US20110247960A1 - Systems and methods for verifying authenticity of a product - Google Patents
Systems and methods for verifying authenticity of a product Download PDFInfo
- Publication number
- US20110247960A1 US20110247960A1 US13/081,882 US201113081882A US2011247960A1 US 20110247960 A1 US20110247960 A1 US 20110247960A1 US 201113081882 A US201113081882 A US 201113081882A US 2011247960 A1 US2011247960 A1 US 2011247960A1
- Authority
- US
- United States
- Prior art keywords
- unique identifier
- tamper
- evident package
- package
- evident
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 239000000463 material Substances 0.000 claims description 40
- 239000000758 substrate Substances 0.000 claims description 24
- 230000007613 environmental effect Effects 0.000 claims description 21
- 239000011248 coating agent Substances 0.000 claims description 6
- 238000000576 coating method Methods 0.000 claims description 6
- 239000000126 substance Substances 0.000 claims description 6
- 239000000825 pharmaceutical preparation Substances 0.000 claims description 5
- 229940127557 pharmaceutical product Drugs 0.000 claims description 5
- 235000013334 alcoholic beverage Nutrition 0.000 claims description 4
- 239000002537 cosmetic Substances 0.000 claims description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 4
- 238000007789 sealing Methods 0.000 claims description 3
- 239000000976 ink Substances 0.000 description 17
- 230000008859 change Effects 0.000 description 14
- 238000004806 packaging method and process Methods 0.000 description 14
- 239000003814 drug Substances 0.000 description 13
- 238000012795 verification Methods 0.000 description 13
- -1 vaccines Substances 0.000 description 10
- 239000011797 cavity material Substances 0.000 description 9
- 238000004519 manufacturing process Methods 0.000 description 7
- 230000004044 response Effects 0.000 description 5
- 229920000089 Cyclic olefin copolymer Polymers 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000010348 incorporation Methods 0.000 description 4
- 239000000123 paper Substances 0.000 description 4
- 239000004033 plastic Substances 0.000 description 4
- 229920003023 plastic Polymers 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 4
- 235000014101 wine Nutrition 0.000 description 4
- 206010073306 Exposure to radiation Diseases 0.000 description 3
- 239000004743 Polypropylene Substances 0.000 description 3
- 238000013459 approach Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000011888 foil Substances 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 239000006187 pill Substances 0.000 description 3
- 229920001155 polypropylene Polymers 0.000 description 3
- 238000007639 printing Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 239000004713 Cyclic olefin copolymer Substances 0.000 description 2
- 239000004480 active ingredient Substances 0.000 description 2
- 239000000853 adhesive Substances 0.000 description 2
- 230000001070 adhesive effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007918 intramuscular administration Methods 0.000 description 2
- 238000007912 intraperitoneal administration Methods 0.000 description 2
- 238000001990 intravenous administration Methods 0.000 description 2
- 230000005389 magnetism Effects 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000009512 pharmaceutical packaging Methods 0.000 description 2
- 229920002493 poly(chlorotrifluoroethylene) Polymers 0.000 description 2
- 239000005023 polychlorotrifluoroethylene (PCTFE) polymer Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000002904 solvent Substances 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 238000007920 subcutaneous administration Methods 0.000 description 2
- 229960005486 vaccine Drugs 0.000 description 2
- 239000004698 Polyethylene Substances 0.000 description 1
- 239000000443 aerosol Substances 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- XAGFODPZIPBFFR-UHFFFAOYSA-N aluminium Chemical compound [Al] XAGFODPZIPBFFR-UHFFFAOYSA-N 0.000 description 1
- 229910052782 aluminium Inorganic materials 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000002547 anomalous effect Effects 0.000 description 1
- 235000013405 beer Nutrition 0.000 description 1
- 239000002775 capsule Substances 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000013270 controlled release Methods 0.000 description 1
- 239000006071 cream Substances 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 239000003221 ear drop Substances 0.000 description 1
- 229940047652 ear drops Drugs 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000839 emulsion Substances 0.000 description 1
- 238000005530 etching Methods 0.000 description 1
- 239000003889 eye drop Substances 0.000 description 1
- 229940012356 eye drops Drugs 0.000 description 1
- 239000010408 film Substances 0.000 description 1
- 239000000499 gel Substances 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 239000007943 implant Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007913 intrathecal administration Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 239000004816 latex Substances 0.000 description 1
- 229920000126 latex Polymers 0.000 description 1
- 239000000865 liniment Substances 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000006210 lotion Substances 0.000 description 1
- 229940039092 medicated shampoos Drugs 0.000 description 1
- 230000003278 mimic effect Effects 0.000 description 1
- 239000002991 molded plastic Substances 0.000 description 1
- 239000002674 ointment Substances 0.000 description 1
- 239000006191 orally-disintegrating tablet Substances 0.000 description 1
- 230000003204 osmotic effect Effects 0.000 description 1
- 239000006072 paste Substances 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 239000002304 perfume Substances 0.000 description 1
- 229920000573 polyethylene Polymers 0.000 description 1
- 229920000139 polyethylene terephthalate Polymers 0.000 description 1
- 239000005020 polyethylene terephthalate Substances 0.000 description 1
- 239000004800 polyvinyl chloride Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 235000015096 spirit Nutrition 0.000 description 1
- 239000000829 suppository Substances 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
- 239000006188 syrup Substances 0.000 description 1
- 235000020357 syrup Nutrition 0.000 description 1
- 239000003826 tablet Substances 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 239000006213 vaginal ring Substances 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D55/00—Accessories for container closures not otherwise provided for
- B65D55/02—Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
- B65D55/026—Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure initial opening or unauthorised access being indicated by a visual change using indicators other than tearable means, e.g. change of colour, pattern or opacity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q99/00—Subject matter not provided for in other groups of this subclass
Definitions
- Counterfeit goods remain a significant economic and consumer safety problem.
- Counterfeit pharmaceuticals pose particular safety problems because of the difficulty for even the most highly-educated consumers to determine whether a pharmaceutical product contains the correct quantity of an active ingredient or any active ingredient at all.
- Various aspects of the invention provide systems and methods for verifying the authenticity of a product.
- One aspect of the invention provides a system including a tamper-evident package and a unique identifier usable to verify the authenticity of the product.
- the unique identifier is contained within the tamper-evident package. The unique identifier cannot be detected from outside of the tamper-evident package without demonstrating evidence of tampering.
- the tamper-evident package can be a blister pack.
- the blister pack can include a blister material and a lidding material defining one or more cavities,
- the unique identifier can be printed on the blister material.
- the unique identifier can be printed on the lidding material.
- a region of the tamper-evident package containing the unique identifier can be opaque,
- the unique material can be printed on a substrate received within the tamper-evident package.
- the substrate can be folded.
- the substrate can be rolled.
- the system can include a further unique identifier.
- the further unique identifier is mathematically-related to the unique identifier.
- the product can be a pharmaceutical product.
- the product can be selected from the group consisting of consumer goods, electronic goods, alcoholic beverages, electronic media, luxury goods, cosmetics, and software.
- Another aspect of the invention provides a system including: a tamper-evident package and a concealed unique identifier coupled to the tamper-evident package.
- the concealed unique identifier can be concealed by a removable opaque coating.
- the concealed unique identifier can be concealed by a substrate.
- the substrate can be perforated.
- the concealed unique identifier can be revealed by a change in environmental conditions selected from the group consisting of: exposure to a temperature change, exposure to air, exposure to water, exposure to solvents, exposure to light, and exposure to radiation.
- Another aspect of the invention provides a method of providing a providing a unique identifier, The method includes: providing a tamper-evident package and placing the unique identifier within the tamper-evident package. The unique identifier cannot be detected from outside of the tamper-evident package.
- the tamper-evident package can be a blister pack.
- the method can include scaling the tamper-evident package.
- a region of the tamper-evident package containing the unique identifier can be opaque.
- the unique identifier can be printed on a substrate received within the tamper-evident package.
- Another aspect of the invention provides a method of providing a providing a unique identifier.
- the method includes: providing a tamper-evident package; placing the unique identifier on the tamper-evident package; and concealing the unique identifier.
- Another aspect of the invention provides a system including: a tamper-evident package; and a unique identifier usable to verify the authenticity of the product, the unique identifier contained within the tamper-evident package.
- the unique identifier cannot be detected from outside of the tamper-evident package without demonstrating evidence of tampering.
- the tamper-evident package can be a blister pack
- the blister pack can include a blister material and a lidding material defining one or more cavities.
- the unique identifier can be printed on the blister material.
- the unique identifier can be printed on the lidding material.
- a region of the tamper-evident package containing the unique identifier can be opaque.
- the unique material can be printed on a substrate received within the tamper-evident package.
- the substrate can be folded.
- the substrate can be rolled.
- the system can include a further unique identifier,
- the further unique identifier can be mathematically related to the unique identifier.
- the product can be a pharmaceutical product.
- the product can be selected from the group consisting of consumer goods, electronic goods, alcoholic beverages, electronic media, luxury goods, cosmetics, and software.
- Another aspect of the invention provides a system including: a tamper-evident package; and a concealed unique identifier coupled to the tamper-evident package.
- the concealed unique identifier can be concealed by a removable opaque coating.
- the concealed unique identifier can be concealed by a substrate.
- the substrate can be perforated.
- the concealed unique identifier can be modified by one or more selected from the group consisting of: exposure to an environmental condition, exposure to a substance, and use of a lens of a defined wavelength.
- the environmental condition can be selected from the group consisting of: a temperature, light, energy, stress, strain, and magnetic forces.
- One or more of the plurality of distinct hidden unique identifiers can be modified by exposure to the environmental condition for a defined period of time.
- the substance can be water.
- the concealed unique identifier can be removably coupled to the tamper-evident package.
- Another aspect of the invention provides a method of providing a providing a unique identifier.
- the method includes: providing a tamper-evident package; and placing the unique identifier within the tamper-evident package, wherein the unique identifier cannot be detected from outside of the tamper-evident package.
- the tamper-evident package can be a blister pack.
- the method can include sealing the tamper-evident package.
- a region of the tamper-evident package containing the unique identifier can be opaque.
- the unique identifier can be printed on a substrate received within the tamper-evident package.
- Another aspect of the invention provides a method of providing a providing a unique identifier.
- the method includes: providing a tamper-evident package; placing the unique identifier on the tamper-evident package; and concealing the unique identifier.
- FIGS. 1 and 2 depict cross-sections of tamper-evident packages containing a unique identifier according to the invention
- FIG. 3 depicts a blister pack having a unique identifier printed on the lidding material according to the invention
- FIG. 4 depicts a tamper-evident package containing a unique identifier that can be coupled to an item according to the invention
- FIGS. 5 and 6 A- 6 C depict environmentally-sensitive unique identifiers according the invention
- FIGS. 7 and 8 depict methods of providing a unique identifier according to the invention
- FIG. 9 depicts a tamper-evident package according to the invention.
- FIG. 10 depicts a method of verifying the authenticity of a product through a plurality of stages of a supply chain according to the invention
- FIG. 11 depicts an exemplary workflow according to the invention.
- FIG. 12 depicts a ticket including a plurality of unique identifiers according to the invention.
- FIG. 13 depicts a method of verifying the authenticity of a ticket or other voucher according to the invention.
- visible refers to any feature that is perceptible at a defined wavelength.
- a wavelength can be the portion of the electromagnetic spectrum perceptible to the human eye (i.e., between about 390 nm to about 750 nm).
- Such a wavelength can additionally or alternatively include other wavelengths visible through the use of machines and/or lenses.
- opaque refers to any material that does not permit the perception of a feature from across the material at a defined wavelength.
- a wavelength can be the portion of the electromagnetic spectrum perceptible to the human eye (i.e., between about 390 nm to about 750 nm).
- Such a wavelength can additionally or alternatively include other wavelengths visible through the use of machines and/or lenses.
- environmental condition refers to any ambient condition that can affect a product and/or the visibility of a unique identifier.
- environmental conditions include light, temperature, pressure, energy, and like.
- environmental conditions may, but need not be, modified by a temporal duration, For example and as discussed further herein, exposure to a slightly elevated temperature for a short period of time may not be sufficient to compromise a product or cause a unique identifier to be revealed and/or modified. However, exposure to the same slightly elevated temperature for a 6 hours may be sufficient to compromise the product cause the unique identifier to be revealed and/or modified.
- Various aspects of the invention provide systems and methods for verifying the authenticity of a product, for example, products that are perishable, likely to be counterfeited, and/or likely to be mishandled.
- Exemplary products include pharmaceutical products such as vaccines, pills, capsules, tablets, orally disintegrating tablets, films, osmotic-controlled release oral delivery systems (OROS), elixirs, emulsions, syrups, suspensions, tinctures, inhalers, nebulizers, eye drops, ear drops, ointments, creams, lotion, liniments, gels, pastes, medicated shampoos, transdermal implants, transdermal patches, intranasal pharmaceuticals, subcutaneous (SC) pharmaceuticals, intravenous (IV) pharmaceuticals, intramuscular (IM) pharmaceuticals, intraosseuous pharmaceuticals, intraperitoneal (IP) pharmaceuticals, intrathecal pharmaceuticals, intracavernosal pharmaceuticals, pessaries, vaginal rings, intrauterine devices, suppositories, and the like.
- OROS osmotic-controlled release oral delivery systems
- elixirs emulsions
- syrups syrups
- suspensions tinctures
- exemplary products include consumer goods (e.g., clothing, luggage, and the like), electronic goods, foodstuffs, alcoholic beverages (e.g., beer, wine, spirits, and the like), electronic media (e.g., compact discs, digital video discs, and the like), luxury goods (e.g., jewelry, watches, perfumes, and the like), cosmetics, software, and the like.
- consumer goods e.g., clothing, luggage, and the like
- electronic goods e.g., foodstuffs
- alcoholic beverages e.g., beer, wine, spirits, and the like
- electronic media e.g., compact discs, digital video discs, and the like
- luxury goods e.g., jewelry, watches, perfumes, and the like
- cosmetics software, and the like.
- some embodiments of the invention provide a system 100 for verifying the authenticity of a product 102 containing therein.
- the system includes a tamper-evident package 104 and a unique identifier 106 contained within or as part of the tamper-evident package 104 .
- Tamper-evident package 104 can be any package configured such that an end user can easily identify if the product 102 and/or the unique identifier 106 were previously removed or altered.
- tamper-evident package 104 can be any package that requires a visible alteration to access the unique identifier.
- the user can be required to: open a bottle to view a unique identifier under a cap; open a box or sachet to view a unique identifier within the box or sachet; open an envelope to view a unique identifier within the sachet; squeeze a unique identifier out of a tube of product; open a packet (e.g., of hard-molded plastic) to access a unique identifier; pour a unique identifier out of a package (e.g., TETRA PAK® packages).
- a package e.g., TETRA PAK® packages.
- the tamper-evident package 104 can be a blister pack (also known as a “push-through-pack”) consisting of a blister material 108 and a lidding material 110 defining one or more cavities 112 .
- Blister packs and methods of fabricating the same are described in D. A. Dean, Blister, Strip & Sachet Packaging in Pharmaceutical Packaging Technology (D. A. Dean et al., eds. 2000).
- the blister pack can be formed from a variety of existing materials known to those of skill in the art.
- the blister material 108 can be fabricated from plastics such as polyvinyl chloride (PVC), polychlorotrifluoro ethylene (PCTFE), cyclic olefin polymers (COP), cyclic olefin copolymers (COC), polypropylene (PE), polyethylene (PE), glycol-modified polyethylene terephthalate (PETg), and the like, as well as combinations and/or laminates thereof.
- Lidding material 110 can be fabricated from a foil, for example, a metallic foil such as aluminum foil.
- the lidding material 110 can be bonded to the blister material 108 with one or more adhesives known by those of skill in the art to be suitable for bonding a particular blister material 108 and a particular lidding material 110 . Suitable materials are further described in Edward J. Bauer, Pharmaceutical Packaging Handbook 189-272 (2009).
- Unique identifier 106 can be any sequence of one or more characters that uniquely identifies a product.
- unique identifier 106 can be a sequence of numerals (e.g., “1234567890”), a sequence of letters (e.g., “ABCDEFGHIJ”), a sequence of non-alphanumeric characters, and the like or a combination of the above.
- unique identifiers can be composed of other numerals and characters.
- Unique identifier 106 can also be a bar code or a matrix code (i.e., a two-dimensional bar code), A distinct unique identifier can be assigned to each individual product or a single unique identifier can be assigned to multiple products.
- Unique identifiers 106 can be automatically generated with computers, printers, labeling machinery, and the like. For example, unique identifiers 106 can be generated with a random number generator. Unique identifiers 106 can be stored by the manufacturer and associated with a variety of data such as the time and date of manufacture, the location of manufacture, the distributor of the product, the status of the unique identifier 106 , and the like.
- the unique identifier 106 can be printed on a substrate (e.g., a piece of paper, card stock, cardboard, plastic, and the like) as depicted in FIG. 1 .
- a substrate e.g., a piece of paper, card stock, cardboard, plastic, and the like
- the unique identifier 106 cannot be viewed be without opening the tamper-evident package 104 .
- the substrate can be rolled as depicted in FIG. 1 , folded (e.g., like an accordion), and the like.
- the tamper-evident package 104 can be wholly or partially composed of an opaque material
- the unique identifier can be printed on the blister material 108 and/or the lidding material 110 .
- Additional media can be placed in other blister cavities. Such media can contain additional unique identifiers and/or marketing materials.
- Cavities 112 containing the unique identifier or other additional media can have the same, similar, or different colors, shapes, and/or dimensions as other cavities (e.g., cavities containing pharmaceuticals).
- cavities 112 can be substantially round, oval, rectangular, or the like.
- the invention also provides a system 200 including a tamper-evident package 204 including a concealed unique identifier 206 coupled to the tamper-evident package 204 .
- the concealed unique identifier 206 can be coupled to the tamper-evident package 204 by a variety of techniques.
- the concealed unique identifier 206 can be printed, stamped, or written on the tamper-evident package 204 .
- the concealed unique identifier 206 can be printed on another media (e.g., paper, cardboard, and the like) and bonded to tamper-evident package 204 with a chemical or mechanical fastener (e.g., during repackaging).
- the concealed unique identifier 206 can be configured to conceal a unique identifier until the end user wishes to verify the authenticity of the product 202 .
- the concealed unique identifier 206 can be a scratchcard-type material in which the unique identifier is covered by a removable opaque coating (e.g., latex).
- the concealed unique identifier 206 can be concealed by a substrate such as a sheet of paper, cardstock, cardboard, plastic, or the like.
- the concealed unique identifier 206 can be covered by a perforated substrate that is torn during authentication.
- the concealed unique identifier is concealed by one or more layers of removable tape (e.g., two-layer tape).
- the unique identifier 306 can be printed on the inside of the tamper-evident package 304 , for example on the inside of the blister material 308 or lidding material 310 in a blister pack.
- Lidding material 310 can be peeled by the end user (e.g., through the use of a tab 314 to reveal the unique identifier 306 .
- Cavity material 308 is preferably opaque so that the unique identifier 306 cannot be viewed until the lidding material 310 is removed.
- Such arrangements can be particularly advantageous because they require little modification to existing packaging machinery and therefore can be produced at low cost.
- blister 312 a can contain a pill or other product.
- a tamper-evident package 402 containing a unique identifier 404 can be coupled to item 406 to allow for the authentication of the item 406 .
- the tamper-evident package 402 can be a blister pack as discussed herein.
- the tamper-evident package 402 can be coupled to the item through a variety of means including mechanical and chemical fasteners.
- unique identifier 404 can be printed in media received within the tamper-evident package 402 or can be printed directly on the blister material 408 and/or lidding material 410 .
- Tamper-evident package 402 can optionally be removed by item 406 after verification by the end user or other individual.
- tamper-evident package 402 and item 406 can be detachably coupled through use of a temporary adhesive such as those available from Glue Dots International of New Berlin, Wis.
- the end user is able to quickly identify if the unique identifier 106 , 206 was previously revealed for viewing.
- Such configurations are advantageous because a previously-revealed unique identifier 106 , 206 suggests that the packaging 104 , 204 was recycled and filled with a counterfeit product.
- a variety of approaches can be adopted to produce one-time-use unique identifiers.
- the unique identifier 506 can be revealed by a change in environmental conditions 516 such exposure to a temperature change, exposure to air, exposure to water, exposure to solvents, exposure to light, and exposure to radiation.
- the revelation of the unique identifier 506 is irreversible so that the end user is alerted that the unique identifier 506 was previously viewed, which suggests that a counterfeiter recycled old packaging.
- the unique identifier is transitory such that the unique identifier can only be temporarily viewed.
- the unique identifier 606 a can be obscured by a mark 618 a that becomes visible in response to an environmental condition 616 as discussed above.
- the obscuring mark 618 a can be revealed by exposure to radiation incident to exposure of the unique identifier 606 a during authentication. Additionally or alternatively, the obscuring mark 618 a can be revealed by exposure to unacceptable environmental conditions. For example, the obscuring mark 618 a can be revealed if the obscuring mark (and the product associated therewith) is exposed to heat, cold, humidity, and the like. Such arrangements are particularly advantageous for pharmaceuticals such as vaccines that are particularly sensitive to environmental conditions such as heat.
- the obscuring mark 618 a can be the same or a different color than the unique identifier 606 a and can partially or completely obscure the unique identifier 606 a.
- Unique identifier 608 b consists of a number of characters (e.g., 11 digits). One or more of the characters (the third, sixth, and ninth digits in the example illustrated in FIG. 6B ) are printed in an environmentally-sensitive ink (e.g., a temperature sensitive ink) represented by light shading in FIG. 6B .
- an environmentally-sensitive ink e.g., a temperature sensitive ink
- the unique identifier 608 b If the user reads the unique identifier 608 b before the unique identifier 608 b (and the product associated therewith) is exposed to an environmental condition (e.g., high or low temperatures) the characters printed in the environmentally-sensitive ink will not be visible. For example, the user of the unique identifier 608 b in FIG. 6B would see the code “78 28 02 46” and submit this code for verification as discussed herein. However, if the unique identifier 608 b (and the product associated therewith) is exposed to an environmental condition (e.g., high or low temperatures), the characters printed in the environmentally-sensitive ink will become visible. For example, the user of the unique identifier 608 b in FIG. 6B would see the code “78528602846” and submit this code for verification as discussed herein, thereby triggering a different response.
- an environmental condition e.g., high or low temperatures
- FIG. 6C another embodiment of the invention provides a unique identifier 608 c encoded in a seven-segment display.
- Various segments of each digit can be printed in environmentally sensitive ink (depicted in dashed outline) such that when the unique identifier 608 c is exposed to an environmental stimulus, the visible unique identifier 608 c changes from “0123456789” to “8789968388.”
- 0 can change to 8
- 1 can change to 7
- 2 can change to 8
- 3 can change to 9
- 4 can change to 9
- 5 can change to 6
- 6 can change to 8
- 7 can change to 3
- 8 can be maintained as 8, and 9 can change to 8.
- each of the hidden digits or segments can be printed in a different ink that becomes visible at various temperatures.
- each of the hidden digits or segments can be printed in a different ink that becomes visible at various temperatures.
- certain digits or segments can be printed in light-sensitive ink while other digits or segments can be printed in temperature-sensitive link.
- the environmentally-sensitive inks discussed herein can be calibrated to become visible in response to exposure to an environmental condition (e.g., temperature and/or light) for a specified duration (e.g., 5 minutes, 15 minutes, 30 minutes, 1 hour, 3 hours, 6 hours, 12 hours, 1 day, and the like).
- the appearance of the environmentally-sensitive inks can vary as a function of both time and temperature. For example, exposure of an environmentally-sensitive ink to an ambient temperature of 50° C. for 60 minutes can produce the same effect as exposure of the environmentally-sensitive ink to an ambient temperature of 75° C. for 30 minutes.
- environmentally-sensitive inks that disappear (as opposed to appear) when exposed to environmental conditions can be utilized to produce changing unique identifiers.
- the environmentally-sensitive ink would disappear upon exposure to an environmental condition, thereby producing a unique identifier.
- inks that disappear upon exposure to temperatures are available from Chromatic Technologies of Colorado Springs, Colo.
- environmentally-sensitive inks can be activated by forces such as stress, strain, and/or magnetism.
- the segments of the unique identifiers can include liquid crystals that experience a change in optical properties upon exposure to stress, strain, and/or magnetism.
- the user utilizes the same authentication process regardless of whether the unique identifiers 608 b, 608 c was exposed to an environmental condition, Thus, the user does not need to interpret the unique identifiers 608 b, 608 c. Rather, the authentication service can provide further instructions if the unique identifier 608 b, 608 c was compromised.
- Multiple unique identifiers can be used in conjunction with the inventions herein.
- the multiple identifiers can appear in the same or separate location within the tamper-evident package.
- the multiple unique identifiers can be related or unrelated to each other.
- package can have one visible unique identifier and one hidden unique identifier.
- a method 700 of providing a unique identifier is provided.
- a package is provided.
- the package can be a tamper-evident package as provided herein.
- step S 704 the unique identifier is placed within the package.
- the unique identifier can be placed within the package by hand or with conventional or specialized automated machinery.
- step S 706 one or more products are optionally placed within the package.
- the one or more products can be placed within the package by hand or with conventional or specialized machinery.
- step S 708 the package is optionally sealed.
- the package can be sealed by hand or with conventional or specialized machinery. The sealing of the package can render the package tamper-evident.
- FIG. 8 another method 800 of providing a unique identifier is provided.
- a package is provided.
- the package can be a tamper-evident package as provided herein.
- step S 804 the unique identifier is placed on the package.
- the unique identifier can be placed on the package by hand or with conventional or specialized automated machinery.
- the unique identifier is concealed.
- the unique identifier can be concealed by hand or with conventional or specialized automated machinery. For example, a removable opaque coating can be applied over the unique identifier.
- a substrate such as piece of paper, cardstock, cardboard, plastic, or the like is placed over the unique identifier as discussed herein.
- step S 808 one or more products are optionally placed within the package.
- the one or more products can be placed within the package by hand or with conventional or specialized machinery.
- step S 810 the package is optionally sealed.
- the package can be sealed by hand or with conventional or specialized machinery,
- the invention provides a tamper-evident package 900 including a plurality of distinct hidden unique identifiers 906 that can be selectively revealed.
- the hidden unique identifier 906 can be hidden unique identifiers 906 according to any of the teachings herein.
- the hidden unique identifiers 906 can be covered by a removable opaque coating or a perforated substrate.
- none of the unique identifiers 906 are revealed. This can be the first state of the package 900 , for example, at the time that the package 900 leaves a factory.
- the package 900 is transferred to another level of the supply chain.
- the package 900 can be sold from the manufacture to a wholesaler.
- anyone wishing to verify the authenticity of the product contained in package 900 can reveal a first unique identifier 906 a and verify the unique identifier 906 a as discussed herein.
- the package 900 is transferred to another level of the supply chain.
- the package 900 can be sold by the wholesaler to a retailer.
- anyone wishing to verify the authenticity of the product contained in package 900 can reveal a second unique identifier 906 b and verify the unique identifier 906 b as discussed herein.
- the package 900 is transferred to another level of the supply chain.
- the package 900 can be sold by the retailer to a consumer.
- anyone wishing to verify the authenticity of the product contained in package 900 can reveal a third unique identifier 906 e and verify the unique identifier 906 c as discussed herein.
- the package 900 can be configured to include a distinct hidden unique identifier 906 corresponding to each stage of a supply chain.
- package 900 can include a sufficient number of distinct hidden unique identifiers 906 such that a unique identifier 906 can be verified every time the package 900 is transferred from one supply chain actor to another supply chain actor.
- the package 900 can also be configured to include sufficient unique identifiers 906 to allow for verification at other time points (e.g., when clearing customs).
- the unique identifier 906 is not verified at every stage of the supply chain, but is rather verified at a subset of stages.
- the distinct hidden unique identifiers 906 can be hidden in the same manner or in different manners.
- the distinct hidden unique identifiers can be detected with the human eye or can be detected utilizing optical or mechanical systems.
- a bar code reader can be utilized to read unique identifiers 906 that are bar codes or matrix codes.
- the distinct hidden unique identifiers 906 are readable at distinct wavelengths.
- a plurality of lenses can be used to read the distinct hidden unique identifiers 906 .
- the distinct hidden unique identifier 906 can be related such that validation of one or more previous hidden unique identifiers 906 is required in order to validate a subsequent unique identifier 906 .
- the wavelength of a subsequent unique identifier 906 can be revealed upon validation of a previous unique identifier 906 .
- the distinct hidden unique identifiers 906 can be revealed by exposure to a plurality of wavelengths (e.g., the range of wavelengths present in sunlight or produced by fluorescent or incandescent lighting).
- a method 1000 of verifying the authenticity of a product through a plurality of stages of a supply chain is provided.
- step S 1002 a product having a plurality of distinct hidden unique identifiers is provided as described herein.
- the product can be received within tamper-evident packaging as discussed herein.
- the hidden unique identifier is optionally revealed.
- the hidden unique identifier 906 can be revealed as part of the method or another entity can reveal the hidden unique identifier 906 , with our without the instructions of the entity practicing the method.
- the hidden unique identifier 906 can be revealed by a human or a machine.
- various devices for opening blister packs are described in U.S. Pat. Nos. 5,431,283; 5,853,101; 7,051,898; and 7,284,661; as well as U.S. Patent Application Publication Nos. 2008/0083309 and 2009/0199346.
- the revealed unique identifier is optionally received from a supply chain actor.
- the revealed unique identifier can be received via a communication means such as voice, telephone, gestures, human-machine interactions, key presses, facsimile, e-mail, Internet communications, Short Message Service (SMS), Unstructured Supplementary Service Data (USSD), Process Supplementary Service Request (PSSR), Unstructured Supplementary Service Request (USSR), Unstructured Supplementary Service Notify (USSN), SIM Application Toolkit (STK), and the like, as well as other common telephony and Internet standards.
- SMS Short Message Service
- USSD Unstructured Supplementary Service Data
- PSSR Process Supplementary Service Request
- USSR Unstructured Supplementary Service Request
- USSN Unstructured Supplementary Service Notify
- STK SIM Application Toolkit
- the revealed unique identifier is compared to one or more known unique identifiers.
- the one or more known unique identifiers can be stored in a secure location such as a database, computer-readable medium, and the like.
- the known unique identifiers can be associated with a status such as “valid,” “invalid,” “used,” “stolen,” “compromised,” “diverted,” and the like,
- a communication regarding the revealed unique identifier is transmitted, for example, to the supply chain actor that submitted the verification request.
- the communication can be as simple as “authentic” or “not authentic” or can be more complex and can include further information on why the product is not authentic, instructions on how to report an unauthentic product, instructions for obtaining an authentic product, and the like.
- An unauthentic unique identifier can also be referred to one or more appropriate individuals or entities for investigation.
- step S 1102 one or more unique identifiers are provided.
- the one or more unique identifiers can be provided from list of unique identifiers (e.g., stored on a database) or can be generated in real time (e.g., using a random number generator or other algorithm).
- step S 1104 the one or more unique identifiers are applied to a product.
- the unique identifiers can be applied according to the techniques described herein.
- the unique identifiers can be placed within or applied to tamper-evident packaging and can optionally be concealed.
- the unique identifiers can be recorded (e.g., if not previously recorded).
- the unique identifiers can be associated with data about the manufacture of the product (e.g., date of manufacture, batch information, and the like).
- the unique identifiers can also be associated with the other unique identifiers applied to the product.
- step S 1108 the product is transferred to one or more supply chain actors.
- step S 1110 the subsequent supply chain actor can optionally verify the authenticity of the unique identifier and thereby verify the authenticity of the product.
- step S 1112 a unique identifier can be revealed as discussed herein.
- the revealed unique identifier is transmitted to a central repository of unique identifiers.
- the central repository can be the manufacturer or distributor of the product or can be a third party.
- the unique identifier can be transmitted via a variety of mediums including electronic and manual transmissions.
- a supply chain actor can use a cell phone to transmit an SMS text message containing the revealed unique identifier to defined destination.
- the supply chain actor can transmit the revealed unique identifier through a telephone in response to human or automated prompts.
- a supply chain actor can utilize a Web form or other networked application to transmit the revealed unique identifier.
- the supply chain actor can use a scanning device to read the revealed unique identifier for immediate or later transfer,
- the revealed unique identifier is compared to stored unique identifier. For example, a query containing the revealed unique identifier can be executed against a database containing a plurality of unique identifiers. Information regarding the revealed unique identifier can then be examined (e.g., by a computer). For example, the revealed unique identifier can be deemed unauthentic if the unique identifier was not recorded as assigned to product or was previously validated. Other information can also be provided. For example, if the difference between the current date and the date of manufacture optionally stored with the revealed unique identifier exceeds a defined interval, the product can be deemed to be expired.
- step S 1118 information regarding the revealed unique identifier can be recorded.
- This information can include the revealed unique identifier that was validated, the time of validation, and the like. More advanced information can also be stored to enable more sophisticated analysis of the stored data. For example, the origin of the verification request (e.g., telephone number, location of the telephone, and the like) can be recorded. Recordation of this information allows for identification of anomalous patterns. For example, the revelation and transmission of a first unique identifier from Zaire followed by the revelation and transmission of a second unique identifier in Ukraine can be flagged as suspicious. Moreover, tracking of locations can allow manufacturers to learn more about the distribution patterns of their products, particularly in developing countries and in gray markets.
- Information regarding the revealed unique identifier can also include time and date information about when the unique identifier was submitted for validation. Such information is valuable to manufacturers, distributors, and the like because it provide an accurate measure of the duration between manufacture and use by the end consumer and/or the duration of various stages of the supply chain.
- the invention enables to collection of this information in cash-based economies that do not present the data collection and mining opportunities associated with electronic transactions such as those utilizing credit or debit cards.
- step S 1120 a message regarding the authenticity of the revealed unique identifier (and thereby, the product) is transmitted back to the individual that originally transmitted the revealed unique identifier.
- the response message can be transmitted in the same or different manner as the original message.
- unique identifiers can be incorporated directly within individual products, groups of products, and/or product packaging. Various approaches may be favored in certain situations depending on the nature of the product, the nature of the packaging, and the nature of the distribution chain for the product.
- the incorporation of unique identifiers within product packaging may be favored for pharmaceuticals because of the limited space for printing unique identifiers on individual pills and the inability to print a unique identifier on liquid and aerosol forms of pharmaceuticals.
- the printing of unique identifiers directly onto a wine label and/or etching or stamping of a unique identifier direction onto a wine bottle may be preferred because wine bottles are often not sold with any additional packaging.
- the incorporation of unique identifiers directly into artwork may be preferred because any packaging for such artwork (e.g., crates for sculptures) is typically not retained by the owner.
- one or more unique identifiers 1206 can be applied to a ticket 1200 (e.g., a ticket to a concert or sporting event) or other voucher. Such a unique identifier 1206 enables verification of the authenticity of the ticket 1200 on the secondary market (e.g., when purchasing from a ticket broker, scalper, and the like).
- a plurality of unique identifiers 1206 a - 1206 d can be applied to the ticket 1200 and can selectively revealed using the techniques and materials discussed herein or can be viewable at all times.
- Unique identifiers 1206 can be selectively removed (e.g., through the use of perforations 1208 ). In such an embodiment, each unique identifier 1206 can be removed from the ticket after verification.
- the unique identifiers 1206 can be printed in a specific order and can be optionally labeled with an ordinal number so that users know which unique identifier 1206 to utilize first. For example, unique identifier 1206 a can be utilized for verification in a first transaction before being removed from ticker 1200 . Unique identifier 1206 b can then be utilized for verification in a second transaction, and so on.
- Ticket 1200 can include other information for processing the ticket 1200 (e.g., when the bearer of the ticket 1200 seeks to enter the venue for the event).
- the ticket 1200 can include a barcode 1208 .
- a method 1300 of verifying the authenticity of a ticket or other voucher is provided.
- ticket will be used in this description for conciseness.
- a ticket bearing multiple unique identifiers is provided.
- the ticket may be ticket 1200 as described herein.
- the ticket is transferred.
- the ticket can be sold from a ticket issuer (e.g., a concert or sporting venue or a promoter such as Live Nation of Beverly Hills, Calif.) to directly to a consumer or a ticket broker, from a ticket broker to a consumer, from a consumer to a ticket broker, from a consumer to a consumer, and the like.
- a ticket issuer e.g., a concert or sporting venue or a promoter such as Live Nation of Beverly Hills, Calif.
- step S 1306 the authenticity of one of the unique identifiers is verified. In many embodiments, this verification will take place in conjunction with a transfer, but can occur separately from a transaction.
- the authenticity of a unique identifier can be verified through one or more steps as described herein.
- the unique identifier can be revealed (S 1308 ), if hidden.
- the unique identifier can be transmitted to a central repository of unique identifiers in step S 1310 for verification.
- the central repository of unique identifiers can be the ticket issuer or can be a third party engaged by the ticket issuer.
- step S 1312 the received unique identifier can be compared with a stored unique identifier.
- step S 1314 information regarding the received unique identifier can be recorded in the central repository of unique identifiers
- step S 1316 a message regarding the authenticity of the received unique identifier can be transmitted to the individual seeking to verify its authenticity.
- the unique identifier can optionally be marked as “used.” This can be accomplished in a variety of ways including physical removal of the portion of the ticket containing the verified unique identifier (e.g., by utilizing perforations 1208 on ticket 1200 ), by marking the verified unique identifier with ink or other marking means, and/or by designation of the unique identifier as “used” in a database. In some embodiments, a single unique identifier can be validated several times before being marked as “used” in the database, thereby allowing for multiple transfers of the ticket before exhausting all of the unique identifiers.
- the ticket can be optionally redeemed in step S 1320 for a new ticket.
- the ticket can be presented to the ticket issuer, who can optionally charge a fee for the new ticket.
- step S 1322 the new ticket can be transferred and the steps described above can be repeated for future transactions.
- any functional element may perform fewer, or different, operations than those described with respect to the illustrated embodiment.
- functional elements e.g., modules, databases, computers, clients, servers and the like
- shown as distinct for purposes of illustration may be incorporated within other functional elements, separated in different hardware, or distributed in a particular implementation.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Mechanical Engineering (AREA)
- Packages (AREA)
- Storage Device Security (AREA)
- Bag Frames (AREA)
- Cartons (AREA)
- Printing Methods (AREA)
- Pinball Game Machines (AREA)
- Auxiliary Devices For And Details Of Packaging Control (AREA)
Abstract
Various aspects of the invention provide systems and method for verifying authenticity of a product. Another aspect of the invention provides a system including: a tamper-evident package; and a unique identifier usable to verify the authenticity of the product, the unique identifier contained within the tamper-evident package. The unique identifier cannot be detected from outside of the tamper-evident package without demonstrating evidence of tampering. Another aspect of the invention provides a system including: a tamper-evident package; and a concealed unique identifier coupled to the tamper-evident package. Another aspect of the invention provides a method of providing a providing a unique identifier. The method includes: providing a tamper-evident package; and placing the unique identifier within the tamper-evident package, wherein the unique identifier cannot be detected from outside of the tamper-evident package.
Description
- This application claims priority to U.S. Provisional Patent Application Ser. Nos. 61/321,525 and 61/321,530, both filed on Apr. 7, 2010. The entire contents of each application are hereby incorporated by reference herein.
- Counterfeit goods remain a significant economic and consumer safety problem. Counterfeit pharmaceuticals pose particular safety problems because of the difficulty for even the most highly-educated consumers to determine whether a pharmaceutical product contains the correct quantity of an active ingredient or any active ingredient at all.
- Various approaches have been used to combat counterfeit goods, For example, intricate packaging and labels have often been used under the theory that such labels are difficult for the would-be counterfeiter to mimic. However, advances in technology have lowered the prices for sophisticated printing equipment, thereby improving the quality of counterfeit packaging.
- Accordingly, there is a need for new methods and devices for verifying authenticity of a product.
- Various aspects of the invention provide systems and methods for verifying the authenticity of a product.
- One aspect of the invention provides a system including a tamper-evident package and a unique identifier usable to verify the authenticity of the product. The unique identifier is contained within the tamper-evident package. The unique identifier cannot be detected from outside of the tamper-evident package without demonstrating evidence of tampering.
- The tamper-evident package can be a blister pack. The blister pack can include a blister material and a lidding material defining one or more cavities, The unique identifier can be printed on the blister material. The unique identifier can be printed on the lidding material.
- A region of the tamper-evident package containing the unique identifier can be opaque, The unique material can be printed on a substrate received within the tamper-evident package. The substrate can be folded. The substrate can be rolled.
- The system can include a further unique identifier. The further unique identifier is mathematically-related to the unique identifier.
- The product can be a pharmaceutical product. The product can be selected from the group consisting of consumer goods, electronic goods, alcoholic beverages, electronic media, luxury goods, cosmetics, and software.
- Another aspect of the invention provides a system including: a tamper-evident package and a concealed unique identifier coupled to the tamper-evident package.
- The concealed unique identifier can be concealed by a removable opaque coating. The concealed unique identifier can be concealed by a substrate. The substrate can be perforated. The concealed unique identifier can be revealed by a change in environmental conditions selected from the group consisting of: exposure to a temperature change, exposure to air, exposure to water, exposure to solvents, exposure to light, and exposure to radiation.
- Another aspect of the invention provides a method of providing a providing a unique identifier, The method includes: providing a tamper-evident package and placing the unique identifier within the tamper-evident package. The unique identifier cannot be detected from outside of the tamper-evident package.
- The tamper-evident package can be a blister pack. The method can include scaling the tamper-evident package. A region of the tamper-evident package containing the unique identifier can be opaque. The unique identifier can be printed on a substrate received within the tamper-evident package.
- Another aspect of the invention provides a method of providing a providing a unique identifier. The method includes: providing a tamper-evident package; placing the unique identifier on the tamper-evident package; and concealing the unique identifier.
- Another aspect of the invention provides a system including: a tamper-evident package; and a unique identifier usable to verify the authenticity of the product, the unique identifier contained within the tamper-evident package. The unique identifier cannot be detected from outside of the tamper-evident package without demonstrating evidence of tampering.
- This aspect of the system can have a variety of embodiments. The tamper-evident package can be a blister pack, The blister pack can include a blister material and a lidding material defining one or more cavities. The unique identifier can be printed on the blister material. The unique identifier can be printed on the lidding material.
- A region of the tamper-evident package containing the unique identifier can be opaque.
- The unique material can be printed on a substrate received within the tamper-evident package. The substrate can be folded. The substrate can be rolled.
- The system can include a further unique identifier, The further unique identifier can be mathematically related to the unique identifier.
- The product can be a pharmaceutical product. The product can be selected from the group consisting of consumer goods, electronic goods, alcoholic beverages, electronic media, luxury goods, cosmetics, and software.
- Another aspect of the invention provides a system including: a tamper-evident package; and a concealed unique identifier coupled to the tamper-evident package.
- This aspect of the invention can have a variety of embodiments. The concealed unique identifier can be concealed by a removable opaque coating. The concealed unique identifier can be concealed by a substrate. The substrate can be perforated.
- The concealed unique identifier can be modified by one or more selected from the group consisting of: exposure to an environmental condition, exposure to a substance, and use of a lens of a defined wavelength. The environmental condition can be selected from the group consisting of: a temperature, light, energy, stress, strain, and magnetic forces. One or more of the plurality of distinct hidden unique identifiers can be modified by exposure to the environmental condition for a defined period of time. The substance can be water.
- The concealed unique identifier can be removably coupled to the tamper-evident package.
- Another aspect of the invention provides a method of providing a providing a unique identifier. The method includes: providing a tamper-evident package; and placing the unique identifier within the tamper-evident package, wherein the unique identifier cannot be detected from outside of the tamper-evident package.
- This aspect of the invention can have a variety of embodiments. The tamper-evident package can be a blister pack. The method can include sealing the tamper-evident package. A region of the tamper-evident package containing the unique identifier can be opaque. The unique identifier can be printed on a substrate received within the tamper-evident package.
- Another aspect of the invention provides a method of providing a providing a unique identifier. The method includes: providing a tamper-evident package; placing the unique identifier on the tamper-evident package; and concealing the unique identifier.
- For a fuller understanding of the nature and desired objects of the present invention, reference is made to the following detailed description taken in conjunction with the figure wherein:
-
FIGS. 1 and 2 depict cross-sections of tamper-evident packages containing a unique identifier according to the invention; -
FIG. 3 depicts a blister pack having a unique identifier printed on the lidding material according to the invention; -
FIG. 4 depicts a tamper-evident package containing a unique identifier that can be coupled to an item according to the invention; - FIGS. 5 and 6A-6C depict environmentally-sensitive unique identifiers according the invention;
-
FIGS. 7 and 8 depict methods of providing a unique identifier according to the invention; -
FIG. 9 depicts a tamper-evident package according to the invention; -
FIG. 10 depicts a method of verifying the authenticity of a product through a plurality of stages of a supply chain according to the invention; -
FIG. 11 depicts an exemplary workflow according to the invention; -
FIG. 12 depicts a ticket including a plurality of unique identifiers according to the invention; and -
FIG. 13 depicts a method of verifying the authenticity of a ticket or other voucher according to the invention. - The instant invention is most clearly understood with reference to the following definitions:
- As used in the specification and claims, the singular form “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
- The term “visible” refers to any feature that is perceptible at a defined wavelength. Such a wavelength can be the portion of the electromagnetic spectrum perceptible to the human eye (i.e., between about 390 nm to about 750 nm). Such a wavelength can additionally or alternatively include other wavelengths visible through the use of machines and/or lenses.
- The term “opaque” refers to any material that does not permit the perception of a feature from across the material at a defined wavelength. Such a wavelength can be the portion of the electromagnetic spectrum perceptible to the human eye (i.e., between about 390 nm to about 750 nm). Such a wavelength can additionally or alternatively include other wavelengths visible through the use of machines and/or lenses.
- The term “environmental condition” refers to any ambient condition that can affect a product and/or the visibility of a unique identifier. Examples of environmental conditions include light, temperature, pressure, energy, and like. As used herein, environmental conditions may, but need not be, modified by a temporal duration, For example and as discussed further herein, exposure to a slightly elevated temperature for a short period of time may not be sufficient to compromise a product or cause a unique identifier to be revealed and/or modified. However, exposure to the same slightly elevated temperature for a 6 hours may be sufficient to compromise the product cause the unique identifier to be revealed and/or modified.
- Various aspects of the invention provide systems and methods for verifying the authenticity of a product, for example, products that are perishable, likely to be counterfeited, and/or likely to be mishandled.
- Exemplary products include pharmaceutical products such as vaccines, pills, capsules, tablets, orally disintegrating tablets, films, osmotic-controlled release oral delivery systems (OROS), elixirs, emulsions, syrups, suspensions, tinctures, inhalers, nebulizers, eye drops, ear drops, ointments, creams, lotion, liniments, gels, pastes, medicated shampoos, transdermal implants, transdermal patches, intranasal pharmaceuticals, subcutaneous (SC) pharmaceuticals, intravenous (IV) pharmaceuticals, intramuscular (IM) pharmaceuticals, intraosseuous pharmaceuticals, intraperitoneal (IP) pharmaceuticals, intrathecal pharmaceuticals, intracavernosal pharmaceuticals, pessaries, vaginal rings, intrauterine devices, suppositories, and the like.
- Other exemplary products include consumer goods (e.g., clothing, luggage, and the like), electronic goods, foodstuffs, alcoholic beverages (e.g., beer, wine, spirits, and the like), electronic media (e.g., compact discs, digital video discs, and the like), luxury goods (e.g., jewelry, watches, perfumes, and the like), cosmetics, software, and the like.
- Referring now to
FIG. 1 , some embodiments of the invention provide asystem 100 for verifying the authenticity of a product 102 containing therein. The system includes a tamper-evident package 104 and aunique identifier 106 contained within or as part of the tamper-evident package 104. - Tamper-
evident package 104 can be any package configured such that an end user can easily identify if the product 102 and/or theunique identifier 106 were previously removed or altered. For example, tamper-evident package 104 can be any package that requires a visible alteration to access the unique identifier. In specific examples, the user can be required to: open a bottle to view a unique identifier under a cap; open a box or sachet to view a unique identifier within the box or sachet; open an envelope to view a unique identifier within the sachet; squeeze a unique identifier out of a tube of product; open a packet (e.g., of hard-molded plastic) to access a unique identifier; pour a unique identifier out of a package (e.g., TETRA PAK® packages). - As depicted in
FIG. 1 , the tamper-evident package 104 can be a blister pack (also known as a “push-through-pack”) consisting of ablister material 108 and alidding material 110 defining one or more cavities 112. Blister packs and methods of fabricating the same are described in D. A. Dean, Blister, Strip & Sachet Packaging in Pharmaceutical Packaging Technology (D. A. Dean et al., eds. 2000). - The blister pack can be formed from a variety of existing materials known to those of skill in the art. For example, the
blister material 108 can be fabricated from plastics such as polyvinyl chloride (PVC), polychlorotrifluoro ethylene (PCTFE), cyclic olefin polymers (COP), cyclic olefin copolymers (COC), polypropylene (PE), polyethylene (PE), glycol-modified polyethylene terephthalate (PETg), and the like, as well as combinations and/or laminates thereof.Lidding material 110 can be fabricated from a foil, for example, a metallic foil such as aluminum foil. Thelidding material 110 can be bonded to theblister material 108 with one or more adhesives known by those of skill in the art to be suitable for bonding aparticular blister material 108 and aparticular lidding material 110. Suitable materials are further described in Edward J. Bauer, Pharmaceutical Packaging Handbook 189-272 (2009). -
Unique identifier 106 can be any sequence of one or more characters that uniquely identifies a product. For example,unique identifier 106 can be a sequence of numerals (e.g., “1234567890”), a sequence of letters (e.g., “ABCDEFGHIJ”), a sequence of non-alphanumeric characters, and the like or a combination of the above. Although the examples herein utilize Arabic numerals and Latin characters, unique identifiers can be composed of other numerals and characters.Unique identifier 106 can also be a bar code or a matrix code (i.e., a two-dimensional bar code), A distinct unique identifier can be assigned to each individual product or a single unique identifier can be assigned to multiple products. -
Unique identifiers 106 can be automatically generated with computers, printers, labeling machinery, and the like. For example,unique identifiers 106 can be generated with a random number generator.Unique identifiers 106 can be stored by the manufacturer and associated with a variety of data such as the time and date of manufacture, the location of manufacture, the distributor of the product, the status of theunique identifier 106, and the like. - The
unique identifier 106 can be printed on a substrate (e.g., a piece of paper, card stock, cardboard, plastic, and the like) as depicted inFIG. 1 . Preferably, theunique identifier 106 cannot be viewed be without opening the tamper-evident package 104. In order to obscure the unique identifier, the substrate can be rolled as depicted inFIG. 1 , folded (e.g., like an accordion), and the like. The tamper-evident package 104 can be wholly or partially composed of an opaque material, - The unique identifier can be printed on the
blister material 108 and/or thelidding material 110. - Additional media can be placed in other blister cavities. Such media can contain additional unique identifiers and/or marketing materials.
- Cavities 112 containing the unique identifier or other additional media can have the same, similar, or different colors, shapes, and/or dimensions as other cavities (e.g., cavities containing pharmaceuticals). For example, cavities 112 can be substantially round, oval, rectangular, or the like.
- Referring now the
FIG. 2 , the invention also provides asystem 200 including a tamper-evident package 204 including a concealedunique identifier 206 coupled to the tamper-evident package 204. The concealedunique identifier 206 can be coupled to the tamper-evident package 204 by a variety of techniques. The concealedunique identifier 206 can be printed, stamped, or written on the tamper-evident package 204. The concealedunique identifier 206 can be printed on another media (e.g., paper, cardboard, and the like) and bonded to tamper-evident package 204 with a chemical or mechanical fastener (e.g., during repackaging). - The concealed
unique identifier 206 can be configured to conceal a unique identifier until the end user wishes to verify the authenticity of the product 202. For example, the concealedunique identifier 206 can be a scratchcard-type material in which the unique identifier is covered by a removable opaque coating (e.g., latex). In another example, the concealedunique identifier 206 can be concealed by a substrate such as a sheet of paper, cardstock, cardboard, plastic, or the like. For example, the concealedunique identifier 206 can be covered by a perforated substrate that is torn during authentication. In still another example, the concealed unique identifier is concealed by one or more layers of removable tape (e.g., two-layer tape). - Referring now to
FIG. 3 , theunique identifier 306 can be printed on the inside of the tamper-evident package 304, for example on the inside of theblister material 308 orlidding material 310 in a blister pack.Lidding material 310 can be peeled by the end user (e.g., through the use of atab 314 to reveal theunique identifier 306.Cavity material 308 is preferably opaque so that theunique identifier 306 cannot be viewed until thelidding material 310 is removed. Such arrangements can be particularly advantageous because they require little modification to existing packaging machinery and therefore can be produced at low cost. Moreover, such embodiments do not require any modification of existing blister packs. Indeed,blister 312 a can contain a pill or other product. - Referring now to
FIG. 4 , a tamper-evident package 402 containing aunique identifier 404 can be coupled toitem 406 to allow for the authentication of theitem 406. The tamper-evident package 402 can be a blister pack as discussed herein. The tamper-evident package 402 can be coupled to the item through a variety of means including mechanical and chemical fasteners. As discussed herein,unique identifier 404 can be printed in media received within the tamper-evident package 402 or can be printed directly on theblister material 408 and/orlidding material 410. - Tamper-
evident package 402 can optionally be removed byitem 406 after verification by the end user or other individual. For example, tamper-evident package 402 anditem 406 can be detachably coupled through use of a temporary adhesive such as those available from Glue Dots International of New Berlin, Wis. - It is preferable that the end user is able to quickly identify if the
unique identifier unique identifier packaging - Referring now to
FIG. 5 , theunique identifier 506 can be revealed by a change inenvironmental conditions 516 such exposure to a temperature change, exposure to air, exposure to water, exposure to solvents, exposure to light, and exposure to radiation. Preferably, the revelation of theunique identifier 506 is irreversible so that the end user is alerted that theunique identifier 506 was previously viewed, which suggests that a counterfeiter recycled old packaging. In other configurations, the unique identifier is transitory such that the unique identifier can only be temporarily viewed. - As depicted in
FIG. 6A , theunique identifier 606 a can be obscured by amark 618 a that becomes visible in response to anenvironmental condition 616 as discussed above. The obscuringmark 618 a can be revealed by exposure to radiation incident to exposure of theunique identifier 606 a during authentication. Additionally or alternatively, the obscuringmark 618 a can be revealed by exposure to unacceptable environmental conditions. For example, the obscuringmark 618 a can be revealed if the obscuring mark (and the product associated therewith) is exposed to heat, cold, humidity, and the like. Such arrangements are particularly advantageous for pharmaceuticals such as vaccines that are particularly sensitive to environmental conditions such as heat. - The obscuring
mark 618 a can be the same or a different color than theunique identifier 606 a and can partially or completely obscure theunique identifier 606 a. - Referring now to
FIG. 6B , another embodiment of the invention provides a one-time-use unique identifier 608 b that does not require the consumer's judgment in order to assess whether the unique identifier 608 b was previously viewed and/or is otherwise compromised. Unique identifier 608 b consists of a number of characters (e.g., 11 digits). One or more of the characters (the third, sixth, and ninth digits in the example illustrated inFIG. 6B ) are printed in an environmentally-sensitive ink (e.g., a temperature sensitive ink) represented by light shading inFIG. 6B . If the user reads the unique identifier 608 b before the unique identifier 608 b (and the product associated therewith) is exposed to an environmental condition (e.g., high or low temperatures) the characters printed in the environmentally-sensitive ink will not be visible. For example, the user of the unique identifier 608 b inFIG. 6B would see the code “78 28 02 46” and submit this code for verification as discussed herein. However, if the unique identifier 608 b (and the product associated therewith) is exposed to an environmental condition (e.g., high or low temperatures), the characters printed in the environmentally-sensitive ink will become visible. For example, the user of the unique identifier 608 b inFIG. 6B would see the code “78528602846” and submit this code for verification as discussed herein, thereby triggering a different response. - Referring now to
FIG. 6C , another embodiment of the invention provides a unique identifier 608 c encoded in a seven-segment display. Various segments of each digit can be printed in environmentally sensitive ink (depicted in dashed outline) such that when the unique identifier 608 c is exposed to an environmental stimulus, the visible unique identifier 608 c changes from “0123456789” to “8789968388.” For example, 0 can change to 8, 1 can change to 7, 2 can change to 8, 3 can change to 9, 4 can change to 9, 5 can change to 6, 6 can change to 8, 7 can change to 3, 8 can be maintained as 8, and 9 can change to 8. - Various combinations of environmentally-sensitive inks can be utilized to obtain more detailed information regarding the environmental exposure of the unique identifiers 608 a or 608 b (and the product associated therewith). For example, each of the hidden digits or segments can be printed in a different ink that becomes visible at various temperatures. Thus, by analyzing which characters are visible, one can determine not only whether the unique identifier 608 a was exposed to heat or cold, but also identify one or more temperature ranges. Likewise, certain digits or segments can be printed in light-sensitive ink while other digits or segments can be printed in temperature-sensitive link.
- The environmentally-sensitive inks discussed herein can be calibrated to become visible in response to exposure to an environmental condition (e.g., temperature and/or light) for a specified duration (e.g., 5 minutes, 15 minutes, 30 minutes, 1 hour, 3 hours, 6 hours, 12 hours, 1 day, and the like). The appearance of the environmentally-sensitive inks can vary as a function of both time and temperature. For example, exposure of an environmentally-sensitive ink to an ambient temperature of 50° C. for 60 minutes can produce the same effect as exposure of the environmentally-sensitive ink to an ambient temperature of 75° C. for 30 minutes.
- Additionally or alternatively, environmentally-sensitive inks that disappear (as opposed to appear) when exposed to environmental conditions can be utilized to produce changing unique identifiers. In such an embodiment, the environmentally-sensitive ink would disappear upon exposure to an environmental condition, thereby producing a unique identifier. For example, inks that disappear upon exposure to temperatures are available from Chromatic Technologies of Colorado Springs, Colo.
- In still another embodiment, environmentally-sensitive inks can be activated by forces such as stress, strain, and/or magnetism. For example, the segments of the unique identifiers can include liquid crystals that experience a change in optical properties upon exposure to stress, strain, and/or magnetism.
- Notably, the user utilizes the same authentication process regardless of whether the unique identifiers 608 b, 608 c was exposed to an environmental condition, Thus, the user does not need to interpret the unique identifiers 608 b, 608 c. Rather, the authentication service can provide further instructions if the unique identifier 608 b, 608 c was compromised.
- Multiple unique identifiers can be used in conjunction with the inventions herein. The multiple identifiers can appear in the same or separate location within the tamper-evident package. The multiple unique identifiers can be related or unrelated to each other. For example, package can have one visible unique identifier and one hidden unique identifier.
- Referring now to
FIG. 7 , amethod 700 of providing a unique identifier is provided. - In step S702, a package is provided. The package can be a tamper-evident package as provided herein.
- In step S704, the unique identifier is placed within the package. The unique identifier can be placed within the package by hand or with conventional or specialized automated machinery.
- In step S706, one or more products are optionally placed within the package. The one or more products can be placed within the package by hand or with conventional or specialized machinery.
- In step S708, the package is optionally sealed. The package can be sealed by hand or with conventional or specialized machinery. The sealing of the package can render the package tamper-evident.
- Referring now to
FIG. 8 , anothermethod 800 of providing a unique identifier is provided. - In step S802, a package is provided. The package can be a tamper-evident package as provided herein.
- In step S804, the unique identifier is placed on the package. The unique identifier can be placed on the package by hand or with conventional or specialized automated machinery.
- In step S806, the unique identifier is concealed. The unique identifier can be concealed by hand or with conventional or specialized automated machinery. For example, a removable opaque coating can be applied over the unique identifier. In another example, a substrate such as piece of paper, cardstock, cardboard, plastic, or the like is placed over the unique identifier as discussed herein.
- In step S808, one or more products are optionally placed within the package. The one or more products can be placed within the package by hand or with conventional or specialized machinery.
- In step S810, the package is optionally sealed. The package can be sealed by hand or with conventional or specialized machinery,
- Tracking of Products through a Supply Chain
- Referring now to
FIGS. 9A-9D , the invention provides a tamper-evident package 900 including a plurality of distinct hidden unique identifiers 906 that can be selectively revealed. - The hidden unique identifier 906 can be hidden unique identifiers 906 according to any of the teachings herein. For example, the hidden unique identifiers 906 can be covered by a removable opaque coating or a perforated substrate.
- In
FIG. 9A , none of the unique identifiers 906 are revealed. This can be the first state of thepackage 900, for example, at the time that thepackage 900 leaves a factory. - In
FIG. 9B , thepackage 900 is transferred to another level of the supply chain. For example, thepackage 900 can be sold from the manufacture to a wholesaler. Anyone wishing to verify the authenticity of the product contained inpackage 900 can reveal a firstunique identifier 906 a and verify theunique identifier 906 a as discussed herein. - In
FIG. 9C , thepackage 900 is transferred to another level of the supply chain. For example, thepackage 900 can be sold by the wholesaler to a retailer. Anyone wishing to verify the authenticity of the product contained inpackage 900 can reveal a secondunique identifier 906 b and verify theunique identifier 906 b as discussed herein. - In
FIG. 9D , thepackage 900 is transferred to another level of the supply chain. For example, thepackage 900 can be sold by the retailer to a consumer. Anyone wishing to verify the authenticity of the product contained inpackage 900 can reveal a third unique identifier 906 e and verify theunique identifier 906 c as discussed herein. - The
package 900 can be configured to include a distinct hidden unique identifier 906 corresponding to each stage of a supply chain. For example,package 900 can include a sufficient number of distinct hidden unique identifiers 906 such that a unique identifier 906 can be verified every time thepackage 900 is transferred from one supply chain actor to another supply chain actor. Thepackage 900 can also be configured to include sufficient unique identifiers 906 to allow for verification at other time points (e.g., when clearing customs). In still another example, the unique identifier 906 is not verified at every stage of the supply chain, but is rather verified at a subset of stages. - The distinct hidden unique identifiers 906 can be hidden in the same manner or in different manners. The distinct hidden unique identifiers can be detected with the human eye or can be detected utilizing optical or mechanical systems. For example, a bar code reader can be utilized to read unique identifiers 906 that are bar codes or matrix codes.
- In another example, the distinct hidden unique identifiers 906 are readable at distinct wavelengths. In such an example, a plurality of lenses can be used to read the distinct hidden unique identifiers 906. The distinct hidden unique identifier 906 can be related such that validation of one or more previous hidden unique identifiers 906 is required in order to validate a subsequent unique identifier 906. For example, the wavelength of a subsequent unique identifier 906 can be revealed upon validation of a previous unique identifier 906.
- In still another example, the distinct hidden unique identifiers 906 can be revealed by exposure to a plurality of wavelengths (e.g., the range of wavelengths present in sunlight or produced by fluorescent or incandescent lighting).
- Referring now to
FIG. 10 , amethod 1000 of verifying the authenticity of a product through a plurality of stages of a supply chain is provided. - In step S1002, a product having a plurality of distinct hidden unique identifiers is provided as described herein. The product can be received within tamper-evident packaging as discussed herein.
- In step S1004, the hidden unique identifier is optionally revealed. The hidden unique identifier 906 can be revealed as part of the method or another entity can reveal the hidden unique identifier 906, with our without the instructions of the entity practicing the method. The hidden unique identifier 906 can be revealed by a human or a machine. For example, various devices for opening blister packs are described in U.S. Pat. Nos. 5,431,283; 5,853,101; 7,051,898; and 7,284,661; as well as U.S. Patent Application Publication Nos. 2008/0083309 and 2009/0199346.
- In step S1006, the revealed unique identifier is optionally received from a supply chain actor. The revealed unique identifier can be received via a communication means such as voice, telephone, gestures, human-machine interactions, key presses, facsimile, e-mail, Internet communications, Short Message Service (SMS), Unstructured Supplementary Service Data (USSD), Process Supplementary Service Request (PSSR), Unstructured Supplementary Service Request (USSR), Unstructured Supplementary Service Notify (USSN), SIM Application Toolkit (STK), and the like, as well as other common telephony and Internet standards.
- In step S1008, the revealed unique identifier is compared to one or more known unique identifiers. The one or more known unique identifiers can be stored in a secure location such as a database, computer-readable medium, and the like. The known unique identifiers can be associated with a status such as “valid,” “invalid,” “used,” “stolen,” “compromised,” “diverted,” and the like,
- In step S1010, a communication regarding the revealed unique identifier is transmitted, for example, to the supply chain actor that submitted the verification request. The communication can be as simple as “authentic” or “not authentic” or can be more complex and can include further information on why the product is not authentic, instructions on how to report an unauthentic product, instructions for obtaining an authentic product, and the like. An unauthentic unique identifier can also be referred to one or more appropriate individuals or entities for investigation.
- Referring now to
FIG. 11 , the inventions described herein are further explained in the context of the followingexemplary workflow 1100. - In step S1102, one or more unique identifiers are provided. The one or more unique identifiers can be provided from list of unique identifiers (e.g., stored on a database) or can be generated in real time (e.g., using a random number generator or other algorithm).
- In step S1104, the one or more unique identifiers are applied to a product. The unique identifiers can be applied according to the techniques described herein. For example, the unique identifiers can be placed within or applied to tamper-evident packaging and can optionally be concealed.
- In step S1106, the unique identifiers can be recorded (e.g., if not previously recorded). For example, the unique identifiers can be associated with data about the manufacture of the product (e.g., date of manufacture, batch information, and the like). The unique identifiers can also be associated with the other unique identifiers applied to the product.
- In step S1108, the product is transferred to one or more supply chain actors.
- In step S1110, the subsequent supply chain actor can optionally verify the authenticity of the unique identifier and thereby verify the authenticity of the product.
- In step S1112, a unique identifier can be revealed as discussed herein.
- In step S1114, the revealed unique identifier is transmitted to a central repository of unique identifiers. The central repository can be the manufacturer or distributor of the product or can be a third party. As discussed herein, the unique identifier can be transmitted via a variety of mediums including electronic and manual transmissions. For example, a supply chain actor can use a cell phone to transmit an SMS text message containing the revealed unique identifier to defined destination. Alternatively, the supply chain actor can transmit the revealed unique identifier through a telephone in response to human or automated prompts. In another example, a supply chain actor can utilize a Web form or other networked application to transmit the revealed unique identifier. In still another example, the supply chain actor can use a scanning device to read the revealed unique identifier for immediate or later transfer,
- In step S1116, the revealed unique identifier is compared to stored unique identifier. For example, a query containing the revealed unique identifier can be executed against a database containing a plurality of unique identifiers. Information regarding the revealed unique identifier can then be examined (e.g., by a computer). For example, the revealed unique identifier can be deemed unauthentic if the unique identifier was not recorded as assigned to product or was previously validated. Other information can also be provided. For example, if the difference between the current date and the date of manufacture optionally stored with the revealed unique identifier exceeds a defined interval, the product can be deemed to be expired.
- In step S1118, information regarding the revealed unique identifier can be recorded.
- This information can include the revealed unique identifier that was validated, the time of validation, and the like. More advanced information can also be stored to enable more sophisticated analysis of the stored data. For example, the origin of the verification request (e.g., telephone number, location of the telephone, and the like) can be recorded. Recordation of this information allows for identification of anomalous patterns. For example, the revelation and transmission of a first unique identifier from Zaire followed by the revelation and transmission of a second unique identifier in Kazakhstan can be flagged as suspicious. Moreover, tracking of locations can allow manufacturers to learn more about the distribution patterns of their products, particularly in developing countries and in gray markets.
- Information regarding the revealed unique identifier can also include time and date information about when the unique identifier was submitted for validation. Such information is valuable to manufacturers, distributors, and the like because it provide an accurate measure of the duration between manufacture and use by the end consumer and/or the duration of various stages of the supply chain. Advantageously, the invention enables to collection of this information in cash-based economies that do not present the data collection and mining opportunities associated with electronic transactions such as those utilizing credit or debit cards.
- In step S1120, a message regarding the authenticity of the revealed unique identifier (and thereby, the product) is transmitted back to the individual that originally transmitted the revealed unique identifier. The response message can be transmitted in the same or different manner as the original message.
- Incorporation of Unique Identifiers into Products and/or Product Packaging
- As discussed throughout the application, unique identifiers can be incorporated directly within individual products, groups of products, and/or product packaging. Various approaches may be favored in certain situations depending on the nature of the product, the nature of the packaging, and the nature of the distribution chain for the product.
- For example, the incorporation of unique identifiers within product packaging may be favored for pharmaceuticals because of the limited space for printing unique identifiers on individual pills and the inability to print a unique identifier on liquid and aerosol forms of pharmaceuticals.
- In another example, the printing of unique identifiers directly onto a wine label and/or etching or stamping of a unique identifier direction onto a wine bottle may be preferred because wine bottles are often not sold with any additional packaging.
- In still another example, the incorporation of unique identifiers directly into artwork (e.g., by the artist and preferably in a discrete location) may be preferred because any packaging for such artwork (e.g., crates for sculptures) is typically not retained by the owner.
- Referring now to
FIG. 12 , one or more unique identifiers 1206 can be applied to a ticket 1200 (e.g., a ticket to a concert or sporting event) or other voucher. Such a unique identifier 1206 enables verification of the authenticity of theticket 1200 on the secondary market (e.g., when purchasing from a ticket broker, scalper, and the like). - A plurality of unique identifiers 1206 a-1206 d can be applied to the
ticket 1200 and can selectively revealed using the techniques and materials discussed herein or can be viewable at all times. Unique identifiers 1206 can be selectively removed (e.g., through the use of perforations 1208). In such an embodiment, each unique identifier 1206 can be removed from the ticket after verification. The unique identifiers 1206 can be printed in a specific order and can be optionally labeled with an ordinal number so that users know which unique identifier 1206 to utilize first. For example,unique identifier 1206 a can be utilized for verification in a first transaction before being removed fromticker 1200.Unique identifier 1206 b can then be utilized for verification in a second transaction, and so on. -
Ticket 1200 can include other information for processing the ticket 1200 (e.g., when the bearer of theticket 1200 seeks to enter the venue for the event). For example, theticket 1200 can include abarcode 1208. - Referring now to
FIG. 13 , amethod 1300 of verifying the authenticity of a ticket or other voucher is provided. As above, the term “ticket” will be used in this description for conciseness. - In step S1302, a ticket bearing multiple unique identifiers is provided. For example, the ticket may be
ticket 1200 as described herein. - In step S1304, the ticket is transferred. For example, the ticket can be sold from a ticket issuer (e.g., a concert or sporting venue or a promoter such as Live Nation of Beverly Hills, Calif.) to directly to a consumer or a ticket broker, from a ticket broker to a consumer, from a consumer to a ticket broker, from a consumer to a consumer, and the like.
- In step S1306, the authenticity of one of the unique identifiers is verified. In many embodiments, this verification will take place in conjunction with a transfer, but can occur separately from a transaction.
- The authenticity of a unique identifier can be verified through one or more steps as described herein. For example, the unique identifier can be revealed (S1308), if hidden.
- The unique identifier can be transmitted to a central repository of unique identifiers in step S1310 for verification. The central repository of unique identifiers can be the ticket issuer or can be a third party engaged by the ticket issuer.
- In step S1312, the received unique identifier can be compared with a stored unique identifier.
- In step S1314, information regarding the received unique identifier can be recorded in the central repository of unique identifiers,
- In step S1316, a message regarding the authenticity of the received unique identifier can be transmitted to the individual seeking to verify its authenticity.
- In step S1318, the unique identifier can optionally be marked as “used.” This can be accomplished in a variety of ways including physical removal of the portion of the ticket containing the verified unique identifier (e.g., by utilizing
perforations 1208 on ticket 1200), by marking the verified unique identifier with ink or other marking means, and/or by designation of the unique identifier as “used” in a database. In some embodiments, a single unique identifier can be validated several times before being marked as “used” in the database, thereby allowing for multiple transfers of the ticket before exhausting all of the unique identifiers. - After several transactions, all of the unique identifiers may have been verified. If further transactions are desired, the ticket can be optionally redeemed in step S1320 for a new ticket. For example, the ticket can be presented to the ticket issuer, who can optionally charge a fee for the new ticket.
- In step S1322, the new ticket can be transferred and the steps described above can be repeated for future transactions.
- The functions of several elements may, in alternative embodiments, be carried out by fewer elements, or a single element. Similarly, in some embodiments, any functional element may perform fewer, or different, operations than those described with respect to the illustrated embodiment. Also, functional elements (e.g., modules, databases, computers, clients, servers and the like) shown as distinct for purposes of illustration may be incorporated within other functional elements, separated in different hardware, or distributed in a particular implementation.
- While certain embodiments according to the invention have been described, the invention is not limited to just the described embodiments. Various changes and/or modifications can be made to any of the described embodiments without departing from the spirit or scope of the invention. Also, various combinations of elements, steps, features, and/or aspects of the described embodiments are possible and contemplated even if such combinations are not expressly identified herein.
- The entire contents of all patents, published patent applications, and other references cited herein are hereby expressly incorporated herein in their entireties by reference.
Claims (28)
1. A system comprising:
a tamper-evident package; and
a unique identifier usable to verify the authenticity of the product, the unique identifier contained within the tamper-evident package;
wherein the unique identifier cannot be detected from outside of the tamper-evident package without demonstrating evidence of tampering,
2. The system of claim 1 , wherein the tamper-evident package is a blister pack.
3. The system of claim 1 , wherein the blister pack includes a blister material and a lidding material defining one or more cavities.
4. The system of claim 3 , wherein the unique identifier is printed on the blister material.
5. The system of claim 3 , wherein the unique identifier is printed on the lidding material.
6. The system of claim 1 , wherein a region of the tamper-evident package containing the unique identifier is opaque,
7. The system of claim 1 , wherein the unique material is printed on a substrate received within the tamper-evident package.
8. The system of claim 1 , wherein the substrate is folded.
9. The system of claim 1 , wherein the substrate is rolled.
10. The system of claim 1 , further comprising a further unique identifier.
11. The system of claim 1 , wherein the further unique identifier is mathematically related to the unique identifier.
12. The system of claim 1 , wherein the product is a pharmaceutical product.
13. The system of claim 1 , wherein the product is selected from the group consisting of consumer goods, electronic goods, alcoholic beverages, electronic media, luxury goods, cosmetics, and software.
14. A system comprising:
a tamper-evident package; and
a concealed unique identifier coupled to the tamper-evident package.
15. The system of claim 14 , wherein the concealed unique identifier is concealed by a removable opaque coating.
16. The system of claim 15 , wherein the concealed unique identifier is concealed by a substrate.
17. The system of claim 16 , wherein the substrate is perforated.
18. The system of claim 14 , wherein the concealed unique identifier is modified by one or more selected from the group consisting of exposure to an environmental condition, exposure to a substance, and use of a lens of a defined wavelength.
19. The system of claim 18 , wherein the environmental condition is selected from the group consisting of: a temperature, light, energy, stress, strain, and magnetic forces.
20. The system of claim 18 , wherein one or more of the plurality of distinct hidden unique identifiers can be modified by exposure to the environmental condition for a defined period of time.
21. The system of claim 18 , wherein the substance is water.
22. The system of claim 14 , wherein the concealed unique identifier is removably coupled to the tamper-evident package.
23. A method of providing a providing a unique identifier, the method comprising:
providing a tamper-evident package; and
placing the unique identifier within the tamper-evident package, wherein the unique identifier cannot be detected from outside of the tamper-evident package.
24. The method of claim 23 , wherein the tamper-evident package is a blister pack.
25. The method of claim 23 , further comprising:
sealing the tamper-evident package,
26. The method of claim 23 , wherein a region of the tamper-evident package containing the unique identifier is opaque.
27. The method of claim 23 , wherein the unique identifier is printed on a substrate received within the tamper-evident package.
28. A method of providing a providing a unique identifier, the method comprising:
providing a tamper-evident package;
placing the unique identifier on the tamper-evident package; and
concealing the unique identifier.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/081,882 US20110247960A1 (en) | 2010-04-07 | 2011-04-07 | Systems and methods for verifying authenticity of a product |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32152510P | 2010-04-07 | 2010-04-07 | |
US32153010P | 2010-04-07 | 2010-04-07 | |
US13/081,882 US20110247960A1 (en) | 2010-04-07 | 2011-04-07 | Systems and methods for verifying authenticity of a product |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110247960A1 true US20110247960A1 (en) | 2011-10-13 |
Family
ID=44760163
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/081,882 Abandoned US20110247960A1 (en) | 2010-04-07 | 2011-04-07 | Systems and methods for verifying authenticity of a product |
US13/081,909 Abandoned US20110251969A1 (en) | 2010-04-07 | 2011-04-07 | Systems and methods for verifying authenticity of a product |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/081,909 Abandoned US20110251969A1 (en) | 2010-04-07 | 2011-04-07 | Systems and methods for verifying authenticity of a product |
Country Status (6)
Country | Link |
---|---|
US (2) | US20110247960A1 (en) |
EP (1) | EP2556463A2 (en) |
JP (1) | JP2013528536A (en) |
BR (2) | BR112012025563A2 (en) |
TW (2) | TW201204568A (en) |
WO (2) | WO2011127279A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110225100A1 (en) * | 2010-03-12 | 2011-09-15 | Pharmasecure, Inc. | System, method and interface display for verifying and managing distribution and sales of medicine |
US20110251969A1 (en) * | 2010-04-07 | 2011-10-13 | Sproxil, Inc | Systems and methods for verifying authenticity of a product |
GB2497524A (en) * | 2011-12-12 | 2013-06-19 | Fabrizio Ferrante | Method of anti-fraud protection for commercial products |
US9202194B1 (en) | 2011-03-08 | 2015-12-01 | GlobalSubmit, Inc. | Tracking the distribution of a product or package through a supply chain to determine authenticity and detect breaches |
WO2016172503A1 (en) * | 2015-04-23 | 2016-10-27 | I-Property Holding Corp. | Simple authentication of elements in blister packages |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PT2619975T (en) * | 2010-09-20 | 2018-06-07 | Fraunhofer Ges Zur Foerderung Der Angewandten Forschung | Method for differentiating background and foreground of a setting and method for replacing a background in images of a setting |
US20120290490A1 (en) * | 2011-05-10 | 2012-11-15 | Michael Young | System and method for displaying product certification |
DE102011051740A1 (en) * | 2011-07-11 | 2013-01-17 | Verprosys Gmbh | Identification of counterfeit goods |
WO2014023771A1 (en) * | 2012-08-08 | 2014-02-13 | Sanofi-Aventis Deutschland Gmbh | Drug delivery device with tamper-evident closure |
US9697526B2 (en) * | 2013-07-17 | 2017-07-04 | Covectra, Inc. | Systems and methods for authenticating goods |
US20150052069A1 (en) * | 2013-08-19 | 2015-02-19 | Joseph John Hilo | System And Method For Detecting Fraudulent Purchases And Returns |
US20160027021A1 (en) * | 2014-07-24 | 2016-01-28 | Andrew Kerdemelidis | Product Authenticator |
IL252139B (en) * | 2014-11-06 | 2022-07-01 | Altria Client Services Llc | Methods and products for product tracing and authentication using conductive inks |
US10318781B2 (en) * | 2015-03-30 | 2019-06-11 | Temptime Corporation | Two dimensional barcode with dynamic environmental data system, method, and apparatus |
US10546172B2 (en) | 2015-03-30 | 2020-01-28 | Temptime Corporation | Two dimensional barcode with dynamic environmental data system, method, and apparatus |
KR101819091B1 (en) * | 2015-11-27 | 2018-01-16 | 주식회사 나노브릭 | Display Device for Certifying Genuine and Method for Using Thereof |
US10395078B1 (en) * | 2017-02-23 | 2019-08-27 | International Business Machines Corporation | Digital fingerprint generation using sensor embedded packaging elements |
US10338007B2 (en) | 2017-02-23 | 2019-07-02 | International Business Machines Corporation | System and method for detecting package tampering |
EP3460722A1 (en) | 2017-09-22 | 2019-03-27 | Authentic Vision GmbH | Tamper-activated authenticable security device |
US11068761B2 (en) | 2018-12-13 | 2021-07-20 | Evrythng Ltd. | Dynamic product tag based on an environmental condition |
US11405194B2 (en) * | 2019-09-24 | 2022-08-02 | CannVerify LLC | Anti-counterfeiting system and method of use |
US20210383406A1 (en) * | 2020-06-08 | 2021-12-09 | Physical 2 Digital Limited | Managing certification and importation information for supply chains |
US12020097B1 (en) | 2023-01-31 | 2024-06-25 | Temptime Corporation | 2D bar code using active overlays |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5524758A (en) * | 1995-06-30 | 1996-06-11 | Lupul; Troy D. | Authentication packaging for replacement parts |
US5603201A (en) * | 1994-02-04 | 1997-02-18 | Lafata; John E. | Packaging system |
US6053321A (en) * | 1998-07-17 | 2000-04-25 | Kayser; Steven L. | Blister pack display card with reusable container |
US20020162764A1 (en) * | 2001-05-03 | 2002-11-07 | Drew Sherline | Printed-thermoplastic tamper-resistant package |
US6746053B1 (en) * | 1998-10-29 | 2004-06-08 | International Business Machines Corporation | Method and system for preventing parallel marketing of wholesale and retail items |
US20050189255A1 (en) * | 2004-02-27 | 2005-09-01 | Safian John W. | Plastic packaging having embedded micro-particle taggants |
US20050194280A1 (en) * | 2004-03-03 | 2005-09-08 | Smith Roger P. | Container having irradiated indicia |
US20060011504A1 (en) * | 2002-11-12 | 2006-01-19 | Hauni Maschinenbau Ag | Object provided with an individual characterizing system enabling its identification, and methods and devices for characterizing and identifying objects, in particular packages, labels or the like |
US20060138009A1 (en) * | 2004-12-27 | 2006-06-29 | Goldas Kuyumculuk Sanayi Ithalat Ihracat A.S. | Card based secure product packaging system |
US20060151350A1 (en) * | 2005-01-12 | 2006-07-13 | Tilton Christopher R | Printed plastic packaging |
US7322473B2 (en) * | 2001-04-25 | 2008-01-29 | Convenience Food Systems Wallau Gmbh & Co. Kg | Plastic packaging with at least one welded knob |
US20090038977A1 (en) * | 2007-02-08 | 2009-02-12 | One Source Industries, Llc | Printed packaging |
US20090266736A1 (en) * | 2008-04-25 | 2009-10-29 | Drug Plastics & Glass Company, Inc. | Container having an identification device molded therein and method of making same |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6159274A (en) * | 1997-12-26 | 2000-12-12 | Nisshinbo Industries, Inc. | Coloring mechanism and a recording material with the mechanism |
US20010011431A1 (en) * | 1998-11-25 | 2001-08-09 | Elias Brian K. | Method and apparatus for conveying unique visual communication |
JP2002253203A (en) * | 2001-03-01 | 2002-09-10 | Id Technica:Kk | Indicator for identification information and authentication system using the indicator |
US7039215B2 (en) * | 2001-07-18 | 2006-05-02 | Oki Electric Industry Co., Ltd. | Watermark information embedment device and watermark information detection device |
US7322514B2 (en) * | 2001-11-30 | 2008-01-29 | International Barcode Corporation | Method for identifying and authenticating goods using codes, barcodes and radio frequency identification |
GB0307980D0 (en) * | 2003-04-07 | 2003-05-14 | Oakes Allstair | Identification means |
US7061382B2 (en) * | 2003-12-12 | 2006-06-13 | Francis M. Claessens | Apparatus for electronically verifying the authenticity of contents within a container |
US20080048030A1 (en) * | 2005-05-23 | 2008-02-28 | Ralph Garner | Merchandise tagging to prevent theft and fraud |
US20070105229A1 (en) * | 2005-08-19 | 2007-05-10 | Burns Carolyn A | Authentication of packaged articles |
US20090189763A1 (en) * | 2008-01-28 | 2009-07-30 | Kenneth Brinkley | Security film |
US20110247960A1 (en) * | 2010-04-07 | 2011-10-13 | Sproxil, Inc | Systems and methods for verifying authenticity of a product |
-
2011
- 2011-04-07 US US13/081,882 patent/US20110247960A1/en not_active Abandoned
- 2011-04-07 WO PCT/US2011/031574 patent/WO2011127279A2/en active Application Filing
- 2011-04-07 JP JP2013503953A patent/JP2013528536A/en not_active Withdrawn
- 2011-04-07 BR BR112012025563A patent/BR112012025563A2/en not_active IP Right Cessation
- 2011-04-07 BR BR112012025491A patent/BR112012025491A2/en not_active IP Right Cessation
- 2011-04-07 WO PCT/US2011/031577 patent/WO2011127282A2/en active Application Filing
- 2011-04-07 US US13/081,909 patent/US20110251969A1/en not_active Abandoned
- 2011-04-07 TW TW100111969A patent/TW201204568A/en unknown
- 2011-04-07 EP EP11766728A patent/EP2556463A2/en not_active Withdrawn
- 2011-04-07 TW TW100111967A patent/TW201203127A/en unknown
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5603201A (en) * | 1994-02-04 | 1997-02-18 | Lafata; John E. | Packaging system |
US5524758A (en) * | 1995-06-30 | 1996-06-11 | Lupul; Troy D. | Authentication packaging for replacement parts |
US6053321A (en) * | 1998-07-17 | 2000-04-25 | Kayser; Steven L. | Blister pack display card with reusable container |
US6746053B1 (en) * | 1998-10-29 | 2004-06-08 | International Business Machines Corporation | Method and system for preventing parallel marketing of wholesale and retail items |
US7322473B2 (en) * | 2001-04-25 | 2008-01-29 | Convenience Food Systems Wallau Gmbh & Co. Kg | Plastic packaging with at least one welded knob |
US20020162764A1 (en) * | 2001-05-03 | 2002-11-07 | Drew Sherline | Printed-thermoplastic tamper-resistant package |
US20060011504A1 (en) * | 2002-11-12 | 2006-01-19 | Hauni Maschinenbau Ag | Object provided with an individual characterizing system enabling its identification, and methods and devices for characterizing and identifying objects, in particular packages, labels or the like |
US20050189255A1 (en) * | 2004-02-27 | 2005-09-01 | Safian John W. | Plastic packaging having embedded micro-particle taggants |
US20050194280A1 (en) * | 2004-03-03 | 2005-09-08 | Smith Roger P. | Container having irradiated indicia |
US20060138009A1 (en) * | 2004-12-27 | 2006-06-29 | Goldas Kuyumculuk Sanayi Ithalat Ihracat A.S. | Card based secure product packaging system |
US20060151350A1 (en) * | 2005-01-12 | 2006-07-13 | Tilton Christopher R | Printed plastic packaging |
US20090038977A1 (en) * | 2007-02-08 | 2009-02-12 | One Source Industries, Llc | Printed packaging |
US20090266736A1 (en) * | 2008-04-25 | 2009-10-29 | Drug Plastics & Glass Company, Inc. | Container having an identification device molded therein and method of making same |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110225100A1 (en) * | 2010-03-12 | 2011-09-15 | Pharmasecure, Inc. | System, method and interface display for verifying and managing distribution and sales of medicine |
US20110251969A1 (en) * | 2010-04-07 | 2011-10-13 | Sproxil, Inc | Systems and methods for verifying authenticity of a product |
US9202194B1 (en) | 2011-03-08 | 2015-12-01 | GlobalSubmit, Inc. | Tracking the distribution of a product or package through a supply chain to determine authenticity and detect breaches |
GB2497524A (en) * | 2011-12-12 | 2013-06-19 | Fabrizio Ferrante | Method of anti-fraud protection for commercial products |
WO2016172503A1 (en) * | 2015-04-23 | 2016-10-27 | I-Property Holding Corp. | Simple authentication of elements in blister packages |
CN107924468A (en) * | 2015-04-23 | 2018-04-17 | I-资产控股集团 | The simple authentication of element in blister package |
EP3286692A4 (en) * | 2015-04-23 | 2019-04-17 | I-Property Holding Corp. | Simple authentication of elements in blister packages |
US11042738B2 (en) * | 2015-04-23 | 2021-06-22 | I-Property Holding Corp. | Simple authentication of elements in blister packages |
Also Published As
Publication number | Publication date |
---|---|
BR112012025563A2 (en) | 2017-08-29 |
TW201204568A (en) | 2012-02-01 |
WO2011127282A3 (en) | 2011-12-22 |
EP2556463A2 (en) | 2013-02-13 |
WO2011127279A2 (en) | 2011-10-13 |
JP2013528536A (en) | 2013-07-11 |
BR112012025491A2 (en) | 2017-08-29 |
US20110251969A1 (en) | 2011-10-13 |
TW201203127A (en) | 2012-01-16 |
WO2011127282A2 (en) | 2011-10-13 |
WO2011127279A3 (en) | 2012-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20110247960A1 (en) | Systems and methods for verifying authenticity of a product | |
Shah et al. | Anticounterfeit packaging technologies | |
EP2226267B1 (en) | Tamper evident prepaid card carrier, method for making such a card carrier | |
AU2008362599B2 (en) | Method for authenticating a product in a container, and associated method for verifying the authenticity of the product and its container | |
CN101882277A (en) | Wine anti-counterfeit method and system thereof | |
CN102930316A (en) | Three-dimensional commodity bar code information system | |
US20110049862A1 (en) | Optically variable security device, and article employing same and method for verifying the authenticity of an article | |
CN101970244A (en) | Method for producing a security feature on a flat substrate | |
CN101159104A (en) | False proof and fleeing goods prevention marker, recognition method and processing equipment thereof | |
US20220083641A1 (en) | Devices, systems, and methods using microtransponders | |
CN106327214A (en) | Tobacco industry anti-counterfeiting authentication method based on NFC chip | |
CN216353017U (en) | Traceable anti-counterfeit label | |
CN103177654B (en) | With the manufacture method of anti false film label of optical anti-counterfeiting film, antifalsification label and the security code generated by antifalsification label | |
US20140172636A1 (en) | Identification of counterfeit goods | |
CN205590609U (en) | Anti -fake sticky tape that destroys | |
Plimmer | Augmenting and securing the consumer brand experience through smart and intelligent packaging for food, beverages and other fast-moving consumer goods | |
WO2015169961A1 (en) | Anti-counterfeit packaging | |
CN204965911U (en) | Anti -fake label structure of RFID of three -dimensional relief sense of touch characteristic of utensil | |
JP2004258583A (en) | Information recording medium and authenticity judgement method using this | |
WO2020064407A1 (en) | Method for the traceability and authentication of products | |
FR3070215A3 (en) | AUTONOMOUS AUTHENTICATION DEVICE FOR OPTICAL MARKING AND METHODS | |
CN211319607U (en) | Anti-counterfeit label based on authentication eye | |
CN213751654U (en) | Anti-counterfeiting mark structure and anti-counterfeiting packaging material | |
TWI244621B (en) | Method for authenticating an alcohol bottle using a digital identity | |
CN102456377A (en) | Loss prevention system with covert marks and method of manufacture thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SPROXIL, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GOGO, ASHIFI;ZECHA, ALDEN;SIGNING DATES FROM 20110516 TO 20110606;REEL/FRAME:026474/0187 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |