AU2011225766B2 - A method of content authentication inside a sealed box using special labels - Google Patents

A method of content authentication inside a sealed box using special labels Download PDF

Info

Publication number
AU2011225766B2
AU2011225766B2 AU2011225766A AU2011225766A AU2011225766B2 AU 2011225766 B2 AU2011225766 B2 AU 2011225766B2 AU 2011225766 A AU2011225766 A AU 2011225766A AU 2011225766 A AU2011225766 A AU 2011225766A AU 2011225766 B2 AU2011225766 B2 AU 2011225766B2
Authority
AU
Australia
Prior art keywords
label
pattern
spatial orientation
imaging
orientation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2011225766A
Other versions
AU2011225766A1 (en
Inventor
Ashish Anand
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LINKSMART TECHNOLOGIES PVT Ltd
Original Assignee
Linksmart Tech Pvt Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linksmart Tech Pvt Ltd filed Critical Linksmart Tech Pvt Ltd
Publication of AU2011225766A1 publication Critical patent/AU2011225766A1/en
Assigned to LINKSMART TECHNOLOGIES PVT. LTD. reassignment LINKSMART TECHNOLOGIES PVT. LTD. Request for Assignment Assignors: ANAND, ASHISH
Application granted granted Critical
Publication of AU2011225766B2 publication Critical patent/AU2011225766B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • G06F18/2155Generating training patterns; Bootstrap methods, e.g. bagging or boosting characterised by the incorporation of unlabelled data, e.g. multiple instance learning [MIL], semi-supervised techniques using expectation-maximisation [EM] or naïve labelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection

Abstract

This invention proposes a content verification and authentication method inside a sealed box, which transits between point-of-packaging and point-of delivery through a logistics supply-chain on per-hop basis. This method is about tagging each item with a label containing internal layering of radio-opaque material randomly oriented. Externally all labels/tags look symmetrical and hence even if an insider replaces the original item and tags with genuine labels on fake item, still this gets detected as original reference imaging signature will have different orientation. Every-time these labels are reused they auto-acquire their imaging credential. This method also mitigates false alarm after ensuring that imaging has changed only due to horizontal movement of items inside the box and not because of orientation. Method has inherent capability to resolve count-deficiency due to pattern overlap. For accelerated direction- agnostic scanning in high volume logistics industry for box level authentication, two labels with covert pattern is highly useful. Labels with covert pattern is again based on orientation, which is not known by insiders and credential is acquired only at time of application of labels. This method can also be used as covert anti-counterfeiting mechanism by associating imaging of random covert patterns with overt feature of unique-alpha-numeric per-piece id.

Description

Title of Invention: CONTENT AUTHENTICATION METHOD AND SPECIAL LABELS FOR CONTENT AUTHENTICATION [1] Claim of Priority: [2] This application claims the priority benefit of Indian Provisional Patent Application No. 625/CHE/2010, filed with the Government of India, Patent Office Chennai on March 10, 2010, and entitled 'X-ray image based item counter'. [3] Description: The following specification describes the nature of this invention: [4] Technical Field [5] This invention belongs to the field of content verification in terms of count inside a sealed container or originality of content in terms of tamper-evidence and anti counterfeit. Today customers can track and trace their consignment but embodiments of this invention enable them to monitor and verify the content at each point during transit. Direct benefit is that if item gets stolen and replaced with fake item of same shape, size and weight tagged with genuine labels, then point-of-intrusion is identified and thus it installs accountability at each point of transit. [6] Background Art [7] Each document, reference, patent application or patent cited in this text is expressly incorporated herein in their entirety by reference, which means that it should be read and considered by the reader as part of this text. That the document, reference, patent application, or patent cited in this text is not repeated in this text is merely for reasons of conciseness. [8] The following discussion of the background to the invention is intended to facilitate an understanding of the present invention only. It should be appreciated that the discussion is not an acknowledgement or admission that any of the material referred to was published, known or part-of the common general knowledge of the person skilled in the art in any jurisdiction as at the priority date of the invention. [9] There are methods to prevent item theft like RF-ID tag. While RF-ID tagging is an excellent solution for inventory management and tracking, it is not a dependable technology to prevent item theft/replacement and concealed loss in supply-chain. Major 1 limitation comes from the fact that RF-ID reader counts the RF-ID labels and not the actual item. It implies that somebody can take item out and put RF-ID labels back in box and still count will be shown correct. If the genuine RF-ID label is applied on fake item replacing original item, then there is no differentiation and checks and balances. Further RF-ID tags do not auto-acquire their credential every time they are re-used. [10] Core purpose of embodiments of this invention is to detect those kind of intrusions which results in concealed loss and remain un-detectable and un-traceable and only gets exposed at point-of-delivery after box is opened. This method is just not about item count but also detects if items are reshuffled or replaced with fake item of same shape, size and weight. A disclosed embodiment of the invention is an improved and stronger method of item theft/replacement detection technology that is even insider threat protected. [11] Summary of Invention: [12] The following description describes methods and design of invention. [13] In accordance with a first broad aspect of the present invention, there is provided a security label arranged to be applied to a surface, said label comprising: at least one distinctively scannable region; and at least one pattern within said distinctively scannable region, said pattern configured to be considered for computation of spatial orientation of the pattern with respect to at least one point taken as a fixed reference on a surface to which the label is adapted to be applied, wherein said label is configured to auto-acquire a unique credential in terms of the spatial orientation of the pattern with respect to the reference point on the surface during application. [14] Preferably, said label comprises at least one imprinted pattern for computation of spatial orientation. [15] Preferably, said label is of shape such that it appears symmetrical being invariant to orientation on surface where it is applied and thereby hiding the auto-acquired orientation during first application. [16] Preferably, said label is circular. [17] Preferably the label comprises: 2 a first layer having a first color; a second layer having a second color; and at least one imprinted pattern for computation of spatial orientation with respect to fixed reference point disposed between the first layer and the second layer, the imprinted pattern having a third color whereby due to the color combination imprinted pattern is invisible to unaided human eye agnostic of viewing angle and thereby avoiding invisible ink. [18] Preferably, packaging boxes are strapped with elastic belts having covert markings to enable single 360 degree scan of all sides and edges of packaging box to detect any hidden intrusion, wherein the marking on elastic strapping along with spatial orientation credential of rotational-invariant label forms a 360 degree tamper detection credential to detect intrusion from any other edges of box. [19] Preferably, the packaging boxes are trapezoidal thereby enabling 360 degree scanning of all sides and edges of packaging box tagged with the label to detect any hidden intrusion from other edges and sides of box. [20] Preferably, the label is integrated with tracking technologies credentials unifying security and tracking, to secure tracking credentials against replication and originality of tracking credential is decided based on original spatial orientation of label registered at point-of packaging. [21] Preferably, tracking credential is Radio frequency tag, barcode, Quick Response code or magnetic stripe. [22] Preferably the label comprises: a top layer; a bottom layer disposed under the top layer; and at least one internal layer of radio opaque material spanning fraction of area covered by the label, wherein said label is applied on each item which is associated with auto-acquired spatial orientation of the internal layer and tampering of content inside the packaging is detected based on any change in orientation of an internal imaging of the internal layer material. 3 [23] Preferably, the label is of shape such that it appears symmetrical being invariant to orientation on surface where it is applied and thereby hiding the auto-acquired orientation during first application. [24] Preferably, the label is applied on packaging with spatial orientation in terms of angle and distances of the imprinted pattern on label with respect to at least one fixed external reference point on packaging. [25] Preferably, while packaging, the spatial orientation of label is extracted by computing angles and distances of patterns in imaging of said internal layer of radio-opaque material in label with respect to the external reference point on packaging, the reference imaging credential is indexed with unique identification code for each packaging box in database wherein while authenticating, the spatial orientation of label is compared with indexed spatial orientation stored in the database whereby detecting even the least variation in the spatial orientation of imprinted pattern in case of tampering. [26] Preferably, the content count inside a sealed packaging is determined by counting each of uniquely spatially oriented patterns of internal layer in X-ray imaging. [27] In accordance with a second broad aspect of the present invention, there is provided a method to detect tampering on a package, said method comprising: identifying a pattern on a label applied to a package; selecting a spatial reference point on the package; at a first tamper detection, measuring a first spatial orientation of the pattern, the first spatial orientation being an orientation of the pattern with respect to the spatial reference point on the package; at a subsequent tamper detection, determining a second spatial orientation, the second spatial orientation being the orientation of the pattern with respect to a same spatial reference point; and comparing the first spatial orientation with the second spatial orientation to determine a difference there between; and generating an alert in dependence on determining the difference. [28] Preferably, the external reference point is at least one of a second label or a pattern adjacent to said first label. 4 [29] Preferably, the method further comprises the step of coupling the object with a unique identification data and associating the first spatial orientation and the second spatial orientation with the unique identification data. [30] Preferably the package is sealed and the method comprises: associating a unique identification tag for a consignment, the consignment comprising a plurality of objects; providing at least one label on each of said object; acquiring at least one reference image of the consignment with said objects, the reference image being obtained with reference to said unique identification tag; acquiring at least one test image of the consignment with said objects, the test image being obtained with reference to said unique identification tag; and comparing the reference image with the test image to generate an alert if the spatial orientation parameter for any of object in composite imaging is changed with respect to the corresponding spatial orientation in reference imaging. [31] Preferably, said method further comprises: obtaining at least one imaging parameter associated with each of the reference image and the test image, the imaging parameter configured to be associated with acquisition environment of the image; associating the composite imaging with per-object spatial orientation associated with the unique identification tag of consignment and the imaging parameter for generating an image data; and transmitting the image data to a monitoring unit. [32] Preferably, said label includes at least a radio opaque material embedded therein. [33] In a third aspect, the invention provides a system to detect tampering on a package having a label attached, the label comprising: at least one distinctively scannable region; and 5 at least one pattern within said distinctively scannable region; a spatial reference on the package; the system comprising: means for selecting a reference on the package, means for computing a spatial orientation of the pattern on the label with respect to the reference; means for applying data to the label that identifies the spatial orientation of the pattern to the reference. [34] An embodiment of this invention proposes special-purpose labels with internal layering of radio-opaque material aligned randomly and embedded inside. These labels are to be tagged item-wise or box-wise at a designated place. While externally all tags look similar on human visual inspection but internally they have radio-opaque layering spanning only a fraction of total label area, which auto-acquires random orientation spatially, post-application on packaging. Orientation can be measured with respect to intersection point of box edges or any fixed point of packaging in imaging. After tagging items are stacked in box in multiple layers arranged in row and column. X-ray imaging of box should show the row-wise and column-wise matrix of tagging. If any item is stolen then composite imaging will be different. Assuming that there is a replacement with fake item even tagged with genuine label at designated place, still the orientation will be different and imaging comparison module will catch this. In another exemplary embodiment meant for tamper-evidence and anti-counterfeit application, instead of using internal imaging like x-ray, labels are externally imaged and thus these labels will have imprinted patterns for machine vision for computation of auto-acquired spatial orientation with respect to fixed external reference point on packaging. In both embodiments, if identically manufactured, labels should be visually symmetrical agnostic of orientation on packaging and circular shape is one example. [35] In another embodiment these labels can have randomly printed patterns with invisible ink and can be scanned by special purpose camera. If invisible ink is difficult to use then these labels with black pattern can be hidden from human vision by placing them under a red and blue colour screen. This embodiment is only establishes that box has not been opened in transit channel and repackaged with genuinely looking tapes. The terms "pattern" should not be understood to be a specific shape, color and 6 dimension as it can be manufactured in any geometric, character or symbol shape with varying dimensions. Patterns on the label can be either in the form of printing, punching or applying a separate layer on the surface of the label. Label with pattern can be optically variable with dynamic color-shift effect. Labels can be applied manually or by automatic applicator. Labels can be hybrid, wherein both visible and invisible patterns are provided there. Similarly, spatial orientation of one label can be with respect to a reference point on packaging on another similar label applied on same packaging. Though infrared is mentioned to view invisible pattern but a skilled artisan can use other spectrum as well. [36] Niche attributes of embodiments of the invention are listed below, [37] - Content verification inside sealed box, tamper-detection and counterfeit check at each point of transit - 360 degree accountability and audit-ability for insiders as well - Detection of unauthorized opening of box and reshuffling of items - Detection of replacement of original item with fake items - Enables content monitoring in usual track-trace for consumer satisfaction while sending valuable or sensitive consignments - Evidences are tangible and hence legally admissible [38] Brief Description of the Drawings [39] In order that the invention may be more fully understood and put into practice, preferred embodiments are described herein and illustrated by way of example and not by way of limitation in the accompanying figures of the drawings. For simplicity and clarity of illustration, elements illustrated in the figures are not necessarily drawn to scale. For example, the dimensions of some elements may be exaggerated relative to other elements for clarity. [40] In the drawings: [41] Diagram 1: Diagram of tagging with internal layering of radio-opaque material. [42] Diagram 2: Diagram of internals of tagging showing radio-opaque layering done in random orientation but externally to human eye all tags appear symmetric. [43] Diagram 3: Diagram of item tagged on two different sides of the box. 7 [44] Diagram 4: Diagram showing x-ray imaging of items stacked in box after they are tagged with labels having different orientation of radio-opaque layering. (004) and (005) are X- ray images from two different sides of the box. [45] Diagram 5: Diagram showing x-ray imaging after one item is taken out. [46] Diagram 6: Diagram showing x-ray imaging after one item is replaced with a fake item but tagged with similar labels and as result orientation of radio opaque pattern in label tagged on replaced item is changed. [47] Diagram 7: Diagram showing top face of items tagged with labels which are symmetric in imaging with all item intact inside container. [48] Diagram 8: Diagram showing top face of items tagged with labels which are symmetric in imaging, wherein imaging showing inter-pattern distance changed due to one item has been taken out of container. [49] Diagram 9: Diagram showing side face x-ray of 5 items stacked depth-wise and each tagged with labels showing only 4 patterns at a given row and column as one pattern is hidden due to overlap. [50] Diagram 10: Diagram showing side face x-ray of 5 items stacked depth-wise and each tagged with labels showing all 5 patterns at a given row and column as angular x ray exposes hidden pattern. [51] Diagram 11: Diagram showing two labels with invisible ink pattern wherein the one label has reference pattern and another label has actual comparison pattern and both reference line and comparison pattern are printed on label from inks. These are invisible to human eye and can only be digitally scanned by appropriate infrared camera. [52] Diagram 12: Diagram showing another type of two labels wherein Reference circular adhesive label has two circles printed by invisible ink. Another circle is on base tape. Angle with respect to base adhesive tape is calculated using image processing which depends on orientation of circular adhesive tape. These adhesive tapes are self destroyable to prevent re-use. 8 [53] Diagram 13: Diagram showing an embodiment of randomly oriented radio opaque label wherein, radio-opaque material layering which is non-visible is in form of small circle randomly embedded anywhere within the larger circular radio-transparent label and depending on orientation of larger circular label unique imaging signature is auto-acquired. [54] Diagram 14: Diagram showing x-ray imaging of box with bundle of currency bills with 4 bundles length-wise, 5 bundles height-wise and 5 bundles depth-wise and each bundle is tagged with smart labels. [55] Diagram 15: Diagram showing x-ray imaging of box padded with thermocol block to ensure radio-transparent media in path of x-ray beam with two circular labels under plastic strapping such that any pilferage requires tampering with plastic strapping and that will change the orientation of labels. [56] Diagram 16: Diagram showing 360 degree scanning of trapezoidal shaped box, wherein scanning includes all faces and edges of box by using a image acquisition platform with two cameras. [57] Detailed Description of Embodiments [58] The following description describes methods and apparatus for x-ray imaging based technology of item loss/theft/replacement. In the following description, numerous specific details such as implementations, types and interrelationships of system components, are set forth in order to provide a more thorough understanding of the present invention. It will be appreciated, however, by one skilled in the art that the invention may be practiced without such specific details. Various low level details which are not directly related to invention or full instruction sequence have not been shown in detail in order not to obscure the invention. Those of ordinary skill. in the art, with the included descriptions, will be able to implement appropriate functionality without undue experimentation. [59] References in the specification to 'embodiment', indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described 9 in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure or characteristic in connection with other embodiments whether or not explicitly described. [60] In the following description and claims, the term 'radio-opaque layering' inside the tag has been shown as straight line, triangles or circles, but this should not be understood to be a specific shape as it can be manufactured any different random shapes. How the labels are applied item-wise inside the box OR outside of box will depend on exact customized requirements of specific deployment. Similarly this invention proposes use of circular labels for best level of security but it can be of any other shape as well. [61] Embodiments of the invention are described below. [62] Tagging with labels embedded with randomly oriented Radio-opaque layering: Each item needs to be tagged with a special-purpose label. In diagram 1, the label as appears to human eye (001) and with embedded radio-opaque layer (002) is shown. Externally to human eye all tags look symmetrical but internally they have random orientation o radio-opaque layering as in diagram 2. Another format of labels is shown in diagram 13 wherein symmetrically looking circular labels has internal layer of radio opaque material (018). In usual cases each box is tagged with one label. But the box can be tagged with more than one label (003) as in diagram 3. These labels acquire their credential only at time of application and they auto-acquire their new credential on each re-use. In second embodiment which will be external scanning solution without using xray labels will have invisible patterns and can be digitally scanned by special purpose camera and auto-acquires its credential, which is determined by orientation of invisible pattern with respect to pattern on reference label. [63] Reference X-ray imaging: This imaging has to be done at point-of-packaging in high physical security and surveillance area. The images of sealed box are to be taken from two different sides of the box such that overlapped orientation (004) and individual orientation (005) are received as in diagram 4. Once box is sealed, internal imaging (004) and (005) is done and reference imaging will show the overlapped imaging of randomly orientated radio-opaque layering from different tags in stacked item. Reference image indexed with unique-ID of box is sent to central server after digitally signing. 10 [66] Transit and delivery point X-ray imaging: X-ray imaging of box at each transit and delivery point is compared with reference images showing the matrix of labels wherein x-ray imaging of randomly orientated radio-opaque layering will be overlapped. If anybody reshuffles the items, steals the item or replaces with fake item the imaging comparison module will catch it during comparison with reference images of that particular box. [65] Item loss/theft detection: If any of the item is lost or have been stolen the overlapped imaging from stacked item from that particular row or column will be significantly different (006) and (007) and image comparison module will catch and raise the alert. [66] Item replacement detection: If any of the item is replaced with fake item of similar shape size and weight, still the overlapped imaging (008) and (009) will be different for stacked item in that particular row or column. Image comparison module will catch and raise the alert. [67] Item reshuffle detection: If position of two similar items is inter-changed then also the overlapped imaging will be different for stacked item in that particular row or column. Image comparison module will catch and raise the alert. [68] False alarm mitigation: Even due to unintentional human mistake-one of item is not tagged the reference image will capture this and thus this is not raised as false alarm. [69] Corner possibility of same orientation of labels on stacked item: By any chance if two items have got exactly same orientation then the loss or theft might not get detected. Replacement will still get detected as replaced item will not have same orientation again for all practical purpose. However even to mitigate this corner possibility two tags can be used such that this scenario is effectively ruled out by combining mathematical probability of exact overlapping. [70] Image indexing at central server: During reference imaging each box is assigned a randomly generated unique-ID which is pasted on box preferably on same side on which the reference imaging has been taken. Unique reference imaging of each box is digitally signed and during comparison reference image is fetched indexed with unique-Id of box. All subsequent imaging needs to be taken from same side on which 11 the reference imaging was taken. For added protection of network channel fetching reference imaging can be crypto-protected using known protocols like IPSEC/SSL. [71] Image normalization: Perfect comparison requires cleaning-up the x-ray imaging. Wooden or corrugated box might have metallic parts like nails. So each time the x-ray imaging is laken it has to be subtracted with x-ray imaging of standard empty boxes. [72] Item horizontal movement detection: Once image capture module concludes the difference between normalized reference image and normalized current-hop captured image, it further examines whether difference is on account of slight horizontal movement of items during transit. Full imaging of box is cropped in multiple portions length-wise and height-wise wherein, each cropped portion represents items stacked depth-wise. Horizontal movement detection is done by subtracting of cropped portion from respective cropped portion from reference image and second subtraction of cropped portion from reference image from respective cropped portion from recently captured image. After these two subtractions each pixel can be verified for a horizontal shift. If it is not a genuine horizontal movement then number of pixels with horizontal shift will be minimal. [73] Size based analysis for item count: This mode is used to count the number of items. In this case all labels will have symmetrical and identical layering of radio-opaque material and not randomly oriented layering. Example sake if tags are circular then radio-opaque layering will also be same sized circle. These tags are applied on top face of each item at a place which is radio-transparent in direction of x-ray beam. In x-ray imaging wherein x-ray beam is downward to upward the size of label closest to flat panel detector will be larger. In case of any item is taken out depending on largest size of circle in x-ray imaging pattern it can be calculated number of item taken out of box. If no items are taken out then all circle (010) in x-ray imaging are of same size as shown in diagram 7. Amount of size variation (011) as in diagram 8, will depend on how many items are taken out. This method will work best on flat panel detector x-ray machines and if all items within box are of standard size and shape and some benchmarking is known beforehand. 12 [74] Alternative absolute count method without dual beam x-ray imaging to resolve count-deficiency due to overlapped patterns: Size based analysis described earlier, requires additional top x-ray imaging and also use of additional labels which are symmetrical in imaging irrespective of their orientation. An alternative method is proposed which does not requires additional top x-ray imaging and also utilizes same labels for both image comparison and absolute count of items as well. These labels have mini-circle or mini-square (only for illustration) kind of pattern of radio-opaque material. Imaging software simply counts the number of mini-patterns for every row and every column in side face x-ray imaging. Count of mini-patterns at a given row and given column gives the number of items stacked depth-wise. However there can be count conflict if one or more pattern exactly or partially overlaps one behind another. This count conflict can be resolved by angular x-ray which is achieved by simply rotating the box at a prescribed angle on conveyor belt of x-ray machinery. In angular x-ray hidden pattern gets exposed. For illustration, as shown in diagram 9, assuming there are five items stacked depth-wise, (012) shows only 4 mini-circles 'A', 'B', 'C' and 'D' as one pattern is hidden due to overlap. After box is rotated fifth pattern 'E' gets exposed (013) in angular x-ray, as shown in diagram 10. It is shown that an area of 1 inch x 1 inch is cropped from full box imaging, which represents imaging of five items stack depth-wise at given row and column. In angular x-ray an elongated area 1 inch x 1.5 inch is cropped, wherein hidden pattern 'E' is exposed and this information is digitally recorded during reference imaging itself and can be verified at point-of-delivery. [75] Count of partially overlapped circular pattern in x-ray imaging: This method is only applicable to partially overlapped and if patterns are circular. This method exploits the fact that as circle is traversed along its circumference, then aggregated value of absolute difference (whether positive or negative) of both x-coordinate and y coordinate between two equidistant points on circumference remains same. If two or more circles are partially overlapping then the periphery will not be geometrically circular and in that case aggregated value of absolute difference of x-coordinate and y coordinate will not remain same for same distance parsed along the edge of overlapped pattern. Every time the aggregated value of absolute differences in x-coordinate and y coordinate changes, the count of overlapped pattern is increased, and this traversal continues till original start point on periphery of pattern is reached. 13 [76] Covert feature of anti-counterfeiting associated with overt feature: Often there is need of covert feature of anti-counterfeiting. In this embodiment of the invention, the authentication of the box is described wherein the box opening edge is sealed with labels with invisible patterns (014A) and (014B) printed on it is applied onto the box. Noteworthy to mention that in this embodiment labels used are not having internal layering of radio-opaque material but have invisible patterns. Patterns are externally and digitally scanned by special-purpose scanning device which can scan in non-visible range for human eye. Patterns can be any shape/size or as simple as one line randomly oriented as seen in scanned imaging of label post-application on packaging and in that case, spatial orientation of imprinted patterns with respect to fixed reference point (014C) on packaging can be imaging credential. Imaging credential can be associated with a random number printed on packaging and thus becomes a unique signature per piece which is not re-clonable and non-replaceable even by an insider. On production line special-purpose image acquisition system scans each packaging externally and associates their imaging credential with unique alpha-numeric credential and this association is recorded in a database. Random pattern can be any shape and size. Reference imaging is captured by special scanners and the spatial orientation derieved from image is associated with unique ID per-piece. At time of verification in field, again spatial orientation as derived from imaging is compared programmatically with reference spatial orientation associated with unique-ID. [77] Two label approach for external scanning in direction-agnostic manner: This embodiment is possibly useful for high volume logistics industry, wherein item level tagging with smart labels with internal random radio-opaque layering is not possible and thus only box level authentication is desired and box sizes are different or custom made. If boxes are of trapezoidal shape then all faces and edges can be scanned with top and bottom scanning. Two labels are used in this embodiment as illustrated in diagram 11. One is base or reference label which gives reference pattern (014). Another comparison label (015) has comparison pattern (016). Imaging of reference pattern is used to determine orientation of comparison pattern image. So irrespective of box scanning direction, image analysis is done based on spatial orientation of comparison image with respect to reference image. Both patterns will be invisible to naked eye (preferably printed from an ink those are non-visible to human eye) but can be digitally scanned by appropriate camera. Preferably these labels should be self destroyable for better security. Comparison label should look symmetrical to human eye in shape, size 14 and application and only differs in terms of pattern's orientation, pattern's shape and pattern's size, which is printed from non-invisible ink to human eye. These labels are to be applied in a manner such that opening point will be sealed. These labels can also be two concentric labels and smaller diameter base label can be applied on top of larger diameter reference label. These labels can bear unique-ID printed by non-visible ink as well to index the images in database and unique-ID can be in form of any tracking technologies like barcode, QR code, RFID tags or magnetic stripes to unify security with tracking and replication of integrated tracking credentials is detected based on spatial orientation of label. Another embodiment can have two invisible circles on reference label (017) and angle and distances with respect to circle on base label is calculated as shown in diagram 12. If using invisible inks to make patterns is not feasible one can use combination of red and blue screens as adhesive tapes over label, wherein pattern is printed in black colour. Example-sake if, pattern is printed in black on reference label of red background then using a semi-transparent deep blue coloured tape will make pattern invisible but still digitally scan-able by InfraRed camera. Similarly, skilled artisans shall appreciate that many other color combinations can be employed to make the imprinted pattern invisible. [78] Internal monitoring at box label: Sometimes in content-verification which is an internal scan embodiment, item label tagging may not be logistically feasible and still internal monitoring is needed. Challenges are that box can contain any item that may be metallic or non-metallic. Box is padded and strapped along thermocol block or any other radio-transparent material. Thermocol block padding is suitable wherein the x-ray imaging of metallic content inside the box overlaps with imaging of smart-labels, the internal metallic content might need to be rearranged a bit. Before plastic or elastic strapping two labels are placed on thermocol block and after tight strapping these labels auto-acquires their imaging credential. For illustration, as shown in diagram 15, credential can be relative orientation (019) and (020) but not limited to this. This box is placed inside larger container and x-ray imaging is used to validate credentials. Any intrusion that will un-detectable requires strapping to be cut and thus labels will change their orientation and imaging credential will change automatically. In case of external scan embodiment of tamper detection, label is applied such that adhesive surface covers both elastic strapping and box surface. Spatial orientation of label is computed is combined along with markings on elastic belt to form 360 degree tamper detection credential. Any tampering from other sides/edges of the box will not be possible without 15 disturbing at least the elastic strapping and will be detected based on change in 360 degree tamper detection credential. [79] Leveraging spatial orientation: At 0.05 degree angular precision, one circular label can have 7200 unique combinations. For higher number of unique combinations, if three adjacent labels are used then total number of unique combinations will be above 300 billions (7200 x 7200 x 7200). In case invisible patterns are not to be used, labels can have multiple visible patterns of same shape but different color or dimensions varying within a narrow range in inter-mixed fashion, such that only scanner can differentiate and select specific pattern(s) to compute spatial orientation and thus making replication very difficult even with visible patterns. [80] Throughout the specification, unless the context requires otherwise, the word "comprise" or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers. [81] Furthermore, throughout the specification, unless the context requires otherwise, the word "include" or variations such as "includes" or "including", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers. [82] Modifications and variations such as would be apparent to a skilled addressee are deemed to be within the scope of the present invention. 16

Claims (20)

1. A security label arranged to be applied to a surface, said label comprising: at least one distinctively scannable region; and at least one pattern within said distinctively scannable region, said pattern configured to be considered for computation of spatial orientation of the pattern with respect to at least one point taken as a fixed reference on a surface to which the label is adapted to be applied, wherein said label is configured to auto-acquire a unique credential in terms of the spatial orientation of the pattern with respect to the reference point on the surface during application.
2. The label as claimed in claim 1, wherein the pattern is imprinted for computation of spatial orientation.
3. The label as claimed in claim 1 or 2, wherein said label is of a shape such that it appears symmetrical being invariant to orientation on the surface where it is applied and thereby hiding the auto-acquired unique credential in terms of the spatial orientation during first application.
4. The label as claimed in any one of claims 1 to 3, wherein said label is circular.
5. The label according to claim 1 to 4, comprising: a first layer having a first color; a second layer having a second color; and a layer disposed between the first layer and the second layer, wherein the at least one pattern is disposed between the first layer and the second layer, the pattern having a third color wherein due to a color combination of the first, second, and third colors, the pattern is invisible to unaided human eye agnostic of viewing angle.
6. The label as claimed in any preceding claim, wherein the label is integrated with tracking technologies credentials that unify security and tracking, to secure tracking credentials against replication, and wherein an originality of the tracking credentials is decided based on an original spatial orientation of the label as registered at a point-of-packaging.
7. The label as claimed in claim 6, wherein the tracking credentials are provided by a radio frequency tag, barcode, Quick Response code or magnetic stripe.
8. The label according to any preceding claim comprising: 17 a top layer; a bottom layer disposed under the top layer; and at least one internal layer of radio opaque material that spans a fraction of an area covered by the label, the at least one internal layer comprising randomly orientated radio opaque layering comprising the pattern.
9. The label according to any preceding claim, wherein the label is applied on the surface, of packaging, with a spatial orientation in terms of angle and distances of the pattern on the label with respect to at least one fixed external reference point on the packaging.
10. The label as claimed in claim 9, wherein while packaging, the spatial orientation of the label is extracted by computing angles and distances of patterns in imaging of said internal layer of radio-opaque material in the label with respect to the external reference point on the packaging, wherein a reference imaging credential is indexed with a unique identification code for each packaging box in a database, wherein while authenticating, the spatial orientation of the label is compared with an indexed spatial orientation stored in the database so as to detect a variation in the spatial orientation of the pattern which may be indicative of tampering.
11. The label as claimed in claim 10, wherein a content count inside a sealed packaging is determined by counting each of uniquely spatially oriented patterns of internal layers by use of X-ray imaging.
12. A method to detect tampering on a package, said method comprising: identifying a pattern on a label applied to a package; selecting a spatial reference point on the package; at a first tamper detection, measuring a first spatial orientation of the pattern, the first spatial orientation being an orientation of the pattern with respect to the spatial reference point on the package; at a subsequent tamper detection, determining a second spatial orientation, the second spatial orientation being the orientation of the pattern with respect to a same spatial reference point; and comparing the first spatial orientation with the second spatial orientation to determine a difference there between; and generating an alert in dependence on determining the difference. 18
13. The method as claimed in claim 12, wherein the label includes a first label, wherein the spatial reference point includes at least one of a second label or a pattern adjacent to said first label.
14. The method as claimed in claim 12 or 13, further comprising coupling the package with a unique identification data and associating the first spatial orientation and the second spatial orientation with the unique identification data.
15. A method according to claim 12 the package being sealed and comprising a plurality of objects, the method comprising: providing at least one object label on each of said objects; acquiring at least one reference image of the package comprising the objects, the reference image being obtained with reference to the at least one object label; acquiring at least one test image of the consignment with said objects, the test image being obtained with reference to the at least one object label; and comparing the reference image with the test image to generate an alert if a spatial orientation parameter for any object in the image is changed with respect to a corresponding spatial orientation in the reference image.
16. The method as claimed in claim 15, further comprising: obtaining at least one imaging parameter associated with each of the reference image and the test image, the imaging parameter configured to be associated with an acquisition environment of the image; associating the composite imaging with per-object spatial orientation associated with the label applied to the package and the imaging parameter to generate image data; and transmitting the image data to a monitoring unit.
17. The method as claimed in claim 15 or 16, wherein said label includes at least a radio opaque material embedded therein.
18. A system to detect tampering on a package having a label attached, the label comprising: at least one distinctively scannable region; and at least one pattern within said distinctively scannable region; a spatial reference on the package; the system comprising: means for selecting a reference on the package, means for computing a spatial orientation of the pattern on the label with respect to the reference; 19 means for applying data to the label that identifies the spatial orientation of the pattern to the reference.
19. A security label according to any of claims 1 to 11 wherein the pattern is not visible to an unaided human eye.
20. A method according to any of claims 12 to 17 wherein the pattern is not visible to an unaided human eye. 20
AU2011225766A 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels Active AU2011225766B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IN625/CHE/2010 2010-03-10
IN625CH2010 2010-03-10
PCT/IB2011/050859 WO2011110973A2 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels

Publications (2)

Publication Number Publication Date
AU2011225766A1 AU2011225766A1 (en) 2012-11-08
AU2011225766B2 true AU2011225766B2 (en) 2014-11-13

Family

ID=44563933

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2011225766A Active AU2011225766B2 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels

Country Status (6)

Country Link
EP (1) EP2545496A4 (en)
JP (1) JP5826774B2 (en)
KR (1) KR101759664B1 (en)
CN (2) CN102959563B (en)
AU (1) AU2011225766B2 (en)
WO (1) WO2011110973A2 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8740076B2 (en) 2012-07-11 2014-06-03 Linksmart Technologies Pvt. Ltd. Label for enabling verification of an object
WO2012145842A1 (en) 2011-04-29 2012-11-01 Monnaie Royale Canadienne/Royal Canadian Mint Method and apparatus for authentication of a coin or other manufactured item
EP2618323B1 (en) * 2012-08-21 2018-06-13 LinkSmart Technologies Pvt. Ltd. Label for enabling verification of an object
JPWO2014069491A1 (en) * 2012-10-30 2016-09-08 株式会社アイビット Radiation contrast material counting device and counting method
ES2926527T3 (en) 2013-01-24 2022-10-26 Monnaie Royale Canadienne/Royal Canadian Mint Unique currency identification
CN103366336A (en) * 2013-07-12 2013-10-23 陕西理工学院 Image watermarking method based on human eye contrast ratio sensitivity visual characteristics
KR102214379B1 (en) * 2013-09-10 2021-02-10 시크파 홀딩 에스에이 Master case tracking mesh for data transmission in highly shielded environment
CN106575368B (en) * 2014-06-09 2019-08-23 阿施施·阿南德 The automatic verifying of optics randomness in safety label
US20160238374A1 (en) * 2015-02-18 2016-08-18 Fedex Corporate Services, Inc. Systems, apparatus, and methods for quantifying space within a container using a removable scanning sensor node
WO2017096234A1 (en) * 2015-12-02 2017-06-08 Power Fingerprinting Inc. Methods and apparatuses for identifying anomaly within sealed packages using power signature analysis counterfeits
DE102016010850A1 (en) * 2016-09-07 2018-03-08 Giesecke+Devrient Currency Technology Gmbh Method, device and system for processing a transport container for valuables
KR20180061687A (en) * 2016-11-30 2018-06-08 동명대학교산학협력단 Packaging management system of product
EP3460722A1 (en) * 2017-09-22 2019-03-27 Authentic Vision GmbH Tamper-activated authenticable security device
SG11202011001VA (en) * 2018-06-06 2020-12-30 Invaluable Invent Improved self-destructive documents for information security and privacy protection
CN109444219B (en) * 2018-12-25 2021-02-12 北京食安链科技有限公司 Rapid detection probe and detection method for nutritional quality of meat products
JP7253305B2 (en) * 2018-12-28 2023-04-06 大阪シーリング印刷株式会社 Adhesive tape, packaging and packaging method
JP6622937B1 (en) * 2019-03-05 2019-12-18 株式会社日立パワーソリューションズ Distribution management method
JP6944985B2 (en) * 2019-03-05 2021-10-06 株式会社日立パワーソリューションズ Distribution management method
CN112926617A (en) * 2019-12-06 2021-06-08 顺丰科技有限公司 Packaging change detection method and device, cloud computer equipment and storage medium
JP7400997B2 (en) 2021-01-19 2023-12-19 三菱電機株式会社 elevator control device
CN116433097B (en) * 2023-04-19 2023-11-21 北京市永康药业有限公司 Injection packaging quality detection method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5346259A (en) * 1992-07-16 1994-09-13 Avery Dennison Corporation Anti-theft label construction
US20060115110A1 (en) * 2004-11-09 2006-06-01 Rodriguez Tony F Authenticating identification and security documents
US20100012713A1 (en) * 2008-07-15 2010-01-21 Morton Greene Baggage handling system and method

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5642442A (en) * 1995-04-10 1997-06-24 United Parcel Services Of America, Inc. Method for locating the position and orientation of a fiduciary mark
GB0129369D0 (en) * 2001-12-07 2002-01-30 Filtrona United Kingdom Ltd Method and apparatus for marking articles
EP1420381A1 (en) * 2002-11-12 2004-05-19 Hauni Maschinenbau AG Method and device for identification and checking of authentificity of products
GB0321090D0 (en) * 2003-09-10 2003-10-08 Abs Systems Inc Baggage screening system
JP4734893B2 (en) * 2004-11-04 2011-07-27 凸版印刷株式会社 Anti-counterfeit medium, anti-counterfeit seal and reading method thereof
EP1801593A1 (en) * 2005-12-22 2007-06-27 Koninklijke Philips Electronics N.V. A method of imaging biological specimens using inorganic nanoparticles as label agents
CN101583865A (en) * 2006-12-14 2009-11-18 安东尼奥斯·艾卡特林尼迪斯 Method and apparatus for inspection of containers
US8090952B2 (en) * 2007-07-06 2012-01-03 Harris Scott C Counterfeit prevention system based on random positioning on a pattern
CN201138489Y (en) * 2007-11-09 2008-10-22 北京博世金电科技开发有限公司 Bill security authenticating terminal with digital signature, electronic label and colored image
CN101999127B (en) 2008-02-19 2014-10-15 比尔凯科技新加坡有限公司 A reading device for identifying a tag or an object adapted to be identified, related methods and systems
CN101286203A (en) * 2008-03-24 2008-10-15 陆航程 Chip-free quasi RFID multiple verification low cost encrypted EPC composite label and system
DE102008032781A1 (en) * 2008-07-11 2010-01-21 Klöckner Pentaplast GmbH & Co. KG Packaging film for product authentication, authentication method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5346259A (en) * 1992-07-16 1994-09-13 Avery Dennison Corporation Anti-theft label construction
US20060115110A1 (en) * 2004-11-09 2006-06-01 Rodriguez Tony F Authenticating identification and security documents
US20100012713A1 (en) * 2008-07-15 2010-01-21 Morton Greene Baggage handling system and method

Also Published As

Publication number Publication date
AU2011225766A1 (en) 2012-11-08
KR20130060169A (en) 2013-06-07
CN102959563B (en) 2016-11-16
CN102959563A (en) 2013-03-06
JP5826774B2 (en) 2015-12-02
KR101759664B1 (en) 2017-07-19
EP2545496A2 (en) 2013-01-16
CN107025424A (en) 2017-08-08
JP2013527486A (en) 2013-06-27
WO2011110973A3 (en) 2012-07-05
WO2011110973A2 (en) 2011-09-15
EP2545496A4 (en) 2017-08-23

Similar Documents

Publication Publication Date Title
AU2011225766B2 (en) A method of content authentication inside a sealed box using special labels
US9361532B2 (en) Label for enabling verification of an object
US10872265B2 (en) Database for detecting counterfeit items using digital fingerprint records
US8985471B2 (en) Optically readable identification security tag or stamp
US11042738B2 (en) Simple authentication of elements in blister packages
CN104428798B (en) Method for clear and definite tagged object
US6659353B1 (en) Method of checking authenticity of sheet with built-in electronic circuit chip
US8488842B2 (en) Systems and methods for tracking and authenticating goods
US7878398B2 (en) Counterfeit and tamper resistant labels with randomly occurring features
US11544996B2 (en) Gaming chip with a stripe pattern and management system for identification of the gaming chip based on imaging
US8052058B2 (en) Scanner for product authentication
US9153005B2 (en) Method and system for authenticating a secure document
US7840028B2 (en) Authentication system and method
EP2237247A1 (en) Genuine&counterfeit certification member
CN108602374B (en) Authentication of an object provided with a security element
CN108352066B (en) Seal tampering detection method
US10192299B2 (en) Method of and system for verifying authenticity of packaged items
JP2017208032A (en) Authenticity determination method
EP2618323B1 (en) Label for enabling verification of an object

Legal Events

Date Code Title Description
PC1 Assignment before grant (sect. 113)

Owner name: LINKSMART TECHNOLOGIES PVT. LTD.

Free format text: FORMER APPLICANT(S): ANAND, ASHISH

FGA Letters patent sealed or granted (standard patent)