[go: up one dir, main page]

GB2379409A - Micro-particle coded security tag - Google Patents

Micro-particle coded security tag Download PDF

Info

Publication number
GB2379409A
GB2379409A GB0106640A GB0106640A GB2379409A GB 2379409 A GB2379409 A GB 2379409A GB 0106640 A GB0106640 A GB 0106640A GB 0106640 A GB0106640 A GB 0106640A GB 2379409 A GB2379409 A GB 2379409A
Authority
GB
United Kingdom
Prior art keywords
security tag
tag according
security
markers
tags
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0106640A
Other versions
GB0106640D0 (en
GB2379409B (en
Inventor
John Anthony Yandell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0106640A priority Critical patent/GB2379409B/en
Publication of GB0106640D0 publication Critical patent/GB0106640D0/en
Publication of GB2379409A publication Critical patent/GB2379409A/en
Application granted granted Critical
Publication of GB2379409B publication Critical patent/GB2379409B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A security tag has coded indicia on its surface to enable tags to be uniquely identified. Tags are typically of the order of 50 micrometres in size and are substantially invisible to the naked eye. The markings 10,11,12 may take the form of, for example, a triangle, a square or a circle. Null markers 14 and an orientation marking 6 may also be included. The tag surface shape may also represent an identification code. The tag may have an inbuilt transmitter 26, powered by a battery 20 and/or solar cell 22. The transmitter may be activated by an external stimulus such as a change in ambient temperature or pressure. Tags may be dispersed in a carrier agent such as paint, glaze or ink. They may be included in a spoiling agent such as smoke as part of a method to identify stolen goods. The spoiling agent may be discharged into a protected area containing, for example, bank notes, upon activation of a delivery system.

Description

<Desc/Clms Page number 1>
SECURITY TAG The present invention relates to a security tag and associated security devices incorporating such a security tag. The tag can be deployed by a delivery system during an attempted theft.
The use of smoke, dyes and inks to degrade or stain money during a robbery is a commonly known deterrent. However, the spoiling agents commonly used do not allow the stained money, or indeed an individual stained by the spoiling agent, to be linked to a particular robbery or incident because the spoiling agent employed in an incident cannot be distinguished from those employed in other incidents. This limits the forensic value of recovered stained material because it cannot be used as evidence by the police of the commission of a particular crime. Furthermore, neither can recovered stained items, and in particular money, be easily returned to their rightful owner because it is not possible to distinguish similar items that have been stained in separate incidents.
One solution to this problem is the use of a variety of rare base elements as additives to the spoiling agents. By adding varying quantities of each individual base element to the spoiling agent a unique spectral signature can be generated for each spoiling agent.
However, such additives are very expensive and can only be used in liquid systems.
Additionally, these additives also have the disadvantage of having a relatively short storage life of approximately two years.
The deterrent value of spoiled or stained money is greatly increased if such stained money can be removed from general circulation. However, bank notes that have been stained in such a manner during a robbery are not presently easily detected by the bank note processing machines currently used within the banking system, and in particular by the high speed counting machines. There is therefore a need for an improved means of detecting such stained notes to facilitate easy removal of them from the banking system.
Identification of valuable objects by the application of the serial numbers printed onto small dots of material that are dispensed within a glue is also a well used strategy to deter
<Desc/Clms Page number 2>
robbery. An example of one such system is the'Alpha Dot'system produced by Alpha Scientific Limited and described in EP 760991B. The size of each dot is generally about 1 or 2mm, this size making it easy for the police to read the serial number using a hand-held magnifying glass but equally has the disadvantage that the dots are relatively easy for a criminal to see and remove. It would therefore be beneficial to provide a similar marking system wherein the individual markers were of a much reduced size so that they were not visible to the human eye.
According to a first aspect of the present invention there is provided a security tag having a physical structure providing a means of identifying the tag, wherein the security tag is difficult to locate with the naked eye by virtue of its small size, and wherein the tag has a plurality of markings on the surface of the tag, the markings being selected from a plurality of shapes.
Advantageously, each individual marking may have one of two states. The states may correspond to set and not set, such that the markers can form a binary type code. The markings may be formed as depressions in the surface of the security tag or a portion protruding from the surface. Each state corresponds to a predetermined value whereby the plurality of individual markings comprises an identification code. Since each individual marking may be one of a plurality of different shapes, coding can be performed by the presence or absence of a marker, and the shape of the marker.
Preferably the security tag has one of a plurality of predetermined shapes, each shape representing an identification code. Each shape may be a relatively simple geometric shape, such as a regular polygon.
Additionally, each security tag may have at least one manufactured irregularity formed thereon. The manufactured irregularity may be a recess formed in perimeter of a shape or a projection formed in the perimeter of the shape.
The unique physical structure of the security tag may be viewed with an optical microscope.
<Desc/Clms Page number 3>
Additionally or alternatively, the security tag may comprise a transmitter, the transmitter transmitting a signal indicating the presence of the security tag. The signal may also include an identification code.
Preferably, the transmitter is associated with a power source. The power source may be arranged to be activated in response to an externally applied stimulus. The externally applied stimulus may be either a change of ambient pressure, a change of ambient temperature, an electrical signal or an applied magnetic field. Alternatively, the transmitter may be arranged to be inductively coupled to an external power supply.
Preferably the transmitted signal may be either an electromagnetic signal or an optical signal.
According to a further embodiment of the present invention there is provided a spoiling agent for use in a spoiling agent delivery system, the spoiling agent comprising a carrier agent including a plurality of security tags, which tags are difficult to locate with or substantially invisible to the naked eye by virtue of their small size.
In further embodiments of the present invention the security tags may be included within a carrier agent that is suitable for direct application onto an object to be marked by such tags.
The carrier agent may be an adhesive, paint, pottery glaze or ink.
According to a third aspect of the present invention there is provided a method of identifying stolen goods, comprising the steps of : providing a spoiling agent comprising a plurality of markers, said markers being members of a batch such that markers within said batch carry a shared identification whilst markers from a first batch are distinguishable from other batches and sufficiently small that they are difficult to locate with the naked eye; and
<Desc/Clms Page number 4>
providing a delivery system, such that if an attempt is made to steal goods from a protected region, the delivery system is actuated to deliver the markers to the goods such that at least a proportion of the markers attach to the goods.
Preferably a trusted authority maintains a record of when a theft occurred and which batch of markers were released to mark the stolen goods. Thus once goods, such as bank notes are recovered, they can be identified and/or associated with a specific theft.
According to a further aspect of the present invention there is provided a security tag comprising a machine detectable device, and wherein the security tag is difficult to locate with or substantially invisible to the naked eye due to its small size.
Preferably the security tag includes a transmitter which transmits an identifying signal. The transmitter may only become active when in the presence of a"wake up"signal. Such a signal may be issued by an automated note counting machine or by a handheld unit.
The present invention will now be described, by way of example, with reference to the accompanying drawings, in which: Figure I shows a first embodiment of the present invention with a square surface on which an identification code is marked; Figure 2 shows a further alternative embodiment of the security tag in which the shape of the surface having the identification code thereon is a pentagon ; Figure 3 shows an embodiment of the present invention having a transmitter located thereon; and Figure 4 shows a delivery system according to a further embodiment of the invention.
Figure I shows a plan view of a surface of a security tag 1 according to an embodiment of the present invention. The shape of the surface shown is a square. As illustrated later,
<Desc/Clms Page number 5>
other shapes may be provided such that individual security tags may be distinguished by virtue of their different shapes. The surface of the tag 1 has a number of individual markings 10, 11, 12,14 formed on it. Each marking 10, 11, 12,14 may either be made by forming a depression 4 in the surface of the security tag or by forming a raised portion 2 protruding from the surface of the security tag or a region where a marking would be expected but is not formed. In this way it is possible to arrange for each marking to have one of two states. Arranged on a further part of the surface 1 there is an orientation marking 6 comprising an enlarged impression formed in the surface. The orientation marking 6 is located on the surface of the security tag at such a location in that it provides a reference point for reading the individual markings in the correct order in order to establish an identification code represented by the markings. In the example shown in Figure 1 the identification code is intended to be read in a row by row fashion left to right when the orientation marking is located in the upper left-hand corner of the surface.
In the example shown in Figure 1 the individual markings may either be a triangle 10 a square 11, a circle 12 or a null marker (in this case represented by outline square 14). In this case the base of the identification code is base 4, with a triangle 10 representing the digit 1, square 11 representing a 2, and circle 12 representing the digit 3, and in the null marker representing zero the identification code illustrated in Figure 1 corresponds to the base 4 number 123032103210. The absence of a marking, or only a faintly or partially formed marking may represent a zero.
Also shown in Figure 1 are two further identifying marks 16 that may be provided to further individualise the structure of the security tag. The further markings 16 shown in Figure 1 are grooves formed in the peripheral edge of the security tag. Although two grooves are shown in Figure 2 on adjacent sides of the square surface, any number of grooves may be provided at various locations around the periphery of the surface in order to further distinguish one security tag from another. Equally, instead of using grooves formed in the periphery of the surface, projections may be formed serving the same purpose as the groove. It will be appreciated that the or each further marking 16 may also be used on security tags that do not have individual markings formed on the surface of the tag, in which case it is only the combination of the shape of the cross-sectional surface of
<Desc/Clms Page number 6>
the security tag and the location and number of the additional markings that distinguishes one security tag from another.
As already mentioned, the shape of the surface of the security tag may be any one of a number of different shapes. It is preferred, although not necessary, that each shape be a regular polygon. There is shown in Figure 2 a security tag having the shape of a regular pentagon. In addition to the differently shaped surface, the security tag in Figure 2 also includes individual markings 10,11, 12,14 in a similar manner to the security tag in Figure 1, and also includes an orientation marking 6. In the example shown in Figure 2 the identification code reads 333222111000.
It is calculated that by using a combination of the identification marks on the surface of the security tag and around the peripheral edges, together with differently shaped cross-sectional surfaces, it is possible to generate approximately 1,600 million differently structured security tags.
The unique structure of the security tags, and indeed the actual security tags themselves, are invisible or substantially invisible to the human eye due to their particularly small size. In preferred embodiments each security tag has a maximum dimension of between 2 and 60 microns, although a favoured range of dimension is between 40 and 60 microns. Although particles of this size may be easily inhaled it has been found that particles in this particular range do not pose a significant health risk. The particles are produced at this very small scale using conventional lithographic masking and etching techniques, as are well known in the semiconducter industry. Thus many thousands of individual tags, each bearing the same identity can be formed on a wafer by masking and etching. Grooves can be etched around each tag, such that the tags can be separated from each other in a final etching step.
Although substantially invisible to the naked human eye, the unique structure of the security tag together with any identification code formed thereon is easily examined using conventional laboratory microscopes, such as an optical microscope.
<Desc/Clms Page number 7>
Figure 3 shows an alternative embodiment of the security tag of the present invention. Figure 3 shows the general components of a security tag having an inbuilt transmitter. In the embodiment shown, the tag comprises a battery, such as a thick film battery 20, a solar cell 22, an active transmitter circuit 26 and a passive communication circuit 28. Also included in the security tag is control circuitry 24. All of the elements of the security tag shown in Figure 3 are manufactured using known integrated circuit techniques. The various components shown in Figure 3 may be provided either in addition to the physical structure previously described in relation to Figures 1 or 2, or may be provided as an alternative arrangement.
The security tag shown in Figure 3 is arranged to transmit an identification signal using the active transmitter 26 when activated by an external stimulus. The power necessary for such transmission is supplied by the battery 20 in addition to, or as an alternative to power provided by the solar cell 22. The external stimulus provided to activate the transmitter 22 may be an electrical signal or may be a change in one or more of the ambient physical parameters experienced by the security tag. For example, a transmitter may be activated in response to a change in the ambient pressure or temperature. Such a change in pressure or temperature may be detected by a sensor 30 included in the security tag. A control circuit 24 is provided to control the operation of the sensor 30 and transmitter 26. The transmitter 26 may transmit a predefined encoded signal, the encoded signal being unique to each particular security tag, or may simply transmit a signal indicative of the presence of the security tag.
In an alternative arrangement (not shown) the security tag of Figure 3 may be provided without a battery 20 or solar cell 22, in which case the power for the transmitter 26 must be supplied from an external source. For example, the transmitter 26 may be inductively coupled to an externally applied alternating magnetic field. In this case the externally applied alternating magnetic field may be generated by a detection probe used to detect the presence of the security tag on an object.
The security tags according to any of the previously described embodiments may be used to protect a variety of valuable objects in a variety of methods. A batch of security tags all
<Desc/Clms Page number 8>
with the same unique structure may be included within a spoiling agent within a conventionally known spoiling agent delivery system such as a cash-in-transit delivery system, such that if the spoiling agent is caused to be applied to the bank notes being carried, the bank notes are also covered in a number of security tags. Because the security tags have a unique identifying structure, recovered bank notes may be linked to a particular incident. Equally, any unauthorised person causing the spoiling agent to be activated is also likely to have a number of the security tags adhered to themselves such that any security tag recovered from individual by conventional forensic techniques can be used to link the individual with a particular incident.
An example of such a delivery system is shown in Figure 4, in combination with a security container 40. The delivery system includes a spoiling agent reservoir 46, the spoiling agent including a single batch of security tags, connected to an actuator 48. The actuator is connected to the reservoir by a conduit 50 and to a delivery pipe 52. In the event of the delivery system being actuated, the actuator 48 causes the spoiling agent held in the reservoir 46 to be pumped through the delivery pipe 52 and into a protected area 44 via outlet nozzles 54. Consequently any valuables held in the protected area, such as bank notes 42 in Figure 5, are marked by the spoiling agent and have a number of security tags attached.
Equally, bank notes that have been marked by a spoiling agent including security tags according to the embodiment described with reference to Figure 3, but in such a manner that they have not been removed from circulation, may be easily identified by applying an activation signal in the vicinity of the bank notes in order to activate the transmitter 26, thus easily signalling their presence.
Because of the small size of the security tags they may be included in a variety of carrier agents allowing them to be applied to a variety of objects to be protected. For example the security tags may be included in ink based spoiling agents, or smoke based spoiling agents as described above, or may be included in an ink used for a marker pen, or in an adhesive. The security tags may also be included within paint such that individual works of art may
<Desc/Clms Page number 9>
be protected, or used in pottery glaze such that valuable items of pottery or sculpture may equally be protected.

Claims (27)

  1. CLAIMS 1. A security tag having a physical structure providing a means of identifying the tag, wherein said security tag is difficult to locate with the naked eye by virtue of its small size, and the tag has a plurality of markings on a surface of the tag, the markings being selected from a predefined plurality of shapes.
  2. 2. A security tag according to claim 1, wherein each marking has one of two states.
  3. 3. A security tag according to claim 2, wherein the states may correspond to set and not set.
  4. 4. A security tag according to claim 2 or 3, wherein each of the states is formed from one of a depression in the surface of the security tag, a portion protruding from said surface and the absence of one of said markings.
  5. 5. A security tag according to claim 2,3, or 4, wherein each state corresponds to a predetermined value whereby said plurality of individual markings comprise an identification code.
  6. 6. A security tag according to any preceding claim, wherein said security tag has one of a plurality of predetermined shapes, each shape representing an identification code.
  7. 7. A security tag according to claim 6, wherein said shape is a regular polygon.
  8. 8. A security tag according to claim 6 or 7, wherein said identification code further comprises at least one manufactured irregularity in said shape.
  9. 9. A security tag according to claim 8, wherein said manufactured irregularity is a recess formed in the perimeter of the shape.
    <Desc/Clms Page number 11>
  10. 10. A security tag according to claim 9, wherein said manufactured irregularity is a projection formed on the perimeter of the shape.
  11. 11. A security tag according to any preceding claim wherein said physical structure is visible when viewed with an optical microscope.
  12. 12. A security tag according to any preceding claim wherein said tag further comprises a transmitter.
  13. 13. A security tag according to claim 12, wherein said transmitter transmits a signal indicating a presence of the security tag.
  14. 14. A security tag according to claim 13, wherein said signal includes an identification code.
  15. 15. A security tag according to claim 13,14, or 15, wherein said transmitter is associated with a power source.
  16. 16. A security tag according to claim 15, wherein said power source is arranged to be activated in response to an externally applied stimulus.
  17. 17. A security tag according to claim 16, wherein said externally applied stimulus may be one from a change of ambient pressure, a change of ambient temperature, an electrical signal and an applied magnetic field.
  18. 18. A security tag according to claim 12,13 or 14, wherein said transmitter is arranged to be inductively coupled to an external power supply.
  19. 19. A security tag according to any one of claims 13 to 18, wherein said signal may be one from an electromagnetic signal and an optical signal.
    <Desc/Clms Page number 12>
  20. 20. A security tag according to any preceding claim, wherein said security tag has a dimension of between 2 and 60 microns.
  21. 21. A security tag according to claim 20, wherein said security tag has a dimension of between 40 and 60 microns.
  22. 22. A spoiling agent for use in a spoiling agent delivery system said spoiling agent comprising a carrier agent including a plurality of security tags according to any preceding claim.
  23. 23. A carrier agent containing a plurality of security tags as claimed in any one of claims 1 to 21, wherein said carrier agent is suitable for application onto an object to be marked by said tags.
  24. 24. A carrier agent according to claim 23, wherein said carrier agent is one from an adhesive, paint, pottery glaze and ink.
  25. 25. A method of identifying stolen goods, comprising the steps of : providing a spoiling agent comprising a plurality of markers, said markers being members of a batch wherein markers within said batch carry a shared identification whilst markers from a first batch are distinguishable from other batches and wherein the markers are sufficiently small that they are difficult to locate with the naked eye; and providing a marker delivery system, such that if an attempt is made to steal goods from a protected region, the marker delivery system is actuated to deliver the markers to the goods such that at least a proportion of the markers attach to the goods.
    <Desc/Clms Page number 13>
  26. 26. A method according to claim 25, wherein a trusted authority maintains a record of when a theft occurred and which batch of markers were released to mark the stolen goods, whereby recovered stolen goods can be identified and associated with a specific theft, recorded by said trusted authority.
  27. 27. A security tag substantially as described and/or as shown in the accompanying figures.
GB0106640A 2001-03-16 2001-03-16 Security tag Expired - Fee Related GB2379409B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0106640A GB2379409B (en) 2001-03-16 2001-03-16 Security tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0106640A GB2379409B (en) 2001-03-16 2001-03-16 Security tag

Publications (3)

Publication Number Publication Date
GB0106640D0 GB0106640D0 (en) 2001-05-09
GB2379409A true GB2379409A (en) 2003-03-12
GB2379409B GB2379409B (en) 2005-10-19

Family

ID=9910914

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0106640A Expired - Fee Related GB2379409B (en) 2001-03-16 2001-03-16 Security tag

Country Status (1)

Country Link
GB (1) GB2379409B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2407798A (en) * 2003-11-05 2005-05-11 Micro Tag Technologies Ltd Production of two sided microdots
EP2002988A3 (en) * 2007-06-15 2010-10-20 Complicity Limited Cash/Valuable Degradation System

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4390452A (en) * 1979-08-20 1983-06-28 Minnesota Mining & Manufacturing Company Microparticles with visual identifying means
GB2289150A (en) * 1994-04-25 1995-11-08 Univ Hertfordshire Coded items for labelling objects
US5744223A (en) * 1993-10-16 1998-04-28 Mercedes Benz Ag Marking of vehicles to hinder theft and/or unauthorized sale
GB2334347A (en) * 1998-02-13 1999-08-18 Univ Hertfordshire Method of fabricating coded particles
EP0978373A2 (en) * 1998-08-06 2000-02-09 Sicpa Holding S.A. Inorganic sheet for making pigments

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5594228A (en) * 1988-08-25 1997-01-14 Symbol Technologies, Inc. Self-checkout, point-of-transaction system including deactivatable electro-optically coded surveillance tags
US6028518A (en) * 1998-06-04 2000-02-22 Checkpoint Systems, Inc. System for verifying attachment of an EAS marker to an article after tagging

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4390452A (en) * 1979-08-20 1983-06-28 Minnesota Mining & Manufacturing Company Microparticles with visual identifying means
US5744223A (en) * 1993-10-16 1998-04-28 Mercedes Benz Ag Marking of vehicles to hinder theft and/or unauthorized sale
GB2289150A (en) * 1994-04-25 1995-11-08 Univ Hertfordshire Coded items for labelling objects
GB2334347A (en) * 1998-02-13 1999-08-18 Univ Hertfordshire Method of fabricating coded particles
EP0978373A2 (en) * 1998-08-06 2000-02-09 Sicpa Holding S.A. Inorganic sheet for making pigments

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2407798A (en) * 2003-11-05 2005-05-11 Micro Tag Technologies Ltd Production of two sided microdots
GB2407798B (en) * 2003-11-05 2005-11-23 Micro Tag Technologies Ltd Production of microdots
EP2002988A3 (en) * 2007-06-15 2010-10-20 Complicity Limited Cash/Valuable Degradation System

Also Published As

Publication number Publication date
GB0106640D0 (en) 2001-05-09
GB2379409B (en) 2005-10-19

Similar Documents

Publication Publication Date Title
CA2570393C (en) Item carrying at least two data storage elements
EP2248067B1 (en) A reading device for identifying a tag or an object adapted to be identified, related methods and systems
US20020135481A1 (en) Tamper evident smart label with RF transponder
EP1646972B1 (en) Chip card including tamper-proof security features
US20020084329A1 (en) Coded items for labeling objects
CN101516635B (en) Anti-counterfeit marking for products, anti-counterfeit packaging and method for detecting counterfeit products
JPH10504112A (en) Coded articles for labeling objects
EP3297934B1 (en) Package for multi-instance photosensitive authentication
US10496916B1 (en) Screen protector article with identification functionality
WO2000016287A1 (en) Product authentication indicia concealed in magnetomechanical eas marker
JP2010518473A (en) Virtual code window
GB2379409A (en) Micro-particle coded security tag
EP0730250A1 (en) Recording card and recording method for two-dimensional code
EP2189390B1 (en) Safety case for precious stones, such as diamonds, pearls, coins, postage stamps and similar valuable articles
US20240331513A1 (en) Tamper-resistant security for artworks and collectibles
WO2009150622A2 (en) Encrypted marking and method for securing and certifying the authenticity of a product
RU44855U1 (en) SYSTEM OF IDENTIFICATION OF MATERIAL OBJECTS, LABELED MATERIAL OBJECT AND KIT OF MEANS FOR LABELING OF MATERIAL OBJECT
CN222190145U (en) Anti-fake ship plate
KR200234879Y1 (en) sticker for identification of automobile
RU2477531C1 (en) Apparatus for protecting commodity from counterfeit
RU5662U1 (en) IDENTIFICATION LABEL
JP2002347144A (en) Label manufacturing method and label
EP2002988A2 (en) Cash/Valuable Degradation System
JP5585019B2 (en) Non-contact IC card manufacturing method
JP2002173189A (en) Discriminating and management method for contact lens blister case

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20130316