Jewellery with tag

ABSTRACT

A piece of jewelry, wherein the jewelry comprises at least one tag or chip programmed with at least a unique identification code, and a tag reader is configured to read the tag or chip when the tag reader and the piece of jewelry touch, or come into close contact and, display a message or content associated with the unique identification code.

RELATED APPLICATIONS

The present application is a National Stage entry of InternationalApplication No. PCT/GB2013/052004 filed Jul. 26, 2013 which claims thebenefit of GB Application No. 1213440.9, Jul. 27, 2012, saidapplications being hereby incur fated by reference in their entirety.

This invention relates to a piece of jewelry, wherein the jewelrycomprises at least one tag or chip programmed with at least a uniqueidentification code, and a tag reader is configured to read the tag orchip when the tag reader and the piece of jewelry touch, or come intoclose contact and, display a message or content associated with theunique identification code.

BACKGROUND

Items of jewelry are often given as gifts to signify important momentsin a life such as a wedding or engagement, birthdays, or othercelebrations. Items of jewelry include rings, pendants, bracelets,beads, brooches and the like. Often the gift giver opts to engrave theitem to impart a special personal message for the recipient: “I loveyou” or perhaps even “For you, on our wedding day 12 Aug. 2006” or“Congratulations on passing your exams”. Typically, wedding, engagementand eternity rings are engraved on the inner surface of the ring in asymbolic gesture of intimacy; only the giver and receiver need know themessage is there and what the message is. Celebration jewelry, given toa recipient to mark an important life event, may include a bracelet ornecklace with charms, beads, or pendants, and these items may also beengraved with a message or date adding that personal intimate touch

Engraving items or pieces of jewelry may require some skill, time, andeffort and often requires some sort of machinery or engraving tool. Itcan be difficult to engrave very small pieces of jewelry and especiallychallenging to engrave pieces of jewelry with patterned or contouredsurfaces. Furthermore, there is a limited space in which a person mayengrave a message on any piece of jewelry and the character size islimited so the resultant content of the message is also limited. Forexample, the message on the inside of a wedding band is typicallyrestricted to only a few characters, for example 25 characters. Clearlyany such message is thus very limited.

Radio-frequency identification (RFID) uses radio-frequencyelectromagnetic fields to transfer data from a tag or chip attached toan object, principally for the purposes of automatic identification(e.g. allowing a person access to a building) and tracking andmonitoring products (such as stocktaking or assembly line monitoring).Some tags or chips are passive and do not require a battery. Passivetags or chips are powered by the electromagnetic fields used to readthem. Non passive tags or chips use a local power source and emit radiowaves (electromagnetic radiation at radio frequencies). The tag or chipcontains electronically stored information which can be read by a readerfrom up to several meters away. Near field communication (NFC) is a setof standards covering communications protocols based on existing RFID.NFC requires touch or bringing a reader and tag into close proximity toeach other in order to establish radio communication with each other.

The prior art shows a variety of uses of RFID tags and chips.International patent application WO 2011/154213A provides a system formonitoring the stock in dynamic stores using RFID and discloses an RFIDcommunication system, comprising at least a first stationary RFIDantenna and a second stationary RFID antenna for transmitting andreceiving data; and an RFID transponder fitted to an item or a group ofitems, wherein the RFID transponder electronically stores at least oneidentifier of the item or the group of items, and wherein the first RFIDantenna is placed at an intake region and the second RFID antenna isplaced at an issue region of a storage path of the dynamic store inorder to detect the item or the group of items using the identifier ofthe RFID transponder.

Taiwanese patent application TW 2009/19344A discloses the use of RFIDtags in ticket applications. An anti-counterfeiting electronic ticketsystem is disclosed, which is used as an anti-counterfeiting applicationto prevent a simple electronic ticket from misuse of an illegalduplication means by means of a photographing method. A certificate canbe an image, a pattern or words, and is printed on a sticker or on thesurface of other entity articles by means of an anti-counterfeitingprinting technology. Alternatively, the certificate can be a wirelessradio frequency identification (RFID) label to form an entitycertificate. A user holds an electronic ticket image displayed on amonitor of a mobile apparatus and a pre-registered entity certificate,utilizes a ticket-examining apparatus to read content information of theentity certificate and the electronic ticket, and verifies by mutualcertification method of the two to be used as imitation prevention ofthe electronic ticket.

BRIEF SUMMARY OF THE DISCLOSURE

In accordance with a first aspect of the present invention, there isprovided an item of jewelry with at least one passive tag, wherein thepassive tag is programmed with at least a unique identification code,and wherein the unique identification code, when read from the passivetag by a tag reader having a display, authorises access to a message orcontent associated with the unique identification code, the message orcontent to be displayed on the display of the tag reader.

Preferably, the at least one tag is a radio frequency identification(RFID) tag or chip configured to operate as a near field communication(NFC) tag or chip. The tag may be any tag adapted to use near-fieldcommunication technology.

In some embodiments the at least one tag or chip operates on a verysmall range of less than about 1 cm.

In certain embodiments the at least one tag or chip is positioned on orin the item of jewelry and coated with a resin, glass or metal toprotect the chip or tag. The positioning of the at least one tag or chipprovides three dimensional readability of the tag or chip by the tagreader.

The tag reader may be a personal electronic device such as a smartphoneor tablet computer.

In other embodiments the at least one tag or chip is layered on thesurface of the item of jewelry.

In accordance with a second aspect of the present invention, there isprovided a system comprising an item of jewelry with a passive tag, anda tag reader with a display, wherein:

the passive tag is programmed with at least a unique identificationcode;

the tag reader is adapted to read the identification code from thepassive tag when the tag reader and the item of jewelry touch, or comeinto close proximity with each other; and

the tag reader is configured to access a message or content that isassociated with the unique identification code and to display themessage or content on the display.

Preferably, the reader is adapted to go through an authorization stagewhereby the unique identification code of the tag and an authorisationcode assigned to the reader must match before the tag reader can accessthe message or content assigned to the identification code of the tag.

The message or content may be stored on a remote data storage device(such as a remote server, or cloud data storage system), and the tagreader may be configured to be able to communicate with the remote datastorage device.

In particularly preferred embodiments, the tag reader is configured as asmart phone or similar communications device having tag readingfunctionality as well as being able to connect to the Internet.

In some embodiments, the tag reader is adapted to preload the message orcontent assigned to the unique identification code so that oncepreloaded, when the item of jewelry with a passive tag come into contactor close proximity to one another, the associated message or content isinstantly displayed and the reader does not rely on connectivity withthe remote data storage device.

In a third aspect of the present invention, there is provided a methodof delivering an electronic message, including:

i) providing an item of jewelry with a tag having a uniqueidentification code,

ii) reading the unique identification code from the tag with a tagreader, and

iii) using the unique identification code to request delivery of amessage or content associated with the unique identification code to thetag reader to be displayed on the display of the tag reader.

Preferably, request delivery of a message includes authorising deliveryof a message.

Preferably, the tag reader can only access the message or contentassociated with the unique identification code if it is authorised to doso. The tag reader is provided with an authorisation code such as an IPaddress, SIM number, or mobile application identification number. Theauthorisation code of the tag reader and the tag need to match in orderfor the message to be delivered.

NFC tag readers work in a standardised manner, such that all tags can beread by all readers. However, the present invention relies on the factthat only authorised users can access their messages (i.e. only thewearer of the jewelry or individuals that the wearer has explicitlygranted access should be able to retrieve messages intended for theirconsumption). To ensure that only authorised access is permitted thesystem registers a pairing between the end user's mobile application IDnumber and each of the ID numbers of the items of jewelry they currentlyown. Any subsequent access to the messages stored for a particular itemof jewelry is only granted to the mobile application running on the tagreader, such as a smartphone, that the item of jewelry was registered asbeing paired with (i.e. the tag reader, such as a smartphone, of therecipient of the jewelry). In addition, extended access to an item ofjewelry's messages may be granted, but only if the wearer explicitlyidentifies the ID number of the additional authorised mobileapplications (i.e. the smartphones of trusted friends or relatives).

In a fourth aspect, there is provided a method of manufacturing a pieceof jewelry comprising a passive tag, the method comprising the steps of:

a) selecting a bead of desired size, the bead having an innerpassageway;

b) selecting a passive tag sized such that a surface area of the passivetag is smaller than a surface area of the bead;

c) positioning the passive tag on an outer surface of the bead;

d) positioning a reticulated mesh over the bead and passive tag, thereticulated mesh having a passive tag indicator;

e) checking the passive tag's readability with a reader, the readerpositioned in the region of the passive tag indicator;

f) coating the mesh in enamel or resin heated to less than 100° C. tofill the gaps in the mesh;

g) filing and polishing the enamel or resin;

h) checking a readability of the passive tag with a reader in the regionof the passive tag indicator.

Manufacturing the bead is particularly challenging because the normaltechniques used to manufacture pieces of jewelry may damage the passivetags. The present method provides steps to ensure that passive tags arenot damaged during manufacture of the beads by protecting the passivetag using a mesh and by adding enamel or resin at temperatures less than100° C.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention are further described hereinafter withreference to the accompanying drawings, in which:

FIG. 1 is a shows a schematic of the system;

FIG. 2 illustrates a bracelet and reader with a display;

FIG. 3 shows a lattice type cylindrical bead;

FIG. 4 shows a plain cylindrical bead;

FIG. 5 shows an orb type lattice bead;

FIG. 6 shows a disk-like bead;

FIG. 7 shows a drum-like bead; and

FIG. 8 shows a locket-type bead.

DETAILED DESCRIPTION

In the described embodiments, like features have been identified withlike numerals, albeit in some cases having increments of integermultiples of 100. For example, in different figures, 210, 310, and 410have been used to indicate bead comprising a passive tag.

FIG. 1 shows a schematic of the system including a piece of jewelry 101,a reader 102 with a display 103 and a remote data storage device 104 tosupport the reader. The solid lines indicate the communication path andthe dotted line indicates the indirect communication path because thejewelry and the data storage device communicate through the reader. Thejewelry includes a passive tag or chip within the jewelry or positionedon the jewelry. When the jewelry comes into contact (i.e. touches) orcomes into close proximity with a reader in a range of about 0 cm toabout 1 cm, the passive tag or chip is energised by the electromagneticfield of the reader.

Each piece of jewelry is assigned a unique identification code withinthe passive tag or chip. Initially, the remote data storage device isconfigured to assign a corresponding access code to a particular readersuch as the recipient's (i.e. the jewelry wearer's) personalcommunication device or smart phone. Once the jewelry and smart phoneare linked, only the linked smart phone may display information linkedto the unique identification code associated with the passive tag orchip. In this manner, the tag reader (or smart phone) is the onlyauthorised reader (i.e. the jewelry wearer's smartphone) allowed toaccess messages associated with the particular unique identificationcode of the piece of jewelry.

The system is designed to be easily used by the recipient of the item ofjewelry. All interaction with the jewelry and its associated messages isperformed through a mobile application.

The giver of the jewelry may at any time update the message they wish tobe associated with the item of jewelry they have gifted, in order toconvey emotions of significance based around their relationship with thejewelry wearer (e.g. birthday or anniversary messages) or seasonalmessages such Christmas or Easter well wishes, and so on. To achievethis, any purchaser of an item of jewelry is provided with a personalaccount (accessed via a personal website area or via their mobile app).This personal account can be associated with multiple items or jewelryand allows the giver of those items to update messages associated withthem all from one location. In addition to text based messages the giverof the jewelry can also incorporate pictures and videos.

Once the giver of the jewelry has updated a message associated with aparticular piece of jewelry the system then transfers the messagebetween the remote data storage facility and the authorised mobileapplication automatically and transparently to the user as soon as asuitable data connection is present (i.e. the user is unaware of themessage transfer process taking place in the background). Once transferis complete the message is then stored indefinitely in the smartphone'snon-volatile memory ready for immediate access by the user. This processensures that when the user attempts to access their messages by“touching” their smartphone and their item of jewelry together, theirmessage is immediately accessed and launched from the smartphone'smemory thus giving a smooth and consistent service irrespective of otherfactors such as the smartphone's current mobile network signal. Themessage remains in the smartphone's non-volatile memory until it isexplicitly deleted by the mobile application (thus giving theopportunity for the jewelry to give the impression it is holdingmultiple messages if required).

The message may be anything from the “I love you” one might expect tofind engraved on the surface of a piece of jewelry, to something morepersonal and intimate, only to be shared between the giver of thejewelry and recipient (i.e. the jewelry wearer). It is envisaged thatthe message may include more substantial data such as photographs, voicerecordings and longer messages. In this manner, the piece of jewelry maybe thought of as an “i-motion” or “personal emotional messaging” devicethat may be used as a time capsule. A time capsule includes a pluralityof messages or alternatively a plurality of beads on a bracelet ornecklace, each bead with a unique identification number whereby thegiver of the piece of jewelry can save important messages and markspecial occasions associated with the piece of jewelry forever.

FIG. 2 illustrates a preferred embodiment of the present invention. FIG.2 depicts an item of jewelry such as a simple bracelet of beads 101. Thebracelet has a plurality of beads, one of which includes a tag within oron it 108. A smartphone 102, 103 is also depicted with a reader 102 anda display 103. NFC chips or tags are particularly suitable for thepresent invention as their range is small and NFC chips or tags requirenear touch between the tag and the tag reader in order to activate thetag.

The present inventors have developed a method for positioning the tagsand antenna onto the surface of the bead and a thin layer of resin tocoat the bead and therefore embed the tag within the bead. Resins areparticularly good for protecting the NFC tags and antennas and also havedecorative properties. Other materials as well as resins may be usedincluding some metals, glasses, and polymer products.

It should be noted that other passive chips or tags could also be usedin place of an NFC chip. For example, longer range RFID chips and tagsmay be used. In fact, any RFID or near-field communication technologymay be used.

Embedding multiple tags or chips within or on an item of jewelry will bebeneficial and desirable for a number of different purposes.

Using multiple tags or chips provides good three dimensional readabilityof the jewelry by the tag reader. To improve the likelihood that an itemof jewelry will be read immediately by the reader, certain items will beproduced with multiple tags that are all associated with the samemessage storage account on remote data storage facility. This ensuresthat irrespective of which tag is read on that individual piece ofjewelry the message retrieved will always be from the same associatedmessage account. For example, this approach may be adopted in items ofjewelry such as bracelets where tag locations can potentially alterthrough the general movement of the wearer. By incorporating multipletags throughout the bracelet, the user will be more likely to create aconnection with one of the tags, irrespective of how the bracelet hasmoved on their wrist during the course of the day.

Alternatively, larger items of jewelry or jewelry with distinct sectionsmay benefit from the ability to incorporate multiple tags with IDnumbers that are each individually associated with different messagestorage accounts. In this case, if one tag in a specific part of thejewelry was read it will retrieve a message from a different messagestorage account than a tag embedded in a different section of the samepiece of jewelry. An example of where this functionality would besuitable is within a “Charm” bracelet. These items of jewelry typicallyhave a simple bracelet band that the wearer then adds small jewelryaccessories to (known as Charms). Typically each individual Charm isoften bought for the wearer by different people. In this case, aKiroco-Touch system (an application) will offer the ability for thewearer to receive separate messages from each person who bought eachindividual Charm.

Other embodiments such as beads of other shapes, rings, pendants, andbrooches may also have NFC chips and antennas embedded within them.

The system disclosed may also be used in other applications such assecurity, for example, using the i-motion messaging device for theidentification of stolen jewelry. Furthermore, the system may also beused for promotional information or event information for events such asfestivals, whereby event information is disseminated to the jewelry.

Manufacturing a piece of jewelry containing a NFC chip or tag ischallenging since the processes typically carried out in manufacturing apiece of jewelry often include high temperatures and abrasive mechanicaltreatment of the piece of jewelry. However, after much trial and error,a method for manufacturing a piece of jewelry comprising at least onepassive tag, such that the tag does not undergo undue mechanical andthermal conditions, has been developed by the present Applicant.

The method of manufacturing a piece of jewelry comprising a passive tagincludes selecting a bead 210 of desired size, the bead comprising aninner passageway 212.

FIGS. 3 to 5 show the manufacturing steps required to manufacture apiece of jewelry comprising a passive tag. FIG. 3 shows a lattice typecylindrical bead. FIG. 4 shows a plain cylindrical bead. FIG. 5 shows anorb type lattice bead.

A passive tag 216 is selected for size such that the surface area of thepassive tag is smaller than a surface area of the bead. The passive tagincludes a substrate 215, a tag 213 and an antenna 214. The passive tag216 is positioned on the surface of the bead. The passive tag 216 may besimply rested on the surface, or alternatively it may be adhered to thesurface of the bead. The passive tag may be retained on the surface ofthe bead by an outer layer such as a reticulated mesh structure 218,219. In that sense, it may not need to be adhered using glue, but maysimply be positioned on the bead.

A reticulated mesh structure 218, 219 is adapted to encompass the beadand is positioned over the bead. The reticulated mesh has a first 218and a second portion 219. Furthermore, the reticulated mesh has aportion adapted to allow the end user to locate the passive tag. Assuch, the mesh is provided with a passive tag indicator 222.

The reticulated mesh is formed from two interlinking portions adapted tolink together to form a decorative covering. The mesh is configured soas not to form a significant RF barrier between the passive tag and thetag reader. This is achieved by providing the mesh with a hole size.

Once the reticulated mesh is positioned over the bead, the readabilityof the passive tag is checked by positioning a passive tag reader (notshown) in the region of the passive tag indicator 222.

The reticulated mesh structure 218, 219 is then coated using enamel orresin 220 to fill the gaps in the mesh. It is beneficial to over fillthe mesh with enamel or resin to ensure no defects are formed when theenamel or resin sets. The enamel or resin is heated to temperaturessufficient to make the enamel or resin malleable, but not heated above100° C., as temperatures above 100° C. have been found to damage thetags.

Once the enamel or resin 220 has set, the excess enamel or resin isfiled using a variety of different grade abrasive materials until thereticulated mesh structure is smooth and has the desired appearance.

Finally, the bead 210 is checked again to ensure it remains readable atthe passive tag indicator 222.

FIG. 4 shows a plain cylindrical bead 310 having two end caps, 326, 327,separated by a cylindrical tube 324. The bead is manufactured using thesame steps as in the mesh covered bead, however, the mesh is replaced bythe cylindrical tube and no additional enamel of resin is required. Thecylindrical tube covers the passive tag, and the cylindrical tube andend fittings are polished.

FIG. 5 shows an orb bead 410. The tag 416 may be simply rested on thesurface of the orb, or alternatively it may be adhered to the surface ofthe orb. A two part mesh 418, 419 encompasses the bead and is positionedover the bead. The mesh formed by the two parts 418, 419 has a portionadapted to allow the end user to locate the passive tag. As such, theorb is provided with a passive tag indicator 422 in the mesh.

FIG. 6 shows a disk-like unfinished bead 550. Using a pre-coated passivetag 552 arrangement, the mesh support casing 556 only covers one side ofthe disk-like bead 550. The bead is held on a loop 554, and the mesh 556forms a substantially U-shape and is configured to accommodate thepre-coated passive tag 552. Once the pre-coated passive tag is inposition, the mesh support casing 556 is filled with enamel or resin558. The finished disk-like bead 560 is then polished to remove anyexcess enamel and to polish the mesh.

FIG. 7 shows a cylindrical drum-like unfinished bead 650 incorporating apre-coated passive tag 652. The bead has a mesh support casing 656 witha decorative open cell design 657. The pre-coated passive tag 652 formsa lid of the drum-like unfinished bead 650, and the mesh support 656surrounds the tag 652. Enamel or resin 658 is used to fill the spacebetween the mesh support, within the decorative open cell design 657 andthe tag 652. The open cell design is adapted to reduce interferencebetween the tag 652 and a tag reader.

FIG. 8 shows a locket-type bead 760 incorporating a pre-coated passivetag 752 held in a ring-type casing 756. The casing 756 is configured tosurround the outer circumference of the tag 752. The casing 756 and tag752 are held in an orb shaped bead 757 which is made up of two domeshaped parts. The casing 756 and tag 752 may be designed to form a hingewith one of the domes, and therefore fold together in a compact manner.The two domes may be linked together on a chain or string, via a hoop.The other dome shaped part may be used to incorporate something chosenby the user, such as a lock of hair, or a photograph. The passive tag isaccessed by opening the locket-type bead 760 by sliding the two domesrelative to each other. The hoop acts as a pivot for the sliding motionof the two domes.

FIGS. 3 to 8 show a selection of many different types of beads havingpassive tags incorporated in some manner. Other methods may be used toincorporate passive tags into other pieces of jewelry in addition tothose shown in FIGS. 3 to 8.

It is important that the passive tag does not experience temperaturesabove the temperature acceptable for the passive tag. Typically,temperatures below 100° C. are acceptable and do not unduly affect thereadability of characteristics of the passive tags.

The materials used to manufacture the beads are preferably resistant tosolvents such as acetone and methyl ethyl ketone.

Throughout the description and claims of this specification, the words“comprise” and “contain” and variations of them mean “including but notlimited to”, and they are not intended to (and do not) exclude othermoieties, additives, components, integers or steps. Throughout thedescription and claims of this specification, the singular encompassesthe plural unless the context otherwise requires. In particular, wherethe indefinite article is used, the specification is to be understood ascontemplating plurality as well as singularity, unless the contextrequires otherwise.

Features, integers, characteristics, compounds, chemical moieties orgroups described in conjunction with a particular aspect, embodiment orexample of the invention are to be understood to be applicable to anyother aspect, embodiment or example described herein unless incompatibletherewith. All of the features disclosed in this specification(including any accompanying claims, abstract and drawings), and/or allof the steps of any method or process so disclosed, may be combined inany combination, except combinations where at least some of suchfeatures and/or steps are mutually exclusive. The invention is notrestricted to the details of any foregoing embodiments. The inventionextends to any novel one, or any novel combination, of the featuresdisclosed in this specification (including any accompanying claims,abstract and drawings), or to any novel one, or any novel combination,of the steps of any method or process so disclosed.

The reader's attention is directed to all papers and documents which arefiled concurrently with or previous to this specification in connectionwith this application and which are open to public inspection with thisspecification, and the contents of all such papers and documents areincorporated herein by reference.

The invention claimed is:
 1. An item of jewelry comprising: at least onepassive tag, wherein the passive tag is provided with an antenna; atleast one bead, ring, bracelet or pendant; wherein the passive tag islocated on an outer surface of the bead, ring, bracelet or pendant, andwherein the bead, ring, bracelet or pendant further includes a layer ofresin, glass, or a polymeric material on the outer surface of the bead,ring, bracelet or pendant, such that the passive tag is embedded in thelayer of resin, glass or polymeric material on the outer surface of thebead, ring, bracelet or pendant; and wherein the passive tag isprogrammed with at least a unique identification code.
 2. The item ofjewelry as claimed in claim 1, wherein the at least one passive tag is aradio frequency identification (RFID) tag or chip configured to operateas a near field communication (NFC) tag or chip.
 3. The item of jewelryas claimed in claim 2, wherein the at least one tag or chip operates ona very small range of less than about 1 cm.
 4. The item of jewelry asclaimed in claim 3, wherein the tag or chip is positioned on or in theitem of jewelry to provide three dimensional readability of the tag orchip by the tag reader.
 5. The item of jewelry as claimed in claim 4,wherein the at least one tag or chip is layered on to the surface of theitem of jewelry.
 6. A system comprising an item of jewelry, a smartphonehaving a display and a passive tag reading functionality, and a remotedata storage device, wherein: the item of jewelry comprises: at leastone passive tag provided with an antenna; at least one bead, ring,bracelet or pendant; wherein the at least one passive tag is located onan outer surface of the bead, ring bracelet or pendant, and wherein thebead, ring, bracelet or pendant further includes a layer of resin,glass, or a polymeric material on the outer surface of the bead, ring,bracelet or pendant, such that the at least one passive tag is embeddedin the layer of resin, glass, or a polymeric material on the outersurface of the bead, ring, bracelet or pendant; and wherein the at leastone passive tag is programmed with at least one unique identificationcode; and wherein the smart phone is adapted to read the at least oneidentification code from the embedded at least one passive tag when thesmart phone and the item of jewelry touch or come into close proximitywith each other; and the smartphone is configured to access a message orcontent that is associated with the unique identification code andstored on the remote data storage device and to retrieve and display themessage or content on the display.
 7. The system according to claim 6,wherein the reader is adapted to go through an authorisation stagewhereby the unique identification code of the tag and an authorisationcode assigned to the reader must match before the reader can access themessage or content assigned to the identification code of the tag. 8.The system according to claim 6, wherein the message or content may bestored on a remote data storage device, and the tag reader is configuredto be able to communicate with the remote data storage device.
 9. Thesystem according to claim 6, wherein the smartphone is able to connectto the Internet.
 10. The system according to claim 6, wherein the tagreader is adapted to preload the message or content assigned to theunique identification code so that once preloaded, when the item ofjewelry with a passive tag come into contact or close proximity to oneanother, the associated message or content is instantly displayed by thereader on a display.
 11. A method of delivering an electronic message,comprising: providing an item of jewelry comprising at least one passivenear field communication (NFC) tag, wherein the tag is further providedwith an antenna; at least one bead, ring or pendant; wherein the atleast one passive NFC tag is located on an outer surface of the bead,ring or pendant, and wherein the bead further includes a layer of resin,glass, or a polymeric material on the outer surface of the bead, ring orpendant, such that the at least one passive NFC tag is embedded in thelayer of resin, glass, or a polymeric material on the outer surface ofthe bead, ring or pendant; and wherein the at least one passive NFC tagis programmed with at least one unique identification code; reading theunique identification code from the at least one passive NFC tag with asmartphone having a display and passive tag reading functionality; andusing the unique identification code to request delivery of a message orcontent associated with the unique identification code to the smartphone to be displayed on the display of the smart phone.
 12. The methodaccording to claim 11, wherein the tag reader can only access themessage or content associated with the unique identification code if itis an authorised tag reader.
 13. The method according to claim 12,wherein the tag reader is provided with an authorisation code such as anIP address or SIM number.
 14. The method according to claim 13, whereinthe authorisation code of the tag reader and the identification code ofthe tag must match in order for the tag reader to be an authorised tagreader and the message be delivered.