专利摘要:
The device (10) for protection to be placed on a mouth (16) of a container comprises: - a mechanical part (11) surrounding the mouthpiece, - an electronic label (15) comprising an antenna at least partially contiguous to the part mechanical, retaining an identifier and capable of modifying an electromagnetic field received by the antenna according to the identifier, - a support (14) of a first printed code (17), - the first code and the identifier being in correspondence according to a first predetermined algorithm. In embodiments, the device also comprises a support (13) of a second printed code (18) in correspondence with the first printed code, according to a second predetermined algorithm.
公开号:FR3028844A1
申请号:FR1461504
申请日:2014-11-26
公开日:2016-05-27
发明作者:Jean-Pierre Massicot;Alain Foucou
申请人:Advanced Track and Trace SA;
IPC主号:
专利说明:

[0001] TECHNICAL FIELD OF THE INVENTION The present invention relates to a method and a device for securing a container, a container carrying such a device and a method and a device for verifying the authenticity and integrity of a container thus secured. . It applies, in particular, to the traceability and authentication of bottles of wines or spirits and bottles of perfumes or liquid medicines. STATE OF THE ART The guarantee of the authenticity and integrity of the contents of a container is currently poorly secured. Labels with marks which are difficult to reproduce, for example holograms, or with insertions of threads or fibers, are known. Unfortunately, regardless of the quality of manufacture of media or brands, counterfeiters succeed in imitating or even reproducing the security elements. In addition, security features are difficult to verify by the end consumer. A simple imitation of the label or security mark is enough to abuse his confidence. OBJECT OF THE INVENTION The present invention aims to remedy all or part of these disadvantages. For this purpose, according to a first aspect, the present invention aims a protective device to be placed on a mouth of a container, which comprises: - a mechanical part surrounding the mouth of the container, 25 - an electronic tag having an antenna at less partially contiguous to the mechanical part, retaining an identifier and capable of modifying an electromagnetic field received by the antenna according to the identifier, - a support of a first printed code, - the first code and the identifier being in correspondence according to a first predetermined algorithm. Thanks to these provisions, the identifier retained by the electronic tag can be read by a simple electronic tag reader, for example a reader using one of the NFC specifications (acronym for Near Field Communication for Near Field Communication). ) or RFID (acronym for RadioFrequence 5 Identification, for radiofrequency identification). The consumer equipped with a smart phone (or smartphone) with such a reader can thus check the identifier of the electronic tag. In addition, the first printed code can be read and verified, for example by the same smart phone provided with an image sensor and a dedicated application or access to a remote server. Finally, the correspondence, according to the first algorithm, between the first printed code and the identifier retained by the electronic tag can be verified by the consumer. The container is thus protected against a copy. In embodiments, the mechanical part comprises metal and an opening, the electronic tag being superimposed on the opening of the mechanical part. Thanks to these provisions, the electromagnetic waves necessary for the operation of the device are undisturbed because of the presence of the opening of the mechanical part. These embodiments have the advantage of being compatible with caps or capsules comprising metal. In embodiments, the mechanical part has, once placed on the container, the first code printed on the side of the device that is not in contact with the container.
[0002] Thanks to these provisions, the first code is directly accessible to the consumer from outside the protected container. In embodiments, the device which is the subject of the present invention comprises a support of a second code printed in correspondence with the first printed code, according to a second predetermined algorithm.
[0003] With these provisions, the consumer, or an authenticity verification professional, can verify the authenticity of the second printed code and the correspondence of the second printed code with the first printed code. The safety of the protected container is thus reinforced.
[0004] In some embodiments, the mechanical part has, once placed on the container, the second code printed on the side of the device that is in contact with the container. Access to the second printed code is thus limited to the case where the mechanical part is detached from the protected container. In embodiments, at least one printed code is a code that is invisible in the light of day. Thanks to these provisions, the presence of a printed code can be hidden, which reduces the risks of reproduction of this printed code.
[0005] In embodiments, at least one printed code is superimposed on an electronic tag. Thanks to these provisions, the electronic tag and each code which is superimposed on it, on the container side or towards the outside of the container, are mechanically associated and, preferably, their dissociation causes the destruction of the superimposed code, or even the antenna of the electronic tag. In embodiments, the mechanical part has, once placed on the container, the electronic label superimposed on a container mouth. Thanks to these provisions, the piercing of a cap of the container causes the destruction of at least a portion of the electronic tag. It is therefore possible to detect that the plug has been pierced when the electronic tag is activated. In embodiments, the mechanical part has, once placed on the container, the electronic tag remote from each mouth of the container. Thanks to these provisions, the installation of the device does not change the closing technique of the container.
[0006] In embodiments, an antenna traverses most of the surface of the electronic tag. Thus, a piercing of the support with a piece of predetermined size (for example a cylindrical needle one millimeter in diameter) causes the deterioration of the antenna, for example its rupture. In embodiments, at least one predetermined algorithm is the match in a memory, the printed code and the identifier held by the electronic tag. In embodiments, at least one predetermined algorithm is a function of generating code printed from the identifier retained by the electronic tag or the identifier held by the electronic tag from the printed code. In embodiments, at least one predetermined algorithm is a function of jointly generating the printed code and the identifier held by the electronic tag from the same reference. Each of these types of algorithm has a high security and facilitates the verification of correspondence between the identifier and a printed code. According to a second aspect, the present invention aims a method of protecting a container, which comprises: a step of generating a first code and an identifier corresponding to each other according to a first predetermined algorithm. a step of mechanically securing a mechanical part with an electronic tag comprising an antenna, retaining said identifier and capable of modifying an electromagnetic field received by the antenna as a function of the identifier, a mechanical securing step of a support of the first printed code and the container and - a step of apposition of the mechanical part on a mouth of the container.
[0007] According to a third aspect, the present invention is directed to a device for verifying the protection of a container, which comprises: a means for reading a first code printed on a code support carried by the container; a reading means; an identifier preserved by an electronic tag 25 comprising an antenna at least partially contiguous to a mechanical part surrounding a mouth of the container, by applying an electromagnetic field to the electronic tag and - a correspondence verification means, according to a first algorithm predetermined, between the first code and the identifier kept by the electronic tag. According to a fourth aspect, the present invention is directed to a method for verifying the protection of a container, which comprises: a step of reading a first code printed on a code support carried by the container, a step of reading an identifier preserved by an electronic tag comprising an antenna at least partially contiguous to a mechanical part 5 carried by a mouth of the container, by applying an electromagnetic field to the electronic tag and - a correspondence verification step, according to a first predetermined algorithm, between the first code and the identifier kept by the electronic tag.
[0008] According to a fifth aspect, the present invention provides a container carrying a protective device object of the present invention. In embodiments, the electronic tag is at least partially glued to a mouth of the container so that the separation of the mechanical part, on the one hand, and the container, on the other, causes the destruction of the container. the electronic tag. Thus, for a fragile electronic label and placed on the container without a second printed code (or with a second printed code medium reduced in size relative to the electronic label), the removal of the metal part of the mouth of the container causes the partial destruction of the electronic tag, for example its antenna. The advantages, aims and characteristics of this method of protection, this device and this verification method and this container being similar to those of the protective device object of the present invention, they are not recalled here.
[0009] BRIEF DESCRIPTION OF THE FIGURES Other particular advantages, objects and features of the present invention will become apparent from the following nonlimiting description of at least one particular embodiment of the devices, methods and objects of the present invention, with reference to the drawings. in which: FIG. 1 is a diagrammatic sectional view of a container, a first particular embodiment of a protective device forming the subject of the present invention, FIG. 2 is a diagrammatic sectional representation of FIG. , a second particular embodiment of a protection device which is the subject of the present invention, FIG. 3 schematically and in section shows a third particular embodiment of a protection device which is the subject of the present invention, FIG. 4 represents, schematically and in section, a fourth particular embodiment of a protective device o BRIEF DESCRIPTION OF THE PREFERRED EMBODIMENTS FIG. 5 is a diagrammatic and sectional view of a fifth particular embodiment of a protective device forming the subject of the present invention. FIG. 6 is a diagrammatic sectional view of a sixth embodiment of FIG. Particular embodiment of a protection device that is the subject of the present invention, FIG. 7 schematically represents an electronic tag used in preferred embodiments of the device that is the subject of the present invention. FIGS. 8A and 8B show, in the form of FIG. a logic diagram, steps of a particular embodiment of the protection method and the verification method which is the subject of the present invention and FIG. 9 represents, in the form of a block diagram, a particular embodiment of a device for checking a container carrying a protective device object of the present invention.
[0010] DESCRIPTION OF EXAMPLES OF THE INVENTION This description is given in a non-limiting manner, each feature of an embodiment being combinable with any other feature of any other embodiment in an advantageous manner.
[0011] It is noted that the term "one" is used everywhere in the sense of "at least one". It is already noted that the figures are not to scale. Throughout the description of the embodiments illustrated in the figures, there is provided a mechanical part surrounding a mouth of a container and 3028844 7 comprising metal, on the one hand, and an opening, on the other hand, an electronic tag lying superimposed at the opening of the mechanical part. Thus, because of the presence of the opening of the mechanical part and despite the presence of metal in the mechanical part, the electromagnetic waves necessary for the operation of the device are undisturbed. These embodiments have the advantage of being compatible with the caps or capsules comprising metal and the machines for placing them on the mouths of containers. However, the present invention is not limited to mechanical parts comprising metal and having an opening facing an electronic tag, but extends, on the contrary, caps and capsules without opening and / or integrally plastic materials, for example. For convenience and because the caps or metal caps relate to preferred embodiments in the field of bottling, the mechanical parts 11, 21, 31, 41, 51 and 61 "metal parts" are nevertheless called throughout the following of the description, without this being limiting. FIG. 1 shows a protective device 10 to be placed on the mouth 16 of a container (partially shown). The device 10 comprises: a metal part 11 provided with an opening 12, an electronic label comprising an antenna 77 (see FIG. 7) at least partially contiguous to the opening 12 of the metal part 11 and retaining, in a memory 79 of an electronic component 78, an identifier, a support 14 of a first printed code 17. The metal part 11 is, in the embodiment illustrated in FIG. 1, a cap or a capsule, which is well known. for example in the field of wines and spirits. For example, the metal part comprises polypropylene, polyethylene, aluminum and / or tin. The first printed code 17 and the identifier stored by the memory 79 of the electronic tag 15 are in correspondence according to a first predetermined algorithm (see description given with reference to FIG. 8). The electronic tag 15 is, for example, RFID type (acronym for Radio Frequency Identification for radio frequency identification). The electronic tag, preferably passive, is capable of modifying an electromagnetic field received by the antenna 77 as a function of the identifier stored in the memory 79. Thus the identifier kept by the electronic tag 15 can be read by a simple electronic tag reader. The consumer equipped with a smart phone (or smartphone) having such a reader can thus check the identifier of the electronic label 15. The first printed code 17 can also be read and checked, for example by the same phone intelligent equipped with an image sensor and a dedicated application or access to a remote server. Finally, the correspondence, according to the first algorithm, between the first printed code 17 and the identifier retained by the electronic tag 15 can be verified by the consumer for example by the same smart phone equipped with an image sensor and a dedicated application or access to a remote server. The container is thus protected against a copy since a copy can be detected by a consumer equipped with a generic device or a professional 15 provided with an identifier reader and printed code dedicated to at least this authentication. In the embodiments described with reference to the figures, the metal part (11 in FIG. 1) has, once placed on the container (16), the first printed code (17) on the side of the device that is not in contact. with the container.
[0012] Thus, the first code is directly accessible to the consumer from outside the protected container. However, in other embodiments, the first printed code is accessible only after removing a protection, for example a label that is destroyed upon removal, or the side of the device that is in contact with the container. .
[0013] In the embodiments illustrated with reference to FIGS. 1, 3, 4 and 5, the device which is the subject of the present invention comprises a support (13 in FIG. 1) of a second printed code (18 in FIG. first printed code (17) according to a second predetermined algorithm (see FIG. 8). The consumer, or an authenticity verification professional, can thus verify the authenticity of the second printed code 18 and the correspondence of this second printed code 18 with the first printed code 17, according to the second predetermined algorithm. The safety of the protected container is thus reinforced.
[0014] 3028844 9 Note that check the correspondence of the second printed code 18 with the first printed code 17 can be achieved by checking the correspondence of the second printed code 18 with the identifier stored in the memory of the electronic tag 15 according to a third predetermined algorithm since this identifier 5 is in correspondence with the first printed code 17. In the embodiments illustrated in FIGS. 1, 3, 4 and 5, the metal part has, once placed on the container, the second code printed on the device side. which is in contact with the container. The second printed code is thus not directly accessible from the outside of the container and access to it involves removing the device which is the subject of the present invention from the container, generally with the destruction of at least a part of the device, for example the part metallic, even a printed code carrier or the antenna of the electronic tag. Access to the second printed code is thus limited to the case where the metal part is detached from the protected container.
[0015] In preferred embodiments, at least one printed code is a code invisible in the light of day. The presence of a printed code can be hidden, which reduces the risk of reproduction of this printed code. Techniques for reading an invisible printed code are known to those skilled in the art, for example using a fluorescent ink, an ink visible in non-visible wavelengths or a monochromatic color ink on a backdrop bearing inks. other colors which, in visible light and in the eye, simulate, by combination, this monochromatic color. In preferred embodiments, at least one printed code is, for a part, a code that is invisible in the light of day and, for the rest, a code 25 visible in the light of day. In the embodiments shown in FIGS. 1 to 6, at least one printed code is superimposed on an electronic tag, that is to say that there is an axis locally perpendicular to the support of the printed code and to the electronic tag. which goes through the printed code and the electronic tag. Thus, the electronic label and each code which is superimposed on it, on the side of the container or towards the outside of the container, are mechanically associated and, preferentially, their dissociation causes the destruction of the superimposed code, or even the antenna of the electronic tag.
[0016] However, in other embodiments (not shown), no printed code is superimposed on the electronic tag. In the embodiments illustrated in FIGS. 1 to 4, the metal part (11 in FIG. 1) has, once placed on the container, its opening (12) and the electronic label (15) superimposed on a mouthpiece (16). ) of container. Thus, the piercing of a cap of the container causes the destruction of at least a portion of the electronic tag. It can therefore be detected that the plug has been pierced when activating the electronic tag because its response to an electromagnetic excitation field is changed. In the embodiments illustrated in FIGS. 5 and 6, the metal part (51, 61) has, once placed on the container, its opening (52, 62) and the electronic tag (55, 65) remote from each mouth of container. The installation of the device does not change the closing technique of the container. The embodiments illustrated in FIGS. 5 and 6 are particularly suitable for sparkling wines and champagne because a force is applied to the head of the bottle during its bottling. The offset of the electronic tag on the side of the head prevents it from being damaged during this step. In the embodiment illustrated in FIG. 1, the electronic tag 15 is on the outer side (with respect to the container on the inside) of the opening 12 of the zo metal part 11 and the support 13 of the second printed code is on the side Inside the opening 12 of the metal part 11. The first and second codes used may be QR-codes (trademark), bar codes (one or two dimensions), Datamatrix (registered trademarks).
[0017] FIG. 2 shows a device 20 similar to the device 10 illustrated in FIG. 1 (the numerical references increased by ten corresponding to similar elements), except that the device 20 has no second printed code support. . The mouth of the container is not shown in FIG. 2. The characteristics of similar elements (whose numerals have a difference of ten) are similar. The description of these characteristics, already detailed with regard to FIG. 1, is therefore not repeated here. FIG. 3 shows a device 30 similar to the device 10 illustrated in FIG. 1 (the numerical references increased by twenty corresponding to similar elements), except that the device 30 has the supports 33 and 34 of codes printed on the electronic label 35 on the same side (the outer side, relative to the container) of the opening 32 of the metal portion 31. The mouth of the container is not shown in Figure 3. The characteristics of the similar elements (whose numerals have a difference of twenty) are similar. The description of these characteristics, already detailed with regard to FIG. 1, is therefore not repeated here. FIG. 4 shows a device 40 similar to the device 10 illustrated in FIG. 1 (the numerical references increased by thirty corresponding to similar elements), except that the device 40 has the support 43 of the second printed code 48 attached to the electronic label 45 on the same side (the inner side, relative to the container) of the opening 42 of the metal part 41. In variants of the embodiment illustrated in Figure 4 which do not have a support 43 of second printed code 48 or a support 43 of reduced dimensions compared to the electronic tag 45, the electronic tag 45 is at least partially glued to a mouth of the container. Thus the separation of the mechanical part 41, on the one hand, and the container, on the other hand, causes the destruction of the electronic tag, for example its antenna.
[0018] The mouth of the container is not shown in FIG. 4. The characteristics of similar elements (whose numerals have a difference of thirty) are similar. The description of these characteristics, already detailed with regard to FIG. 1, is therefore not repeated here. Any other combination of the respective positions of the printed code carriers, the electronic tag and the opening of the metallic portion is implemented in embodiments of the device object of the present invention, but not shown for a question. concision and therefore clarity of the present description. FIG. 5 shows a device 50 similar to the device 10 illustrated in FIG. 1 (the increased numerals of forty corresponding to similar elements), except that the device 50 has the support 54 of the first printed code 57 , the opening 52 of the metal part 51 and the electronic tag 55 remote (here on the side) of any mouth 56 of the container.
[0019] The characteristics of similar elements (whose numerals have a difference of forty) are similar. The description of these characteristics, already detailed with regard to FIG. 1, is therefore not repeated here. FIG. 6 shows a device 60 similar to the device 50 illustrated in FIG. 5 (the numerical references increased by ten corresponding to similar elements), except that the device 60 has no second printed code support. and that the electronic tag 65 is on the inner side of the opening 62 of the metal part 61. Preferably, the electronic tag 65 is fragile and, once placed on the mouth of the container with the metal part 61, less partially adhered to the mouth of the container. Thus, the removal of the metal portion 61 of the mouth of the container causes the partial destruction of the electronic tag 65, for example its antenna. The characteristics of the elements similar to those of FIG. 1 (whose numerals have a difference of fifty) are similar. The description of these characteristics, already detailed with regard to FIG. 1, is therefore not repeated here. FIG. 7 shows an electronic tag 75, in section in its main plane. The general shape, here circular, of the electronic label 75 zo corresponds to the general shape of the mouth of the container to which this electronic label 75 is intended and to the general shape of the opening of the metal part to which the antenna 77 of the electronic label 75 is superimposed. The electronic label 75 comprises: a support 76, for example a plastic material, the antenna 77, an integrated electronic circuit 78 including, itself, a memory 79 holding an identifier. The support 76 and the integrated electronic circuit 78 are well known to those skilled in the art of electronic tags.
[0020] Preferably, as shown in FIG. 7, the antenna 77 traverses most of the surface of the support 76, that is to say the surface of the support 76 where a point is at a distance greater than a predetermined distance ( for example half a millimeter) is less than half the surface of this support.
[0021] Thus, a piercing of the support 76 with a part of predetermined size (for example a cylindrical needle of a millimeter in diameter) causes the deterioration of the antenna, for example its rupture. Note that the more the support 76 is flexible, that is to say is able to deform without tearing, and resistant to piercing, and the more the antenna is fragile to deformation, the higher the protection is. Preferably, the predetermined distance is less than two millimeters and, even more preferably, one millimeter. In variants, it is not the antenna 77 which traverses the surface of the support 76 but an electrical connection controlling the operation of the integrated electronic circuit 78. The effect on the protection against a piercing of the support is then identical. FIG. 8 shows a method 100 for protecting a container and for verifying the protection of a container.
[0022] The method 100 comprises: a step 105 for generating a first code, a step 110 for generating an identifier in correspondence with the first code according to a first predetermined algorithm, a step 115 for generating a second code. code corresponding to zo the first code according to a second predetermined algorithm, - a step 120 of mechanical attachment of a metal part provided with an opening with an electronic tag retaining the identifier and capable of modifying an electromagnetic field received as a function of the identifier, - a step 125 for printing the first code on a first medium, - a step 130 for printing the second code on a second medium, - a step 135 for mechanically fastening each code carrier on the part metallic, - a step 140 of apposition of the metal part on a mouth of the container.
[0023] Preferably, for two different containers or for two different series of containers: the first printed codes are different, the second printed codes are different and / or the identifiers retained in the electronic labels are different. Preferably, each device that is the subject of the present invention has a first specific code, a second specific code and a specific specific identifier meaning that no other device has the same.
[0024] For the protection verification of a container, the method comprises: a step 150 of reading the first code printed on the code support carried by the container; a step 155 of reading the identifier preserved by the label; and a step 160 of correspondence verification, according to the first predetermined algorithm, between the first code and the identifier kept by the electronic tag. In case of correspondence between the first printed code and the identifier of the electronic tag, the verification method comprises: a step 165 for removing the metal part of the container; a step 170 for reading the second code printed on the second printed code medium; and a match verification step 175, according to the second predetermined algorithm, between the first printed code and the second printed code. Then, a step 180 of providing, for example by display, the result of the authentication is carried out. This result is positive if both matches have been verified, and negative otherwise. In embodiments, at least one predetermined algorithm is the match in a memory, the printed code and the identifier held by the electronic tag. This memory is, for example, on a secure server to which the first code and the identifier are addressed and which returns correspondence or non-correspondence information. In case of correspondence and for the embodiments implementing a second printed code, the second printed code is addressed to this server and the server returns correspondence or non-correspondence information. In embodiments, at least one predetermined algorithm is a function for generating the printed code from the identifier retained by the electronic tag or the identifier held by the electronic tag from the printed code. The correspondence check is then performed using, again, this function or its inverse function, if it exists.
[0025] In embodiments, at least one predetermined algorithm is a function of jointly generating the printed code and the identifier maintained by the electronic tag from the same reference. For example, an encryption function (or encryption) is performed with two different encryption keys. Correspondence checking is then performed using, again, this function or its inverse function, if it exists. Note that, in the case of the identifier stored in the memory of the electronic tag, its reading can be limited to a response to a query, for example by the techniques known as "challenge-response". FIG. 9 shows a device 200 for verifying the protection of a container, which comprises: a means 210 for reading a first printed code 215 on a code carrier carried by the container; reading an identifier maintained by an electronic tag 225, 20 - a means 230 for checking correspondence, according to a first predetermined algorithm, between the first code and the identifier kept by the electronic tag and - a means 235 for providing , for example display, the result of the correspondence check.
[0026] The following are some details on the electronic tags. Radio identification, most commonly referred to as radio frequency identification (RFID), is a method for remotely storing and retrieving data using markers known as "RFID tags" or "RFID tags". "RFID transponder" in English).
[0027] Radio tags are small objects, such as self-adhesive labels, which can be glued or incorporated into objects or products and even implanted in living organisms (animals, human body). The radio tags include an antenna associated with a microchip that allows them to receive and respond to radio requests sent from the transceiver. These electronic chips contain an identifier and possibly additional data.
[0028] This identification technology can be used to identify objects, such as with a barcode (this is called an electronic tag). A radio-identification system activated by an electromagnetic energy transfer consists of markers, called radio-tags or transponders (of the English transponder, contraction of the words transmitter and 10 responder) and one or more readers. A marker is composed of a chip and an antenna. Readers are active devices, radio-frequency transmitters that will activate the markers that pass in front of them by providing them with short-range energy that they need. The frequency used is variable, depending on the type of application targeted and the desired performance: 125 kHz; 134.2 kHz for the transponder load; 134.2 kHz for bit 0 and 123.2 kHz for bit 1 for transponder response in the case of FSK transmission (Texas Instruments Series 2000, registered trademarks); 13.56 MHz (ISO 14443A 1-4, ISO 14443B 1-4, ISO 15693-3 and ISO 18000-3); 915 MHz in the United States, from 865 MHz to 868 MHz in the European Union for UHF (EPCglobal and ISO 18000-6c, frequencies and powers of emission depend on the legislation in force); 2.45 GHz or 5.8 GHz (microwave).
[0029] A higher frequency has the advantage of allowing information exchange (between reader and marker) at higher rates than at low frequencies. The high speeds allow the implementation of new features within the markers (cryptography, larger memory, anti-collision). On the other hand, a lower frequency will benefit from better penetration into the material. Anti-collision is the ability for a reader to interact with a marker when more than one marker is within its range of detection. Several anti-collision algorithms are described by the standards (ISO 14443, ISO 15693 and ISO 18000). Passive RFIDs do not require any source of energy other than that provided by readers at the time of interrogation. Previously, the reading of the passive chips was limited to a distance of about ten meters, but now, thanks to the technology used in the deep-space communications systems, this distance can extend up to 200 meters. In addition to the energy for the tag, the reader sends a particular interrogation signal to which the tag responds. One of the simplest possible answers is the return of a digital identification, for example that of the 96-bit EPC-96 standard. A table or database can then be consulted for control. The marker is extremely discreet by its delicacy (sometimes that of a rhodoid leaf), its reduced size (a few millimeters), and its negligible mass. As its cost has become minimal, it is conceivable to make it disposable, although the reuse is more "ecologically correct". The marker consists of: - an antenna, - a silicon chip and 20 - a substrate and / or an encapsulation. Note also the existence of "active" and "semi-active" markers (also known as Battery-Assisted Passive Tags) that include a battery. These batteries act as passive tags at the communication level, but their battery allows them, for example, to record data during transport.These tags are used in shipments of temperature-controlled products and record the data. At regular intervals, low-frequency chips (125 to 135 kHz) are used for traceability of objects Near-field communication (NFC) is a communication technology. short-range and high-frequency wireless communication, enabling the exchange of information between devices up to a distance of 3028844 This technology is an extension of ISO / IEC 14443 standardizing proximity cards using radio-identification (RFID), which combine the interface of a smart card and a reader within a single peripheral. An NFC device is able to communicate with existing ISO / IEC 14443 hardware, with another NFC device, or with certain existing contactless infrastructures such as transit validators or merchant terminals. The NFC now equips cards used in transport, in commerce or for access to certain public services and more and more mobile terminals. In 2011, the NFC equipped indeed 50 10 million tablets or mobile phones, figure which could reach 300 million in 2013. Equipped with a screen, a keyboard and an internet connection, these NFC terminals have a strong potential for use by promoting interactions between machines, objects and a context (see Internet of Things). The main features of the NFC technology include: - communication rates: 106, 212 or 424 kbit / s (the 848 kbit / s rate is not compatible with the NFCIP-1 standard); - frequency range: 13.56 MHz; Communication distance: maximum 10 cm (no normalization to date - no high or low limit); 20 Communication mode: half-duplex or full-duplex. Standards related to NFCIP-1 NFCIP-1 (ISO / IEC 18092) defines the interface and the communication protocol between two NFC devices; ISO / IEC 14443-1 to ISO / IEC 14443-4 define communication with contactless integrated circuits; NDEF (NFC Data Exchange Format) defines the format for logical data exchange. Organizations other than ISO / IEC have also standardized NFC-based uses or techniques, such as ECMA or ETSI.
[0030] In reader mode, the mobile terminal becomes a contactless card reader (active mode) or "radio tags" (electronic tags). This mode allows you to read information by approaching your mobile in front of electronic tags.
权利要求:
Claims (18)
[0001]
REVENDICATIONS1. Device (10, 20, 30, 40, 50, 60) for protection to be placed on a mouth (16, 56) of a container, characterized in that it comprises: - a mechanical part (11, 21, 31, 41, 51, 61) surrounding the mouth of the container, an electronic tag (15, 25, 35, 45, 65, 75) comprising an antenna (77) at least partially contiguous to the mechanical part, retaining an identifier and capable of to modify an electromagnetic field received by the antenna according to the identifier, - a support (14, 24, 34, 44, 54, 64) of a first printed code (17, 27, 37, Io 47, 57 , 67), the first code and the identifier being in correspondence according to a first predetermined algorithm.
[0002]
The device (10, 20, 30, 40, 50, 60) according to claim 1, wherein the mechanical part (11, 21, 31, 41, 51, 61) comprises metal and an opening (12, 22 , 32, 42, 52, 62), the electronic tag (15, 25, 35, 45, 65, 75) being superimposed on the opening of the mechanical part.
[0003]
3. Device (10, 20, 30, 40, 50, 60) according to one of claims 1 or 2, wherein the mechanical part (11, 21, 31, 41, 51, 61) has, once asked on the container, the first code printed on the side of the device that is not in contact with the container.
[0004]
4. Device (10, 20, 30, 40, 50, 60) according to one of claims 1 to 3, which comprises a support (13, 33, 43, 53) of a second printed code (18, 38). , 48, 58) in correspondence with the first printed code, according to a second predetermined algorithm. 3028844 20
[0005]
5. Device (10, 30, 40, 50) according to claim 4, wherein the mechanical part (11, 31, 41, 51) has, once placed on the container, the second code (18, 38, 48, 58) printed on the side of the device that is in contact with the container. 5
[0006]
Device (10, 20, 30, 40, 50, 60) according to one of claims 1 to 5, wherein at least one printed code (17, 27, 37, 47, 57, 67, 18, 38, 48, 58) is a code invisible to the light of day.
[0007]
7. Device (10, 20, 30, 40, 50, 60) according to one of claims 1 to 6, wherein at least one printed code is superimposed on electronic tag.
[0008]
8. Device (10, 20, 30, 40) according to one of claims 1 to 7, wherein the mechanical part (11, 21, 31, 41) has, once placed on the container electronic tag (15 , 25, 35, 45) superimposed on a container mouth (16).
[0009]
9. Device (50, 60) according to one of claims 1 to 7, wherein the mechanical part (51, 61) has, once placed on the container, the electronic label (55, 65) away from each mouth (56) of the container. zo
[0010]
10. Device according to one of claims 1 to 9, wherein an antenna (77) traverses most of the surface of the electronic tag (75).
[0011]
11. Device according to one of claims 1 to 10, wherein at least one predetermined algorithm is the correspondence in a memory, the printed code 25 and the identifier stored by the electronic tag.
[0012]
12. Device according to one of claims 1 to 11, wherein at least one predetermined algorithm is a function of generating the code printed from the identifier kept by the electronic tag or the identifier kept by the electronic tag from the printed code. 3028844 21
[0013]
13. Device according to one of claims 1 to 12, wherein at least one predetermined algorithm is a joint generation function of the printed code and the identifier stored by the electronic tag from the same reference. 5
[0014]
14. Method (100) for protecting a container, characterized in that it comprises: a step (105, 115) for generating a first code and an identifier corresponding to each other according to a first predetermined algorithm . a step (120) of mechanical attachment of a mechanical part provided with an electronic tag comprising an antenna, retaining said identifier and capable of modifying an electromagnetic field received by the antenna according to the identifier, - a step (135) mechanical fastening of a support of the first printed code and the container and - a step (140) of apposition of the mechanical part on a mouth of the container.
[0015]
15. Device (200) for verifying protection of a container, characterized in that it comprises: - means (210) for reading a first printed code (215) on a code carrier carried by the container, means (220) for reading an identifier preserved by an electronic tag (220) comprising an antenna at least partially contiguous to a mechanical part carried by the receptacle, by applying an electromagnetic field to the electronic tag and - a means (230) correspondence check, according to a first predetermined algorithm, between the first code and the identifier kept by the electronic tag.
[0016]
16. A method (100) for verifying the protection of a container, characterized in that it comprises: a step (150) for reading a first code printed on a code support carried by the container, 3028844 a step (155) for reading an identifier preserved by an electronic tag comprising an antenna at least partially contiguous to a mechanical part carried by the receptacle, by applying an electromagnetic field to the electronic tag and a step (160) ) of correspondence verification, according to a first predetermined algorithm, between the first code and the identifier kept by the electronic tag.
[0017]
Container, which carries a protective device (10, 20, 30, 40, 50, 60) according to one of claims 113 to 13.
[0018]
The container (60) of claim 17, wherein the electronic tag (65) is at least partially adhered to a mouth of the container for separation of the mechanical portion from the container and on the other hand, causes the destruction of the electronic tag.
类似技术:
公开号 | 公开日 | 专利标题
FR3028844A1|2016-05-27|METHOD AND DEVICE FOR SECURING A CONTAINER, CONTAINER CARRYING SUCH A DEVICE AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY AND INTEGRITY OF SUCH A CONTAINER
EP2067115B1|2010-11-24|Method and system for optimized reading of a radio frequency communication transponder with the aid of a passive resonant circuit
EP1305769B1|2008-08-27|Portable electronic device comprising several contact-free integrated circuits
JP4199197B2|2008-12-17|Bottle stoppers and bottle openers
FR2891639A1|2007-04-06|Contact less identification device e.g. smart card, deactivating circuit for use in e.g. mobile phone, has control circuit selectively activating/deactivating power circuit, where power circuit is shorted with interface circuit
CN103971248B|2020-01-24|Commodity anti-counterfeiting traceability system based on two-dimensional code and RFID | radio frequency identification technology
US20130169409A1|2013-07-04|Anti-counterfeiting article and method thereof
EP3213264B1|2020-04-22|Method for authentication of the closure assembly of a container
WO2004054444A1|2004-07-01|Method for identifying and authenticating without specific reader an identifier
EP2892820A1|2015-07-15|Device for authenticating a bottle and authentication method using said device
WO2016207549A1|2016-12-29|Bottle comprising a security closure
GB2521857A|2015-07-08|UHF RFID tag for bottles wines spirits has radio tamper evident means
FR2887712A1|2006-12-29|Contactless electronic travel document`s e.g. electronic visa, radio frequency transponder reading method for e.g. banking, involves tuning resonant circuit to correspond resonant frequency to lateral band emission frequency of transponder
CN103136682A|2013-06-05|System using cover type label to achieve counterfeiting and method
CN201892956U|2011-07-06|Anti-counterfeiting mark linkage self-destroying device
KR20050100346A|2005-10-18|System for distinguishing genuineness of alcoholic liquors using mobile phone
KR20090010556U|2009-10-19|Packing structure for counterfeit prevention
FR3029323A1|2016-06-03|DEVICE AND METHOD FOR PROTECTING A CONTAINER, CONTAINING, DEVICE AND METHOD FOR VERIFYING INTEGRITY OF A CONTAINER
US20210258138A1|2021-08-19|Light-triggered transponder
US20180322812A1|2018-11-08|Smart label system
GB2493996A|2013-02-27|RFID tag interacting with metal seal of bottle producing electric field
TW202205820A|2022-02-01|Light-triggered transponder
KR102215010B1|2021-02-10|radio communication device with a detector for the opening of a package
US20220085992A1|2022-03-17|Devices, systems, and methods using microtransponders
CN207408971U|2018-05-25|A kind of anti-counterfeiting system suitable for flint glass packing container
同族专利:
公开号 | 公开日
FR3028844B1|2016-12-23|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
EP0619243A1|1993-04-08|1994-10-12|Manufacture Lyonnaise de Bouchage Société Anonyme|Anti-theft device for containers provided with a capping or an overcapping means|
US20020185544A1|2001-06-07|2002-12-12|Robert Baillod|System and method for authentication of the contents of containers|
WO2003038767A1|2001-10-31|2003-05-08|Catherine Bouthiaux|Method for product traceability and authentication|
EP1857374A1|2005-02-24|2007-11-21|Mobile Safe Data Services, SL|Bottle cap and bottle|
WO2014023919A1|2012-08-08|2014-02-13|Advanced Track & Trace|Method and device for authenticating a container cover|EP3426568A4|2016-03-11|2019-11-20|Sanford Lane|Anti-diversion, anti-counterfeiting product packaging|
EP3594857A1|2018-07-13|2020-01-15|Les Bouchages Delage|Metallised closing device comprising an rfid component and use thereof|
WO2021063093A1|2019-09-30|2021-04-08|霓检有限公司|Detection sample collection container for anti-counterfeiting|
WO2021262424A1|2020-06-24|2021-12-30|West Pharmaceutical Services, Inc.|Seal assembly configured for wireless data transmission|
法律状态:
2015-11-27| PLFP| Fee payment|Year of fee payment: 2 |
2016-05-27| PLSC| Publication of the preliminary search report|Effective date: 20160527 |
2016-10-28| PLFP| Fee payment|Year of fee payment: 3 |
2017-10-30| PLFP| Fee payment|Year of fee payment: 4 |
2018-10-30| PLFP| Fee payment|Year of fee payment: 5 |
2019-10-25| PLFP| Fee payment|Year of fee payment: 6 |
2020-11-05| PLFP| Fee payment|Year of fee payment: 7 |
2021-11-30| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
FR1461504A|FR3028844B1|2014-11-26|2014-11-26|METHOD AND DEVICE FOR SECURING A CONTAINER, CONTAINER CARRYING SUCH A DEVICE AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY AND INTEGRITY OF SUCH A CONTAINER|FR1461504A| FR3028844B1|2014-11-26|2014-11-26|METHOD AND DEVICE FOR SECURING A CONTAINER, CONTAINER CARRYING SUCH A DEVICE AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY AND INTEGRITY OF SUCH A CONTAINER|
[返回顶部]