GB2525235A - Means for recovering tamper evidence in RFID tags regardless of the power supply to the chip or reconnection of the tamper loop. - Google Patents

Means for recovering tamper evidence in RFID tags regardless of the power supply to the chip or reconnection of the tamper loop. Download PDF

Info

Publication number
GB2525235A
GB2525235A GB1406940.5A GB201406940A GB2525235A GB 2525235 A GB2525235 A GB 2525235A GB 201406940 A GB201406940 A GB 201406940A GB 2525235 A GB2525235 A GB 2525235A
Authority
GB
United Kingdom
Prior art keywords
tamper
tag
tamper evident
memory
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1406940.5A
Other versions
GB201406940D0 (en
GB2525235B (en
Inventor
David Bernard Mapleston
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1406940.5A priority Critical patent/GB2525235B/en
Publication of GB201406940D0 publication Critical patent/GB201406940D0/en
Publication of GB2525235A publication Critical patent/GB2525235A/en
Application granted granted Critical
Publication of GB2525235B publication Critical patent/GB2525235B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07372Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
    • G06K19/07381Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit with deactivation or otherwise incapacitation of at least a part of the circuit upon detected tampering
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D55/00Accessories for container closures not otherwise provided for
    • B65D55/02Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2203/00Decoration means, markings, information elements, contents indicators
    • B65D2203/10Transponders

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

An RFID tag which indicates that a tamper event has occurred includes a memory cell 1 connected to a conductive loop 6 by pins 12. The memory cell has a memory status set to '1' and contains a charge 2 which dissipates via the conductive loop 6 as a result of a tamper event. When the charge dissipates the memory status changes to '0'. Upon being interrogated by a reader, the tag sends memory status information to the reader thus indicating whether the tag has been tampered with. Preferably the conductive loop 6 includes a switch 5 which is closed when the tag is tampered with, causing dissipation of the memory cell charge. Alternatively, the conductive loop may be a closed circuit (not shown) which is opened as a result of tampering. A diode 4 prevents the memory cell from being reset by reconnecting or repairing the tamper circuit. A diode 9 prevents the cell from discharging when the voltage from the power supply 3 falls below a useful level. The tag may be used to indicate when the contents of a bottle have been tampered with.

Description

Long Range UHF RFID Tag with non powered anti tamper means Terms used: Tag: two paper thin printed antennas or capacitors with an integrated circuit chip between the two to form a radio transponder device.
Chip: the black dot in the middle of the tag, this is the integrated circuit that provides the backscatter of the radio power from the interrogator; it also deals with all the communication and memory data. In this case it also handles the logic state and memory for tamper evidence like a bottle capsule cover removal or lid removal.
Interrogator or Reader: A tag reader; this bounces a radio signal off the tags which modulates the reflected signal and hence reports back the tag serial number and other data back to the interrogator.
Tamper evidence: is a means for showing that an item has previously been opened or disturbed, bottle top capsule removal for example.
Background information:
Many HFID tags on the market today can display tampering; these tags are carefully designed so that the tamper loop cannot be mended economically by the user or fake trader.
Tags with electronic tamper evidence are also common in the marketplace; however, these all have a major flaw which is addressed by this invention.
The problem addressed by this invention is both serious and costly, for example the purchaser or trader collects empty bottles or containers and has the equipment to rework the seal, so that the product looks and acts like the original tagged item.
What is now required is an electronic tamper evident chip which can record and memorise the tampering event even though the tag and packaging have been perfectly repaired.
No UHF tags can be found on the market today which fully solves this issue and fulfils this need for unpowered tamper evident memory.
Tag suppliers offer tamper evidence; however, the tags require power from the Header when the tamper occurs to save the tamper event into memory. If the tamper event occurs when the tag is not powered by a battery or external RF field, the tag has no means of reporting this occurrence at a later time; especially if the tamper loop is perfectly repaired.
For example, a bottle of spirit which has previously been used could be filled with inferior spirit, the tag could then be repaired and placed back on the bottle; the bottle could then be resold at the quality price with inferior or even dangerous spirit inside. This patent avoids this scenario by permanently recording the tamper event, even when power is not applied to the tag; the tag retains the knowledge that the loop has be broken and re connected or in the embodiment described connected and re opened.
Some tags claim this type of security; however, it is very simple for a black market operator to overcome the damage and then re program the tag with its original data content.
Embodiment: Figure 1 shows one of a plurality of embodiments for this anti tamper tagging chip addition.
The tag itself would have three primary components, the antenna, the RFID chip and the tamper loop. This loop can be any conductive material which, in this embodiment, would be a normally open loop.
The storage device Figi,1 could be any of a plurality of charge storage means. The most likely would be a simple non volatile memory cell; however, other embodiments could be used like ferrite or ferroelectric memories to hold the necessary energy until the tag is re powered and read by the interrogator.
External memory devices could be used such as super-capacitor or even battery type chemical cells.
In this embodiment The memory cell is set to The al' sTale by the charging circuiT formed by field elf oct transistor figl 10 and diode tigl 9. The memory cell can only be charged when the device is powered by same means; this is usually the RF field from the interrogator. Diode Figl,9 represents the circuit which prevenTs the memory cell from discharging when the supply figl,3 falls below a useful levol.
The field effect transistor gate figi,8 gives the devices internal logic a means of disabling or enabling this memory function for example when the function is controlled by an internal password match, or simple enable bit.
Figi,l I and figi,7 represent the means of reading the cell when power is re-established to the chip.
Tho cell figuro 1,1 is filled with chargo, shown pictorially by figl,2; this charge remains in tho cell regardless of the voltage at VCC figi 3. At any time regardless of the voltage at VCC the charge can be removed by The loop circuit figure 16. The instant the Tamper switch figl,5 closes the charge will be removed from the memory cell changing it to a.0, state.
The tamper loop is external to the device and connected to device pins, or pads, shown as fig 1,12 The diode figl,4 represents the circuit which stops the fraudster from re-charging the cell from an external voltage.
Each block in the pictorial embodiment of this invention, figl, is a standard known and well used electronic component or circuit.
Remarks: The advent of this invention has been driven by the recent breakthroughs in tagging bottles for authenticity, traceability and stocktaking.
Due Ta this RFID breakthrough, It is now cost effective to protect bottles and oTher items in the supply chain whilst they are away from the readers/interrogator. A tag that is either dead or unreadable or signals the tampering with a bit change in the data, to indicate that the container has been ill treated or opened is of great benefit. Doing this whilst the tag is away from the reader power is difficult but now possible using modern memory cells in embodiments like the one described in this patent.
Obviously the tampering is only seen when the tag is interrogated; however, the fact that re connecting the tamper loop will not re establish a no tamper signal from the tag is a vast improvement aver current tamper evident tags.
Tags already oxist whero tamper evidence can be detected; however, all of these require powor at the point of tampering, unless powered they immediately forget the tamper event unless the tamper loop is left in the obvious tamper state.
Fixing tho tamper loop and replacing the capsulo is a very profitable businoss in thc fine wine, spirit and Pharmaceutical industries due to high demand and high taxation; this patent gives us another step forward in the baTtle against the counterfeiters, smugglers and black market traders.

Claims (11)

  1. CLAIMS1. A tamper evident RFID tag as described in this invention where the tamper detection event is memorised by the tag when the tag is not powered by a reader/interrogator or any other means.
  2. 2. A tamper evident tag as described in claim 1 where the memory of the tamper event tag cannot be cleared or reset by any form of re connection or repair of the tamper detection loop or circuit.
  3. 3. A tamper evident tag as described in all above claims where the tamper means is a conductive loop which is made closed circuit by a tampering event.
  4. 4. A tamper evident tag as described in claim 1 and 2 where the tamper means is a conductive loop which is made open circuit by some tampering event.
  5. 5. A tamper evident tag as described in claim 1 and 2 where the tamper event is determined by the change in property of an external transducer or any interfacing means between the said transducer and the chip.
  6. 6. A tamper evident tag as in all claims where the tamper evident means is memorised using a charge storage cell or energy storage device of any type.
  7. 7. A tamper evident tag as in claim 1 where the external tamper loop charges or discharges a memory cell either directly or through other electronic components.
  8. 8. A tag embodiment as in the description and claim 1 where the tag still contains evidence of a tamper event although the tamper event occurred when the device was powered or not powered by the reader/interrogator or other means.
  9. 9. A tag structure as in all above claims where the memory cell is an external charge storage device such as an external non volatile memory, super capacitor or chemical battery.
  10. 1@.A tamper evident tag where the tamper evident memory can only be reset from within the tags chip.
  11. 11.A tamper evident tag embodiment as described in all claims where the resetting of the tamper evident memory is password protected by some means within the chip.
GB1406940.5A 2014-04-17 2014-04-17 Long range UHF RFID with non powered anti-tamper means Active GB2525235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1406940.5A GB2525235B (en) 2014-04-17 2014-04-17 Long range UHF RFID with non powered anti-tamper means

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1406940.5A GB2525235B (en) 2014-04-17 2014-04-17 Long range UHF RFID with non powered anti-tamper means

Publications (3)

Publication Number Publication Date
GB201406940D0 GB201406940D0 (en) 2014-06-04
GB2525235A true GB2525235A (en) 2015-10-21
GB2525235B GB2525235B (en) 2021-09-08

Family

ID=50928920

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1406940.5A Active GB2525235B (en) 2014-04-17 2014-04-17 Long range UHF RFID with non powered anti-tamper means

Country Status (1)

Country Link
GB (1) GB2525235B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005024745A2 (en) * 2003-09-08 2005-03-17 Claessens Frances M Bottle cap
WO2005111961A1 (en) * 2004-04-30 2005-11-24 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
US20060238341A1 (en) * 2005-04-20 2006-10-26 International Business Machines Corporation System and method of tamper detection
US20070152829A1 (en) * 2004-04-30 2007-07-05 Kimberly-Clark Worldwide, Inc. Reversibly deactivating a radio frequency identification data tag

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005024745A2 (en) * 2003-09-08 2005-03-17 Claessens Frances M Bottle cap
WO2005111961A1 (en) * 2004-04-30 2005-11-24 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
US20070152829A1 (en) * 2004-04-30 2007-07-05 Kimberly-Clark Worldwide, Inc. Reversibly deactivating a radio frequency identification data tag
US20060238341A1 (en) * 2005-04-20 2006-10-26 International Business Machines Corporation System and method of tamper detection

Also Published As

Publication number Publication date
GB201406940D0 (en) 2014-06-04
GB2525235B (en) 2021-09-08

Similar Documents

Publication Publication Date Title
US10579919B2 (en) NFC/RF mechanism with multiple valid states for detecting an open container, and methods of making and using the same
US7839288B2 (en) Sealing detection mechanism using RFID tag for container
EP2388736B1 (en) Reversibly deactivating a radio frequency identification data tag
US10815694B2 (en) Tamper evident cargo container seal bolt lock
US8279048B2 (en) RFID tag with piezoelectric sensor for power and input data
CN203006057U (en) Anti-fake bottle cap
PL208020B1 (en) Method for monitiring the contents of the packaging
TW201525875A (en) Security label
CN103971248A (en) Commodity anti-counterfeiting tracing system on basis of two-dimension codes and RFID (radio frequency identification device) technology
US20080198011A1 (en) Radio-frequency identification tags for preventing and detecting tampering
US10565411B2 (en) Detection of seal integrity on products using RFID
CN205451142U (en) A RFID electronic tags and commodity circulation parcel for commodity circulation parcel
US8797162B2 (en) Anti-theft system using RFID tags
CN201074078Y (en) Electronic sealing apparatus
CN210348532U (en) Passive NFC anti-counterfeiting chip for realizing tamper-proof detection by detecting on-off of pin
GB2525235A (en) Means for recovering tamper evidence in RFID tags regardless of the power supply to the chip or reconnection of the tamper loop.
US20160300244A1 (en) Method And System For Authenticating A Packaged Product From A Remote Location
US20190138874A1 (en) Rfid-based indicator for use with fastening substrates and related methods
CN210348528U (en) Active NFC anti-counterfeiting chip with tampering dynamic detection function
CN206400611U (en) A kind of electronic anti-counterfeit tag
Nemeth et al. Adopting RFID in supply chains
CN210348529U (en) NFC anti-counterfeiting chip capable of achieving tamper-proof detection function through activatable power source
US20090199606A1 (en) Tamper evident seal
CN112085138A (en) Micro device, system and method for tracing source, anti-counterfeiting and anti-tampering
CN101792038B (en) Bulk cargo security system and method realized by utilizing radio frequency identification tag technique

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20160623 AND 20160629