and active machine key 209 used to generate code 221. This is done by a reverse process to the process used to generate code 221 in step 205. [093] For example, if dynamic key 219 and active machine key 209 are combined to form a pseudo-random noise code that is used as a digital signature for the ID code, the verification center can derive the ID code unsigned from the digitally signed ID code. Then, the verification center 114 can independently derive the dynamic key 219 and the active machine key 209 from the information related to the ID code and verify them against the received noise code. [094] From the derived active machine key 209, the production center 103, 105, 107 in which the item was manufactured can be determined, as the active machine keys are preferably stored in the database along with the details of its associated production centers. From the derived dynamic key 219, the batch information for the item can be determined as the dynamic keys are preferably stored in the database along with the associated batch information. Thus, the checking center 114 can derive, from the code 221 sent from the user 601, various information 603 about the individual item. This is shown schematically in Figure 6. The checking center can also go through checks of whether the various parameters (eg active machine key, dynamic key, batch information) have valid values. Then, all or selected portions of information 603 can be sent to user 601. This is shown in Figures 1 and 6. Information 603 is preferably sent to user 601 via the same means by which the original code was sent. [095] A privileged user, for example, an employee of the manufacturer or a government authority, may receive additional privileged information not available to a generic user. Such privileged information may include production volume information, statistical information related to production center or production center access, expiration date, warranty information, information routes, and so on. [096] The described realizations provide an improved method and system for marking manufactured items, which can be used for fiscal verification as shown in Figures 3 and 4, for production volume verification as shown in Figure 5, and for authenticating manufactured items as shown in Figure 6.
权利要求:
Claims (6) [0001] 1. METHOD FOR MARKING MANUFACTURED ITEMS (109), characterized by comprising: providing a cryptographic key in an inactive state (211) at a point (103, 105, 107) in a supply chain for manufactured items (109); providing the cryptographic key in an active state (209) and an activation code (213), to activate the cryptographic key in the inactive state (211) to form the cryptographic key in the active state (209), to a verification center (114 ); transmitting information (215) relating to the cryptographic key received from the point (103, 105, 107) in the supply chain to the verification center (114); provide the activation code (213) at the point (103, 105, 107) in the supply chain in response to the point (103, 105, 107) in the supply chain that transmits information (215) related to the received cryptographic key, where the activation code (213) allows the cryptographic key in the inactive state (211) at point (103, 105, 107) in the supply chain to be activated to form the cryptographic key in the active state (209); wherein the step of providing the activation code (213) to the point (103, 105, 107) in the supply chain comprises sending the activation code (213) from the verification center (114) to the point (103, 105, 107) ) in the supply chain; generate, at point (103, 105, 107) in the supply chain, an identification code (221) for each manufactured item (109), the identification code (221) being derived from the cryptographic key combination in the active state (209) and a dynamic key (219) generated for each batch of manufactured items (109) using a particular mechanism defined by a serial code that forms part of the cryptographic key (209); providing the dynamic key (219) for each batch of manufactured items (109) to the checking center (114); mark (113) each manufactured item with the identification code (221); and counting (223) the number of identification codes (221) marked on the manufactured items (109); wherein the verification center (114) encrypts the activation code (213) with a public key of an asymmetric key pair associated with a cryptographic key certificate (209, 211) so that the activation code (213) can be decrypted at point (103, 105, 107) in the supply chain using an asymmetric key pair private key associated with the cryptographic key certificate (209, 211). [0002] 2. METHOD, according to claim 1, characterized in that the cryptographic key (209, 211) is generated in a key generator (115) separate from the point (103, 105, 107) in the supply chain. [0003] 3. METHOD, according to any one of claims 1 to 2, characterized in that the identification codes (221) generated are not stored. [0004] 4. METHOD, according to any one of claims 1 to 3, characterized in that it is used for verification of production volume, in which the method further comprises reporting to a third party the number of identification codes (221) marked in the items manufactured (109). [0005] 5. METHOD according to any one of claims 1 to 4, characterized in that it is used to authenticate a selected manufactured item (109), the method further comprising: a user who transmits the identification code (221) marked on the manufactured item (109) selected to the verification center (114); the verification center (114) derives from the identification code (221) the cryptographic key (209) and the dynamic key (219) used to generate the identification code (221); the verification center (114) derives from the cryptographic key (209) and the dynamic key (219) the information (603) related to the selected manufactured item (109); and the verification center (114) transmits at least part of the information (603) relating to the selected manufactured item (109) to the user. [0006] 6. APPARATUS FOR MARKING MANUFACTURED ITEMS (109), characterized in that it comprises: a key generator (115) for generating a cryptographic key, the cryptographic key having an active state (209) and an inactive state (211); at least one point (103, 105, 107) in a supply chain for the manufactured items (109), the key generator (115) being arranged to send the cryptographic key, in the inactive state (211), to the point (103, 105, 107) in the supply chain, where the point (103, 105, 107) in the supply chain is arranged to receive in response to the point (103, 105, 107) in the supply chain transmitting information ( 215) related to the received cryptographic key, an activation code (213) to activate the cryptographic key, the activation code (213) allowing the cryptographic key in the inactive state (211) to be activated to form the cryptographic key in the state active (209); a verification center (114) for verifying the properties of the manufactured items (109), the key generator (115) being arranged to provide the cryptographic key in the active state (209) and the activation code (213) to the center verification (114); wherein the verification center (114) is structured to provide the activation code (213) to the point (103, 105, 107) in the supply chain by sending the activation code (213) from the verification center (114) to the point (103, 105, 107) in the supply chain; a code generator (111) at the point in the supply chain to generate an identification code (221) for each manufactured item (109), the identification code (221) being derived from the cryptographic key combination in the active state (209) and a dynamic key (219) generated for each batch of manufactured items (109) using a particular mechanism defined by a serial code that forms part of the cryptographic key (209); wherein the dynamic key (219) for each batch of manufactured items (109) is provided to the checking center (114); a marker (113) at point (103, 105, 107) in the supply chain to mark each manufactured item (109) with the identification code (221); and a counter (223) for counting the number of identification codes (221) marked on the manufactured items (109); wherein the verification center (114) is structured to encrypt the activation code (213) with a public key of an asymmetric key pair associated with a cryptographic key certificate (209, 211) so that the activation code ( 213) can be decrypted (217) at point (103, 105, 107) in the supply chain using an asymmetric key pair private key associated with the cryptographic key certificate (209, 211).
类似技术:
公开号 | 公开日 | 专利标题 BR112013016754B1|2021-07-27|METHOD AND APPARATUS FOR MARKING MANUFACTURED ITEMS TWI622969B|2018-05-01|Method and apparatus for marking manufactured items using physical characteristic KR101127327B1|2012-03-29|Methods and systems for marking, tracking and authentication of products US10621392B2|2020-04-14|Method and system for marking manufactured items to detect unauthorized refilling
同族专利:
公开号 | 公开日 CR20130345A|2013-10-11| TN2013000276A1|2014-11-10| JP6016807B2|2016-10-26| CA2822832A1|2012-07-05| IL227189A|2016-05-31| AU2011351624A1|2013-07-25| UY33846A|2012-08-31| SG191413A1|2013-08-30| EP2659438A1|2013-11-06| US20140046852A1|2014-02-13| MX2013007556A|2013-12-02| UA110633C2|2016-01-25| CO6761309A2|2013-09-30| CN103460230A|2013-12-18| BR112013016754A2|2016-09-13| WO2012089582A1|2012-07-05| AU2011351624B2|2017-03-02| KR20140020246A|2014-02-18| NZ612461A|2014-08-29| AR084653A1|2013-05-29| JP2014504110A|2014-02-13| RU2013135499A|2015-02-10| KR101922739B1|2018-11-27| MA34833B1|2014-01-02| EP2472451A1|2012-07-04| ZA201304851B|2014-09-25| US9721260B2|2017-08-01| RU2591010C2|2016-07-10|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US4035615A|1976-05-20|1977-07-12|Sperry Rand Corporation|System for accepting wide ranges of universal product code system| US4094244A|1976-12-22|1978-06-13|Dymo Industries, Inc.|Hand-held bar code label marking device| US4354101A|1977-04-15|1982-10-12|Msi Data Corporation|Method and apparatus for reading and decoding a high density linear bar code| US4463250A|1981-07-11|1984-07-31|Mcneight David L|Method and apparatus for use against counterfeiting| US4529871A|1982-09-29|1985-07-16|Loblaw Companies Limited|Price marking system| US4860226A|1986-09-09|1989-08-22|Martin Edward L|Method and apparatus for bar code graphics quality control| US4963719A|1989-11-01|1990-10-16|Spectra-Physics|Bar code scanner and method of scanning| WO1993010506A1|1991-11-22|1993-05-27|Engineered Data Products, Inc.|Label generation apparatus| US5483624A|1992-03-27|1996-01-09|Monarch Marking Systems, Inc.|Programmable hand held labeler| US5467433A|1992-04-15|1995-11-14|Monarch Marking Systems, Inc.|Label printing and data collection program generator| US5382779A|1993-05-07|1995-01-17|Digicomp Research Corporation|Shelf price label verification apparatus and method| US5400319A|1993-10-06|1995-03-21|Digital Audio Disc Corporation|CD-ROM with machine-readable I.D. code| US6122403A|1995-07-27|2000-09-19|Digimarc Corporation|Computer system linked by using information in data objects| BG61241B1|1995-02-16|1997-03-31|Живко ЖЕЛЕВ|Method and device for recording and reading of multistage multi-media protection| US5850080A|1995-08-03|1998-12-15|Barcode Graphics Inc.|Verification of barcodes| US5837983A|1996-06-10|1998-11-17|Psc, Inc.|Readability monitoring system for optical codes| US6272634B1|1996-08-30|2001-08-07|Regents Of The University Of Minnesota|Digital watermarking to resolve multiple claims of ownership| US5892900A|1996-08-30|1999-04-06|Intertrust Technologies Corp.|Systems and methods for secure transaction management and electronic rights protection| US5767498A|1996-09-17|1998-06-16|Ncr Corporation|Bar code error scanner| US7797164B2|1996-10-02|2010-09-14|Nintendo Of America, Inc.|Method and apparatus for enabling purchasers of products to obtain return information and to initiate product returns via an on-line network connection| US6442276B1|1997-07-21|2002-08-27|Assure Systems, Inc.|Verification of authenticity of goods by use of random numbers| US6212638B1|1997-12-02|2001-04-03|George C. Lee|Method for generating unpredictable authentication identification symbols| US6134561A|1997-12-29|2000-10-17|Pitney Bowes Inc.|System for tracking the receipt and internal delivery of items such as packages| US6069955A|1998-04-14|2000-05-30|International Business Machines Corporation|System for protection of goods against counterfeiting| GB2342743B|1998-10-17|2003-05-14|Nicholas Paul Elliot|Verification method| BG63519B1|1998-10-21|2002-03-29|Живко ЖЕЛЕВ|Device for telecommunication testing of one- and multi-stage multi-medfia encoded wrapper marking on products| US6226619B1|1998-10-29|2001-05-01|International Business Machines Corporation|Method and system for preventing counterfeiting of high price wholesale and retail items| US6217966B1|1999-02-26|2001-04-17|Ncr Corporation|Desensitized price label| BG63518B1|1999-06-28|2002-03-29|Живко ЖЕЛЕВ|Device for recording one and several one- and multi-stage, two- and three-dimensional multimedia encoded markings on documents, securities and other similar| US6260029B1|1999-08-11|2001-07-10|Pitney Bowes Inc.|Postage meter that provides on a mailpiece evidence of postage paid together with cryptographically secured, third party certified, non-shipping information about the sender of the mailpiece| US7188258B1|1999-09-17|2007-03-06|International Business Machines Corporation|Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects| US6963846B1|2000-07-17|2005-11-08|Kelly Registration Systems, Inc.|System and method of managing registration, sale, distribution and use of regulated agricultural products and the licensing/certification of dealers and applicators of agricultural products| RU2183349C1|2000-10-16|2002-06-10|Дочернее Государственное Унитарное Предприятие Научно-Технический Центр "Атлас-Северо-Запад"|Article marking and identification system| US7113922B2|2000-11-02|2006-09-26|Living Naturally, Llc|Electronic inventory movement and control device| US20020053796A1|2000-11-07|2002-05-09|Mccann Mark|Graphical label and method of manufacturing| DE10100248A1|2001-01-05|2002-07-11|Focke & Co|Process and device for identifying cigarette packets stamps the packet with centrally controlled numerical code| US6497367B2|2001-04-26|2002-12-24|International Business Machines Corporation|Providing a location and item identification data to visually impaired shoppers in a site having barcode labels| US20020158137A1|2001-04-30|2002-10-31|William Grey|Systems and methods wherein a machine-readable item code is substantially invisible to a human| US6729603B1|2001-06-08|2004-05-04|Psc Scanning, Inc.|Add-on capture rate in a barcode scanning system| US20030004946A1|2001-06-28|2003-01-02|Vandenavond Todd M.|Package labeling| US6616056B2|2001-08-31|2003-09-09|International Business Machines Corporation|Method and system of capturing and reading consumer-oriented responses through consumer-appended bar codes| US20030051767A1|2001-09-19|2003-03-20|Unilever Home And Personal Care Usa|Package and system| EP2369516A3|2001-09-24|2012-01-18|Scott Laboratories, Inc.|Methods and apparatuses for assuring quality and safety of drug administration and medical products and kits| US8209226B2|2001-11-15|2012-06-26|Nintendo Of America Inc.|Non-serialized electronic product registration system and method of operating same| BR0312989A|2002-07-26|2008-03-04|Ron Everett|database and knowledge operation system| US20040117265A1|2002-12-12|2004-06-17|Paul Hoffman|Method and system for labeling and managing the sale of manufactured concrete blocks| US6712275B1|2003-02-10|2004-03-30|Targus Fly And Feather, Llc|UPC identification device| US7028901B2|2003-07-17|2006-04-18|Symbol Technologies, Inc.|System and method for reading and decoding optical codes using multiple color illumination| US6892947B1|2003-07-30|2005-05-17|Hewlett-Packard Development Company, L.P.|Barcode embedding methods, barcode communication methods, and barcode systems| US7752137B2|2003-11-03|2010-07-06|Meyers Printing Company|Authentication and tracking system| US8543411B2|2003-11-05|2013-09-24|United Parcel Service Of America, Inc.|Systems and methods for detecting counterfeit pharmaceutical drugs at the point of retail sale| US7497379B2|2004-02-27|2009-03-03|Microsoft Corporation|Counterfeit and tamper resistant labels with randomly occurring features| US20050273434A1|2004-04-18|2005-12-08|Allen Lubow|System and method for managing security in a supply chain| US20050234823A1|2004-04-20|2005-10-20|Rainer Schimpf|Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution.| US7246748B1|2004-06-30|2007-07-24|Adobe Systems Incorporated|Enabling the use of machine-readable codes| US20060011726A1|2004-07-14|2006-01-19|Culture.Com Technology Ltd.|Micro bar code and recognition system and method thereof| EP1645992A1|2004-10-08|2006-04-12|Philip Morris Products S.A.|Methods and systems for marking, tracking and authentication of products| US7614546B2|2005-02-03|2009-11-10|Yottamark, Inc.|Method and system for deterring product counterfeiting, diversion and piracy| JP4906733B2|2005-10-19|2012-03-28|パナソニック株式会社|Information security apparatus, information security method, computer program, computer-readable recording medium, and integrated circuit| CN101201886B|2007-01-15|2012-08-22|于志|Three-he-code method for recognizing commodity| GB2470900B|2009-06-08|2017-06-14|Kezzler As|Method and system for storage and retrieval of track and trace information| JP5730491B2|2010-02-26|2015-06-10|株式会社ニコン・エシロール|Lens processing management system, lens manufacturing system, lens manufacturing method, computer program, lens processing management method, data supply device, lens design data utilization management system, lens design data utilization management device, and lens design data utilization management program| US9507971B2|2010-11-05|2016-11-29|Barcode Graphics Inc.|Systems and methods for barcode integration in packaging design and printing| EP2472451A1|2010-12-30|2012-07-04|Philip Morris Products S.A.|Method and apparatus for marking manufactured items| DE102011081804B4|2011-08-30|2015-02-12|Siemens Aktiengesellschaft|Method and system for providing device-specific operator data, which are bound to an authentication credential, for an automation device of an automation system|US9904904B2|2008-04-22|2018-02-27|Intuit Inc.|Determining time histories for financial information| EP2472451A1|2010-12-30|2012-07-04|Philip Morris Products S.A.|Method and apparatus for marking manufactured items| US20140331335A1|2011-10-19|2014-11-06|Knova Web Technologies, Inc.|Method for automatically tagging documents with matrix barcodes and providing access to a plurality of said document versions| TWI610253B|2012-12-17|2018-01-01|印奈克斯托股份有限公司|Method and apparatus for storage of data for tracking manufactured items| TWI622969B|2012-12-17|2018-05-01|印奈克斯托股份有限公司|Method and apparatus for marking manufactured items using physical characteristic| EP3158679B1|2014-06-23|2021-10-27|Inexto Sa|Method and system for marking manufactured items to detect unauthorised refilling| IL234051D0|2014-08-11|2014-11-30|Lior Dricker|Tax refund system| EP3051469A1|2015-01-28|2016-08-03|Philip Morris Products S.A.|Method and apparatus for unit and container identification and tracking| ES2728680T3|2015-01-31|2019-10-28|Inexto Sa|Secure product identification and verification| FR3039911B1|2015-08-07|2017-08-04|Arjowiggins Solutions|METHOD FOR GENERATING AN IDENTIFICATION CODE OF AN OBJECT, AND SECURITY EQUIPMENT MODULE| US20180205543A1|2015-08-13|2018-07-19|Inexto Sa|Enhanced obfuscation or randomization for secure product identification and verification| WO2017032860A1|2015-08-25|2017-03-02|Inexto Sa|Multiple authorization modules for secure production and verification| US10579889B2|2015-08-25|2020-03-03|Inexto Sa|Verification with error tolerance for secure product identifiers| CN108475379A|2016-01-22|2018-08-31|惠州市吉瑞科技有限公司深圳分公司|A kind of electronic cigarette product certification method and electronic cigarette product certification system| CN107368297A|2017-06-19|2017-11-21|上海顶羽网络科技有限公司|A kind of method for generating application code| KR102255468B1|2018-12-11|2021-05-24|드림시큐리티|Apparatus for issuing cryptographic key of internet of things device using 2-step authentication and method thereof| RU2755969C1|2020-06-08|2021-09-23|Общество с ограниченной ответственностью "Интегрити"|Technology for protection against counterfeiting and falsification by encoding, internal placement of unique codes, and recognition thereof|
法律状态:
2017-12-05| B25G| Requested change of headquarter approved|Owner name: DIGITAL CODING AND TRACKING ASSOCIATION (CH) | 2018-12-18| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2019-10-08| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2020-12-29| B07A| Technical examination (opinion): publication of technical examination (opinion) [chapter 7.1 patent gazette]| 2021-05-25| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2021-07-27| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 21/12/2011, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 EP20100252258|EP2472451A1|2010-12-30|2010-12-30|Method and apparatus for marking manufactured items| EP10252258.8|2010-12-30| PCT/EP2011/073588|WO2012089582A1|2010-12-30|2011-12-21|Method and apparatus for marking manufactured items| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|