METHOD FOR AUTHENTICATION OF THE CLOSURE ASSEMBLY OF A CONTAINER
20170316302 · 2017-11-02
Inventors
Cpc classification
G06K7/10366
PHYSICS
G06K19/07758
PHYSICS
G06K19/145
PHYSICS
B65D51/18
PERFORMING OPERATIONS; TRANSPORTING
G06K19/0723
PHYSICS
G06K19/07798
PHYSICS
G06K19/10
PHYSICS
International classification
Abstract
A method for authenticating a closure assembly of a container including a closure and an over pack covering at least the closure. The overpack including a first radio frequency identification tag having a first unique identifier, the method includes reading the first unique identifier the closure including a second radio frequency identification tag including a second unique identifier and a storage unit including at least data relating to an overpack/closure pair including the unique identifiers of a closure and an overpack associated with the closure reading the first unique identifier and comparing the identifiers of the overpack and of the closure thus read to verify that the pair being authenticated does coincide with the pair defined in the data assembly, emitting a communication signal corresponding to the result of the verification, the closure assembly including means for destroying at least one of the identification tags when the container is opened.
Claims
1. A method for authenticating a closure assembly of a container, said assembly comprising a closure closing an opening of said container for the passage of a fluid or of at least one object contained in said container, and an overpack covering at least said closure, wherein said overpack comprising a first radio frequency identification tag having a unique identifier of said overpack, the following steps are carried out: reading the unique identifier of said overpack, said closure comprising a second radio frequency identification tag having a unique identifier of said closure and a storage unit comprising a data set comprising at least data relating to an overpack/closure pair which comprises the unique identifiers of a closure and an overpack associated with this closure, reading the unique identifier of said closure and comparing the identifiers of said overpack and said closure so read with the data relating to said overpack/closure pair of said data set in order to verify that the overpack/closure pair being authenticated coincides with the overpack/closure pair defined in said data set, emitting a communication signal corresponding to the result of this verification, and in that said closure assembly comprises means for destroying at least one of the two identification tags upon the first opening of said container.
2. The method according to claim 1, wherein the steps of comparing and emitting a communication signal corresponding to the result of this verification are performed by a processing unit placed in said closure.
3. The method according to claim 1, wherein, before and after closing said container with said closure assembly, the following steps are carried out: reading the unique identifier of said overpack, storing said unique identifier of said overpack in said storage unit placed in said closure by associating said unique identifier of said overpack with the unique identifier of said closure to form a specified overpack/closure pair.
4. The method according to claim 1 wherein, after having encrypted at least the data relating to the overpack/closure pair by means of a coding key, said data is decrypted during the step of comparison.
5. The method according to claim 1, wherein the write access to said storage unit is protected by a key and an authentication algorithm to prevent any modification of the data relating to the overpack/closure.
6. The method according to claim 1, wherein the data stored in said storage unit also comprising at least data relating to said fluid or to said at least one object contained in said container, by which at least one command suggestion is displayed on a display means, said or at least one of said suggestions corresponding to the display of said data relating to said fluid or to said at least one object contained in said container.
7. The method according to claim 1, wherein said second radio frequency identification tag and said storage unit are placed in an internal housing of said closure.
8. A closure assembly for carrying out the method of authentication according to claim 1, said container comprising an opening for the passage of a fluid or at least one object contained in said container, characterized in that it comprises: a closure for closing said opening, an overpack for covering at least said closure, said overpack comprising a first radio frequency identification tag having a unique identifier of said overpack, said closure having a housing receiving a second radio frequency identification tag storing a unique identifier of said closure, and a processing unit having a storage unit for storing data, said processing unit being configured to generate and receive communication signals, and means for destroying at least one of the two identification tags upon the first opening of said container.
9. The assembly according to claim 8, wherein said closure comprising a head and a body, said housing is placed in said head of the closure.
10. The assembly according to claim 8, wherein said processing unit is connected to said second tag to transmit and receive said communication signals.
11. The assembly according to claim 8, wherein said short range wireless communication signals are based on a Near Field Communication (NFC) protocol.
12. The assembly according to claim 8, wherein said housing is formed by a sealed housing.
13. The assembly according to claim 8, wherein said second radio frequency identification tag and said processing unit are encapsulated in a hardened matrix to protect these elements.
14. A container having a container neck comprising an opening therein for the passage of a fluid contained in said container, said container being equipped with a closure assembly according to claim 8.
15. The use of said assembly according to claim 8 for protecting wine, alcohol or spirits, medicament or pasty or viscous foodstuff, for medical or cosmetic use, contained in a bottle, a pot, a tube, a flask, a vial or a carafe.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0091] Other specific advantages, purposes and characteristics of the presently disclosed embodiment will emerge from the description which follows, given for an explanatory and non-limiting purpose, with reference to the accompanying drawings, in which:
[0092]
[0093]
DETAILED DESCRIPTION OF THE DRAWINGS
[0094] First of all, it should be noted that the figures are not to scale.
[0095]
[0096] This container comprises a container neck 10 having an inside opening 11 for the passage of a liquid contained in this container. This liquid is, for example, a vine or a spirit.
[0097] This opening 11 is closed by a stopper comprising a stopper-head 12 and a stopper body 13 integral with this head 12. The stopper-head 12 comprises a hollow base 14 and an ornamental element 15 forming a lid for closing and concealing a housing 16 housed in this hollow base 14 of the stopper head 12. This housing 16 has dimensions enabling it to conform to the internal wall of this base 14 so as to be held in position once inserted therein.
[0098] This housing 16 is here a metal insert while the stopper body 13 is made of a flexible material. The latter may be made of cork, agglomerated cork or an elastomer-type plastic such as a thermoplastic elastomer (TPE).
[0099] A cap 17, made here in a transparent plastic material, is intended to cover the stopper 12, 13 and a portion of the neck 10 of the container in order to fasten this stopper 12, 13 to this container.
[0100] This cap 17 comprises a first radiofrequency identification tag 18, this first tag 18 being arranged on the inside face of this cap 17 so as to be turned towards the stopper 12, 13. It is thus rendered inaccessible.
[0101] Moreover, this cap 17 is configured so as to cause the destruction of this first identification tag 18 as soon as the container is first opened.
[0102] For this purpose, this first tag 18 is placed directly on a tear strip IS of the cap 17, for example a strip called “Tircell” or, more simply, an opening strip bounded by two lines of weakness.
[0103] Thus, the removal of the cap 17 to access the stopper 12, 13 in order to open the container by manipulating the strip 19 automatically leads to the destruction of the first tag 18. An infringer cannot therefore reuse this first label 18 having a unique identifier.
[0104] The housing 16 placed in the thickness of the stopper head receives a hardened matrix 20 encapsulating and protecting an assembly having a second radiofrequency identification tag and a processor.
[0105] This second identification tag stores a unique identifier of the stopper 12, 13. The processor includes a storage unit for storing data and is configured to generate and receive communication signals.
[0106] In one aspect of the authentication method, a mobile management unit (not shown), capable of addressing and receiving communication signals based on the NFC/RFID protocol and comprising embedded software for processing these signals, is used.
[0107] This mobile management unit may be a mobile terminal, for example a mobile phone such as a smartphone or a touchpad laptop.
[0108] The mobile management unit software reads the unique identifier of the first radiofrequency identification tag 18 from the cap and then establishes an encrypted communication with the processor placed in the stopper head 12 and connected to the second radiofrequency Identification tag.
[0109] Through this communication, the software of the smartphone transmits the unique identifier of the first identification tag 18 of the cap to the software of the processor which verifies that this identifier is indeed that corresponding to the unique identifier associated with the identifier of the stopper at the outlet of the bottling line to form the pair of stopper/cap identifiers stored in the storage unit of the processor.
[0110] The processor transmits the result of the verification as a short-range communication signal to the unit. The processor of the mobile management unit displays the result of the verification on a display means of this mobile management unit.
[0111] In addition, if the mobile management unit is in a communication coverage area (telephone data, internet, etc.) with the activated data exchange, the processor of this mobile management unit may, at the user's request, connect to a spirits vendor's database to verify that the data of the “cap/stopper” pair is indeed registered in his database.