WO 2014/009563 Al 16 January 2014 (16.01.2014) P O P C T
Total Page:16
File Type:pdf, Size:1020Kb
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (10) International Publication Number (43) International Publication Date WO 2014/009563 Al 16 January 2014 (16.01.2014) P O P C T (51) International Patent Classification: Chemin des Berges 4, CH-1022 Chavannes-pres-Renens G04D 1/06 (2006.01) G04D 7/12 (2006.01) (CH). BERTHIER, Yves; Avenue Reine des Pres 6, F- G04D 7/00 (2006.01) G01H 17/00 (2006.01) 25370 Metabief (FR). (21) International Application Number: (74) Agents: JACKSON, Richard, Eric et al; Carpmaels & PCT/EP20 13/064865 Ransford LLP, One Southampton Row, London WC1B 5HA (GB). (22) International Filing Date: 12 July 2013 (12.07.2013) (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, (25) Filing Language: English AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, (26) Publication Language: English BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, (30) Priority Data: HN, HR, HU, ID, IL, IN, IS, JP, KE, KG, KN, KP, KR, 12005180.0 13 July 2012 (13.07.2012) EP KZ, LA, LC, LK, LR, LS, LT, LU, LY, MA, MD, ME, 12005181 .8 13 July 2012 (13.07.2012) EP MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, 61/739,392 19 December 2012 (19. 12.2012) US OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SC, 61/739,381 19 December 2012 (19. 12.2012) US SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, (71) Applicant: SICPA HOLDING SA [CH/CH]; Avenue de TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. Florissant 41, CH-1008 Prilly (CH). (84) Designated States (unless otherwise indicated, for every (72) Inventors: DECOUX, Eric; Rue du Jura 8, CH-1800 kind of regional protection available): ARIPO (BW, GH, Vevey (CH). SIRIGU, Lorenzo; Chemin des Aubepines 9, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, SZ, TZ, CH-1004 Lausanne (CH). CALLEGARI, Andrea; UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, [Continued on nextpage] (54) Title: A METHOD FOR AUTHENTICATING A TIMEPIECE (57) Abstract: A method of authenticating a timepiece, such as a watch, comprising at least two procedures. A procedure FIG. 1 may comprise analysing vibrations of the timepiece. A pro cedure may comprise analysing characteristics of a gemstone or gemstones of the timepiece. A procedure may comprise comparing measured or detected characteristics with reference information for the timepiece, and authenticating the timepiece based on the results of the comparison. w o 2014/009563 Ai II II II I III IIII II II II i l ll ll III II I II TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, Published: EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, — with international search report (Art. 21(3)) LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). A METHOD FOR AUTHENTICATING A TIMEPIECE FIELD OF THE INVENTION The present invention relates to a method for authenticating a timepiece, in particular a watch. BACKGROUND OF THE INVENTION Counterfeit consumer goods, commonly called knock-offs, are counterfeit or imitation products offered for sale. The spread of counterfeit goods has become global in recent years and the range of goods subject to infringement has increased significantly. Expensive watches (and spare parts for watches) are vulnerable to counterfeiting, and have been counterfeited for decades. A counterfeit watch is an illegal copy of a part or all of an authentic watch. According to estimates by the Swiss Customs Service, there are some 30 to 40 million counterfeit watches put into circulation each year. It is a common cliche that any visitor to New York City will be approached on a street corner by a vendor with a dozen such counterfeit watches inside his coat, offered at bargain prices. Extremely authentic looking, but very poor quality watches fakes with self-winding mechanisms and fully working movements can sell for as little as twenty dollars. The problem is becoming more and more serious, with the quality of the counterfeits constantly increasing. For example, some fakes' movements and materials are of remarkably passable quality and may look good to the untrained eye and work well for some years, a possible consequence of increasing competition within the counterfeiting community. Counterfeit watches cause an estimated $ 1 Billion loss per year to the watch industry. Authentication solutions that have been used for protection of consumer goods from counterfeiting are often based on marking the item with a specific material, code, or marking, engraving, etc. However, these methods modify the nature and the appearance of the object, and this is often not acceptable in the watch (and other luxury items) industry, where the design of the object and its visual appearance is of paramount importance. Also, these methods require an active intervention at the time of manufacturing and, correspondingly an important change of the production process. Counterfeiters often focus on the outer appearance of the watch and fit a cheap movement inside, because the potential buyer will focus more on the appearance of the piece, and because good movements are expensive. Even when a good quality movement is used, it is very difficult and expensive to make an exact copy and the counterfeit will prefer to use one that is easier to get or to manufacture. It is therefore desirable, to assess the authenticity of a timepiece, to have as much information as possible not only on its outer appearance but also on its inner content. It is furthermore desirable not to have to open the piece , as the operation requires specialized equipment and procedures, it may have an impact on the performances of the piece (e.g. water tightness), and may invalidate the manufacturer's warranty. Another method for identification and/or authentication involves tagging (e.g., a micro tag or RFID tag). The tagging approach, however, requires intervention and may be impracticable. Moreover, such an approach may not fulfill all of watchmakers needs and constraints to protect against counterfeits. Stability and durability of the marking or tag is also a problem, since the lifetime of a timepiece is often measured in tens of years. Therefore, there is a need for an improved watch identification and authentication method that provides the identification/authentication functionalities, while requiring minimal or no intervention in the manufacturing process and/or without any overt marking. SUMMARY OF THE INVENTION The present invention provides a method of authenticating a timepiece, as defined in claim 1. The method comprises at least two procedures and advantageously provides a very strong way of testing the authenticity of the timepiece. The method comprises at least two of a first procedure (i), a second procedure (ii), a third procedure (iii), and a fourth procedure (iv). Optional features of the procedures are defined in the appended dependent claims. Any two of the procedures may be part of the method, for example the third procedure and the fourth procedure. The method of authenticating the timepiece may comprise at least three of the first procedure (i), the second procedure (ii), the third procedure (iii) and the fourth procedure (iv). Any three of the procedures may be part of the method, for example the second procedure, the third procedure and the fourth procedure. Advantageously, an even stronger method is provided for testing the authenticity of the timepiece. The method of authenticating the timepiece may comprise the first procedure, the second procedure, the third procedure and the fourth procedure. Advantageously, an even stronger method is provided for testing the authenticity of the timepiece. The procedures may be carried out in any order and are not limited to the order in which they are presented in the description or claims. For example, the method may comprise the second procedure and the fourth procedure, wherein the fourth procedure is carried out before the second procedure. BRIEF DESCRIPTION OF THE FIGURES For a more complete understanding of the invention, as well as other objects and further features thereof, reference may be had to the following detailed description of the invention in conjunction with the following exemplary and non-limiting drawings wherein: Fig. 1 is a schematic representation of an escapement in a timepiece; Fig. 2 is a representation of acoustic vibrations in a timepiece as a function of time; Fig. 3 is a close-up view on two events in the time sequence represented in Fig. 2 ; Fig. 4 is a close-up view on the first event represented in Fig. 3; Fig. 5 illustrates a first embodiment of a first procedure for authenticating a timepiece according to the invention; Fig. 6 illustrates a second embodiment of the first procedure for authenticating a timepiece according to the invention; Fig. 7 illustrates a third embodiment of a first procedure for authenticating a timepiece according to the invention; Fig. 8 is a time-frequency representation of the acoustic vibrations of a timepiece according to a first model; Fig. 9 is a time-frequency representation of the acoustic vibrations of a timepiece according to a second model; Fig. 10 is a time-frequency representation of the acoustic vibrations of a timepiece according to a third model; Fig. 11 illustrates an embodiment of a second procedure for authenticating a timepiece according to the invention; Fig.