WO2007135496A2 - Anti-tampering method applicable to data associated to products or documents, anti-tampering device thereof and kit for reading data on said device - Google Patents

Anti-tampering method applicable to data associated to products or documents, anti-tampering device thereof and kit for reading data on said device Download PDF

Info

Publication number
WO2007135496A2
WO2007135496A2 PCT/IB2007/000998 IB2007000998W WO2007135496A2 WO 2007135496 A2 WO2007135496 A2 WO 2007135496A2 IB 2007000998 W IB2007000998 W IB 2007000998W WO 2007135496 A2 WO2007135496 A2 WO 2007135496A2
Authority
WO
WIPO (PCT)
Prior art keywords
code
key
products
tampering
layer
Prior art date
Application number
PCT/IB2007/000998
Other languages
French (fr)
Other versions
WO2007135496A3 (en
Inventor
Dino Radice
Original Assignee
Centro Grafico Dg S.P.A.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Centro Grafico Dg S.P.A. filed Critical Centro Grafico Dg S.P.A.
Publication of WO2007135496A2 publication Critical patent/WO2007135496A2/en
Publication of WO2007135496A3 publication Critical patent/WO2007135496A3/en

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0291Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time
    • G09F3/0292Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time tamper indicating labels
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • G07D7/0032Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using holograms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the data on the tag can be read by a suitable RFID reader and processed according to necessity .
  • the key-code and the lock-code can be any of two alphanumeric-sequences linked to each other by the software, provided in order to generate the key-code, decode it and accordingly generate and decode the lock-code comprising the information in the form of encrypted data .
  • the verification procedure can follow, as an example, the following steps:
  • the reader's display After the reading and verification of the key- code, the reader's display will turn yellow and the message "valid key” will appear.

Abstract

An anti-tampering method applicable to data associated to products or documents comprises at least the following steps: a) generating a security secret key-code, in the form of an optically readable code, on a surface or into a multilayer chemical structure for hot/cold transfer applications; b) optically reading the key-code in order to decode it by software means and, through the same software means using encryption algorithms, generating a security secret lock-code in the form of an optically readable code, said lock-code being univocally and exclusively linked to the key-code and comprising the information about said products or documents in the form of encrypted data. The invention also comprises an anti-tampering device applicable to data associated to products or documents to be used in connection with the anti-tampering method, said device comprising a label that holds at least said key-code, said label being structured with a first part realized as an holographic structure hot/cold stamped on a receiving adhesive second part of said label, wherein said first part and second part of said label comprise a structure adapted to contain said codes and to be read by optical devices. The invention also comprises a kit for reading said data on said anti-tampering device.

Description

"Anti-tampering method applicable to data associated to products or documents, anti-tampering device thereof and kit for reading data on said device"
* * * * *
The present invention has as an object an anti- tampering method applicable to data associated to
products or documents.
The invention further relates to an anti- tampering device to be applied on products and documents, the device acting as a support for the above mentioned data. The invention also relates to a kit for reading data on said device.
The anti-tampering method and device of the invention can be usefully applied as a powerful and reliable instrument for verifying the authenticity of products and documents, in particular, but not exclusively, when these products and documents travel along the distribution chain.
Prior art systems to track and trace information, particularly through the distribution chain flow of
products and documents, are known, such as for example RFID chip technology, namely the technology that enables data to be transmitted by a mobile
device, or tag. The data on the tag can be read by a suitable RFID reader and processed according to necessity .
The data transmitted by the tag may provide identification or location information, or specifics about the tagged product, such as price, colour, date of purchase, destination, etc.
RFID technology, however, can be costly to realize and implement in many real world applications, also considering the high number of products or documents that must be tracked. The object of the present invention is therefore to meet said requirements by means of an anti- tampering method applicable to data associated to products or documents, and an anti-tampering device that allows cost effective tracking and tracing of information associated to said products and documents, in particular allowing the complete control of the distribution chain.
A further object of the invention is to offer an added level of security for protecting such data. Such objects are reached by an anti-tampering method for data relating to products or documents, an anti-tampering device and a kit for reading data on such device .
The invention is also described in the annexed claims to which reference is made. The invention is hereafter described in detail, in an exemplary and not limiting way, with reference to the attached drawings, in which:
- figure 1 shows a first embodiment of the anti- tampering device of the invention, divided in two component parts, and the final product, in which personalized data are applied to said device; and
- figure 2 shows a second embodiment of the anti- tampering device of the invention and the final product, in which personalized data are applied to said device .
According to the invention, it has been surprisingly discovered a method for tracking and tracing information, comprising the following steps: a) generating a (invisible or visible) security secret key-code, in the form of an optically readable code, on a surface or into a multilayer chemical structure for hot/cold transfer applications, such as a multilayer successively transferred on the surface; b) optical reading of the key-code in order to decode it by a software and, through the same software using encryption algorithms, generating a security secret lock-code in the form of an optically readable code (invisible o visible) on a surface, said lock-code being univocally and exclusively linked to the key-code and comprising the information in the form of encrypted data.
The key-code and the lock-code can be any of two alphanumeric-sequences linked to each other by the software, provided in order to generate the key-code, decode it and accordingly generate and decode the lock-code comprising the information in the form of encrypted data .
The key-code and the lock-code can be any kind of optically readable code configuration, i.e. any code readable by any UV, IR, and visible light reader instrument, in combination or not with an holographic grating.
Said codes are selected from the group comprising Data Matrix, Bidimensional Codes, Bar Codes, ink
printed codes .
The key-code and the lock-code can be the same type of optically readable code, or can be different.
In a preferred embodiment, at least the key-code is a Data Matrix code embedded into a multilayer chemical structure of the transfer foil, readable
using IR or UV or visible light optical readers, preferably IR readers .
The software for generating and decoding the key-
code and the lock-code comprises, according to a further preferred embodiment of the present invention, a software key to improve the level of
security.
The key-code and the lock-code are applied on different parts of the same surface, or on different surfaces physically linked to each other.
These surfaces, being represented by only one surface or more than one, are of any kind on which an optically readable code is applicable. Said surfaces are the surfaces of the product or document whose information must be tracked and traced.
Said surfaces are made of organic and/or inorganic material, metal, plastic, paper, wood, etc. The lock-code can be printed even on organic substances such as for example meat or animal's skin
with techniques such as ink-jet technique, Dye Diffusion Thermal Transfer, toner, photographic technique, wax printing (TTR) or laser etching, but the key-code (whenever it is required to be visible) should be contained on a label or similar device that has to be subsequently transferred on these materials .
According to a preferred embodiment of the present invention, the surface on which at least the key-code is applied is a label, having an opposite sticky-surface; said label after being applied on the product or document surfaces, can not be removed without destroying the key-code. In the invention, an anti-tampering device is therefore envisaged as a label that holds at least the key-code and that can be, for example, structured as follows:
Part a: holographic structure hot/cold stamped on a receiving adhesive label (part b)
1st layer: antiscratch coat (polymeric antiscratch protective layer)
2nd layer: durable coat (polymeric layer for protection against aggressive chemicals agents) 3rd layer: key-code printed with IR pigments
4th layer: embossing coat (holographically embossable polymeric layer)
5th layer: protective metallization (vacuum evaporation coating of metals such as zinc, titanium,
aluminium, copper)
6th layer: barrier coat (polymeric protective layer having barrier function)
7th layer: de-metallization process
8th layer: thermo-adhesive coating such as hot
stamping Part b: receiving structure in the form of auto- adhesive paper label
1st layer: paper support 2nd layer: pressure sensitive adhesive 3rd layer: protective silicone carrier that can be removable before application.
With reference to figure 1, said first embodiment of the anti-tampering device of the invention is shown divided in its two component parts: holographic structure and receiving structure.
The final product, in which personalized data are applied to said device, is also schematically shown.
A second structure envisaged for the label that holds at least the key-code of the invention can be, for example, the following:
Part a: - carrier support for the following polymeric layers : polyester film
1st layer: anti-tampering release (tamper evident
polymeric layer) 2nd layer: solution coat (intermediate support
polymeric layer)
3rd layer: key-code printed with IR pigments 4th layer: embossing coat (holographically
embossable polymeric layer) 5th layer: print of text, logo or other personalization with traditional printing systems.
6th layer: protective metallization (vacuum metal evaporation coating of metals such as zinc, titanium, aluminium, copper) 7th layer: barrier coat (polymeric protective layer having barrier function)
8th layer: de-metallization process
9th layer: acrylic removable adhesive
10th layer: silicone protective carrier removable before application
With reference to figure 2, said second embodiment of the anti-tampering device of the invention is shown.
The final product, in which personalized data are applied to said device, is also schematically shown.
The generation of the key-code in its optically readable form is performed by a proprietary algorithm.
Preferably, it can be a printed structure with IR pigments and inserted in the polymeric layers described before.
The generation of the lock-code in its optically readable form is performed by a proprietary algorithm.
Such lock-code is successively produced decoding the key-code, and applied with any printing system, such as traditional printing, ink jet technique, laser engraving printing, toner,
photographic technique, D2T2 (Dye Diffusion thermal transfer printing) , wax printing or laser etching.
The encrypted data, such as information about the product or document to be protected, have a typical string length of 40 characters indicating, as an example, the distributor name, the taxation level, the place & fabrication date of products, the final destination name, etc.
Preferably, these data are contained in a 7x7 mm Data Matrix.
According to a preferred embodiment of the present invention, the key-code and/or the lock-code are optically readable codes in form of Data Matrix Hologram having a stripe configuration.
In this preferred embodiment of the present
invention, flexibility of Data Matrix and security of a hologram are further combined.
According to a further preferred embodiment of the present invention, the method is based on two
Data Matrix code types, one, the key-code, fixedly embedded in the hologram and readable using optical
reading instruments, preferably IR, UV or visible light optical readers, more preferably IR wavelengths optical readers; and a second code, the lock-code generated by the software using encrypted algorithms, personalized and generated by the user in the form of ink printed optically readable code, containing also further variable encrypted data, as
information about the product/document to be protected, according to the requirements of the user. In order to read the key-code and the lock-code, both in the form of optically readable codes, optical reading instruments have to be used.
An additional combination to decode the Data
Matrix code is comprised of a hardware lock and a key to increase the level of security. The customer will be able to generate a
personalized lock-code in form of an optically readable code, preferably in the form of a Data Matrix code, by using a centralized system or in alternative several smaller decentralized systems, such as :
- ink jet printing techniques
- printing techniques
- D2T2 (Dye Diffusion Thermal Transfer Technique)
- toner laser techniques - photographic tecniques - wax printing (TTR)
- laser etching
A hardware/software key will also protect each system for the generation of security codes. According to a further preferred embodiment, an IR invisible Data Matrix is embedded in an
holographic foil .
The software will recognize the key (Data Matrix key) contained into the holographic foil and it will use it to decrypt the variable data (lock) which are printed in the form of a variable Data Matrix.
The verification software for decoding the key- code and the lock-code and reading the encrypted data is the same software generating the key-code and the lock-code.
The verification procedure can follow, as an example, the following steps:
The verification software should first verify the optically readable key-code inside the foil. A hand- held reader will read the key-code.
After the reading and verification of the key- code, the reader's display will turn yellow and the message "valid key" will appear.
After verification of the lock-code, the reader is directed towards the printed code and a trigger is depressed. The green colored "decrypted data" will appear on said reader's display and therefore it will be possible to simultaneously read the deciphered
code . The equipment required for the implementation of the project is constituted by: a foil or label application system for the generation of the key-code and lock-code in their optically readable code form - an ink jet personalization and verification system.
A further object of the present invention is a kit comprising: a hardware in which runs a software, preferably with a key pass, capable to decode the key-code and, using encryption algorithms, accordingly decoding the lock-code univocally linked with the key-code, thus allowing the reading of the encrypted data comprised in said lock-code;
an optical reading instrument, preferably with a specific wavelength.
The invention above described has the following important advantages over the prior art.
The present invention represents the most cost- effective solution for tracking and tracing information in general, allowing the complete control of the distribution chain without the use of the RFID chip technology, creating a unique and secure combination of the following features and advantages. First of all, the encrypted data protection by the use of "lock and key system" , further combined with visual holographic and/or non-holographic protection.
Other visual safety protections, such as diffractive or non diffractive protection, can be envisaged as well.
The invention, moreover, offers protection
against cloning by means, for example, of the protection level provided by hologram technology. Unauthorized data modification is advantageously prevented.
Data modification in fact requires the knowledge of the used encryption algorithms, the key-code and the lock-code used, as well as the software key. A further element of protection is given by the fact that IR invisible Data Matrix can be read only with specific readers at a precise wavelength.
From the above description, it is clear that the inventive concepts described are not limited to the application examples shown, but they can be beneficially adapted to other similar applications.
The range of applications of the invention is not limited to the examples shown in the above
description. The present invention is therefore subjected to many changes and modifications, all included in the
inventive concepts defined in the attached claims, while technical details may change according to necessity. All measures and values of parameters and physical quantities cited are to be considered as merely exemplary and not limiting in any way the invention features.

Claims

1. Anti-tampering method applicable to data
associated to products or documents, characterized in that it comprises at least the following steps : a) generating a security secret key-code, in the form of an optically readable code, on a surface or into a multilayer chemical structure for hot/cold transfer applications; b) optical reading of the key-code in order to decode it by software means and, through the same software means using encryption algorithms, generating a security secret lock-code in the form of an optically readable code, said lock-code being univocally and exclusively linked to the key-code and comprising the information about said products or
documents in the form of encrypted data.
2. Anti-tampering method applicable to data associated to products or documents according to claim 1, characterized in that said key-code and said
lock-code are constituted by alphanumeric sequences linked to each other by software means, said software
means being provided in order to generate said key- code, decode it and accordingly generate and decode the lock-code comprising the information in the form of encrypted data.
3. Anti-tampering method applicable to data associated to products or documents according to claim 2, characterized in that said key-code and said lock-code have an optically readable code configuration, readable by instruments chosen between any UV, IR, and visible light reading instrument.
4. Anti-tampering method applicable to data associated to products or documents according to claim 3, characterized in that said codes are selected from the group comprising Data Matrix, Bidimensional Codes, Bar Codes, ink printed codes.
5. Anti-tampering method applicable to data associated to products or documents according to claim 4, characterized in that said key-code and said lock-code can be the same type of optically readable code, or can be different.
6. Anti-tampering method applicable to data associated to products or documents according to claim 5, characterized in that at least said key-code is a Data Matrix code embedded into a multilayer chemical structure of the transfer foil, readable
using IR or UV or visible light optical readers, preferably IR readers .
7. Anti-tampering method applicable to data associated to products or documents according to any previous claim, characterized in that said software means for generating and decoding said key-code and said lock-code comprises software key means in order to improve the level of security.
8. Anti-tampering device applicable to data associated to products or documents to be used in connection with the anti-tampering method of previous claims, characterized in that said device comprises a label that holds at least said key-code, said label being structured with a first part realized as an holographic structure hot/cold stamped on a receiving adhesive second part of said label, wherein said first part of said label comprises:
a first polymeric antiscratch protective layer, a second polymeric layer of durable coat for protection against aggressive chemicals agents, a third layer whereupon said key-code is printed with IR pigments, a fourth holographically embossable polymeric layer, a fifth layer of protective metallization,
a sixth polymeric protective layer having barrier function,
a seventh layer obtained by a de-metallization process, an eight layer of thermo-adhesive coating, wherein said second part of the label is a receiving structure in the form of auto-adhesive paper label having: a first layer of paper support, a second layer of pressure sensitive adhesive, a third layer of protective silicone carrier removable before application.
9. Anti-tampering device applicable to data associated to products or documents to be used in connection with the anti-tampering method of claims
1-7, characterized in that said device comprises a label that holds at least said key-code, said label
having a carrier support in polyester film for • the
following layers: a first polymeric layer for anti-tampering release in form of a tamper evident polymeric layer, a second intermediate polymeric layer, a third layer having said key-code printed with
IR pigments, a holographically embossable polymeric layer,
a fifth layer made of printed text, logo or other personalization printed with traditional printing systems, a sixth layer of protective metallization, a seventh polymeric protective layer having barrier function, an eighth layer obtained by a de-metallization process, a ninth layer of acrylic removable adhesive, a tenth layer of silicone protective carrier
removable before application.
10. Anti-tampering device applicable to data associated to products or documents according to claim 8 or 9, characterized in that said key-code and said lock-code are applied on different parts of the same surface, or on different surfaces physically linked to each other, said surfaces being of any kind on which an optically readable code is applicable.
11. Anti-tampering device applicable to data associated to products or documents according to claims 8 to 10, characterized in that said surfaces are the surfaces of the product or document whose information must be tracked and traced.
12. Anti-tampering device applicable to data associated to products or documents according to
claims 8 to 11, characterized in that said surfaces are made of an organic and/or inorganic material, metal, plastic, paper, wood.
13. Anti-tampering device applicable to data associated to products or documents according to claims 8 to 12, characterized in that said lock-code can be printed on organic substances with techniques chosen from ink-jet technique, Dye Diffusion Thermal Transfer, toner, photographic technique, wax printing (TTR) or laser etching.
14. Anti-tampering device applicable to data associated to products or documents according to claims 8 to 13, characterized in that the surface to which at least the key-code is applied is a label having an opposite sticky-surface, said label, after being applied on the good or document surfaces, can not be removed without destroying the key-code.
15. Anti-tampering device applicable to data associated to products or documents according to claims 8 to 14, characterized in that said key-code, in its optically readable form, is generated by software means, printed with IR pigments and
inserted in said polymeric layers .
16. Anti-tampering device applicable to data associated to products or documents according to claims 9 to 15, characterized in that said lock-code in its optically readable form is generated by software means, and in that such lock-code is successively produced decoding the key-code, and applied with any printing system chosen between traditional printing, ink jet technique, laser engraving printing, toner, photographic technique, D2T2 (Dye Diffusion thermal transfer printing) , wax printing or laser etching.
17. Anti-tampering device applicable to data associated to products or documents according to claims 9 to 16, characterized in that said encrypted data concerning information about the product or
document to be traced and tracked may contain information such as the distributor name, the taxation level, the place and fabrication date of product, the final destination name.
18. Anti-tampering device applicable to data associated to products or documents according to
claims 9 to 17, characterized in that said encrypted data are contained in a Data Matrix, and in that said key-code and/or said lock-code are optically readable
codes in form of a Data Matrix Hologram having a stripe configuration.
19. Kit for reading data on an anti-tampering device, said data being associated to products or documents according to previous claims, characterized in that it comprises a hardware to run software means capable to decode said key-code and, use encryption algorithms, and decode said lock-code univocally linked with said key-code, in order to allow the reading of the encrypted data comprised in said lock- code, and an optical reading instrument having a specific wavelength and capable of reading said codes .
PCT/IB2007/000998 2006-05-18 2007-04-05 Anti-tampering method applicable to data associated to products or documents, anti-tampering device thereof and kit for reading data on said device WO2007135496A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IT000985A ITMI20060985A1 (en) 2006-05-18 2006-05-18 ANTI-OMNISSION METHOD APPLICABLE TO DATA ASSOCIATED WITH PRODUCTS OR DOCUMENTS, ANTI-TAMPERING DEVICE AND KIT FOR READING DATA ON THESE DEVICE
ITMI2006A000985 2006-05-18

Publications (2)

Publication Number Publication Date
WO2007135496A2 true WO2007135496A2 (en) 2007-11-29
WO2007135496A3 WO2007135496A3 (en) 2008-05-08

Family

ID=38668742

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2007/000998 WO2007135496A2 (en) 2006-05-18 2007-04-05 Anti-tampering method applicable to data associated to products or documents, anti-tampering device thereof and kit for reading data on said device

Country Status (2)

Country Link
IT (1) ITMI20060985A1 (en)
WO (1) WO2007135496A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITMI20090931A1 (en) * 2009-05-27 2010-11-28 Ct Grafico Dg S P A ANTI-COUNTERFEITING DEVICE FOR VALUE DOCUMENTS AND ITS SAFETY SUPPORT
EP2433548A1 (en) * 2010-09-27 2012-03-28 Whirlpool Corporation Physical resource dispensing and identification device for a household appliance
EP2434039A1 (en) * 2010-09-27 2012-03-28 Whirlpool Corporation Apparatus and method for determining a characteristic of a consumable
US8281621B2 (en) 2010-09-27 2012-10-09 Whirlpool Corporation Apparatus and method for determining a characteristic of a consumable
US8393548B2 (en) 2010-09-27 2013-03-12 Whirlpool Corporation Removable component for a consumable with identifying graphic
RU2680687C2 (en) * 2014-09-09 2019-02-25 Сикпа Холдинг Са Banknotes having interrelated features
EP3275685B2 (en) 2016-07-25 2023-07-19 Giesecke+Devrient Currency Technology GmbH Security paper, security element and valuable document

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0721335A (en) * 1993-07-02 1995-01-24 Dainippon Printing Co Ltd Information recording medium and reading method thereof
EP1254765A1 (en) * 2001-04-30 2002-11-06 De La Rue International Limited Improvements in substrates for security threads
US6533180B1 (en) * 1997-05-13 2003-03-18 Applied Opsec, Inc. Security label and method of use
WO2005029390A2 (en) * 2003-12-08 2005-03-31 International Barcode Corporation Method for identifying and authenticating goods using codes, barcodes and radio frequency identification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0721335A (en) * 1993-07-02 1995-01-24 Dainippon Printing Co Ltd Information recording medium and reading method thereof
US6533180B1 (en) * 1997-05-13 2003-03-18 Applied Opsec, Inc. Security label and method of use
EP1254765A1 (en) * 2001-04-30 2002-11-06 De La Rue International Limited Improvements in substrates for security threads
WO2005029390A2 (en) * 2003-12-08 2005-03-31 International Barcode Corporation Method for identifying and authenticating goods using codes, barcodes and radio frequency identification

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITMI20090931A1 (en) * 2009-05-27 2010-11-28 Ct Grafico Dg S P A ANTI-COUNTERFEITING DEVICE FOR VALUE DOCUMENTS AND ITS SAFETY SUPPORT
WO2010137049A1 (en) * 2009-05-27 2010-12-02 Centro Grafico Dg S.P.A. Anti-counterfeit device for valuable documents
EP2433548A1 (en) * 2010-09-27 2012-03-28 Whirlpool Corporation Physical resource dispensing and identification device for a household appliance
EP2434039A1 (en) * 2010-09-27 2012-03-28 Whirlpool Corporation Apparatus and method for determining a characteristic of a consumable
US8281621B2 (en) 2010-09-27 2012-10-09 Whirlpool Corporation Apparatus and method for determining a characteristic of a consumable
US8393548B2 (en) 2010-09-27 2013-03-12 Whirlpool Corporation Removable component for a consumable with identifying graphic
US8400638B2 (en) 2010-09-27 2013-03-19 Whirlpool Corporation Apparatus and method for determining a characteristic of a consumable
US8628024B2 (en) 2010-09-27 2014-01-14 Whirlpool Corporation Removable component for a consumable with identifying graphic
US8780353B2 (en) 2010-09-27 2014-07-15 Whirlpool Corporation Apparatus and method for determining a characteristic of a consumable
US8800084B2 (en) 2010-09-27 2014-08-12 Whirlpool Corporation Method for determining a characteristic of a consumable
US8967489B2 (en) 2010-09-27 2015-03-03 Whirlpool Corporation Removable component for a consumable with identifying graphic
US9035785B2 (en) 2010-09-27 2015-05-19 Whirlpool Corporation Graphic for use in determining a characteristic of a consumable
RU2680687C2 (en) * 2014-09-09 2019-02-25 Сикпа Холдинг Са Banknotes having interrelated features
EP3275685B2 (en) 2016-07-25 2023-07-19 Giesecke+Devrient Currency Technology GmbH Security paper, security element and valuable document

Also Published As

Publication number Publication date
WO2007135496A3 (en) 2008-05-08
ITMI20060985A1 (en) 2007-11-19

Similar Documents

Publication Publication Date Title
EP1472100B1 (en) Secure data protection optically variable labels and foils
WO2007135496A2 (en) Anti-tampering method applicable to data associated to products or documents, anti-tampering device thereof and kit for reading data on said device
US9666008B2 (en) Optically variable security device, and article employing same and method for verifying the authenticity of an article
CN101970244A (en) Method for producing a security feature on a flat substrate
US20140131990A1 (en) Method of processing a security item
CZ200353A3 (en) Optical structure
EP1287486A2 (en) Product verification and authentication system and method
US9053470B2 (en) Card security activation label and method
JP2010531021A (en) Security method and device for personal identification number of value card
US20150110268A1 (en) Method for coding and decoding information associated with an item
AU2018269694B2 (en) Method for authenticating an object, particularly a security element, and a security element
WO2012128659A1 (en) Method for marking an object for the purposes of identification
EP2374091A2 (en) Encrypted marking and method for securing and certifying the authenticity of a product
EP3210794B1 (en) Multi-layered polymeric article, such as an identification document
BG64427B1 (en) Method for marking and authenticating an object
KR100362350B1 (en) Optical carrier with optical label
US11869019B2 (en) System for protection against counterfeiting and forgery
GB2278098A (en) Anti-theft labels
Babu et al. Anti-counterfeiting using reflective micro structures-Based on random positioning of microstructures
US20080164322A1 (en) Laminate security feature
WO2021112143A1 (en) Method for manufacturing display body, display body, and method for verifying authenticity of display body
JP3172046U (en) Laminate security function
WO2021154777A1 (en) Methods for authenticating an item
MXPA00004948A (en) Marking product of a substrate by means of the placement of a signal optically verifiable.
Zufi Shad et al. ANTI-COUNTERFEIT TECHNOLOGIES (A PHARMACEUTICAL INDUSTRY PERSPECTIVE)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07734317

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07734317

Country of ref document: EP

Kind code of ref document: A2