WO2004037660A1 - Electronic tampering detection system - Google Patents
Electronic tampering detection system Download PDFInfo
- Publication number
- WO2004037660A1 WO2004037660A1 PCT/CA2003/001625 CA0301625W WO2004037660A1 WO 2004037660 A1 WO2004037660 A1 WO 2004037660A1 CA 0301625 W CA0301625 W CA 0301625W WO 2004037660 A1 WO2004037660 A1 WO 2004037660A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- blank
- trace means
- chip
- closure tabs
- tabs
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
- G06K19/07798—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card part of the antenna or the integrated circuit being adapted for rupturing or breaking, e.g. record carriers functioning as sealing devices for detecting not-authenticated opening of containers
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D5/00—Rigid or semi-rigid containers of polygonal cross-section, e.g. boxes, cartons or trays, formed by folding or erecting one or more blanks made of paper
- B65D5/42—Details of containers or of foldable or erectable container blanks
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D55/00—Accessories for container closures not otherwise provided for
- B65D55/02—Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
- B65D55/028—Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure initial opening or unauthorised access being indicated by the presence or absence of an audible or electrical signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/12—Mechanical actuation by the breaking or disturbance of stretched cords or wires
- G08B13/126—Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D2211/00—Anti-theft means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65D—CONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
- B65D2401/00—Tamper-indicating means
Definitions
- This invention relates to a system for detecting tampering with paper board (cardboard) packages and containers.
- Folded paper board (cardboard) packages are widely used to organize and ship a variety of contents. Many such contents are at risk for tampering or theft. In such scenarios, the paper board package is opened by an unauthorized person, giving unauthorized access to the contents of the package. The contents may be stolen and replaced with inactive versions of the contents, part or all of the units may simply be removed from the package (stolen), or the contents may be contaminated by the addition of toxic substances to the contents. The unauthorized person might then reseal the package, allowing it to continue in the distribution chain, disseminating its altered contents.
- the invention uses a system or systems of electrically conducting traces or coatings and/or electrically conducting glue connected to a central processing unit (CPU) in such a way that opening or penetrating the cardboard package will cause a change in the electrical characteristics of the circuit so created.
- the CPU monitors the circuit for such changes, and generates data about the time and other characteristics of the event, storing the data in its data memory. The data can later be accessed by an interested party, who can then determine if, and at what point in the supply chain, tampering occurred.
- the first method uses one or a plurality of individual circuits each connected directly to the CPU.
- the CPU monitors the continuity of the circuit(s). Breaking the circuit triggers a time stamp by the CPU according to its clock and the data is stored in the CPU's data memory to be retrieved later by an interested party. Because this method is based on one of two possible states (circuit open and circuit closed) it can be described as a "digital" method.
- the second method uses one or a plurality of sensor circuits arranged as resistances in parallel in a primary circuit, the electrical characteristics of which are monitored by the CPU via an analog-to-digital converter (ADC). Interrupting the continuity of the sensor circuits results in changes in the electrical characteristics of the primary circuit.
- ADC analog-to-digital converter
- Changes are compared to fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory and those changes meeting the criteria are interpreted as tampering and/or penetration events.
- the criteria for a significant change may be fixed at the time of programming the CPU, or they could be dynamic, where the procedure memory of the CPU updates the change criteria on the basis of its most recent determinations.
- the use of dynamic criteria compensates for drifting of the electrical characteristics of the circuit such as those due to changes in temperature and humidity, which changes do not vary linearly as a function of the number of events previously detected.
- the use of dynamic criteria maximizes the discriminability of the changes in resistance occasioned by breaking the sensor circuits, permitting more such sensor circuits to be monitored by a single circuit of given voltage.
- the time and other characteristics of interest are then stored in the CPU's data memory for later retrieval by an interested party. Because this method is based on a number of values or steps in the electrical characteristics of a circuit it can be described as an "analog" method.
- the CPU comprises an internal or external clock, internal or external ADC where required for analog monitoring, a power source and an antenna. It has both procedure and data memories, the latter of which may be volatile or non-volatile and internal or external to the CPU depending on the desired use.
- the CPU has the ability to communicate with external devices via radio frequency (RF), infrared (IR) or direct contact, as desired.
- RF radio frequency
- IR infrared
- the data can thus be retrieved for storage or analysis at a later time by a party interested in the integrity of the package, and in the case of a tampered package, the point in the chain where the tampering occurred. The latter can be determined from the time stamped data and other information about the event.
- the invention comprises a CPU communicating with a system of electrically conducting traces printed or otherwise attached to the paper board comprising the package.
- the points of closure are attached by means of electrically conducting adhesive in such a way that they form part of the circuit(s).
- the CPU monitors the circuit(s) for changes in electrical characteristics. Fixed (or dynamic) criteria for changes considered to represent opening or penetration of the package (tampering) are stored (or calculated) in the CPU's procedure memory. When the package is opened or penetrated, the circuit is broken. The resulting change in electrical characteristics is noted by the CPU. If the change meets the criteria, the time of the event, as determined by the CPU's clock, is stored in the CPU'S data memory.
- the tabs closing the package by electrically conducting glue are arranged as a single closed electrical circuit terminating on the input pins of a CPU. Opening the package via one of its tabs opens the circuit.
- the CPU monitors the circuit for continuity (digital method), determines the time when the continuity is broken from its clock, and records the time in its data memory.
- subsets of the tabs are connected as independent circuits to different input pins of the CPU and a common ground.
- each circuit requires one input pin connection and a common connection.
- several points of opening can be monitored independently, and data can be obtained regarding multiple opening events where this is of interest.
- the tabs closing the package by electrically conducting glue are connected by patterns of electrically conducting traces to form a single electrical circuit, the continuity of which is monitored by the CPU.
- a break in continuity is considered to represent a tampering event (opening or penetration) and the time is determined from the CPU's clock and recorded in its data memory.
- the conductive traces can be arranged in any pattern or randomly to cover all surfaces of the package according to the requirements of the application.
- combinations of glued tabs and electrically conducting traces can be arranged to form separate electrically conducting circuits that can be monitored independently for continuity by the CPU.
- multiple tampering events can be time stamped and the location of the tampering determined.
- one or more sensor circuits connecting the closing tabs by electrically conducting traces printed on the surface of the package are arranged as resistances in parallel between two input pins of the CPU.
- the CPU via the ADC monitors the electrical characteristics of the parallel circuit, and interprets opening events according to fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. When changes in resistance or other electrical characteristics of the circuit meet the criteria, the time of the event is determined from the CPU's clock and recorded in the data memory. This method is limited to detecting package opening via the closing tabs. In some situations it may be desirable to monitor the package for both opening and penetration tampering.
- one or more sensor circuits comprising closing tabs, electrically conducting traces printed on the surface of the package, or combinations of tabs and traces are arranged as resistances in parallel between two input pins of the CPU.
- the CPU via the ADC monitors the electrical characteristics of the parallel circuit, and interprets opening or penetration events according to fixed (or dynamic) change criteria stored (or calculated) in the procedure memory of the CPU.
- the time of the event is determined from the CPU's clock, and recorded in the CPU's data memory. The data can later be retrieved by an interested party, who can determine if tampering has occurred, whether such tampering involved opening or penetrating the package, and when it occurred.
- the entire surface of the package is covered by a grid or other pattern of conducting traces.
- the ADC of the CPU is attached to this conducting grid at two disparate points, creating a circuit.
- the CPU monitors the electrical characteristics of the surface (circuit) for fixed (or dynamic) change criteria stored
- a change meeting the criteria is interpreted as a tampering event, the time of which is determined from the CPU's clock, and recorded in the data memory.
- the grid is replaced by a continuous coating of electrically conductive ink or other material covering the entire surface of the package.
- the ADC of the CPU is attached to this continuous coating at two disparate points, creating a circuit.
- the CPU monitors the electrical characteristics of the surface (circuit) for fixed (or dynamic) change criteria stored (or calculated) in the procedure memory. A change meeting the criteria is interpreted as a tampering event, the time of which is determined from the CPU's clock, and recorded in the data memory.
- the coating or grid can be printed or otherwise applied continuously on the cardboard roll stock at time of its manufacture.
- the cardboard package is die or otherwise cut from the roll and assembled into a cardboard package, its continuous electrically conducting coating or grid is attached to the input pins of a CPU attached to the package.
- the ADC of the CPU monitors the electrical characteristics of the circuit (continuous coating or grid) for changes meeting fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. Penetration of a surface of the package or opening of a tab causes a change in resistance, which change is detected by the CPU. Changes meeting the criteria are interpreted as tampering events and the time of the change is determined from the CPU's clock and stored in the data memory.
- a CPU with an ADC allows for the use of other environmental sensors in conjunction with the monitoring system described above. Sensors to measure changes in light, orientation, temperature, radiation, humidity and pressure can be used to supplement the tamper detecting ability of the present invention. For example, dark packages can be monitored by the ADC for increased light exposure; vacuum sealed packages can be monitored for changes in pressure; refrigerated packages can be monitored for changes in temperature as means of detecting tampering.
- the present invention may be considered as providing a system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, the system comprising: electrically conducting adhesive applied to each of the closure tabs; a programmable chip applied to one of the blank surfaces, the chip including a power source, procedure memory, data memory, clock means, and communication means; and electrically conducting trace means applied to one of the blank surfaces, one such trace means connecting the chip to the electrically conducting adhesive of one of the pair of closure tabs, and another of such trace means connecting the chip to the electrically conductive adhesive of the other of the pair of closure tabs; whereby with the blank having been formed into a closed package through adhesive joining together of the closure tabs, any separation of the tabs will break an electrical circuit which includes the trace means, the electrically conducting adhesive, and the chip means, which break will be recorded with a time stamp in the data memory of the chip.
- the present invention may be considered to provide a system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, the system comprising: electrically conducting adhesive applied to each of the closure tabs; a programmable chip applied to one of the blank surfaces, the chip including a power source, procedure memory, data memory, clock means, an analog to digital converter (ADC), and communication means; and at least two low resistance electrically conducting trace means applied to one of the blank surfaces and connected at one end thereof to the chip, and at least two high resistance electrically conductive trace means applied to the one blank surface, one of such high resistance trace means connecting one of the low resistance trace means to the electrically conducting adhesive of one of the pair of closure tabs, and another of such high resistance trace means connecting the other of the low resistance trace means to the electrically conductive adhesive of the other of the pair of closure tabs; whereby with the blank having been formed into a closed package through adhesive joining together of the closure tabs, any separation
- FIG. 1 depicts a package in which the three pairs of closing tabs are connected in series to a single monitoring circuit to detect opening of the package (digital method);
- FIG. 2 depicts a package in which the three pairs of closing tabs are monitored individually to detect time and location of opening of the package (digital method);
- FIG. 3 depicts a package where the three pairs of opening tabs and a pattern of conductive traces are connected in series and monitored to detect opening or penetration of the package (digital method);
- FIG. 4 depicts a package in which the three pairs of closing tabs, each with an associated pattern of conductive traces, are arranged as resistances in parallel to permit monitoring of a single circuit to detect three opening events (analog method);
- FIG. 5 depicts an analog package opening detection system with the ability to localize the point(s) of opening
- FIG. 6 depicts an analog opening and penetration detection system with three sensor circuits arranged as resistances in parallel;
- FIG. 7 depicts a package with a continuous grid of conductive traces monitored by an ADC and CPU to detect and localize multiple opening or penetration events (analog method);
- FIG. 8 is a schematic drawing of the cross-section of a package with a continuous grid monitored by a CPU and its ADC (analog method);
- FIG. 9 shows cardboard roll stock with a continuous electrically conducting grid applied to its surface
- FIG. 10 shows cardboard roll stock with a continuous electrically conducting coating.
- a digital tampering detection device is described in accordance with an embodiment of the present invention, which device can be integrated in any paper board (cardboard) package during manufacturing.
- the package will be formed from a blank 10 provided with at least a pair of closure tabs which are adhesively secured together to close the blank, after folding into a closed package.
- the blank includes pairs of closure tabs A-A; B-B; and C-C which will co-act with each other to close the package.
- the device is arranged to detect unauthorized opening of a package (tampering) via the package's closing tabs.
- the tamper detection system requires the closing tabs of the package (A-A, B-B andC-C in FIG. 1) to be coated with electrically conductive adhesive 12.
- a system of electrically conducting traces 14, 16, 18 of ink or other material is printed or otherwise applied to the surface of the blank to connect the closing tabs, forming an electrically conducting circuit.
- the circuit is connected to two input pins (1 and 2) of a central processing unit (CPU) 20, itself comprising a procedure memory, power source, data memory, clock, and communication means such as an antenna.
- the power source can be a conventional battery (such as a lithium or lithium ion cell), printed on the cardboard package, or otherwise manufactured, and the memory can be volatile or non-volatile according to the application.
- the first traces 14 connect the CPU 20 to each of the first pair of closure tabs A-A; one of the second traces 16 and one of the third traces 18 connect one of the first closure tabs to respective ones of the second and third closure tabs B-B and C-C; and the other of the second traces 16 and the other of the third traces 18 connect the other of the first closure tabs A-A to the others of the second and third closure tabs B-B and C-C respectively.
- the traces 14, 16 18 will be applied to the blank so as to take the most direct route available between the connection points thereof. Of course, at each closure tab the respective traces will make electrical connection with the electrically conductive adhesive applied to the tab.
- the CPU 20 monitors the continuity of the electrical circuit (digital method). If the continuity is broken by opening the formed package via one of its closing tabs, the time of the event is determined from the CPU's clock, the event is time stamped, and the time is recorded in the CPU's data memory. At a later time, an interested party can retrieve the data from the CPU's memory for analysis to determine if the package has been opened (tampered). In the event tampering has been detected, the interested party can extrapolate back along the supply chain to determine where the tampering occurred. The data can be retrieved via a reader at distance, as by radio frequency (RF) or infrared (IR) transmission, or by direct contact. In this application of the device, a single tampering event can be detected and the tampering must occur by the opening of one or more of the package's tabs.
- RF radio frequency
- IR infrared
- FIG. 2 depicts an application of the tampering detection device that allows detection of multiple openings via the closing tabs.
- each pair of closing tabs is connected to the CPU by its own electrically conducting trace.
- four connections to the CPU's input pins (1 , 2, 3, and C) are required.
- Each circuit requires one connection to the CPU and the system requires a common (C) connection.
- the CPU 20 is connected to the electrically conductive adhesive 12 of closure tabs A-A via the traces 14, 14; the CPU is connected to one each of the closure tabs
- the CPU monitors the circuits for continuity (digital method). Opening the package via a tab breaks the continuity in that circuit and the time is determined and recorded along with the tab's (circuit's) identity. This can occur once for each circuit.
- the procedure memory of the CPU may be programmed to reset the circuit if the tab is resealed with its conductive adhesive, re-establishing the circuit's continuity. In this application, multiple tab openings of the same tab can be detected and the times recorded.
- a continuous pattern (including a random array) of electrically conducting traces can be used to connect the closing tabs of a package to form a single circuit.
- the circuit terminates on two input pins (1 , 2) of the CPU 20 and the connecting traces 22 are arranged across the surface of the blank in a circuitous path that covers a large extent of the blank surface.
- the CPU 20 monitors the continuity of the circuit (digital method). Penetration of the package breaks one or more of the traces and opens the circuit as does opening the package via one of its closure tabs. The time of opening of the circuit is determined from the CPU's clock and stored in its data memory.
- the pattern of traces can be fine or coarse depending on the application. In other details the procedure is identical to that of the preceding detailed description in conjunction with FIG. 1.
- the advantage of this method is that both penetration and opening tamperings can be detected and that only two attachments to the CPU are required reducing the cost of production.
- the disadvantage is that only one tampering event can be detected and recorded, and that the design and application of the traces is more complicated.
- the analog method lends itself to lower production costs due to the requirement for fewer connections to the CPU and the ability to utilize a simpler CPU with fewer input pins. It does require that the CPU have an analog-to-digital converter (ADC), which can be internal or external to the CPU.
- ADC analog-to-digital converter
- FIG. 4 shows an analog opening monitoring system with three steps (sensor circuits).
- the pairs of closing tabs (A-A, B-B, C-C) are arranged as resistances in parallel in a single electrically conducting circuit 24 terminating on the input pins (1 , 2) of a CPU 26.
- the ADC and CPU monitor the electrical characteristics of the circuit (resistance, voltage, current or combinations thereof) for fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
- a change meeting the criteria is interpreted as an opening event, the time is determined from the CPU's clock, and the information is stored in the CPU's data memory.
- the data can later be retrieved by a party interested in whether or not the package was opened (tampered). If tampering has been detected, the interested party can extrapolate back along the supply chain to determine where the tampering occurred.
- the data can be retrieved via a reader at distance, as by radio frequency (RF) or infrared (IR) transmission, or by direct contact. In this application of the device, three tampering events can be detected and the tampering must occur by the opening of the package's closing tabs.
- RF radio frequency
- IR infrared
- An advantage of the analog methodology is that the number of "steps" or sensor circuits that can be monitored is limited only by the ability of the CPU to detect a change (signal) from any noise (variability in electrical characteristics of the circuit not due to tampering events). As shown in FIG. 4, the magnitude of the changes occasioned by the opening of the tab circuits can be increased by using low resistance pats for the parallel circuit and higher resistance traces for the traces comprising the resistances in parallel.
- the circuit 24 includes a pair of low resistance traces 28 connected to two pins of the CPU 26, and three pairs 30, 30; 32, 32; and 34, 34 of high resistance traces connecting the low resistance traces to the electrically conductive adhesive 12 of the closure tabs.
- one each of the pairs of high resistance traces connects one of the low resistance traces to one each of each pair of closure tabs A-A; B-B; and C-C; the other of each pair of high resistance traces connects the other of the low resistance traces to the other of each pair of closure tabs.
- the CPU cannot determine which tab has been opened as the reliably detectable changes may not be discriminable.
- the resistance of the conductive traces connecting each tab pair (A-A, B-B, C-C) to the parallel circuit can be given significantly different resistances. As shown in FIG. 5, the resistance (R1) of the printed trace associated with tabs C-C is less than that associated with tabs B-B (R2) in that the cross sectional area of path R1 (C-C) is greater. Both resistances R1 and R2 are greater than the resistance of the traces 30, 30 associated with the tabs A-A.
- the magnitude of changes associated with continuity breaking in one tab circuit compared to another can be programmed into the procedure memory of the CPU.
- the analog method can also be used to detect opening and penetration of a cardboard package.
- the printed traces connecting the tab pairs can be arranged in a circuitous path 36 covering a large extent of the surface of the blank.
- the pairs of closing tabs (A-A, B-B, C-C) are arranged as resistances in parallel in a single electrically conducting circuit terminating on the input pins (1 , 2) of a CPU 38.
- the ADC and CPU monitor the electrical characteristics of the circuit (resistance, voltage, current or combinations thereof) for fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. When a change meets the criteria it is interpreted as an opening or penetration event, the time is determined from the CPU's clock, and the information is stored in the CPU's data memory. The data can later be retrieved by a party interested in whether or not the package was opened or penetrated (tampered).
- the sensor circuit traces are of higher resistance to maximize the discriminability of changes in the electrical characteristics occasioned by tampering events.
- This analog method may also incorporate the method described previously in which each sensor circuit has a different associated resistance to allow identification of the location of the tampering.
- a continuous grid 40 of conductive traces is printed or otherwise applied to the entire surface of the blank (FIG. 7).
- the input terminals (1 ,2) of the CPU 42 are then connected to two disparate points on the grid via traces 44, 44 to form an electrically conducting circuit. Details of this attachment are given in FIG. 8.
- the CPU via its ADC monitors the electrical characteristics of the grid for changes of a magnitude that meets fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
- Opening of a tab or penetration of the grid changes its resistance.
- changes meeting the criteria are detected they are interpreted as tampering events (opening or penetration).
- This method has the ability to detect a number of such events, but cannot identify their locations.
- the data are then stored in the CPU's data memory for subsequent downloading and interpretation as has been described previously.
- a continuous coating of electrically conducting ink or other material is printed or applied to the entire surface of the package.
- the input terminals of the CPU are then connected to two disparate points on the surface to form an electrically conducting circuit.
- the CPU via its ADC monitors the electrical characteristics of the surface (circuit) for changes that meet fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
- Opening of a tab or penetration of the surface changes its resistance.
- changes meeting the criteria are detected they are interpreted as tampering events (opening or penetration).
- This method has the ability to detect a number of such events, but cannot identify their locations. The data are then stored in the CPU's data memory for subsequent downloading and interpretation as has been described previously.
- a cardboard roll stock 46 can be covered with a continuous grid 48 of electrically conducting traces either by printing or other means of application (FIG. 9) at the time of its production.
- a CPU can then be attached to the grid by two input pins as shown in FIGS. 7 and 8. The electrical characteristics of the grid circuit can then be monitored for changes by the CPU via its ADC.
- changes meeting the fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory are detected, the time is determined from the CPU's clock and recorded in the data memory. The data can later be retrieved and interpreted as described previously.
- a continuous electrically conducting coating 50 can be applied to the cardboard roll stock 46 for subsequent incorporation into tamper-detecting packages as described for the continuous grid above (FIG 10).
- the application of tamper-sensing traces is not limited to the interior surface of a package but can equally be applied to the exterior or laminated between the layers of a multi- layered cardboard package.
- the shape of the package is not limited to square or rectangular designs and includes any shaped package manufactured by folding and gluing or otherwise being sealed.
- the invention is not limited to cardboard packages but can be used with all materials from which folded packages can be constructed including, but not limited to, plastics and other laminated materials.
- the CPU can be located either on the interior or exterior of the package and can be embedded in the cardboard where appropriate.
- the CPU may in addition monitor other environmental characteristics capable of giving information about tampering with a package such as, but not limited to, shock, temperature, radiation, humidity and pressure and light.
- the CPU may also be programmed to generate warning signals to indicate when tampering has been detected.
- the warning device may be any device which can present a warning, such as light-emitting diodes (LED's), liquid crystal displays (LCD's) or other types of displays, audible devices, or any combination thereof.
- the warning device may also transmit the warning covertly and at distance such as by RF or other means.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mechanical Engineering (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
- Electrotherapy Devices (AREA)
- Investigating Or Analysing Biological Materials (AREA)
- Measuring Pulse, Heart Rate, Blood Pressure Or Blood Flow (AREA)
- Cartons (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE60304601T DE60304601T2 (en) | 2002-10-25 | 2003-10-24 | ELECTRONIC MANIPULATION DETECTION SYSTEM |
AU2003275845A AU2003275845A1 (en) | 2002-10-25 | 2003-10-24 | Electronic tampering detection system |
EP03809231A EP1562829B1 (en) | 2002-10-25 | 2003-10-24 | Electronic tampering detection system |
JP2004545648A JP2006507995A (en) | 2002-10-25 | 2003-10-24 | Electronic tamper detection system |
US11/113,323 US7119684B2 (en) | 2002-10-25 | 2005-04-25 | Electronic tampering detection system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2,409,624 | 2002-10-25 | ||
CA2409624A CA2409624C (en) | 2002-10-25 | 2002-10-25 | Electronic tampering detection system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/113,323 Continuation US7119684B2 (en) | 2002-10-25 | 2005-04-25 | Electronic tampering detection system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004037660A1 true WO2004037660A1 (en) | 2004-05-06 |
Family
ID=32111428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CA2003/001625 WO2004037660A1 (en) | 2002-10-25 | 2003-10-24 | Electronic tampering detection system |
Country Status (8)
Country | Link |
---|---|
US (1) | US7119684B2 (en) |
EP (1) | EP1562829B1 (en) |
JP (1) | JP2006507995A (en) |
AT (1) | ATE323032T1 (en) |
AU (1) | AU2003275845A1 (en) |
CA (1) | CA2409624C (en) |
DE (1) | DE60304601T2 (en) |
WO (1) | WO2004037660A1 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2874111A1 (en) * | 2004-08-06 | 2006-02-10 | Gwenaelle Anna Henry | Goods e.g. watches, container breakage tracing and control device, has control electronics with firmware circuit having input to detect breakage of container to store moment of breaking, and which has input connected to movement detector |
WO2006056887A2 (en) * | 2004-07-23 | 2006-06-01 | David Weekes | Systems and apparatus for secure shipping |
WO2006060945A1 (en) * | 2004-12-07 | 2006-06-15 | Pingxiao Deng | A tamper-resistant detecting device for liquid products with a self-damaged protection function & a detecting method |
US7088252B2 (en) | 2004-06-10 | 2006-08-08 | David Weekes | Systems and apparatus for personal security |
WO2006102678A1 (en) * | 2005-03-24 | 2006-09-28 | Intel Corporation | Tamper detection with rfid tag |
WO2007090936A1 (en) * | 2006-02-07 | 2007-08-16 | Henry Gwenaelle Anna | Device for tracing and monitoring pilfering from merchandise packages during their transport |
WO2009080317A1 (en) * | 2007-12-21 | 2009-07-02 | Oltre S.R.L. | Anti-theft device, particularly for pallets loaded with goods |
EP2078208A2 (en) * | 2006-11-03 | 2009-07-15 | Gore Enterprise Holdings, Inc. | Tamper respondent sensor and enclosure |
WO2010080770A1 (en) * | 2009-01-07 | 2010-07-15 | Meadwestvaco Corporation | Security packaging |
WO2012099708A1 (en) * | 2011-01-21 | 2012-07-26 | Sensormatic Electronics, LLC | Soft alarming safer |
WO2013011370A1 (en) * | 2011-07-19 | 2013-01-24 | Dubois Limited | Product container or package having a security device |
CN103538776A (en) * | 2013-10-22 | 2014-01-29 | 浙江纺织服装职业技术学院 | Logistical antitheft printed bag |
CN103541093A (en) * | 2013-10-22 | 2014-01-29 | 浙江纺织服装职业技术学院 | Logistical antitheft woven bag |
US8698627B2 (en) | 2009-01-07 | 2014-04-15 | Meadwestvaco Corporation | Security packaging |
ITTO20130182A1 (en) * | 2013-03-07 | 2014-09-08 | Uale | SAFETY ARTICLE IN PARTICULAR FOR POSTAL USE WITH A SIGNALING DEVICE |
US9355537B2 (en) | 2014-08-21 | 2016-05-31 | Dubois Limited | Optical security tag |
ITUB20159837A1 (en) * | 2015-12-15 | 2017-06-15 | T & T Srl | MECHANICAL AND ELECTRONIC SENSOR TO DETECT CUTS AND LACTIONS |
IT201600129333A1 (en) * | 2016-12-21 | 2018-06-21 | Igb Srl | CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME. |
IT201600129360A1 (en) * | 2016-12-21 | 2018-06-21 | Igb Srl | CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME |
IT201800005410A1 (en) * | 2018-05-16 | 2019-11-16 | Corrugated cardboard packaging suitable for detecting break-ins to the detriment of the same | |
US11295597B2 (en) | 2017-11-22 | 2022-04-05 | Timothy Neville WALSH | Tamper detection system |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6995669B2 (en) * | 2003-03-25 | 2006-02-07 | Fernando Morales | System and method to enhance security of shipping containers |
US7239247B2 (en) * | 2003-07-30 | 2007-07-03 | Albert George Adams | Access annunciator |
WO2006031824A2 (en) * | 2004-09-14 | 2006-03-23 | Adasa, Inc. | Systems and methods for deployment and recycling of rfid tags, wireless sensors, and the containers attached thereto |
US20060243793A1 (en) * | 2005-04-27 | 2006-11-02 | Siewert Neil E | Value unit |
US7538683B2 (en) * | 2005-10-26 | 2009-05-26 | Motorola, Inc. | Containment mechanism manipulation responsive electrical circuit power usage apparatus and method |
CN101365634A (en) * | 2005-12-12 | 2009-02-11 | 国际纸业公司 | Momentary switch integrated in packaging of an article |
JP4743660B2 (en) * | 2006-02-09 | 2011-08-10 | ブラザー工業株式会社 | Wireless tag label and tag label producing apparatus |
DE102006016011A1 (en) * | 2006-04-05 | 2007-10-18 | Rolls-Royce Deutschland Ltd & Co Kg | Emergency shutdown detector device for a gas turbine |
US20080001741A1 (en) * | 2006-06-29 | 2008-01-03 | Honeywell International Inc. | Large area distributed sensor |
US20090189763A1 (en) * | 2008-01-28 | 2009-07-30 | Kenneth Brinkley | Security film |
CN102037454A (en) | 2008-05-21 | 2011-04-27 | 惠普开发有限公司 | Multi-drop serial bus with location detection and method |
US20100089789A1 (en) * | 2008-10-14 | 2010-04-15 | Rosenbaum Ronald | Dosage form package and a frangible electrical circuit sheet therefor |
US9387148B2 (en) * | 2008-10-14 | 2016-07-12 | Mts Medication Technologies, Inc. | Dosage form package and a frangible electrical circuit sheet therefor |
TWI398109B (en) * | 2009-09-02 | 2013-06-01 | Mstar Semiconductor Inc | Universal infrared receiving apparatus and associated method |
CN102666295A (en) * | 2009-10-21 | 2012-09-12 | 德国邮政股份公司 | Tamper-evident closure for a box with alarm sensor |
WO2011138452A1 (en) * | 2010-05-06 | 2011-11-10 | Degudent Gmbh | Rfid seal for container packaging |
US9454504B2 (en) | 2010-09-30 | 2016-09-27 | Hewlett-Packard Development Company, L.P. | Slave device bit sequence zero driver |
GB201020947D0 (en) * | 2010-12-10 | 2011-01-26 | Maxgear Europ Ltd | Security sticker |
US8577335B2 (en) | 2011-06-08 | 2013-11-05 | Kitaru Innovations Inc. | Method and apparatus for tracking package deliveries |
CA2775546A1 (en) * | 2012-04-25 | 2013-10-25 | Intelligent Devices Inc. | A disposable content use monitoring package with indicator and method of making same |
US10074247B1 (en) * | 2012-10-02 | 2018-09-11 | Amazon Technologies, Inc. | Package opening detection and control |
DE102014223256A1 (en) | 2014-11-14 | 2016-05-19 | Robert Bosch Gmbh | Device for the opening sensing of a packaging and method for the production of the device |
DE102014223282A1 (en) | 2014-11-14 | 2016-05-19 | Robert Bosch Gmbh | Device for sensing a packaging |
DE102014223248A1 (en) | 2014-11-14 | 2016-05-19 | Robert Bosch Gmbh | Device for operating a packaging |
DE102014223264A1 (en) | 2014-11-14 | 2016-05-19 | Robert Bosch Gmbh | Device for sensing a packaging |
US10579833B1 (en) * | 2014-12-16 | 2020-03-03 | Thales Esecurity, Inc. | Tamper detection circuit assemblies and related manufacturing processes |
US9898909B2 (en) | 2015-01-30 | 2018-02-20 | Nokia Solutions And Networks Oy | Method and apparatus for tamper detection |
US10140570B2 (en) * | 2015-08-18 | 2018-11-27 | William P Gulas | Microprocessor-controlled tamper detection system |
CN105236007A (en) * | 2015-10-14 | 2016-01-13 | 周哲民 | Circulation box management system based on Internet |
PL3190065T5 (en) * | 2016-01-08 | 2022-09-05 | Reemtsma Cigarettenfabriken Gmbh | Packaging with an information encoding pattern detectable by a capacitive touch screen |
US10192076B1 (en) * | 2016-08-29 | 2019-01-29 | Square, Inc. | Security housing with recesses for tamper localization |
EP3407262A1 (en) * | 2017-05-24 | 2018-11-28 | SML Brand Identification Solutions Limited | Multi-configuration label |
DE112017008028A5 (en) * | 2017-09-13 | 2020-07-02 | Relytex Gmbh & Co. Kg | Packaging system with a security system |
JP6924412B2 (en) * | 2017-09-22 | 2021-08-25 | 大日本印刷株式会社 | Opening detection container |
US10262319B1 (en) * | 2018-07-11 | 2019-04-16 | Capital One Services, Llc | Automatically activating a transaction card by detecting a change associated with a package that carries the transaction card |
US20200320903A1 (en) * | 2019-04-04 | 2020-10-08 | Opticallock, Inc. | Variable pattern shield protection system for a tamper-evident container |
CN115190998A (en) * | 2019-11-16 | 2022-10-14 | 艾利丹尼森零售信息服务有限公司 | Radio frequency identification and packaging substrate system and method |
US11709972B2 (en) * | 2020-02-21 | 2023-07-25 | Te Connectivity Solutions Gmbh | Substrate for a tamper sensor |
IT202000009250A1 (en) * | 2020-04-28 | 2021-10-28 | Va Co Plast S A S Di Scarso Valter & C | ALARMED FOLDING PACKAGING FOR PALLET |
DE202021101432U1 (en) * | 2021-03-22 | 2022-06-23 | Tiger Media Deutschland Gmbh | Functional item with a transponder and system with such a functional item |
WO2023198583A1 (en) * | 2022-04-14 | 2023-10-19 | Authena Ag | Protective electronic tag |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0329960A2 (en) * | 1988-02-25 | 1989-08-30 | Westinghouse Electric Corporation | Secured package integrity |
GB2287339A (en) * | 1994-03-08 | 1995-09-13 | Ies Integrated Electronic Syst | Security sensors |
WO2002038456A1 (en) * | 2000-11-09 | 2002-05-16 | Frederick Philip Selwyn | Intelligent container |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4818120A (en) * | 1987-07-20 | 1989-04-04 | Nabisco Brands, Inc. | Openable and reclosable tamper evident bag tag |
US5323150A (en) * | 1992-06-11 | 1994-06-21 | Micron Technology, Inc. | Method for reducing conductive and convective heat loss from the battery in an RFID tag or other battery-powered devices |
US6045652A (en) * | 1992-06-17 | 2000-04-04 | Micron Communications, Inc. | Method of manufacturing an enclosed transceiver |
JP4580568B2 (en) * | 2001-02-09 | 2010-11-17 | 大日本印刷株式会社 | Storage box with non-contact IC tag |
US7316358B2 (en) * | 2002-03-18 | 2008-01-08 | Precision Dynamics Corporation | Identification band with adhesively attached coupling elements |
-
2002
- 2002-10-25 CA CA2409624A patent/CA2409624C/en not_active Expired - Lifetime
-
2003
- 2003-10-24 AU AU2003275845A patent/AU2003275845A1/en not_active Abandoned
- 2003-10-24 AT AT03809231T patent/ATE323032T1/en not_active IP Right Cessation
- 2003-10-24 EP EP03809231A patent/EP1562829B1/en not_active Expired - Lifetime
- 2003-10-24 DE DE60304601T patent/DE60304601T2/en not_active Expired - Lifetime
- 2003-10-24 WO PCT/CA2003/001625 patent/WO2004037660A1/en active IP Right Grant
- 2003-10-24 JP JP2004545648A patent/JP2006507995A/en active Pending
-
2005
- 2005-04-25 US US11/113,323 patent/US7119684B2/en not_active Expired - Lifetime
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0329960A2 (en) * | 1988-02-25 | 1989-08-30 | Westinghouse Electric Corporation | Secured package integrity |
GB2287339A (en) * | 1994-03-08 | 1995-09-13 | Ies Integrated Electronic Syst | Security sensors |
WO2002038456A1 (en) * | 2000-11-09 | 2002-05-16 | Frederick Philip Selwyn | Intelligent container |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7088252B2 (en) | 2004-06-10 | 2006-08-08 | David Weekes | Systems and apparatus for personal security |
US7088257B2 (en) | 2004-06-10 | 2006-08-08 | David Weekes | Systems and apparatus for secure shipping |
WO2006056887A2 (en) * | 2004-07-23 | 2006-06-01 | David Weekes | Systems and apparatus for secure shipping |
WO2006056887A3 (en) * | 2004-07-23 | 2006-07-20 | David Weekes | Systems and apparatus for secure shipping |
FR2874111A1 (en) * | 2004-08-06 | 2006-02-10 | Gwenaelle Anna Henry | Goods e.g. watches, container breakage tracing and control device, has control electronics with firmware circuit having input to detect breakage of container to store moment of breaking, and which has input connected to movement detector |
WO2006060945A1 (en) * | 2004-12-07 | 2006-06-15 | Pingxiao Deng | A tamper-resistant detecting device for liquid products with a self-damaged protection function & a detecting method |
GB2436494A (en) * | 2005-03-24 | 2007-09-26 | Intel Corp | Tamper detection with rfid tag |
WO2006102678A1 (en) * | 2005-03-24 | 2006-09-28 | Intel Corporation | Tamper detection with rfid tag |
WO2007090936A1 (en) * | 2006-02-07 | 2007-08-16 | Henry Gwenaelle Anna | Device for tracing and monitoring pilfering from merchandise packages during their transport |
EP2078208A2 (en) * | 2006-11-03 | 2009-07-15 | Gore Enterprise Holdings, Inc. | Tamper respondent sensor and enclosure |
EP2078208A4 (en) * | 2006-11-03 | 2010-11-03 | Gore Enterprise Holdings Inc | Tamper respondent sensor and enclosure |
WO2009080317A1 (en) * | 2007-12-21 | 2009-07-02 | Oltre S.R.L. | Anti-theft device, particularly for pallets loaded with goods |
US8698627B2 (en) | 2009-01-07 | 2014-04-15 | Meadwestvaco Corporation | Security packaging |
WO2010080770A1 (en) * | 2009-01-07 | 2010-07-15 | Meadwestvaco Corporation | Security packaging |
CN102272805A (en) * | 2009-01-07 | 2011-12-07 | 米德韦斯瓦科公司 | Security packaging |
EP2442283A1 (en) * | 2009-01-07 | 2012-04-18 | MeadWestvaco Corporation | Security packaging |
CN102272805B (en) * | 2009-01-07 | 2013-12-11 | 米德韦斯瓦科公司 | Security packaging |
CN103786968A (en) * | 2009-01-07 | 2014-05-14 | 米德韦斯瓦科公司 | Security packaging |
WO2012099708A1 (en) * | 2011-01-21 | 2012-07-26 | Sensormatic Electronics, LLC | Soft alarming safer |
WO2013011370A1 (en) * | 2011-07-19 | 2013-01-24 | Dubois Limited | Product container or package having a security device |
ITTO20130182A1 (en) * | 2013-03-07 | 2014-09-08 | Uale | SAFETY ARTICLE IN PARTICULAR FOR POSTAL USE WITH A SIGNALING DEVICE |
CN103541093A (en) * | 2013-10-22 | 2014-01-29 | 浙江纺织服装职业技术学院 | Logistical antitheft woven bag |
CN103538776A (en) * | 2013-10-22 | 2014-01-29 | 浙江纺织服装职业技术学院 | Logistical antitheft printed bag |
US9355537B2 (en) | 2014-08-21 | 2016-05-31 | Dubois Limited | Optical security tag |
ITUB20159837A1 (en) * | 2015-12-15 | 2017-06-15 | T & T Srl | MECHANICAL AND ELECTRONIC SENSOR TO DETECT CUTS AND LACTIONS |
EP3181476A1 (en) * | 2015-12-15 | 2017-06-21 | T & T S.r.l. | A mechanical and electronic sensor adapted to detect cuts and lacerations |
IT201600129333A1 (en) * | 2016-12-21 | 2018-06-21 | Igb Srl | CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME. |
IT201600129360A1 (en) * | 2016-12-21 | 2018-06-21 | Igb Srl | CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME |
EP3339202A1 (en) * | 2016-12-21 | 2018-06-27 | I.G.B. S.r.l. | Tamper-evident container and process of making the same |
WO2018116037A1 (en) * | 2016-12-21 | 2018-06-28 | I.G.B. S.R.L. | Tamper-evident container and process of making the same |
US11295597B2 (en) | 2017-11-22 | 2022-04-05 | Timothy Neville WALSH | Tamper detection system |
IT201800005410A1 (en) * | 2018-05-16 | 2019-11-16 | Corrugated cardboard packaging suitable for detecting break-ins to the detriment of the same | |
EP3569513A1 (en) * | 2018-05-16 | 2019-11-20 | Assograph Italia S.R.L. | Corrugated cardboard package adapted to detect breaks made to its detriment |
US10618712B2 (en) | 2018-05-16 | 2020-04-14 | Assograph Italia S.R.L. | Corrugated cardboard package adapted to detect breaks made to its detriment |
Also Published As
Publication number | Publication date |
---|---|
ATE323032T1 (en) | 2006-04-15 |
DE60304601T2 (en) | 2007-04-05 |
US7119684B2 (en) | 2006-10-10 |
DE60304601D1 (en) | 2006-05-24 |
CA2409624C (en) | 2011-03-29 |
CA2409624A1 (en) | 2004-04-25 |
JP2006507995A (en) | 2006-03-09 |
US20050225445A1 (en) | 2005-10-13 |
EP1562829B1 (en) | 2006-04-12 |
AU2003275845A1 (en) | 2004-05-13 |
EP1562829A1 (en) | 2005-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2409624C (en) | Electronic tampering detection system | |
US7017807B2 (en) | Apparatus and method for detecting tampering with containers and preventing counterfeiting thereof | |
US20040066296A1 (en) | Tamper indicating radio frequency identification label with tracking capability | |
US8274391B2 (en) | EAS tag using tape with conductive element | |
WO1997038364A1 (en) | A conformable intelligent tag | |
US9209139B2 (en) | Multilayer security wrap | |
US20030075608A1 (en) | Tamper indicating radio frequency identification label | |
US7772974B2 (en) | Tamper evident seal system and method | |
US20080001741A1 (en) | Large area distributed sensor | |
AU2010214781A1 (en) | A radio frequency identification tag with tamper detection capability | |
EP1412928A1 (en) | A tamper indicating radio frequency identification label with tracking capability | |
JP2001521231A (en) | Alteration reaction enclosure | |
CA2387612C (en) | A tamper indicating radio frequency identification label | |
US7893832B2 (en) | Authenticity tag and method for operating an authenticity tag | |
US20130284812A1 (en) | Electronic storage system with environmentally-alterable conductor | |
TWI684135B (en) | Smart tape and logistics system using the same | |
US8356758B1 (en) | Making storage system having modifiable conductor and memory | |
US20130284813A1 (en) | Altering conductor in electronic storage system | |
US10812145B1 (en) | Packaging system with detection of environmental conditions | |
US8745861B2 (en) | Method of making a storage system having an environmentally-modifiable conductor | |
EP0935409B1 (en) | Rodent detection apparatus | |
US8739399B2 (en) | Making electronic storage system having code circuit | |
US20130284811A1 (en) | Electronic storage system with externally-alterable conductor | |
US20130284810A1 (en) | Electronic storage system with code circuit | |
EP1249055B1 (en) | A tamper indicating radio frequency identification label |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11113323 Country of ref document: US Ref document number: 2004545648 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 434/MUMNP/2005 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003809231 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2003809231 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2003809231 Country of ref document: EP |