专利摘要:
The invention relates to a method for authenticating a closure assembly of a container, comprising a closure (12, 13) closing an opening (11) of this container and an overpack (17) covering at least said closure (12). , 13). According to the invention, this overpack (17) comprising a first (18) radio frequency identification tag comprising a unique identifier of this overwrap (17), the following steps are performed: - read the unique identifier of said overwrap (1 7 said closure (12, 13) comprising a second radio frequency identification tag comprising a unique identifier of said closure (12, 13) and a storage unit comprising at least data relating to a pair of overwrapping / closure comprising the unique identifiers of a closure (12, 13) and an overpack (17) associated with this closure (12, 13), reading the unique identifier of said closure (12, 13) and comparing the identifiers of said overpack (17). ) and of said closure (12, 13) thus read with the data relating to said over-wrapping / closing torque of said assembly to check that the pairing overwrap / closing during authentication coincides well with the safe torque packaging / closing defined in said set of data, - emitting a communication signal corresponding to the result of this verification, said closure assembly (12, 13) comprising means (19) for destroying at least one of the two identification tags as soon as the first opening of this container.
公开号:FR3027700A1
申请号:FR1460306
申请日:2014-10-27
公开日:2016-04-29
发明作者:Laurent Clere;Christophe Loustaudaudine
申请人:LES BOUCHAGES DELAGE;
IPC主号:
专利说明:

[0001] BACKGROUND OF THE INVENTION Field of the Invention The present invention relates to a method of authenticating the closure assembly of a container in order to establish the integrity of the container. integrity and authenticity of the contents of this container.
[0002] The present invention also relates to a closure assembly for implementing this authentication method. BACKGROUND It is known to close a container having a neck having an opening therein for the passage of a fluid contained therein, with a closure assembly comprising a cap and a cap. This cap which may be a heat shrink sleeve covers the cap and a portion of the neck so as to bind the cap to the container. She also comes to dress this container. By plug means a mass shutter, in particular for closing a container by being inserted by force into the neck of this container. It is also known that counterfeiters use empty bottles and caps belonging to castles or spirits producers of high notoriety to mislead consumers on the actual content of these bottles, filling them with liquids of lower quality. In recent years, various technical solutions have been developed in an attempt to fight against this rapidly expanding counterfeiting. Thus, caps with invisible signs such as drawings are known which are only revealed by exposing this cap to ultraviolet light.
[0003] However, such a solution can be copied quite easily by counterfeiters. We still know the so-called inviolability of wire caps to ensure the contents of a bottle before first use by forming an overpack permanently imprisoning the closure of this bottle. Although giving good results, such a technical solution can be further improved. On the one hand, it can be pretty unsightly. On the other hand, the malicious release of the muzzle leaves no visible sign on the bottle. The bottle may be presented to the final consumer after exchange of its contents without the latter having a means at his disposal allowing him to note the counterfeit. In addition, the solutions of the prior art mentioned above can not contain any specific information on the contents of the bottle.
[0004] It is known, moreover, to use tags implementing an RFID (radio frequency identification) contactless identification solution as an antitheft device. Such a label is typically stuck on the surface of the container that it protects, for example on the overpack of a cosmetic product.
[0005] However, a fairly easy way to circumvent such an antitheft device is to take off the latter from its support. However, this solution has recently been implemented to protect the contents of a bottle provided with a neck and containing a liquid such as a wine or a spirit.
[0006] It has thus been proposed to insert an RFID tag in the neck of the bottle by placing it between the cap and the cap covering the upper part of this bottle. To deter a potential counterfeiter from exchanging the contents of the bottle, this RFID tag is automatically deactivated as soon as the capsule is removed.
[0007] Although such a device contributes to strengthening the protection of the contents of a bottle by making counterfeiting more complicated, it may still be insufficient to guarantee the authenticity of "premium" drinks. Indeed, forgers of organized networks are ready to produce and insert their own RFID tag after exchanging the contents of bottles from castles enjoying a high reputation. OBJECT OF THE INVENTION The present invention aims at overcoming the drawbacks of the prior art and at responding to the above-stated constraints by proposing a method for authenticating the means for closing a container, which is simple in its design and in its design. operating mode, economic and ensuring the integrity and authenticity of the contents of this container. Another object of the present invention is a closure assembly for implementing this authentication method for recording data relating to the contents of the container and thus providing information to the end consumer. BRIEF DESCRIPTION OF THE INVENTION To this end, the invention relates to a method of authenticating a closure assembly of a container, this assembly comprising a closure closing an opening of this container for the passage of a fluid or a fluid. at least one object contained in this container and an overwrap covering at least said closure. According to the invention, said overwrap comprising a first radio frequency identification tag comprising a unique identifier of said overwrap, the following steps are performed: read the unique identifier of said overwrap, said closure comprising a second identification tag by radio frequency comprising a unique identifier of said closure and a storage unit 20 comprising a set of data comprising at least data relating to an overwrapping / closure pair comprising the unique identifiers of a closure and an overwrap associated with this closure, read the unique identifier of said closure and compare the identifiers of said overpack and said closure read with the data relating to said torque overwrapping / closing said set of data to verify that the overpackage / closure pair being authenticated coincides with the couple overpack / closure defined in said data set, - issuing a communication signal corresponding to the result of this verification, and - said closure assembly comprises means for destroying at least one of the two identification tags from the first opening of said container. For purely illustrative purposes, this fluid may be a liquid such as a wine, an alcohol, a spirit, a drug or a perfume, or a pasty or viscous product such as a cream. Alternatively, it may be at least one solid object such as food products or drugs. Advantageously, such a method thus enables a user or a consumer to verify the authenticity of the closure assembly, and consequently, to obtain a guarantee on the origin of the contents of this container, without which it must be placed in a communication coverage area (radio, internet, mobile or other) to consult a remote database. The authentication is performed easily and locally because all the data required for this authentication of the closure assembly are contained in this set. Radiofrequency identification tags are advantageously RFID tags. The overwrap may be a protective overwrap fitted on a stopper and, preferably, on at least a portion of the container neck whose opening is closed by this stopper. This overpack may, for example, be a sheath or sleeve heat-shrinkable. Alternatively, this overpack is used to overpack an object packaged in a primary packaging, this object comprising for example a lid-type closure to seal a container. This overpack covers at least said closure and preferably a portion of the container. In a particular embodiment for establishing the integrity and authenticity of the liquid content of a container such as a bottle, a bottle or a carafe, the invention relates to a method for authenticating the closure assembly of a container having a container neck comprising an opening therein for the passage of a fluid contained therein, said opening of the container being closed by a stopper (closure) and a cap (overpack) covering at least said plug.
[0008] According to the invention, said cap comprising a first radiofrequency identification tag comprising a unique identifier of said cap, the following steps are performed: read the unique identifier of said cap, said cap comprising a second identification tag by radiofrequency comprising a unique identifier of said plug and a storage unit comprising a data set comprising at least data relating to a couple cap / plug having the unique identifiers of a plug and a cap associated with this plug, read l unique identifier of said plug and compare the identifiers of said cap and said plug thus read with the data relating to said torque cap / plug of said assembly to verify that the torque cap / plug being authenticated coincides with the torque cap / cap defined in said data set, - transmitting a communication signal corresponding to the result of this verification, and - this closure assembly comprises means for destroying at least one of the two identification tags from the first opening of said container.
[0009] This authentication method therefore makes it possible in a very simple way to guarantee absolutely the integrity of the contents of a bottle. This objective is achieved on the one hand, by storing directly inside the cap the unique identifiers of the stopper and cap associated with this stopper during the bottling stage, and secondly, by allowing a user to read the unique identifier of the cap with an RFID reader and verify the authenticity of the closing of the container by comparing the plugs of the pair of cap / cap read and the data of the cap / cap couple stored in memory. Of course, the protection of the contents of the bottle can be further enhanced by encrypting at least some of the data of this set before recording on the storage unit. This data set may also include data relating to the contents of the container and / or to the container itself, thereby providing easily accessible information to the distributor or the end consumer.
[0010] By way of illustration, these data can be chosen from the vintage, the bottling date, the name of the bottler, the number of bottles produced, the grape variety or the blend of grape varieties, the sugar content (raw, dry, extra-dry, ...), the nominal volume of the bottle, the alcohol content, the allergen (s) present, the service temperature and combinations of these elements. In different embodiments of this authentication method, the present invention also relates to the following characteristics which will have to be considered individually or in all their technically possible combinations: the steps of comparing and transmitting a communication signal corresponding to the result of this verification are carried out by a processing unit placed in said closure, - before and after closure of this container with said closure assembly, the following steps are performed: - read the unique identifier of said overpack, - store said unique identifier said overwrap in said storage unit placed in said closure by associating this unique identifier of said overwrap with the unique identifier of said closure to form a specific overwrapping / closing pair, - having encrypted at least the data relating to the pair overwrapping / closing by means of a key coding, said data is decrypted during the comparison step. Alternatively, the write access to said storage unit is protected by a key and an authentication algorithm to prevent any modification of the overwrap / close pair data. the data stored in said storage unit also comprising at least data relating to said fluid or to said at least one object contained in said container, displaying on a display means at least one control suggestion, said or at least one of said suggestions corresponding to the display of said data relating to said fluid or to said at least one object contained in said container, said second radiofrequency identification tag and said storage unit are placed in a housing internal to said closure. The present invention also relates to a closure assembly for implementing the authentication method as described above, said container having an opening for the passage of a fluid or at least one object contained in this container. According to the invention, this assembly comprises - a closure intended to close said opening, - an overwrap intended to cover at least said closure, - said overwrap comprising a first radiofrequency identification tag comprising a unique identifier of said overwrap, - said closure. having a housing receiving a second radio frequency identification tag storing a unique identifier of said closure, and a processing unit including a storage unit for storing data, said processing unit being configured to generate and receive communication signals, and means for destroying at least one of the two identification tags as soon as the said first container is opened. By way of illustration only, the second label can be destroyed during the manipulation of the closure to release the opening of the container. For example, the housing placed in the thickness of the closure and receiving the second label may comprise a breakable zone on which is directly placed this second label. When handling the closure, the breaking of this breakable zone causes the automatic tearing of part of the second label making the latter inoperative. This container is typically a bottle, a jar or a glass carafe. This glass container can still be dressed at least partially with wood, plastic or metal or by combinations of these elements. This container may contain a still or sparkling wine, a spirit or other. It may still be a container such as a pot, the opening is closed by a screw cap. This container can receive a pasty or viscous product, such as a cream.
[0011] In different embodiments of this closure assembly, the present invention also relates to the following features which will have to be considered in isolation or in all their technically possible combinations: said closure comprising a head and a body, said housing is placed in this head of the closure. Preferably, the closure being a plug, the plug head is rigid or semi-rigid. The cap body is, for its part, advantageously flexible. said processing unit is connected to said second label for transmitting and receiving said communication signals.
[0012] Alternatively, the processing unit comprises a radio frequency communication means such as RFID. - The identification tag of said overpack is connected to a radiofrequency antenna structure. the closure also comprises a source of electrical energy for supplying at least the processing unit and / or the data storage unit. For example, this energy source is a battery. Alternatively, at least part of the energy necessary for the operation of at least one of the following elements: processing unit, data storage unit, communication means and identification tag, is provided by radio frequency by an external reader such as: than a mobile management unit. said short-range wireless communication signals are based on a Near Field Communication (NFC) protocol, said housing being formed by a waterproof case.
[0013] This box plays several roles. It first ensures the protection of the contents of the container against possible contaminants that could come from the electronics housed in this housing.
[0014] It also guarantees the proper functioning of this electronics against chemical attack from the contents in the container, especially when it is an alcohol. Finally, it protects this electronics from any shocks that may be experienced by the container thus equipped with such a closure assembly. Advantageously, this housing is made of a food plastic material when the contents of the container is a food. It can still be a case made of wood, ceramic or glass. Preferably, this housing is made of the same material as the closure. said second radiofrequency identification tag and said processing unit are encapsulated in a hardened gangue for protecting these elements. This gangue is preferably obtained from a cured resin. Advantageously, it is a food resin when the contents of the container is a food. As described above for the case, this gangue makes it possible to protect the electronics from external aggressions, to authorize food contact and the durability of this electronics over time. said processing unit comprises security means for securing the data stored in said storage unit.
[0015] As a purely illustrative example, these security means comprise encryption means for encrypting at least the data relating to the couple cap / cap, and in particular the unique identifiers of each of these elements, before their storage on said storage unit. The present invention also relates to a container having a container neck comprising inside an opening for the passage of a fluid contained in said container, this container being equipped with a closure assembly as described above. The present invention also relates to the use of said closure assembly as described above for the protection of wine, alcohol or spirits, drug or pasty or viscous food product, for medical or cosmetic use contained in a bottle, a pot, a tube, a bottle, a vial or a carafe. For example, the container closed by this closure assembly may contain a liquid which is a cosmetic such as a perfume. In this case, the closure of said assembly may comprise a suction pump connected to a suction pipe of the liquid contained in the container, this duct being immersed at least partly in the liquid received in the internal volume of the container.
[0016] BRIEF DESCRIPTION OF THE DRAWINGS Other advantages, aims and particular features of the present invention will emerge from the description which follows, made for an explanatory and non-limiting purpose, with reference to the accompanying drawings, in which: - Figure 1 shows schematically an exploded perspective view of a closure assembly of a bottle having a neck according to a first embodiment of the present invention; - Figure 2 is another exploded view of the closure assembly of Figure 1; DETAILED DESCRIPTION OF THE EMBODIMENT OF THE INVENTION Firstly, it is noted that the figures are not to scale. Figures 1 and 2 schematically show an exploded view of a closure assembly for a container, here a bottle, according to a particular embodiment of the present invention. This container comprises a container neck 10 comprising inside an opening 11 for the passage of a liquid contained in this container. This liquid is, for example, a wine or a spirit. This opening 11 is closed by a plug comprising a cap head 12 and a plug body 13 integral with this head 12. The cap head 12 comprises a hollow base 14 and an ornamental element 15 forming a cover for closing and hiding a housing 16 housed in this hollow base 14 of the plug head 12. This housing 16 has dimensions allowing it to marry the inner wall of the base 14 so as to be held in position once introduced into it. This housing 16 is here a metal insert while the body 13 of plug is made of a flexible material. The latter can be made of cork, agglomerated cork or elastomeric type plastic such as a thermoplastic elastomer (TPE).
[0017] A cap 17 made here in a transparent plastic material, is intended to cover the plug 12,13 and a portion of the neck 10 of the container to secure the plug 12, 13 to this container. This cap 17 has a first radio frequency identification tag 18, this first tag 18 being arranged on the inner face of this cap 17 so as to be turned towards the plug 12, 13. It is thus made inaccessible.
[0018] Furthermore, this cap 17 is configured to cause the destruction of this first identification tag 18 from the first opening of the container. For this, this first label 18 is directly placed on a strip 19 of tearing of the cap 17, for example a strip called "tircell" or more simply an opening strip limited by two lines of weakness. Thus, the withdrawal of the cap 17 to access the cap 12, 13 to open the container, by manipulation of the strip 19 automatically destroys the first label 18. A counterfeiter can therefore reuse the first label 18 having a unique identifier. The housing 16 placed in the thickness of the plug head, receives a hardened gangue encapsulating and protecting an assembly having a second radio frequency identification tag and processor.
[0019] This second identification tag stores a unique identifier of the plug 12, 13. The processor includes a storage unit for storing data and is configured to generate and receive communication signals. In one embodiment of the authentication method, a mobile management unit (not shown) is used capable of addressing and receiving communication signals based on the NFC / RFID protocol and comprising embedded software for processing these signals. . This mobile management unit can be a mobile terminal, for example a mobile phone such as a smartphone or a portable touch pad. The mobile management unit software reads the unique identifier of the first radiofrequency identification tag 18 from the cap and then establishes an encrypted communication with the processor located in the plug head 12 and connected to the second tag. radio frequency identification. Through this communication, the smartphone software transmits the unique identifier of the first identification tag 18 of the cap to the processor software which verifies that this identifier is the one corresponding to the unique identifier associated with the identifier of the plug at the bottling line exit to form the couple of plug / cap identifiers stored in the storage unit of the processor. The processor transmits the verification result to the unit as a short-range communication signal. The processor of the mobile management unit displays the result of the verification on a display means of this mobile management unit. In addition, if the mobile management unit is in a communication coverage area (telephone data, internet, ...) with the data exchange enabled, the processor of this mobile management unit may at the request of the 'user, connect to a database of the spirits vendor to verify that the data of the couple' cap / cap 'are registered in its database.
权利要求:
Claims (15)
[0001]
REVENDICATIONS1. A method of authenticating a closure assembly (12, 13) of a container, said assembly comprising a closure (12, 13) closing an opening (11) of said container for the passage of a fluid or at least one an object contained in said container and an overwrap (17) covering at least said closure (12, 13), characterized in that said overwrap (17) comprising a first (18) radiofrequency identification tag having a unique identifier of said overwrap (17), the following steps are carried out: - read the unique identifier of said overwrap (17), - said closure (12, 13) comprising a second radio frequency identification tag comprising a unique identifier of said closure (12, 13). ) and a storage unit having a data set comprising at least overwrap / close pair data having the unique identifiers of a closure (12, 13) and an overwrap (17) associated with this closure (12, 13), read the unique identifier of said closure (12, 13) and compare the identifiers of said overpack (17) and said closure (12, 13) read with the data relating to said torque overwrap / closure said set of data for verifying that the overwrapping / closing pair being authenticated coincides with the overwrapping / closing torque defined in said set of data, - transmitting a communication signal corresponding to the result of this check, and that - said closure assembly (12, 13) comprises means (19) for destroying at least one of the two identification labels (18) as soon as said container is first opened.
[0002]
2. Method according to claim 1, characterized in that the steps of comparing and transmitting a communication signal corresponding to the result of this verification are performed by a processing unit placed in said closure (12, 13).
[0003]
3. Method according to claim 1 or 2, characterized in that before and after closure (12, 13) of this container with said closure assembly (12, 13), the following steps are performed: - read the unique identifier of said overwrap (17), - storing said unique identifier of said overwrap (17) in said storage unit placed in said closure (12, 13) by associating this unique identifier of said overwrap (17) with the unique identifier of said closure (12, 13 ) to form a specific overpack / closure couple.
[0004]
4. Method according to any one of claims 1 to 3, characterized in that having encrypted at least the data relating to the torque overwrap / closure by means of a coding key, it decrypts said data during the step of comparison.
[0005]
5. Method according to any one of claims 1 to 4, characterized in that the write access to said storage unit is protected by a key and an authentication algorithm to prevent any modification of the data relating to the torque overwrap / closing.
[0006]
6. Method according to any one of claims 1 to 5, characterized in that the data stored in said storage unit also comprising at least data relating to said fluid or to said at least one object contained in said container, is displayed on a display means at least one command suggestion, said or at least one of said suggestions corresponding to the display of said data relating to said fluid or to said at least one object contained in said container.
[0007]
7. Method according to any one of claims 1 to 6, characterized in that said second radiofrequency identification tag and said storage unit are placed in an inner housing of said closure (12, 13).
[0008]
8. closure assembly for implementing the authentication method according to any one of claims 1 to 7, said container having an opening (11) for the passage of a fluid or at least one object contained in said container, characterized in that it comprises - a closure (12, 13) for closing off said opening (11), - an overpack (17) intended to cover at least said closure (12, 13), - said overpack ( 17) comprising a first (18) radio frequency identification tag having a unique identifier of said overwrap (17), - said closure (12, 13) having a housing receiving a second radio frequency identification tag storing a unique identifier of said closure (12, 13), and a processing unit having a storage unit for storing data, said processing unit being configured to generate and receive communication signals, and - means (19) to destroy at least one of the two identification tags from the first opening of said container.
[0009]
9. An assembly according to claim 8, characterized in that said closure comprising a head (12) and a body (13), said housing is placed in said head (12) of the closure.
[0010]
10. The assembly of claim 8 or 9, characterized in that said processing unit is connected to said second label for transmitting and receiving said communication signals.
[0011]
An assembly according to any of claims 8 to 10, characterized in that said short-range wireless communication signals are based on a Near Field Communication (NFC) protocol.
[0012]
12. An assembly according to any one of claims 8 to 11, characterized in that said housing is formed by a housing (16) sealed.
[0013]
13. An assembly according to any one of claims 8 to 12, characterized in that said second radiofrequency identification tag and said processing unit are encapsulated in a gangue (20) hardened to protect these elements.
[0014]
Container having a container neck comprising an opening (11) therein for the passage of a fluid contained in said container, said container being equipped with a closure assembly (12, 13) according to one any of claims 8 to 13.
[0015]
15. Use of said assembly according to any one of claims 8 to 13 for the protection of wine, alcohol or spirits, drug or pasty product or viscous food for medical or cosmetic use contained in a bottle, a pot, a tube , a bottle, a vial or a carafe.
类似技术:
公开号 | 公开日 | 专利标题
EP3213264B1|2020-04-22|Method for authentication of the closure assembly of a container
US9798294B2|2017-10-24|System, method and computer program product for detecting tampering in a product
EP3248147B1|2019-02-20|Authentication of a bottle and of its content
EP2928786B1|2016-11-09|Capping device and implementation method
FR3021475A1|2015-11-27|DOUBLE MODE ANTI-COUNTERFACON LABEL
US9916745B2|2018-03-13|Container fraud detection system and method
CN102027516A|2011-04-20|Anti-counterfeiting system
WO2010063909A2|2010-06-10|Method and device for protecting a container, and tag for implementing same
WO2016207549A1|2016-12-29|Bottle comprising a security closure
EP2892820A1|2015-07-15|Device for authenticating a bottle and authentication method using said device
EP3314539B1|2019-07-31|Anti-counterfeit label having increased security
EP3070023A2|2016-09-21|Lid for a container
FR3028844A1|2016-05-27|METHOD AND DEVICE FOR SECURING A CONTAINER, CONTAINER CARRYING SUCH A DEVICE AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY AND INTEGRITY OF SUCH A CONTAINER
EP1483748A1|2004-12-08|Method for product traceability and authentication
WO2015071917A1|2015-05-21|Method and system for authenticating a packaged product from a remote location
CN107618748A|2018-01-23|Anti-fake bottle lid
EP2979393A1|2016-02-03|Authentication method
FR3031090A1|2016-07-01|DEVICE FOR SEALING A CONTAINER COMPRISING A COLLAR
FR2911421A1|2008-07-18|Article e.g. perfume sprayer, labeling method, involves sampling information delivered by identification unit, determining labeling character according to sampled information, and inscribing selected character on article
FR3100031A1|2021-02-26|Corkscrew with confirmation of opening of an authenticated bottle
FR3028843A1|2016-05-27|METHOD AND DEVICE FOR SECURING A CONTAINER AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY AND INTEGRITY OF A CONTAINER
CN202657429U|2013-01-09|Multi-hidden-code type anti-false bottle
FR3039946A1|2017-02-10|METHOD FOR TRANSMITTING A DIGITAL MESSAGE WHEN OPENING AN OBJECT
FR3094111A1|2020-09-25|Device for securing electronic chips, their data, their communication peripherals, and the objects to which they are attached.
BE1017427A6|2008-09-02|Identification method.
同族专利:
公开号 | 公开日
EP3213264A1|2017-09-06|
EP3213264B1|2020-04-22|
WO2016066548A1|2016-05-06|
US20170316302A1|2017-11-02|
FR3027700B1|2018-01-19|
US10204296B2|2019-02-12|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
FR2667576A1|1990-10-08|1992-04-10|Pellet Jean Pierre|Tamper-evident device for containers|
US20020185544A1|2001-06-07|2002-12-12|Robert Baillod|System and method for authentication of the contents of containers|
WO2003038767A1|2001-10-31|2003-05-08|Catherine Bouthiaux|Method for product traceability and authentication|
US20060086791A1|2004-10-27|2006-04-27|Symbol Technologies, Inc.|Method of identifying and authenticating products using an identification pattern and a bar code reader|
WO2014037666A1|2012-09-05|2014-03-13|Wabash|Device for authenticating a bottle and authentication method using said device|FR3059448A1|2016-11-29|2018-06-01|Wid|ASSOCIATED MANAGEMENT SYSTEM, INSTALLATION AND MOUNTING METHOD|
IT201800005327A1|2018-05-14|2019-11-14|Container closure device in NFC technology|US20020170966A1|1995-07-27|2002-11-21|Hannigan Brett T.|Identification document including embedded data|
US7573395B2|2004-03-08|2009-08-11|Sgs Technologies, Llc|System and method for managing the dispensation of a bulk product|
US9536404B2|2014-08-28|2017-01-03|Steven M. Glamuzina, JR.|Bottle fraud detection system and method|FR3050189B1|2016-04-15|2020-05-08|Commissariat A L'energie Atomique Et Aux Energies Alternatives|SECURITY DEVICE FOR SECURING A CONTAINER|
EP3698279A1|2017-10-16|2020-08-26|GCL International Sarl|Closure member|
FR3083893B1|2018-07-13|2020-06-26|Les Bouchages Delage|METALLIC CLOSING DEVICE COMPRISING AN RFID COMPONENT AND USE THEREOF|
IT201900001537A1|2019-02-01|2020-08-01|Tapi S P A|Anti-burglary closure for containers|
DE102020133659A1|2019-12-18|2021-06-24|Datwyler Pharma Packaging Belgium Nv|Closure arrangement for a vessel with a pharmaceutical substance|
法律状态:
2015-10-26| PLFP| Fee payment|Year of fee payment: 2 |
2016-04-29| PLSC| Publication of the preliminary search report|Effective date: 20160429 |
2016-10-28| PLFP| Fee payment|Year of fee payment: 3 |
2017-10-27| PLFP| Fee payment|Year of fee payment: 4 |
2018-10-31| PLFP| Fee payment|Year of fee payment: 5 |
2019-10-29| PLFP| Fee payment|Year of fee payment: 6 |
2020-11-02| PLFP| Fee payment|Year of fee payment: 7 |
2021-10-28| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
FR1460306|2014-10-27|
FR1460306A|FR3027700B1|2014-10-27|2014-10-27|METHOD OF AUTHENTICATING THE CLOSURE ASSEMBLY OF A CONTAINER|FR1460306A| FR3027700B1|2014-10-27|2014-10-27|METHOD OF AUTHENTICATING THE CLOSURE ASSEMBLY OF A CONTAINER|
PCT/EP2015/074627| WO2016066548A1|2014-10-27|2015-10-23|Method for authentication of the closure assembly of a container|
US15/521,981| US10204296B2|2014-10-27|2015-10-23|Method for authentication of the closure assembly of a container|
EP15794834.0A| EP3213264B1|2014-10-27|2015-10-23|Method for authentication of the closure assembly of a container|
[返回顶部]