EP2545496A2 - A method of content authentication inside a sealed box using special labels - Google Patents

A method of content authentication inside a sealed box using special labels

Info

Publication number
EP2545496A2
EP2545496A2 EP11752928.9A EP11752928A EP2545496A2 EP 2545496 A2 EP2545496 A2 EP 2545496A2 EP 11752928 A EP11752928 A EP 11752928A EP 2545496 A2 EP2545496 A2 EP 2545496A2
Authority
EP
European Patent Office
Prior art keywords
labels
imaging
box
authentication
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP11752928.9A
Other languages
German (de)
French (fr)
Other versions
EP2545496A4 (en
Inventor
Ashish Anand
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LINKSMART TECHNOLOGIES PVT Ltd
Original Assignee
Anand Ashish
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anand Ashish filed Critical Anand Ashish
Publication of EP2545496A2 publication Critical patent/EP2545496A2/en
Publication of EP2545496A4 publication Critical patent/EP2545496A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • G06F18/2155Generating training patterns; Bootstrap methods, e.g. bagging or boosting characterised by the incorporation of unlabelled data, e.g. multiple instance learning [MIL], semi-supervised techniques using expectation-maximisation [EM] or naïve labelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Analysing Materials By The Use Of Radiation (AREA)
  • Burglar Alarm Systems (AREA)
  • Details Of Rigid Or Semi-Rigid Containers (AREA)
  • Lock And Its Accessories (AREA)

Abstract

This invention proposes a content verification and authentication method inside a sealed box, which transits between point-of-packaging and point-of delivery through a logistics supply-chain on per-hop basis. This method is about tagging each item with a label containing internal layering of radio-opaque material randomly oriented. Externally all labels/tags look symmetrical and hence even if an insider replaces the original item and tags with genuine labels on fake item, still this gets detected as original reference imaging signature will have different orientation. Every-time these labels are reused they auto-acquire their imaging credential. This method also mitigates false alarm after ensuring that imaging has changed only due to horizontal movement of items inside the box and not because of orientation. Method has inherent capability to resolve count-deficiency due to pattern overlap. For accelerated direction- agnostic scanning in high volume logistics industry for box level authentication, two labels with covert pattern is highly useful. Labels with covert pattern is again based on orientation, which is not known by insiders and credential is acquired only at time of application of labels. This method can also be used as covert anti-counterfeiting mechanism by associating imaging of random covert patterns with overt feature of unique-alpha-numeric per-piece id.

Description

    A METHOD OF CONTENT AUTHENTICATION INSIDE A SEALED BOX USING SPECIAL LABELS
  • Claim of Priority:
  • This application claims the priority benefit of Indian Provisional Patent Application No. 625/CHE/2010 , filed with the Government of India, Patent Office Chennai on March 10, 2010, and entitled ' X-ray image based item counter '.
  • DESCRIPTION: The following specification describes the nature of this invention:-
  • Technical field of invention
  • This invention belongs to the field of content verification in terms of count and originality inside a sealed container as it transits between point-of-packaging and point-of-delivery. Today customer can track & trace their consignment but this invention enables them to monitor and verify the content at each point during transit. Direct benefit is that if item gets stolen and replaced with fake item of same shape, size and weight tagged with genuine labels, then point-of-intrusion is identified and logistics companies can investigate the matter with precise information. Thus it installs accountability at each point of transit.
  • Background & prior art
  • There are known methods to prevent item theft like RF-ID tag. While RF-ID tagging is an excellent solution for inventory management and tracking it is not a dependable technology to prevent item theft/replacement and concealed loss in supply-chain. Major limitation comes from the fact that RF-ID reader counts the RF-ID labels and not the actual item. It implies that somebody can take item out and put RF-ID labels back in box and still count will be shown correct. If the genuine RF-ID label is applied on fake item replacing original item, then there is no differentiation and checks and balances. Further if RF-ID tags doe not auto-acquire their credential every time they are re-used.
  • Core purpose of this invention is to detect those kind of intrusions which results in concealed loss and remain un-detectable and un-traceable and only gets exposed at point-of-delivery after box is opened. This method is just not about item count but also detects if items are reshuffled or replaced with fake item of same shape, size and weight. Disclosed is an improved and stronger method of item theft/replacement detection technology that is even insider threat protected.
  • Summary of invention:-
  • The following description describes methods and design of invention.
  • This invention proposes special-purpose labels with internal layering of radio-opaque material aligned randomly and embedded inside. For human eye all labels look symmetrical in shape size and application. These labels are to be tagged item-wise or box-wise at a designated place. While externally all tags look similar on human visual inspection but internally they have radio-opaque layering done in random orientation. After tagging items are stacked in box in multiple layers arranged in row and column. X-ray imaging of box should show the row-wise and column-wise matrix of tagging. If any item is stolen then overlapped imaging will be different. Assuming replacement with fake item even tagged with label at designated place still orientation will be different and imaging comparison module will catch this.
  • In another embodiment these labels can have randomly printed patterns with invisible ink and can be scanned by special purpose camera. If invisible ink is difficult to use then these labels with black pattern can be hidden from human vision by placing them under a red and blue colour screen. This embodiment is only establishes that box has not been opened in transit channel and repackaged with genuinely looking tapes.
  • Niche attributes are listed below,
    • Content verification at each point of transit
    • 360 degree accountability and audit-ability for insiders as well
    • Detection of unauthorized opening of box and reshuffling of items
    • Detection of replacement of original item with fake items
    • Enables content monitoring in usual track-trace for consumer satisfaction while sending valuable or sensitive consignments
    • Evidences are tangible and hence legally admissible
  • Brief description of the drawings
  • The invention described herein is illustrated by way of example and not by way of limitation in the accompanying figures. For simplicity and clarity of illustration, elements illustrated in the figures are not necessarily drawn to scale. For example, the dimensions of some elements may be exaggerated relative to other elements for clarity.
  • Diagram 1: Diagram of tagging with internal layering of radio-opaque material.
  • Diagram 2: D iagram of internals of tagging showing radio-opaque layering done in random orientation but externally to human eye all tags appear symmetric.
  • Diagram 3: Diagram of item tagged on two different sides of the box.
  • Diagram 4: Diagram showing x-ray imaging of items stacked in box after they are tagged with labels having different orientation of radio-opaque layering request. (004) and (005) are X- ray images from two different sides of the box.
  • Diagram 5: D iagram showing x-ray imaging after one item is taken out.
  • Diagram 6: D iagram showing x-ray imaging after one item is replaced with fake item but tagged with similar labels.
  • Diagram 7: Diagram showing top face of items tagged with labels which are symmetric in imaging with all item intact inside container.
  • Diagram 8: Diagram showing top face of items tagged with labels which are symmetric in imaging, wherein imaging showing inter-pattern distance changed due to one item has been taken out of container.
  • Diagram 9: Diagram showing side face x-ray of 5 items stacked depth-wise and each tagged with labels showing only 4 patterns at a given row and column as one pattern is hidden due to overlap.
  • Diagram 10: Diagram showing side face x-ray of 5 items stacked depth-wise and each tagged with labels showing all 5 patterns at a given row and column as angular x-ray exposes hidden pattern.
  • Diagram 11: Diagram showing two labels with invisible ink pattern wherein the one label has reference pattern and another label has actual comparison pattern and both reference line and comparison pattern are printed on label from inks. These are invisible to human eye and can only be digitally scanned by appropriate infrared camera.
  • Diagram 12: Diagram showing another type of two labels wherein Reference circular adhesive label has two circles printed by invisible ink. Another circle is on base tape. Angle with respect to base adhesive tape is calculated using image processing which depends on orientation of circular adhesive tape. These adhesive tapes are self-destroyable to prevent re-use.
  • Diagram 13: Diagram showing an embodiment of randomly oriented radio-opaque label wherein, radio-opaque material layering which is non-visible is in form of small circle randomly embedded anywhere within the larger circular radio-transparent label and depending on orientation of larger circular label unique imaging signature is auto-acquired.
  • Diagram 14: Diagram showing x-ray imaging of box with bundle of currency bills with 4 bundles length-wise, 5 bundles height-wise and 5 bundles depth-wise and each bundle is tagged with smart labels.
  • Diagram 15: Diagram showing x-ray imaging of box padded with thermocol block to ensure radio-transparent media in path of x-ray beam with two circular labels under plastic strapping such that any pilferage requires tampering with plastic strapping and that will change the orientation of labels.
  • Diagram 16: Diagram showing 360 degree scanning of trapezoidal shaped box, wherein scanning includes all faces and edges of box by using a image acquisition platform with two cameras.
  • Detailed specification of the invention
  • The following description describes methods and apparatus for x-ray imaging based technology of item loss/theft/replacement. In the following description, numerous specific details such as implementations, types and interrelationships of system components, are set forth in order to provide a more thorough understanding of the present invention. It will be appreciated, however, by one skilled in the art that the invention may be practiced without such specific details. Various low level details which are not directly related to invention or full instruction sequence have not been shown in detail in order not to obscure the invention. Those of ordinary skill in the art, with the included descriptions, will be able to implement appropriate functionality without undue experimentation.
  • References in the specification to 'embodiment', indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to affect such feature, structure or characteristic in connection with other embodiments whether or not explicitly described.
  • In the following description and claims, the term 'radio-opaque layering' inside the tag has been shown as straight line, triangles or circles, but this should not be understood to be a specific shape as it can be manufactured any different random shapes. How the labels are applied item-wise inside the box OR outside of box will depend on exact customized requirements of specific deployment. Similarly this invention proposes use of circular labels for best level of security but it can be of any other shape as well.
  • Embodiments of the invention is described below,
  • Tagging with labels embedded with randomly oriented Radio-opaque layering: Each item needs to be tagged with a special-purpose label. In diagram 1, the label as appears to human eye (001) and with embedded radio-opaque layer (002) is shown. Externally to human eye all tags look symmetrical but internally they have random orientation of radio-opaque layering as in diagram 2. Another format of labels is shown in diagram 13 wherein symmetrically looking circular labels has internal layer of radio opaque material (018). In usual cases each box is tagged with one label. But the box can be tagged with more than one label (003) as in diagram 3. These labels acquire their credential only at time of application and they auto-acquire their new credential on each re-use. In second embodiment which will be external scanning solution without using xray labels will have invisible patterns and can be digitally scanned by special purpose camera and auto-acquires its credential, which is determined by orientation of invisible pattern with respect to pattern on reference label.
  • Reference X-ray imaging: This imaging has to be done at point-of-packaging in high physical security and surveillance area. The images of sealed box are to be taken from two different sides of the box such that overlapped orientation (004) and individual orientation (005) are received as in diagram 4. Once box is sealed, internal imaging (004) and (005) is done and reference imaging will show the overlapped imaging of randomly orientated radio-opaque layering from different tags in stacked item. Reference image indexed with unique-ID of box is sent to central server after digitally signing.
  • Transit and delivery point X-ray imaging: X-ray imaging of box at each transit and delivery point is compared with reference images showing the matrix of labels wherein x-ray imaging of randomly orientated radio-opaque layering will be overlapped. If anybody reshuffles the items, steals the item or replaces with fake item the imaging comparison module will catch it during comparison with reference images of that particular box.
  • Item loss/theft detection: If any of the item is lost or have been stolen the overlapped imaging from stacked item from that particular row or column will be significantly different (006) and (007) and image comparison module will catch and raise the alert.
  • Item replacement detection: If any of the item is replaced with fake item of similar shape size and weight, still the overlapped imaging (008) and (009) will be different for stacked item in that particular row or column. Image comparison module will catch and raise the alert.
  • Item reshuffle detection: If position of two similar items is inter-changed then also the overlapped imaging will be different for stacked item in that particular row or column. Image comparison module will catch and raise the alert.
  • False alarm mitigation: Even due to unintentional human mistake one of item is not tagged the reference image will capture this and thus this is not raised as false alarm.
  • Corner possibility of same orientation of labels on stacked item: By any chance if two items have got exactly same orientation then the loss or theft might not get detected. Replacement will still get detected as replaced item will not have same orientation again for all practical purpose. However even to mitigate this corner possibility two tags can be used such that this scenario is effectively ruled out by combining mathematical probability of exact overlapping.
  • Image indexing at central server: During reference imaging each box is assigned a randomly generated unique-ID which is pasted on box preferably on same side on which the reference imaging has been taken. Unique reference imaging of each box is digitally signed and during comparison reference image is fetched indexed with unique-Id of box. All subsequent imaging needs to be taken from same side on which the reference imaging was taken. For added protection of network channel fetching reference imaging can be crypto-protected using known protocols like IPSEC/SSL.
  • Image normalization: Perfect comparison requires cleaning-up the x-ray imaging. Wooden or corrugated box might have metallic parts like nails. So each time the x-ray imaging is taken it has to be subtracted with x-ray imaging of standard empty boxes.
  • Item horizontal movement detection: Once image capture module concludes the difference between normalized reference image and normalized current-hop captured image, it further examines whether difference is on account of slight horizontal movement of items during transit. Full imaging of box is cropped in multiple portions length-wise and height-wise wherein, each cropped portion represents items stacked depth-wise. Horizontal movement detection is done by subtracting of cropped portion from respective cropped portion from reference image and second subtraction of cropped portion from reference image from respective cropped portion from recently captured image. After these two subtractions each pixel can be verified for a horizontal shift. If it is not a genuine horizontal movement then number of pixels with horizontal shift will be minimal.
  • Size based analysis for item count: This mode is used to count the number of items. In this case all labels will have symmetrical and identical layering of radio-opaque material and not randomly oriented layering. Example sake if tags are circular then radio-opaque layering will also be same sized circle. These tags are applied on top face of each item at a place which is radio-transparent in direction of x-ray beam. In x-ray imaging wherein x-ray beam is downward to upward the size of label closest to flat panel detector will be larger. In case of any item is taken out depending on largest size of circle in x-ray imaging pattern it can be calculated number of item taken out of box. If no items are taken out then all circle (010) in x-ray imaging are of same size as shown in diagram 7. Amount of size variation (011) as in diagram 8, will depend on how many items are taken out. This method will work best on flat panel detector x-ray machines and if all items within box are of standard size and shape and some benchmarking is known beforehand.
  • Alternative absolute count method without dual beam x-ray imaging to resolve count-deficiency due to overlapped patterns: S ize based analysis described earlier, requires additional top x-ray imaging and also use of additional labels which are symmetrical in imaging irrespective of their orientation. An alternative method is proposed which does not requires additional top x-ray imaging and also utilizes same labels for both image comparison and absolute count of items as well. These labels have mini-circle or mini-square (only for illustration) kind of pattern of radio-opaque material. Imaging software simply counts the number of mini-patterns for every row and every column in side face x-ray imaging. Count of mini-patterns at a given row and given column gives the number of items stacked depth-wise. However there can be count conflict if one or more pattern exactly or partially overlaps one behind another. This count conflict can be resolved by angular x-ray which is achieved by simply rotating the box at a prescribed angle on conveyor belt of x-ray machinery. In angular x-ray hidden pattern gets exposed. For illustration, as shown in diagram 9, assuming there are five items stacked depth-wise, (012) shows only 4 mini-circles 'A', 'B', 'C' and 'D' as one pattern is hidden due to overlap. After box is rotated fifth pattern 'E' gets exposed (013) in angular x-ray, as shown in diagram 10. It is shown that an area of 1 inch x 1 inch is cropped from full box imaging, which represents imaging of five items stack depth-wise at given row and column. In angular x-ray an elongated area 1 inch x 1.5 inch is cropped, wherein hidden pattern 'E' is exposed and this information is digitally recorded during reference imaging itself and can be verified at point-of-delivery.
  • Count of partially overlapped circular pattern in x-ray imaging: This method is only applicable to partially overlapped and if patterns are circular. This method exploits the fact that as circle is traversed along its circumference, then aggregated value of absolute difference (whether positive or negative) of both x-coordinate and y-coordinate between two equidistant points on circumference remains same. If two or more circles are partially overlapping then the periphery will not be geometrically circular and in that case aggregated value of absolute difference of x-coordinate and y-coordinate will not remain same for same distance parsed along the edge of overlapped pattern. Every time the aggregated value of absolute differences in x-coordinate and y-coordinate changes, the count of overlapped pattern is increased, and this traversal continues till original start point on periphery of pattern is reached.
  • Covert feature for anti-counterfeiting associated with overt feature : Often there is need of covert feature of anti-counterfeiting. In this feature of the invention the authentication of the box is described. Once the box is sealed labels with invisible patterns printed on it is applied on to the box. Noteworthy to mention that in this application labels used are not radio-opaque layered but have invisible patterns printed. Patterns are externally and digitally scanned by special-purpose camera which can scan in non-visible range for human eye. Patterns can be any shape/size or as simple as one line randomly oriented and in that case degree of orientation can be imaging credential. Imaging credential can be associated with a random number printed on packaging and thus becomes a unique signature per-piece which is not re-clonable and non-replaceable even by an insider. A scheme of multi-number random number system for anti-counterfeiting has been disclosed in Indian patent number 41/CHE/2009 and PCT international application PCT/IB2010/050940 . On production-line special-purpose camera image acquisition system scans each packaging externally and associates their imaging credential with unique alpha-numeric credential and this association is recorded in database. Random pattern can be any shape and size. Reference imaging captured by special cameras like infrared cameras and associating this imaging with unique ID per-piece. At time of verification in field, again imaging is compared programmatically with reference imaging associated with unique-ID.
  • Two label approach for external scanning in direction-agnostic manner: This embodiment is possibly useful for high volume logistics industry, wherein item level tagging with smart labels with internal random radio-opaque layering is not possible and thus only box level authentication is desired and box sizes are different or custom-made. If boxes are of trapezoidal shape then all faces and edges can be scanned with top and bottom scanning. Two labels are used in this embodiment as illustrated in diagram 11. One is base or reference label which gives reference pattern (014). Another comparison label (015) has comparison pattern (016). Imaging of reference pattern is used to determine orientation of comparison pattern image. So irrespective of box scanning direction, image analysis is done based on orientation of comparison image with respect to reference image. Both patterns will be invisible to naked eye (preferably printed from an ink those are non-visible to human eye) but can be digitally scanned by appropriate camera. Preferably these labels should be self destroyable for better security. Comparison label should look symmetrical to human eye in shape, size and application and only differs in terms of pattern's orientation, pattern's shape and pattern's size, which is printed from non-invisible ink to human eye. These labels are to be applied in a manner such that opening point will be sealed. These labels can also be two concentric labels and smaller diameter base label can be applied on top of larger diameter reference label. These labels can bear unique-ID printed by non-visible ink as well to index the images in database. Another embodiment can have two invisible circles on reference label (017) and angle with respect to circle on base label is calculated as shown in diagram 12. If using invisible inks to make patterns is not feasible one can use combination of red and blue screens as adhesive tapes over label, wherein pattern is printed in black colour. Example-sake if, pattern is printed in black on reference label of red background then using a semi-transparent deep blue coloured tape will make pattern invisible but still digitally scan-able by InfraRed camera.
  • Internal monitoring at box label : Sometimes item label tagging is not feasible and still internal monitoring is needed. Challenges are that box can contain any item that may be metallic or non-metallic. Box is padded and strapped along thermocol block or any other radio-transparent material. Thermocol block padding is suitable for flat panel x-ray detectors however in case of normal baggage scanning x-ray machines thermocol block might not be needed and in exceptional cases wherein the x-ray imaging of metallic content inside the box overlaps with imaging of smart-labels, the internal metallic content might need to be rearranged a bit. Before plastic strapping two labels are placed on thermocol block and after tight strapping these labels auto-acquires their imaging credential. For illustration, as shown in diagram 15, credential can be relative orientation (019) and (020) but not limited to this. This box is placed inside larger container and x-ray imaging is used to validate credentials. Any intrusion that will un-detectable requires strapping to be cut and thus labels will change their orientation and imaging credential will change automatically.

Claims (1)

1. A method of content count and authentication inside a sealed box wherein, labels randomly embedding radio-opaque material layering are used to tag consignment, each of labels being externally symmetrical to the human eye but creates unique imaging signature due to the random orientation of the internal radio-opaque layering on the labels, detectable only in x-ray imaging of the label and auto-acquires their fresh imaging credential either at time of first application or reuse.
2. A method of count and authentication as said in claim 1 wherein the labels can be of any shape and preferably circular for highest security.
3. A method of content count and authentication as in claim 1 wherein, item loss, theft, reshuffling or replacement is detected by comparing overlapped x-ray imaging of labels containing randomly oriented radio-opaque material with that of row-wise and column-wise cropped portion of reference image.
4. A method of content count and authentication as in claim 1 wherein, false alarm for item loss or theft or replacement is determined by horizontal movement detection of items stacked along direction of x-ray beam at a given row and column position within box during transit, by monitoring differential between row-wise and column-wise cropped portion from reference imaging and respective cropped portion from recently acquired imaging.
5. A method of content count and authentication as in claim 1 wherein, imaging of the container with each item's top face tagged with internally symmetric radio opaque layering labels can be taken and size analysis between x-ray imaging of labels can be used to detect missing items in container.
6. A method of content count and authentication as in claim 1, wherein, arithmetic count of items stacked depth-wise is done by counting the number of patterns in x-ray imaging, due to random orientation of each circular labels auto-acquire their imaging credential only at time of tagging.
7. A method of content count and authentication as in claim 6, wherein, count deficiency due to partial or exact overlap of patterns is resolved by rotating box on conveyor belt of x-ray machine by certain degree, which exposes the hidden patterns.
8. A method of content count and authentication as in claim 1, wherein partially overlapped circular pattern are detected by observing aggregated value of absolute differences in both x-coordinate and y-coordinate for same distance parsed along the edge of overlapped pattern, and every time this aggregated value will change for same distance parsed along the edge, an overlapping circle is recorded for count purpose.
A method of content authentication wherein, box-authentication by internal scanning is achieved by strapping the box along with radio-transparent thermocol block and within strapping belt, labels embedding internal layering of randomly oriented radio-opaque material is placed such that labels auto-acquire their imaging credential while strapping is tightened and whole box can be placed inside a larger container and per-hop x-ray imaging validates the credential.
10. A method of covert anti-counterfeiting wherein, a pattern randomly sized, shape and orientation printed by ink, not visible to naked eye is printed on packaging and per-piece reference imaging captured by special cameras is indexed with unique-id per piece in database as covert anti-counterfeiting implementation.
A method of content authentication by external scanning wherein, patterns on reference label are made invisible, without using invisible ink and still digitally scan-able by using semi-transparent deep blue coloured adhesive tape over reference label which has red background with pattern printed in black.
12 A method of content authentication by external scanning, wherein, box authentication through external direction-agnostic image scanning is achieved by applying two labels on opening edge of box namely comparison-label and reference-label, wherein patterns in both labels are printed using ink non-visible to human eye, and acquired imaging is analysed for orientation of pattern on comparison label with respect to pattern on reference-label and the same is recorded as unique credential, using a special camera and associated with per-box unique-id in database.
13. A method of content authentication as said in claim 12, wherein the reference-labels used are of any shape and preferably circular for highest security.
14. A method of content authentication by external scanning as said in claim 12, wherein 360 degree scanning of all sides and edges of box to detect any hidden intrusion is done by using trapezoidal shaped box stationed on a transparent shelf in a platform mounting two special-purpose cameras, one scanning from top view and another from bottom view.
EP11752928.9A 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels Withdrawn EP2545496A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN625CH2010 2010-03-10
PCT/IB2011/050859 WO2011110973A2 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels

Publications (2)

Publication Number Publication Date
EP2545496A2 true EP2545496A2 (en) 2013-01-16
EP2545496A4 EP2545496A4 (en) 2017-08-23

Family

ID=44563933

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11752928.9A Withdrawn EP2545496A4 (en) 2010-03-10 2011-03-01 A method of content authentication inside a sealed box using special labels

Country Status (6)

Country Link
EP (1) EP2545496A4 (en)
JP (1) JP5826774B2 (en)
KR (1) KR101759664B1 (en)
CN (2) CN107025424A (en)
AU (1) AU2011225766B2 (en)
WO (1) WO2011110973A2 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8740076B2 (en) 2012-07-11 2014-06-03 Linksmart Technologies Pvt. Ltd. Label for enabling verification of an object
SG194708A1 (en) 2011-04-29 2013-12-30 Monnaie Royale Canadienne Royal Canadian Mint Method and apparatus for authentication of a coin or other manufactured item
EP2618323B1 (en) * 2012-08-21 2018-06-13 LinkSmart Technologies Pvt. Ltd. Label for enabling verification of an object
JPWO2014069491A1 (en) * 2012-10-30 2016-09-08 株式会社アイビット Radiation contrast material counting device and counting method
CA2898737C (en) 2013-01-24 2020-04-21 Monnaie Royale Canadienne/Royal Canadian Mint Unique identification of coin or other object
CN103366336A (en) * 2013-07-12 2013-10-23 陕西理工学院 Image watermarking method based on human eye contrast ratio sensitivity visual characteristics
WO2015036452A1 (en) * 2013-09-10 2015-03-19 Sicpa Holding Sa Master case tracking mesh for data transmission in highly shielded environment
WO2015189764A1 (en) * 2014-06-09 2015-12-17 Ashish Anand Automated verification of optical randomness in security label
US9576166B2 (en) * 2015-02-18 2017-02-21 Fedex Corporate Services, Inc. Apparatus, non-transient computer readable media, and methods for automatically quantifying space within a logistics container using a scanning sensor node disposed within the container
WO2017096234A1 (en) * 2015-12-02 2017-06-08 Power Fingerprinting Inc. Methods and apparatuses for identifying anomaly within sealed packages using power signature analysis counterfeits
DE102016010850A1 (en) * 2016-09-07 2018-03-08 Giesecke+Devrient Currency Technology Gmbh Method, device and system for processing a transport container for valuables
KR20180061687A (en) * 2016-11-30 2018-06-08 동명대학교산학협력단 Packaging management system of product
EP3460722A1 (en) * 2017-09-22 2019-03-27 Authentic Vision GmbH Tamper-activated authenticable security device
FI3799655T3 (en) * 2018-06-06 2023-01-31 Improved self-destructive documents for information security and privacy protection
CN109444219B (en) * 2018-12-25 2021-02-12 北京食安链科技有限公司 Rapid detection probe and detection method for nutritional quality of meat products
JP7253305B2 (en) * 2018-12-28 2023-04-06 大阪シーリング印刷株式会社 Adhesive tape, packaging and packaging method
JP6622937B1 (en) * 2019-03-05 2019-12-18 株式会社日立パワーソリューションズ Distribution management method
JP6944985B2 (en) * 2019-03-05 2021-10-06 株式会社日立パワーソリューションズ Distribution management method
CN112926617A (en) * 2019-12-06 2021-06-08 顺丰科技有限公司 Packaging change detection method and device, cloud computer equipment and storage medium
JP7400997B2 (en) 2021-01-19 2023-12-19 三菱電機株式会社 elevator control device
CN116433097B (en) * 2023-04-19 2023-11-21 北京市永康药业有限公司 Injection packaging quality detection method and system

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5346259A (en) * 1992-07-16 1994-09-13 Avery Dennison Corporation Anti-theft label construction
US5642442A (en) * 1995-04-10 1997-06-24 United Parcel Services Of America, Inc. Method for locating the position and orientation of a fiduciary mark
GB0129369D0 (en) * 2001-12-07 2002-01-30 Filtrona United Kingdom Ltd Method and apparatus for marking articles
EP1420381A1 (en) * 2002-11-12 2004-05-19 Hauni Maschinenbau AG Method and device for identification and checking of authentificity of products
GB0321090D0 (en) * 2003-09-10 2003-10-08 Abs Systems Inc Baggage screening system
JP4734893B2 (en) * 2004-11-04 2011-07-27 凸版印刷株式会社 Anti-counterfeit medium, anti-counterfeit seal and reading method thereof
WO2006053023A2 (en) 2004-11-09 2006-05-18 Digimarc Corporation Authenticating identification and security documents
EP1801593A1 (en) * 2005-12-22 2007-06-27 Koninklijke Philips Electronics N.V. A method of imaging biological specimens using inorganic nanoparticles as label agents
CN101583865A (en) * 2006-12-14 2009-11-18 安东尼奥斯·艾卡特林尼迪斯 Method and apparatus for inspection of containers
US8090952B2 (en) * 2007-07-06 2012-01-03 Harris Scott C Counterfeit prevention system based on random positioning on a pattern
CN201138489Y (en) * 2007-11-09 2008-10-22 北京博世金电科技开发有限公司 Bill security authenticating terminal with digital signature, electronic label and colored image
WO2009105040A1 (en) 2008-02-19 2009-08-27 Bilcare Technologies Singapore Pte. Ltd. A reading device for identifying a tag or an object adapted to be identified, related methods and systems
CN101286203A (en) * 2008-03-24 2008-10-15 陆航程 Chip-free quasi RFID multiple verification low cost encrypted EPC composite label and system
DE102008032781A1 (en) * 2008-07-11 2010-01-21 Klöckner Pentaplast GmbH & Co. KG Packaging film for product authentication, authentication method and system
US8087585B2 (en) * 2008-07-15 2012-01-03 Morton Greene Baggage handling system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2011110973A2 *

Also Published As

Publication number Publication date
CN107025424A (en) 2017-08-08
JP2013527486A (en) 2013-06-27
EP2545496A4 (en) 2017-08-23
CN102959563A (en) 2013-03-06
WO2011110973A3 (en) 2012-07-05
KR101759664B1 (en) 2017-07-19
KR20130060169A (en) 2013-06-07
AU2011225766A1 (en) 2012-11-08
AU2011225766B2 (en) 2014-11-13
JP5826774B2 (en) 2015-12-02
CN102959563B (en) 2016-11-16
WO2011110973A2 (en) 2011-09-15

Similar Documents

Publication Publication Date Title
WO2011110973A2 (en) A method of content authentication inside a sealed box using special labels
US9361532B2 (en) Label for enabling verification of an object
US11544996B2 (en) Gaming chip with a stripe pattern and management system for identification of the gaming chip based on imaging
CN104428798B (en) Method for clear and definite tagged object
US8985471B2 (en) Optically readable identification security tag or stamp
CN115761976A (en) Inspection system, inspection device, and token
CN115995131A (en) Inspection system and inspection apparatus
US10192299B2 (en) Method of and system for verifying authenticity of packaged items
US11347901B2 (en) Frangible security device
EP2618323B1 (en) Label for enabling verification of an object
CN110929296B (en) Nested two-dimensional code encoding method and decoding method
CN210824185U (en) High-risk luggage intercepting system
CN109328360B (en) Information medium, method of manufacturing the same, method of verifying the same, and verification system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20121009

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
RIC1 Information provided on ipc code assigned before grant

Ipc: G06K 19/06 20060101AFI20130531BHEP

Ipc: G06K 9/62 20060101ALI20130531BHEP

Ipc: G06K 9/78 20060101ALI20130531BHEP

Ipc: G06K 9/18 20060101ALI20130531BHEP

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: LINKSMART TECHNOLOGIES PVT. LTD.

RIN1 Information on inventor provided before grant (corrected)

Inventor name: ANAND, ASHISH

A4 Supplementary search report drawn up and despatched

Effective date: 20170724

RIC1 Information provided on ipc code assigned before grant

Ipc: G06K 9/78 20060101ALI20170718BHEP

Ipc: G06K 19/06 20060101AFI20170718BHEP

Ipc: G06K 9/62 20060101ALI20170718BHEP

Ipc: G06K 9/18 20060101ALI20170718BHEP

17Q First examination report despatched

Effective date: 20191218

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20201001