[go: up one dir, main page]

WO2008081452A2 - Système et procédé d'authentification d'articles - Google Patents

Système et procédé d'authentification d'articles Download PDF

Info

Publication number
WO2008081452A2
WO2008081452A2 PCT/IL2008/000020 IL2008000020W WO2008081452A2 WO 2008081452 A2 WO2008081452 A2 WO 2008081452A2 IL 2008000020 W IL2008000020 W IL 2008000020W WO 2008081452 A2 WO2008081452 A2 WO 2008081452A2
Authority
WO
WIPO (PCT)
Prior art keywords
tag
article
authentication
data
authentication module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IL2008/000020
Other languages
English (en)
Other versions
WO2008081452A3 (fr
Inventor
Ron Gal-Ezer
Howard L. Rice
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2008081452A2 publication Critical patent/WO2008081452A2/fr
Publication of WO2008081452A3 publication Critical patent/WO2008081452A3/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • G16H10/65ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records stored on portable record carriers, e.g. on smartcards, RFID tags or CD
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/10ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
    • G16H20/13ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients delivered from dispensers

Definitions

  • Counterfeit drugs are a prime source of hazardous pharmaceutical products. Economic losses stemming from the problems associated with counterfeit drugs may reach billions of dollars every year.
  • EP 1469408 discloses a pharmaceutical tracking system comprising associating an identification code with pharmaceutical packages and activating the code using a server or database.
  • a manufacturer in communication with the database may receive confirmation that the code has been activated.
  • the present invention provides a method and system for authentication of articles.
  • the invention may be used, for example, for the authentication of pharmaceutical articles upon receipt or sale of such articles at a point of sale such as a pharmacy or other distribution locations.
  • the pharmaceutical articles may be, for example, any therapeutic or biologic device or product, such as a drug, a medical device, a vaccine, or other similar device or product.
  • the system for authentication of articles in accordance with the invention comprises a plurality of tags.
  • Each of the tags is adapted to be affixed to an article from a predetermined set of articles referred to herein as "genuine articles".
  • Each of the tags has a tag authentication module that stores data utilized in the article authentication process.
  • the article authentication system further comprises one or more tag readers. The tag readers communicate with a tag in order to execute a secure authentication procedure, as explained below.
  • the secure authentication procedure is initiated by the secure authentication procedure selecting a first message and sending the selected message from the tag reader authentication module to the tag authentication module.
  • the first message is received by the tag authentication module which sends a response message to the tag reader authentication module, where the response message is predetermined based upon the first message.
  • the tag reader authentication module receives the response message and determines whether the tag is authenticated based upon the response message.
  • the response message may include an identifier of the tag.
  • the response message may also be determined based upon an identifier of the tag or a time or date.
  • Tag data are input to the tags at one or more tag writing terminals which are typically located at the place of manufacture of the genuine article, so that data are written onto the tags and the tags affixed to the genuine articles as soon as possible after manufacture of the article.
  • the data stored on the tags is encrypted and segmented so that select authorized parties can access the segment of data to which they have authorized access, and not access other segments of data.
  • the present invention provides an article authentication system, comprising:
  • each tag adapted to be affixed to an article from a predetermined set of articles and having a tag authentication module, each tag storing access restricted data; and one or more tag readers, each tag reader comprising a tag reader authentication module; wherein, for each pair of a tag and a tag reader, the tag authentication module and the tag reader authentication module are configured to execute a secure authentication procedure.
  • the invention provides a method for article authentication , comprising:
  • each tag adapted to be affixed to an article from a predetermined set of articles and having a tag authentication module
  • each tag reader comprising a tag reader authentication module;
  • Fig. 1 shows a system for article authentication in accordance with one embodiment of the system of the invention.
  • Fig. 2 shows a method for article authentication in accordance with one embodiment of the method of the invention.
  • Fig. 1 shows a system 2 for authentication of articles in accordance with one embodiment of the invention.
  • the system 2 comprises a plurality of tags 6.
  • Each of the tags 6 is affixed to a respective article 4 from a predetermined set of articles referred to herein as "genuine articles". .
  • the genuine articles 4 may all be identical, or there may be several different types of articles.
  • Each of the tags 6 has a tag authentication module 7 that stores data utilized in the authentication process, as explained below.
  • the tag stores encrypted data some of which may be unique to the tag, and as such would identify the specific article to which the tag is attached.
  • the tag may include any one of the product expiration date, product destination information, product shipping or movement information, product batch number, batch size, information related to dosage, recommended uses, side-effects, storage recommendations, an intended distribution route, routing conditions and an intended article destination and any other information related to the product or pharmaceutical product.
  • Other optional information may include warning indications, or that the article was transported under harmful conditions.
  • the system 2 further comprises one or more user terminals 10.
  • Each terminal 10 comprises a processor 14, a tag reader 16, a user authentication unit 18, and a screen 20.
  • the terminal 10 serves to allow a user at the terminal 10 to determine whether a given article, such as a article 22 located at the terminal, is one of the genuine articles 4. If the genuine articles 4 are pharmaceutical articles, the terminals 10 may be located at different pharmacies.
  • the user Before a user can use the system 2 to determine whether the article 22 is one of the genuine articles 4, the user may be required to undergo a user authentication procedure to determine whether the user is authorized to use the system 2. .
  • the user inputs to the user authentication unit 18 a personal identifier previously stored in the database 11 of the server 8. Any method for user authentication may be used.
  • the user identifier may be a previously provided personal identification number or password that is input to the user identification unit using a keypad 24 on the user authentication 18.
  • the user may be required to swipe a previously provided magnetic or smart card 26 through a card reader 28.
  • the user authentication unit 18 may have a biometric reader, such as a fingerprint reader 30. In this case, the user will apply a finger to the fingerprint reader 30.
  • Other examples of user identifications include, a device containing a microchip, a bar code, or a personal token.
  • the user identification unit After the user identifier has been input to the user authentication unit 18, the user identification unit carries out a user authentication process in which the user identifier is compared to an identifier previously stored in a database of the authentication unit. The user identification unit determines that the user is authorized to use the system 2 if the input user identifier corresponds with an identifier previously stored in the user authentication database. Otherwise, the processor determines that the user is not authorized to use the system 2. If the user authentication procedure fails, the user may be prompted to try again by inputting again the user identifier.
  • the tag reader 16 has a tag reader authentication module 15.
  • the tag authentication module 7 of each tag 6 and the tag reader authentication module 15 are configured to communicate with each other to execute a secure authentication procedure. Communication between the tag reader authentication module and the tag authentication module may be, for example, via radio frequency signals, optical signals, or magnetic signals.
  • the secure authentication procedure is carried out using the tag reader 16 and the tag 34. If the tag 22 is one of the tags 6, and the tag has not been damaged, the secure authentication procedure will execute successfully.
  • a message confirming successful execution of the procedure may be displayed on the display 20, indicating to the user that the article 22 is one of the genuine articles 4.
  • the successfully executed secure authentication procedure may also identify which of the genuine articles is the article 22, and a message to this effect may be displayed on the display 20. If the secure authentication procedure does not execute successfully, then a message to this effect may be displayed on the display 20, thus alerting the user to the possibility that either the article 22 is not one of the genuine articles 4, or that the article 22 is one of the genuine articles 4 but has been tampered with or been damaged.
  • the secure authentication procedure is initiated by the secure authentication procedure selecting a first message from a predetermined set of messages and sending the selected message from the tag reader authentication module to the tag authentication module.
  • the first message is received by the tag authentication module which, in response, sends a response message to the tag reader authentication module, where the response message is determined based upon the first message.
  • the tag reader authentication module receives the response message and determines whether the tag is authenticated based upon the response message.
  • the response message may include an identifier of the tag.
  • the response message may also be determined based upon an identifier of the tag or a time or date.
  • Tag data are input to a tag 6 at one or more tag writing terminals 34.
  • the terminals 34 may be located, for example, at one or more manufacturing sites of the genuine articles 4, so that the tag data are input to the processor as soon as possible after manufacture of the articles 4.
  • Each terminal 34 comprises a tag writer 37, a processor 36, and a user input device such as a keyboard 38 or a computer mouse 40.
  • the tag writer 37 is any device capable of inputting code or data, which may be encrypted or unencrypted, to a tag 6.
  • the writing terminals 34 are typically located at the place and time of manufacture of the genuine article, so that data are written onto a tag 6 and the tag affixed to a genuine article 4 as soon as possible after manufacture of the article.
  • the system 2 may further comprise a server 8 having a database 11 storing data relating to any one or more of the genuine articles 4 together with data relating to the tag affixed to the genuine article.
  • the server 8 communicates with one or more of the user terminals 10 and/or the tag writing terminals 34 over a communication network indicated by the cloud 12.
  • the communication network 12 may be a wired or wireless telephone network, or a computer network such as the Internet, or a local or wide access network.
  • the server 8 may be utilized in the system 2 in any one or more ways.
  • the server 8 may be used to provide the terminal 10 with updated information relating to any one of the genuine articles.
  • the user identifier may be communicated to the processor 32 over the communication network 12, and the user authentication procedure is carried out remotely by the processor 32 instead of being carried out by the user authentication unit 18 at the terminal 10.
  • the user identification unit may transmit an identifier of the terminal 10 to the processor 32.
  • the processor 32 would then verify the input identifiers of the user and the terminal 10, and, in addition to authenticating both identifiers, verifies whether the user is authorized to use the system 2 at the specific terminal 10.
  • the result of the authentication procedure is transmitted to the processor 14, and may be displayed on the screen 20.
  • part or all of the secure authentication procedure may be carried out by the processor 32.
  • the processor 32 may search the database 11 to determine whether or not the article 22 was expected to be located at the present time at the specific terminal 10. If the article 22 was not supposed to arrive at the specific terminal 10, this would indicated that is the article 22 was diverted redirected from its intended route without the knowledge of the manufacturer.
  • Tag data written onto a tag 6 at one of the terminals 34 may also be transmitted over the communication network 12 to the server 8 and stored in the database 11. If one of the genuine articles 4 becomes stolen or damaged, this may also be transmitted over the communication network to the server 8 and stored in the memory 8.
  • the database 11 may store data indicating whether any of the genuine articles 4 have been reported to have been stolen, damaged, or tampered with.
  • the results of the tag verification procedure are transmitted over the communication network 12 to the processor 14 and may be displayed on the screen 20. If the processor 32 determines that the article 22 is one of the genuine articles 4, data contained on the tag 34 may be displayed on the screen.
  • the tags may also store unencrypted text or information (e.g., cleartext).
  • the "restricted access portion" (or “restricted access area") contained within a tag 6 is capable of storing a code ⁇ product-specific encrypted code") that is only identifiable by the processor 32.
  • the article-specific encrypted code is typically unique to the article or batch to which the article belongs.
  • the restricted access portion may contain both encrypted data and unencrypted data.
  • Each of the tags 6 is preferably attached to or embedded in a genuine article 4 or its packaging, in such a way that any removal or separation of a tag 6 from the article completely incapacitates, damages or destroys the functionality of the tag such that information may no longer be read or retrieved from the secure product tag by the card reder 16.
  • a tag 6 may include a disabling feature such that it becomes wholly or partly inoperable upon removal from its associated article or its packaging, for example, by physically rendering the tag inoperative (e.g. tearing the antenna, incorporating a fuse that is blown when the tag is rendered inoperative).
  • the tag may also be made inoperable by a user at a terminal 10 after receiving verification that the article to which the tag is affixed is a genuine article.
  • the user may electronically render the tag inoperative, for example, by activating an internal enabling switch in the tag code for the tag functionality.
  • the tag internal logic In its normal state, the tag internal logic allows the data to be read by the tag reader 16.
  • the tag internal logic irreversibly prevents data stored on the tag from being read by the tag reader 16.
  • Access restriction is one of a plurality of layers of security, and may be the topmost layer of security.
  • the restricted access may be based on an encryption-type "lock" and "key” concept, wherein only an authentic key (a user identifier previously stored in the user terminal 10) can open the virtual electronic lock within the tag.
  • an authentic key a user identifier previously stored in the user terminal 10.
  • the user must first perform the unlocking of the restricted access area with the authentication key and/or by means of an authentication procedure.
  • the authentication key may be a system-wide key, used on a system level and applicable to some or all articles and manufacturers or users.
  • the first level of the tag verification involves the ability of the user 1 to penetrate the access restricted barrier. This "penetration", or gaining access to the restricted access area, may in itself serve to prove that the tag is an authentic tag, as a tag that is not authentic will not respond to the lock and key authentication. In this manner, only an authorized user may access the restricted access portion.
  • a tag 6 may also comprise an unrestricted access portion.
  • the unrestricted access portion is a part or area of a tag 6 which is not protected by a level of access security and may contain code, data or information which is or is not encrypted. Any article-specific encrypted data contained within the unrestricted access portion would nonetheless require verification of the user for the unencryption of the data.
  • the unrestricted access portion may also contain unencrypted data, which would not require authentication of a user for retrieval thereof. Thus, the unrestricted access portion may contain both encrypted data and unencrypted data.
  • Fig. 2 shows a flow chart for a method of authenticating the given article 22 at a terminal 10 using the system of the invention, in accordance with one embodiment of this aspect of the invention.
  • Li step 50 the user identifier is input to the user identifier unit 18, and in step 51 it is determined whether the user is authenticated. If the user is not authenticated, then a "USER NOT AUTHENTICATED" message is displayed on the terminal screen 20 by the processor 14. The user is then asked whether he wishes to attempt authentication again (step 53). If the user responds in the affirmative, the process returns to step 50 with the user inputting the user identifier, otherwise the process terminates at step 54.
  • step 55 the secure authentication procedure is initiated by the tag reader authentication module 15 selecting a first message to be sent to the tag authentication module of the tag 34 affixed to the article 22.
  • the first message may be selected randomly form a predetermined set of messages, or may be selected using an algorithm which may utilize, for example, the current time or date.
  • the first message is sent by the tag reader authentication module to the tag authentication module (step 56).
  • step 57 the tag authentication module receives the first message, and in step 58 the tag authentication module determines a response message to be sent to the tag reader authentication module. Selection of the response message is based upon the first message received by.
  • step 59 the tag authentication module sends the response message to the tag reader authentication module.
  • step 60 the reader authentication module receives the response message and in step 61, the tag reader authentication module determines whether the response message is appropriate based upon the first message. If in step 61 it is determined the response message is appropriate then in step 62 a "SECURE AUTHENTICATION PROCEDURE SUCCESSFULLY EXECUTED” message is displayed on the screen 20,and the process terminates at step 63. . If in step 61 it is determined whether the response message is appropriate then in step 64 a "SECURE AUTHENTICATION PROCEDURE NOT SUCCESSFULLY EXECUTED” message is displayed on the screen 20, and the process terminates at step 65.
  • the system according to the invention may be a suitably programmed computer.
  • the invention contemplates a computer program being readable by a computer for executing the method of the invention.
  • the invention further contemplates a machine-readable memory tangibly embodying a program of instructions executable by the machine for executing the method of the invention.
  • the forms "a”, “an” and “the” as used in the specification include singular as well as plural references unless the context clearly dictates otherwise.
  • the phrase "a user terminal” includes one or more user terminals.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Epidemiology (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Medical Preparation Storing Or Oral Administration Devices (AREA)

Abstract

L'invention concerne un système et un procédé permettant d'authentifier des articles. Chaque étiquette d'une pluralité d'étiquettes adaptées pour être apposées sur un article est configurée pour communiquer avec un lecteur d'étiquettes pour effectuer une opération d'authentification sécurisée. Une authentification sécurisée réussie indique que l'article sur lequel l'étiquette est apposée est un article authentique, En cas d'échec de l'opération d'authentification, l'indication permet de savoir si l'article sur lequel l'étiquette est apposée n'est pas un article authentique ou si c'est un article authentique qui a été altéré ou détérioré. L'invention peut également servir par exemple à l'authentification d'articles pharmaceutiques.
PCT/IL2008/000020 2007-01-03 2008-01-03 Système et procédé d'authentification d'articles Ceased WO2008081452A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US87808907P 2007-01-03 2007-01-03
US60/878,089 2007-01-03

Publications (2)

Publication Number Publication Date
WO2008081452A2 true WO2008081452A2 (fr) 2008-07-10
WO2008081452A3 WO2008081452A3 (fr) 2008-09-12

Family

ID=39577243

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2008/000020 Ceased WO2008081452A2 (fr) 2007-01-03 2008-01-03 Système et procédé d'authentification d'articles

Country Status (1)

Country Link
WO (1) WO2008081452A2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014051961A3 (fr) * 2012-09-27 2014-05-08 Ebay Inc. Système et procédés permettant une entrée sécurisée d'un numéro d'identification personnel (pin)
US9083532B2 (en) 2012-03-06 2015-07-14 Ebay Inc. Physiological response PIN entry
US9390256B2 (en) 2012-03-06 2016-07-12 Paypal, Inc. System and methods for secure entry of a personal identification number (PIN)
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BRPI0408923A (pt) * 2003-04-01 2006-03-28 Mi Kyoung Park etiqueta de comunicação do tipo que dispensa contato fìsico, dispositivo portátil de leitura de etiquetas, método de provisão de informações de produto, e produto ao qual é acoplada uma etiqueta de comunicação do tipo que dispensa contato fìsico
JP4666943B2 (ja) * 2004-04-23 2011-04-06 株式会社エヌ・ティ・ティ・ドコモ Idタグ、タグリーダ、idタグセキュリティシステム及びidタグ送信復元方法
US20090293112A1 (en) * 2004-12-03 2009-11-26 Stephen James Moore On-line generation and authentication of items

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9083532B2 (en) 2012-03-06 2015-07-14 Ebay Inc. Physiological response PIN entry
US9390256B2 (en) 2012-03-06 2016-07-12 Paypal, Inc. System and methods for secure entry of a personal identification number (PIN)
US9996683B2 (en) 2012-03-06 2018-06-12 Paypal, Inc. Physiological response pin entry
US10362024B2 (en) 2012-03-06 2019-07-23 Paypal, Inc. System and methods for secure entry of a personal identification number (PIN)
WO2014051961A3 (fr) * 2012-09-27 2014-05-08 Ebay Inc. Système et procédés permettant une entrée sécurisée d'un numéro d'identification personnel (pin)
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Also Published As

Publication number Publication date
WO2008081452A3 (fr) 2008-09-12

Similar Documents

Publication Publication Date Title
KR101276902B1 (ko) Rfid 태그를 사용하여 아이템 정보를 획득하는 방법 및장치
EP2122902B1 (fr) Vérification de mouvement d'articles
US7810726B2 (en) Method and system for tracking and verifying medication
US8736424B2 (en) Systems and methods for performing secure financial transactions
CN101553829B (zh) 控制往来rfid设备的数据访问
US8224852B2 (en) Method for protecting product data from unauthorized access
CA3098597A1 (fr) Procedes et systemes de reconnaissance et d'authentification automatique d'objet
US20080001752A1 (en) System and method for securing rfid tags
US8123126B2 (en) Anti-counterfeit packaging
US20170116614A1 (en) Card payment device and card payment system
US20080214312A1 (en) Security System For Authenticating Gaming Chips
WO2013121356A2 (fr) Système d'identification de produit contrefait fondé sur la communication en champ proche (nfc)
WO2008081452A2 (fr) Système et procédé d'authentification d'articles
JP2012014592A (ja) 真贋判定システム、真贋判定方法、及び、真贋判定プログラム
US20050289083A1 (en) System and method for authenticating and validating products
US20100211488A1 (en) License enforcement
JP5075675B2 (ja) 生体認証システムおよび生体認証装置
JP2018072977A (ja) 商品の真贋判定システム
WO2007045848A1 (fr) Procédé et système destinés à authentifier des produits
WO2014134827A1 (fr) Système et procédé d'authentification
Balinsky et al. Anti-counterfeiting using memory spots
Bruera Regulating rogue pharmacies using RFID tags, 2D barcodes, and biometrics
Nilsson et al. A pharmaceutical anti-counterfeiting method using time controlled numeric tokens
CN111523906A (zh) 智能跟踪器和产品溯源系统
Koralalage et al. uCard: A Novel Privacy Friendly Radio Frequency Tag Architecture for Universal Loyalty Card

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08700253

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 08700253

Country of ref document: EP

Kind code of ref document: A2