WO2012128724A1 - Inherent disorder-based tags having a removable identification feature - Google Patents
Inherent disorder-based tags having a removable identification feature Download PDFInfo
- Publication number
- WO2012128724A1 WO2012128724A1 PCT/SG2012/000101 SG2012000101W WO2012128724A1 WO 2012128724 A1 WO2012128724 A1 WO 2012128724A1 SG 2012000101 W SG2012000101 W SG 2012000101W WO 2012128724 A1 WO2012128724 A1 WO 2012128724A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tag
- specific
- inherent disorder
- feature
- inherent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
- G06K19/14—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/80—Recognising image objects characterised by unique random patterns
Definitions
- Embodiments of the invention relate to the field of tags that include authentication and identification features based on inherent disorder.
- Identification features such as barcodes, optical characters, Radio Frequency Identification (RFID), magnetic or optical stripes, and other means of identifying or authenticating objects have been used for purposes of identification, authentication, and tracking and tracing.
- RFID Radio Frequency Identification
- An "inherent disorder”-based feature is a feature based on a disordered material, wherein the structure of the disorder is used to identify or authenticate the object.
- the disordered material may be a part of the object itself, or may be part of a tag that is affixed to the object or its packaging. Further, the disordered material may include a disordered coating, composite, or structure.
- a "fingerprint" for each such tag may be read and stored in a database, typically at the time that the tag is manufactured (though later reading and storing, such as at the time that a tag is applied to an object is also possible).
- Storing information in the database typically involves use of a database index number or identifier (sometimes referred to as a "primary key"), which may be uniquely associated with the tag, and marked on the tag using a barcode or other conventional identification means.
- the tag is looked up in the database using the index number, and authenticated using the inherent disorder feature.
- the tag is authenticated if there is a close match between the inherent disorder feature as read from the tag, and the inherent disorder feature as stored in the database under the tag's index number. Note that this match typically need not be perfect. For examples differences in the reader or the reading conditions between when the tag was entered in the. database and when the tag is read may lead to differences in the data that are read from the inherent disorder features of the tag. Because of these differences, the data of the inherent disorder feature itself may be difficult to use as a database index, and a second, conventional identification feature, such as a barcode number may be used to provide the database index for the tag.
- a method of associating a database index with an authentication tag includes reading an object-specific ID from an object to which the tag is to be attached, and reading a tag- specific ID from the tag.
- a database storing data relating to an inherent disorder feature of the tag sufficient to authenticate the tag is instructed to allow the data associated with the tag-specific ID (which was used as a database index to access the data) to be accessed using the object-specific ID as an index.
- the tag-specific ID may be removed from the tag, and the tag may be attached to the object.
- removing the tag-specific ID from the tag includes removing a removable portion of the tag on which the tag-specific ID is disposed.
- the removable portion includes a barcode that encodes the tag- specific ID.
- removing the removable portion is accomplished by peeling the tag away from a backing, (also known as the "liner") leaving excess material on which the tag-specific ID is disposed. In some embodiments, removing the removable portion is accomplished by peeling a backing off of the tag, wherein the tag-specific ID is disposed on the backing. In some embodiments, removing the removable portion is accomplished by removing a tear-off portion of the tag, wherein the tag-specific ID is disposed on the tear-off portion. In some embodiments the tag may be punched out, for example as part of a heat-stamping process, leaving the tag-specific ID behind. In some embodiments, the tag-specific ID may be discarded and/or destroyed.
- Some embodiments of the invention also provide a method for enrolling data relating to an authentication tag in a database, for example during a manufacturing process of the tag.
- the method includes enrolling data relating to an inherent disorder feature of the authentication tag in a database, the data sufficient to use the inherent disorder feature to authenticate the tag.
- the method also includes associating a tag- specific ID with the authentication tag, the tag-specific ID usable as a database index to access the data, relating to the inherent disorder feature of the authentication tag in the database, and removably recording the tag-specific ID on a portion of the tag.
- removably recording the tag-specific ID includes printing a barcode on a removable portion of the tag. In some embodiments removably recording the tag-specific ID includes recording the tag-specific ID on an excess portion of the tag that remains when the tag is peeled away from a backing. In some embodiments removably recording the tag-specific ID includes recording the tag-specific ID on a backing portion of the tag that is removed when the tag is attached to an object. In some such embodiments, the tag-specific ID is recorded on a back surface of the backing portion of the tag. In some embodiments, removably recording the tag-specific ID includes recording the tag-specific ID on a tear-away portion of the tag.
- Some embodiments of the invention provide a tag for use in authentication applications.
- the tag includes an inherent disorder feature disposed on a first portion of the tag, the inherent disorder feature usable to authenticate the tag.
- the tag also includes a tag-specific ID disposed on a second portion of the tag, the tag-specific ID usable as a database index to access data relating to the inherent disorder feature in a database to authenticate the tag.
- the second portion of the tag is removable, such that the tag-specific ID is removed from the tag when the tag is affixed to an object.
- the tag-specific ID is recorded as a barcode.
- This barcode may use any barcode symbology, including linear or one-dimensional barcode symbolizes, or two-dimensional barcode symbologies.
- the inherent disorder feature includes an inherent disorder feature based on magnetic particles.
- the inherent disorder feature may include an inherent disorder feature based on the three-dimensional layout of bubbles in a transparent polymer. It will be understood that other inherent disorder features may also be used.
- the second portion of the tag, on which the tag-specific ID is disposed is an excess portion that is left after the tag is removed from its backing.
- the second portion of the tag is a backing portion that is separated from the tag when the tag is affixed to an object.
- the tag- specific ID is disposed on a back surface of this backing portion.
- the second portion of the tag is a tear-away portion that is configured to be separated from the tag.
- Some embodiments of the invention provide a method of adding authentication data relating to an inherent-disorder feature to an object-specific tag.
- the method which is generally used with local authentication, includes determining an object-specific ID for an object to which the tag is to be attached, reading a tag-specific ID from the tag, the tag-specific ID including authentication data sufficient to authenticate an inherent disorder feature of the tag, producing an object-specific tag including the object-specific ID and the authentication data, removing the tag-specific ID from the tag that includes the inherent disorder feature, and attaching the object-specific tag and the inherent disorder feature to the object.
- reading a tag-specific ID includes decrypting the authentication data.
- producing an object-specific tag includes encrypting the authentication data.
- the object-specific tag is produced (for example, by printing) on a non-removable portion of a tag that includes the inherent disorder feature.
- Some embodiments of the invention provide a method of producing a tag including an inherent disorder-based authentication feature. The method includes reading an inherent disorder feature on a tag to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag, and removably recording a tag- specific ID on the tag, the tag-specific ID including the authentication data. In some embodiments, removably recording the tag-specific ID on the tag includes encrypting the authentication data.
- FIGs. 1A and IB show top and perspective views, respectively, of magnetic particles used in a tag to be read as an inherent disorder feature in accordance with an embodiment of the invention
- FIGs. 2A and 2B show further example tags with identification features that can be read in accordance with an embodiment of the invention
- FIG. 3 shows an overall view of an anti-counterfeit system utilizing a reading device that reads inherent disorder features
- FIGs. 4A and 4B show a method of applying a tag to an object so that an identifier associated with the tag is replaced with an identifier associated with the object, in accordance with an embodiment of the invention
- FIG. 5 shows an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention
- FIGs. 6A and 6B show a front and back view, respectively, of another example of an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention
- FIG. 7 shows a further example of an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention.
- FIGs. 8A and 8B show an additional method in accordance with an embodiment of the invention for use with tags for local authentication.
- Tags based on inherent disorder provide strong authentication capabilities, since such tags are extremely difficult to counterfeit, and the likelihood of any two such tags returning the same reading are extremely low. Because such tags are based on inherent disorder, rather than on a predictable pattern, it is generally necessary to store a known authentic reading for such tags in a database, so that the known reading can be looked up later from a trustworthy source when the tag is later used for authentication. Alternatively, information relating to an inherent disorder feature can be stored on a second identification feature, such as a barcode, that is associated with a tag. By reading this information, the inherent disorder feature may be authenticated without going back to a database.
- a second identification feature such as a barcode
- readings of such inherent disorder-based tags may be consistent enough to permit authentication with a high degree of certainty when a reading from a known tag is compared with its entry in a trusted database
- the readings may not be consistent enough to permit the tag to be authenticated without also knowing the index number of the tag in the database. That is, the readings may not be consistent enough in practical terms to permit the inherent disorder tag itself, or data computed from a reading of the inherent disorder tag (e.g., by computing a hash based on a numerical representation of particular features read from the tag) to be used as a unique database index to look up the information on the tag.
- a second identification feature such as a barcode or other ordered identification feature (i.e., an identification feature into which pre-determined information, such as a database index number, can be written) with the tag.
- a barcode or other ordered identification feature i.e., an identification feature into which pre-determined information, such as a database index number, can be written
- the ordered identification feature is visible (or in some cases, even if it is not)
- the tag will include two barcodes - one object- specific barcode, and one tag-specific barcode.
- a tag including an inherent disorder feature and a removable barcode or other "ordered" secondary identification is provided.
- removing the barcode or other secondary identification feature from the tag there is no longer a conflict with information printed or otherwise disposed on an identification feature associated with the object.
- this can be done by updating the database index, so that it uses an object- specific identifier as the key to access the information on the inherent disorder feature.
- a second reason for using a removable identification feature in association with inherent disorder-based tags arises from the desire to read the disordered feature on a production line controlled by the manufacturer of the tag, while still being able to print product information "on-the-fly" at the brand-owner's production line (such information may include batch number, serial number and manufacturing date which may be impractical to preprint on a label) and/or to store encrypted information within the second identification feature which allows the inherent disorder-based feature to be authenticated without going back to a database.
- product information may include batch number, serial number and manufacturing date which may be impractical to preprint on a label
- An example of this arises when a system is required that can achieve local authentication (i.e. the authentication does not send a signal back to a remote database / server) using the inherent disorder-based feature.
- information required to authenticate the inherent disorder-based identification feature is generally compressed, encrypted and stored in a second (or even a third) identification feature, for example a standard datamatrix barcode.
- a second (or even a third) identification feature for example a standard datamatrix barcode.
- the inherent disorder-based identification feature is read on a specialized production line which is suited to such reading and also to performing the necessary quality control steps on the tags (e.g. rejecting the tag if the inherent disorder-based feature is not suitable) rather than doing this on a brand-owner's production line, which is generally not the ideal place for reading and associated quality control steps of tags provided by external suppliers.
- the inherent disorder-based identification feature is read and information about it is encrypted and stored into the removable identification feature.
- the removable identification feature is read prior to printing, and may be decrypted by the printing device or a computer linked to the printing device, and then may be re-encrypted into the new identification feature. Alternately the information in the removable identification feature is not decrypted, but the encrypted version is read, added to the new information following some known format and then the new identification feature is printed.
- FIGs. 1A and FIG. IB respectively show a top view and a perspective view of magnetic particles 104 (preferably of high magnetic coercivity) used in a tag 102 to be read as an inherent disorder feature in accordance with an embodiment of the invention.
- particles 104 of high coercivity magnetic materials which have a high magnetic flux forming the magnetic fingerprint region 106 should be used.
- FIG. IB shows that in this embodiment, the magnetic particles 104 form a layer sandwiched between a base layer 108 and a cover layer 1 10.
- the base layer 108 and cover layer 110 are generally formed from films of material, with the base layer 108 providing a support for the magnetic particles 104 and the cover layer 1 10 providing protection from the environment and from abrasion.
- the maximum thickness that can be used for the cover layer 1 10 is dependent on the strength of the magnetic fields produced by the magnetic particles 104 (the strength of the magnetic field is itself a function, for example of the remnance magnetization of the magnetic particles 104, their size, the orientation of the magnetic particles 104 and the direction of magnetism), the size and distance between the particles, the sensitivity of the reading element being used to read the magnetic fields, and the expected resolution of the overall system.
- the magnetic particles 104 may be distributed within a non-magnetic (or weakly magnetic) matrix material, such as a polymeric material, a metallic material, a glass material, or a ceramic material.
- the non-magnetic or weakly magnetic material provides one or more of: protection for the particles (particularly protection against moisture if the particles are prone to corrosion), cohesion between the particles and the other layers present (i.e. the non-magnetic material locks the magnetic particles in place - a form of adhesive, for example), and ease of application of the particles to the base or cover layer.
- the "magnetic particles 104" is understood to include the non-magnetic or weakly magnetic matrix material where applicable.
- the magnetic particles 104 may include a high coercivity material.
- a high coercivity material is a neodymium magnet comprising Nd, Fe and B.
- the magnetic particles 104 may include a ferrimagnetic material, an antiferromagnetic material, a ferromagnetic material, or domains of varying magnetic properties within a continuous material (including voids causing variable magnetic properties) and combinations thereof.
- the ferromagnetic material may be selected from the group consisting of MnBi, CrTe, EuO, Cr0 2 , MnAs, Fe, Ni, Co, Gd, Dy, corresponding alloys and oxides of Fe, Ni, Co, Sm, Gd, Dy, and combinations thereof.
- FIGs. 2A and 2B show further examples of tags 102 with additional identification features.
- these additional identification features may include, for example, an index into a database where a signature of the tag based on inherent disorder features, made at the time that the tag was manufactured can be found, so that the inherent disorder features can be used to authenticate the tag.
- These additional identification feature may include, but are not limited to, magnetic barcodes, magnetic borders, magnetic alphanumeric characters, magnetic fiducial marks, optical barcodes (linear and 2-dimensional, including, various industry standards such as Code 128, QR- code, and DataMatrix), optical fiducial marks, optical alphanumeric characters, and other visible markings.
- the tag 102 may include a Radio Frequency Identification (RFID) chip, security inks or a hologram. As noted above, these additional identification features may be unacceptable in some applications.
- RFID Radio Frequency Identification
- a barcode 202 is shown in FIG. 2A as overlapping with the magnetic fingerprint region 106.
- the barcode 202 may be printed in regular ink, or in some embodiments may be printed using covert inks such as ultraviolet or infrared "optical" inks that cannot be easily detected by the naked human eye under white light but can be detected and read by using a suitably adapted reading device or by illuminating the tag 102 with one or more particular wavelengths of the electromagnetic spectrum.
- Magnetic and optical identification features may be positioned at the same position with respect to the scan area by means of using multiple layers, or may be positioned in any other spatial relationship to each other (including both overlapping and non-overlapping configurations).
- FIG. 2A shows a tag 102 with a magnetic fingerprint region 106.
- a two- dimensional barcode 202 is partially overlapping the magnetic fingerprint region 106 and a plurality of magnetic alphanumeric characters 206 are positioned at the four corners of the two-dimensional barcode 202.
- the magnetic fingerprint region 106 is shown in FIG. 2A and FIG. 2B, the fingerprint region 106 may be situated behind an opaque cover layer that the barcode 202 is printed on. Therefore, a user may not actually see the fingerprint region 106.
- magnetic and optical features may overlap while placed on the same or different layers of a tag 102.
- FIG. 2B shows another example of a tag 102 with a magnetic fingerprint region 106.
- a two-dimensional barcode 202 is overlapping the magnetic fingerprint region 106.
- the two-dimensional barcode 202 is surrounded by a border 208, and a first fiducial marking 210 is positioned at the upper-right corner of the border 208.
- a second fiducial marking 212 is positioned on the upper-left corner, adjacent to the second fiducial marking 208.
- Magnetic alphanumeric characters 214 are positioned adjacent to the border 208.
- a reading element may read overlapping optical and magnetic features of the tag 102. Overlapping and similar terms are to be understood to mean located in the same area, superimposed, or on top of each other.
- Optical and magnetic features of the tag 102 may overlap on the same or different layers of the tag 102.
- a reader for reading such tags is described in international application PCT/SG2010/000259, by Bilcare Technologies Singapore Pte. Ltd., published on 13 January 201 1 as publication WO/201 1/005222.
- FIG. 3 shows an overall view of an authentication system 300 utilizing a tag 302 such as is described above, including both an inherent disorder feature and an additional identification feature.
- the system 300 shown here includes a reading device 304, which communicates with a data server 308.
- the reading device 304 may include integrated communication capabilities, or may be adapted to be attached to a mobile device or computer with communication capabilities.
- the reading device 304 may, for example, communicate with the database or data server 308 via methods such as using data cables, local area networks, Bluetooth, Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX) technology, General Packet Radio Service (GPRS), 3G/Universal Mobile Telecommunication System (UMTS), or other communication protocols or technologies.
- WiMAX Worldwide Interoperability for Microwave Access
- GPRS General Packet Radio Service
- UMTS Universal Mobile Telecommunication System
- the reading device 304 may also include methods for direct communication with the user, for example a screen and a keyboard, which may allow the user to read and enter information on the reading device 304.
- the tag 302 shown in FIG. 3 includes both an inherent disorder feature 312 - in this example, a disordered array of magnetic or magnetisable particles forming a magnetic fingerprint region, as well as an additional identification feature - in this example, a barcode 314.
- the authentication data from the inherent disorder feature 312 was read and entered into a database on the data server 308 at the time that the tag 302 was manufactured.
- the tag 302 was assigned a database index number, which was recorded in the barcode 314 at the time that the tag 302 was manufactured.
- Each tag 302 is attached to an object or an item of value 362 to be authenticated.
- the tag 302 is attached to the object 362 in such a way that it is difficult or practically impossible to remove the tag without altering or destroying the inherent disorder feature 312. If there is an indication that the object 362 to which the tag 302 has been attached may be counterfeit, or that the tag 302 has been altered or tampered with, then the reading device 304 can be used to read the magnetic fingerprint region to verify the tag 302. It is generally more difficult to counterfeit, alter, or tamper with the inherent disorder features of the tag 302 than other features, such as a barcode.
- the barcode 314 on the tag is also read, in order to be used as a database index.
- the reading device 304 uses the database index contained in the barcode 314 to look up information on the inherent disorder feature 312 from the data server 308.
- a comparison for example a statistical comparison, between the data read from the inherent disorder feature 312 and the data on the inherent disorder feature stored on the data server 308 is performed, and the tag 302 is authenticated if a close enough match is found. It will be understood that this statistical comparison could be performed on the reading device 304 with data downloaded from the data server 308, or on the data server 308, using data on the inherent disorder feature 312 uploaded from the reading device 304. Either way, a database index read from the barcode 314 is used to access the correct information from a database on the data server 308.
- the reading device 304 has the capability to communicate with the data server 308 regarding a signal generated from reading identification features in order to authenticate a tag. Encrypted signals from the reading device 304 can be sent either through a wireless connection or a wired connection. Some examples of wireless connection include Bluetooth and Wi-Fi and some examples of wired connection include Recommended Standard 232 (RS232) and Universal Serial Bus (USB). As noted above the communication may be direct, or through a network or other intervening communication infrastructure, such as the Internet, or General Packet Radio Service (GPRS) or 3G/UTMS technology, for example.
- GPRS General Packet Radio Service
- 3G/UTMS 3G/UTMS technology
- the tag 302 when a tag 302 is attached to an object that already includes a barcode, the tag provides an additional barcode. Having multiple barcodes on the same object may be undesirable in many applications.
- the inherent disorder feature 312 is to be useful for authentication of the tag and/or object, then it is necessary to include a database index that permits information on the inherent disorder feature 312 to be accessed in a database on the data server 308.
- this difficulty can be addressed by providing a tag with an inherent disorder feature and a removable barcode feature (or other suitable identification feature such as an RFID tag or characters which can be machine recognized).
- the removable barcode feature is used to provide an index when the tag is manufactured.
- the tag is affixed to an object, the barcode from the tag is removed, and an object-specific identifier is associated with the tag in the database. This object-specific identifier may then serve as an index in the database for accessing data on the inherent disorder feature of the tag.
- FIGs. 4A and 4B show a method in accordance with an embodiment of the invention.
- FIG 4A shows the portion of the method in which the tag is initially enrolled in the database and associated with an initial tag-specific identifier that may be used as an index into the database.
- the steps shown in FIG. 4A may be carried out by the manufacturer of the tag, but may be carried out by other parties (e.g., the party that controls the database in which tags are enrolled) in some instances.
- a tag including an inherent disorder feature is read, for example by the manufacturer of the tag, and data relating to the inherent disorder feature, sufficient to authenticate the tag, is enrolled in a database using a tag-specific ID as a database index.
- the tag-specific ID is removably recorded on a portion of the tag.
- the tag-specific ID may be recorded on a removable portion of the tag.
- the tag-specific ID may be represented as a barcode, but it will be understood that other writable identification features, such as printed digits or other visual identifiers may be used.
- the removable portion of the tag may be on a back surface of a tag liner, in a cut-out portion of a tag, on a portion of a tag liner or tag that is peeled away when the tag is applied, on excess material that remains when a tag is peeled away from its backing, or any other place that is in close proximity to the tag when the tag is enrolled in the database, and that can be separated from the tag when the tag is placed on an object.
- FIG. 4B shows a portion of the method in which the tag is attached to an object.
- the tag-specific ID is read before placing the tag on an object.
- an object-specific ID is determined for the object to which the tag is being applied. This may involve reading the object-specific ID from the object, or (as discussed below) otherwise determining an object-specific ID for the object.
- the object-specific ID may be encoded in a barcode, but other forms of identifier may also be used.
- the database is instructed to allow the inherent disorder data associated with the tag-specific ID to be accessed using the object-specific ID as an index. Once this step is taken, it is possible to use the object-specific ID to access the data on the inherent disorder feature of the tag in the database.
- the tag-specific ID may be replaced by the object-specific ID or otherwise removed from the database, while in other embodiments, the tag-specific ID will remain in the database along with the object-specific ID.
- the tag-specific ID is removed from the tag, and the tag is applied to the object.
- removing the tag-specific ID may be accomplished by removing the tag from its backing for application to the object.
- the tag-specific ID may be printed on a removable portion of the tag, which may be removed either before or after the tag is applied to the object.
- the tag may be manufactured with the tag-specific ID pre-printed on a removable portion of the tag, so that printing the tag-specific ID is done prior to reading the inherent disorder feature for enrollment in the database using the tag-specific ID as a database index.
- the object-specific ID may be read before the tag-specific ID when applying a tag to an object and replacing the tag-specific ID with the object-specific ID as an index with which to access the inherent disorder information in the database.
- the object-specific ID may not exist prior to reading the tag-specific ID, instead it may be created after, or shortly before, reading the tag-specific ID such that it is "known” without being read. For example, if the product number (the object-specific ID) is being printed on-the-fly as the product is being manufactured and the tag is being applied, the program which controls the printing of the object-specific ID (or some other program linked to it in some way) can read only the tag-specific ID as the tag is applied as it already "knows" the object-specific ID. These two numbers can be linked in the database such that the object-specific ID becomes the primary key for searching the database, alternately the tag-specific ID can be replaced in the database by the tag- specific ID.
- steps described with reference to FIGs. 4A and 4B may be carried our manually, using tag readers to read the inherent disorder feature, the tag-specific ID, and the object-specific ID, or in an automated manner.
- steps of the process shown in FIG. 4A may be carried out in some embodiments by machinery that manufactures the tags
- steps of FIG. 4B may be carried out in some embodiments by an applicator device, that applies the tags to the objects.
- FIG. 5 shows an example of a tag with a removable portion, in accordance with an embodiment of the invention.
- the tag 500 includes an inherent disorder feature 501, such as the magnetic feature described above, on a peel-off portion 502. The location of this feature is shown by fiducial marks 504 and 506, so that a reader (not shown) can be properly aligned to read the tag 500.
- the peel-off portion 502 may be applied to an object.
- the tag also includes excess material 508 that remains after the peel-off portion 502, including the inherent disorder feature has been peeled off and applied to an object.
- a barcode 510 is printed on the excess material 508 proximate to the peel-off portion 502. The barcode 510 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 501 in the database.
- the object-specific ID is read, the tag-specific ID in the barcode 510 is read, and the tag-specific-ID is replaced by the object-specific ID as a database index for accessing data related to the inherent disorder feature 501.
- the peel-off portion 502, which includes the inherent disorder feature 501 is then peeled away from its backing, and the excess material 508, and is applied to an object.
- the excess material 508, including the barcode 510, which encodes the (now replaced) tag-specific ID can then be disposed of. It will be understood that peeling the peel-off portion 502 from its backing and applying it to an object can be performed manually, or by an applicator device.
- the barcode 510 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 510. Additionally, it will be understood that in some embodiments, the barcode 510 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID, or an RFID or memory chip device. As with other embodiments, although the inherent disorder feature 501 is described as being a magnetic inherent disorder feature, the embodiment shown in FIG. 5 could be used with other types of inherent-disorder features, such as the bubble tag inherent disorder feature discussed below with reference to FIG. 6. Where the inherent disorder feature is visible to the unaided eye, fiducial marks 504 and 506 may not be needed, and may be omitted.
- FIGs. 6A and 6B show another embodiment, in which the tag-specific ID is printed on a back surface of the backing of a tag, wherein the backing peels off when the tag is applied.
- FIG. 6A shows the front side of a tag 600, including an inherent disorder feature 601 affixed to a tamper-evident adhesive substrate 602.
- the inherent disorder feature 601 uses the three-dimensional layout of the bubbles within a transparent polymer for authentication purposes, as discussed in U.S. Patent 7,380,128, assigned to Novatec, SA, of Montauben, France.
- the tag 600 includes a peel- off backing 604, which is peeled away from the tamper-evident adhesive substrate 602 when the tag 600 is applied to an object.
- FIG. 6B shows a back surface of the peel-off backing 604, on which a barcode 606 is printed.
- the barcode 606 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 601 in the database.
- the object-specific ID is read, the tag-specific ID in the barcode 606 is read, and the tag-specific-ID is replaced by the object-specific ID as a database index for accessing data related to the inherent disorder feature 601.
- the peel-off backing 604 is then peeled away from the tag 600, which is applied to the object.
- the peel-off backing 604, which includes on its back surface the barcode 606, may be discarded and may be destroyed.
- the barcode 606 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 606. Additionally, it will be understood that in some embodiments, the barcode 606 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID, or even electronic based identification features such as an RFID or contact memory chip.
- FIG. 7 shows a third example embodiment, in which the tag-specific ID is on a tear-away portion 702 of a tag 700.
- the tag 700 includes an inherent disorder feature 701, such as the magnetic feature described above, which, along with the tear-away- portion 702, is located on the tag 700 that is attached to the object. Because the magnetic inherent disorder feature may not be visible to the unaided eye, the location of the magnetic inherent disorder feature may be shown by fiducial marks 704 and 706, so that a reader (not shown) can be properly aligned to read the tag 700.
- a barcode 708 is printed on the tear-away portion 702 of the tag 700. The barcode 708 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 701 in the database.
- the object-specific ID is read, the tag- specific ID in the barcode 708 is read, and the tag-specific-ID is replaced by the object- specific ID as a database index for accessing data related to the inherent disorder feature 701.
- the tear-away portion 702 of the tag 700 may be torn off of the tag 700 or otherwise separated from the tag 700, and discarded.
- the tear-away portion 702 may be removed either before the tag 700 is attached to an object, or, in some embodiments, after the tag 700 has been attached to the object. It will be understood that, as in other embodiments, attaching the tag to an object and removing the tear-away portion 702 may be performed manually, or by an applicator device.
- the barcode 708 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 708. Additionally, it will be understood that in some embodiments, the barcode 708 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID. As with other embodiments, although the inherent disorder feature 701 is shown as being a magnetic inherent disorder feature, a similar tear-off portion could be used to hold the tag-specific ID with other types of inherent-disorder features, such as the bubble tag inherent disorder feature discussed with reference to FIG. 6. Where the inherent disorder feature is visible to the unaided eye, fiducial marks 704 and 706 will generally not be needed, and may be omitted.
- FIGs. 8A and B shows a method according to a further embodiment of the invention, for use with tags where authentication may be handled locally, i.e., without accessing a remote database.
- the tag-specific ID includes authentication information sufficient to authenticate the inherent disorder feature of the tag. This authentication information may, for example, be placed in the tag-specific ID information when the tag was originally manufactured, and may be used, for example, for quality control by the manufacturer of the tag.
- FIG 8A shows such a method of producing a tag for use with such systems.
- step 800 a tag including an inherent disorder feature is read, for example by the manufacturer of the tag, in order to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag.
- the authentication data is removably recorded on a removable portion of the tag.
- recording the tag- specific ID may include encrypting at least the authentication data in the tag-specific ID.
- the tag-specific ID may be represented as a datamatrix or other two-dimensional barcode, but it will be understood that other writable identification features, such as linear barcodes, printed digits, or other visual identifiers may be used.
- the removable portion of the tag may be on a back surface of a tag liner, in a cut-out portion of a tag, on a portion of a tag liner or tag that is peeled away when the tag is applied, on excess material that remains when a tag is peeled away from its backing, or any other place that is in close proximity to the tag, and that can be separated from the inherent disorder feature when the tag is placed on an object.
- FIG. 8B shows a portion of the method in which the tag is attached to an object.
- the tag-specific ID including the authentication data is read from the removable portion of the tag. In some embodiments, this may include decrypting at least the authentication data in the tag-specific ID.
- an object-specific ID is determined for the object to which the tag is being applied. This may involve reading the object-specific ID from the object, or (as discussed above) otherwise determining an object-specific ID for the object.
- the object-specific ID may include information such as a serial number, a batch number, and/or a manufacturing date.
- an object-specific tag including the object-specific ID and the authentication data from the tag-specific data is produced. In some embodiments, this may include encrypting at least the authentication data. In some embodiments, producing the object-specific tag may be accomplished by printing the object-specific ID, for example, as a datamatrix or other two-dimensional barcode.
- the tag-specific ID is removed from the tag, and the object-specific tag and the inherent-disorder feature (from which the tag-specific ID has been removed) are applied to the object. In some embodiments, removing the tag-specific ID may be accomplished by removing the tag from its backing for application to the object.
- the tag-specific ID may be printed on a removable portion of the tag, which may be removed either before or after the tag is applied to the object.
- the object specific tag may be printed or otherwise produced on a nonremovable portion of a tag that includes the inherent disorder feature. For example, when the magnetic particle-based inherent disorder feature discussed above is used, the object- specific tag, including the authentication data, could be printed over the area that includes the inherent disorder feature. As above, it will be understood that the steps shown in FIGs. 8A and 8B need not be applied in the order in which they are shown and described.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Embodiments of the invention provide a tag for use in authentication applications. The tag includes an inherent disorder feature usable to authenticate the tag. The tag also includes a tag-specific ID usable as a database index to access data relating to the inherent disorder feature in a database to authenticate the tag. The portion of the tag including the tag-specific ID is removable, such that the tag-specific ID is removed from the tag when the tag is affixed to an object. Embodiments of the invention also provide a method in which a database storing data relating to an inherent disorder feature of the tag sufficient to authenticate the tag is instructed to allow the data associated with the tag- specific ID to be accessed using an object-specific ID as an index, wherein the object- specific ID is associated with an object to which the tag is to be attached.
Description
INHERENT DISORDER-BASED TAGS HAVING A REMOVABLE
IDENTIFICATION FEATURE
CROSS-REFERENCE TO RELATED APPLICATONS
[0001] The present application claims the right of priority of US provisional application 61/466,980 filed with the US Patent and Trademark Office on March 24, 201 1, the entire content of which is incorporated herein for all purposes.
FIELD OF THE INVENTION
[0002] Embodiments of the invention relate to the field of tags that include authentication and identification features based on inherent disorder.
BACKGROUND OF THE INVENTION
[0003] Identification features such as barcodes, optical characters, Radio Frequency Identification (RFID), magnetic or optical stripes, and other means of identifying or authenticating objects have been used for purposes of identification, authentication, and tracking and tracing. Recently, "inherent disorder" -based features of objects have also been used either alone or in combination with other identification features to uniquely identify objects and to provide evidence of the authenticity of objects for anti- counterfeiting and security purposes. An "inherent disorder"-based feature is a feature based on a disordered material, wherein the structure of the disorder is used to identify or authenticate the object. The disordered material may be a part of the object itself, or may be part of a tag that is affixed to the object or its packaging. Further, the disordered material may include a disordered coating, composite, or structure. By object we consider a physical article that may be, but is not limited to, a product, a document, an identification credential or a financial instrument.
[0004] There are numerous previously known examples of the use of inherent disorder for identification and authentication purposes. For example, Ingenia Technology
Limited, of London, UK, has described a system that uses the inherent disorder of fibers within paper, mapped using laser-speckle interferometry, to uniquely identify the paper. A more complete description of this technology can be found in PCT application WO 2006/016114.
[0005] Another previously known use of inherent disorder is shown in US Patent 7,380,128, assigned to Novatec, SA, of Montauben, France. This patent shows use of random bubbles within a transparent polymer for identification and authentication. Optical methods are used to read the three-dimensional layout of the bubbles within the polymer. This information can be used to provide a unique signature for a "bubble tag", which is difficult or impossible to replicate.
[0006] Other inherent disorder-based identification and authentication technologies include use of randomly distributed quantum dots or nanobarcodes, use of ink containing magnetic particles arranged in a disordered pattern, use of random "jitter" in the magnetic stripes of credit cards, and use of random distribution of taggant particles that are invisible to human vision on an object (see PCT application WO 2005/104008).
[0007] Additional inherent disorder-based tags that use a combination of magnetic and/or magnetisable and/or conductive and/or semi-conductive and/or optically active particles and/or optically distinguishable particles have been reported by the present applicant, Bilcare Technologies and by the Agency for Science Technology and Research (A*Star). These technologies are further detailed in PCT applications WO 2005/008294, WO 2006/078220, WO 2007/133164, WO 2007/133163, and WO 2009/105040.
[0008] Various signal detection systems based on optical, magnetic, and magneto-optical effects are used to read these inherent disorder features. Once read, information on the inherent disorder features can be processed either in the reading device itself or in a back- end computer system to use the information for identification and/or authentication purposes.
[0009] In order to use tags based on inherent disorder for identification and/or authentication purposes, a "fingerprint" for each such tag may be read and stored in a
database, typically at the time that the tag is manufactured (though later reading and storing, such as at the time that a tag is applied to an object is also possible). Storing information in the database typically involves use of a database index number or identifier (sometimes referred to as a "primary key"), which may be uniquely associated with the tag, and marked on the tag using a barcode or other conventional identification means. Generally, the tag is looked up in the database using the index number, and authenticated using the inherent disorder feature. The tag is authenticated if there is a close match between the inherent disorder feature as read from the tag, and the inherent disorder feature as stored in the database under the tag's index number. Note that this match typically need not be perfect. For examples differences in the reader or the reading conditions between when the tag was entered in the. database and when the tag is read may lead to differences in the data that are read from the inherent disorder features of the tag. Because of these differences, the data of the inherent disorder feature itself may be difficult to use as a database index, and a second, conventional identification feature, such as a barcode number may be used to provide the database index for the tag.
SUMMARY OF THE INVENTION
[0010] In accordance with embodiments of the invention, a method of associating a database index with an authentication tag is provided. The method includes reading an object-specific ID from an object to which the tag is to be attached, and reading a tag- specific ID from the tag. A database storing data relating to an inherent disorder feature of the tag sufficient to authenticate the tag is instructed to allow the data associated with the tag-specific ID (which was used as a database index to access the data) to be accessed using the object-specific ID as an index. The tag-specific ID may be removed from the tag, and the tag may be attached to the object.
[0011] In some embodiments, removing the tag-specific ID from the tag includes removing a removable portion of the tag on which the tag-specific ID is disposed. In some embodiments, the removable portion includes a barcode that encodes the tag- specific ID.
[0012] In some embodiments, removing the removable portion is accomplished by peeling the tag away from a backing, (also known as the "liner") leaving excess material
on which the tag-specific ID is disposed. In some embodiments, removing the removable portion is accomplished by peeling a backing off of the tag, wherein the tag-specific ID is disposed on the backing. In some embodiments, removing the removable portion is accomplished by removing a tear-off portion of the tag, wherein the tag-specific ID is disposed on the tear-off portion. In some embodiments the tag may be punched out, for example as part of a heat-stamping process, leaving the tag-specific ID behind. In some embodiments, the tag-specific ID may be discarded and/or destroyed.
[0013] Some embodiments of the invention also provide a method for enrolling data relating to an authentication tag in a database, for example during a manufacturing process of the tag. The method includes enrolling data relating to an inherent disorder feature of the authentication tag in a database, the data sufficient to use the inherent disorder feature to authenticate the tag. The method also includes associating a tag- specific ID with the authentication tag, the tag-specific ID usable as a database index to access the data, relating to the inherent disorder feature of the authentication tag in the database, and removably recording the tag-specific ID on a portion of the tag.
[0014] In some embodiments, removably recording the tag-specific ID includes printing a barcode on a removable portion of the tag. In some embodiments removably recording the tag-specific ID includes recording the tag-specific ID on an excess portion of the tag that remains when the tag is peeled away from a backing. In some embodiments removably recording the tag-specific ID includes recording the tag-specific ID on a backing portion of the tag that is removed when the tag is attached to an object. In some such embodiments, the tag-specific ID is recorded on a back surface of the backing portion of the tag. In some embodiments, removably recording the tag-specific ID includes recording the tag-specific ID on a tear-away portion of the tag.
[0015] Some embodiments of the invention provide a tag for use in authentication applications. The tag includes an inherent disorder feature disposed on a first portion of the tag, the inherent disorder feature usable to authenticate the tag. The tag also includes a tag-specific ID disposed on a second portion of the tag, the tag-specific ID usable as a database index to access data relating to the inherent disorder feature in a database to authenticate the tag. In accordance with embodiments of the invention, the second
portion of the tag is removable, such that the tag-specific ID is removed from the tag when the tag is affixed to an object.
[0016] In some embodiments, the tag-specific ID is recorded as a barcode. This barcode may use any barcode symbology, including linear or one-dimensional barcode symbolizes, or two-dimensional barcode symbologies.
[0017] In some embodiments, the inherent disorder feature includes an inherent disorder feature based on magnetic particles. In other embodiments, the inherent disorder feature may include an inherent disorder feature based on the three-dimensional layout of bubbles in a transparent polymer. It will be understood that other inherent disorder features may also be used.
[0018] In some embodiments, the second portion of the tag, on which the tag-specific ID is disposed, is an excess portion that is left after the tag is removed from its backing. In some embodiments, the second portion of the tag is a backing portion that is separated from the tag when the tag is affixed to an object. In some such embodiments, the tag- specific ID is disposed on a back surface of this backing portion. In some embodiments, the second portion of the tag is a tear-away portion that is configured to be separated from the tag.
[0019] Some embodiments of the invention provide a method of adding authentication data relating to an inherent-disorder feature to an object-specific tag. The method, which is generally used with local authentication, includes determining an object-specific ID for an object to which the tag is to be attached, reading a tag-specific ID from the tag, the tag-specific ID including authentication data sufficient to authenticate an inherent disorder feature of the tag, producing an object-specific tag including the object-specific ID and the authentication data, removing the tag-specific ID from the tag that includes the inherent disorder feature, and attaching the object-specific tag and the inherent disorder feature to the object.
[0020] In some embodiments, reading a tag-specific ID includes decrypting the authentication data. In some embodiments, producing an object-specific tag includes encrypting the authentication data. In some embodiments, the object-specific tag is produced (for example, by printing) on a non-removable portion of a tag that includes the inherent disorder feature.
[0021] Some embodiments of the invention provide a method of producing a tag including an inherent disorder-based authentication feature. The method includes reading an inherent disorder feature on a tag to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag, and removably recording a tag- specific ID on the tag, the tag-specific ID including the authentication data. In some embodiments, removably recording the tag-specific ID on the tag includes encrypting the authentication data.
BRIEF DESCRIPTION OF THE DRAWINGS
[0022] In the drawings, like reference characters generally refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention. In the following description, various embodiments of the invention are described with reference to the following drawings, in which:
[0023] FIGs. 1A and IB show top and perspective views, respectively, of magnetic particles used in a tag to be read as an inherent disorder feature in accordance with an embodiment of the invention;
[0024] FIGs. 2A and 2B show further example tags with identification features that can be read in accordance with an embodiment of the invention;
[0025] FIG. 3 shows an overall view of an anti-counterfeit system utilizing a reading device that reads inherent disorder features;
[0026] FIGs. 4A and 4B show a method of applying a tag to an object so that an identifier associated with the tag is replaced with an identifier associated with the object, in accordance with an embodiment of the invention;
[0027] FIG. 5 shows an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention;
[0028] FIGs. 6A and 6B show a front and back view, respectively, of another example of an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention;
[0029] FIG. 7 shows a further example of an inherent disorder-based tag with a removable identifier, in accordance with an embodiment of the invention; and
[0030] FIGs. 8A and 8B show an additional method in accordance with an embodiment of the invention for use with tags for local authentication.
DESCRIPTION
[0031] Tags based on inherent disorder provide strong authentication capabilities, since such tags are extremely difficult to counterfeit, and the likelihood of any two such tags returning the same reading are extremely low. Because such tags are based on inherent disorder, rather than on a predictable pattern, it is generally necessary to store a known authentic reading for such tags in a database, so that the known reading can be looked up later from a trustworthy source when the tag is later used for authentication. Alternatively, information relating to an inherent disorder feature can be stored on a second identification feature, such as a barcode, that is associated with a tag. By reading this information, the inherent disorder feature may be authenticated without going back to a database.
[0032] While readings of such inherent disorder-based tags may be consistent enough to permit authentication with a high degree of certainty when a reading from a known tag is compared with its entry in a trusted database, in the case of some such inherent disorder tags, the readings may not be consistent enough to permit the tag to be authenticated without also knowing the index number of the tag in the database. That is, the readings may not be consistent enough in practical terms to permit the inherent disorder tag itself, or data computed from a reading of the inherent disorder tag (e.g., by computing a hash based on a numerical representation of particular features read from the tag) to be used as a unique database index to look up the information on the tag.
[0033] For at least this reason, for some types of inherent-disorder based tags, it is common to include a second identification feature, such as a barcode or other ordered identification feature (i.e., an identification feature into which pre-determined information, such as a database index number, can be written) with the tag. However, if the ordered identification feature is visible (or in some cases, even if it is not), there may be some applications in which the tag will be unacceptable for use. For example, if the
ordered identification feature is a visible barcode, and the tag is applied to an object that already includes a barcode, then the object will include two barcodes - one object- specific barcode, and one tag-specific barcode. Depending on the appearance of the barcodes, it may be difficult to determine which barcode should be scanned for any particular purpose. This may be unacceptable, for example, in certain pharmaceutical applications where the brand owner may be concerned that the retailers will inadvertently scan the incorrect barcode and thereby cause problems for their product tracking systems.
[0034] Therefore, in accordance with an embodiment of the invention, a tag including an inherent disorder feature and a removable barcode or other "ordered" secondary identification is provided. By removing the barcode or other secondary identification feature from the tag, there is no longer a conflict with information printed or otherwise disposed on an identification feature associated with the object. Of course, if the secondary identification feature is removed from the tag, some other way of accessing the data for authenticating the inherent disorder feature is needed. In accordance with one embodiment, this can be done by updating the database index, so that it uses an object- specific identifier as the key to access the information on the inherent disorder feature.
[0035] A second reason for using a removable identification feature in association with inherent disorder-based tags arises from the desire to read the disordered feature on a production line controlled by the manufacturer of the tag, while still being able to print product information "on-the-fly" at the brand-owner's production line (such information may include batch number, serial number and manufacturing date which may be impractical to preprint on a label) and/or to store encrypted information within the second identification feature which allows the inherent disorder-based feature to be authenticated without going back to a database. An example of this arises when a system is required that can achieve local authentication (i.e. the authentication does not send a signal back to a remote database / server) using the inherent disorder-based feature. For this local authentication, information required to authenticate the inherent disorder-based identification feature is generally compressed, encrypted and stored in a second (or even a third) identification feature, for example a standard datamatrix barcode. It is often preferable in these systems that the inherent disorder-based identification feature is read
on a specialized production line which is suited to such reading and also to performing the necessary quality control steps on the tags (e.g. rejecting the tag if the inherent disorder-based feature is not suitable) rather than doing this on a brand-owner's production line, which is generally not the ideal place for reading and associated quality control steps of tags provided by external suppliers. In order to solve this problem in accordance with an embodiment of the invention, the inherent disorder-based identification feature is read and information about it is encrypted and stored into the removable identification feature. This may take place, for example, on the production line for the tags. When the information which is required to be printed on-the-fly (e.g. the product serial number and production date) is printed, this can be printed into a new datamatrix or other barcode which also includes the information about the inherent disorder feature that is in the removable identification feature. To do this the removable identification feature is read prior to printing, and may be decrypted by the printing device or a computer linked to the printing device, and then may be re-encrypted into the new identification feature. Alternately the information in the removable identification feature is not decrypted, but the encrypted version is read, added to the new information following some known format and then the new identification feature is printed.
[0036] FIGs. 1A and FIG. IB respectively show a top view and a perspective view of magnetic particles 104 (preferably of high magnetic coercivity) used in a tag 102 to be read as an inherent disorder feature in accordance with an embodiment of the invention. To obtain a clear magneto-optical signal, particles 104 of high coercivity magnetic materials which have a high magnetic flux forming the magnetic fingerprint region 106 should be used. FIG. IB shows that in this embodiment, the magnetic particles 104 form a layer sandwiched between a base layer 108 and a cover layer 1 10. The base layer 108 and cover layer 110 are generally formed from films of material, with the base layer 108 providing a support for the magnetic particles 104 and the cover layer 1 10 providing protection from the environment and from abrasion. The maximum thickness that can be used for the cover layer 1 10 is dependent on the strength of the magnetic fields produced by the magnetic particles 104 (the strength of the magnetic field is itself a function, for example of the remnance magnetization of the magnetic particles 104, their size, the orientation of the magnetic particles 104 and the direction of magnetism), the size and
distance between the particles, the sensitivity of the reading element being used to read the magnetic fields, and the expected resolution of the overall system.
[0037] The magnetic particles 104 may be distributed within a non-magnetic (or weakly magnetic) matrix material, such as a polymeric material, a metallic material, a glass material, or a ceramic material. The non-magnetic or weakly magnetic material provides one or more of: protection for the particles (particularly protection against moisture if the particles are prone to corrosion), cohesion between the particles and the other layers present (i.e. the non-magnetic material locks the magnetic particles in place - a form of adhesive, for example), and ease of application of the particles to the base or cover layer. In such cases the "magnetic particles 104" is understood to include the non-magnetic or weakly magnetic matrix material where applicable. In certain cases there may be no specific base layer 108 and the magnetic particles 104 may be directly in contact with an adhesive layer at the base of the tag, or they may be exposed.
[0038] The magnetic particles 104 may include a high coercivity material. An example of such a high coercivity material is a neodymium magnet comprising Nd, Fe and B. The magnetic particles 104 may include a ferrimagnetic material, an antiferromagnetic material, a ferromagnetic material, or domains of varying magnetic properties within a continuous material (including voids causing variable magnetic properties) and combinations thereof. The ferromagnetic material may be selected from the group consisting of MnBi, CrTe, EuO, Cr02, MnAs, Fe, Ni, Co, Gd, Dy, corresponding alloys and oxides of Fe, Ni, Co, Sm, Gd, Dy, and combinations thereof.
[0039] FIGs. 2A and 2B show further examples of tags 102 with additional identification features. As discussed above, these additional identification features may include, for example, an index into a database where a signature of the tag based on inherent disorder features, made at the time that the tag was manufactured can be found, so that the inherent disorder features can be used to authenticate the tag. These additional identification feature may include, but are not limited to, magnetic barcodes, magnetic borders, magnetic alphanumeric characters, magnetic fiducial marks, optical barcodes (linear and 2-dimensional, including, various industry standards such as Code 128, QR-
code, and DataMatrix), optical fiducial marks, optical alphanumeric characters, and other visible markings. As further examples, the tag 102 may include a Radio Frequency Identification (RFID) chip, security inks or a hologram. As noted above, these additional identification features may be unacceptable in some applications.
[0040] A barcode 202 is shown in FIG. 2A as overlapping with the magnetic fingerprint region 106. The barcode 202 may be printed in regular ink, or in some embodiments may be printed using covert inks such as ultraviolet or infrared "optical" inks that cannot be easily detected by the naked human eye under white light but can be detected and read by using a suitably adapted reading device or by illuminating the tag 102 with one or more particular wavelengths of the electromagnetic spectrum. Magnetic and optical identification features may be positioned at the same position with respect to the scan area by means of using multiple layers, or may be positioned in any other spatial relationship to each other (including both overlapping and non-overlapping configurations).
[0041] FIG. 2A shows a tag 102 with a magnetic fingerprint region 106. A two- dimensional barcode 202 is partially overlapping the magnetic fingerprint region 106 and a plurality of magnetic alphanumeric characters 206 are positioned at the four corners of the two-dimensional barcode 202. Note that although the magnetic fingerprint region 106 is shown in FIG. 2A and FIG. 2B, the fingerprint region 106 may be situated behind an opaque cover layer that the barcode 202 is printed on. Therefore, a user may not actually see the fingerprint region 106. Furthermore, magnetic and optical features may overlap while placed on the same or different layers of a tag 102.
[0042] FIG. 2B shows another example of a tag 102 with a magnetic fingerprint region 106. A two-dimensional barcode 202 is overlapping the magnetic fingerprint region 106. The two-dimensional barcode 202 is surrounded by a border 208, and a first fiducial marking 210 is positioned at the upper-right corner of the border 208. A second fiducial marking 212 is positioned on the upper-left corner, adjacent to the second fiducial marking 208. Magnetic alphanumeric characters 214 are positioned adjacent to the border 208.
[0043] In some embodiments, a reading element may read overlapping optical and magnetic features of the tag 102. Overlapping and similar terms are to be understood to mean located in the same area, superimposed, or on top of each other. Optical and magnetic features of the tag 102 may overlap on the same or different layers of the tag 102. A reader for reading such tags is described in international application PCT/SG2010/000259, by Bilcare Technologies Singapore Pte. Ltd., published on 13 January 201 1 as publication WO/201 1/005222.
[0044] FIG. 3 shows an overall view of an authentication system 300 utilizing a tag 302 such as is described above, including both an inherent disorder feature and an additional identification feature. The system 300 shown here includes a reading device 304, which communicates with a data server 308. The reading device 304 may include integrated communication capabilities, or may be adapted to be attached to a mobile device or computer with communication capabilities. The reading device 304 may, for example, communicate with the database or data server 308 via methods such as using data cables, local area networks, Bluetooth, Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX) technology, General Packet Radio Service (GPRS), 3G/Universal Mobile Telecommunication System (UMTS), or other communication protocols or technologies. Although the data server 308 is illustrated as one computer, it is also understood that it may in fact be a series of computers or servers which may or may not be linked via a router or routing protocol. The reading device 304 may also include methods for direct communication with the user, for example a screen and a keyboard, which may allow the user to read and enter information on the reading device 304.
[0045] The tag 302 shown in FIG. 3 includes both an inherent disorder feature 312 - in this example, a disordered array of magnetic or magnetisable particles forming a magnetic fingerprint region, as well as an additional identification feature - in this example, a barcode 314. The authentication data from the inherent disorder feature 312 was read and entered into a database on the data server 308 at the time that the tag 302 was manufactured. To look up the authentication data in the database, the tag 302 was assigned a database index number, which was recorded in the barcode 314 at the time that the tag 302 was manufactured.
[0046] Each tag 302 is attached to an object or an item of value 362 to be authenticated. Generally, the tag 302 is attached to the object 362 in such a way that it is difficult or practically impossible to remove the tag without altering or destroying the inherent disorder feature 312. If there is an indication that the object 362 to which the tag 302 has been attached may be counterfeit, or that the tag 302 has been altered or tampered with, then the reading device 304 can be used to read the magnetic fingerprint region to verify the tag 302. It is generally more difficult to counterfeit, alter, or tamper with the inherent disorder features of the tag 302 than other features, such as a barcode.
[0047] In operation, when the magnetic fingerprint region (i.e., the inherent disorder feature 312) is read, the barcode 314 on the tag is also read, in order to be used as a database index. The reading device 304 uses the database index contained in the barcode 314 to look up information on the inherent disorder feature 312 from the data server 308. A comparison, for example a statistical comparison, between the data read from the inherent disorder feature 312 and the data on the inherent disorder feature stored on the data server 308 is performed, and the tag 302 is authenticated if a close enough match is found. It will be understood that this statistical comparison could be performed on the reading device 304 with data downloaded from the data server 308, or on the data server 308, using data on the inherent disorder feature 312 uploaded from the reading device 304. Either way, a database index read from the barcode 314 is used to access the correct information from a database on the data server 308.
[0048] The reading device 304 has the capability to communicate with the data server 308 regarding a signal generated from reading identification features in order to authenticate a tag. Encrypted signals from the reading device 304 can be sent either through a wireless connection or a wired connection. Some examples of wireless connection include Bluetooth and Wi-Fi and some examples of wired connection include Recommended Standard 232 (RS232) and Universal Serial Bus (USB). As noted above the communication may be direct, or through a network or other intervening communication infrastructure, such as the Internet, or General Packet Radio Service (GPRS) or 3G/UTMS technology, for example.
[0049] One difficulty with the system discussed above is that the barcode 314 is used as a database index to look up the correct information on the inherent disorder feature 312 of the tag 302. Thus, when a tag 302 is attached to an object that already includes a barcode, the tag provides an additional barcode. Having multiple barcodes on the same object may be undesirable in many applications. However, if the inherent disorder feature 312 is to be useful for authentication of the tag and/or object, then it is necessary to include a database index that permits information on the inherent disorder feature 312 to be accessed in a database on the data server 308.
[0050] In accordance with an embodiment of the invention, this difficulty can be addressed by providing a tag with an inherent disorder feature and a removable barcode feature (or other suitable identification feature such as an RFID tag or characters which can be machine recognized). The removable barcode feature is used to provide an index when the tag is manufactured. When the tag is affixed to an object, the barcode from the tag is removed, and an object-specific identifier is associated with the tag in the database. This object-specific identifier may then serve as an index in the database for accessing data on the inherent disorder feature of the tag.
[0051] FIGs. 4A and 4B show a method in accordance with an embodiment of the invention. FIG 4A shows the portion of the method in which the tag is initially enrolled in the database and associated with an initial tag-specific identifier that may be used as an index into the database. The steps shown in FIG. 4A may be carried out by the manufacturer of the tag, but may be carried out by other parties (e.g., the party that controls the database in which tags are enrolled) in some instances. In step 400, a tag including an inherent disorder feature is read, for example by the manufacturer of the tag, and data relating to the inherent disorder feature, sufficient to authenticate the tag, is enrolled in a database using a tag-specific ID as a database index.
[0052] At step 402, the tag-specific ID is removably recorded on a portion of the tag. In some embodiments, the tag-specific ID may be recorded on a removable portion of the tag. In some embodiments, the tag-specific ID may be represented as a barcode, but it will be understood that other writable identification features, such as printed digits or
other visual identifiers may be used. The removable portion of the tag may be on a back surface of a tag liner, in a cut-out portion of a tag, on a portion of a tag liner or tag that is peeled away when the tag is applied, on excess material that remains when a tag is peeled away from its backing, or any other place that is in close proximity to the tag when the tag is enrolled in the database, and that can be separated from the tag when the tag is placed on an object.
[0053] FIG. 4B shows a portion of the method in which the tag is attached to an object. In step 450, the tag-specific ID is read before placing the tag on an object. At step 452, an object-specific ID is determined for the object to which the tag is being applied. This may involve reading the object-specific ID from the object, or (as discussed below) otherwise determining an object-specific ID for the object. In some embodiments, the object-specific ID may be encoded in a barcode, but other forms of identifier may also be used.
[0054] At step 454, the database is instructed to allow the inherent disorder data associated with the tag-specific ID to be accessed using the object-specific ID as an index. Once this step is taken, it is possible to use the object-specific ID to access the data on the inherent disorder feature of the tag in the database. In some embodiments, the tag-specific ID may be replaced by the object-specific ID or otherwise removed from the database, while in other embodiments, the tag-specific ID will remain in the database along with the object-specific ID.
[0055] At step 456, the tag-specific ID is removed from the tag, and the tag is applied to the object. In some embodiments, removing the tag-specific ID may be accomplished by removing the tag from its backing for application to the object. In some embodiments, the tag-specific ID may be printed on a removable portion of the tag, which may be removed either before or after the tag is applied to the object.
[0056] The steps shown in FIGs. 4A and 4B need not be applied in the order in which they are shown and described. For example, in some embodiments, the tag may be manufactured with the tag-specific ID pre-printed on a removable portion of the tag, so that printing the tag-specific ID is done prior to reading the inherent disorder feature for
enrollment in the database using the tag-specific ID as a database index. Similarly, in some embodiments, the object-specific ID may be read before the tag-specific ID when applying a tag to an object and replacing the tag-specific ID with the object-specific ID as an index with which to access the inherent disorder information in the database. In yet other embodiments the object-specific ID may not exist prior to reading the tag-specific ID, instead it may be created after, or shortly before, reading the tag-specific ID such that it is "known" without being read. For example, if the product number (the object-specific ID) is being printed on-the-fly as the product is being manufactured and the tag is being applied, the program which controls the printing of the object-specific ID (or some other program linked to it in some way) can read only the tag-specific ID as the tag is applied as it already "knows" the object-specific ID. These two numbers can be linked in the database such that the object-specific ID becomes the primary key for searching the database, alternately the tag-specific ID can be replaced in the database by the tag- specific ID.
[0057] It will further be understood that the steps described with reference to FIGs. 4A and 4B may be carried our manually, using tag readers to read the inherent disorder feature, the tag-specific ID, and the object-specific ID, or in an automated manner. For example the steps of the process shown in FIG. 4A may be carried out in some embodiments by machinery that manufactures the tags, and the steps of FIG. 4B may be carried out in some embodiments by an applicator device, that applies the tags to the objects.
[0058] FIG. 5 shows an example of a tag with a removable portion, in accordance with an embodiment of the invention. The tag 500 includes an inherent disorder feature 501, such as the magnetic feature described above, on a peel-off portion 502. The location of this feature is shown by fiducial marks 504 and 506, so that a reader (not shown) can be properly aligned to read the tag 500. The peel-off portion 502 may be applied to an object. The tag also includes excess material 508 that remains after the peel-off portion 502, including the inherent disorder feature has been peeled off and applied to an object. A barcode 510 is printed on the excess material 508 proximate to the peel-off portion
502. The barcode 510 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 501 in the database.
[0059] When the tag (in this case, meaning the peel-off portion 502) is to be applied to an object, the object-specific ID is read, the tag-specific ID in the barcode 510 is read, and the tag-specific-ID is replaced by the object-specific ID as a database index for accessing data related to the inherent disorder feature 501. The peel-off portion 502, which includes the inherent disorder feature 501 is then peeled away from its backing, and the excess material 508, and is applied to an object. The excess material 508, including the barcode 510, which encodes the (now replaced) tag-specific ID can then be disposed of. It will be understood that peeling the peel-off portion 502 from its backing and applying it to an object can be performed manually, or by an applicator device.
[0060] It will also be understood that although the barcode 510 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 510. Additionally, it will be understood that in some embodiments, the barcode 510 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID, or an RFID or memory chip device. As with other embodiments, although the inherent disorder feature 501 is described as being a magnetic inherent disorder feature, the embodiment shown in FIG. 5 could be used with other types of inherent-disorder features, such as the bubble tag inherent disorder feature discussed below with reference to FIG. 6. Where the inherent disorder feature is visible to the unaided eye, fiducial marks 504 and 506 may not be needed, and may be omitted.
[0061] FIGs. 6A and 6B show another embodiment, in which the tag-specific ID is printed on a back surface of the backing of a tag, wherein the backing peels off when the tag is applied. FIG. 6A shows the front side of a tag 600, including an inherent disorder feature 601 affixed to a tamper-evident adhesive substrate 602. In the example shown here, the inherent disorder feature 601 uses the three-dimensional layout of the bubbles within a transparent polymer for authentication purposes, as discussed in U.S. Patent
7,380,128, assigned to Novatec, SA, of Montauben, France. The tag 600 includes a peel- off backing 604, which is peeled away from the tamper-evident adhesive substrate 602 when the tag 600 is applied to an object.
[0062] FIG. 6B shows a back surface of the peel-off backing 604, on which a barcode 606 is printed. The barcode 606 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 601 in the database. When the tag is to be applied to an object, the object-specific ID is read, the tag-specific ID in the barcode 606 is read, and the tag-specific-ID is replaced by the object-specific ID as a database index for accessing data related to the inherent disorder feature 601. The peel-off backing 604 is then peeled away from the tag 600, which is applied to the object. The peel-off backing 604, which includes on its back surface the barcode 606, may be discarded and may be destroyed. It will be understood that reading the IDs and attaching the tag to an object can be performed manually, or by an applicator device. Additionally, it will be understood that although the inherent disorder feature 601 is shown as a feature using the three- dimensional layout of bubbles in a transparent polymer, other inherent disorder features, such as the magnetic feature discussed above, could be used.
[0063] As before, it will also be understood that although the barcode 606 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 606. Additionally, it will be understood that in some embodiments, the barcode 606 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID, or even electronic based identification features such as an RFID or contact memory chip.
[0064] FIG. 7 shows a third example embodiment, in which the tag-specific ID is on a tear-away portion 702 of a tag 700. The tag 700 includes an inherent disorder feature 701, such as the magnetic feature described above, which, along with the tear-away- portion 702, is located on the tag 700 that is attached to the object. Because the magnetic inherent disorder feature may not be visible to the unaided eye, the location of the magnetic inherent disorder feature may be shown by fiducial marks 704 and 706, so that
a reader (not shown) can be properly aligned to read the tag 700. A barcode 708 is printed on the tear-away portion 702 of the tag 700. The barcode 708 encodes data used as the tag-specific ID when enrolling the inherent disorder feature 701 in the database.
[0065] When the tag is applied to an object, the object-specific ID is read, the tag- specific ID in the barcode 708 is read, and the tag-specific-ID is replaced by the object- specific ID as a database index for accessing data related to the inherent disorder feature 701. Once this is done, the tear-away portion 702 of the tag 700 may be torn off of the tag 700 or otherwise separated from the tag 700, and discarded. The tear-away portion 702 may be removed either before the tag 700 is attached to an object, or, in some embodiments, after the tag 700 has been attached to the object. It will be understood that, as in other embodiments, attaching the tag to an object and removing the tear-away portion 702 may be performed manually, or by an applicator device.
[0066] Also, as before, it will be understood that although the barcode 708 is shown using a linear symbology, any suitable barcode symbology, including two-dimensional symbologies such as the datamatrix symbology, may be used to encode information in the barcode 708. Additionally, it will be understood that in some embodiments, the barcode 708 need not be a barcode, but may be any suitable identification feature, such as printed numerals or alphanumeric characters, that represent the tag-specific ID. As with other embodiments, although the inherent disorder feature 701 is shown as being a magnetic inherent disorder feature, a similar tear-off portion could be used to hold the tag-specific ID with other types of inherent-disorder features, such as the bubble tag inherent disorder feature discussed with reference to FIG. 6. Where the inherent disorder feature is visible to the unaided eye, fiducial marks 704 and 706 will generally not be needed, and may be omitted.
[0067] FIGs. 8A and B shows a method according to a further embodiment of the invention, for use with tags where authentication may be handled locally, i.e., without accessing a remote database. In some such systems, the tag-specific ID includes authentication information sufficient to authenticate the inherent disorder feature of the tag. This authentication information may, for example, be placed in the tag-specific ID
information when the tag was originally manufactured, and may be used, for example, for quality control by the manufacturer of the tag. FIG 8A shows such a method of producing a tag for use with such systems. In step 800, a tag including an inherent disorder feature is read, for example by the manufacturer of the tag, in order to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag. In step 802, the authentication data, as at least a part of a tag-specific ID, is removably recorded on a removable portion of the tag. In some embodiments, recording the tag- specific ID may include encrypting at least the authentication data in the tag-specific ID. In some embodiments, the tag-specific ID may be represented as a datamatrix or other two-dimensional barcode, but it will be understood that other writable identification features, such as linear barcodes, printed digits, or other visual identifiers may be used. The removable portion of the tag may be on a back surface of a tag liner, in a cut-out portion of a tag, on a portion of a tag liner or tag that is peeled away when the tag is applied, on excess material that remains when a tag is peeled away from its backing, or any other place that is in close proximity to the tag, and that can be separated from the inherent disorder feature when the tag is placed on an object.
[0068] FIG. 8B shows a portion of the method in which the tag is attached to an object. In step 850, the tag-specific ID, including the authentication data is read from the removable portion of the tag. In some embodiments, this may include decrypting at least the authentication data in the tag-specific ID. In step 852, an object-specific ID is determined for the object to which the tag is being applied. This may involve reading the object-specific ID from the object, or (as discussed above) otherwise determining an object-specific ID for the object. In some embodiments, the object-specific ID may include information such as a serial number, a batch number, and/or a manufacturing date.
[0069] At step 854, an object-specific tag, including the object-specific ID and the authentication data from the tag-specific data is produced. In some embodiments, this may include encrypting at least the authentication data. In some embodiments, producing the object-specific tag may be accomplished by printing the object-specific ID, for example, as a datamatrix or other two-dimensional barcode.
[0070] At step 856, the tag-specific ID is removed from the tag, and the object-specific tag and the inherent-disorder feature (from which the tag-specific ID has been removed) are applied to the object. In some embodiments, removing the tag-specific ID may be accomplished by removing the tag from its backing for application to the object. In some embodiments, the tag-specific ID may be printed on a removable portion of the tag, which may be removed either before or after the tag is applied to the object. In some embodiments, the object specific tag may be printed or otherwise produced on a nonremovable portion of a tag that includes the inherent disorder feature. For example, when the magnetic particle-based inherent disorder feature discussed above is used, the object- specific tag, including the authentication data, could be printed over the area that includes the inherent disorder feature. As above, it will be understood that the steps shown in FIGs. 8A and 8B need not be applied in the order in which they are shown and described.
[0071] While the invention has been particularly shown and described with reference to specific embodiments, it should be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. The scope of the invention is thus indicated by the appended claims and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced.
Claims
1. A method of associating a database index with an authentication tag, the method comprising:
determining an object-specific ID for an object to which the tag is to be attached; reading a tag-specific ID from the tag;
instructing a database storing data relating to an inherent disorder feature of the tag sufficient to authenticate the tag to allow the data associated with the tag-specific ID to be accessed using the object-specific ID as an index;
removing the tag-specific ID from the tag; and
attaching the tag to the object.
2. The method of claim 1, wherein removing the tag-specific ID from the tag comprises, removing a removable portion of the tag on which the tag-specific ID is disposed.
3. The method of claim 2, wherein removing a removable portion of the tag comprises removing a removable portion of the tag comprises removing a portion of the tag including a barcode that encodes the tag-specific ID.
4. The method of claim 2 or claim 3, wherein removing a removable portion of the tag comprises peeling the tag away from a backing, leaving excess material on which the tag- specific ID is disposed.
5. The method of claim 2 or claim 3, wherein removing a removable portion of the tag comprises peeling a backing off of the tag, wherein the tag-specific ID is disposed on the backing.
6. The method of claim 2 or claim 3, wherein removing a removable portion of the tag comprises removing a tear-off portion of the tag, wherein the tag-specific ID is disposed on the tear-off portion.
7. The method of any of the preceding claims, wherein removing the tag-specific ID from the tag further comprises discarding the tag-specific ID.
8. The method of any of the preceding claims, in which determining an object-specific ID for an object to which the tag is to be attached comprises reading an identification feature on the object.
9. A method for enrolling data relating to an authentication tag in a database, the method comprising:
enrolling data relating to an inherent disorder feature of the authentication tag in a database, the data sufficient to use the inherent disorder feature to authenticate the tag; associating a tag-specific ID with the authentication tag, the tag-specific ID usable as a database index to access the data relating to the inherent disorder feature of the authentication tag in the database; and
removably recording the tag-specific ID on a portion of the tag.
10. The method of claim 9, wherein removably recording the tag-specific ID comprises printing a barcode on a removable portion of the tag.
1 1. The method of claim 9 or claim 10, wherein removably recording the tag-specific ID comprises recording the tag-specific ID on an excess portion of the tag that remains when the tag is peeled away from a backing.
12. The method of claim 9 or claim 10, wherein removably recording the tag-specific ID comprises recording the tag-specific ID on a backing portion of the tag that is removed when the tag is attached to an object.
13. The method of claim 12, wherein removably recording the tag-specific ID comprises recording the tag-specific ID on a back surface of the backing portion of the tag.
14. The method of claim 9 or claim 10, wherein removably recording the tag-specific ID comprises recording the tag-specific ID on a tear-away portion of the tag.
15. A tag for use in authentication applications, the tag comprising:
an inherent disorder feature disposed on a first portion of the tag, the inherent disorder feature usable to authenticate the tag; and
a tag-specific ID disposed on a second portion of the tag, the tag-specific ID usable as a database index to access data relating to the inherent disorder feature in a database to authenticate the tag;
wherein the second portion of the tag is removable, such that the tag-specific ID is removed from the tag when the tag is affixed to an object.
16. The tag of claim 15, wherein the tag-specific ID is recorded as a barcode.
17. The tag of claim 16, wherein the barcode comprises a two-dimensional barcode symbology.
18. The tag of claim 15, wherein the inherent disorder feature comprises an inherent disorder feature based on magnetic particles.
19. The tag of claim 15, wherein the inherent disorder feature comprises an inherent disorder feature based on the three-dimensional layout of bubbles in a transparent polymer.
20. The tag of claim 15, wherein the second portion of the tag is an excess portion that is left after the tag is removed from its backing.
21. The tag of claim 15, wherein the second portion of the tag is a backing portion that is separated from the tag when the tag is affixed to an object.
22. The tag of claim 21, wherein the tag-specific ID is disposed on a back surface of the backing portion.
23. The tag of claim 15, wherein the second portion of the tag is a tear-away portion, that is configured to be separated from the tag.
24. A method of adding authentication data relating to an inherent-disorder feature to an object-specific tag comprising:
determining an object-specific ID for an object to which the tag is to be attached; reading a tag-specific ID from the tag, the tag-specific ID including authentication data sufficient to authenticate an inherent disorder feature of the tag;
producing an object-specific tag including the object-specific ID and the authentication data;
removing the tag-specific ID from the tag that includes the inherent disorder feature; and
attaching the object-specific tag and the inherent disorder feature to the object.
25. The method of claim 24, wherein reading a tag-specific ID further comprises decrypting the authentication data.
26. The method of claim 24, wherein producing an object-specific tag further comprises encrypting the authentication data.
27. The method of claim 24, wherein the object-specific tag is produced on a nonremovable portion of a tag that includes the inherent disorder feature.
28. The method of producing a tag including an inherent disorder-based authentication feature, the method comprising:
reading an inherent disorder feature on a tag to obtain authentication data sufficient to authenticate the inherent disorder feature on the tag; and
removably recording a tag-specific ID on the tag, the tag-specific ID including the authentication data.
29. The method of claim 28, wherein removably recording the tag-specific ID on the tag further comprises encrypting the authentication data.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161466980P | 2011-03-24 | 2011-03-24 | |
| US61/466,980 | 2011-03-24 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012128724A1 true WO2012128724A1 (en) | 2012-09-27 |
Family
ID=46879628
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/SG2012/000101 Ceased WO2012128724A1 (en) | 2011-03-24 | 2012-03-26 | Inherent disorder-based tags having a removable identification feature |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2012128724A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015140731A1 (en) * | 2014-03-18 | 2015-09-24 | 3D-Oxides | Deposition process based on stencil mask and application to the fabrication of tags supporting multi-functional traceable codes |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2006016114A1 (en) * | 2004-08-13 | 2006-02-16 | Ingenia Technology Limited | Authenticity verification of articles using a databases |
| WO2009105040A1 (en) * | 2008-02-19 | 2009-08-27 | Bilcare Technologies Singapore Pte. Ltd. | A reading device for identifying a tag or an object adapted to be identified, related methods and systems |
| US20100179914A1 (en) * | 2008-12-08 | 2010-07-15 | Basf Se | Marking of products |
| WO2012033467A1 (en) * | 2010-09-08 | 2012-03-15 | Bilcare Technologies Singapore Pte. Ltd. | An integrated unit for reading identification information based on inherent disorder |
-
2012
- 2012-03-26 WO PCT/SG2012/000101 patent/WO2012128724A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2006016114A1 (en) * | 2004-08-13 | 2006-02-16 | Ingenia Technology Limited | Authenticity verification of articles using a databases |
| WO2009105040A1 (en) * | 2008-02-19 | 2009-08-27 | Bilcare Technologies Singapore Pte. Ltd. | A reading device for identifying a tag or an object adapted to be identified, related methods and systems |
| US20100179914A1 (en) * | 2008-12-08 | 2010-07-15 | Basf Se | Marking of products |
| WO2012033467A1 (en) * | 2010-09-08 | 2012-03-15 | Bilcare Technologies Singapore Pte. Ltd. | An integrated unit for reading identification information based on inherent disorder |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2015140731A1 (en) * | 2014-03-18 | 2015-09-24 | 3D-Oxides | Deposition process based on stencil mask and application to the fabrication of tags supporting multi-functional traceable codes |
| US10280506B2 (en) | 2014-03-18 | 2019-05-07 | 3D-Oxides | Deposition process based on stencil mask and application to the fabrication of tags supporting multi-functional traceable codes |
| CN110079783A (en) * | 2014-03-18 | 2019-08-02 | 3D-奥克赛茨公司 | Label apparatus, its purposes and the packaging for label apparatus |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5235868B2 (en) | Object identification method and reading device | |
| US8297523B2 (en) | Secure barcode | |
| US20090309733A1 (en) | Identification tags, objects adapted to be identified, and related methods, devices and systems | |
| US9950553B2 (en) | Process of forming an identification marking, and an identification marking formed by way of such a process | |
| US20100001862A1 (en) | Method for authenticating radio frequency identification | |
| CN102163291A (en) | Laser marking multi-encrypted two-dimensional code fingerprint anti-counterfeit authentication method and system | |
| JP2015526946A (en) | A method for unambiguous marking of objects | |
| US12335736B2 (en) | Devices, systems, and methods using microtransponders | |
| WO2015128629A1 (en) | Product authentication | |
| RU2165643C1 (en) | Information authenticating method | |
| RU2534952C1 (en) | Method of labelling product or articles for identification and counterfeit protection thereof | |
| JP2010518473A (en) | Virtual code window | |
| DE112021000421B4 (en) | Mechanically pressed-in distinctive features for authenticity and traceability | |
| BG66377B1 (en) | Encoded marking and a method for protection and certification the authenticity of products | |
| WO2012128724A1 (en) | Inherent disorder-based tags having a removable identification feature | |
| JP2005338669A (en) | Authenticity determination body, authenticity determination article, and authentication method | |
| CN201662818U (en) | Anti-fake certification device with laser-marking and multi-encrypting two-dimensional code fingerprint | |
| RU2759259C1 (en) | Object marking and authentication system | |
| WO2024033960A1 (en) | Tag for article identification, article identification system, and article identification method | |
| WO2013064806A1 (en) | Identification arrangement | |
| AU2013101090A4 (en) | Secure Object System | |
| CN104881784A (en) | Product authentication | |
| GB2524099A (en) | Secure product authentication | |
| CN109447213A (en) | The method for anti-counterfeit of two dimensional code complementation identification | |
| JP2005010948A (en) | True / false judgment system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12760361 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12760361 Country of ref document: EP Kind code of ref document: A1 |