Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND TOKEN FOR CERTIFYING PRODUCTS
Document Type and Number:
WIPO Patent Application WO/2021/229366
Kind Code:
A1
Abstract:
A method for certifying products which is implementable from a mobile device (1) is performed by interfacing the mobile device (1) with a radio frequency identification and programming -RFID- reader. The RFID reader is then activated so as to read a unique identifier of an RFID tag (E) applied to a product (P) and transmitting such a unique identifier to the mobile device (1 ). A readable storage medium containing a plurality of identification codes is then queried so as to check a matching of said unique identifier and one of the identification codes. A possible positive check determines the certification of the product (P).

Inventors:
LANCINI MARCO (IT)
TAGLIANI ROBERTO (IT)
Application Number:
PCT/IB2021/053771
Publication Date:
November 18, 2021
Filing Date:
May 05, 2021
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NOLECOM ID S R L (IT)
International Classes:
H04W12/06; H04B5/00; H04L29/06; H04W12/10; H04W12/12; H04W12/47; H04W12/77; G06Q10/08; G06Q30/00
Domestic Patent References:
WO2017207524A12017-12-07
Foreign References:
US7333001B22008-02-19
Other References:
ANONYMOUS: "ACR1255U-J1 ACS Secure Bluetooth NFC Reader Reference Manual V1.12", 2 August 2019 (2019-08-02), XP055755079, Retrieved from the Internet [retrieved on 20201130]
Attorney, Agent or Firm:
TANSINI, Elio Fabrizio (IT)
Download PDF:
Claims:
CLAIMS

1. A computer-implementable method for certifying products configured to be executed by one or more processors of a mobile device (1), said method comprising the steps of:

- interfacing the mobile device (1) with a Radio Frequency Identification (RFID) and programming reader;

- activating the RFID reader so as to read a unique identifier of an RFID tag (E) applied to a product (P);

- activating the RFID reader so as to transmit the unique identifier to the mobile device (1);

- querying a readable storage medium (5) containing a plurality of identification codes (6) so as to check a matching of said unique identifier with an identification code (6);

- in case of positive check, certifying the product (P).

2. The method according to claim 1, wherein the step of certifying the product (P) comprises the sub-steps of:

- generating a password, preferably a one-time password;

- transmitting said password to the RFID reader;

- generating an encrypted reference code based on the password and the unique identifier;

- activating the RFID reader so as to generate an encrypted check code (3) based on the password and the unique identifier;

- comparing the encrypted reference code with the encrypted check code

(3);

- in case of identity between the encrypted reference code and the encrypted check code (3), certifying the product (P).

3. The method according to claim 2, wherein said step of comparing the encrypted reference code with the encrypted check code (3) comprises the steps of:

- activating a video device coupled to the RFID reader so as to display the encrypted check code (3);

- activating an optical sensor of the mobile device (1);

- capturing, by means of said optical sensor, an image of the encrypted check code (3) displayed by the video device;

- checking a matching of the encrypted reference code with the image of the encrypted check code (3).

4. The method according to claim 3, wherein in said step of capturing an image of the encrypted check code (2) an image of the product (P) is also captured, said method comprising a step of storing the image of the product (P) in the readable storage medium by associating it with the identification code corresponding to the RFID tag (E) of said product (P).

5. The method according to any one of the preceding claims, comprising a step of generating an error signal in case of negative check.

6. The method according to any one of the preceding claims, comprising, in case of positive check, a step of storing an additional piece of information in said readable storage medium, by associating said additional piece of information with the identification code corresponding to the unique identifier of the RFID tag (E).

7. The method according to any one of the preceding claims, wherein the interfacing between the mobile device (1) and the RFID reader is performed by a wireless communication protocol, preferably a Bluetooth® communication protocol.

8. A token for certifying documents which is interfaceable with a mobile device (1) for executing a method for certifying documents, preferably a method according to any one of the preceding claims, comprising:

- a Radio Frequency Identification (RFID) and programming reader configured to transmit and receive radio frequency signals for detecting, identifying, and / or writing an RFID tag (E); - a communication module interfaceable with the mobile device (1).

9. The token according to claim 8, comprising a video device configured to display an encrypted check code (2) generated based on a unique identifier of the RFID tag (E) and a password transmittable from the mobile device (1).

10. The token according to any one of the preceding claims having a height of 2 cm to 10 cm, a width of 2 cm to 10 cm, and a thickness of 0.2 cm to 3 cm.

Description:
METHOD AND TOKEN FOR CERTIFYING PRODUCTS

The present invention relates to the technical field of methods and devices for document management.

In particular, the present invention relates to a method for certifying documents which is executable from a mobile device and a token which is couplable with the mobile device for executing such a method.

In the corporate sphere, but also in the private or professional sphere, it is often necessary to exchange documents with sensitive content among multiple subjects, such as contracts, quotes or even documents containing confidential information on products and work processes.

Despite the importance of such documents, it is not always possible to ensure the correctness and integrity of the information contained therein in a simple and efficient manner.

It is therefore extremely important to develop methods and devices capable of ensuring that the information content of products, especially paper documents, is certified and certifiable at all times in a safe manner, so as to ensure compliance with what was originally agreed and to keep track of any changes which have occurred over time.

In this context, the technical task underlying the present invention is to propose a method and a token for certifying documents which overcome at least some of the drawbacks of the known art mentioned above.

In particular, an object of the present invention is to provide a method and a token for certifying documents capable of certifying products and the information content thereof in a simple and efficient manner, at any time and place.

The mentioned technical task and the specified objects are substantially achieved by a method and a token for certifying documents comprising the technical features set out in one or more of the appended claims.

According to the present invention a computer-implementable method for certifying documents is shown, preferably the method is configured to be executed by one or more processors of a mobile device.

In particular, the method is executed by interfacing the mobile device with a radio frequency identification and programming -RFID- reader.

The RFID reader is then activated so as to read a unique identifier of an RFID tag applied to a product and transmitting such a unique identifier to the mobile device.

A readable storage medium containing a plurality of identification codes is then queried so as to check a matching of said unique identifier and one of the identification codes. A possible positive check determines the product certification.

Advantageously, the method described allows to quickly and efficiently certify a product, establishing an exchange of information between a mobile device and a reader configured to read an RFID tag applied to the product itself.

An object of the present invention is also a token for certifying documents interfaceable with a mobile device for executing a method for certifying documents. Preferably, the token is interfaceable with the mobile device in order to execute a method for certifying documents according to the present invention.

Preferably, the token comprises a radio frequency identification and programming -RFID- reader configured to transmit and receive radio frequency signals for detecting, identifying, and possibly writing an RFID tag. The token further comprises a communication module interfaceable with a mobile device.

Advantageously, the token described herein provides a simple, versatile and easily usable device for reading RFID tags and transmitting the information contained therein to a mobile device so as to make such information immediately usable to a user.

The dependent claims, included here for reference, correspond to different embodiments of the invention. Further features and advantages of the present invention will become more apparent from the description of an exemplary, but not exclusive, and therefore non-limiting preferred embodiment of a method and a token for certifying documents, as illustrated in the appended figures, in which:

- figure 1 shows a possible embodiment of the token according to the present invention during the execution of the method for certifying a product;

- figures 2A-2B show the activation of a component of the token during a certification process in more detail.

The present invention relates to a method for certifying documents which is implementable by a computer.

The term "certification” means any action aimed at uniquely and unambiguously identifying a product and/or the information content thereof and aimed at keeping track of any changes made thereto.

In particular, the method is advantageously executable for certifying documents with sensitive content such as contracts, quotes or even documents containing sensitive and confidential information (specifications relating to products and work processes).

Advantageously, the method of the present invention is configured to be executed by one or more processors of a mobile device 1 , such as a smartphone, a tablet or a laptop.

It is thereby particularly easy to execute the certification process, as it can be executed using easily transportable and available tools.

Operationally, the method is performed by interfacing the mobile device 1 with a radio frequency identification and programming - RFID - reader, i.e., by putting the reader and the mobile device 1 in mutual communication so as to allow an exchange of data/information between the two, allowing in particular to control the operation of the reader by means of the mobile device 1.

As will be discussed in more detail below, the reader can advantageously be integrated within a token. Preferably, the interfacing between the mobile device 1 and the reader is executed by means of a wireless communication protocol, even more preferably by a Bluetooth® communication protocol.

Next the RFID reader is activated so as to read a unique identifier of an RFID tag Έ” applied to a product “P”

In particular, the RFID tag Έ” can be comprised in a label applied to the product “P” or can be integrated in the product “P” itself (for example, in the case where the product “P” is a paper document, the tag can be an integrated tag inside a sheet of paper).

In general, RFID technology is based on the storage capacity of data by particular electrical circuits called RFID tags Έ” and on the ability thereof to respond to remote interrogation by means of special readers through the use of radio frequency signals.

Operationally, the reader is capable of emitting an electromagnetic/electrical field such as to generate a signal which through the principle of induction is transformed into electrical energy by an appropriate receiving circuit contained precisely in the RFID tag Έ”. Preferably, for this purpose the reader is arranged to generate radio frequency signals in the Ultra High Frequency (UFIF) range, therefore having a frequency between 300 MFIz and 3 GFIz.

The electrical energy induced by means of the transmission of the radio frequency signal by the reader can then power the circuit which receives it, which is then capable of transmitting the data contained therein by means of the antenna (signal transmission circuit) to the reader.

In other words, the RFID tag Έ” is capable of receiving and transmitting by radio frequency the information contained in the electrical circuit to a reader which has generated a signal such as to activate the circuit itself. Once the reader is interfaced with the mobile device 1 , the reader can be activated so as to transmit the unique identifier of the RFID tag Έ” to the mobile device 1.

In other words, the mobile device 1 controls the activation of the reader so as to read thereby the unique identifier of the RFID tag Έ”.

It should be noted that the mobile device 1 can also control the activation of the reader to execute a writing step in which one or more pieces of information is associated with the RFID tag Έ”.

Once the mobile device 1 is in possession of the unique identifier, a readable storage medium is interrogated on which a plurality of identification codes uniquely associated with respective RFID tags Έ” are stored.

In other words, a list of identification codes is stored on the readable storage medium, each uniquely and clearly representing a specific RFID tag Έ”.

Preferably, the readable storage medium is a remote medium made for example by means of a cloud computing, a physical archive connected to the internet or even more preferably a blockchain.

In particular, the use of a blockchain allows to ensure with even greater security the integrity of the process of detecting and identifying RFID tags Έ” as well as the information contained in the documents associated therewith.

Advantageously, the blockchain can be provided and/or managed by a recognized certification body, which performs the function of guarantor of the validity and security of the data contained in the blockchain.

The interrogation step is aimed at checking a match between the unique identifier of the RFID tag Έ” and one of the identification codes stored in the readable storage medium.

If the check is positive, it is possible to certify the product "P” as its RFID tag Έ” is associated with a valid identification code, recognized and found within the information contained in the readable storage medium. Conversely, if the check is negative, an error signal is generated which can be an optical or acoustic signal which is generated directly by the mobile device 1 or the mobile device 1 can activate the reader to generate the error signal. In other words, whenever a certification operation is performed, the mobile device 1 activates the reader to read the unique identifier of the RFID tag Έ” associated with the product “P” which is to be certified and then search for it in the readable storage medium.

If the search is successful (i.e., an identification code matching the unique identifier of the RFID tag Έ” is actually stored in the readable storage medium), it is possible to certify that a valid and recognized RFID tag Έ” is associated with the product being processed.

Conversely, if the search fails (i.e., the unique identifier of the RFID tag Έ” is not stored in the readable storage medium), an error signal is generated which notifies the user that the product being processed is coupled to a tag which contains a unique identifier which is invalid and/or not recognized by the device 1 , therefore not certifiable.

In such a context, blockchain technology ensures the integrity and security of the RFID tag Έ” recognition procedure in a particularly efficient manner, especially due to the particular stability and the difficulty of third parties tampering with the data contained therein.

Furthermore, following a successful check, the method includes a step of storing additional information on the readable storage medium, in particular by associating it with the identification code corresponding to the unique identifier of the RFID tag Έ”.

In particular, by way of non-limiting example, such additional information can comprise: date and/or time and/or place where the certification process is performed, credentials or identifying data of the user executing the operation.

It is thereby possible to identify how, where and when changes have been made to the document and also by which user.

Before carrying out the storage step, the mobile device 1 can be asked to enter credentials aimed at checking the identity of the user who is not only carrying out the certification procedure, but who is trying to enter information inside the readable storage medium by associating it with a specific product “P”.

It is thereby possible, for example, to ensure that the writing operations of the contents of the readable storage medium are executed only by users previously authorized to do so.

For greater security, the method can comprise a further control step.

In particular, the certification step of the product “P” can be executed by generating a password, preferably a one time password (OTP).

The password is then transmitted to the reader which uses a special algorithm to process it in combination with the unique identifier of the RFID tag Έ” applied to the product “P” being inspected, generating an encrypted verification code 2.

Simultaneously, the mobile device 1 also processes, using the same algorithm used by the reader, the password in combination with the unique identifier it has received from the reader, thereby generating an encrypted reference code.

Such encrypted codes can be, for example, barcodes, preferably two- dimensional barcodes (such as QR codes).

A comparison is then carried out between the encrypted verification code 2 and the encrypted reference code, thus certifying the product only if the two encrypted codes are identical.

In other words, the mobile device 1 and the reader 2 independently generate, although using the same calculation algorithm, respective encrypted codes and only if this procedure leads to the generation of identical codes is it then possible to certify the product “P”.

Preferably, during the transfer of the password, a serial number or similar code uniquely associated with the mobile device 1 and adapted to identify it is also sent to the reader 2.

Through the procedure described above it is therefore possible to be sure that the product “P” actually certified as well as the mobile device 1 which executes the certification are the correct ones.

In fact, if after sending the unique identifier to the mobile device 1 the reader is moved to a different product “P” (which could also be a product “P” on which no RFID tag Έ” is applied), upon generating the encrypted codes the reader would have a different unique code (or no unique code) compared to the mobile device 1, which uses the unique identifier originally read.

Consequently, the encrypted verification code 2 generated by the reader would inevitably be different from the encrypted reference code generated by the mobile device 1 , as it is calculated as a function of different reference parameters.

Therefore, the comparison between the encrypted reference code and the encrypted verification code 2 ensures that during the entire certification procedure the mobile device 1, the reader and the product “P” always remain the same and are not replaced, ensuring the correctness of the entire certification process.

In particular, the comparison between the encrypted verification code 2 and the encrypted reference code can be executed by activating a video device 4 coupled to the reader so as to display the encrypted verification code 2 on such a video device.

At the same time, an optical sensor (a video camera, a camera or in general a sensor configured for capturing images) of the mobile device 1 is activated.

The optical sensor then captures an image of the encrypted verification code 2 displayed on the video device 4 of the reader.

In other words, the reader displays the encrypted verification code 2 and by means of the mobile device 1 it is possible to photograph it, checking a match between the encrypted reference code and the image/photograph of the encrypted verification code 2.

If there is an actual match between the two, the product "P” is certified. Advantageously, during the acquisition of the image of the encrypted verification code 2 (or even at a different time) it is also possible to acquire an image of the product “P” or a part thereof. It is thereby possible to acquire any data of interest connected, associated or obtainable from the product “P”.

By way of example, if the product “P” is a document, it is possible to acquire an image of any text or image present (e.g., printed) on such a document.

If, on the other hand, the product “P” is a manufactured or semi-finished product, it is possible to acquire an image which represents and/or identifies one or more specific features of such a product (colour, material, surface finishes, shape, etc.).

Advantageously, said image of the product “P” is stored on the readable storage medium, associating it with the identification code corresponding to the RFID tag Έ” of said product “P”.

Thereby, the identity of the product "P” (certified by the RFID tag Έ” thereof) is securely and indissolubly linked with the features and/or information incorporated therein.

It is also possible that an image of the product "P” has already been saved in the readable storage medium, for example during a previous certification operation.

In this context, it is also possible to recall such a previous image on the mobile device 1 so as to allow a user to compare a previous certified version of the product “P” with the one currently being certified “P”. Advantageously, such a procedure allows to immediately identify any changes the product “P” has undergone with respect to the previously certified version.

Preferably, the images of the product “P” acquired in subsequent certification operations of the same product “P” do not overwrite those previously stored in the readable storage medium, but are added and appended thereto by defining a set of subsequent versions of the images of the product “P”.

It is thereby possible to keep an accurate track of any changes which have been made to the product "P” over time. For example, in the case where the product is a document, it is possible to ascertain whether the various users who have had access to such a document have made changes thereto and in which specific aspects the document has been modified.

On the other hand, if the product “P” is a product or a semi-finished product, it is possible to verify how the same changes over time, therefore whether it has been damaged, tampered with, modified or what work processes it has undergone.

For example, it is possible to certify a semi-finished product at the end of each individual processing step in order to be able to determine and certify the correct execution even after the entire production process has been completed.

Advantageously, the present invention achieves the proposed objects by overcoming the drawbacks noted in the prior art, providing the user with a simple and safe method for certifying products.

The object of the present invention is also a token 3 for certifying documents.

In particular, the token 1 is interfaceable with a mobile device 1 for executing a method for certifying documents, preferably a method according to one or more of the steps described above.

Structurally, the token 3 comprises a radio frequency identification and programming -RFID- reader configured to transmit and receive radio frequency signals adapted to detect, identify, and/or write an RFID tag Έ”. The token 3 further comprises a communication module which allows it to be interfaced with the mobile device 1.

In particular, the interfacing between the mobile device 1 and the token 3 is executed by means of a wireless communication protocol, even more preferably by a Bluetooth® communication protocol.

Therefore, the token 3 operatively performs the function of translator between the RFID tag Έ” and the mobile device 1, allowing the second to receive and correctly interpret the information contained in the first in order to carry out the certification operation.

Preferably, the token 3 comprises a video device having a screen 4 and configured to display the aforementioned encrypted verification code 2 on such a screen 4.

As discussed, such an encrypted verification code 4 is calculated and generated based on at least one unique identifier of the RFID tag “E”, a password transmissible from the mobile device and possibly also a serial number or a similar code uniquely associated with the mobile device. Preferably, from a dimensional point of view, the token 3 has a height between 2 cm and 10 cm, a width between 2 cm and 10 cm and a thickness between 0.2 cm and 3 cm.

Such dimensions are specifically selected to allow an easy portability and applicability of the token 3.

Advantageously, the token of the present invention allows to quickly and extremely easily execute a certification operation of a product “P” any time and anywhere.