WO2003053715A2 - Anti-fraud apparatus and method for protecting valuables - Google Patents

Anti-fraud apparatus and method for protecting valuables Download PDF

Info

Publication number
WO2003053715A2
WO2003053715A2 PCT/GB2002/005881 GB0205881W WO03053715A2 WO 2003053715 A2 WO2003053715 A2 WO 2003053715A2 GB 0205881 W GB0205881 W GB 0205881W WO 03053715 A2 WO03053715 A2 WO 03053715A2
Authority
WO
WIPO (PCT)
Prior art keywords
valuable
image
tag
digitised
stone
Prior art date
Application number
PCT/GB2002/005881
Other languages
French (fr)
Other versions
WO2003053715A3 (en
Inventor
Julian Boles
Original Assignee
Julian Boles
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Julian Boles filed Critical Julian Boles
Priority to EP02788239A priority Critical patent/EP1465779B1/en
Priority to US10/499,851 priority patent/US20050103840A1/en
Priority to DE60226898T priority patent/DE60226898D1/en
Priority to AU2002353221A priority patent/AU2002353221A1/en
Publication of WO2003053715A2 publication Critical patent/WO2003053715A2/en
Publication of WO2003053715A3 publication Critical patent/WO2003053715A3/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N33/00Investigating or analysing materials by specific methods not covered by groups G01N1/00 - G01N31/00
    • G01N33/38Concrete; ceramics; glass; bricks
    • G01N33/381Concrete; ceramics; glass; bricks precious stones; pearls
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/87Investigating jewels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Definitions

  • the present invention relates to a method and apparatus for characterising valuables, particularly but not exclusively precious or semiprecious stones, to identification certificates obtainable by the apparatus or method, and to methods of checking for fraudulent transactions or operations on a valuable, particularly but not exclusively precious or semi-precious stones.
  • the invention also relates to electronically tagged valuables. It is conventional to characterise diamonds and other precious semiprecious stones by their carat (weight), colour, clarity and cut, known as the 4C's. These characteristics can be checked relatively easily by accurate weighing and optical examination and are conventionally recorded on a printed certificate which accompanies the gem and evidences its authenticity. However, the colour and clarity of a diamond are somewhat subjective and it is not unknown for fraudulent substitutions to be made in traded gems.
  • GB 2,358,541 A discloses optical apparatus for capturing a three- dimensional image of a diamond.
  • the resulting digitised images are subject to degradation by pixellation and are limited in resolution.
  • An object of the present invention is to overcome or alleviate at least some of the above problems.
  • the invention provides a method of characterising a cut or uncut precious or semi-precious stone comprising the steps of acquiring a high resolution image of at least one characteristic feature of the stone, digitising said image and storing the digitised image in association with an identifier of the stone.
  • a high resolution image is meant an image of resolution sufficiently high to define features such as irregularities which are characteristic of the individual stone.
  • the resolution is higher than optical resolution.
  • the image is an electron micrograph and the selected characteristic feature is an irregular region at the boundary of two or more facets, e.g. at the culet or (in the case of an emerald cut diamond) the keel which are highly characteristic of an individual gem stone, especially at the resolution of an electron microscope.
  • the digitised image is stored in an electronic tag.
  • a particularly preferred electronic tag is the ME1 Hitachi-Maxell RFID chip as made by Hitachi.
  • Such tags are highly miniaturised and can be written to and read from in a contactless manner and incorporated permanently in a certificate in a tamper-proof manner.
  • the tag can be sealed within a certificate of plastics material.
  • Cut or uncut precious or semi-precious stones that have been characterised by the method defined above are also included within the first aspect of the invention.
  • the invention provides an identification certificate for a cut or uncut precious or semi-precious stone, the certificate including an electronic tag in which a digitised image of at least one characteristic feature of the individual stone is stored.
  • the irregular region is as described above, particularly the culet, keel, girdle, table or crown and preferably the electronic tag is an RFID (Radio Frequency Identification) tag.
  • the digitised image is an electron micrograph and preferably the digitised image is stored in encrypted form.
  • the electronic tag is permanently secured to the certificate in a tamper-proof manner.
  • the invention provides apparatus for certifying a valuable, the app ⁇ ;atus comprising means for acquiring a high (preferably higher-than-optical) resolution digitised image of at least one characterising region of the valuable, means for encrypting said digitised image and writing means arranged to write said encrypted digitised image to an electronic identifier tag associated with said valuable.
  • Such apparatus can be used to provide genuine proof of both authenticity and ownership.
  • the apparatus further comprises transmitting means arranged to transmit said encrypted digitised image and an identifier for valuable to a remote server posting a database of such encrypted digitised images and identifiers.
  • the image acquiring means comprises an electron microscope.
  • the invention provides a method of checking for fraudulent transactions involving or operations on a valuable, the method comprising the steps of acquiring a high (preferably higher-than-optical) resolution image of at least one characterising region of the valuable, reading a similar image from an electronic identifier tag associated with the valuable and comparing the images.
  • the method comprises the further step of receiving from a database of such images a previously acquired digitised image having an identifier corresponding to an identifier store in said electronic identifier tag.
  • Each identifier can be stored in association with its corresponding digitised image in the database and accordingly a digitised image can be retrieved by selecting the appropriate identifier.
  • financial transaction data pertaining to the valuable as identified by an identifier stored in said electronic identifier tag are received from a database.
  • This database can either be the same database as the image database referred to above, or a completely separate database maintained by e.g. a financial institution such as a bank or a credit card or insurance company. This feature enables a register of transactions in a given valuable to be kept, so that any attempted transactions in a stolen valuable can be detected by comparison with this register.
  • the characterising region is preferably an irregular region of the stone, e.g. the culet, keel, girdle, table or crown facets as noted above.
  • the digitised images are stored in encrypted form and are decrypted prior to the comparison.
  • the invention provides a valuable having secured thereto a hidden electronic identifier tag, the electronic identifier tag having a stored image of at least one characterising region of the valuable and an identifier of the valuable.
  • the electronic tag is an RFID (Radio Frequency Identification) tag or the like, since such tags can be made in highly miniaturised form and hidden quite easily, particularly in larger valuables such as paintings or furniture.
  • RFID Radio Frequency Identification
  • Any copy of the valuable can easily be detected by scanning for the tag. Any tampering with the valuable can be detected by acquiring a fresh image of one or more characteristic regions and comparing these images with the corresponding stored images in the tag.
  • the stored image or images are of higher-than-optical resolution in order to discourage normal fraudulent alteration which is dependent upon the faker's eyesight with, at best, enhancement by optical means such as a magnifying glass.
  • the acquired image need not be an electron micrograph and accordingly this aspect of the invention is applicable to valuables unable to be imaged by a scanning electron microscope (SEM), for example because they are too large to fit inside the imaging chamber.
  • SEM scanning electron microscope
  • the images could be optical.
  • the advantages of the invention in its various aspects arise from the highly detailed information which can be stored securely, either in a very small electronic memory in an electronic tag associated with the valuable (e.g. incorporated in a certificate associated with the valuable or even hidden in the valuable itself) or remotely e.g. in a database on a remote server.
  • the image data is encrypted in order to provide further security.
  • Figure 1 is a diagrammatic representation of apparatus for certifying or verifying a cut or uncut precious or semi-precious stone or other valuable
  • Figure 2 is a diagrammatic perspective view showing a valuable having an identifier tag hidden thereon in accordance with another aspect of the invention
  • Figure 3 is an example of an electron micrograph of the culet of a diamond as obtained by the apparatus of Figure 1 ; and Figure 4 is a block diagram illustrating a hardware and software system incorporating the apparatus of Figure 1.
  • the apparatus shown in Figure 1 comprises a computer 1 having a hard disk 4 (and a conventional microprocessor provided with RAM and ROM and a conventional operating system) controlled from a keyboard 2 and optionally a pointing device such as a mouse (not shown).
  • the computer 1 has a suitable interface (not shown) for the output of a scanning electron microscope 11 and images from the scanning electron microscope preferably with optical colour images can be displayed on a screen 3, stored on hard disk 4 and encrypted under the control of any suitable encryption software running on computer 1.
  • the resulting digitised images are output to an inductive writer 6 which is arranged to store the images in a memory 8 of a miniature RFID (Radio Frequency Identification) tag 7, such as Hitachi-Maxwell ME1 chip which picks up the wireless signals by means of a miniature on-chip 9.
  • the tag typically has dimensions of 2.5mm x 2.5mm x 0.6mm.
  • the tag 7 now contains encrypted digitised electron micrograph images and preferably also optical images in non-volatile memory and can be read by reader/writer 6.
  • a stone 12 is indicated on a greatly enlarged scale and it will be noted that the scanning electron microscope 11 is directed at a girdle region 14 or table region 15 which may or may not be cut or polished but which is highly characteristic of an individual gem stone in view of the large number of facet boundaries and minute irregularities it contains.
  • the scanning electron microscope is also arranged to view the crown 15 of the stone 12 as indicated at 11a and to view the culet 13 as indicated at 11b. Encrypted digitised electron micrographs are acquired, preferably in at least these three views.
  • the culet 13 and the adjacent tips of facets F1 , F2 and F3 are shown as they appear in the electron micrograph acquired by the scanning electron microscope in position 11b and the irregularities in this characteristic region are readily apparent.
  • the magnification is x 1000.
  • the apparatus of Figure 1 can also be used for verifying a diamond 12 or another gem stone or indeed any other valuable having an associated electronic tag containing digitised electron micrographs or other physical data of characteristic regions which can be used for identification purposes.
  • These previously obtained electron micrographs are retrieved by computer 1 either directly from the associated RFID tag 7 using the reader/writer 6 or by accessing a remote archive 140 ( Figure 4 - discussed in more detail below) using a communications link 5.
  • These are displayed on the screen 3 and compared (e.g. visually) with electron micrographs acquired from corresponding view points from the gem stone 12 or other valuable as presented for evaluation. If the images match, then the gem stone or other valuable can be considered to be authentic.
  • a suitable selection of images are compared, it is highly likely that any re-cutting or tampering with the stone will be detectable.
  • a "natural” is often left at the culet 13 or at other regions of a gem stone to ensure that the weight just exceeds one of the standard weights, e.g. 1.00 carat.
  • the value per carat of a gem stone falling fractionally below one of the standard carat weights is far less than the value per carat of a gem stone lying just above a standard carat.
  • the "naturals" of a gem stone are normally highly irregular and therefore highly characteristic of an individual stone and are particularly suitable for imaging by an electron microscope for identification purposes.
  • other higher than optical resolution modes of imaging may be employed, e.g. X-ray or laser imaging or tomography, magnetic resonance imaging (MRI) or scanning tunnelling microscopy (STM).
  • the RFID tag 7 may be attached to the valuable V in a concealed fashion (e.g. in a rear corner of a painting as shown in Figure 2).
  • One or more images of characteristic regions of the valuable V are stored in digitised encrypted form in the RFID tag 7 in a manner similar to that described with reference to Figure 1 and the valuable V can subsequently be authenticated by electronically scanning for the digitised image information stored in the RFID tag 7, retrieving and decrypting this information using the computer controlled reader/writer 6 of Figure 1 and comparing the digitised images with freshly acquired images of the same characteristic regions.
  • transaction data or other financial data pertaining to the valuable V or gem stone 12 can be stored in association with the digitised images in a remote database and retrieved by computer 1 using a communications link 5 in order to establish a complete chain of ownership back to the original producer of the gem stone 12 or, more generally, the first recorded owner of a valuable V.
  • a communications link 5 in order to establish a complete chain of ownership back to the original producer of the gem stone 12 or, more generally, the first recorded owner of a valuable V.
  • a scanning electron microscope imaging system 11 is linked to a hard drive 4 of a computer and is arranged to generate RFID tags storing encrypted digitised electron micrographs by process 17 as already described in relation to Figure 1.
  • a communications link 5 links the computer with its hard drive to an archive retrieval system 140 (e.g. a server) which hosts an image and information database 110. As shown, this database includes fields for the identifier (# symbol 1 to # symbol n), images (11, 12 .... In) and transactions
  • the archive retrieval system 140 is also linked to a payment card anti- fraud link 130 which connects to a remote retrieval site 100 owned e.g. by a financial institution such as a credit card or insurance company or bank. Only if the gem stone 12 or valuable V is authenticated does the financial institution authorise a credit card or other payment from a buyer wishing to acquire the gem stone or other valuable from the purported owner.
  • the payment card anti-fraud link 130 may also provide credit card verification or other credit information to computer 1 which may be located at a retail outlet.
  • data encryption and decryption may be provided by a separate block 120 which communicates with database 110, payment card anti-fraud link 130 and the computer 1.

Abstract

An arrangement for certifying and checking gem stones (12) and other valuables comprises an electron microscope (11) controlled by a computer (1) and arranged to acquire digitised electron micrographs of characteristic regions of the gem stone or other valuable, particularly the culet (13) or girdle (14) which are typically highly irregular and therefore highly characteristic of individual stones. The digitised electron micrographs are encrypted and written to an RFID (7) which can be embedded in a plastics certificate (10) of in some cases a concealed on the valuable itself. Any tampering with the gem stone (12) or other valuable can be detected by reading the stored micrographs in the tag (7) and comparing them with micrographs newly acquired from the gem stone (12) or valuable as presented for verification. For extra security, the digitised encrypted micrographs are also stored in a remote database which can also include transaction data and can be linked to a credit card database of a financial institution.

Description

ANTI-FRAUD APPARATUS AND METHOD FOR PROTECTING VALUABLES
The present invention relates to a method and apparatus for characterising valuables, particularly but not exclusively precious or semiprecious stones, to identification certificates obtainable by the apparatus or method, and to methods of checking for fraudulent transactions or operations on a valuable, particularly but not exclusively precious or semi-precious stones. The invention also relates to electronically tagged valuables. It is conventional to characterise diamonds and other precious semiprecious stones by their carat (weight), colour, clarity and cut, known as the 4C's. These characteristics can be checked relatively easily by accurate weighing and optical examination and are conventionally recorded on a printed certificate which accompanies the gem and evidences its authenticity. However, the colour and clarity of a diamond are somewhat subjective and it is not unknown for fraudulent substitutions to be made in traded gems.
One approach to solving the above problems involves marking the gem and providing image data on a certificate - as disclosed in US 5,899,503. Furthermore, a stolen diamond can effectively acquire a new identity by being re-cut, enabling it to be traded on the legitimate market with a low risk of detection and only a small loss in weight.
More generally, valuables such as gems, objets d'art and items of scientific value such as meteorites are not always easy to identify and are frequently the subject of fraudulent operations such as forgery or alteration or fraudulent transactions e.g. after being stolen by substitution for a similar item of higher value.
GB 2,358,541 A discloses optical apparatus for capturing a three- dimensional image of a diamond. However the resulting digitised images are subject to degradation by pixellation and are limited in resolution. An object of the present invention is to overcome or alleviate at least some of the above problems.
In a first aspect the invention provides a method of characterising a cut or uncut precious or semi-precious stone comprising the steps of acquiring a high resolution image of at least one characteristic feature of the stone, digitising said image and storing the digitised image in association with an identifier of the stone. By a high resolution image is meant an image of resolution sufficiently high to define features such as irregularities which are characteristic of the individual stone. Preferably the resolution is higher than optical resolution.
Preferably the image is an electron micrograph and the selected characteristic feature is an irregular region at the boundary of two or more facets, e.g. at the culet or (in the case of an emerald cut diamond) the keel which are highly characteristic of an individual gem stone, especially at the resolution of an electron microscope.
Preferably the digitised image is stored in an electronic tag. A particularly preferred electronic tag is the ME1 Hitachi-Maxell RFID chip as made by Hitachi. Such tags are highly miniaturised and can be written to and read from in a contactless manner and incorporated permanently in a certificate in a tamper-proof manner. For example, the tag can be sealed within a certificate of plastics material.
Other preferred features of this aspect of the invention are defined in the dependent claims.
Cut or uncut precious or semi-precious stones that have been characterised by the method defined above are also included within the first aspect of the invention.
In a second aspect the invention provides an identification certificate for a cut or uncut precious or semi-precious stone, the certificate including an electronic tag in which a digitised image of at least one characteristic feature of the individual stone is stored. Preferably the irregular region is as described above, particularly the culet, keel, girdle, table or crown and preferably the electronic tag is an RFID (Radio Frequency Identification) tag.
Preferably the digitised image is an electron micrograph and preferably the digitised image is stored in encrypted form. Preferably the electronic tag is permanently secured to the certificate in a tamper-proof manner.
In a third aspect the invention provides apparatus for certifying a valuable, the appε;atus comprising means for acquiring a high (preferably higher-than-optical) resolution digitised image of at least one characterising region of the valuable, means for encrypting said digitised image and writing means arranged to write said encrypted digitised image to an electronic identifier tag associated with said valuable. Such apparatus can be used to provide genuine proof of both authenticity and ownership.
Preferably the apparatus further comprises transmitting means arranged to transmit said encrypted digitised image and an identifier for valuable to a remote server posting a database of such encrypted digitised images and identifiers.
Preferably the image acquiring means comprises an electron microscope. In a fourth aspect the invention provides a method of checking for fraudulent transactions involving or operations on a valuable, the method comprising the steps of acquiring a high (preferably higher-than-optical) resolution image of at least one characterising region of the valuable, reading a similar image from an electronic identifier tag associated with the valuable and comparing the images.
Preferably the method comprises the further step of receiving from a database of such images a previously acquired digitised image having an identifier corresponding to an identifier store in said electronic identifier tag. Each identifier can be stored in association with its corresponding digitised image in the database and accordingly a digitised image can be retrieved by selecting the appropriate identifier. In a preferred embodiment, financial transaction data pertaining to the valuable as identified by an identifier stored in said electronic identifier tag are received from a database. This database can either be the same database as the image database referred to above, or a completely separate database maintained by e.g. a financial institution such as a bank or a credit card or insurance company. This feature enables a register of transactions in a given valuable to be kept, so that any attempted transactions in a stolen valuable can be detected by comparison with this register.
If the valuable is a cut or uncut precious or semi-precious stone, the characterising region is preferably an irregular region of the stone, e.g. the culet, keel, girdle, table or crown facets as noted above.
Preferably the digitised images are stored in encrypted form and are decrypted prior to the comparison.
In a fifth aspect the invention provides a valuable having secured thereto a hidden electronic identifier tag, the electronic identifier tag having a stored image of at least one characterising region of the valuable and an identifier of the valuable.
Preferably the electronic tag is an RFID (Radio Frequency Identification) tag or the like, since such tags can be made in highly miniaturised form and hidden quite easily, particularly in larger valuables such as paintings or furniture.
Any copy of the valuable can easily be detected by scanning for the tag. Any tampering with the valuable can be detected by acquiring a fresh image of one or more characteristic regions and comparing these images with the corresponding stored images in the tag.
Preferably the stored image or images are of higher-than-optical resolution in order to discourage normal fraudulent alteration which is dependent upon the faker's eyesight with, at best, enhancement by optical means such as a magnifying glass. In this aspect the acquired image need not be an electron micrograph and accordingly this aspect of the invention is applicable to valuables unable to be imaged by a scanning electron microscope (SEM), for example because they are too large to fit inside the imaging chamber. In a less preferred embodiment the images could be optical.
In general, the advantages of the invention in its various aspects arise from the highly detailed information which can be stored securely, either in a very small electronic memory in an electronic tag associated with the valuable (e.g. incorporated in a certificate associated with the valuable or even hidden in the valuable itself) or remotely e.g. in a database on a remote server. Preferably the image data is encrypted in order to provide further security. Preferred embodiments of the invention are described below, by way of example only, with reference to Figures 1 to 4 of the accompanying drawings, wherein:
Figure 1 is a diagrammatic representation of apparatus for certifying or verifying a cut or uncut precious or semi-precious stone or other valuable; Figure 2 is a diagrammatic perspective view showing a valuable having an identifier tag hidden thereon in accordance with another aspect of the invention;
Figure 3 is an example of an electron micrograph of the culet of a diamond as obtained by the apparatus of Figure 1 ; and Figure 4 is a block diagram illustrating a hardware and software system incorporating the apparatus of Figure 1.
The apparatus shown in Figure 1 comprises a computer 1 having a hard disk 4 (and a conventional microprocessor provided with RAM and ROM and a conventional operating system) controlled from a keyboard 2 and optionally a pointing device such as a mouse (not shown). The computer 1 has a suitable interface (not shown) for the output of a scanning electron microscope 11 and images from the scanning electron microscope preferably with optical colour images can be displayed on a screen 3, stored on hard disk 4 and encrypted under the control of any suitable encryption software running on computer 1. The resulting digitised images are output to an inductive writer 6 which is arranged to store the images in a memory 8 of a miniature RFID (Radio Frequency Identification) tag 7, such as Hitachi-Maxwell ME1 chip which picks up the wireless signals by means of a miniature on-chip 9. The tag typically has dimensions of 2.5mm x 2.5mm x 0.6mm.
The tag 7 now contains encrypted digitised electron micrograph images and preferably also optical images in non-volatile memory and can be read by reader/writer 6.
The tag is then processed in an encapsulation device 16 which, in a process indicated by arrow 17, embeds the tag in a certificate 10 which is suitably a plastic card on which can be printed a further data indicating e.g. the carat, colour, clarity and cut of the stone and one or more visual images of the stone. The images are provided with a unique identifier which is entered under keyboard control and transmitted from reader/write 6 to memory 8. In Figure 1 , a stone 12 is indicated on a greatly enlarged scale and it will be noted that the scanning electron microscope 11 is directed at a girdle region 14 or table region 15 which may or may not be cut or polished but which is highly characteristic of an individual gem stone in view of the large number of facet boundaries and minute irregularities it contains. The scanning electron microscope is also arranged to view the crown 15 of the stone 12 as indicated at 11a and to view the culet 13 as indicated at 11b. Encrypted digitised electron micrographs are acquired, preferably in at least these three views.
Referring to Figure 3, the culet 13 and the adjacent tips of facets F1 , F2 and F3 are shown as they appear in the electron micrograph acquired by the scanning electron microscope in position 11b and the irregularities in this characteristic region are readily apparent. The magnification is x 1000.
The apparatus of Figure 1 can also be used for verifying a diamond 12 or another gem stone or indeed any other valuable having an associated electronic tag containing digitised electron micrographs or other physical data of characteristic regions which can be used for identification purposes. These previously obtained electron micrographs are retrieved by computer 1 either directly from the associated RFID tag 7 using the reader/writer 6 or by accessing a remote archive 140 (Figure 4 - discussed in more detail below) using a communications link 5. These are displayed on the screen 3 and compared (e.g. visually) with electron micrographs acquired from corresponding view points from the gem stone 12 or other valuable as presented for evaluation. If the images match, then the gem stone or other valuable can be considered to be authentic. Provided that a suitable selection of images are compared, it is highly likely that any re-cutting or tampering with the stone will be detectable.
It should be noted that at an uncut extremity, a "natural" is often left at the culet 13 or at other regions of a gem stone to ensure that the weight just exceeds one of the standard weights, e.g. 1.00 carat. The value per carat of a gem stone falling fractionally below one of the standard carat weights is far less than the value per carat of a gem stone lying just above a standard carat. The "naturals" of a gem stone are normally highly irregular and therefore highly characteristic of an individual stone and are particularly suitable for imaging by an electron microscope for identification purposes. However, it is envisaged that other higher than optical resolution modes of imaging may be employed, e.g. X-ray or laser imaging or tomography, magnetic resonance imaging (MRI) or scanning tunnelling microscopy (STM).
In a variant of the method of certification illustrate in Figure 1 , which is particularly applicable to larger valuables (V2) such as paintings, sculptures and furniture (but with increasing miniaturisation of RFID tags may also be applicable to smaller valuables including jewellery, even gem stones), the RFID tag 7 may be attached to the valuable V in a concealed fashion (e.g. in a rear corner of a painting as shown in Figure 2). One or more images of characteristic regions of the valuable V are stored in digitised encrypted form in the RFID tag 7 in a manner similar to that described with reference to Figure 1 and the valuable V can subsequently be authenticated by electronically scanning for the digitised image information stored in the RFID tag 7, retrieving and decrypting this information using the computer controlled reader/writer 6 of Figure 1 and comparing the digitised images with freshly acquired images of the same characteristic regions.
In a development of the arrangement shown in Figure 1 , transaction data or other financial data pertaining to the valuable V or gem stone 12 can be stored in association with the digitised images in a remote database and retrieved by computer 1 using a communications link 5 in order to establish a complete chain of ownership back to the original producer of the gem stone 12 or, more generally, the first recorded owner of a valuable V. Such a system is shown schematically in Figure 4. Referring to Figure
4, a scanning electron microscope imaging system 11 is linked to a hard drive 4 of a computer and is arranged to generate RFID tags storing encrypted digitised electron micrographs by process 17 as already described in relation to Figure 1. A communications link 5 links the computer with its hard drive to an archive retrieval system 140 (e.g. a server) which hosts an image and information database 110. As shown, this database includes fields for the identifier (# symbol 1 to # symbol n), images (11, 12 .... In) and transactions
(T1 , T2 Tn) such that inputting the identifier of a gem stone or other valuable enables the corresponding sets of images and transactions to be retrieved by computer 1.
The archive retrieval system 140 is also linked to a payment card anti- fraud link 130 which connects to a remote retrieval site 100 owned e.g. by a financial institution such as a credit card or insurance company or bank. Only if the gem stone 12 or valuable V is authenticated does the financial institution authorise a credit card or other payment from a buyer wishing to acquire the gem stone or other valuable from the purported owner. The payment card anti-fraud link 130 may also provide credit card verification or other credit information to computer 1 which may be located at a retail outlet.
Finally, data encryption and decryption may be provided by a separate block 120 which communicates with database 110, payment card anti-fraud link 130 and the computer 1.

Claims

CLAIMS:
1. A method of characterising a cut or uncut precious or semi-precious stone (12) comprising the steps of acquiring a high resolution image (In) of at least one characteristic feature (13, 14, 15) of the stone, digitising said image and storing the digitised image in association with an identifier (#n) of the stone.
2. A method according to claim 1 wherein said digitised image (In) is stored in an electronic tag (7).
3. A method according to claim 2 wherein said electronic tag (7) is tamper-proof.
4. A method according to claim 2 or claim 3 wherein said electronic tag
(7) is permanently secured to an identification certificate (10) in a tamper- proof manner.
5. A method according to claim 4 wherein said tag (7) is sealed within a certificate (10) of plastics material.
6. A method according to any of claims 2 to 5 wherein said electronic tag (7) is readable in a non-contact manner.
7. A method according to any of claims 2 to 6 wherein said digitised image (In) is stored in said electronic tag (7) in encrypted form.
8. A method according to any preceding claim wherein said digitised image (In) is stored remotely in an electronic database (110) so as to be retrievable therefrom using said identifier (#n).
9. A method according to claim 8 wherein said digitised image (In) is stored in said electronic database (110) in association with financial transaction data (In) pertaining to the stone (12).
10. A method according to any preceding claim wherein said characteristic feature is an irregularity (13) at the boundary of two or more facets (F1, F2, F3) of a cut stone (12).
11. A method according to claim 10 wherein said characteristic feature is the culet (13) keel, girdle (14), table, or crown (15).
12. A method according to any preceding claim wherein said digitised image (In) is an electron micrograph.
13. A cut or uncut precious or semi-precious stone (12) that has been characterised by a method as claimed in any preceding claim.
14. An electronically tagged certificate (10) obtained by a method as claimed in claim 2 or any of claims 3 to 12 as dependent upon claim 2.
15. An identification certificate (10) for a cut or uncut precious or semiprecious stone (12), the certificate including an electronic tag (7) in which a digitised image (In) of at least one characteristic feature (13, 14, 15) of the individual stone is stored.
16. An identification certificate (10) according to claim 15 wherein said electronic tag (7) is an RFID (Radio Frequency Identification) tag.
17. An identification certificate (10) according to claim 15 or claim 16 wherein said digitised image (In) is stored in encrypted form.
18. An identification certificate (10) according to any of claims 15 to 17 wherein said characteristic feature (13, 14, 15) is as defined in claim 10 or claim 11.
19. An identification certificate (10) according to claim 18 wherein said digitised image (In) is an electron micrograph.
20. An identification certificate (10) according to any of claims 15 to 19 wherein said electronic tag (7) is permanently secured to said certificate in a tamper-proof manner.
21. An identification certificate (10) according to claim 20 wherein said certificate is composed of plastics material within which said electronic tag (7) is sealed.
22. Apparatus for certifying a valuable (12/V), the apparatus comprising means (1, 2, 3, 4, 11) for acquiring a high resolution digitised image (In) of at least one characterising region of the valuable (12/V), means (120) for encrypting said digitised image and writing means (6) arranged to write said encrypted digitised image to an electronic identifier tag (7) associated with said valuable.
23. Apparatus according to claim 22, further comprising transmitting means (1, 5) arranged to transmit said encrypted digitised image (In) and an identifier (#n) of the valuable (V/12) to a remote server (140) hosting a database (110) of such encrypted digitised images and identifiers.
24. Apparatus according to claim 22 or claim 23 wherein said image acquiring means comprises an electron microscope (11).
25. A method of checking for fraudulent transactions involving or operations on a valuable (V/12), the method comprising the steps of acquiring a high resolution image (In) of at least one characterising region (13, 14, 15) of the valuable, reading a similar image from an electronic identifier tag (7) associated with the valuable, and comparing the images.
26. A method according to claim 25 comprising the further step of receiving from a database (110) of such images a previously acquired digitised image having an identifier corresponding to an identifier (#n) stored in said electronic identifier tag.
27. A method according to claim 25 or claim 26 comprising receiving from a database financial transaction data (In) pertaining to the valuable (V/12) as identified by an identifier (#n) stored in said electronic identifier tag (7).
28. A method according to any of claims 25 to 27 wherein said valuable is a cut or uncut precious or semi-precious stone (12) and said characterising region is an irregular region (13, 14, 15) of the stone.
29. A method according to claim 28 wherein said irregular region (13, 14, 15) is as defined in claim 10 or claim 11.
30. A method according to any of claims 25 to 29 wherein the digitised images (In) are stored in encrypted form and are decrypted prior to the comparison.
31. A valuable (V) having secured thereto a hidden electronic identifier tag (7), the electronic identifier tag having a stored image (In) of at least one characterising region of the valuable and an identifier (#n) of the valuable.
32. A valuable (V) according to claim 31 wherein said electronic tag (7) is an RFID (Radio Frequency Identification) tag.
33. A valuable (V) according to claim 31 or claim 32 wherein said at least one image (In) is at higher than optical resolution.
34. A valuable (V) according to any of claims 31 to 33 wherein said image (In) is stored in encrypted form.
PCT/GB2002/005881 2001-12-20 2002-12-20 Anti-fraud apparatus and method for protecting valuables WO2003053715A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP02788239A EP1465779B1 (en) 2001-12-20 2002-12-20 Anti-fraud method for protecting valuable stones
US10/499,851 US20050103840A1 (en) 2001-12-20 2002-12-20 Anti-fraud apparatus and method for protecting valuables
DE60226898T DE60226898D1 (en) 2001-12-20 2002-12-20 FRAUD PREVENTION METHOD FOR THE PROTECTION OF VALUABLE STONES
AU2002353221A AU2002353221A1 (en) 2001-12-20 2002-12-20 Anti-fraud apparatus and method for protecting valuables

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0130540.8A GB0130540D0 (en) 2001-12-20 2001-12-20 Method for displaying information
GB0130540.8 2001-12-20

Publications (2)

Publication Number Publication Date
WO2003053715A2 true WO2003053715A2 (en) 2003-07-03
WO2003053715A3 WO2003053715A3 (en) 2003-08-28

Family

ID=9928078

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2002/005881 WO2003053715A2 (en) 2001-12-20 2002-12-20 Anti-fraud apparatus and method for protecting valuables

Country Status (7)

Country Link
US (1) US20050103840A1 (en)
EP (1) EP1465779B1 (en)
AT (1) ATE397209T1 (en)
AU (1) AU2002353221A1 (en)
DE (1) DE60226898D1 (en)
GB (2) GB0130540D0 (en)
WO (1) WO2003053715A2 (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4285277B2 (en) * 2004-03-03 2009-06-24 カシオ計算機株式会社 Image capturing apparatus, electronic tag information and image data management system, and program
FR2877472B1 (en) * 2004-11-04 2008-06-06 Novatec Sa Sa Soc METHOD AND DEVICE FOR VERIFYING NO INTRUSION IN A SYSTEM AND / OR NON-INTEGRITY WITH THE INTEGRITY OF AN OBJECT
US20090201129A1 (en) * 2005-04-07 2009-08-13 Stannards Accountants Authenticity Determination
WO2007022282A2 (en) * 2005-08-16 2007-02-22 Anaconda Sports, Inc. Bat with an identification device
CN1815192A (en) * 2006-03-14 2006-08-09 王辉 Jewel internal-structure detection method and apparatus
CN102183491A (en) * 2006-03-14 2011-09-14 王辉 Detecting device for internal structure of jewelry
US20110082969A1 (en) * 2006-07-26 2011-04-07 James Joseph Macor Associative data storage devices for authentication of collectable objects
US7422147B2 (en) * 2006-12-22 2008-09-09 Walter Steven Rosenbaum System and method for detecting fraudulent transactions of items having item-identifying indicia
US7945487B2 (en) * 2007-03-29 2011-05-17 Arrow Electronics, Inc. Method and apparatus for certified secondary market inventory management
US20080249899A1 (en) * 2007-04-05 2008-10-09 Nasser Gabriel G System and Method for Inventory
WO2009032640A2 (en) * 2007-08-28 2009-03-12 Thermo Niton Analyzers Llc Contactless memory information storage for sample analysis and hand-holdable analyzer for use therewith
US8229070B2 (en) * 2009-09-30 2012-07-24 The Board Of Trustees Of The Leland Stanford Junior University Intrafraction motion management using a rough to accurate monitoring strategy
US20120001737A1 (en) * 2010-05-13 2012-01-05 Amir Berger Method and system for computed radiography
US11270294B2 (en) * 2010-12-08 2022-03-08 James J. Macor System and method for authentication of collectable objects
IN2015KN00453A (en) * 2012-08-31 2015-07-17 Gemex Systems Inc
US9756774B1 (en) 2015-01-15 2017-09-12 Ag Leader Technology, Inc. Automatic in field variety identification
US10235542B2 (en) * 2016-06-02 2019-03-19 NanoRosetta, LLC Jewelry including etched or printed information and method to optically or wirelessly access digital replica of the etched or printed information
US20190251347A1 (en) * 2016-10-28 2019-08-15 Sterling Jewelers, Inc. Object characterization and authentication
IT201700012647A1 (en) * 2017-02-06 2018-08-06 Jean Luc Bussa Anti-counterfeiting device and relative identification system.
CA3058554A1 (en) * 2017-03-29 2018-10-04 Engemma Oy Gemological object recognition
RU2739134C1 (en) * 2017-12-29 2020-12-21 Голдвэй Текнолоджи Лимитед Method and system for determining a color group for diamonds
US11326952B2 (en) 2019-07-29 2022-05-10 Goldway Technology Limited Process and system for colour grading for diamonds

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5899503A (en) 1996-11-11 1999-05-04 Yoshizawa; Hiroaki Gem certificate, gem grading report, guarantee, and method of guaranteeing jewelry
GB2358541A (en) 1999-10-29 2001-07-25 Diamond And Jewelry 4 U Ltd Gemstone image capture system

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4354189A (en) * 1977-11-09 1982-10-12 Lemelson Jerome H Switch and lock activating system and method
EP0042361A1 (en) * 1980-06-17 1981-12-23 GRETAG Aktiengesellschaft Method and device for machine identification of gem stones
FR2582129B1 (en) * 1985-02-21 1987-12-31 Despres Jean Albert METHOD FOR IDENTIFYING A VALUABLE OBJECT AND DEVICE FOR CARRYING OUT THIS METHOD
EP0256196A1 (en) * 1986-08-13 1988-02-24 Artika International (Hong-Kong) Limited Method to identify a certain object and to recognize it afterwards
JPS63174253A (en) * 1987-01-13 1988-07-18 Fuji Photo Film Co Ltd Electron microscope
JPH0354664A (en) * 1989-07-24 1991-03-08 Kiyuube Kk Guaranteeing system for expensive article such as art object or the like
US5410125A (en) * 1990-10-11 1995-04-25 Harry Winston, S.A. Methods for producing indicia on diamonds
AU3244793A (en) * 1991-12-09 1993-07-19 Gem International Network, Inc. Computer imaging system for gemstones
JP2670721B2 (en) * 1991-12-24 1997-10-29 株式会社 ・イー・アール・シー・ Jewelry and jewelry identification device
DE4230548C2 (en) * 1992-09-08 1996-01-18 Borus Spezialverfahren Process for the production of calcium alpha hemihydrate suitable as a building material from moist, finely divided flue gas desulfurization gypsum
US5521984A (en) * 1993-06-10 1996-05-28 Verification Technologies, Inc. System for registration, identification and verification of items utilizing unique intrinsic features
US5682142A (en) * 1994-07-29 1997-10-28 Id Systems Inc. Electronic control system/network
US5677521A (en) * 1995-06-29 1997-10-14 Garrou; Elizabeth B. Personal identification and credit information system and method of performing transaction
CA2162532C (en) * 1995-11-09 2001-01-30 Dana J. Vanier Gemstone registration system
US5932119A (en) * 1996-01-05 1999-08-03 Lazare Kaplan International, Inc. Laser marking system
US6020954A (en) * 1997-12-18 2000-02-01 Imagestatistics, Inc. Method and associated apparatus for the standardized grading of gemstones
JP2000071647A (en) * 1998-06-18 2000-03-07 Zaza International:Kk Jewel quality certificate
US6140936A (en) * 1998-09-03 2000-10-31 Armstrong; Jay Alan Personal electronic storage device container and labeling
US6709747B1 (en) * 1998-09-28 2004-03-23 Skeleton Technologies Ag Method of manufacturing a diamond composite and a composite produced by same
US6450402B1 (en) * 1999-05-05 2002-09-17 T.I.D. (The Identifying Diamond) Inc. Identification device
US6308891B1 (en) * 1999-05-05 2001-10-30 T.I.D. (The Identifying Diamond) Inc. Jewelry identification
US20010027439A1 (en) * 1999-07-16 2001-10-04 Holtzman Henry N. Method and system for computerized form completion
US6634560B1 (en) * 1999-12-14 2003-10-21 Moore North America, Inc. Radio frequency identification tagging, encoding/reading through a digitizer tablet
US6747561B1 (en) * 2000-06-20 2004-06-08 Med-Datanet, Llc Bodily worn device for digital storage and retrieval of medical records and personal identification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5899503A (en) 1996-11-11 1999-05-04 Yoshizawa; Hiroaki Gem certificate, gem grading report, guarantee, and method of guaranteeing jewelry
GB2358541A (en) 1999-10-29 2001-07-25 Diamond And Jewelry 4 U Ltd Gemstone image capture system

Also Published As

Publication number Publication date
GB2384130A (en) 2003-07-16
GB0130540D0 (en) 2002-02-06
AU2002353221A8 (en) 2003-07-09
ATE397209T1 (en) 2008-06-15
US20050103840A1 (en) 2005-05-19
GB2384130B (en) 2004-12-15
WO2003053715A3 (en) 2003-08-28
EP1465779B1 (en) 2008-05-28
EP1465779A2 (en) 2004-10-13
DE60226898D1 (en) 2008-07-10
GB0229827D0 (en) 2003-01-29
AU2002353221A1 (en) 2003-07-09
GB2384130C (en) 2011-08-12

Similar Documents

Publication Publication Date Title
EP1465779B1 (en) Anti-fraud method for protecting valuable stones
US11864642B1 (en) Secure diamond smart cards and exchange systems therefor
EP0533829B1 (en) Security of objects or documents
US5983238A (en) Gemstons identification tracking and recovery system
CN100530253C (en) System and method of authenticating an article
US8360317B2 (en) Apparatus and method for enhancing card security
WO2005082078A2 (en) Gem item report method and system
US20010047340A1 (en) Authenticity verification method and apparatus
CN107316075B (en) Jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting method and jewelry identity traceability material evidence integrated multidimensional binding anti-counterfeiting kit
CN1965325A (en) Electronic transaction verification system
KR19980032255A (en) Methods and means of preventing abuse of counterfeit credit cards, access badges, and electronic accounting
EA009688B1 (en) Random-type identifying material, 3-d identifying system and method using the same
US9575724B1 (en) Verification system and method for a collectible object
US11475262B2 (en) Unique secured product identification for gemstones
JP2007091453A (en) Control method of pearl management system, program, cultured pearl, and pearl management system
JP2022097754A (en) Information processing device
JPH10503037A (en) Verification technology
US20060092476A1 (en) Document with user authentication
JP2004086828A (en) Business model for quality certification and antitheft system for jewel
US10192084B1 (en) System and method for authenticating objects with authorized access controls
JP2003112825A (en) Article authenticating method and authenticating attaching tool
WO2020130932A1 (en) System and method of packaging and/or authenticating fungible baskets of investment grade gemstones and/or precious metals
CN110297920A (en) A kind of yard of fingerprint method for anti-counterfeit
JPWO2005057477A1 (en) Network system, media, market research system.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2002788239

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2002788239

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10499851

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP

WWG Wipo information: grant in national office

Ref document number: 2002788239

Country of ref document: EP