WO2014116599A1 - System and method for product tracking and verification - Google Patents

System and method for product tracking and verification Download PDF

Info

Publication number
WO2014116599A1
WO2014116599A1 PCT/US2014/012373 US2014012373W WO2014116599A1 WO 2014116599 A1 WO2014116599 A1 WO 2014116599A1 US 2014012373 W US2014012373 W US 2014012373W WO 2014116599 A1 WO2014116599 A1 WO 2014116599A1
Authority
WO
WIPO (PCT)
Prior art keywords
product
response
identification chip
seal
radio frequency
Prior art date
Application number
PCT/US2014/012373
Other languages
French (fr)
Inventor
Gregory E. WEBB
Original Assignee
Infraegis, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infraegis, Inc. filed Critical Infraegis, Inc.
Publication of WO2014116599A1 publication Critical patent/WO2014116599A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07372Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
    • G06K19/07381Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit with deactivation or otherwise incapacitation of at least a part of the circuit upon detected tampering
    • G06K19/0739Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit with deactivation or otherwise incapacitation of at least a part of the circuit upon detected tampering the incapacitated circuit being part of an antenna

Definitions

  • Fig. 1 is a front elevational view of a bottle including frangible radio frequency seal.
  • Fig. 2 is an enlarged view of the cap area of the bottle of Fig. 1 showing the frangible radio frequency seal in further detail.
  • Fig. 3 is a perspective view of the cap area of the bottle of Fig. 1.
  • FIG. 4 is front view of the frangible radio frequency seal of Fig. 1.
  • Fig. 5 is a rear view of the frangible radio frequency seal of Fig. 1.
  • Fig. 6 illustrates a verified authentication screen displayed on a personal electronic device and associated with a product authentication application running on the personal electronic device.
  • Fig. 7 illustrates a failed authentication screen displayed on the personal electronic device and associated with the product authentication application running on the personal electronic device.
  • a system and method for product tracking and verification is disclosed in connection with an exemplary product 10, which in the illustrated configuration includes a bottle 12.
  • the bottle 12 includes a twist-off cap 14 having a removable portion 16 that can be removed from the bottle 12 to access the bottle contents, and a fixed portion 18 detachably coupled to the removable portion 16 and that remains attached to the bottle 12 when the removable portion 16 is removed.
  • the combination of the removable portion 16 and the fixed portion 18 provides what is commonly referred to as a visible safety seal, and generally indicates to the consumer that the contents of the product 10 have not been tampered with since the product 10 left its source.
  • the system and method includes a high- visibility seal 20 that, in the illustrated configuration, is attached to the cap 14 and sealing ring 16 of the bottle 12.
  • the seal 20 is configured for attachment to the bottle using high speed automated labeling equipment.
  • the illustrated seal 20 is substantially circular and is divided into a first portion 22 and a second portion 24 by a score line 26.
  • the score line 26 is represented schematically by a dashed line in Figs. 4 and 5, and defines a line of weakness for the seal 20 that promotes controlled separation of the first portion 22 and the second portion 24, as discussed further below.
  • the score line 26 is a straight chord that extends through the generally circular seal 20, although other configurations are possible.
  • the score line 26 may be or include a sharp crease, a perforation, an area of reduced material thickness, and the like.
  • the specific configuration of the score line 26 may depend upon, among other things, the specific type of product 10 with which the seal 20 is associated.
  • a front surface 27 of the seal 20 may be embossed and may include indicia 28 corresponding to the product 10 or to the provider of the system and method for product tracking and verification.
  • a back surface 29 of the seal 20 (Fig. 6) is provided with a radio frequency identification (RFID) chip 30 and an antenna 32 associated with the chip 30.
  • RFID radio frequency identification
  • One or both of the RFID chip 30 and the antenna 32 may be embedded within the back surface 29 of the seal 20.
  • the score line 26 may extend across one or both of the RFID chip 30 and the antenna 32. In the illustrated embodiment, the score line 26 extends through both the RFID chip 30 and the antenna 32.
  • the back surface 29 of the seal 20 may also include an adhesive layer (not shown) configured for substantially permanent securement to the product 10. In the illustrated configuration, the seal 20 is adapted for substantially permanent attachment to the cap 14.
  • the seal 20 is installed on the cap 14 such that the score line 26 is substantially aligned with the boundary between the removable portion 16 and the fixed portion 18 of the cap 14.
  • the first portion 22 of the seal 20 is substantially permanently secured to the removable portion 16 of the cap
  • the second portion 24 of the seal 20 is substantially permanently secured to the fixed portion 18 of the cap 14.
  • the system and method includes a software program including computer executable instructions that may be installed on, for example, a personal electronic device 34, such as a smart phone.
  • the software program may be in the form of a downloadable application, and may be configured specifically for operation on certain types or brands of personal electronic device 34.
  • the software may make use of existing hardware features of the personal electronic device, including short and long range
  • the software is capable of operating the personal electronic device 34 to transmit an electronic signal appropriate for interrogating the RFID chip 30 and antenna 32 associated with the seal 20, and is further capable of operating the personal electronic device 34 to receive the electronic response generated by the RFID chip 30 and antenna 32.
  • the electronic response may include information associated with an authentic source of the product 10 to which the seal 20 is secured.
  • the information may be encrypted.
  • the system may compare the electronic response to a database of suitable electronic responses stored in memory on the personal electronic device.
  • the system may remotely communicate with a remote database (e.g., using one or more wired or wireless communication protocols) and compare the electronic response with information contained on the remote database. If the electronic response from the RFID chip 30 and antenna 32 correlates with information stored in the database, the authenticity of the product 10 is considered to be confirmed and an appropriate indication is presented to the user via, for example, the display of the personal electronic device 34, as shown in Fig. 6. If, on the other hand, the electronic response from the RFID chip 30 and antenna 32 does not correlate with information stored in the database, the product is considered to be counterfeit and an appropriate indication is presented to the user via, for example, the display of the personal electronic device 34, as shown in Fig. 7.
  • the database whether stored on the personal electronic device 34 or remotely, is a secure encryption database, and is configured such that the electronic response from the RFID chip 30 and the antenna 32 functions to decrypt information stored in the encrypted database.
  • the indication of authenticity may include additional information regarding the product 10, such as the date and/or location of manufacture, the lot number, the original source, and the like. If the product 10 is considered counterfeit, the indication may include instructions to notify an appropriate retail or distribution outlet.
  • Hyperlinks or other contact information may be included in the message to facilitate reporting of the counterfeit goods to the appropriate party.
  • the seal 20 is located such that opening or tampering with the product 10 also destroys the seal 20.
  • opening or tampering with the product 10 also destroys the seal 20.
  • the product 10 has been opened or tampered with and a user operates the system in an attempt to verify the authenticity of the product, there will be no response from the RFID chip 30 and the system will alert the user to the compromised status of the product.
  • any tampering may also be evident through visual inspection of the seal 20.
  • the seal may provide authentication of the product and the contents by means of a frangible embedded (hidden) RFID seal.
  • the seal may be multi-layer with a visual product Brand seal and may be applied as a function of the high speed labeling process during the bottling production.
  • the seal may be securely glued onto the cap and the cap sealing ring such that it cannot be removed without damaging the seal.
  • a shrink wrap sleeve may be added to cover the cap, the seal and extending to the bottle neck. This may provide added protection for the seal during transportation, handling, and does not affect the RFID function of the seal.
  • the seal or the seal's RFID chip may contain a secure encrypted code, which can be accessed from an electronic device such as, for example, a smartphone.
  • An application may be required to be downloaded and installed into the electronic device in order to decrypt the code on the RFID.
  • the RFID seal may be frangible along a pre scored line between a bottle cap and a cap sealing ring. So, when the bottle cap is twisted to remove the cap, the RFID seal may separate and render the RFID non-functional which indicates that the bottle has been tampered with.
  • a consumer, distributor or retailer having an electronic device such as a smartphone, which has internet or data connectivity and has the downloaded application from the
  • the application may decrypt the RFID information and authenticate the product (or not authenticate it) as previously explained.
  • the application may, over the internet or data connection, update the manufacturer' s central database, which may be encrypted, with information from the electronic device, such as GPS information, registered device number, registered user, ID of customer/ distributor/ retailer. Then using information contained in the bottle RFID seal, when decrypted from the product bottle will allow the download display information regarding the bottle and product with regard to place of manufacture, date time, batch number, shipping date, etc. URL and hyperlinks may also be provided for data regarding the product usage, specifications, FAQ's and user hints, etc. to the consumer electronic device.
  • the seal may be visible and obvious to the consumer against simple tampering
  • the seal may have an embedded RFID with an encrypted code, which prevents copying for reuse or counterfeiting;
  • Opening the product may destroy the RFID, which further prevents copying or counterfeiting;
  • the RFID seal may be read from a simple consumer electronic device such as a Smartphone (does not require distributor or retailer to authenticate);
  • the consumer may download and have access to the application to authenticate the seal and the product, including at the point of purchase;
  • the consumer may be empowered to authenticate the product on their own
  • the consumer may be empowered by being online to receive additional data on the product.
  • the consumer online may provide customer information to the manufacturer.
  • the functions described above can be implemented in digital electronic circuitry, in computer software, firmware or hardware.
  • the techniques can be implemented using one or more computer program products.
  • Programmable processors and computers can be included in or packaged as mobile devices, such as the personal electronic device 34, however the system and method are equally suitable to implementation in desktop, laptop, point of sale, and other computerized systems.
  • the processes and logic flows can be performed by one or more programmable processors and by one or more programmable logic circuitry.
  • General and special purpose computing devices and storage devices can be interconnected through communication networks.
  • Some implementations include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • electronic components such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • Such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks.
  • RAM random access memory
  • ROM read-only compact discs
  • CD-R recordable compact discs
  • CD-RW rewritable compact discs
  • read-only digital versatile discs e.g., DVD-ROM, dual-layer DVD-ROM
  • flash memory e.g., SD cards, mini
  • the computer-readable media can store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
  • Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • integrated circuits execute instructions that are stored on the circuit itself.
  • the terms "computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
  • display or displaying means displaying on an electronic device.
  • computer readable medium and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
  • implementations of the subject matter described in this specification can be implemented on a device having a display device, e.g., televisions or other displays with one or more processors coupled thereto or embedded therein, or other appropriate computing devices that can be used for running an application, for displaying information to the user and including a user interface such as a touch screen, a keyboard and/or a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
  • a display device e.g., televisions or other displays with one or more processors coupled thereto or embedded therein, or other appropriate computing devices that can be used for running an application, for displaying information to the user and including a user interface such as a touch screen, a keyboard and/or a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
  • a display device e.g., televisions or other displays with one or more processors coupled thereto or embedded therein,
  • a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
  • Implementations of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network ("LAN”) and a wide area network (“WAN”), an internetwork (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks).
  • LAN local area network
  • WAN wide area network
  • Internet internetwork
  • peer-to-peer networks e.g.,
  • the computing system can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device).
  • client device e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device.
  • Data generated at the client device e.g., a result of the user interaction
  • a phrase such as an "aspect” does not imply that such aspect is essential to the subject technology or that such aspect applies to all configurations of the subject technology.
  • a disclosure relating to an aspect may apply to all configurations, or one or more configurations.
  • a phrase such as an aspect may refer to one or more aspects and vice versa.
  • a phrase such as a “configuration” does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology.
  • a disclosure relating to a configuration may apply to all configurations, or one or more configurations.
  • a phrase such as a configuration may refer to one or more configurations and vice versa.
  • example is used herein to mean “serving as an example or illustration.” Any aspect or design described herein as “example” is not necessarily to be construed as preferred or advantageous over other aspects or designs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system for product tracking and verification. The system includes a substrate having a line of weakness and a combination radio frequency identification chip and antenna associated with the substrate. At least one of the radio identification chip and the antenna are intersected by the line of weakness. Separating the substrate along the line of weakness destroys at least one of the radio frequency identification chip and the antenna. A non-transitory computer readable medium including instructions for operating a microprocessor may also be provided wherein there is an instruction for sending an interrogation signal, an instruction for receiving a response to the interrogation signal from the radio frequency identification chip, and a set of instructions for comparing the response to a plurality of expected responses stored in an encrypted database.

Description

SYSTEM AND METHOD FOR PRODUCT TRACKING AND VERIFICATION
BACKGROUND OF THE INVENTION
[0001] It has been estimated that the sale and distribution of counterfeit goods costs the manufacturers and distributors of genuine goods as much as two-trillion-dollars worldwide. Although efforts are made to stop counterfeit and so called "grey market" goods using government border and customs inspections, it has proven extremely difficult, if not impossible, to prevent the entry of counterfeit goods into the marketplace.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] To understand the present invention, it will now be described by way of example, with reference to the accompanying drawings.
[0003] Fig. 1 is a front elevational view of a bottle including frangible radio frequency seal.
[0004] Fig. 2 is an enlarged view of the cap area of the bottle of Fig. 1 showing the frangible radio frequency seal in further detail.
[0005] Fig. 3 is a perspective view of the cap area of the bottle of Fig. 1.
[0006] Fig. 4 is front view of the frangible radio frequency seal of Fig. 1.
[0007] Fig. 5 is a rear view of the frangible radio frequency seal of Fig. 1.
[0008] Fig. 6 illustrates a verified authentication screen displayed on a personal electronic device and associated with a product authentication application running on the personal electronic device.
[0009] Fig. 7 illustrates a failed authentication screen displayed on the personal electronic device and associated with the product authentication application running on the personal electronic device.
[0010] While the invention will be described in connection with the preferred embodiments shown herein, it will be understood that it is not intended to limit the invention to those embodiments. On the contrary, it is intended to cover all alternatives, modifications, and equivalents, as may be included within the spirit and scope of the invention as defined by the appended claims.
DETAILED DESCRIPTION
[0011] While this invention is susceptible of embodiments in many different forms, there is shown in the drawings and will herein be described in detail preferred embodiments of the invention with the understanding that the present disclosure is to be considered as an
exemplification of the principles of the invention and is not intended to limit the broad aspect of the invention to the embodiments illustrated.
[0012] In the Figures, and referring initially to Figs. 1-3, a system and method for product tracking and verification is disclosed in connection with an exemplary product 10, which in the illustrated configuration includes a bottle 12. The bottle 12 includes a twist-off cap 14 having a removable portion 16 that can be removed from the bottle 12 to access the bottle contents, and a fixed portion 18 detachably coupled to the removable portion 16 and that remains attached to the bottle 12 when the removable portion 16 is removed. The combination of the removable portion 16 and the fixed portion 18 provides what is commonly referred to as a visible safety seal, and generally indicates to the consumer that the contents of the product 10 have not been tampered with since the product 10 left its source. While the illustrated example product 10 is in the form of a bottle 12, it will be apparent that the teachings provided herein may be applied to a wide variety of products and product packaging, including substantially any type of container that may be opened by moving or removing one portion of the container with respect to another portion of the container.
[0013] Referring also to Figs. 4 and 5, the system and method includes a high- visibility seal 20 that, in the illustrated configuration, is attached to the cap 14 and sealing ring 16 of the bottle 12. The seal 20 is configured for attachment to the bottle using high speed automated labeling equipment. The illustrated seal 20 is substantially circular and is divided into a first portion 22 and a second portion 24 by a score line 26. The score line 26 is represented schematically by a dashed line in Figs. 4 and 5, and defines a line of weakness for the seal 20 that promotes controlled separation of the first portion 22 and the second portion 24, as discussed further below. In the illustrated embodiment the score line 26 is a straight chord that extends through the generally circular seal 20, although other configurations are possible. By way of example, the score line 26 may be or include a sharp crease, a perforation, an area of reduced material thickness, and the like. The specific configuration of the score line 26 may depend upon, among other things, the specific type of product 10 with which the seal 20 is associated.
[0014] A front surface 27 of the seal 20 (Fig. 5) may be embossed and may include indicia 28 corresponding to the product 10 or to the provider of the system and method for product tracking and verification. A back surface 29 of the seal 20 (Fig. 6) is provided with a radio frequency identification (RFID) chip 30 and an antenna 32 associated with the chip 30. One or both of the RFID chip 30 and the antenna 32 may be embedded within the back surface 29 of the seal 20. By locating the RFID chip 30 and the antenna 32 on the back surface 29 of the seal 20, both the RFID chip 30 and the antenna 32 are hidden from view when the seal 20 is attached to the product 10. The RFID chip 30 and antenna 32 are configured to respond electronically when interrogated with an appropriate electronic signal, as discussed further below. As shown in Fig. 5, the score line 26 may extend across one or both of the RFID chip 30 and the antenna 32. In the illustrated embodiment, the score line 26 extends through both the RFID chip 30 and the antenna 32. The back surface 29 of the seal 20 may also include an adhesive layer (not shown) configured for substantially permanent securement to the product 10. In the illustrated configuration, the seal 20 is adapted for substantially permanent attachment to the cap 14.
[0015] As best shown in Fig. 2, the seal 20 is installed on the cap 14 such that the score line 26 is substantially aligned with the boundary between the removable portion 16 and the fixed portion 18 of the cap 14. In this regard, the first portion 22 of the seal 20 is substantially permanently secured to the removable portion 16 of the cap, and the second portion 24 of the seal 20 is substantially permanently secured to the fixed portion 18 of the cap 14. When the removable portion 16 of the cap 14 is twisted to remove it from the bottle 12, the twisting motion strains the seal 20 generally along the score line 26 thereby causing the seal 20 to separate along the score line 26. Separation of the seal 20 damages one or both of the RFID chip 30 and the antenna 32 such that the RFID chip 30 and the antenna 32 are no longer operable to respond electronically when interrogated with an appropriate electronic signal.
[0016] Referring also to Figs. 6 and 7, the system and method includes a software program including computer executable instructions that may be installed on, for example, a personal electronic device 34, such as a smart phone. In some embodiments the software program may be in the form of a downloadable application, and may be configured specifically for operation on certain types or brands of personal electronic device 34. The software may make use of existing hardware features of the personal electronic device, including short and long range
communication protocols, a user interface, a display, speakers, microphones, cameras, and the like.
[0017] In some embodiments, the software is capable of operating the personal electronic device 34 to transmit an electronic signal appropriate for interrogating the RFID chip 30 and antenna 32 associated with the seal 20, and is further capable of operating the personal electronic device 34 to receive the electronic response generated by the RFID chip 30 and antenna 32. The electronic response may include information associated with an authentic source of the product 10 to which the seal 20 is secured. The information may be encrypted.
[0018] In one embodiment, upon receiving the electronic response from the RFID chip 30 and antenna 32, the system may compare the electronic response to a database of suitable electronic responses stored in memory on the personal electronic device. In another
embodiment, upon receiving the electronic response from the RFID chip 30 and antenna 32, the system may remotely communicate with a remote database (e.g., using one or more wired or wireless communication protocols) and compare the electronic response with information contained on the remote database. If the electronic response from the RFID chip 30 and antenna 32 correlates with information stored in the database, the authenticity of the product 10 is considered to be confirmed and an appropriate indication is presented to the user via, for example, the display of the personal electronic device 34, as shown in Fig. 6. If, on the other hand, the electronic response from the RFID chip 30 and antenna 32 does not correlate with information stored in the database, the product is considered to be counterfeit and an appropriate indication is presented to the user via, for example, the display of the personal electronic device 34, as shown in Fig. 7. In some embodiments, the database, whether stored on the personal electronic device 34 or remotely, is a secure encryption database, and is configured such that the electronic response from the RFID chip 30 and the antenna 32 functions to decrypt information stored in the encrypted database.
[0019] If the product 10 is considered authentic, the indication of authenticity may include additional information regarding the product 10, such as the date and/or location of manufacture, the lot number, the original source, and the like. If the product 10 is considered counterfeit, the indication may include instructions to notify an appropriate retail or distribution outlet.
Hyperlinks or other contact information may be included in the message to facilitate reporting of the counterfeit goods to the appropriate party.
[0020] As discussed above, the seal 20 is located such that opening or tampering with the product 10 also destroys the seal 20. Thus, if the product 10 has been opened or tampered with and a user operates the system in an attempt to verify the authenticity of the product, there will be no response from the RFID chip 30 and the system will alert the user to the compromised status of the product. Furthermore, because of the highly visible nature of the seal 20 on the exterior of the product, any tampering may also be evident through visual inspection of the seal 20. Visual Branding Seal
[0021] The seal may provide authentication of the product and the contents by means of a frangible embedded (hidden) RFID seal. The seal may be multi-layer with a visual product Brand seal and may be applied as a function of the high speed labeling process during the bottling production. The seal may be securely glued onto the cap and the cap sealing ring such that it cannot be removed without damaging the seal. Also in the bottling process, a shrink wrap sleeve may be added to cover the cap, the seal and extending to the bottle neck. This may provide added protection for the seal during transportation, handling, and does not affect the RFID function of the seal.
Off -line authentication by consumer
[0022] The seal or the seal's RFID chip may contain a secure encrypted code, which can be accessed from an electronic device such as, for example, a smartphone. An application may be required to be downloaded and installed into the electronic device in order to decrypt the code on the RFID. A consumer with an electronic device, having the product application downloaded and without being connected to the internet or a data connection, would be able to scan the product seal and if the encrypted code from the product seal is authentic and matches the application from the manufacturer, the product will be visually authenticated. If the RFID seal does not present a signal, an incorrect signal or a signal that does not match, the product will fail
Authentication.
Tamper Proof
[0023] The RFID seal may be frangible along a pre scored line between a bottle cap and a cap sealing ring. So, when the bottle cap is twisted to remove the cap, the RFID seal may separate and render the RFID non-functional which indicates that the bottle has been tampered with.
On-line Authentication
[0024] A consumer, distributor or retailer having an electronic device, such as a smartphone, which has internet or data connectivity and has the downloaded application from the
manufacturer installed in the device can read the RFID seal. The application may decrypt the RFID information and authenticate the product (or not authenticate it) as previously explained. The application may, over the internet or data connection, update the manufacturer' s central database, which may be encrypted, with information from the electronic device, such as GPS information, registered device number, registered user, ID of customer/ distributor/ retailer. Then using information contained in the bottle RFID seal, when decrypted from the product bottle will allow the download display information regarding the bottle and product with regard to place of manufacture, date time, batch number, shipping date, etc. URL and hyperlinks may also be provided for data regarding the product usage, specifications, FAQ's and user hints, etc. to the consumer electronic device.
[0025] Advantages of the RFID tamper seals described herein include, but are not limited to:
1. The seal may be visible and obvious to the consumer against simple tampering;
2. The seal may have an embedded RFID with an encrypted code, which prevents copying for reuse or counterfeiting;
3. Opening the product may destroy the RFID, which further prevents copying or counterfeiting;
4. The RFID seal may be read from a simple consumer electronic device such as a Smartphone (does not require distributor or retailer to authenticate);
5. The consumer may download and have access to the application to authenticate the seal and the product, including at the point of purchase;
6. The consumer may be empowered to authenticate the product on their own
without the participation or permission of the distributor or retailer;
7. The consumer may be empowered by being online to receive additional data on the product; and
8. The consumer online may provide customer information to the manufacturer.
[0026] The functions described above can be implemented in digital electronic circuitry, in computer software, firmware or hardware. The techniques can be implemented using one or more computer program products. Programmable processors and computers can be included in or packaged as mobile devices, such as the personal electronic device 34, however the system and method are equally suitable to implementation in desktop, laptop, point of sale, and other computerized systems. The processes and logic flows can be performed by one or more programmable processors and by one or more programmable logic circuitry. General and special purpose computing devices and storage devices can be interconnected through communication networks. When the above description refers to the system or the personal electronic device 34 performing a function or operating in a particular way, it should be understood that the functions or operations are being performed based on programming instructions stored in memory associated with the system or the personal electronic device 34.
[0027] Some implementations include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media can store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
[0028] While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some implementations are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some implementations, such integrated circuits execute instructions that are stored on the circuit itself.
[0029] As used in this specification and any claims of this application, the terms "computer", "server", "processor", and "memory" all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification and any claims of this application, the terms "computer readable medium" and "computer readable media" are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
[0030] To provide for interaction with a user, implementations of the subject matter described in this specification can be implemented on a device having a display device, e.g., televisions or other displays with one or more processors coupled thereto or embedded therein, or other appropriate computing devices that can be used for running an application, for displaying information to the user and including a user interface such as a touch screen, a keyboard and/or a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
[0031] Implementations of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network ("LAN") and a wide area network ("WAN"), an internetwork (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks).
[0032] The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some implementations, a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device). Data generated at the client device (e.g., a result of the user interaction) can be received from the client device at the server.
[0033] It is understood that any specific order or hierarchy of steps in the processes disclosed is an illustration of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged, or that some illustrated steps may not be performed. Some of the steps may be performed simultaneously. For example, in certain circumstances, multitasking and parallel processing may be
advantageous. Moreover, the separation of various system components in the implementations described above should not be understood as requiring such separation in all implementations, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
[0034] The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but are to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean "one and only one" unless specifically so stated, but rather "one or more." Unless specifically stated otherwise, the term "some" refers to one or more. Headings and subheadings, if any, are used for convenience only and do not limit the subject disclosure.
[0035] A phrase such as an "aspect" does not imply that such aspect is essential to the subject technology or that such aspect applies to all configurations of the subject technology. A disclosure relating to an aspect may apply to all configurations, or one or more configurations. A phrase such as an aspect may refer to one or more aspects and vice versa. A phrase such as a "configuration" does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology. A disclosure relating to a configuration may apply to all configurations, or one or more configurations. A phrase such as a configuration may refer to one or more configurations and vice versa.
[0036] The word "example" is used herein to mean "serving as an example or illustration." Any aspect or design described herein as "example" is not necessarily to be construed as preferred or advantageous over other aspects or designs.
[0037] All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims.
[0038] The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. While the specific embodiments have been illustrated and described, numerous modifications come to mind without significantly departing from the spirit of the disclosure, and the scope of protection is only limited by the scope of the accompanying claims.

Claims

1. A system for product tracking and verification comprising:
a substrate, the substrate including a line of weakness; and
a combination radio frequency identification chip and antenna associated with the substrate, at least one of the radio identification chip and the antenna intersected by the line of weakness, wherein separating the substrate along the line of weakness destroys the at least one of the radio frequency identification chip and the antenna.
2. The system of claim 1, further comprising:
a non-transitory computer readable medium including instructions for operating a microprocessor, the instructions including: an instruction for sending an interrogation signal; an instruction for receiving a response to the interrogation signal from the radio frequency identification chip; and a set of instructions for comparing the response to a plurality of expected responses stored in an encrypted database.
3. A method for product tracking and verification, the method comprising:
sending an interrogation signal to a radio frequency identification chip and antenna associated with a substrate coupled to a product; listening for a response to the interrogation signal from the radio frequency identification chip; if a response is received, comparing the response to a plurality of expected responses stored in an encrypted database; and if a response is not received, determining that the product has been compromised.
4. The method of claim 3, further comprising:
if the response is received and matches one of the plurality of expected responses stored in the encrypted database, determining that the product is authentic.
5. The method of claim 3, further comprising:
if the response is received and does not match one of the plurality of expected responses stored in the encrypted database, determining that the product is not authentic.
6. The method of claim 4, further comprising:
if the response is received via the local device is decrypted and proved to be an authentic, as per claim 4. Further data on the product can be obtained from an on-line inquiry using SMS or internet Web browser or data connection to a centrally located database to exchange data from the device to the database and from the database to the device, such as but not limited to; GPS location of the electronic device, telephone number of the electronic device, registered application on the device, registered client ID, product ID number, expiration date, batch number, shipping date, distributor and hyperlinks to other data sets on the product.
PCT/US2014/012373 2013-01-22 2014-01-21 System and method for product tracking and verification WO2014116599A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361755070P 2013-01-22 2013-01-22
US61/755,070 2013-01-22

Publications (1)

Publication Number Publication Date
WO2014116599A1 true WO2014116599A1 (en) 2014-07-31

Family

ID=51227968

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/012373 WO2014116599A1 (en) 2013-01-22 2014-01-21 System and method for product tracking and verification

Country Status (1)

Country Link
WO (1) WO2014116599A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3131047A1 (en) * 2015-08-11 2017-02-15 Ertugrul, Mehmet Authenticity control system
EP3263473A1 (en) * 2016-06-27 2018-01-03 Amcor Flexibles Capsules France Smart capsules
WO2018199844A1 (en) * 2017-04-27 2018-11-01 Wang, Jianyi Secure seal for product authentication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005024745A2 (en) * 2003-09-08 2005-03-17 Claessens Frances M Bottle cap
WO2006046157A1 (en) * 2004-10-28 2006-05-04 Assa Abloy Identification Technology Group Ab Security sealing device comprising a rfid tag
US20060214789A1 (en) * 2005-03-24 2006-09-28 Joshua Posamentier Tamper detection with RFID tag
US20090248537A1 (en) * 2005-12-01 2009-10-01 Shahriar Sarkeshik Commercial transaction facilitation system
US20100141384A1 (en) * 2008-12-04 2010-06-10 Yeh-Shun Chen Bottle cap having anti-counterfeit function and bottle using the same
US20100281269A1 (en) * 2007-12-21 2010-11-04 Morpho Identification Based on Encrypted Biometric Data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005024745A2 (en) * 2003-09-08 2005-03-17 Claessens Frances M Bottle cap
WO2006046157A1 (en) * 2004-10-28 2006-05-04 Assa Abloy Identification Technology Group Ab Security sealing device comprising a rfid tag
US20060214789A1 (en) * 2005-03-24 2006-09-28 Joshua Posamentier Tamper detection with RFID tag
US20090248537A1 (en) * 2005-12-01 2009-10-01 Shahriar Sarkeshik Commercial transaction facilitation system
US20100281269A1 (en) * 2007-12-21 2010-11-04 Morpho Identification Based on Encrypted Biometric Data
US20100141384A1 (en) * 2008-12-04 2010-06-10 Yeh-Shun Chen Bottle cap having anti-counterfeit function and bottle using the same

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3131047A1 (en) * 2015-08-11 2017-02-15 Ertugrul, Mehmet Authenticity control system
EP3263473A1 (en) * 2016-06-27 2018-01-03 Amcor Flexibles Capsules France Smart capsules
WO2018001572A1 (en) * 2016-06-27 2018-01-04 Amcor Flexibles Capsules France Smart capsules
JP2019526511A (en) * 2016-06-27 2019-09-19 アムコア フレキシブルズ カプセルズ フランス High performance coating
JP7010938B2 (en) 2016-06-27 2022-01-26 アムコア フレキシブルズ カプセルズ フランス High-performance coating
US11254472B2 (en) 2016-06-27 2022-02-22 Amcor Flexibles Capsules France Smart capsules
WO2018199844A1 (en) * 2017-04-27 2018-11-01 Wang, Jianyi Secure seal for product authentication

Similar Documents

Publication Publication Date Title
US10204347B2 (en) Authenticity control system
US11429921B2 (en) Tracking shipments with a local and remote blockchain
US9916745B2 (en) Container fraud detection system and method
CN108573384B (en) Product with double identification codes and product tracing anti-counterfeiting verification method and device
CN114119039A (en) Product with double-layer anti-counterfeiting code and product source tracing anti-counterfeiting verification method and device
US20180019872A1 (en) Open registry for internet of things including sealed materials
WO2015160505A1 (en) System and method for product authentication
US20150106113A1 (en) Near Field Communication (NFC) Based Counterfeit Product Identification System
US20170193525A1 (en) System and Method for Detecting Counterfeit Products
US20090267729A1 (en) Anti-counterfeiting system
CN103824202A (en) CPK (Combined Public Key) identification authentication technology based RFID (Radio Frequency Identification Device) and two-dimensional code composite truth-identification and anti-fake source-tracing method
TW201415400A (en) System, method and computer program product for detecting tampering in a product
CN108352066B (en) Seal tampering detection method
WO2019068893A1 (en) A system and method for authenticating a product
US20100148935A1 (en) Duplication detection for non-cryptographic rfid tags using encrypted traceability information
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
WO2014116599A1 (en) System and method for product tracking and verification
EP3131047A1 (en) Authenticity control system
US20160189169A1 (en) System and Method for Detecting Counterfeit Products
US20160300244A1 (en) Method And System For Authenticating A Packaged Product From A Remote Location
WO2018064329A1 (en) Open registry for internet of things including sealed materials
US8090632B1 (en) Providing a package identifier
CN114140133B (en) Method for processing tracing data
CN111582890B (en) Anti-counterfeiting tracing and positioning system, commodity, method, device, platform and medium
US20220391884A1 (en) Method and System for Transferring a Product

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14742974

Country of ref document: EP

Kind code of ref document: A1

DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14742974

Country of ref document: EP

Kind code of ref document: A1