Jewellery with tag

ABSTRACT

A piece of jewellery, wherein the jewellery comprises at least one tag or chip programmed with at least a unique identification code, and a tag reader is configured to read the tag or chip when the tag reader and the piece of jewellery touch, or come into close contact and, display a message or content associated with the unique identification code.

This invention relates to a piece of jewellery, wherein the jewellerycomprises at least one tag or chip programmed with at least a uniqueidentification code, and a tag reader is configured to read the tag orchip when the tag reader and the piece of jewellery touch, or come intoclose contact and, display a message or content associated with theunique identification code.

BACKGROUND

Items of jewellery are often given as gifts to signify important momentsin a life such as a wedding or engagement, birthdays, or othercelebrations. Items of jewellery include rings, pendants, bracelets,beads, brooches and the like. Often the gift giver opts to engrave theitem to impart a special personal message for the recipient: “I loveyou” or perhaps even “For you, on our wedding day 12 Aug. 2006” or“Congratulations on passing your exams”. Typically, wedding, engagementand eternity rings are engraved on the inner surface of the ring in asymbolic gesture of intimacy; only the giver and receiver need know themessage is there and what the message is. Celebration jewellery, givento a recipient to mark an important life event, may include a braceletor necklace with charms, beads, or pendants, and these items may also beengraved with a message or date adding that personal intimate touch

Engraving items or pieces of jewellery may require some skill, time, andeffort and often requires some sort of machinery or engraving tool. Itcan be difficult to engrave very small pieces of jewellery andespecially challenging to engrave pieces of jewellery with patterned orcontoured surfaces. Furthermore, there is a limited space in which aperson may engrave a message on any piece of jewellery and the charactersize is limited so the resultant content of the message is also limited.For example, the message on the inside of a wedding band is typicallyrestricted to only a few characters, for example 25 characters. Clearlyany such message is thus very limited.

Radio-frequency identification (RFID) uses radio-frequencyelectromagnetic fields to transfer data from a tag or chip attached toan object, principally for the purposes of automatic identification(e.g. allowing a person access to a building) and tracking andmonitoring products (such as stocktaking or assembly line monitoring).Some tags or chips are passive and do not require a battery. Passivetags or chips are powered by the electromagnetic fields used to readthem. Non passive tags or chips use a local power source and emit radiowaves (electromagnetic radiation at radio frequencies). The tag or chipcontains electronically stored information which can be read by a readerfrom up to several meters away. Near field communication (NFC) is a setof standards covering communications protocols based on existing RFID.NFC requires touch or bringing a reader and tag into close proximity toeach other in order to establish radio communication with each other.

The prior art shows a variety of uses of RFID tags and chips.International patent application WO 2011/154213A provides a system formonitoring the stock in dynamic stores using RFID and discloses an RFIDcommunication system, comprising at least a first stationary RFIDantenna and a second stationary RFID antenna for transmitting andreceiving data; and an RFID transponder fitted to an item or a group ofitems, wherein the RFID transponder electronically stores at least oneidentifier of the item or the group of items, and wherein the first RFIDantenna is placed at an intake region and the second RFID antenna isplaced at an issue region of a storage path of the dynamic store inorder to detect the item or the group of items using the identifier ofthe RFID transponder.

Taiwanese patent application TW 2009/19344A discloses the use of RFIDtags in ticket applications. An anti-counterfeiting electronic ticketsystem is disclosed, which is used as an anti-counterfeiting applicationto prevent a simple electronic ticket from misuse of an illegalduplication means by means of a photographing method. A certificate canbe an image, a pattern or words, and is printed on a sticker or on thesurface of other entity articles by means of an anti-counterfeitingprinting technology. Alternatively, the certificate can be a wirelessradio frequency identification (RFID) label to form an entitycertificate. A user holds an electronic ticket image displayed on amonitor of a mobile apparatus and a pre-registered entity certificate,utilizes a ticket-examining apparatus to read content information of theentity certificate and the electronic ticket, and verifies by mutualcertification method of the two to be used as imitation prevention ofthe electronic ticket.

BRIEF SUMMARY OF THE DISCLOSURE

In accordance with a first aspect of the present invention, there isprovided an item of jewellery with at least one passive tag, wherein thepassive tag is programmed with at least a unique identification code,and wherein the unique identification code, when read from the passivetag by a tag reader having a display, authorises access to a message orcontent associated with the unique identification code, the message orcontent to be displayed on the display of the tag reader.

Preferably, the at least one tag is a radio frequency identification(RFID) tag or chip configured to operate as a near field communication(NFC) tag or chip. The tag may be any tag adapted to use near-fieldcommunication technology.

In some embodiments the at least one tag or chip operates on a verysmall range of less than about 1 cm.

In certain embodiments the at least one tag or chip is positioned on orin the item of jewellery and coated with a resin, glass or metal toprotect the chip or tag. The positioning of the at least one tag or chipprovides three dimensional readability of the tag or chip by the tagreader.

The tag reader may be a personal electronic device such as a smartphoneor tablet computer.

In other embodiments the at least one tag or chip is layered on thesurface of the item of jewellery.

In accordance with a second aspect of the present invention, there isprovided a system comprising an item of jewellery with a passive tag,and a tag reader with a display, wherein:

the passive tag is programmed with at least a unique identificationcode;

the tag reader is adapted to read the identification code from thepassive tag when the tag reader and the item of jewellery touch, or comeinto close proximity with each other; and

the tag reader is configured to access a message or content that isassociated with the unique identification code and to display themessage or content on the display.

Preferably, the reader is adapted to go through an authorization stagewhereby the unique identification code of the tag and an authorisationcode assigned to the reader must match before the tag reader can accessthe message or content assigned to the identification code of the tag.

The message or content may be stored on a remote data storage device(such as a remote server, or cloud data storage system), and the tagreader may be configured to be able to communicate with the remote datastorage device.

In particularly preferred embodiments, the tag reader is configured as asmart phone or similar communications device having tag readingfunctionality as well as being able to connect to the Internet.

In some embodiments, the tag reader is adapted to preload the message orcontent assigned to the unique identification code so that oncepreloaded, when the item of jewellery with a passive tag come intocontact or close proximity to one another, the associated message orcontent is instantly displayed and the reader does not rely onconnectivity with the remote data storage device.

In a third aspect of the present invention, there is provided a methodof delivering an electronic message, including:

i) providing an item of jewellery with a tag having a uniqueidentification code,

ii) reading the unique identification code from the tag with a tagreader, and

iii) using the unique identification code to request delivery of amessage or content associated with the unique identification code to thetag reader to be displayed on the display of the tag reader.

Preferably, request delivery of a message includes authorising deliveryof a message.

Preferably, the tag reader can only access the message or contentassociated with the unique identification code if it is authorised to doso. The tag reader is provided with an authorisation code such as an IPaddress, SIM number, or mobile application identification number. Theauthorisation code of the tag reader and the tag need to match in orderfor the message to be delivered.

NFC tag readers work in a standardised manner, such that all tags can beread by all readers. However, the present invention relies on the factthat only authorised users can access their messages (i.e. only thewearer of the jewellery or individuals that the wearer has explicitlygranted access should be able to retrieve messages intended for theirconsumption). To ensure that only authorised access is permitted thesystem registers a pairing between the end user's mobile application IDnumber and each of the ID numbers of the items of jewellery theycurrently own. Any subsequent access to the messages stored for aparticular item of jewellery is only granted to the mobile applicationrunning on the tag reader, such as a smartphone, that the item ofjewellery was registered as being paired with (i.e. the tag reader, suchas a smartphone, of the recipient of the jewellery). In addition,extended access to an item of jewellery's messages may be granted, butonly if the wearer explicitly identifies the ID number of the additionalauthorised mobile applications (i.e. the smartphones of trusted friendsor relatives).

In a fourth aspect, there is provided a method of manufacturing a pieceof jewellery comprising a passive tag, the method comprising the stepsof:

a) selecting a bead of desired size, the bead having an innerpassageway;

b) selecting a passive tag sized such that a surface area of the passivetag is smaller than a surface area of the bead;

c) positioning the passive tag on an outer surface of the bead;

d) positioning a reticulated mesh over the bead and passive tag, thereticulated mesh having a passive tag indicator;

e) checking the passive tag's readability with a reader, the readerpositioned in the region of the passive tag indicator;

f) coating the mesh in enamel or resin heated to less than 100° C. tofill the gaps in the mesh;

g) filing and polishing the enamel or resin;

h) checking a readability of the passive tag with a reader in the regionof the passive tag indicator.

Manufacturing the bead is particularly challenging because the normaltechniques used to manufacture pieces of jewellery may damage thepassive tags. The present method provides steps to ensure that passivetags are not damaged during manufacture of the beads by protecting thepassive tag using a mesh and by adding enamel or resin at temperaturesless than 100° C.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention are further described hereinafter withreference to the accompanying drawings, in which:

FIG. 1 is a shows a schematic of the system;

FIG. 2 illustrates a bracelet and reader with a display;

FIG. 3 shows a lattice type cylindrical bead;

FIG. 4 shows a plain cylindrical bead;

FIG. 5 shows an orb type lattice bead;

FIG. 6 shows a disk-like bead;

FIG. 7 shows a drum-like bead; and

FIG. 8 shows a locket-type bead.

DETAILED DESCRIPTION

In the described embodiments, like features have been identified withlike numerals, albeit in some cases having increments of integermultiples of 100. For example, in different figures, 210, 310, and 410have been used to indicate bead comprising a passive tag.

FIG. 1 shows a schematic of the system including a piece of jewellery101, a reader 102 with a display 103 and a remote data storage device104 to support the reader. The solid lines indicate the communicationpath and the dotted line indicates the indirect communication pathbecause the jewellery and the data storage device communicate throughthe reader. The jewellery includes a passive tag or chip within thejewellery or positioned on the jewellery. When the jewellery comes intocontact (i.e. touches) or comes into close proximity with a reader in arange of about 0 cm to about 1 cm, the passive tag or chip is energisedby the electromagnetic field of the reader.

Each piece of jewellery is assigned a unique identification code withinthe passive tag or chip. Initially, the remote data storage device isconfigured to assign a corresponding access code to a particular readersuch as the recipient's (i.e. the jewellery wearer's) personalcommunication device or smart phone. Once the jewellery and smart phoneare linked, only the linked smart phone may display information linkedto the unique identification code associated with the passive tag orchip. In this manner, the tag reader (or smart phone) is the onlyauthorised reader (i.e. the jewellery wearer's smartphone) allowed toaccess messages associated with the particular unique identificationcode of the piece of jewellery.

The system is designed to be easily used by the recipient of the item ofjewellery. All interaction with the jewellery and its associatedmessages is performed through a mobile application.

The giver of the jewellery may at any time update the message they wishto be associated with the item of jewellery they have gifted, in orderto convey emotions of significance based around their relationship withthe jewellery wearer (e.g. birthday or anniversary messages) or seasonalmessages such Christmas or Easter well wishes, and so on. To achievethis, any purchaser of an item of jewellery is provided with a personalaccount (accessed via a personal website area or via their mobile app).This personal account can be associated with multiple items or jewelleryand allows the giver of those items to update messages associated withthem all from one location. In addition to text based messages the giverof the jewellery can also incorporate pictures and videos.

Once the giver of the jewellery has updated a message associated with aparticular piece of jewellery the system then transfers the messagebetween the remote data storage facility and the authorised mobileapplication automatically and transparently to the user as soon as asuitable data connection is present (i.e. the user is unaware of themessage transfer process taking place in the background). Once transferis complete the message is then stored indefinitely in the smartphone'snon-volatile memory ready for immediate access by the user. This processensures that when the user attempts to access their messages by“touching” their smartphone and their item of jewellery together, theirmessage is immediately accessed and launched from the smartphone'smemory thus giving a smooth and consistent service irrespective of otherfactors such as the smartphone's current mobile network signal. Themessage remains in the smartphone's non-volatile memory until it isexplicitly deleted by the mobile application (thus giving theopportunity for the jewellery to give the impression it is holdingmultiple messages if required).

The message may be anything from the “I love you” one might expect tofind engraved on the surface of a piece of jewellery, to something morepersonal and intimate, only to be shared between the giver of thejewellery and recipient (i.e. the jewellery wearer). It is envisagedthat the message may include more substantial data such as photographs,voice recordings and longer messages. In this manner, the piece ofjewellery may be thought of as an “i-motion” or “personal emotionalmessaging” device that may be used as a time capsule. A time capsuleincludes a plurality of messages or alternatively a plurality of beadson a bracelet or necklace, each bead with a unique identification numberwhereby the giver of the piece of jewellery can save important messagesand mark special occasions associated with the piece of jewelleryforever.

FIG. 2 illustrates a preferred embodiment of the present invention. FIG.2 depicts an item of jewellery such as a simple bracelet of beads 101.The bracelet has a plurality of beads, one of which includes a tagwithin or on it 108. A smartphone 102, 103 is also depicted with areader 102 and a display 103. NFC chips or tags are particularlysuitable for the present invention as their range is small and NFC chipsor tags require near touch between the tag and the tag reader in orderto activate the tag.

The present inventors have developed a method for positioning the tagsand antenna onto the surface of the bead and a thin layer of resin tocoat the bead and therefore embed the tag within the bead. Resins areparticularly good for protecting the NFC tags and antennas and also havedecorative properties. Other materials as well as resins may be usedincluding some metals, glasses, and polymer products.

It should be noted that other passive chips or tags could also be usedin place of an NFC chip. For example, longer range RFID chips and tagsmay be used. In fact, any RFID or near-field communication technologymay be used.

Embedding multiple tags or chips within or on an item of jewellery willbe beneficial and desirable for a number of different purposes.

Using multiple tags or chips provides good three dimensional readabilityof the jewellery by the tag reader. To improve the likelihood that anitem of jewellery will be read immediately by the reader, certain itemswill be produced with multiple tags that are all associated with thesame message storage account on remote data storage facility. Thisensures that irrespective of which tag is read on that individual pieceof jewellery the message retrieved will always be from the sameassociated message account. For example, this approach may be adopted initems of jewellery such as bracelets where tag locations can potentiallyalter through the general movement of the wearer. By incorporatingmultiple tags throughout the bracelet, the user will be more likely tocreate a connection with one of the tags, irrespective of how thebracelet has moved on their wrist during the course of the day.

Alternatively, larger items of jewellery or jewellery with distinctsections may benefit from the ability to incorporate multiple tags withID numbers that are each individually associated with different messagestorage accounts. In this case, if one tag in a specific part of thejewellery was read it will retrieve a message from a different messagestorage account than a tag embedded in a different section of the samepiece of jewellery. An example of where this functionality would besuitable is within a “Charm” bracelet. These items of jewellerytypically have a simple bracelet band that the wearer then adds smalljewellery accessories to (known as Charms). Typically each individualCharm is often bought for the wearer by different people. In this case,a Kiroco-Touch system (an application) will offer the ability for thewearer to receive separate messages from each person who bought eachindividual Charm.

Other embodiments such as beads of other shapes, rings, pendants, andbrooches may also have NFC chips and antennas embedded within them.

The system disclosed may also be used in other applications such assecurity, for example, using the i-motion messaging device for theidentification of stolen jewellery. Furthermore, the system may also beused for promotional information or event information for events such asfestivals, whereby event information is disseminated to the jewellery.

Manufacturing a piece of jewellery containing a NFC chip or tag ischallenging since the processes typically carried out in manufacturing apiece of jewellery often include high temperatures and abrasivemechanical treatment of the piece of jewellery. However, after muchtrial and error, a method for manufacturing a piece of jewellerycomprising at least one passive tag, such that the tag does not undergoundue mechanical and thermal conditions, has been developed by thepresent Applicant.

The method of manufacturing a piece of jewellery comprising a passivetag includes selecting a bead 210 of desired size, the bead comprisingan inner passageway 212.

FIGS. 3 to 5 show the manufacturing steps required to manufacture apiece of jewellery comprising a passive tag. FIG. 3 shows a lattice typecylindrical bead. FIG. 4 shows a plain cylindrical bead. FIG. 5 shows anorb type lattice bead.

A passive tag 216 is selected for size such that the surface area of thepassive tag is smaller than a surface area of the bead. The passive tagincludes a substrate 215, a tag 213 and an antenna 214. The passive tag216 is positioned on the surface of the bead. The passive tag 216 may besimply rested on the surface, or alternatively it may be adhered to thesurface of the bead. The passive tag may be retained on the surface ofthe bead by an outer layer such as a reticulated mesh structure 218,219. In that sense, it may not need to be adhered using glue, but maysimply be positioned on the bead.

A reticulated mesh structure 218, 219 is adapted to encompass the beadand is positioned over the bead. The reticulated mesh has a first 218and a second portion 219. Furthermore, the reticulated mesh has aportion adapted to allow the end user to locate the passive tag. Assuch, the mesh is provided with a passive tag indicator 222.

The reticulated mesh is formed from two interlinking portions adapted tolink together to form a decorative covering. The mesh is configured soas not to form a significant RF barrier between the passive tag and thetag reader. This is achieved by providing the mesh with a hole size.

Once the reticulated mesh is positioned over the bead, the readabilityof the passive tag is checked by positioning a passive tag reader (notshown) in the region of the passive tag indicator 222.

The reticulated mesh structure 218, 219 is then coated using enamel orresin 220 to fill the gaps in the mesh. It is beneficial to over fillthe mesh with enamel or resin to ensure no defects are formed when theenamel or resin sets. The enamel or resin is heated to temperaturessufficient to make the enamel or resin malleable, but not heated above100° C., as temperatures above 100° C. have been found to damage thetags.

Once the enamel or resin 220 has set, the excess enamel or resin isfiled using a variety of different grade abrasive materials until thereticulated mesh structure is smooth and has the desired appearance.

Finally, the bead 210 is checked again to ensure it remains readable atthe passive tag indicator 222.

FIG. 4 shows a plain cylindrical bead 310 having two end caps, 326, 327,separated by a cylindrical tube 324. The bead is manufactured using thesame steps as in the mesh covered bead, however, the mesh is replaced bythe cylindrical tube and no additional enamel of resin is required. Thecylindrical tube covers the passive tag, and the cylindrical tube andend fittings are polished.

FIG. 5 shows an orb bead 410. The tag 416 may be simply rested on thesurface of the orb, or alternatively it may be adhered to the surface ofthe orb. A two part mesh 418, 419 encompasses the bead and is positionedover the bead. The mesh formed by the two parts 418, 419 has a portionadapted to allow the end user to locate the passive tag. As such, theorb is provided with a passive tag indicator 422 in the mesh.

FIG. 6 shows a disk-like unfinished bead 550. Using a pre-coated passivetag 552 arrangement, the mesh support casing 556 only covers one side ofthe disk-like bead 550. The bead is held on a loop 554, and the mesh 556forms a substantially U-shape and is configured to accommodate thepre-coated passive tag 552. Once the pre-coated passive tag is inposition, the mesh support casing 556 is filled with enamel or resin558. The finished disk-like bead 560 is then polished to remove anyexcess enamel and to polish the mesh.

FIG. 7 shows a cylindrical drum-like unfinished bead 650 incorporating apre-coated passive tag 652. The bead has a mesh support casing 656 witha decorative open cell design 657. The pre-coated passive tag 652 formsa lid of the drum-like unfinished bead 650, and the mesh support 656surrounds the tag 652. Enamel or resin 658 is used to fill the spacebetween the mesh support, within the decorative open cell design 657 andthe tag 652. The open cell design is adapted to reduce interferencebetween the tag 652 and a tag reader.

FIG. 8 shows a locket-type bead 760 incorporating a pre-coated passivetag 752 held in a ring-type casing 756. The casing 756 is configured tosurround the outer circumference of the tag 752. The casing 756 and tag752 are held in an orb shaped bead 757 which is made up of two domeshaped parts. The casing 756 and tag 752 may be designed to form a hingewith one of the domes, and therefore fold together in a compact manner.The two domes may be linked together on a chain or string, via a hoop.The other dome shaped part may be used to incorporate something chosenby the user, such as a lock of hair, or a photograph. The passive tag isaccessed by opening the locket-type bead 760 by sliding the two domesrelative to each other. The hoop acts as a pivot for the sliding motionof the two domes.

FIGS. 3 to 8 show a selection of many different types of beads havingpassive tags incorporated in some manner. Other methods may be used toincorporate passive tags into other pieces of jewellery in addition tothose shown in FIGS. 3 to 8.

It is important that the passive tag does not experience temperaturesabove the temperature acceptable for the passive tag. Typically,temperatures below 100° C. are acceptable and do not unduly affect thereadability of characteristics of the passive tags.

The materials used to manufacture the beads are preferably resistant tosolvents such as acetone and methyl ethyl ketone.

Throughout the description and claims of this specification, the words“comprise” and “contain” and variations of them mean “including but notlimited to”, and they are not intended to (and do not) exclude othermoieties, additives, components, integers or steps. Throughout thedescription and claims of this specification, the singular encompassesthe plural unless the context otherwise requires. In particular, wherethe indefinite article is used, the specification is to be understood ascontemplating plurality as well as singularity, unless the contextrequires otherwise.

Features, integers, characteristics, compounds, chemical moieties orgroups described in conjunction with a particular aspect, embodiment orexample of the invention are to be understood to be applicable to anyother aspect, embodiment or example described herein unless incompatibletherewith. All of the features disclosed in this specification(including any accompanying claims, abstract and drawings), and/or allof the steps of any method or process so disclosed, may be combined inany combination, except combinations where at least some of suchfeatures and/or steps are mutually exclusive. The invention is notrestricted to the details of any foregoing embodiments. The inventionextends to any novel one, or any novel combination, of the featuresdisclosed in this specification (including any accompanying claims,abstract and drawings), or to any novel one, or any novel combination,of the steps of any method or process so disclosed.

The reader's attention is directed to all papers and documents which arefiled concurrently with or previous to this specification in connectionwith this application and which are open to public inspection with thisspecification, and the contents of all such papers and documents areincorporated herein by reference.

1. An item of jewellery comprising at least one passive tag, wherein thepassive tag is programmed with at least a unique identification code,and wherein the unique identification code, when read from the passivetag by a tag reader having a display, authorises access to a message orcontent associated with the unique identification code, the message orcontent to be displayed on the display of the tag reader.
 2. The item ofjewellery as claimed in claim 1, wherein the at least one tag is a radiofrequency identification (RFID) tag or chip configured to operate as anear field communication (NFC) tag or chip.
 3. The item of jewellery asclaimed in claim 2, wherein the at least one tag or chip operates on avery small range of less than about 1 cm.
 4. The item of jewellery asclaimed in claim 3, wherein the at least one tag or chip is positionedon or in the item of jewellery.
 5. The item of jewellery as claimed inclaim 4, wherein tag or chip is coated with a resin, glass or metal. 6.The item of jewellery as claimed in claim 5, wherein the tag or chip ispositioned on or in the item of jewellery to provide three dimensionalreadability of the tag or chip by the tag reader.
 7. The item ofjewellery as claimed in claim 6, wherein the at least one tag or chip islayered on to the surface of the item of jewellery.
 8. A systemcomprising an item of jewellery with a passive tag, and a tag readerwith a display, wherein: the passive tag is programmed with at least aunique identification code; the tag reader is adapted to read theidentification code from the passive tag when the tag reader and theitem of jewellery touch, or come into close proximity with each other;and the tag reader is configured to access a message or content that isassociated with the unique identification code and to display themessage or content on the display.
 9. The system according to claim 8,wherein the reader is adapted to go through an authorisation stagewhereby the unique identification code of the tag and an authorisationcode assigned to the reader must match before the reader can access themessage or content assigned to the identification code of the tag. 10.The system according to claim 8, wherein the message or content may bestored on a remote data storage device, and the tag reader is configuredto be able to communicate with the remote data storage device.
 11. Thesystem according to claim 8, wherein the tag reader is configured as asmart phone or similar personal communication device having tag readingfunctionality as well as being able to connect to the Internet.
 12. Thesystem according to claim 8, wherein the tag reader is adapted topreload the message or content assigned to the unique identificationcode so that once preloaded, when the item of jewellery with a passivetag come into contact or close proximity to one another, the associatedmessage or content is instantly displayed by the reader on a display.13. A method of delivering an electronic message comprising: providingan item of jewellery with a tag having a unique identification code;reading the unique identification code from the tag with a tag reader;and using the unique identification code to request delivery of amessage or content associated with the unique identification code to thereader to be displayed on the display of the tag reader.
 14. The methodaccording to claim 13, wherein the tag reader can only access themessage or content associated with the unique identification code if itis an authorised tag reader.
 15. The method according to claim 14,wherein the tag reader is provided with an authorisation code such as anIP address or SIM number.
 16. The method according to claim 15, whereinthe authorisation code of the tag reader and the identification code ofthe tag must match in order for the tag reader to be an authorised tagreader and the message be delivered.
 17. A method of manufacturing apiece of jewellery comprising a passive tag, the method comprising thesteps of: a) selecting a bead of desired size, the bead having an innerpassageway; b) selecting a passive tag sized such that a surface area ofthe passive tag is smaller than a surface area of the bead; c)positioning the passive tag on an outer surface of the head; d)positioning a reticulated mesh over the bead and passive tag, thereticulated mesh having a passive tag indicator; e) checking the passivetag's readability with a reader, the reader being positioned in theregion of the passive tag indicator; f) coating the mesh in enamel orresin heated to less than 100° C. to fill the gaps in the mesh; g)filing and polishing the enamel or resin; h) checking a readability ofthe passive tag with a reader in the region of the passive tagindicator. 18-21. (canceled)