GB2525235A - Means for recovering tamper evidence in RFID tags regardless of the power supply to the chip or reconnection of the tamper loop. - Google Patents
Means for recovering tamper evidence in RFID tags regardless of the power supply to the chip or reconnection of the tamper loop. Download PDFInfo
- Publication number
- GB2525235A GB2525235A GB1406940.5A GB201406940A GB2525235A GB 2525235 A GB2525235 A GB 2525235A GB 201406940 A GB201406940 A GB 201406940A GB 2525235 A GB2525235 A GB 2525235A
- Authority
- GB
- United Kingdom
- Prior art keywords
- tamper
- tag
- tamper evident
- memory
- event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
- G06K19/07372—Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
- G06K19/07381—Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit with deactivation or otherwise incapacitation of at least a part of the circuit upon detected tampering
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D55/00—Accessories for container closures not otherwise provided for
- B65D55/02—Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D2203/00—Decoration means, markings, information elements, contents indicators
- B65D2203/10—Transponders
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mechanical Engineering (AREA)
- Burglar Alarm Systems (AREA)
Abstract
An RFID tag which indicates that a tamper event has occurred includes a memory cell 1 connected to a conductive loop 6 by pins 12. The memory cell has a memory status set to '1' and contains a charge 2 which dissipates via the conductive loop 6 as a result of a tamper event. When the charge dissipates the memory status changes to '0'. Upon being interrogated by a reader, the tag sends memory status information to the reader thus indicating whether the tag has been tampered with. Preferably the conductive loop 6 includes a switch 5 which is closed when the tag is tampered with, causing dissipation of the memory cell charge. Alternatively, the conductive loop may be a closed circuit (not shown) which is opened as a result of tampering. A diode 4 prevents the memory cell from being reset by reconnecting or repairing the tamper circuit. A diode 9 prevents the cell from discharging when the voltage from the power supply 3 falls below a useful level. The tag may be used to indicate when the contents of a bottle have been tampered with.
Description
Long Range UHF RFID Tag with non powered anti tamper means Terms used: Tag: two paper thin printed antennas or capacitors with an integrated circuit chip between the two to form a radio transponder device.
Chip: the black dot in the middle of the tag, this is the integrated circuit that provides the backscatter of the radio power from the interrogator; it also deals with all the communication and memory data. In this case it also handles the logic state and memory for tamper evidence like a bottle capsule cover removal or lid removal.
Interrogator or Reader: A tag reader; this bounces a radio signal off the tags which modulates the reflected signal and hence reports back the tag serial number and other data back to the interrogator.
Tamper evidence: is a means for showing that an item has previously been opened or disturbed, bottle top capsule removal for example.
Background information:
Many HFID tags on the market today can display tampering; these tags are carefully designed so that the tamper loop cannot be mended economically by the user or fake trader.
Tags with electronic tamper evidence are also common in the marketplace; however, these all have a major flaw which is addressed by this invention.
The problem addressed by this invention is both serious and costly, for example the purchaser or trader collects empty bottles or containers and has the equipment to rework the seal, so that the product looks and acts like the original tagged item.
What is now required is an electronic tamper evident chip which can record and memorise the tampering event even though the tag and packaging have been perfectly repaired.
No UHF tags can be found on the market today which fully solves this issue and fulfils this need for unpowered tamper evident memory.
Tag suppliers offer tamper evidence; however, the tags require power from the Header when the tamper occurs to save the tamper event into memory. If the tamper event occurs when the tag is not powered by a battery or external RF field, the tag has no means of reporting this occurrence at a later time; especially if the tamper loop is perfectly repaired.
For example, a bottle of spirit which has previously been used could be filled with inferior spirit, the tag could then be repaired and placed back on the bottle; the bottle could then be resold at the quality price with inferior or even dangerous spirit inside. This patent avoids this scenario by permanently recording the tamper event, even when power is not applied to the tag; the tag retains the knowledge that the loop has be broken and re connected or in the embodiment described connected and re opened.
Some tags claim this type of security; however, it is very simple for a black market operator to overcome the damage and then re program the tag with its original data content.
Embodiment: Figure 1 shows one of a plurality of embodiments for this anti tamper tagging chip addition.
The tag itself would have three primary components, the antenna, the RFID chip and the tamper loop. This loop can be any conductive material which, in this embodiment, would be a normally open loop.
The storage device Figi,1 could be any of a plurality of charge storage means. The most likely would be a simple non volatile memory cell; however, other embodiments could be used like ferrite or ferroelectric memories to hold the necessary energy until the tag is re powered and read by the interrogator.
External memory devices could be used such as super-capacitor or even battery type chemical cells.
In this embodiment The memory cell is set to The al' sTale by the charging circuiT formed by field elf oct transistor figl 10 and diode tigl 9. The memory cell can only be charged when the device is powered by same means; this is usually the RF field from the interrogator. Diode Figl,9 represents the circuit which prevenTs the memory cell from discharging when the supply figl,3 falls below a useful levol.
The field effect transistor gate figi,8 gives the devices internal logic a means of disabling or enabling this memory function for example when the function is controlled by an internal password match, or simple enable bit.
Figi,l I and figi,7 represent the means of reading the cell when power is re-established to the chip.
Tho cell figuro 1,1 is filled with chargo, shown pictorially by figl,2; this charge remains in tho cell regardless of the voltage at VCC figi 3. At any time regardless of the voltage at VCC the charge can be removed by The loop circuit figure 16. The instant the Tamper switch figl,5 closes the charge will be removed from the memory cell changing it to a.0, state.
The tamper loop is external to the device and connected to device pins, or pads, shown as fig 1,12 The diode figl,4 represents the circuit which stops the fraudster from re-charging the cell from an external voltage.
Each block in the pictorial embodiment of this invention, figl, is a standard known and well used electronic component or circuit.
Remarks: The advent of this invention has been driven by the recent breakthroughs in tagging bottles for authenticity, traceability and stocktaking.
Due Ta this RFID breakthrough, It is now cost effective to protect bottles and oTher items in the supply chain whilst they are away from the readers/interrogator. A tag that is either dead or unreadable or signals the tampering with a bit change in the data, to indicate that the container has been ill treated or opened is of great benefit. Doing this whilst the tag is away from the reader power is difficult but now possible using modern memory cells in embodiments like the one described in this patent.
Obviously the tampering is only seen when the tag is interrogated; however, the fact that re connecting the tamper loop will not re establish a no tamper signal from the tag is a vast improvement aver current tamper evident tags.
Tags already oxist whero tamper evidence can be detected; however, all of these require powor at the point of tampering, unless powered they immediately forget the tamper event unless the tamper loop is left in the obvious tamper state.
Fixing tho tamper loop and replacing the capsulo is a very profitable businoss in thc fine wine, spirit and Pharmaceutical industries due to high demand and high taxation; this patent gives us another step forward in the baTtle against the counterfeiters, smugglers and black market traders.
Claims (11)
- CLAIMS1. A tamper evident RFID tag as described in this invention where the tamper detection event is memorised by the tag when the tag is not powered by a reader/interrogator or any other means.
- 2. A tamper evident tag as described in claim 1 where the memory of the tamper event tag cannot be cleared or reset by any form of re connection or repair of the tamper detection loop or circuit.
- 3. A tamper evident tag as described in all above claims where the tamper means is a conductive loop which is made closed circuit by a tampering event.
- 4. A tamper evident tag as described in claim 1 and 2 where the tamper means is a conductive loop which is made open circuit by some tampering event.
- 5. A tamper evident tag as described in claim 1 and 2 where the tamper event is determined by the change in property of an external transducer or any interfacing means between the said transducer and the chip.
- 6. A tamper evident tag as in all claims where the tamper evident means is memorised using a charge storage cell or energy storage device of any type.
- 7. A tamper evident tag as in claim 1 where the external tamper loop charges or discharges a memory cell either directly or through other electronic components.
- 8. A tag embodiment as in the description and claim 1 where the tag still contains evidence of a tamper event although the tamper event occurred when the device was powered or not powered by the reader/interrogator or other means.
- 9. A tag structure as in all above claims where the memory cell is an external charge storage device such as an external non volatile memory, super capacitor or chemical battery.
- 1@.A tamper evident tag where the tamper evident memory can only be reset from within the tags chip.
- 11.A tamper evident tag embodiment as described in all claims where the resetting of the tamper evident memory is password protected by some means within the chip.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1406940.5A GB2525235B (en) | 2014-04-17 | 2014-04-17 | Long range UHF RFID with non powered anti-tamper means |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1406940.5A GB2525235B (en) | 2014-04-17 | 2014-04-17 | Long range UHF RFID with non powered anti-tamper means |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201406940D0 GB201406940D0 (en) | 2014-06-04 |
GB2525235A true GB2525235A (en) | 2015-10-21 |
GB2525235B GB2525235B (en) | 2021-09-08 |
Family
ID=50928920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1406940.5A Active GB2525235B (en) | 2014-04-17 | 2014-04-17 | Long range UHF RFID with non powered anti-tamper means |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2525235B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005024745A2 (en) * | 2003-09-08 | 2005-03-17 | Claessens Frances M | Bottle cap |
WO2005111961A1 (en) * | 2004-04-30 | 2005-11-24 | Kimberly-Clark Worldwide, Inc. | Deactivating a data tag for user privacy or tamper-evident packaging |
US20060238341A1 (en) * | 2005-04-20 | 2006-10-26 | International Business Machines Corporation | System and method of tamper detection |
US20070152829A1 (en) * | 2004-04-30 | 2007-07-05 | Kimberly-Clark Worldwide, Inc. | Reversibly deactivating a radio frequency identification data tag |
-
2014
- 2014-04-17 GB GB1406940.5A patent/GB2525235B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005024745A2 (en) * | 2003-09-08 | 2005-03-17 | Claessens Frances M | Bottle cap |
WO2005111961A1 (en) * | 2004-04-30 | 2005-11-24 | Kimberly-Clark Worldwide, Inc. | Deactivating a data tag for user privacy or tamper-evident packaging |
US20070152829A1 (en) * | 2004-04-30 | 2007-07-05 | Kimberly-Clark Worldwide, Inc. | Reversibly deactivating a radio frequency identification data tag |
US20060238341A1 (en) * | 2005-04-20 | 2006-10-26 | International Business Machines Corporation | System and method of tamper detection |
Also Published As
Publication number | Publication date |
---|---|
GB201406940D0 (en) | 2014-06-04 |
GB2525235B (en) | 2021-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10579919B2 (en) | NFC/RF mechanism with multiple valid states for detecting an open container, and methods of making and using the same | |
US7839288B2 (en) | Sealing detection mechanism using RFID tag for container | |
EP2388736B1 (en) | Reversibly deactivating a radio frequency identification data tag | |
US10815694B2 (en) | Tamper evident cargo container seal bolt lock | |
US8279048B2 (en) | RFID tag with piezoelectric sensor for power and input data | |
CN203006057U (en) | Anti-fake bottle cap | |
PL208020B1 (en) | Method for monitiring the contents of the packaging | |
TW201525875A (en) | Security label | |
CN103971248A (en) | Commodity anti-counterfeiting tracing system on basis of two-dimension codes and RFID (radio frequency identification device) technology | |
US20080198011A1 (en) | Radio-frequency identification tags for preventing and detecting tampering | |
US10565411B2 (en) | Detection of seal integrity on products using RFID | |
CN205451142U (en) | A RFID electronic tags and commodity circulation parcel for commodity circulation parcel | |
US8797162B2 (en) | Anti-theft system using RFID tags | |
CN201074078Y (en) | Electronic sealing apparatus | |
CN210348532U (en) | Passive NFC anti-counterfeiting chip for realizing tamper-proof detection by detecting on-off of pin | |
GB2525235A (en) | Means for recovering tamper evidence in RFID tags regardless of the power supply to the chip or reconnection of the tamper loop. | |
US20160300244A1 (en) | Method And System For Authenticating A Packaged Product From A Remote Location | |
US20190138874A1 (en) | Rfid-based indicator for use with fastening substrates and related methods | |
CN210348528U (en) | Active NFC anti-counterfeiting chip with tampering dynamic detection function | |
CN206400611U (en) | A kind of electronic anti-counterfeit tag | |
Nemeth et al. | Adopting RFID in supply chains | |
CN210348529U (en) | NFC anti-counterfeiting chip capable of achieving tamper-proof detection function through activatable power source | |
US20090199606A1 (en) | Tamper evident seal | |
CN112085138A (en) | Micro device, system and method for tracing source, anti-counterfeiting and anti-tampering | |
CN101792038B (en) | Bulk cargo security system and method realized by utilizing radio frequency identification tag technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20160623 AND 20160629 |