[go: up one dir, main page]

CN1478263A - safety label - Google Patents

safety label Download PDF

Info

Publication number
CN1478263A
CN1478263A CNA018198406A CN01819840A CN1478263A CN 1478263 A CN1478263 A CN 1478263A CN A018198406 A CNA018198406 A CN A018198406A CN 01819840 A CN01819840 A CN 01819840A CN 1478263 A CN1478263 A CN 1478263A
Authority
CN
China
Prior art keywords
safety label
label
article
safety
shell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA018198406A
Other languages
Chinese (zh)
Inventor
���ա�����
菲利普·迈克尔·威廉·爱尔兰
3
戴维·阿兰·布鲁克斯
�������ϰ¡�����³�����޵¡����ﱴ
拉格兰·霍拉迪奥·安德鲁·哈罗德·特里贝
皮耶罗·阿马尼尼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
De la Rue Systems Ltd
Original Assignee
De la Rue Systems Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by De la Rue Systems Ltd filed Critical De la Rue Systems Ltd
Publication of CN1478263A publication Critical patent/CN1478263A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/149Mechanical actuation by lifting or attempted removal of hand-portable articles with electric, magnetic, capacitive switch actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1445Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Pinball Game Machines (AREA)
  • Electronic Switches (AREA)

Abstract

A security tag for securely identifying items comprises a housing (1); a securing mechanism (6) for securing the housing to the item; a monitoring system (20, 24) for monitoring a tag status, the tag status indicating at least whether the housing (1) and the securing mechanism (6) have been tampered with; a store (22) for storing item data identifying the item; and a communication system (21) for communicating tag status and item data to a remote host.

Description

安全标签safety label

技术领域technical field

本发明涉及一种用于安全标识物品的安全标签,以及使用这种标签的方法。The present invention relates to a security tag for securely identifying items, and a method of using such a tag.

背景技术Background technique

安全标签一般与商品一起使用,特别是衣服等物品,用来阻止有人擅自移动这些商品。这些标签通常安全地与物品相连,在零售商店或类似地方的出口处放置一个可以检测标签通过并发出警报的询问系统。众所周知标签还在现场提供商品或物品的安全保障,以及提供标签或商品是否被移开的指示。Security tags are generally used with merchandise, especially items such as clothing, to deter unauthorized removal of the merchandise. These tags are usually securely attached to the item, with an interrogation system placed at the exit of a retail store or similar that can detect the tag's passage and sound an alarm. Tags are also known to provide security of merchandise or items in the field, as well as to provide an indication if the tag or merchandise has been removed.

在现有技术中描述了各种安全标签系统。WO-A-00/16284描述了一种卡片,通过一个导电的系链可以将一个钥匙安全地连到此卡片上,因此当此卡片被固定到一个独立的监视系统时,就可以监测它的情况。在另一个实施例中,卡片被连到一个柔软的具有导电线的包上,卡的情况可以被检测,以此可以检测到试图强行打开包的企图。这种设备的缺点是需要与监视系统的持续连接。Various security tag systems are described in the prior art. WO-A-00/16284 describes a card to which a key can be securely attached by means of a conductive tether so that when the card is secured to an independent monitoring system its Condition. In another embodiment, the card is attached to a flexible bag with conductive threads, and the condition of the card can be detected, whereby attempts to force open the bag can be detected. The downside of this device is that it requires a constant connection to the surveillance system.

US-A-6002343披露了一种可以通过一个阻性元件附加到物体上的标签,由一个机载处理器来监视阻性元件的电阻性,如果监视到阻性元件受到危害,则将信息传送给一个独立的监测系统。这就带来了一种比上面描述的系统更加灵活的系统,但是并没有处理老练的攻击者对标签本身的攻击企图。US-A-6002343 discloses a tag that can be attached to an object via a resistive element, with an onboard processor monitoring the resistivity of the resistive element and transmitting information if the monitored resistive element is compromised Give an independent monitoring system. This results in a system that is more flexible than the one described above, but does not handle attempts by sophisticated attackers to attack the tags themselves.

US-A-5367289披露了一种商品监视标签,典型情况下此标签被连接到衣服或类似的东西上,包括一个在经受机械力的时候产生电压的压电薄层。标签包括一个报警器,如果电压超过了参考值,报警器就会报警。此设备被发展来检测从商品上撕下标签的企图,但实际上是通过监视施加在标签上的力来实现的。通过小心地保护与商品的连接,可以在不触发警报的情况下撕去标签。US-A-5367289 discloses a commodity surveillance tag, typically attached to clothing or the like, comprising a thin piezoelectric layer which generates a voltage when subjected to mechanical force. The tag includes an alarm that will go off if the voltage exceeds a reference value. This device was developed to detect attempts to tear the label off merchandise, but actually does so by monitoring the force applied to the label. By carefully securing the connection to the merchandise, the label can be removed without triggering an alarm.

GB-A-2257278描述了一种防盗标签,它包括一个微电路而使得在标签和一个主机计算机之间存在数据链路。尽管其中有关于某些形式的损害检测的简要描述,但标签的主要目的是可以定位被监视货物的位置。GB-A-2257278 describes an anti-theft tag which includes a microcircuit so that there is a data link between the tag and a host computer. Although there is a brief description of some forms of damage detection, the main purpose of the tag is to be able to locate the location of the monitored goods.

US-A-5099228公开了一种可以附到商品上的安全标签,该安全标签通过一个大头钉附到商品上并包括一个传感器来感应大头钉钉头的存在。从而可以检测到撬钉的企图。US-A-5099228 discloses a security tag that can be attached to merchandise by means of a tack and includes a sensor to sense the presence of the tack head. Attempts to pry the nail can thus be detected.

US-A-5955951公开了另一种标签/大头钉配置。US-A-5955951 discloses another tag/tack arrangement.

US-A-98/15921描述了一种使用在运输终端的安全系统,此系统包括一个电子乘客标签,标签包括一个存储器和一个无线通信设备,存储器存储了一个防盗式的乘客唯一标识码;以及一个具有有线存储器和无线通信设备的电子行李标签。以此方法,标签可以互相唯一地注册。US-A-98/15921 describes a security system for use in transport terminals, this system includes an electronic passenger tag, the tag includes a memory and a wireless communication device, the memory stores a theft-resistant unique passenger identification code; and An electronic luggage tag with wired memory and wireless communication facility. In this way, tags can be uniquely registered with each other.

US-A-6052068描述了一种车辆识别系统,包括一组附加在车辆上的,与一个询问器通信以确定车辆标识的识别标签。US-A-6052068 describes a vehicle identification system comprising a set of identification tags attached to the vehicle which communicate with an interrogator to determine the identity of the vehicle.

发明内容Contents of the invention

存在一种对这些安全标签进行改进的需求,我们已经开发出了一种新的安全标签,它同时也引出了使用这样一种安全标签的新颖方法。There exists a need for improvements to these security labels and we have developed a new security label which also introduces a novel method of using such a security label.

根据本发明的第一方面,我们提供了一种用于安全标识物品的安全标签,此安全标签包括:According to the first aspect of the present invention, we provide a security label for securely identifying items, the security label comprising:

a.一个外壳;a. a shell;

b.一种用于保护物品的外壳的安全装置;b. A security device for an enclosure protecting an item;

c.一种用于监视标签的状态的监视系统,标签状态至少指示了外壳以及安全装置是否已被损害;c. A monitoring system for monitoring the status of a tag indicating at least whether the enclosure and the safety device have been compromised;

d.一种用于存储物品数据的存储器,该物品数据用于识别物品;d. a memory for storing item data used to identify the item;

e.一种用于把标签状态和物品数据传输到远程主机的通信系统。e. A communication system for transmitting tag status and item data to a remote host.

根据本发明的第二方面,我们提供了一种安全标识及监视物品的方法,该方法包括:According to a second aspect of the present invention, we provide a method of securely identifying and monitoring items, the method comprising:

a.把根据本发明的第一方面的安全标签附加至物品,该安全标签:a. Attaching to an article a security tag according to the first aspect of the invention which:

b.将识别物品的物品数据存储在存储器中;b. storing item data identifying the item in memory;

c.通过通信系统监视来自远程主机的标签状态和/或物品数据。c. Monitoring tag status and/or item data from a remote host via the communication system.

我们已经意识到现有技术的每一个安全标签都有一个或多个缺点,并且已经发明了一种克服了这些缺点的新的安全标签。特别的,此标签包括一个机载监视系统,因此可以及时检测到损害,而不是仅当远程主机询问时;另外,监视系统并不仅仅监视标签用以保护物品的安全装置,还监视外壳本身的情况。这样,与现有技术相比,与标签相关的所有类型的损害都可以被检测到。We have realized that every security tag of the prior art has one or more disadvantages, and have invented a new security tag which overcomes these disadvantages. In particular, the tag includes an on-board surveillance system, so damage can be detected in time, not just when a remote host interrogates it; in addition, the surveillance system not only monitors the security device used by the tag to protect the item, but also monitors the casing itself. Condition. In this way, all types of damage associated with tags can be detected compared to the prior art.

另外,在物品或包裹物品的容器合适的地方,对物品或容器的损害都可以被监视。Additionally, where the item or container enclosing the item is in place, damage to the item or container may be monitored.

尽管标签可以是例如从一个主电源远程供电到一个与标签相连的GSM/卫星模块,以使远距离通信成为可能,但在优选实施例中,标签包括一个机载电源。这提供了另一个好处,由于从电源中使用的电可以被最小化,而实现了机载监视系统。另外,任何的外部连接会为试图使系统无效的任何人提供一个接入点。当在制造中被关掉后,除非用于服务或在攻击中,标签不会再被打开。全面的封装使系统可以更好的经受任何攻击,以及去除了对标签的内部元件的任何直接连接。In preferred embodiments the tag includes an on-board power supply, although the tag may be remotely powered, for example from a mains power supply to a GSM/satellite module connected to the tag to enable long distance communication. This provides another benefit, since the electricity used from the power supply can be minimized, enabling an on-board surveillance system. Additionally, any external connections would provide an access point for anyone attempting to disable the system. When switched off during manufacture, the tag will not be opened again except for service or during an attack. Comprehensive encapsulation makes the system more resilient to any attack and removes any direct connections to the tag's internal components.

在使用中,如果监视系统检测到了损害,它可以通过通信系统发起一个对远程主机的通信,典型情况下,这将包括关于标签状态的信息,也就是它正在被损害,以及用于识别该物品的物品数据。对机载监视系统的提供,使得可以在非常早的阶段检测到损害,并发送给远程主机,这样使得可以尽早采取补救措施。这使得安全标签特别适用于使用在贵重物品中,如贵重商品包括金币和纸币。In use, if the monitoring system detects tampering, it can initiate a communication to a remote host via the communication system, typically this will include information about the status of the tag, that is, it is being tampered with, and the information used to identify the item item data. The provision of an on-board surveillance system allows damage to be detected at a very early stage and sent to a remote host so that remedial action can be taken as early as possible. This makes the security tag particularly suitable for use on valuables, such as gold coins and banknotes.

对外壳情况的监视提供了对企图损害可以与远程主机通信的安全标签的一种及早指示。这还阻止了小偷对标签进行破坏以使远程主机检测不到物品正在被盗。在一个例子中,外壳可以包括一个导电部分,监视系统适于监视导电部分的电特性,因此来确定外壳的完整性。这样,例如如果某人刺破了外壳而试图破坏安全标签的内部工作,那么导电部分的电特性将会改变,如阻抗,这可以被外壳探测器检测到。Monitoring of the condition of the enclosure provides an early indication of an attempted tampering with a security tag capable of communicating with a remote host. This also prevents a thief from tampering with the tag so that the remote host does not detect that the item is being stolen. In one example, the housing may include a conductive portion, and the monitoring system is adapted to monitor the electrical characteristics of the conductive portion, thereby determining the integrity of the housing. Thus, for example, if someone punctures the housing in an attempt to disrupt the inner workings of the security tag, the electrical properties of the conductive parts will change, such as impedance, which can be detected by the housing probe.

在一个可选例子中,外壳包括压电材料,并且监视系统适合监视压电材料上的电压以确定外壳的完整性。此外,如果有人试图破坏外壳,一般情况下将引起振动,这又将引起压电材料生成一个电压。这个电压可以被监视系统检测到,因此对外壳的损害也可以被检测到。In an optional example, the housing includes piezoelectric material, and the monitoring system is adapted to monitor the voltage across the piezoelectric material to determine the integrity of the housing. Also, if someone tries to break the housing, it will typically cause vibrations, which in turn will cause the piezoelectric material to generate a voltage. This voltage can be detected by the monitoring system and therefore damage to the enclosure can also be detected.

监视系统最好包括一个物品探测器来探测物品的完整性。然而如果安全标签被附于一个安全容器,如保险箱或类似的,这可能并不是所需的。The surveillance system preferably includes an item detector to detect the integrity of the item. However, this may not be desired if the security tag is attached to a secure container, such as a safe or the like.

典型情况下,物品被装入一个导电外壳中,在此情况下,探测器适合于监视导电外壳的电特性,以确定物品的完整性。在此情况下,现金(金币和/或纸币)可以被放置在例如一个包中,导线被编织在包的织物中。那么如果试图刺破这个包来获取里面的东西,则包的传导性就被改变了。因此,这将使得安全包可以检测到任何试图从包中移出物品的企图。Typically, the item is encased in a conductive enclosure, in which case the detector is adapted to monitor the electrical characteristics of the conductive enclosure to determine the integrity of the item. In this case, cash (coins and/or banknotes) can be placed, for example, in a bag, the wires being woven into the fabric of the bag. Then if an attempt is made to pierce the bag to access the contents, the conductivity of the bag is altered. Thus, this will allow the security bag to detect any attempt to remove items from the bag.

更可取的,安全装置包括一个用于保护物品外壳的导电部件。在此情况下,监视系统包括一个适合于监视导电部件的电特性并以此来确定安全装置的完整性的装置探测器。Preferably, the security device includes a conductive member for protecting the casing of the article. In this case, the monitoring system includes a device detector adapted to monitor the electrical characteristics of the conductive components and thereby determine the integrity of the safety device.

安全装置可以包括一个压电材料。在此情况下,监视系统可以包括一个适合于监视压电材料中的电压并以此来确定安全装置的完整性的装置探测器。The safety device may include a piezoelectric material. In this case, the monitoring system may include a device detector adapted to monitor the voltage in the piezoelectric material and thereby determine the integrity of the safety device.

作为一个进一步的选择,安全装置可以包括一个细小金属线薄层,监视系统使用作用在薄层上射频电场来监视它的特征。As a further option, the security device may comprise a thin layer of fine metal wires, the characteristics of which are monitored by the monitoring system using radio frequency electric fields applied to the layer.

安全装置一般包括一个识别标记,它可以与物品的指示相联系。这使得可以提供一种附加的安全。The security device generally includes an identification mark which can be associated with an indication of the item. This makes it possible to provide an additional security.

外壳一般是用抗破损材料制成的,如强化塑料中的橡胶层压体,它非常难被破坏。但是,其它抗高强压材料也可以被使用。The housing is generally made of a breakage resistant material, such as a rubber laminate in reinforced plastic, which is very difficult to break. However, other high pressure resistant materials may also be used.

除此之外,外壳一般还包括一个金属罩以至少保护存储器,以及其它任何精密的电子元件。金属罩将作为法拉第罩来保护包含在标签中任何精密的元件避免EMP(电磁脉冲,electro magnetic pulse)攻击。In addition, the housing typically includes a metal cover to protect at least the memory, and any other delicate electronic components. The metal shield will act as a Faraday shield to protect any delicate components contained in the tag from EMP (electromagnetic pulse) attacks.

通信系统可以是大量通信系统中的任何一个,如无线电、红外、电感性或磁性通信系统。这样,例如通信系统可以包括一个蓝牙类型的无线通信系统。或者,可以提供感性线圈耦合,以使得当安全标签被带到阅读器的范围内时,可以通过感性线圈来从存储器中读取标签状态和某些数据。The communication system may be any of a number of communication systems, such as radio, infrared, inductive or magnetic communication systems. Thus, for example, the communication system may comprise a Bluetooth type wireless communication system. Alternatively, an inductive coil coupling can be provided so that when the security tag is brought within range of the reader, the tag state and certain data can be read from memory via the inductive coil.

典型情况下,通信系统适用于在将标签状态和/或物品数据传送给远程主机之前将它们进行加密,例如使用PKI加密系统。这阻止了第三方生成他们自己的标签状态和物品数据来屏蔽真正标签的标签状态。Typically, the communication system is adapted to encrypt tag status and/or item data before transmitting them to a remote host, for example using a PKI encryption system. This prevents third parties from generating their own tag states and item data to mask the true tag's tag state.

通信系统最好适用于在下面情况中的至少一个情况下与远程主机系统进行通信:The communication system is preferably adapted to communicate with a remote host system under at least one of the following conditions:

i.在预定时间间隔;i. at predetermined time intervals;

ii.根据远程主机系统的请求;ii. According to the request of the remote host system;

iii.根据标签状态的变化(指示出安全标签和/或物品被损坏了)。iii. Based on a change in tag status (indicating that the security tag and/or item is damaged).

应该明白许多其它的选择也是可用的,如允许通信系统在它每次到达一个预定的位置时与远程主机通信,或者只在上述情况(i-iii)的一种的情况下。It should be appreciated that many other options are available, such as allowing the communication system to communicate with the remote host each time it arrives at a predetermined location, or only in one of the above situations (i-iii).

便利的,因此安全标签包括一个用于探测标签位置的位置探测器,标签状态包括标签位置的指示。这使得在移动物品时可以追踪标签的位置。Conveniently, the security tag therefore includes a position detector for detecting the position of the tag, the status of the tag including an indication of the tag's position. This allows the tag's position to be tracked while the item is being moved.

目前,如果需要将物品的所有权从一方转让到另一方,则必须在实际物理上将物品从转让人处转移到受让人处。这个过程可能会冒险,特别是如果物品具有很大的价值,例如纸币。典型情况下,在这些情况下,物品被保护在一个上了锁的容器内,然后再由一个安全公司或类似的在安全的情况在转移。Currently, if ownership of an item needs to be transferred from one party to another, the item must actually be physically transferred from the transferor to the transferee. This process can be risky, especially if the item has a lot of value, such as banknotes. Typically, in these cases, items are secured in a locked container before being transferred in a secure situation by a security company or similar.

为了增加这些系统的安全性,典型情况下,安全公司使用定时锁来保证物品不会在一个预定的时间间隔内被从容器中移走。例如,可以通过对安全厢式货车中的容器以这样一种方式来加锁而实现,容器只能在一个预定的时间点上被移走,此时间点对应于司机到达目的地的时间。To increase the security of these systems, security companies typically use time locks to ensure that items are not removed from the container within a predetermined time interval. This can be achieved, for example, by locking the container in the security van in such a way that it can only be removed at a predetermined point in time, which corresponds to the time the driver arrives at the destination.

除此之外,现在还可以追踪容器和厢式货车的位置,因此可以监视容器也就是物品的当前位置。In addition to this, it is now also possible to track the location of containers and vans, so it is possible to monitor the current location of the container, that is, the item.

但是,这些系统具有这样的缺点,物品仍然可能在运输过程中被盗走。因此,例如容器可能被强行的移出厢式货车,或者厢式货车可能被盗走,然后容器在正确的时间不同的地方被移走。尽管可以追踪厢式货车中的容器的位置,仍然可能将物品从容器中移走而不会被发现,因此使得物品被盗。However, these systems have the disadvantage that items can still be stolen in transit. Thus, for example, the container may be forcibly removed from the van, or the van may be stolen and the container removed at the correct time at a different location. Although the location of the container in the van can be tracked, it is still possible for items to be removed from the container without being detected, thus allowing the item to be stolen.

根据本发明的第三方面,一种转让物品的所有权的方法包括:According to a third aspect of the present invention, a method of transferring ownership of an item includes:

a.通过附加一个安全标签到物品来安全地标识物品,安全标签具有一个用于监视标签状态的监视系统,标签状态指示了安全标签和/或物品是否被损坏;a. Securely identify items by attaching a security tag to the item, the security tag having a monitoring system for monitoring the status of the tag, which indicates whether the security tag and/or the item has been damaged;

b.远程检测监视系统的情况;b. The situation of the remote detection and monitoring system;

c.当监视系统没有指示损毁时,远程主机注册物品的所有权的改变。c. The remote host registers a change in ownership of the item when the monitoring system does not indicate damage.

本发明的第三方面可以实现:一旦物品被保护了,甚至物品没有转移物品的所有权也可以被转移。另外,物品可以在较低安全的条件下保存。The third aspect of the present invention enables the realization that once an item is secured, ownership of the item can be transferred even without transfer of the item. Alternatively, items can be kept under less secure conditions.

这样,例如店主可以将获得的钱放置在商店中一个合适的容器内,然后附加一个安全标签,如上所述。在这一点上,容器中的现金被安全地标识了。然后通过在远程主机注册一个改变,就可以将容器中的东西的所有权转让给店主的银行,或类似的。从这点上看,钱实际上已被银行拥有,然后银行应对钱负责。但是,容器在物理上还保留在同一个位置。Thus, for example, the store owner can place the earned money in a suitable container in the store and then attach a security tag, as described above. At this point, the cash in the container is securely identified. Then by registering a change with the remote host, the ownership of the contents of the container can be transferred to the store owner's bank, or similar. From this point of view, the money is actually owned by the bank, and the bank is then responsible for the money. However, the container remains physically in the same location.

如果在任何阶段物品或标签被损坏了,对此的指示将被发送给远程主机,如一个中央控制中心,它可以识别出有了一个安全问题。这为所有者提供了对物品的当前状态的完全跟踪能力,因此所有者可以确信物品正在被安全地转让了。If at any stage the item or tag is damaged, an indication of this will be sent to a remote host, such as a central control center, which can recognize that there has been a security issue. This provides the owner with full traceability of the item's current state, so the owner can be confident that the item is being safely transferred.

应该明白,一旦钱的所有权被转让了,钱就可以记入店主的银行账户,允许店主通过钱的账户进行交易,而钱仍然放在屋子里。这是因为银行可以始终知道钱的确切位置和安全性。It should be understood that once ownership of the money has been transferred, the money can be credited to the shopkeeper's bank account, allowing the shopkeeper to transact through the money's account while the money remains on the premises. This is because the bank can always know the exact location and safety of the money.

如果随后店主需要从银行得到现金,他可以简单的将钱的所有权转让回来,使得店主可以根据银行的指令,从容器中重新获得现金。因此,尽管现金被银行拥有了一段时间,但它并没有离开过商店的屋子。因此这使得物品的所有权在物品本身没有被移动的情况下被转让,反过来这又减少了安全风险。If the shopkeeper then needs to get cash from the bank, he can simply transfer the ownership of the money back, so that the shopkeeper can retrieve the cash from the container according to the bank's instructions. So while the cash was in the bank's possession for a while, it never left the store's premises. This thus allows ownership of the item to be transferred without the item itself being moved, which in turn reduces security risks.

尽管此方法可以与通常的安全标签一起使用,在这些安全标签所能获得高安全性的观点来看,它特别适合于与根据本发明第一方面的安全标签一起使用。本发明的第三方面特别适合于与昂贵的商品或文件一起使用,如纸币和金币。Although this method can be used with conventional security tags, it is particularly suitable for use with the security tag according to the first aspect of the present invention from the viewpoint of the high security attainable with these security tags. The third aspect of the invention is particularly suitable for use with expensive commodities or documents, such as banknotes and gold coins.

附图说明Description of drawings

现在将参考附图描述本发明的一个例子,附图为:An example of the invention will now be described with reference to the accompanying drawings, which are:

图1是一个根据本发明的安全标签的平面视图;Figure 1 is a plan view of a security tag according to the present invention;

图2是图1的安全标签的一个侧面图;Fig. 2 is a side view of the safety label of Fig. 1;

图3a是沿线A-A’方向的图1中安全标签的配件的一个截面图;Fig. 3 a is a sectional view of the accessories of the security tag in Fig. 1 along the line A-A' direction;

图3b是沿线B-B’方向的图3a的配件的一个截面图;Figure 3b is a cross-sectional view of the fitting of Figure 3a along the line B-B';

图4是沿线C-C’方向的安全标签的截面图;Figure 4 is a cross-sectional view of the security label along the line C-C' direction;

图5是图1中的安全标签的内部元件的一个示意图;Figure 5 is a schematic diagram of the internal components of the security tag in Figure 1;

图6是一个显示了固定到一个固体容器上的图1中的安全标签的示意图;Figure 6 is a schematic diagram showing the security label of Figure 1 secured to a solid container;

图7是一个图1中的安全标签安装到一个织物容器上的示意图;Fig. 7 is a schematic diagram of the security label in Fig. 1 installed on a fabric container;

图8图示了附着安全标签的包装好的纸币。Figure 8 illustrates a packaged note with a security label attached.

具体实施方式Detailed ways

图1和图2显示了根据本发明的安全标签。如图所示,安全标签包括一个具有一个附属的安装板2的外壳1。外壳1可以支撑一个安全设备,如全息照相或运动照相(kinegram)。在外壳1的边界的各自位置提供了四个短固件3,如铆钉或类似的,它只用于将外壳1固定于固定板4的情况中。附属于外壳1的还有一个配件5,如图所示用于接受一个附属元件或夹板6。Figures 1 and 2 show a security tag according to the invention. As shown, the security tag comprises a housing 1 with an attached mounting plate 2 . Housing 1 may support a security device such as a hologram or kinegram. Four short fasteners 3 , such as rivets or the like, are provided at respective positions on the border of the housing 1 , which are only used in the case of fixing the housing 1 to the fixing plate 4 . Also attached to the housing 1 is a fitting 5, shown for receiving an accessory element or clamping plate 6.

在图3a和图3b中对配件进行了更详细地描述。图3a显示了沿着图2所示的线A-A’的配件的截面图,而图3b显示了沿着图1中所示的B-B’的配件5的截面图。配件包括两个槽7a、7b,每一个都设计用来接受一个各自的附属元件6的臂6a、6b。每一个槽7a、7b包括一定数量的弹片,设计用来将附属元件6的臂6a、6b压在各自的槽的上表面上。弹片的形状是这样的,臂6a、6b只能沿箭头9所示的方向移动。The fittings are described in more detail in Figures 3a and 3b. Fig. 3a shows a section view of the fitting along line A-A' shown in Fig. 2, while Fig. 3b shows a section view of fitting 5 along line B-B' shown in Fig. 1 . The fitting comprises two slots 7 a , 7 b each designed to receive an arm 6 a , 6 b of a respective accessory element 6 . Each groove 7a, 7b includes a number of spring tabs designed to press the arms 6a, 6b of the accessory element 6 against the upper surface of the respective groove. The shape of the shrapnel is such that the arms 6a, 6b can only move in the direction indicated by the arrow 9 .

因此,使用中附属元件6可以以箭头9所示的方向插入到配件5中。但是,将附属元件6以相反的方向从配件5中抽出是不可能。因此,只能通过将附属元件6物理折断,然后独立地将臂6a、6b从相应的槽7a、7b中抽出,才能将附属元件6移走。从而,附属元件6可以用来将外壳固定到织物上,这些将在下面进行详细的解释。Thus, in use the accessory element 6 can be inserted into the fitting 5 in the direction indicated by the arrow 9 . However, it is not possible to withdraw the accessory element 6 from the fitting 5 in the opposite direction. Therefore, the attachment element 6 can only be removed by physically snapping off the attachment element 6 and then independently withdrawing the arms 6a, 6b from the respective slots 7a, 7b. Thereby, the attachment element 6 can be used to fix the shell to the fabric, as will be explained in detail below.

图4显示了外壳的内部的截面视图。如图所示,外壳由一个硬的、防损害的薄片层10组成,薄片层10由橡胶和高强度的增强塑料的层压结构形成,它提供了足够的抗压能力,以保护安全标签的内部元件,甚至在极端攻击情况下。Figure 4 shows a cross-sectional view of the interior of the housing. As shown, the housing is comprised of a hard, tamper-resistant foil layer 10 formed from a laminate of rubber and high strength reinforced plastic that provides sufficient compression resistance to protect the security tag. internal components, even under extreme attack conditions.

放置在外壳1中的是一个印刷电路板(PCB)11,在它上面焊接了操作标签所需的电子元件。PCB 11一般安装在一个可以吸收压力的材料(如海绵、橡胶或类似的)层12中。在这个例子中,在薄片层10中放置了一个压电薄膜13,在压电薄膜13和压力吸收材料层12之间放置了一个保护薄膜14。Placed within the housing 1 is a printed circuit board (PCB) 11 on which are soldered the electronic components required to operate the tag. The PCB 11 is generally mounted in a layer 12 of a pressure-absorbing material such as sponge, rubber or the like. In this example, a piezoelectric film 13 is placed in the foil layer 10 , and a protective film 14 is placed between the piezoelectric film 13 and the pressure absorbing material layer 12 .

在薄片层10的外部还可以提供一个导电性的外部弹性涂层,如虚线15所示。An electrically conductive outer elastomeric coating may also be provided on the outside of the foil layer 10, as indicated by dashed line 15.

最后,PCB 11的一部分还可以包含在一个金属罐16中,它作为一个法拉第罩来保护PCB上面的电子元件免受EMP攻击。应该注意,在此情况下,传感器典型地被放置在PCB 11上、金属罐16的外面,以正确运行。因此,电泳捕获设备将被连到这些外部传感器上。Finally, part of the PCB 11 can also be contained in a metal can 16, which acts as a Faraday shield to protect the electronic components on the PCB from EMP attack. It should be noted that in this case the sensor is typically placed on the PCB 11, outside the metal can 16, in order to function correctly. Therefore, electrophoretic capture devices will be attached to these external sensors.

一个显示了外壳1中的PCB 11上固定的元件的排列的示意图显示在了图5中。如图所示,安全标签典型地包括一个微处理器20、一个无线收发机21和一个通过总线23连接在一起的存储器22。与总线23相连的还有一定数量的传感器24。这些元件都是由一个机载电源27供电的。A schematic diagram showing the arrangement of components fixed on the PCB 11 in the housing 1 is shown in FIG. 5 . As shown, the security tag typically includes a microprocessor 20 , a wireless transceiver 21 and a memory 22 connected together by a bus 23 . Also connected to the bus 23 is a number of sensors 24 . These elements are all powered by an onboard power supply 27 .

在这个例子中,尽管显示了五个传感器24,但这从下面的描述中可以理解,在特定环境中将需要更多的传感器。这些传感器的每一个形成了一个传感系统,用来监视安全标签以及安全标签所附加到的物品的状态。传感器监测到的信号被传送给处理器20,处理器20适于监视信号并确定什么时候这些信号指示了安全标签和/或物品被损坏了。测量的灵敏度被设置到一个水平,此水平阻止处理器20把一般的处理确定为损坏,但是它足够低以可以在安全标签、物品或类似的被破坏之前监测到损坏。这可以以两种方法中的一种来实现:In this example, although five sensors 24 are shown, it will be understood from the description below that in certain circumstances many more sensors will be required. Each of these sensors forms a sensing system for monitoring the status of the security tag and the item to which the security tag is attached. Signals monitored by the sensors are communicated to processor 20, which is adapted to monitor the signals and determine when these signals indicate that the security tag and/or item has been damaged. The sensitivity of the measurement is set to a level which prevents the processor 20 from determining normal handling as damage, but which is low enough that damage can be detected before the security tag, item or the like is destroyed. This can be accomplished in one of two ways:

i.通过分析信号;i. By analyzing the signal;

ii.通过将信号与预定的阈值相比较。ii. By comparing the signal to a predetermined threshold.

在第一个例子中,处理器可以从神经网中形成。在此情况下,在一般的操作环境下训练神经网,以使它学会在安全标签和物品被正确处理时,应该从传感器24中获得什么信号。结果,当检测到超出了期望范围的信号时,处理器确定安全标签或者物品正在被损坏。In a first example, a processor can be formed from a neural net. In this case, the neural network is trained under common operating conditions so that it learns what signals it should get from the sensors 24 when the security tags and items are being handled correctly. As a result, the processor determines that the security tag or item is being damaged when a signal outside the desired range is detected.

在第二个例子中,对应该从每一个传感器24获得的可接受信号的范围的指示被存储在存储器22中。因此处理器20可以将获得信号与可接受信号的相应的范围相比较,并从中确定物品或安全标签是否正在被损坏。In a second example, an indication is stored in memory 22 of the range of acceptable signals that should be obtained from each sensor 24 . The processor 20 can thus compare the obtained signal to the corresponding range of acceptable signals and determine therefrom whether the item or security tag is being damaged.

当检测到任何损坏时,处理器20用于通过收发器21将信号传送给远程监视系统26,指示安全标签或物品正在被损坏,这将在下面被详细解释。When any damage is detected, the processor 20 is operative to transmit a signal via the transceiver 21 to the remote monitoring system 26 indicating that the security tag or item is being damaged, as will be explained in more detail below.

使用时,安全标签包括大量不同的安全特征,它们可以被独立或根据情况一起合并来用来。现在将参考图6和7解释安全特征。When used, security labels include a number of different security features that can be used independently or combined together as appropriate. The security features will now be explained with reference to FIGS. 6 and 7 .

图6示出了安全标签如何连接到密封容器30。如图所示,安全标签通过在表面31上放置安装板2固定在容器的主体32上。安装板2由一个有损坏记忆的双面粘性板构成以使得外壳1固定在表面31上。板的设计使得如果有人企图从表面30上移走外壳,至少板的一部分仍保留在表面30上,同时一个对应的部分仍固定在外壳1上,从而表明标签已经被去除。FIG. 6 shows how the security tag is attached to the sealed container 30 . As shown, the security tag is secured to the main body 32 of the container by placing the mounting plate 2 on the surface 31 . The mounting plate 2 consists of a double-sided adhesive plate with damage memory to secure the housing 1 to the surface 31 . The design of the plate is such that if someone attempts to remove the casing from the surface 30, at least a portion of the plate remains on the surface 30, while a corresponding portion remains fixed to the casing 1, thereby indicating that the label has been removed.

除了这些(或者可选的),所述的一个短固件3插入容器30中并固定在安装板4上,如图所示,从而在适当的位置保护安全标签。In addition to these (or alternatively), a short fastener 3 is inserted into the container 30 and secured to the mounting plate 4, as shown, to secure the security tag in place.

图7显示了将一个安全标签固定在一个织物包上的实施例。在该实施例中,织物包40使用附属元件6固定到安全标签上。附属元件6缠绕在包40的颈部,臂6a、6b插入在配件5中。臂6a和6b然后尽可能地被推至槽7a、7b从而阻止了安全标签从织物包40中移走。Figure 7 shows an embodiment of securing a security tag to a fabric bag. In this embodiment, the fabric bag 40 is secured to the security tag using the attachment element 6 . The accessory element 6 is wrapped around the neck of the bag 40 and the arms 6a, 6b are inserted in the fitting 5 . The arms 6a and 6b are then pushed as far as possible into the slots 7a, 7b thereby preventing removal of the security tag from the fabric bag 40 .

现在描述安全标签的操作。安全标签包括3类不同的传感装置,即:The operation of the security tag is now described. Security tags include 3 different types of sensing devices, namely:

i.一个外壳传感器系统,以检测外壳的完整性;i. An enclosure sensor system to detect enclosure integrity;

ii.一个附件传感器,以检测容器的附件的完整性;ii. an attachment sensor to detect the integrity of the attachment of the container;

iii.一个物品传感器,以检测包含物品的容器的完整性。iii. An item sensor to detect the integrity of the container containing the item.

以下描述上述各类传感器装置。The various types of sensor devices described above are described below.

外壳传感器Housing sensor

外壳传感器系统用于检测外壳1的完整性,以防止安全标签被损坏而破坏内部的工作。The enclosure sensor system is used to detect the integrity of the enclosure 1 to prevent the security label from being damaged to disrupt the workings inside.

在第一实施例中,外壳传感器系统由压电薄膜13和传感器24中对应的一个组成。在此情况下,传感器24是一个电流传感器,如一个电表或类似的装置,适用于检测压电薄膜13中产生的电流。In the first embodiment, the housing sensor system consists of a piezoelectric film 13 and a corresponding one of the sensors 24 . In this case, the sensor 24 is a current sensor, such as an ammeter or the like, adapted to detect the current generated in the piezoelectric film 13 .

因此,如果薄片层10变形,如因为企图压碎或刺破外壳,这将导致对应的压电薄膜13的变形,从而在薄膜中产生可由传感器24检测到的电流。Thus, if the foil layer 10 is deformed, for example by an attempt to crush or puncture the housing, this will result in a deformation of the corresponding piezoelectric membrane 13 , thereby generating an electrical current in the membrane that can be detected by the sensor 24 .

如上所述,传感器24连接至处理器20,该处理器监视其中产生的信号并确定是否存在外壳破损的指示。As mentioned above, the sensor 24 is connected to the processor 20 which monitors the signals generated therein and determines if there is an indication of housing breakage.

因此,通常在正常操作的情况下,例如外壳1在传送过程中被撞破,一定量的电流可由传感器24检测到。但是,如果检测到的电流超过一个阈值,这表明正在有人企图打开外壳,这可以由处理器检测到,并通过收发器21传送一个信号。Thus, usually in normal operating situations, for example if the housing 1 is broken during transport, a certain amount of current is detectable by the sensor 24 . However, if the detected current exceeds a threshold, which indicates that an attempt is being made to open the housing, this can be detected by the processor and a signal transmitted through the transceiver 21 .

在另一实施例中,传感器24可以用于检测弹性涂层15的导电性。通常弹性涂层具有可由传感器24测量到的导电性。这可以由以下方式实现,如构造传感器以把一个电势加在表层,然后检测流过表层的电流。标签的电磁涂层包含一种导电化合物,如石墨或是可在化合(制造)过程中加入到弹性材料中的精细颗粒组成的化合物。涂层然后可以以与带子相同的方式被监视。此时如果弹性涂层15受到破坏,如被刺破,这将改变它的导电性,这可由处理器20检测到并产生一个适当的响应。In another embodiment, sensor 24 may be used to detect the electrical conductivity of elastomeric coating 15 . Typically the elastomeric coating has a conductivity measurable by sensor 24 . This can be accomplished by, for example, constructing the sensor to apply an electrical potential to the surface and then detect the current flowing through the surface. The label's electromagnetic coating consists of a conductive compound such as graphite or a compound consisting of fine particles that can be added to the elastic material during the compounding (manufacturing) process. Coatings can then be monitored in the same manner as tapes. If at this point the elastomeric coating 15 is damaged, eg punctured, this will change its electrical conductivity, which can be detected by the processor 20 and an appropriate response will be generated.

附件传感器Attachment sensor

附件传感器可以以大量方式中的任一方式实现。Accessory sensors can be implemented in any of a number of ways.

在第一实施例中,压电薄膜(未示出)夹在安装板2和外壳1之间。因此,如果有人企图从容器的外表面上去除外壳1,将使压电薄片变形。压电薄片反过来产生一个可由电流传感器24检测到的电流。In the first embodiment, a piezoelectric film (not shown) is sandwiched between the mounting plate 2 and the housing 1 . Therefore, if one attempts to remove the casing 1 from the outer surface of the container, the piezoelectric foil will be deformed. The piezoelectric foil in turn generates an electric current which can be detected by the current sensor 24 .

另外,在正常使用中,例如由于运输过程中的移动,所产生的一定量的电流是在期望当中的。但是,如果产生的电流超过了一个阈值,将由处理器检测到然后将确定有人企图从容器30上去除安全标签。In addition, in normal use, for example due to movement during transport, a certain amount of electrical current is expected. However, if the generated current exceeds a threshold, it will be detected by the processor and an attempt to remove the security tag from the container 30 will then be determined.

在第二实施例中,压电薄膜由一个电容薄膜(未示出)代替。传感器24用于测量薄膜的电容量,这是通过将一个射频电场应用于薄膜然后测量流过薄膜的电流响应来实现的。在此情况下,电容量的任何变动都表明薄膜的性能正受到影响,这反过来表明外壳1与容器30的连接正被破坏。In a second embodiment, the piezoelectric film is replaced by a capacitive film (not shown). Sensor 24 is used to measure the capacitance of the membrane by applying a radio frequency electric field to the membrane and then measuring the response of the current flowing through the membrane. In this case, any variation in capacitance indicates that the properties of the membrane are being affected, which in turn indicates that the connection of the housing 1 to the container 30 is being compromised.

通过将安装板上的压电薄膜替换为导电薄膜或大量细线,也能得到类似的结果。在每种情况下,薄膜或线的导电性都将由合适的传感器24进行测量。Similar results can be obtained by replacing the piezoelectric film on the mounting board with a conductive film or a large number of thin wires. In each case the conductivity of the film or wire will be measured by a suitable sensor 24 .

在第三实施例中,传感器24接至一个短固件3。此时,传感器24用于监视安装板4的电特性。因此,可以操作系统使电流通过一个短固件,从而通过安装螺钉使得安装板4的导电性被监视。In a third embodiment, the sensor 24 is connected to a short piece of hardware 3 . At this time, the sensor 24 is used to monitor the electrical characteristics of the mounting board 4 . Thus, it is possible to operate the system by passing current through a short piece of hardware so that the conductivity of the mounting plate 4 is monitored through the mounting screws.

建议所述的一个短固件3形成传输线的一部分,其具有合适的终端以拥有改变所需的电容和电阻的能力。一旦被激活,标签将利用一个可变电阻或电容终端最小化VSWR,从而使得标签能够利用一个合适的传感器24确定传输线性能的变化。It is suggested that said one short piece 3 forms part of a transmission line with suitable terminations to have the ability to vary the required capacitance and resistance. Once activated, the tag will utilize a variable resistive or capacitive termination to minimize VSWR, thereby enabling the tag to determine changes in transmission line performance using an appropriate sensor 24.

在该例中,如果一个短固件3或安装板4受到破坏,使用传感器24可以检测到导电性能的变化,然后发送信号给处理器20。In this example, if a short piece of hardware 3 or mounting plate 4 is damaged, the change in conductivity can be detected using sensor 24 and then sent a signal to processor 20 .

最后,附属元件6通常由导电材料构成。传感器24连接至槽7a、7b,以检测附属元件的导电性。如果导电性的变化超过一个预定的阈值量,微处理器20将检测到从而确定附属元件正受到破坏。Finally, the accessory element 6 usually consists of an electrically conductive material. A sensor 24 is connected to the slots 7a, 7b to detect the conductivity of the accessory element. If the change in conductivity exceeds a predetermined threshold amount, microprocessor 20 will detect and thereby determine that the accessory component is being damaged.

附属元件6也可以由压电材料构成,然后被连接至一个合适的传感器24。The accessory element 6 can also consist of piezoelectric material and is then connected to a suitable sensor 24 .

物品检测Item detection

提供了检测物品是否受到了破坏的装置。此时安全标签附在一个金属容器(如图6所示)上,容器的导电性可以使用传感器24中的一个来测量。另外,导电性的变化表明容器已被打开,这可由处理器20来检测。Means are provided for detecting whether an item has been tampered with. The security tag is now attached to a metal container (as shown in FIG. 6 ) and the conductivity of the container can be measured using one of the sensors 24 . Additionally, a change in conductivity indicates that the container has been opened, which can be detected by processor 20 .

织物包40(图7)的纤维材料可以是导线交织在纤维里。这样传感器24可以通过导电附属元件6固定在纤维材料上。纤维的导电性就可以被检测到。这样如果试图撕裂纤维而从包40中获取物品,则可以由传感器20检测到。The fiber material of the fabric pack 40 (FIG. 7) may be wire interwoven into the fibers. The sensor 24 can thus be fastened to the fiber material via the electrically conductive attachment element 6 . The conductivity of the fibers can then be detected. This can be detected by the sensor 20 if an attempt is made to tear the fibers to obtain an item from the bag 40 .

采用两组独立的运行在正交方向的线可以改善这样的传感技术。每一线组的导电性可独立地利用两个传感器24测量,并使得可以检测到仅在一个方向上对包产生作用的变化。Such sensing techniques can be improved by using two independent sets of wires running in orthogonal directions. The conductivity of each set of wires can be measured independently with the two sensors 24 and makes it possible to detect changes acting on the pack in only one direction.

可选地,包含在容器30或包40中的物品可以具有固定在其上的传感装置。可以采取以下形式,如部分调谐电感电路。该电感调谐电路的第一部分由传感器24组成,而第二部分由附在容器内的物品上的合适的电子装置组成。因此,调谐电路的两部分的邻近程度将会影响到由传感器24检测到的并中继给处理器20的信号的强度。这使得处理器可以确定物品与传感器24的邻近程度,从而确定物品是否被从安全标签处移到了超过一个预定距离的地方。Optionally, the items contained in the container 30 or bag 40 may have sensing devices affixed thereto. Can take the form of, for example, a partially tuned inductive circuit. The first part of the inductance tuning circuit consists of the sensor 24, while the second part consists of suitable electronics attached to the contents of the container. Thus, the proximity of the two parts of the tuned circuit will affect the strength of the signal detected by sensor 24 and relayed to processor 20 . This allows the processor to determine the proximity of the item to the sensor 24 to determine if the item has been moved more than a predetermined distance from the security tag.

另一方面,压电薄膜可以嵌入在纸币40(图8)的包装带的包装薄膜里。带子可以是分别从纸币的长边和短边的大概中间位置延伸开的两个宽条41、42,这样单张纸币就不可能在不改变薄层的形状的情况下被拿出,这可以由类似于上述的方式(图6)通过一个薄膜的标签43的合适的传感器24来检测。可以使用相似的导电技术,安全标签可以合适地被电线连接到物品上。Alternatively, the piezoelectric film may be embedded in the wrapping film of the wrapping tape of the banknote 40 (FIG. 8). The straps can be two wide strips 41, 42 extending from approximately the middle of the long and short sides of the banknote respectively, so that it is impossible for a single banknote to be removed without changing the shape of the layer, which can Detection is by a suitable sensor 24 of a film label 43 in a manner similar to that described above (FIG. 6). Similar conductive techniques can be used, and the security tag can be suitably wired to the item.

一般操作general operation

使用中,安全标签以上述的方式或者直接固定在贵重的物品上,或者直接固定在一个容器30,或者在包含要保护的物品的包裹40上。In use, the security tag is attached in the manner described above either directly to the item of value, or directly to a container 30, or to the package 40 containing the item to be secured.

上述步骤一旦完成,安全标签所附的物品的细节被通过来自主机26的通信收发器21或另一输入设备(未示出)提供给安全标签的存储器22。这可以利用一个计算设备如PDA、掌上电脑、台式电脑或类似的,或者一个移动通信设备如WAP电话来实现,这取决于通信收发器的特性。Once the above steps are complete, details of the item to which the security tag is attached are provided to the security tag's memory 22 via the communication transceiver 21 from the host computer 26 or another input device (not shown). This can be accomplished using a computing device such as a PDA, palmtop, desktop or similar, or a mobile communication device such as a WAP phone, depending on the nature of the communication transceiver.

特别的,如果收发器是一个蓝牙微微网(Bluetooth piconet),则一个蓝牙功能的PDA、WAP电话或类似的,可以用来通过该收发器发送一系列物品给存储器22。In particular, if the transceiver is a Bluetooth piconet, then a Bluetooth-enabled PDA, WAP phone or the like can be used to send a series of items to the storage 22 via the transceiver.

也可能传送一个激励信号以向处理器20指示要监视传感器24的状态。It is also possible to transmit an activation signal to indicate to processor 20 that the status of sensor 24 is to be monitored.

如果在某一时刻一旦标签被激活,处理器20确定出来自某一传感器24的信号超出了预期的范围内,然后确定已经有对物品破坏的企图。因此,处理器20产生一个报警信号并通过收发器21传送至一个远程控制中心,如主机26或一个安全公司、警察、银行等等,他们负责钱的传送。If at some point upon activation of the tag, the processor 20 determines that the signal from a certain sensor 24 is outside the expected range, then it is determined that an attempt has been made to damage the item. Therefore, the processor 20 generates an alarm signal and transmits it through the transceiver 21 to a remote control center, such as a host computer 26 or a security company, police, bank, etc., who are responsible for the transfer of money.

报警信号由远程控制中心检测,并确定物品正受到一定方式的损坏。The alarm signal is detected by the remote control center and it is determined that the item is being damaged in some way.

除此之外,安全标签还可以发送额外的信息,如指示当前传感器正在进行的读取,从而使得远程控制中心能够确定安全标签怎么了。In addition to this, the security tag can send additional information, such as an indication of the current sensor reading that is taking place, allowing the remote control center to determine what is wrong with the security tag.

因此安全标签通常包括一个位置传感器24,它可以确定安全标签的位置。通常采用一个GPS卫星导航类型的传感器。这种类型的传感器能够精确的指示安全标签的位置,并将这个指示信息连同报警信号发送至远程控制中心。这样远程控制中心就能够在破坏发生的时刻及其它时刻确认安全标签的位置。Security tags therefore typically include a position sensor 24, which determines the position of the security tag. Usually a GPS satellite navigation type sensor is used. This type of sensor can precisely indicate the location of the security tag and send this indication information together with the alarm signal to the remote control center. This allows the remote control center to confirm the location of the security tag at the time of the breach and at other times.

作为另外的一个安全等级,处理器20可以用于周期性的发送一个状态信号给远程主机,以使远程主机确认每一传感器的当前状态。这使得远程控制中心能够自己观察系统的完整性,包括安全标签的当前位置。或者,远程主机可以轮询系统并在需要时要求传送信息。As an additional level of security, the processor 20 can be configured to periodically send a status signal to the remote host to allow the remote host to confirm the current status of each sensor. This enables the remote control center to observe the integrity of the system itself, including the current location of the safety tag. Alternatively, a remote host can poll the system and ask for information to be delivered as needed.

另外,因为与安全标签有关的物品的细节被存储在存储器22中,这使得远程主机能够确定相关物品的价值。Additionally, because details of the item associated with the security tag are stored in memory 22, this enables the remote host to determine the value of the item in question.

为了更加安全,通过收发器21从处理器20至远程主机26的信息传输,可以包括在使用传统的PKI系统传送之前,对数据进行加密。这样可以防止第三方从安全标签窃取信号,然后传送他们自己的信号来指示标签未被损害,而实际上标签正在发送报警信号。For added security, transmission of information from processor 20 to remote host 26 via transceiver 21 may include encryption of the data prior to transmission using conventional PKI systems. This prevents third parties from stealing the signal from the security tag and then transmitting their own signal to indicate that the tag has not been compromised, when in fact the tag is sending an alarm signal.

可以理解,标签可以在标识和传送中保护文件。因此,当前发明的附加特征是安全标签可以用于传送文件如现金的所有权。It will be appreciated that labels can protect documents during identification and transmission. Thus, an additional feature of the current invention is that the security tag can be used to convey ownership of documents such as cash.

在此情况下,一旦文件已经被安全的连接至标签,如放置在一个合适的容器内并将安全标签固定在容器上,用户可以以通常的方式向存储器22输入物品的细节。其所有者也可以输入一个转让码以使得容器中的文件(如纸币)的所有权转让给第三方。In this case, once the document has been securely attached to the tag, eg placed in a suitable container and the security tag secured to the container, the user may enter details of the item into memory 22 in the usual manner. Its owner can also enter a transfer code to transfer ownership of the document (eg banknotes) in the container to a third party.

一旦输入这样的一个转让码,处理器20即发送信息给远程控制中心,以对转让进行中心登记。因此,文件即被受让人有效的拥有。Upon entering such an assignment code, processor 20 sends information to the remote control center for central registration of the assignment. Therefore, the document is effectively owned by the transferee.

因此,文件可以放在当前的物理位置,因为知道它们在没有受让人授权关闭安全标签的情况下,不会被损坏或破坏。如果需要,物品可以在以后被传送至其它物理位置。As a result, files can be placed in their current physical location, knowing that they will not be damaged or destroyed without the transferee's authorization to close the security tab. Items can later be transported to other physical locations if desired.

例如一个店主希望在银行存钱。因此,店主会将现金装在一个合适的包里,向存储器22输入其价值,然后转让现金的所有权给银行,上述步骤采用前面所述的技术。现金实际上可以放在店里,因为从安全标签可以知道这个位置。在以后现金可以采用物理的方式发送到银行。For example, a shopkeeper wishes to deposit money in a bank. Thus, the shop owner would pack the cash in a suitable bag, enter its value into memory 22, and then transfer ownership of the cash to the bank, using the techniques described above. The cash can actually be left in the store because the location is known from the security tag. Cash can be physically sent to the bank at a later date.

可选的,如果现金发送前商店因为某些原因如支付供应商需要现金,银行可以转让回现金的所有权。然后店主可以正确的解除安全标签,使用从没有离开过商店的现金。尽管这样,这些现金实际上已经在店主的银行账户中存储了一定时间,使得店主可以使用实际上放在店中的现金进行交易。Optionally, if the store needs the cash for some reason such as paying a supplier before the cash is sent, the bank can transfer back the ownership of the cash. The store owner can then properly remove the security tag, using cash that never left the store. Despite this, the cash has actually been stored in the store owner's bank account for a certain period of time, allowing the store owner to make transactions using cash that is actually in the store.

Claims (27)

1. safety label that is used for the secure ID article, this safety label comprises:
A. shell;
B. safety feature that is used to protect the shell of article;
C. surveillance that is used for the state of monitoring label, whether tag state has indicated shell and safety feature to be compromised at least;
D. one kind is used for the stores memory of data, and this product data is used for identify objects;
E. communication system that is used for tag state and product data are transferred to distance host.
2. safety label as claimed in claim 1, also comprise one be installed on the shell or shell in power supply.
3. safety label as claimed in claim 1 or 2, described shell comprises at least one current-carrying part, described surveillance is used to monitor the electrical characteristics of described current-carrying part, thereby determines the integrality of shell.
4. as arbitrary described safety label in the claim 1 to 3, described shell comprises piezoelectric, and described surveillance is used to monitor the voltage that passes described piezoelectric, thereby determines the integrality of shell.
5. as arbitrary described safety label in the claim 1 to 4; described safety feature comprises a conductive component, is used to protect the shell of article, and described surveillance comprises a device detector; be used to monitor the electrical characteristics of described conductive component, thereby determine the integrality of described safety feature.
6. as arbitrary described safety label in the claim 1 to 5, described safety feature comprises a piezoelectric, described surveillance comprises a device detector, is used to monitor the voltage that passes described piezoelectric, thereby determines the integrality of described safety feature.
7. as arbitrary described safety label in the claim 1 to 6, described safety feature comprises a clamp member, this clamp member has two arms, can be pushed into the mounting hole that is installed in the correspondence on the shell, comprises that also a locking system removes from the mounting portion to stop described clamp member.
8. as arbitrary described safety label in the claim 1 to 6, described safety feature comprises an electric conductor part, as a flat board, described shell is connected with this flat board, and the part of article or the container of placing article are sandwiched in the middle of them, and described electric conductor part has formed the part of the transmission line that impedance can be monitored.
9. as arbitrary described safety label in the claim 1 to 8, described shell is made of the breakage-proof material such as rubber laminate and reinforced plastics.
10. as arbitrary described safety label in the claim 1 to 9, described shell comprises that a faraday cage is to protect described storer at least.
11. as arbitrary described safety label in the claim 1 to 10, that described communication system comprises is wireless, one of infrared ray, inductive or magnetic communication system.
12. as arbitrary described safety label in the claim 1 to 11, described communication system is used for before safe condition and/or product data are transferred to distance host it being encrypted.
13. as arbitrary described safety label in the claim 1 to 12, described communication system is used for communicating with distance host under a kind of situation below at least:
I. at interval at preset time;
Ii. according to the request of remote host system; Or
Iii. according to the variation of tag state, this variation shows that safety label and/or article are damaged.
14. as arbitrary described safety label in the claim 1 to 13, described surveillance comprises a position sensor, is used to survey the position of label, tag state comprises the indication of label position.
15. as arbitrary described safety label in the claim 1 to 14, described surveillance comprises an item detector, is used for the integrality of detecting article.
16. safety label as claimed in claim 15, this safety label are fixed on the conductive jacket, described item detector is used to monitor the electrical characteristics of described conductive jacket, thereby determines the integrality of this overcoat.
17. the method for secure ID and monitored item, this method comprises:
A. the safety label according to any one claim of front is attached on the article;
B. the product data with identify objects is stored in the storer;
C. by tag state and/or the product data of communication system supervision from distance host.
18. method as claimed in claim 17, wherein step (a) is further comprising the steps of:
I. place article in a safety container;
Ii. connect described safety label to described safety container.
19. method as claimed in claim 18, described surveillance is used to monitor the electrical characteristics of described safety container, and this method comprises that also the described surveillance of electrical connection is to described safety container.
20. as the arbitrary described method of claim 17 to 19, monitoring wherein that step from the tag state of distance host and/or product data also comprises impels described communication system and remote host system to communicate under a kind of situation below at least:
I. at interval at preset time;
Ii. according to the request of remote host system; Or
Iii. according to the variation of tag state, this variation shows that safety label and/or article have been damaged.
21. as the arbitrary described method of claim 17 to 20, this method further comprises the position that monitors safety label.
22. a proprietorial method of transferring the possession of article comprises:
A. identify article by additional safety label safely to article, described safety label has a surveillance that is used for the monitoring label state, and whether tag state has indicated safety label and/or article to be damaged;
B. the situation of remote detection surveillance; And
C. when surveillance is not indicated damage, make the change of distance host registration article proprietary.
23. method as claimed in claim 22 is not carried out physical transfer at the described article of step (c) between the owner.
24. as claim 22 or 23 described methods, described safety label promptly is according to the arbitrary described safety label of claim 1 to 16.
25. as the arbitrary described method of claim 22 to 24, described article comprise valuables, as bank note and/or coin.
26. method as claimed in claim 25 is placed in the appended container of safety label described safety of goods.
27. method as claimed in claim 25, described safety label is attached in the external packing of a pile bank note.
CNA018198406A 2000-12-01 2001-11-29 safety label Pending CN1478263A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0029392.8A GB0029392D0 (en) 2000-12-01 2000-12-01 Security tag
GB0029392.8 2000-12-01

Publications (1)

Publication Number Publication Date
CN1478263A true CN1478263A (en) 2004-02-25

Family

ID=9904299

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA018198406A Pending CN1478263A (en) 2000-12-01 2001-11-29 safety label

Country Status (8)

Country Link
EP (1) EP1337985B1 (en)
JP (1) JP2004515016A (en)
CN (1) CN1478263A (en)
AT (1) ATE336054T1 (en)
AU (1) AU2002217260A1 (en)
DE (1) DE60122202T2 (en)
GB (1) GB0029392D0 (en)
WO (1) WO2002045042A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1787002B (en) * 2004-12-06 2010-05-05 国际商业机器公司 Product information protecting method and system
CN102542197A (en) * 2011-12-05 2012-07-04 深圳市莱克科技有限公司 Sensitive data protection system
WO2013017047A1 (en) * 2011-07-29 2013-02-07 Sensormatic Electronics, LLC Magnetically releasable security tag
CN107749141A (en) * 2017-10-27 2018-03-02 思创医惠科技股份有限公司 The anti-theft tag and method of article in a kind of monitoring case
CN107784766A (en) * 2016-08-29 2018-03-09 启迪市场有限公司 Flexible anti-theft system based on multiple sensors and application thereof
CN110021128A (en) * 2017-12-02 2019-07-16 波音公司 Wireless tamper evident device

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7102522B2 (en) 2002-12-24 2006-09-05 3M Innovative Properties Company Tamper-indicating radio frequency identification antenna and sticker, a radio frequency identification antenna, and methods of using the same
US6816125B2 (en) 2003-03-01 2004-11-09 3M Innovative Properties Company Forming electromagnetic communication circuit components using densified metal powder
JP4699709B2 (en) * 2004-04-28 2011-06-15 アートウエルド株式会社 IC tag manufacturing method
FI20070285A0 (en) * 2007-04-13 2007-04-13 Ponsec Finland Oy Procedure and system for calculating a cash register
KR100974408B1 (en) 2008-02-04 2010-08-05 한국남동발전 주식회사 Tag binding device
ITMI20111465A1 (en) * 2011-08-01 2013-02-02 Total Prot Service Srl ANTI-THEFT DEVICE FOR OBJECTS EXPOSED.
WO2013091077A1 (en) * 2011-12-21 2013-06-27 Otodata Wireless Network Inc. Method and system for estimating a position of a target using a plurality of smartphones
WO2021007861A1 (en) * 2019-07-18 2021-01-21 宁波讯强电子科技有限公司 Anti illegal recording apparatus and system for communication device having photographing function
CN111539048B (en) * 2020-05-07 2023-12-29 深圳市旭锦鹏程科技有限公司 USB flash disk anti-theft device for electronic commerce data encryption

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5367289A (en) * 1991-11-27 1994-11-22 Sensormatic Electronics Corporation Alarm tag for an electronic article surveillance system
US5650770A (en) * 1994-10-27 1997-07-22 Schlager; Dan Self-locating remote monitoring systems
IL119509A (en) * 1996-10-28 2000-02-17 Hi G Tek Ltd Electronic tag
US5955951A (en) * 1998-04-24 1999-09-21 Sensormatic Electronics Corporation Combined article surveillance and product identification system
WO2000016284A1 (en) * 1998-09-11 2000-03-23 Key-Trak, Inc. Tamper detection and prevention for an object control and tracking system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1787002B (en) * 2004-12-06 2010-05-05 国际商业机器公司 Product information protecting method and system
WO2013017047A1 (en) * 2011-07-29 2013-02-07 Sensormatic Electronics, LLC Magnetically releasable security tag
CN102542197A (en) * 2011-12-05 2012-07-04 深圳市莱克科技有限公司 Sensitive data protection system
CN107784766A (en) * 2016-08-29 2018-03-09 启迪市场有限公司 Flexible anti-theft system based on multiple sensors and application thereof
CN107784766B (en) * 2016-08-29 2020-02-07 启迪市场有限公司 Flexible anti-theft system, safe traveling bag and anti-invasion clothes based on multiple sensors
CN107749141A (en) * 2017-10-27 2018-03-02 思创医惠科技股份有限公司 The anti-theft tag and method of article in a kind of monitoring case
CN110021128A (en) * 2017-12-02 2019-07-16 波音公司 Wireless tamper evident device

Also Published As

Publication number Publication date
WO2002045042A1 (en) 2002-06-06
EP1337985B1 (en) 2006-08-09
AU2002217260A1 (en) 2002-06-11
DE60122202D1 (en) 2006-09-21
EP1337985A1 (en) 2003-08-27
GB0029392D0 (en) 2001-01-17
JP2004515016A (en) 2004-05-20
DE60122202T2 (en) 2006-12-14
ATE336054T1 (en) 2006-09-15

Similar Documents

Publication Publication Date Title
US7015814B2 (en) Security tag
US7256692B2 (en) Anti-tamper apparatus
CN1478263A (en) safety label
US6262664B1 (en) Tamper detection prevention for an object control and tracking system
JP4874956B2 (en) Smart card for electronic passport, electronic passport, and method, system and apparatus for authenticating a person possessing a smart card or electronic passport
US10109221B2 (en) Tamper-proof electronic bolt-seal
US20060049948A1 (en) Anti-counterfeit sealing cap with identification capability
US20170061746A1 (en) Docking device, transaction processing system, and notification method
JP2006519737A (en) Tamper-evident packaging
EP3249634B1 (en) Tamper detection device
WO2008079556A2 (en) A tamper-indicating radio frequency identification tag and methods of indicating tampering of a radio frequency identification tag
JP2013506063A (en) Remote activation lock system and method
CN108368710B (en) Security system with tamper-resistant sensors and cybersecurity
KR20060036442A (en) Rfid device with changeable characteristics
CN107690662B (en) Seals and methods for testing products for tampering
US8624739B2 (en) Electronic article surveillance system including low-cost EAS tag
JP2003168090A (en) Composite tag, composite tag label, composite tag transfer sheet, article with composite tag, and element for composite tag
US20190097302A1 (en) Patch antenna layer for tamper event detection
JP4096841B2 (en) Non-contact data communication system, reader / writer device, non-contact identification tag, reader / writer device control program, and non-contact identification tag control program
US10565839B1 (en) Security medallion
US20130283606A1 (en) Making storage system having environmentally-modifiable conductor
KR100946332B1 (en) Information tag incorporating RFID tag and anti-theft label and its manufacturing method
WO2025173040A2 (en) Tamper evident container and method of manufacturing thereof
US8739399B2 (en) Making electronic storage system having code circuit
US20130284810A1 (en) Electronic storage system with code circuit

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication