WO1999045512A1 - Method for protecting the identity of objects and device for performing the method - Google Patents

Method for protecting the identity of objects and device for performing the method Download PDF

Info

Publication number
WO1999045512A1
WO1999045512A1 PCT/EP1998/001251 EP9801251W WO9945512A1 WO 1999045512 A1 WO1999045512 A1 WO 1999045512A1 EP 9801251 W EP9801251 W EP 9801251W WO 9945512 A1 WO9945512 A1 WO 9945512A1
Authority
WO
WIPO (PCT)
Prior art keywords
capsule
chip
identity
loop
terminal
Prior art date
Application number
PCT/EP1998/001251
Other languages
French (fr)
Inventor
Joergen Brosow
Original Assignee
Siemens Aktiengesellschaft
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Aktiengesellschaft filed Critical Siemens Aktiengesellschaft
Priority to EP98920474A priority Critical patent/EP1058918B1/en
Priority to JP2000534982A priority patent/JP2002506237A/en
Priority to PCT/EP1998/001251 priority patent/WO1999045512A1/en
Priority to AU73325/98A priority patent/AU761006B2/en
Priority to DE69806272T priority patent/DE69806272T2/en
Priority to ES98920474T priority patent/ES2178833T3/en
Priority to AT98920474T priority patent/ATE219849T1/en
Publication of WO1999045512A1 publication Critical patent/WO1999045512A1/en
Priority to HK01103936A priority patent/HK1033704A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1445Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable
    • G08B13/1454Circuit arrangements thereof
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/126Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room
    • G08B13/128Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room the housing being an electronic circuit unit, e.g. memory or CPU chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2434Tag housing and attachment details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2448Tag with at least dual detection means, e.g. combined inductive and ferromagnetic tags, dual frequencies within a single technology, tampering detection or signalling means on the tag

Definitions

  • the present invention concerns a method for protecting the identity of objects.
  • the practice of applying protective seals made from sealing wax to documents, particularly to letters and parcels, has been known for centuries. Their purpose is not only to identify the originator or the sender, but also to safeguard the integrity of the enclosure of such documents and thereby to protect such objects against access by unauthorized persons, i.e., to prevent forgery, in short, to protect the identity of the objects.
  • This kind of seal is usually combined with a safety loop that consists of a section of wire and is installed on the measuring instrument in such a manner that the loop will have to be cut or the seal has to be broken in order to remove the safety loop that prevents access to the enclosure of the measuring instrument.
  • a safety loop that consists of a section of wire and is installed on the measuring instrument in such a manner that the loop will have to be cut or the seal has to be broken in order to remove the safety loop that prevents access to the enclosure of the measuring instrument.
  • the meter reader will need to involve an additional person to witness the evidence of tampering or else risk to have the case dismissed for lack of sufficient proof.
  • the object of the present invention is to provide a method for protecting the identity of objects as well as of persons, which assures that the danger that a forgery or a misuse could occur without being recognized is practically eliminated.
  • the inventive method that solves this problem is essentially characterized by the use of a micro-electronic chip that is fastened to the object to be secured and that cannot be separated from the object without destroying detail elements essential to its function.
  • the chip is designed such that nonerasable data that define its identity and thus the identity of the object, such as the place and time of the securing procedure, details about the persons involved in the procedure, etc. , can be stored by means of a terminal through carrier- frequency transmission, and at least a part of the data can subsequently be interrogated via the terminal by authorized persons to check whether manipulations took place with the intention of adversely affecting the identity of the object.
  • the security device If the security device is accessed by authorized persons and a change is made in the object in the intervening time interval, the corresponding new data can be stored and interrogated in analogous fashion.
  • a falsification can be recognized from the fact that the respective identity has either not been issued or is a duplicate of a previously issued identity.
  • chip is to be understood in the broadest possible sense. It includes electrical, electronic as well as optical modules which, based on a program for identity protection, control the component elements which are found in any electronic or optical computing system.
  • a chip of this kind is fastened to a vehicle (the vehicle being the object to be protected) or to an essential part of the same such as an engine block and if the data that define the identity of the vehicle or the engine block are stored in the chip through carrier-frequency transmission by means of the terminal, then this chip, as it forms a single unit with the object that is defined by its data, is an essential and continually available means for identifying the object.
  • the inventive method can also be successfully used in the same manner to protect the identity of objects in the form of documents, such as letters and parcels, in that the previously used wax seal is replaced by the aforementioned chip which is firmly attached to the cover of the letter or parcel. After the chip has been attached to the object, the non-erasable data on the chip that define the identity of the object can be interrogated only by authorized individuals by means of the terminal .
  • the invention further extends to a device for performing the inventive method.
  • This device is essentially characterized by the distinguishing elements stated in claim 2.
  • the term "antenna” as used in this claim and in the further context is to be understood in the broadest sense, including in the sense of a transponder. If the object whose identity is to be protected is, e.g., a valuable boat, a valuable passenger automobile or a valuable truck or even only its engine, the device in a particularly suitable embodiment of the invention is distinguished by the characteristics defined in claim 7.
  • the capsule containing the chip for protecting an object is connected to the latter in such a manner that it will be easy to bring the terminal sufficiently close to the object. In these normal cases, it is particularly practical to form the antenna that is connected to the chip by embedding it in the neutral material of the capsule, preferably a polymer, as a part of the capsule-chip unit.
  • an antenna which is arranged outside of the capsule and connected with the chip in the manner stated in claim 9.
  • This kind of an antenna which is galvanically coupled with the chip and arranged separately outside of the capsule is practical in unfavorable spatial conditions where the terminal cannot be brought into the immediate vicinity of the capsule even for a short time.
  • the non-erasable data on the chip that confirm the identity of the vehicle in accordance with the vehicle documents can be called up from the outside by activating the terminal.
  • a capacitor is connected to the chip in the manner characterized in claim 10.
  • a more elegant possibility of exchanging data between the chip and the terminal is available if the device is designed according to the characteristic elements of claim 11.
  • a battery of the kind provided in claim 11 can be in the form of a so-called long-life battery, i.e., a battery of sufficient capacity to last for a long time, considering the small amount of power needed for a data transmission. A longer lifetime is achieved if in the data interrogation, the data transmission is performed by using a carrier-frequency based energy transmission to the chip.
  • a battery that is located inside the capsule and is rechargeable, according to claim 12 with inductively transmitted energy f om outside the capsule, preferably from the terminal. It is especially advantageous if the battery is integrated into the capsule as an environmentally compatible plastic or foil battery.
  • the examples described above are of the kind where the intended faultless identity protection is already assured by using the chip in a unitary arrangement together with its enclosing capsule and firmly attached to the object to be protected.
  • a further embodiment of the invention is applicable, comprising the distinguishing elements of claim 14.
  • the integrity of the loop is ascertained as long as the relationship between the emitted and the returned signal data remains the same. Also, if the signal data emitted at one end of the loop return in the form of light signals at the other end of the loop, the integrity of the loop is likewise assured. It has proven to be very practical if the identity-protection loop is designed in accordance with the characteristic elements of claim 15.
  • the light conductor comprises a glass fiber cable.
  • an arrangement with the characteristics of claim 17 is very advantageous.
  • a further technical refinement can be advantageous in which the light intensity measured at the receiving end of the loop is compared with the light intensity at the other end of the loop.
  • the conditions are further tightened if the light signals are polarized.
  • a temporary opening of the identity-protection loop in order to illegally access the secured object is impossible under these conditions, not only because of the time that will be needed, but not available, for the repair, but also because of the fact that the original polarity and light intensity cannot be restored at the receiving end.
  • the carrier base that is formed, e.g., of a polymer material and on which the chip is mounted is inevitably destroyed so that the entire capsule-chip unit cannot be used again; this, too, gives assurance against an unauthorized intrusion into the identity protection.
  • the invention is, of course, not restricted to the module elements that have been developed in the past decades for the production of "electronic tags". Rather, it is possible to also use in the production of seals the particularly compact elements that are made from biological molecules, i.e., to make use of the latest breakthroughs in the field of computers (Scientific American, March 1995) .
  • the identity-protection loop is designed instead as a semiconductor chain that is connected with the chip and has the form of a delay chain with a plurality of delay circuit elements, the number of which determines the point in time when the pulse that originated from the chip, after traveling through the delay chain, arrives back at the chip.
  • This semiconductor chain is preferably based on a polymeric carrier material and thus is flexible like a light conductor.
  • the delay time is altered by any change in the number of links in the chain, e.g., by the short-circuiting of time-delay elements. This will be recognized by the chip and interpreted as an intrusion into the identity-protection loop, i.e., as a "breaking of the seal tag" .
  • the electronic circuit of the seal can, of course, be operated in a passive as well as an active mode. In order to operate the semiconductor chain in the passive mode, the carrier frequency may be reduced to a suitable clock frequency by means of a frequency divider.
  • the chip can also register the exact time of the intrusion. If the chip can be supplied with position data from a terminal that incorporates the GPS (Global Positioning System) functions, this makes it possible to also determine and register the location of the intrusion in addition to the time.
  • the aforementioned semiconductor chain can also be designed as a pure resistor chain. For the determination of the delay time, it has proven to be particularly advantageous if the characteristic elements of claim 19 are employed.
  • the identity-protection loop can, as described above, be designed as a light conductor or as a semiconductor chain in the form of a delay line. A further alternative, in which the characteristic elements of claim 33 are employed, has proven to be very advantageous.
  • a device for performing the method according to claim 1 is presented in various embodiments wherein a relatively expensive capsule-chip unit is employed which, when used in combination with an identity-protection loop, in the closed condition will permit no opening of the capsule for separating the two ends of the identity-protection loop without causing the destruction of the loop or the capsule-chip unit.
  • a separation i.e., opening of the loop
  • the relatively inexpensive device representing this variation of the invention in which this possibility is realized is essentially characterized by the distinguishing elements of claim 34.
  • Each of the two ends of the identity-protection loop that is formed by a semiconductor chain is, as a matter of practicality, connected with the associated snap fastener through electrical contacts. Alternatively, the connection can also be made by optical means. It should be mentioned that this less expensive snap fastener version, too, by using a kind of barbed hook on the ball-shaped part that forms one part of the snap fastener, can be designed so that after closing the snap fastener the possibility of reopening is precluded, except by forcing the device and accepting its destruction.
  • Fig. 1 represents a schematic cross-sectional view of a capsule with the inserted ends of an identity-protection loop that is formed by a semiconductor chain
  • Fig. 2 represents a circuit schematic of a semiconductor chain that forms an identity-protection loop
  • Fig. 3 represents a diagram to illustrate the delayed propagation of a pulse in a periodically operated semiconductor chain
  • Fig. 4 represents a cross-sectional view similar to Fig. 1 with an identity-protection loop that is formed by a light conductor
  • Fig. 5 represents a schematic view of a GPS display indication of a GPS recorder that is connected with the capsule-chip unit
  • Fig. 6 represents a top view of one of the snap fastener parts that is formed by a spring component
  • Fig. 7 represents a top view of the snap fastener part of Fig. 6 with a portion broken away to illustrate the chip that is located behind it,
  • Fig. 8 represents two snap fastener parts of a matching pair attached to the corresponding ends of an identity-protection loop.
  • Fig. 1 shows a cylindrical capsule 1 of a neutral material that does not interfere with the function of the identity-protection loop, e.g., a polymer.
  • the capsule is assembled from two capsule parts 2 and 3 into which the respective ends 4 and 5 of an identity-protection loop are inserted.
  • the identity-protection loop in the illustrated example is in the form of a delay line that is formed by a semiconductor chain.
  • the latter comprises, e.g., a sequence of transistors 6 as well as associated R-C elements 7 serving as delay elements.
  • the number of the chain links arranged along the semiconductor chain in the form of R-C elements 7 and transistors 6 determines the travel time T of a pulse from end 4 to the other end 5 of the identity-protection loop.
  • This travel time T of the chain which is an identifying characteristic of the identity loop, is measured at the initialization of the chip and is written into the chip. Given that with every change in the number of chain links the delay, and thereby the travel time, is changed, it is possible to determine by any comparison of the actually measured travel time with the stored characteristic travel time whether the identity-protection loop has remained intact or whether a change in the number of chain links, e.g. , by short-circuiting, has occurred.
  • a clock signal is used for controlling the pulses of a pulse chain.
  • This clock signal is obtained through frequency division, using the carrier-frequency available from the terminal, as indicated schematically by "clock" in Fig. 3.
  • clock Associated with each of the clock intervals 1 , 2 , 3 ... on the X-axis is a corresponding delay t of, e.g., 10, 20, 30 ... milliseconds on the Y-axis.
  • t e.g., 10, 20, 30 ... milliseconds on the Y-axis.
  • the larger part 2 of the capsule contains a chip 8 , an antenna 9, as well as a battery 10.
  • connector sleeves 11 and 12 for the connection of the respective ends 13 and 14 of the identity-protection loop are firmly imbedded in the plastic material, e.g., epoxy resin, of the capsule 1.
  • the end 13 of the loop with the connector sleeve 11 already forms an integral unit with the plastic material of capsule 1.
  • the opposite, free end 14 of the loop runs coaxially with connector sleeve 12 and also with part 3 of the capsule and remains axially movable relative to the latter until the parts are fixedly connected.
  • a tubular guide 15 is helpful, which is provided with a step 16 to limit the travel into the connector sleeve 12 so that the end 14 of the loop at its extremity does not bear against the bottom 17 of the connector sleeve.
  • the chip 8 but also the antenna 9 and the battery 10 are each electrically connected on one side with the electrically conductive connector sleeve 11 and on the other side with the also conductive connector sleeve 12.
  • the two parts 2 and 3 of the capsule can be solidly connected with each other by means of a quick-setting adhesive.
  • a conical adhesive container 18 is attached at one end of the guide 15, which passes coaxially through the container.
  • Adjoining the container 18 is a cylindrical guide 19 which, in a manner not specifically shown, extends into a central opening of part 3 of the capsule, so that part 3 can move along guide 19 in the direction towards part 2 of the capsule. Facing the sloped surface of the adhesive container 18 is a correspondingly sloped exterior surface 20 of part 2 of the capsule. Surface 20 has sharp protrusions 21. Likewise, protrusions 22 of the same kind are provided on the surface portion of part 3 that faces part 2.
  • the walls of the adhesive container 18 that contains the quick- setting adhesive are pierced, i.e., destroyed by the protrusions 21 and 22 when the connection of parts 2 and 3 is closed, so that the adhesive is released and flows to the peripheral area of the part 3 of the capsule, i.e., a cone-shaped contact surface 23, and to the corresponding contact surface 24 of the part 2 of the capsule.
  • the parts that are essential to its function are protected against any intrusion from the outside and thus no longer accessible to manipulations by unauthorized individuals. Any attempt, e.g., to open one of the ends of the identity-protection loop, the equivalent of breaking a conventional lead seal, would cause irreparable and immediately recognizable damage to the functionally essential components.
  • the identity-protection loop is formed by a light-conductor as the conductive core.
  • Chip 8 is again mounted on a polymer film 25 or the like with conductive traces by which the chip communicates with the two ends 4 and 5 of the light conductor, which comprises a glass fiber cable, through light sources 26 and light-sensing semiconductors 27.
  • the light conductor is welded to a prism 28 that is arranged above the light source, and at its other end 5 it is likewise welded to light sensor 27 through a prism 29.
  • the identity-protection loop takes the form of a semiconductor chain in accordance with Figures 1 and 2 , so also when using a loop consisting of a glass fiber cable, there is assurance that intrusions by unauthorized individuals will necessarily cause the destruction of functionally essential parts of the capsule-chip unit 1, and that such intrusions will be immediately recognizable.
  • the required energy is supplied by the battery 10, so that this "seal tag" represents an active unit.
  • the power supply is provided by a capacitor (not shown in the drawing) receiving energy during an active transaction through power emission from the terminal.
  • the mobile terminal used for the surveillance of the capsule- chip units and (if applicable) their associated identity- 10 protection loops enables on the one hand the aforementioned wireless transmission and storage of data in the chip as well as the recall of the data stored in the chip for the purpose of an identity check.
  • the GPS recorder shown in a frontal view in Fig. 5 makes it possible to determine and register the exact location of the intrusive manipulation in the identity-protection loop, i.e., the "breaking of the tag", by means of a special, appropriately equipped transportation terminal.
  • the latter determines in accordance with the known state of the art the current GPS location and writes it to the identity-protection chip. The previous location is thereby overwritten. If the object under surveillance is removed from the surveillance range of the transportation terminal or in case of an identity violation, the last stored location remains on the chip.
  • This function can be operated in a passive as well as an active mode.
  • the required event timing function can be provided in the electronic circuitry of the capsule-chip unit or the terminal.
  • Figures 6 through 8 serve to illustrate another embodiment, in which a snap fastener of the customary design with two fastener components 33 and 34 is being used.
  • the fastener component 33 a spring module with inserted spring 35 in the illustrated example, takes on the function of a comparatively simple embodiment of the capsule. Namely, as shown in Fig. 7 but partially covered by the fastener component, said fastener component 33 comprises the associated chip 8 which is accessed by contacts 36.
  • an opto- coupler 37 comprising, e.g., a light source in the form of a light emitting diode or a light sensor, as also employed in the example of Fig. 4.
  • the fastener part 34 in the shape of a spherical element comprises, e.g., the light source in the form of a light emitting diode that is located at the tip of the ball-shaped projection.
  • this light source works together with the light sensor 37 of Fig. 7.
  • Fig. 8 shows the conductive traces 38 that run along the semiconductor chain of the identity-protection loop, the ends 4, 5 of which can be connected to each other through the snap faster 33, 34.

Abstract

A seal against intrusions into the identity of an object is formed by a capsule that is attached to the object and contains a chip in which identifying data are stored and can be recalled by means of a terminal for an identity check. The seal may include a tie loop incorporating a semiconductor-based delay line or a light-conducting glass fiber cable and can be designed to register intrusive manipulations of the capsule or tie loop.

Description

METHOD FOR PROTECTING THE IDENTITY OF OBJECTS AND DEVICE FOR PERFORMING THE METHOD
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention concerns a method for protecting the identity of objects. The practice of applying protective seals made from sealing wax to documents, particularly to letters and parcels, has been known for centuries. Their purpose is not only to identify the originator or the sender, but also to safeguard the integrity of the enclosure of such documents and thereby to protect such objects against access by unauthorized persons, i.e., to prevent forgery, in short, to protect the identity of the objects.
2. Description of the Related Art
These known measures for protecting the identity of objects have often proved to be inadequate. Not only are the seals broken, whereby unauthorized persons may gain knowledge and take advantage of the sealed objects, it also happens frequently that the contents of the documents are changed, i.e., falsified, before a forged seal is applied in place of the original seal. Another example to be mentioned are the tamper seals, mostly made of lead and known for far over 100 years, that are used to safeguard the object that is to be protected, such as for example a measuring instrument for registering the consumption of electricity, water, gas or thermal energy, against access and manipulation by unauthorized individuals. This kind of seal is usually combined with a safety loop that consists of a section of wire and is installed on the measuring instrument in such a manner that the loop will have to be cut or the seal has to be broken in order to remove the safety loop that prevents access to the enclosure of the measuring instrument. In a practical case where the loop is found cut open or the seal broken or recognized as a forged replacement and the instrument has been tampered with, the meter reader will need to involve an additional person to witness the evidence of tampering or else risk to have the case dismissed for lack of sufficient proof. The preceding examples show that not only document seals can be broken and forged with relative ease; wire seals, too, can be opened usually by destroying them, and with some skill can be closed in a makeshift way after the illegal manipulation or can even be replaced by forged ones. Thus, one concludes that in practice they cannot infallibly perform their intended function of protecting the identity of objects. This problem is all the more aggravated as wire seals in their function as devices for protecting the identity of objects are used in a wide variety of other applications and for the most diverse purposes. Only as examples and not to introduce any restrictions, one might mention trip and flight recorders, storage depots, warehouses, particularly facilities that are officially put under seal by the customs authorities, the load compartments of delivery vehicles that are locked and sealed during transit, freight containers, safety vaults, money-transfer containers, safety- deposit boxes and transportation containers for valuables. As a further known measure for protecting the identity of objects such as vehicles of all kinds, for example automobiles or their engine blocks, combinations of numbers and/or letters are punched into the car body or the engine block for identification. Here, too, it has proved to be a disadvantage that after a vehicle theft it is relatively easy to obliterate this kind of number/letter combination and replace it with a new one that matches forged vehicle documents. As a rule, stolen vehicles prepared in this manner cannot be found and apprehended in road-checks, particularly when crossing national borders, except by extraordinarily time-consuming efforts.
SUMMARY OF THE INVENTION
Therefore, the object of the present invention is to provide a method for protecting the identity of objects as well as of persons, which assures that the danger that a forgery or a misuse could occur without being recognized is practically eliminated.
The inventive method that solves this problem is essentially characterized by the use of a micro-electronic chip that is fastened to the object to be secured and that cannot be separated from the object without destroying detail elements essential to its function. The chip is designed such that nonerasable data that define its identity and thus the identity of the object, such as the place and time of the securing procedure, details about the persons involved in the procedure, etc. , can be stored by means of a terminal through carrier- frequency transmission, and at least a part of the data can subsequently be interrogated via the terminal by authorized persons to check whether manipulations took place with the intention of adversely affecting the identity of the object. If the security device is accessed by authorized persons and a change is made in the object in the intervening time interval, the corresponding new data can be stored and interrogated in analogous fashion. A falsification can be recognized from the fact that the respective identity has either not been issued or is a duplicate of a previously issued identity.
It should be emphasized that the word "chip" is to be understood in the broadest possible sense. It includes electrical, electronic as well as optical modules which, based on a program for identity protection, control the component elements which are found in any electronic or optical computing system. In the practice of the method according to the invention, if a chip of this kind is fastened to a vehicle (the vehicle being the object to be protected) or to an essential part of the same such as an engine block and if the data that define the identity of the vehicle or the engine block are stored in the chip through carrier-frequency transmission by means of the terminal, then this chip, as it forms a single unit with the object that is defined by its data, is an essential and continually available means for identifying the object. In case the vehicle is being checked, a discrepancy between the data in the vehicle documents and the data on the vehicle or in a central data bank that can be interrogated from the chip will be immediately evident, as it is impossible for unauthorized individuals to change the data on the chip, e.g., to match the data on new replacement papers. A theft will be immediately evident in this manner.
The inventive method can also be successfully used in the same manner to protect the identity of objects in the form of documents, such as letters and parcels, in that the previously used wax seal is replaced by the aforementioned chip which is firmly attached to the cover of the letter or parcel. After the chip has been attached to the object, the non-erasable data on the chip that define the identity of the object can be interrogated only by authorized individuals by means of the terminal .
The invention further extends to a device for performing the inventive method. This device is essentially characterized by the distinguishing elements stated in claim 2. The term "antenna" as used in this claim and in the further context is to be understood in the broadest sense, including in the sense of a transponder. If the object whose identity is to be protected is, e.g., a valuable boat, a valuable passenger automobile or a valuable truck or even only its engine, the device in a particularly suitable embodiment of the invention is distinguished by the characteristics defined in claim 7. As a rule, the capsule containing the chip for protecting an object is connected to the latter in such a manner that it will be easy to bring the terminal sufficiently close to the object. In these normal cases, it is particularly practical to form the antenna that is connected to the chip by embedding it in the neutral material of the capsule, preferably a polymer, as a part of the capsule-chip unit.
However, in the aforementioned case where the objects to be protected are of larger dimensions, e.g., if the objects are vehicles, an antenna will be needed which is arranged outside of the capsule and connected with the chip in the manner stated in claim 9. This kind of an antenna, which is galvanically coupled with the chip and arranged separately outside of the capsule is practical in unfavorable spatial conditions where the terminal cannot be brought into the immediate vicinity of the capsule even for a short time. In the case of vehicle checks, particularly border checks, the non-erasable data on the chip that confirm the identity of the vehicle in accordance with the vehicle documents can be called up from the outside by activating the terminal.
For this purpose, according to a first, particularly simple embodiment, a capacitor is connected to the chip in the manner characterized in claim 10.
A more elegant possibility of exchanging data between the chip and the terminal is available if the device is designed according to the characteristic elements of claim 11. A battery of the kind provided in claim 11 can be in the form of a so-called long-life battery, i.e., a battery of sufficient capacity to last for a long time, considering the small amount of power needed for a data transmission. A longer lifetime is achieved if in the data interrogation, the data transmission is performed by using a carrier-frequency based energy transmission to the chip.
As an alternative it is also possible to use a battery that is located inside the capsule and is rechargeable, according to claim 12 , with inductively transmitted energy f om outside the capsule, preferably from the terminal. It is especially advantageous if the battery is integrated into the capsule as an environmentally compatible plastic or foil battery. The examples described above are of the kind where the intended faultless identity protection is already assured by using the chip in a unitary arrangement together with its enclosing capsule and firmly attached to the object to be protected. However, in all those cases where it is usually necessary to use an identity-protection loop with a seal, a further embodiment of the invention is applicable, comprising the distinguishing elements of claim 14. By comparing the signal data emitted at one end of the loop, e.g., in the form of electric pulses, to the signal data returning with a certain delay at the other end of the loop, the integrity of the loop is ascertained as long as the relationship between the emitted and the returned signal data remains the same. Also, if the signal data emitted at one end of the loop return in the form of light signals at the other end of the loop, the integrity of the loop is likewise assured. It has proven to be very practical if the identity-protection loop is designed in accordance with the characteristic elements of claim 15. Preferably, the light conductor comprises a glass fiber cable.
From the point of view of building the device, an arrangement with the characteristics of claim 17 is very advantageous. When light conductors are used in the identity-protection loop, a further technical refinement can be advantageous in which the light intensity measured at the receiving end of the loop is compared with the light intensity at the other end of the loop. The conditions are further tightened if the light signals are polarized. A temporary opening of the identity-protection loop in order to illegally access the secured object is impossible under these conditions, not only because of the time that will be needed, but not available, for the repair, but also because of the fact that the original polarity and light intensity cannot be restored at the receiving end.
In view of the desired degree of security, it is advantageous if in an attempt at opening the capsule and exchanging the light conductor, the carrier base that is formed, e.g., of a polymer material and on which the chip is mounted is inevitably destroyed so that the entire capsule-chip unit cannot be used again; this, too, gives assurance against an unauthorized intrusion into the identity protection.
It needs to be mentioned at this point that it is practical to use the known modern technique of printing semiconductors onto polymer carrier films; see report IEDM (International Electronic Device Meeting) 97/331 "Polymeric Integrated Circuit and Light Emitting Diodes", a report of Philips Research Laboratories. Further, for the production and the design of the chips that are connected to the polymer carrier films, it is efficient to also use the most modern technology that is employed by the firms Texas Instruments, Motorola, and others in the production of the electronic tags that they developed (Scientific American, April 1997, page 32, "Check your bags"). These tags contain a chip that simultaneously performs the functions of a memory, processor, sender, and receiver and is combined with a miniature battery as well as an antenna.
Reference should also be made to the known technology for the wireless remote accessing of identification or communication cards that is being employed here and which is the subject of the international standard ISO/IEC 14.443. The energy transfer from the terminal RCCD (Remote Communication Control Device) to the chip RICC (Remote Interface Communication Card) is taking place at a radio carrier frequency of fc = 13.56 MHz which is amplitude-modulated for the data transmission with a frequency of approximately fs = 850 kHz.
Further, for the sake of completeness it should be mentioned that the invention is, of course, not restricted to the module elements that have been developed in the past decades for the production of "electronic tags". Rather, it is possible to also use in the production of seals the particularly compact elements that are made from biological molecules, i.e., to make use of the latest breakthroughs in the field of computers (Scientific American, March 1995) .
In the above, the possibility of forming an identity-protection loop from a light conductor has been presented. It has been found that a very effective alternative is obtained if the identity-protection loop is designed instead as a semiconductor chain that is connected with the chip and has the form of a delay chain with a plurality of delay circuit elements, the number of which determines the point in time when the pulse that originated from the chip, after traveling through the delay chain, arrives back at the chip. This semiconductor chain is preferably based on a polymeric carrier material and thus is flexible like a light conductor.
It is possible to inscribe the start and delay times into the chip as a part of the initialization and to compare them continually by means of a predetermined clock frequency. Of course, the delay time is altered by any change in the number of links in the chain, e.g., by the short-circuiting of time-delay elements. This will be recognized by the chip and interpreted as an intrusion into the identity-protection loop, i.e., as a "breaking of the seal tag" . The electronic circuit of the seal can, of course, be operated in a passive as well as an active mode. In order to operate the semiconductor chain in the passive mode, the carrier frequency may be reduced to a suitable clock frequency by means of a frequency divider. In the active mode, the chip can also register the exact time of the intrusion. If the chip can be supplied with position data from a terminal that incorporates the GPS (Global Positioning System) functions, this makes it possible to also determine and register the location of the intrusion in addition to the time. The aforementioned semiconductor chain can also be designed as a pure resistor chain. For the determination of the delay time, it has proven to be particularly advantageous if the characteristic elements of claim 19 are employed. The identity-protection loop can, as described above, be designed as a light conductor or as a semiconductor chain in the form of a delay line. A further alternative, in which the characteristic elements of claim 33 are employed, has proven to be very advantageous.
In the above, a device for performing the method according to claim 1 is presented in various embodiments wherein a relatively expensive capsule-chip unit is employed which, when used in combination with an identity-protection loop, in the closed condition will permit no opening of the capsule for separating the two ends of the identity-protection loop without causing the destruction of the loop or the capsule-chip unit. Alternatively, however, it is possible to provide the possibility for a separation, i.e., opening of the loop, if care is taken that the act of opening, if it was perpetrated by an unauthorized individual, is infallibly determined and also registered in the chip. The relatively inexpensive device representing this variation of the invention in which this possibility is realized is essentially characterized by the distinguishing elements of claim 34. Each of the two ends of the identity-protection loop that is formed by a semiconductor chain is, as a matter of practicality, connected with the associated snap fastener through electrical contacts. Alternatively, the connection can also be made by optical means. It should be mentioned that this less expensive snap fastener version, too, by using a kind of barbed hook on the ball-shaped part that forms one part of the snap fastener, can be designed so that after closing the snap fastener the possibility of reopening is precluded, except by forcing the device and accepting its destruction.
BRIEF DESCRIPTION OF THE DRAWING
Examples of embodiments of the invention are explained in the following, making reference to the attached drawing, wherein
Fig. 1 represents a schematic cross-sectional view of a capsule with the inserted ends of an identity-protection loop that is formed by a semiconductor chain,
Fig. 2 represents a circuit schematic of a semiconductor chain that forms an identity-protection loop,
Fig. 3 represents a diagram to illustrate the delayed propagation of a pulse in a periodically operated semiconductor chain,
Fig. 4 represents a cross-sectional view similar to Fig. 1 with an identity-protection loop that is formed by a light conductor,
Fig. 5 represents a schematic view of a GPS display indication of a GPS recorder that is connected with the capsule-chip unit,
Fig. 6 represents a top view of one of the snap fastener parts that is formed by a spring component,
Fig. 7 represents a top view of the snap fastener part of Fig. 6 with a portion broken away to illustrate the chip that is located behind it,
Fig. 8 represents two snap fastener parts of a matching pair attached to the corresponding ends of an identity-protection loop.
DETAILED DESCRIPTION OF THE INVENTION
Fig. 1 shows a cylindrical capsule 1 of a neutral material that does not interfere with the function of the identity-protection loop, e.g., a polymer. The capsule is assembled from two capsule parts 2 and 3 into which the respective ends 4 and 5 of an identity-protection loop are inserted.
As shown in Fig. 2, the identity-protection loop in the illustrated example is in the form of a delay line that is formed by a semiconductor chain. The latter comprises, e.g., a sequence of transistors 6 as well as associated R-C elements 7 serving as delay elements.
The number of the chain links arranged along the semiconductor chain in the form of R-C elements 7 and transistors 6 determines the travel time T of a pulse from end 4 to the other end 5 of the identity-protection loop. This travel time T of the chain, which is an identifying characteristic of the identity loop, is measured at the initialization of the chip and is written into the chip. Given that with every change in the number of chain links the delay, and thereby the travel time, is changed, it is possible to determine by any comparison of the actually measured travel time with the stored characteristic travel time whether the identity-protection loop has remained intact or whether a change in the number of chain links, e.g. , by short-circuiting, has occurred.
In contrast to the aperiodically operated semiconductor chain of Fig. 2, in the periodic operation illustrated in Fig. 3 a clock signal is used for controlling the pulses of a pulse chain. This clock signal is obtained through frequency division, using the carrier-frequency available from the terminal, as indicated schematically by "clock" in Fig. 3. Associated with each of the clock intervals 1 , 2 , 3 ... on the X-axis is a corresponding delay t of, e.g., 10, 20, 30 ... milliseconds on the Y-axis. Here, too, an intrusive manipulation in the semiconductor chain causes the travel time to deviate from the stored signal transmission time.
The larger part 2 of the capsule contains a chip 8 , an antenna 9, as well as a battery 10. In addition, connector sleeves 11 and 12 for the connection of the respective ends 13 and 14 of the identity-protection loop are firmly imbedded in the plastic material, e.g., epoxy resin, of the capsule 1. The end 13 of the loop with the connector sleeve 11 already forms an integral unit with the plastic material of capsule 1. As shown in the drawing, the opposite, free end 14 of the loop runs coaxially with connector sleeve 12 and also with part 3 of the capsule and remains axially movable relative to the latter until the parts are fixedly connected. In this, a tubular guide 15 is helpful, which is provided with a step 16 to limit the travel into the connector sleeve 12 so that the end 14 of the loop at its extremity does not bear against the bottom 17 of the connector sleeve. As shown, not only the chip 8 but also the antenna 9 and the battery 10 are each electrically connected on one side with the electrically conductive connector sleeve 11 and on the other side with the also conductive connector sleeve 12. The two parts 2 and 3 of the capsule can be solidly connected with each other by means of a quick-setting adhesive. For this purpose, a conical adhesive container 18 is attached at one end of the guide 15, which passes coaxially through the container. Adjoining the container 18 is a cylindrical guide 19 which, in a manner not specifically shown, extends into a central opening of part 3 of the capsule, so that part 3 can move along guide 19 in the direction towards part 2 of the capsule. Facing the sloped surface of the adhesive container 18 is a correspondingly sloped exterior surface 20 of part 2 of the capsule. Surface 20 has sharp protrusions 21. Likewise, protrusions 22 of the same kind are provided on the surface portion of part 3 that faces part 2. The walls of the adhesive container 18 that contains the quick- setting adhesive are pierced, i.e., destroyed by the protrusions 21 and 22 when the connection of parts 2 and 3 is closed, so that the adhesive is released and flows to the peripheral area of the part 3 of the capsule, i.e., a cone-shaped contact surface 23, and to the corresponding contact surface 24 of the part 2 of the capsule. In this closed capsule, the parts that are essential to its function are protected against any intrusion from the outside and thus no longer accessible to manipulations by unauthorized individuals. Any attempt, e.g., to open one of the ends of the identity-protection loop, the equivalent of breaking a conventional lead seal, would cause irreparable and immediately recognizable damage to the functionally essential components.
In Fig. 4, an alternative possibility is illustrated in which the identity-protection loop is formed by a light-conductor as the conductive core. Chip 8 is again mounted on a polymer film 25 or the like with conductive traces by which the chip communicates with the two ends 4 and 5 of the light conductor, which comprises a glass fiber cable, through light sources 26 and light-sensing semiconductors 27. At its one end 4, the light conductor is welded to a prism 28 that is arranged above the light source, and at its other end 5 it is likewise welded to light sensor 27 through a prism 29.
In this embodiment, too, where a light conductor is used in place of a semiconductor chain, the free end of the light conductor can be inserted concentrically into the cylindrical capsule, similar to the example of the semiconductor chain, and connected to a closed unit by adhesive bonding of the larger part 2 of the capsule with the other, smaller part 3. In its closed condition, the capsule 1 in either embodiment in practice has a length of about 25 mm and a diameter of less than 20 mm. Analogous to the first example where the identity-protection loop takes the form of a semiconductor chain in accordance with Figures 1 and 2 , so also when using a loop consisting of a glass fiber cable, there is assurance that intrusions by unauthorized individuals will necessarily cause the destruction of functionally essential parts of the capsule-chip unit 1, and that such intrusions will be immediately recognizable. In the example of Fig. 1, the required energy is supplied by the battery 10, so that this "seal tag" represents an active unit. In the case of the embodiment according to Fig. 4, in which there is no battery, the power supply is provided by a capacitor (not shown in the drawing) receiving energy during an active transaction through power emission from the terminal. The mobile terminal used for the surveillance of the capsule- chip units and (if applicable) their associated identity- 10 protection loops enables on the one hand the aforementioned wireless transmission and storage of data in the chip as well as the recall of the data stored in the chip for the purpose of an identity check. On the other hand, there is the possibility of transmitting energy from the terminal to the capsule-chip unit and thus to communicate also with units of the kind that has no resident long-life energy source.
The GPS recorder shown in a frontal view in Fig. 5 makes it possible to determine and register the exact location of the intrusive manipulation in the identity-protection loop, i.e., the "breaking of the tag", by means of a special, appropriately equipped transportation terminal. The latter determines in accordance with the known state of the art the current GPS location and writes it to the identity-protection chip. The previous location is thereby overwritten. If the object under surveillance is removed from the surveillance range of the transportation terminal or in case of an identity violation, the last stored location remains on the chip. This function can be operated in a passive as well as an active mode.
The required event timing function can be provided in the electronic circuitry of the capsule-chip unit or the terminal. Figures 6 through 8 serve to illustrate another embodiment, in which a snap fastener of the customary design with two fastener components 33 and 34 is being used. The fastener component 33, a spring module with inserted spring 35 in the illustrated example, takes on the function of a comparatively simple embodiment of the capsule. Namely, as shown in Fig. 7 but partially covered by the fastener component, said fastener component 33 comprises the associated chip 8 which is accessed by contacts 36. At the center of the chip there is an opto- coupler 37 comprising, e.g., a light source in the form of a light emitting diode or a light sensor, as also employed in the example of Fig. 4. Accordingly, the fastener part 34 in the shape of a spherical element comprises, e.g., the light source in the form of a light emitting diode that is located at the tip of the ball-shaped projection. In the closed state, this light source works together with the light sensor 37 of Fig. 7. Fig. 8 shows the conductive traces 38 that run along the semiconductor chain of the identity-protection loop, the ends 4, 5 of which can be connected to each other through the snap faster 33, 34.

Claims

11PATENT CLAIMS
1. A method for protecting the identity of an object, wherein the improvement comprises the use of a chip that can be attached to the object to be protected and cannot be detached from the object without destroying functionally essential features, in which non-erasable data that define its identity and thereby the identity of the object can be stored as well as other data that can be altered if necessary such as, e.g., the location, time, and details about the individuals involved in securing the object and the like, through carrier-frequency transmission by means of a terminal, and from which at least a part of the data can be interrogated through the terminal when a check is performed by authorized individuals to determine whether, since the time when the data in question were stored, manipulations occurred with the aim of violating the identity of the object, and by means of which new data corresponding to a possible change in the object can be stored and also interrogated through the terminal in a case where authorized individuals accessed the protection in the intervening time.
2. A device for performing the method of claim 1, wherein a capsule (1) consisting of a neutral material not interfering with the function of the identity protection is attached to the object, the capsule containing at least one chip (8) , into which, through an antenna (9) that is connected to it, the non-erasable data that define the identity of the object as well as the additional data, erasable if necessary, can be entered and stored from the outside through carrier-frequency transmission by means of a terminal and can be recalled from the chip in analogous manner in case of an inspection check, and wherein further the capsule (1) containing the chip (8) is connected to the object either directly or through an identity- protection loop (4, 5) in such a manner that it is possible to determine if a manipulation has been performed with the capsule and the chip or with the identity-protection loop that leads into and is functionally connected with the capsule.
3. The device according to claim 2 , wherein the terminal is microprocessor-based and equipped for the initialization, control and surveillance as well as for the signal-processing of the chips (8) used for identity protection in capsule-chip units .
4. The device according to claim 3 , wherein the terminal is equipped with input and output interfaces for the data transfer, to receive and forward the required information for the identity protection such as, e.g., GPS location data.
5. The device according to one of the claims 3 or 4 , wherein the terminal is equipped with a display and a keyboard and can be used as an independent unit. 12
6. The device according to one of the claims 3 or 4 , wherein the terminal is equipped for use as an interface to a connected data station, e.g., to a portable computer.
7. The device according to claim 2, designed for an object of larger dimensions such as, e.g., for a valuable boat, automobile, truck, or for its motor alone, wherein the chip- capsule unit is attached to a major component of the object within a recessed or angular portion facilitating the inseparable attachment of the unit and protecting against mechanical influences, in such a manner that any attempt at removing the chip-capsule without damaging it is impossible.
8. The device according to claim 2 and/or 7, wherein the antenna (9) that is connected to the chip is imbedded in the plastic material of the capsule (1) and thus is designed as a part of the capsule-chip unit.
9. The device according to one of the claims 2 , 7 or 8 , comprising an antenna outside of and separate from the capsule, attached to a portion of the object that is exposed and easily approachable by the terminal for the wireless data transmission, the antenna leading to the capsule and, at its termination, being provided with a galvanic connection to the chip.
10. The device according to one of the claims 2 or 7 through 9, wherein the chip (8) is connected to a capacitor that is chargeable from the terminal and can store enough energy to transmit the presently called-up data to the terminal.
11. The device according to one of the claims 2 or 7 through 10, wherein the chip (8) is connected to a battery (10) that is likewise accommodated inside the capsule and is required for maintaining on-line functions.
12. The device according to claim 11 wherein the battery (10) that is located inside the capsule is rechargeable with energy transmitted from outside the capsule (1) , preferably from the terminal.
13. The device according to claim 11 or 12, wherein the battery (10) is designed as a plastic or foil battery that is integrated into the capsule (1) .
14. The device according to one of the claims 2 or 7 through 13 which has in combination with capsule (1) containing chip (8) an identity-protection loop (4, 5) that is connected to the object to be secured, distinguished in that the identity-protection loop is designed and arranged in relation to the chip in such a manner that sequential light signals or electrical signals issuing from chip (8) and entering the one end of the identity- protection loop that is connected to chip (8) , after passing through the loop and reentering the chip at the other end of the loop, can be registered in chip (8) and, if necessary, compared with each other for the purpose of determining the condition of the loop. 13
15. The device according to claim 14, wherein the identity- protection loop is formed by a light conductor and the chip (8) is mounted on a polymer film (25) or the like with conductive traces by which the chip is connected with the two ends (4, 5) of the light conductor by way of semiconductors representing a light source (26) and light sensors (27) .
16. The device according to claim 15, wherein the light conductor comprises a glass fiber cable.
17. The device according to claim 15 or 16, wherein the light conductor, at its one end (4) through a prism (28) arranged above the light emitting diode (26) and at its other end, likewise, through a prism (29) , is welded together with the light sensor (27) .
18. The device according to one of the claims 2 or 7 through 17, wherein the identity-protection loop is designed as a semiconductor chain in the form of a delay line with a plurality of delay elements, the number of which determines the point in time when the pulse that was emitted from chip (8) returns to the chip after having passed through the chain.
19. The device according to one of the claims 17 or 18, wherein each delay element of the semiconductor chain is formed by an R- C circuit.
20. The device according to one of the claims 17 through 19, wherein a frequency divider is provided for dividing the carrier frequency into a clock frequency as required for the operation of the device.
21. The device according to claim 20, wherein the clock frequency determines the delay time of the semiconductor chain and the respective time value is retained on the chip.
22. The device according to one of the claims 2 or 7 through 21, wherein the capsule (1) containing the chip (8) and the antenna (9) or the contact connectors for the antenna, if the latter is separate from the capsule, and also containing the two ends (4, 5) of the identity-protection loop, if applicable, is made of polymer material and wherein the aforementioned parts of the device are imbedded in the polymer material.
23. The device according to claim 22, wherein the antenna (9) that is imbedded in the polymer material of the capsule (1) is formed by a ferrite antenna.
24. The device according to claim 22 or 23 and equipped with an identity-protection loop, wherein the capsule enclosure (2, 3) is designed in two parts, wherein further the one end (4) of the identity-protection loop as well as the appurtenant chip (8) and a connector sleeve (12) or the like for receiving the other, free end (5) of the loop are firmly imbedded in the one part (2) of the capsule and wherein, moreover, the other part (3) through which the free end of the loop passes can be solidly connected with the first part of the capsule when the free end is inserted 14
into the connector sleeve of the first capsule part and thereby coupled to the chip (8) .
25. The device according to one of the claims 22 through 24, wherein the connector sleeves (11, 12) for the ends (4, 5) of the identity-protection loop are electrically conductive and, through conductive traces, are galvanically connected with the input and output contacts of the chip (8) pertaining to the identity loop.
26. The device according to claim 24 or 25, wherein a tubular guide (15) is provided that is axially movable relative to the connector sleeve (12) of the first capsule part (2) .
27. The device according to claim 26, wherein the tubular guide (15) surrounds the free end (5) and together with the latter is brought into the locked position when the capsule (1) is being closed.
28. The device according to claim 27, wherein the second part (3) , being movable relative to the first part (2) of the capsule, surrounds the free end (5) of the loop concentrically and has a conical contact surface (23) in its peripheral area, which is matched by a corresponding contact surface (20) of the first part (2) of the capsule.
29. The device according to claim 24, wherein the two capsule parts (2, 3) are solidly connectable by the release of a quick- setting adhesive.
30. The device according to claim 24 or 25, wherein between the two capsule parts (2, 3) there is an adhesive container (18) which opens when the parts (2, 3) are joined and pressed together and releases the adhesive which solidly connects the capsule parts .
31. The device according to claim 30 wherein at least the one capsule part (2) is equipped with protrusions (21) that face the adhesive container (18) and serve to destroy the container wall, thereby releasing the adhesive when the connection between the two parts is closed.
32. The device according to claim 26 as well as claims 30 or 31, wherein the adhesive container (18) is arranged on the axially movable tubular guide (15) .
33. The device according to claim 2, wherein the identity- protection loop is formed by one or more coupled shift registers in the form of a semiconductor chain to which a random number can be applied and which can then be compared with a representation of the semiconductor chain that is stored on the chip.
34. The device according to claim 2, wherein the capsule containing the chip (8) is formed by the one part (33) of a snap fastener that is fixedly connected to the one end (4) of the identity-protection loop, wherein further the other part (34) of 15
the snap fastener is fixedly connected with the other end (5) of the identity-protection loop and wherein, lastly, the two snap fastener parts can be coupled together to close the loop.
35. The device according to claim 34, wherein each of the two ends (4, 5) of the identity-protection loop that is formed by a semiconductor chain is connected with the associated snap fastener part (33, 34) through electrical contacts or optically.
PCT/EP1998/001251 1998-03-05 1998-03-05 Method for protecting the identity of objects and device for performing the method WO1999045512A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
EP98920474A EP1058918B1 (en) 1998-03-05 1998-03-05 Method for protecting the identity of objects and device for performing the method
JP2000534982A JP2002506237A (en) 1998-03-05 1998-03-05 Device to protect the identity of the object
PCT/EP1998/001251 WO1999045512A1 (en) 1998-03-05 1998-03-05 Method for protecting the identity of objects and device for performing the method
AU73325/98A AU761006B2 (en) 1998-03-05 1998-03-05 Method for protecting the identity of objects and device for performing the method
DE69806272T DE69806272T2 (en) 1998-03-05 1998-03-05 METHOD AND DEVICE FOR PROTECTING THE IDENTITY OF AN OBJECT
ES98920474T ES2178833T3 (en) 1998-03-05 1998-03-05 METHOD FOR THE PROTECTION OF THE IDENTITY OF OBJECTS AND DEVICE TO CARRY OUT THE METHOD.
AT98920474T ATE219849T1 (en) 1998-03-05 1998-03-05 METHOD AND DEVICE FOR PROTECTING THE IDENTITY OF AN OBJECT
HK01103936A HK1033704A1 (en) 1998-03-05 2001-06-07 Method for protecting the identity of objects and device for performing the method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP1998/001251 WO1999045512A1 (en) 1998-03-05 1998-03-05 Method for protecting the identity of objects and device for performing the method

Publications (1)

Publication Number Publication Date
WO1999045512A1 true WO1999045512A1 (en) 1999-09-10

Family

ID=8166888

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1998/001251 WO1999045512A1 (en) 1998-03-05 1998-03-05 Method for protecting the identity of objects and device for performing the method

Country Status (8)

Country Link
EP (1) EP1058918B1 (en)
JP (1) JP2002506237A (en)
AT (1) ATE219849T1 (en)
AU (1) AU761006B2 (en)
DE (1) DE69806272T2 (en)
ES (1) ES2178833T3 (en)
HK (1) HK1033704A1 (en)
WO (1) WO1999045512A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2411466A (en) * 2004-02-26 2005-08-31 Brian Edward Causton Security tag with tell-tale capability
DE102004036049A1 (en) * 2004-07-24 2006-02-16 Leopold Kostal Gmbh & Co. Kg Arrangement for a motor vehicle comprises microprocessor and or memory on a circuit board with attached inaccessible voltage source for supply independent of on board circuit
US7956752B2 (en) 2005-01-14 2011-06-07 Matthew Henderson Transponder bolt seal and a housing for a transponder

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987004282A1 (en) * 1986-01-03 1987-07-16 Advanced Systems Research Pty. Ltd. Inventory control system
US5528228A (en) * 1994-09-08 1996-06-18 Wilk; Peter J. Protective device for storage and transport containers
WO1996020463A1 (en) * 1994-12-28 1996-07-04 Roulleaux Robin Veronique Method and device for sensing, identifying and protecting goods, particularly from theft
US5656996A (en) * 1996-03-13 1997-08-12 Global Associates, Ltd. Electronic security bonding device
WO1997038364A1 (en) * 1996-04-11 1997-10-16 Edis S.A. A conformable intelligent tag

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987004282A1 (en) * 1986-01-03 1987-07-16 Advanced Systems Research Pty. Ltd. Inventory control system
US5528228A (en) * 1994-09-08 1996-06-18 Wilk; Peter J. Protective device for storage and transport containers
WO1996020463A1 (en) * 1994-12-28 1996-07-04 Roulleaux Robin Veronique Method and device for sensing, identifying and protecting goods, particularly from theft
US5656996A (en) * 1996-03-13 1997-08-12 Global Associates, Ltd. Electronic security bonding device
WO1997038364A1 (en) * 1996-04-11 1997-10-16 Edis S.A. A conformable intelligent tag

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2411466A (en) * 2004-02-26 2005-08-31 Brian Edward Causton Security tag with tell-tale capability
GB2411466B (en) * 2004-02-26 2006-09-20 Brian Edward Causton Security tag with tell-tale capability
DE102004036049A1 (en) * 2004-07-24 2006-02-16 Leopold Kostal Gmbh & Co. Kg Arrangement for a motor vehicle comprises microprocessor and or memory on a circuit board with attached inaccessible voltage source for supply independent of on board circuit
US7956752B2 (en) 2005-01-14 2011-06-07 Matthew Henderson Transponder bolt seal and a housing for a transponder

Also Published As

Publication number Publication date
AU761006B2 (en) 2003-05-29
AU7332598A (en) 1999-09-20
ES2178833T3 (en) 2003-01-01
HK1033704A1 (en) 2001-09-14
EP1058918A1 (en) 2000-12-13
DE69806272T2 (en) 2003-03-06
EP1058918B1 (en) 2002-06-26
DE69806272D1 (en) 2002-08-01
JP2002506237A (en) 2002-02-26
ATE219849T1 (en) 2002-07-15

Similar Documents

Publication Publication Date Title
USRE43415E1 (en) Anti-theft method for detecting the unauthorized opening of containers and baggage
USRE42777E1 (en) Anti-theft method for detecting the unauthorized opening of containers and baggage
US7015814B2 (en) Security tag
US7471203B2 (en) Tamper monitoring system and method
US7088229B2 (en) Methods and systems for verifying the position and status of hierarchically arranged objects
EP0984400B1 (en) Electronic monitoring apparatus
US5656996A (en) Electronic security bonding device
US6069563A (en) Seal system
EP2823118B1 (en) Tamper evident cargo container seal bolt lock
US20050275537A1 (en) System and device for detecting object tampering
CN110720115A (en) Tamper resistant assembly and system
US20080143519A1 (en) Tamper-indicating radio frequency identification tag and methods of indicating tampering of a radio frequency identification tag
WO1997034269A9 (en) Electronic security bonding device
WO2009090635A2 (en) Electronic security seal and system
US8149118B2 (en) Device and method for registering the opening of closures of spaces to be secured
EP1337985B1 (en) Method of transferring the ownership of items using security tags
EP1058918B1 (en) Method for protecting the identity of objects and device for performing the method
EP1946251B1 (en) Device for identifying and protecting an element whose integrity is desired to be known
JP2000259808A (en) Radio tag
WO2004032044A1 (en) Electronic card with at least one adhesive surface
WO2009098670A2 (en) Tamper evident seal
EP1544386A1 (en) Method to attest an occurred tampering of a container and electronic lock that carries out this method
GB2411466A (en) Security tag with tell-tale capability
MXPA05004363A (en) Electronic seal for containers having passive radiofrequency identification

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

WWE Wipo information: entry into national phase

Ref document number: 73325/98

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1998920474

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09623583

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 1998920474

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

WWG Wipo information: grant in national office

Ref document number: 1998920474

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 73325/98

Country of ref document: AU