WO2004037660A1 - Electronic tampering detection system - Google Patents

Electronic tampering detection system Download PDF

Info

Publication number
WO2004037660A1
WO2004037660A1 PCT/CA2003/001625 CA0301625W WO2004037660A1 WO 2004037660 A1 WO2004037660 A1 WO 2004037660A1 CA 0301625 W CA0301625 W CA 0301625W WO 2004037660 A1 WO2004037660 A1 WO 2004037660A1
Authority
WO
WIPO (PCT)
Prior art keywords
blank
trace means
chip
closure tabs
tabs
Prior art date
Application number
PCT/CA2003/001625
Other languages
French (fr)
Inventor
Michael Petersen
Allan Wilson
Original Assignee
Intelligent Devices Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intelligent Devices Inc. filed Critical Intelligent Devices Inc.
Priority to DE60304601T priority Critical patent/DE60304601T2/en
Priority to AU2003275845A priority patent/AU2003275845A1/en
Priority to EP03809231A priority patent/EP1562829B1/en
Priority to JP2004545648A priority patent/JP2006507995A/en
Publication of WO2004037660A1 publication Critical patent/WO2004037660A1/en
Priority to US11/113,323 priority patent/US7119684B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07798Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card part of the antenna or the integrated circuit being adapted for rupturing or breaking, e.g. record carriers functioning as sealing devices for detecting not-authenticated opening of containers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D5/00Rigid or semi-rigid containers of polygonal cross-section, e.g. boxes, cartons or trays, formed by folding or erecting one or more blanks made of paper
    • B65D5/42Details of containers or of foldable or erectable container blanks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D55/00Accessories for container closures not otherwise provided for
    • B65D55/02Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
    • B65D55/028Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure initial opening or unauthorised access being indicated by the presence or absence of an audible or electrical signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/126Mechanical actuation by the breaking or disturbance of stretched cords or wires for a housing, e.g. a box, a safe, or a room
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2211/00Anti-theft means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2401/00Tamper-indicating means

Definitions

  • This invention relates to a system for detecting tampering with paper board (cardboard) packages and containers.
  • Folded paper board (cardboard) packages are widely used to organize and ship a variety of contents. Many such contents are at risk for tampering or theft. In such scenarios, the paper board package is opened by an unauthorized person, giving unauthorized access to the contents of the package. The contents may be stolen and replaced with inactive versions of the contents, part or all of the units may simply be removed from the package (stolen), or the contents may be contaminated by the addition of toxic substances to the contents. The unauthorized person might then reseal the package, allowing it to continue in the distribution chain, disseminating its altered contents.
  • the invention uses a system or systems of electrically conducting traces or coatings and/or electrically conducting glue connected to a central processing unit (CPU) in such a way that opening or penetrating the cardboard package will cause a change in the electrical characteristics of the circuit so created.
  • the CPU monitors the circuit for such changes, and generates data about the time and other characteristics of the event, storing the data in its data memory. The data can later be accessed by an interested party, who can then determine if, and at what point in the supply chain, tampering occurred.
  • the first method uses one or a plurality of individual circuits each connected directly to the CPU.
  • the CPU monitors the continuity of the circuit(s). Breaking the circuit triggers a time stamp by the CPU according to its clock and the data is stored in the CPU's data memory to be retrieved later by an interested party. Because this method is based on one of two possible states (circuit open and circuit closed) it can be described as a "digital" method.
  • the second method uses one or a plurality of sensor circuits arranged as resistances in parallel in a primary circuit, the electrical characteristics of which are monitored by the CPU via an analog-to-digital converter (ADC). Interrupting the continuity of the sensor circuits results in changes in the electrical characteristics of the primary circuit.
  • ADC analog-to-digital converter
  • Changes are compared to fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory and those changes meeting the criteria are interpreted as tampering and/or penetration events.
  • the criteria for a significant change may be fixed at the time of programming the CPU, or they could be dynamic, where the procedure memory of the CPU updates the change criteria on the basis of its most recent determinations.
  • the use of dynamic criteria compensates for drifting of the electrical characteristics of the circuit such as those due to changes in temperature and humidity, which changes do not vary linearly as a function of the number of events previously detected.
  • the use of dynamic criteria maximizes the discriminability of the changes in resistance occasioned by breaking the sensor circuits, permitting more such sensor circuits to be monitored by a single circuit of given voltage.
  • the time and other characteristics of interest are then stored in the CPU's data memory for later retrieval by an interested party. Because this method is based on a number of values or steps in the electrical characteristics of a circuit it can be described as an "analog" method.
  • the CPU comprises an internal or external clock, internal or external ADC where required for analog monitoring, a power source and an antenna. It has both procedure and data memories, the latter of which may be volatile or non-volatile and internal or external to the CPU depending on the desired use.
  • the CPU has the ability to communicate with external devices via radio frequency (RF), infrared (IR) or direct contact, as desired.
  • RF radio frequency
  • IR infrared
  • the data can thus be retrieved for storage or analysis at a later time by a party interested in the integrity of the package, and in the case of a tampered package, the point in the chain where the tampering occurred. The latter can be determined from the time stamped data and other information about the event.
  • the invention comprises a CPU communicating with a system of electrically conducting traces printed or otherwise attached to the paper board comprising the package.
  • the points of closure are attached by means of electrically conducting adhesive in such a way that they form part of the circuit(s).
  • the CPU monitors the circuit(s) for changes in electrical characteristics. Fixed (or dynamic) criteria for changes considered to represent opening or penetration of the package (tampering) are stored (or calculated) in the CPU's procedure memory. When the package is opened or penetrated, the circuit is broken. The resulting change in electrical characteristics is noted by the CPU. If the change meets the criteria, the time of the event, as determined by the CPU's clock, is stored in the CPU'S data memory.
  • the tabs closing the package by electrically conducting glue are arranged as a single closed electrical circuit terminating on the input pins of a CPU. Opening the package via one of its tabs opens the circuit.
  • the CPU monitors the circuit for continuity (digital method), determines the time when the continuity is broken from its clock, and records the time in its data memory.
  • subsets of the tabs are connected as independent circuits to different input pins of the CPU and a common ground.
  • each circuit requires one input pin connection and a common connection.
  • several points of opening can be monitored independently, and data can be obtained regarding multiple opening events where this is of interest.
  • the tabs closing the package by electrically conducting glue are connected by patterns of electrically conducting traces to form a single electrical circuit, the continuity of which is monitored by the CPU.
  • a break in continuity is considered to represent a tampering event (opening or penetration) and the time is determined from the CPU's clock and recorded in its data memory.
  • the conductive traces can be arranged in any pattern or randomly to cover all surfaces of the package according to the requirements of the application.
  • combinations of glued tabs and electrically conducting traces can be arranged to form separate electrically conducting circuits that can be monitored independently for continuity by the CPU.
  • multiple tampering events can be time stamped and the location of the tampering determined.
  • one or more sensor circuits connecting the closing tabs by electrically conducting traces printed on the surface of the package are arranged as resistances in parallel between two input pins of the CPU.
  • the CPU via the ADC monitors the electrical characteristics of the parallel circuit, and interprets opening events according to fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. When changes in resistance or other electrical characteristics of the circuit meet the criteria, the time of the event is determined from the CPU's clock and recorded in the data memory. This method is limited to detecting package opening via the closing tabs. In some situations it may be desirable to monitor the package for both opening and penetration tampering.
  • one or more sensor circuits comprising closing tabs, electrically conducting traces printed on the surface of the package, or combinations of tabs and traces are arranged as resistances in parallel between two input pins of the CPU.
  • the CPU via the ADC monitors the electrical characteristics of the parallel circuit, and interprets opening or penetration events according to fixed (or dynamic) change criteria stored (or calculated) in the procedure memory of the CPU.
  • the time of the event is determined from the CPU's clock, and recorded in the CPU's data memory. The data can later be retrieved by an interested party, who can determine if tampering has occurred, whether such tampering involved opening or penetrating the package, and when it occurred.
  • the entire surface of the package is covered by a grid or other pattern of conducting traces.
  • the ADC of the CPU is attached to this conducting grid at two disparate points, creating a circuit.
  • the CPU monitors the electrical characteristics of the surface (circuit) for fixed (or dynamic) change criteria stored
  • a change meeting the criteria is interpreted as a tampering event, the time of which is determined from the CPU's clock, and recorded in the data memory.
  • the grid is replaced by a continuous coating of electrically conductive ink or other material covering the entire surface of the package.
  • the ADC of the CPU is attached to this continuous coating at two disparate points, creating a circuit.
  • the CPU monitors the electrical characteristics of the surface (circuit) for fixed (or dynamic) change criteria stored (or calculated) in the procedure memory. A change meeting the criteria is interpreted as a tampering event, the time of which is determined from the CPU's clock, and recorded in the data memory.
  • the coating or grid can be printed or otherwise applied continuously on the cardboard roll stock at time of its manufacture.
  • the cardboard package is die or otherwise cut from the roll and assembled into a cardboard package, its continuous electrically conducting coating or grid is attached to the input pins of a CPU attached to the package.
  • the ADC of the CPU monitors the electrical characteristics of the circuit (continuous coating or grid) for changes meeting fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. Penetration of a surface of the package or opening of a tab causes a change in resistance, which change is detected by the CPU. Changes meeting the criteria are interpreted as tampering events and the time of the change is determined from the CPU's clock and stored in the data memory.
  • a CPU with an ADC allows for the use of other environmental sensors in conjunction with the monitoring system described above. Sensors to measure changes in light, orientation, temperature, radiation, humidity and pressure can be used to supplement the tamper detecting ability of the present invention. For example, dark packages can be monitored by the ADC for increased light exposure; vacuum sealed packages can be monitored for changes in pressure; refrigerated packages can be monitored for changes in temperature as means of detecting tampering.
  • the present invention may be considered as providing a system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, the system comprising: electrically conducting adhesive applied to each of the closure tabs; a programmable chip applied to one of the blank surfaces, the chip including a power source, procedure memory, data memory, clock means, and communication means; and electrically conducting trace means applied to one of the blank surfaces, one such trace means connecting the chip to the electrically conducting adhesive of one of the pair of closure tabs, and another of such trace means connecting the chip to the electrically conductive adhesive of the other of the pair of closure tabs; whereby with the blank having been formed into a closed package through adhesive joining together of the closure tabs, any separation of the tabs will break an electrical circuit which includes the trace means, the electrically conducting adhesive, and the chip means, which break will be recorded with a time stamp in the data memory of the chip.
  • the present invention may be considered to provide a system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, the system comprising: electrically conducting adhesive applied to each of the closure tabs; a programmable chip applied to one of the blank surfaces, the chip including a power source, procedure memory, data memory, clock means, an analog to digital converter (ADC), and communication means; and at least two low resistance electrically conducting trace means applied to one of the blank surfaces and connected at one end thereof to the chip, and at least two high resistance electrically conductive trace means applied to the one blank surface, one of such high resistance trace means connecting one of the low resistance trace means to the electrically conducting adhesive of one of the pair of closure tabs, and another of such high resistance trace means connecting the other of the low resistance trace means to the electrically conductive adhesive of the other of the pair of closure tabs; whereby with the blank having been formed into a closed package through adhesive joining together of the closure tabs, any separation
  • FIG. 1 depicts a package in which the three pairs of closing tabs are connected in series to a single monitoring circuit to detect opening of the package (digital method);
  • FIG. 2 depicts a package in which the three pairs of closing tabs are monitored individually to detect time and location of opening of the package (digital method);
  • FIG. 3 depicts a package where the three pairs of opening tabs and a pattern of conductive traces are connected in series and monitored to detect opening or penetration of the package (digital method);
  • FIG. 4 depicts a package in which the three pairs of closing tabs, each with an associated pattern of conductive traces, are arranged as resistances in parallel to permit monitoring of a single circuit to detect three opening events (analog method);
  • FIG. 5 depicts an analog package opening detection system with the ability to localize the point(s) of opening
  • FIG. 6 depicts an analog opening and penetration detection system with three sensor circuits arranged as resistances in parallel;
  • FIG. 7 depicts a package with a continuous grid of conductive traces monitored by an ADC and CPU to detect and localize multiple opening or penetration events (analog method);
  • FIG. 8 is a schematic drawing of the cross-section of a package with a continuous grid monitored by a CPU and its ADC (analog method);
  • FIG. 9 shows cardboard roll stock with a continuous electrically conducting grid applied to its surface
  • FIG. 10 shows cardboard roll stock with a continuous electrically conducting coating.
  • a digital tampering detection device is described in accordance with an embodiment of the present invention, which device can be integrated in any paper board (cardboard) package during manufacturing.
  • the package will be formed from a blank 10 provided with at least a pair of closure tabs which are adhesively secured together to close the blank, after folding into a closed package.
  • the blank includes pairs of closure tabs A-A; B-B; and C-C which will co-act with each other to close the package.
  • the device is arranged to detect unauthorized opening of a package (tampering) via the package's closing tabs.
  • the tamper detection system requires the closing tabs of the package (A-A, B-B andC-C in FIG. 1) to be coated with electrically conductive adhesive 12.
  • a system of electrically conducting traces 14, 16, 18 of ink or other material is printed or otherwise applied to the surface of the blank to connect the closing tabs, forming an electrically conducting circuit.
  • the circuit is connected to two input pins (1 and 2) of a central processing unit (CPU) 20, itself comprising a procedure memory, power source, data memory, clock, and communication means such as an antenna.
  • the power source can be a conventional battery (such as a lithium or lithium ion cell), printed on the cardboard package, or otherwise manufactured, and the memory can be volatile or non-volatile according to the application.
  • the first traces 14 connect the CPU 20 to each of the first pair of closure tabs A-A; one of the second traces 16 and one of the third traces 18 connect one of the first closure tabs to respective ones of the second and third closure tabs B-B and C-C; and the other of the second traces 16 and the other of the third traces 18 connect the other of the first closure tabs A-A to the others of the second and third closure tabs B-B and C-C respectively.
  • the traces 14, 16 18 will be applied to the blank so as to take the most direct route available between the connection points thereof. Of course, at each closure tab the respective traces will make electrical connection with the electrically conductive adhesive applied to the tab.
  • the CPU 20 monitors the continuity of the electrical circuit (digital method). If the continuity is broken by opening the formed package via one of its closing tabs, the time of the event is determined from the CPU's clock, the event is time stamped, and the time is recorded in the CPU's data memory. At a later time, an interested party can retrieve the data from the CPU's memory for analysis to determine if the package has been opened (tampered). In the event tampering has been detected, the interested party can extrapolate back along the supply chain to determine where the tampering occurred. The data can be retrieved via a reader at distance, as by radio frequency (RF) or infrared (IR) transmission, or by direct contact. In this application of the device, a single tampering event can be detected and the tampering must occur by the opening of one or more of the package's tabs.
  • RF radio frequency
  • IR infrared
  • FIG. 2 depicts an application of the tampering detection device that allows detection of multiple openings via the closing tabs.
  • each pair of closing tabs is connected to the CPU by its own electrically conducting trace.
  • four connections to the CPU's input pins (1 , 2, 3, and C) are required.
  • Each circuit requires one connection to the CPU and the system requires a common (C) connection.
  • the CPU 20 is connected to the electrically conductive adhesive 12 of closure tabs A-A via the traces 14, 14; the CPU is connected to one each of the closure tabs
  • the CPU monitors the circuits for continuity (digital method). Opening the package via a tab breaks the continuity in that circuit and the time is determined and recorded along with the tab's (circuit's) identity. This can occur once for each circuit.
  • the procedure memory of the CPU may be programmed to reset the circuit if the tab is resealed with its conductive adhesive, re-establishing the circuit's continuity. In this application, multiple tab openings of the same tab can be detected and the times recorded.
  • a continuous pattern (including a random array) of electrically conducting traces can be used to connect the closing tabs of a package to form a single circuit.
  • the circuit terminates on two input pins (1 , 2) of the CPU 20 and the connecting traces 22 are arranged across the surface of the blank in a circuitous path that covers a large extent of the blank surface.
  • the CPU 20 monitors the continuity of the circuit (digital method). Penetration of the package breaks one or more of the traces and opens the circuit as does opening the package via one of its closure tabs. The time of opening of the circuit is determined from the CPU's clock and stored in its data memory.
  • the pattern of traces can be fine or coarse depending on the application. In other details the procedure is identical to that of the preceding detailed description in conjunction with FIG. 1.
  • the advantage of this method is that both penetration and opening tamperings can be detected and that only two attachments to the CPU are required reducing the cost of production.
  • the disadvantage is that only one tampering event can be detected and recorded, and that the design and application of the traces is more complicated.
  • the analog method lends itself to lower production costs due to the requirement for fewer connections to the CPU and the ability to utilize a simpler CPU with fewer input pins. It does require that the CPU have an analog-to-digital converter (ADC), which can be internal or external to the CPU.
  • ADC analog-to-digital converter
  • FIG. 4 shows an analog opening monitoring system with three steps (sensor circuits).
  • the pairs of closing tabs (A-A, B-B, C-C) are arranged as resistances in parallel in a single electrically conducting circuit 24 terminating on the input pins (1 , 2) of a CPU 26.
  • the ADC and CPU monitor the electrical characteristics of the circuit (resistance, voltage, current or combinations thereof) for fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
  • a change meeting the criteria is interpreted as an opening event, the time is determined from the CPU's clock, and the information is stored in the CPU's data memory.
  • the data can later be retrieved by a party interested in whether or not the package was opened (tampered). If tampering has been detected, the interested party can extrapolate back along the supply chain to determine where the tampering occurred.
  • the data can be retrieved via a reader at distance, as by radio frequency (RF) or infrared (IR) transmission, or by direct contact. In this application of the device, three tampering events can be detected and the tampering must occur by the opening of the package's closing tabs.
  • RF radio frequency
  • IR infrared
  • An advantage of the analog methodology is that the number of "steps" or sensor circuits that can be monitored is limited only by the ability of the CPU to detect a change (signal) from any noise (variability in electrical characteristics of the circuit not due to tampering events). As shown in FIG. 4, the magnitude of the changes occasioned by the opening of the tab circuits can be increased by using low resistance pats for the parallel circuit and higher resistance traces for the traces comprising the resistances in parallel.
  • the circuit 24 includes a pair of low resistance traces 28 connected to two pins of the CPU 26, and three pairs 30, 30; 32, 32; and 34, 34 of high resistance traces connecting the low resistance traces to the electrically conductive adhesive 12 of the closure tabs.
  • one each of the pairs of high resistance traces connects one of the low resistance traces to one each of each pair of closure tabs A-A; B-B; and C-C; the other of each pair of high resistance traces connects the other of the low resistance traces to the other of each pair of closure tabs.
  • the CPU cannot determine which tab has been opened as the reliably detectable changes may not be discriminable.
  • the resistance of the conductive traces connecting each tab pair (A-A, B-B, C-C) to the parallel circuit can be given significantly different resistances. As shown in FIG. 5, the resistance (R1) of the printed trace associated with tabs C-C is less than that associated with tabs B-B (R2) in that the cross sectional area of path R1 (C-C) is greater. Both resistances R1 and R2 are greater than the resistance of the traces 30, 30 associated with the tabs A-A.
  • the magnitude of changes associated with continuity breaking in one tab circuit compared to another can be programmed into the procedure memory of the CPU.
  • the analog method can also be used to detect opening and penetration of a cardboard package.
  • the printed traces connecting the tab pairs can be arranged in a circuitous path 36 covering a large extent of the surface of the blank.
  • the pairs of closing tabs (A-A, B-B, C-C) are arranged as resistances in parallel in a single electrically conducting circuit terminating on the input pins (1 , 2) of a CPU 38.
  • the ADC and CPU monitor the electrical characteristics of the circuit (resistance, voltage, current or combinations thereof) for fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. When a change meets the criteria it is interpreted as an opening or penetration event, the time is determined from the CPU's clock, and the information is stored in the CPU's data memory. The data can later be retrieved by a party interested in whether or not the package was opened or penetrated (tampered).
  • the sensor circuit traces are of higher resistance to maximize the discriminability of changes in the electrical characteristics occasioned by tampering events.
  • This analog method may also incorporate the method described previously in which each sensor circuit has a different associated resistance to allow identification of the location of the tampering.
  • a continuous grid 40 of conductive traces is printed or otherwise applied to the entire surface of the blank (FIG. 7).
  • the input terminals (1 ,2) of the CPU 42 are then connected to two disparate points on the grid via traces 44, 44 to form an electrically conducting circuit. Details of this attachment are given in FIG. 8.
  • the CPU via its ADC monitors the electrical characteristics of the grid for changes of a magnitude that meets fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
  • Opening of a tab or penetration of the grid changes its resistance.
  • changes meeting the criteria are detected they are interpreted as tampering events (opening or penetration).
  • This method has the ability to detect a number of such events, but cannot identify their locations.
  • the data are then stored in the CPU's data memory for subsequent downloading and interpretation as has been described previously.
  • a continuous coating of electrically conducting ink or other material is printed or applied to the entire surface of the package.
  • the input terminals of the CPU are then connected to two disparate points on the surface to form an electrically conducting circuit.
  • the CPU via its ADC monitors the electrical characteristics of the surface (circuit) for changes that meet fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
  • Opening of a tab or penetration of the surface changes its resistance.
  • changes meeting the criteria are detected they are interpreted as tampering events (opening or penetration).
  • This method has the ability to detect a number of such events, but cannot identify their locations. The data are then stored in the CPU's data memory for subsequent downloading and interpretation as has been described previously.
  • a cardboard roll stock 46 can be covered with a continuous grid 48 of electrically conducting traces either by printing or other means of application (FIG. 9) at the time of its production.
  • a CPU can then be attached to the grid by two input pins as shown in FIGS. 7 and 8. The electrical characteristics of the grid circuit can then be monitored for changes by the CPU via its ADC.
  • changes meeting the fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory are detected, the time is determined from the CPU's clock and recorded in the data memory. The data can later be retrieved and interpreted as described previously.
  • a continuous electrically conducting coating 50 can be applied to the cardboard roll stock 46 for subsequent incorporation into tamper-detecting packages as described for the continuous grid above (FIG 10).
  • the application of tamper-sensing traces is not limited to the interior surface of a package but can equally be applied to the exterior or laminated between the layers of a multi- layered cardboard package.
  • the shape of the package is not limited to square or rectangular designs and includes any shaped package manufactured by folding and gluing or otherwise being sealed.
  • the invention is not limited to cardboard packages but can be used with all materials from which folded packages can be constructed including, but not limited to, plastics and other laminated materials.
  • the CPU can be located either on the interior or exterior of the package and can be embedded in the cardboard where appropriate.
  • the CPU may in addition monitor other environmental characteristics capable of giving information about tampering with a package such as, but not limited to, shock, temperature, radiation, humidity and pressure and light.
  • the CPU may also be programmed to generate warning signals to indicate when tampering has been detected.
  • the warning device may be any device which can present a warning, such as light-emitting diodes (LED's), liquid crystal displays (LCD's) or other types of displays, audible devices, or any combination thereof.
  • the warning device may also transmit the warning covertly and at distance such as by RF or other means.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mechanical Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Burglar Alarm Systems (AREA)
  • Electrotherapy Devices (AREA)
  • Investigating Or Analysing Biological Materials (AREA)
  • Measuring Pulse, Heart Rate, Blood Pressure Or Blood Flow (AREA)
  • Cartons (AREA)
  • Alarm Systems (AREA)

Abstract

An electronic tampering detection system is applied to a blank which can be formed into a package through the use of closure tabs which are coated with an electrically conductive adhesive. An electronic chip or CPU is applied to the blank and electrically conductive traces are printed or otherwise formed on the blank to connect the CPU to first pair of the closure tabs to form an electric circuit. Other traces on the blank connect the first pair of closure tabs to the other closure tabs to form an enlarged circuit. The CPU has procedure memory, data memory,a power source, a clock and communication means associated therewith. If a package is opened accidentally or intentionally before is should be opened by way of the closure tabs the electric circuit is broken and a time stamp from the CPU clock is stored in the data memory for later retrieval. The circuit can be formed as resistances in parallel and an analog to digital converter can be used to provide an appropriate signal to the CPU. The electric circuit can cover a large portion of the blank's surface to provide a signal in the event of unauthorized penetration ofthe formed package.

Description

ELECTRONIC TAMPERING DETECTION SYSTEM
This invention relates to a system for detecting tampering with paper board (cardboard) packages and containers.
BACKGROUND OF THE INVENTION
Folded paper board (cardboard) packages (boxes, containers) are widely used to organize and ship a variety of contents. Many such contents are at risk for tampering or theft. In such scenarios, the paper board package is opened by an unauthorized person, giving unauthorized access to the contents of the package. The contents may be stolen and replaced with inactive versions of the contents, part or all of the units may simply be removed from the package (stolen), or the contents may be contaminated by the addition of toxic substances to the contents. The unauthorized person might then reseal the package, allowing it to continue in the distribution chain, disseminating its altered contents. It is widely acknowledged that it would be useful to have a means of detecting unauthorized access to the contents of cardboard packages to protect against theft and alteration of the contents thereof. Although there are many areas in which such a device might prove useful, there has recently been expressed particular concern by the FDA about the possibility of tampering with pharmaceuticals, pharmaceutical components, and food products.
SUMMARY OF THE INVENTION
The invention uses a system or systems of electrically conducting traces or coatings and/or electrically conducting glue connected to a central processing unit (CPU) in such a way that opening or penetrating the cardboard package will cause a change in the electrical characteristics of the circuit so created. The CPU monitors the circuit for such changes, and generates data about the time and other characteristics of the event, storing the data in its data memory. The data can later be accessed by an interested party, who can then determine if, and at what point in the supply chain, tampering occurred.
Two general tamper detection methods are described: The first method uses one or a plurality of individual circuits each connected directly to the CPU. The CPU monitors the continuity of the circuit(s). Breaking the circuit triggers a time stamp by the CPU according to its clock and the data is stored in the CPU's data memory to be retrieved later by an interested party. Because this method is based on one of two possible states (circuit open and circuit closed) it can be described as a "digital" method. The second method uses one or a plurality of sensor circuits arranged as resistances in parallel in a primary circuit, the electrical characteristics of which are monitored by the CPU via an analog-to-digital converter (ADC). Interrupting the continuity of the sensor circuits results in changes in the electrical characteristics of the primary circuit. Changes are compared to fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory and those changes meeting the criteria are interpreted as tampering and/or penetration events. The criteria for a significant change may be fixed at the time of programming the CPU, or they could be dynamic, where the procedure memory of the CPU updates the change criteria on the basis of its most recent determinations. The use of dynamic criteria compensates for drifting of the electrical characteristics of the circuit such as those due to changes in temperature and humidity, which changes do not vary linearly as a function of the number of events previously detected. The use of dynamic criteria maximizes the discriminability of the changes in resistance occasioned by breaking the sensor circuits, permitting more such sensor circuits to be monitored by a single circuit of given voltage. The time and other characteristics of interest are then stored in the CPU's data memory for later retrieval by an interested party. Because this method is based on a number of values or steps in the electrical characteristics of a circuit it can be described as an "analog" method.
Variations in design of the circuits are also described.
The CPU comprises an internal or external clock, internal or external ADC where required for analog monitoring, a power source and an antenna. It has both procedure and data memories, the latter of which may be volatile or non-volatile and internal or external to the CPU depending on the desired use. The CPU has the ability to communicate with external devices via radio frequency (RF), infrared (IR) or direct contact, as desired. The data can thus be retrieved for storage or analysis at a later time by a party interested in the integrity of the package, and in the case of a tampered package, the point in the chain where the tampering occurred. The latter can be determined from the time stamped data and other information about the event.
The invention comprises a CPU communicating with a system of electrically conducting traces printed or otherwise attached to the paper board comprising the package. The points of closure are attached by means of electrically conducting adhesive in such a way that they form part of the circuit(s). The CPU monitors the circuit(s) for changes in electrical characteristics. Fixed (or dynamic) criteria for changes considered to represent opening or penetration of the package (tampering) are stored (or calculated) in the CPU's procedure memory. When the package is opened or penetrated, the circuit is broken. The resulting change in electrical characteristics is noted by the CPU. If the change meets the criteria, the time of the event, as determined by the CPU's clock, is stored in the CPU'S data memory. Other data of interest, such as information about changes in light intensity, humidity, temperature, vibration, shock, or radiation, may also be captured by suitable environmental sensors and stored. Such variables may also be used to detect tampering in specific applications. In one version of the invention (digital method), the tabs closing the package by electrically conducting glue are arranged as a single closed electrical circuit terminating on the input pins of a CPU. Opening the package via one of its tabs opens the circuit. The CPU monitors the circuit for continuity (digital method), determines the time when the continuity is broken from its clock, and records the time in its data memory. In a variation of the digital version of the invention, subsets of the tabs are connected as independent circuits to different input pins of the CPU and a common ground. Each circuit requires one input pin connection and a common connection. In this variation, several points of opening can be monitored independently, and data can be obtained regarding multiple opening events where this is of interest. In a further variation of the digital version of the invention, the tabs closing the package by electrically conducting glue are connected by patterns of electrically conducting traces to form a single electrical circuit, the continuity of which is monitored by the CPU. A break in continuity is considered to represent a tampering event (opening or penetration) and the time is determined from the CPU's clock and recorded in its data memory. The conductive traces can be arranged in any pattern or randomly to cover all surfaces of the package according to the requirements of the application.
In a further variation of the digital version of the invention combinations of glued tabs and electrically conducting traces can be arranged to form separate electrically conducting circuits that can be monitored independently for continuity by the CPU. In this version multiple tampering events can be time stamped and the location of the tampering determined.
In a second version (analog method) of the invention, one or more sensor circuits connecting the closing tabs by electrically conducting traces printed on the surface of the package are arranged as resistances in parallel between two input pins of the CPU. The CPU via the ADC monitors the electrical characteristics of the parallel circuit, and interprets opening events according to fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. When changes in resistance or other electrical characteristics of the circuit meet the criteria, the time of the event is determined from the CPU's clock and recorded in the data memory. This method is limited to detecting package opening via the closing tabs. In some situations it may be desirable to monitor the package for both opening and penetration tampering. In a variation of the analog version of the invention, one or more sensor circuits comprising closing tabs, electrically conducting traces printed on the surface of the package, or combinations of tabs and traces are arranged as resistances in parallel between two input pins of the CPU. The CPU via the ADC monitors the electrical characteristics of the parallel circuit, and interprets opening or penetration events according to fixed (or dynamic) change criteria stored (or calculated) in the procedure memory of the CPU. When changes in resistance or other electrical characteristics of the circuit meet the criteria, the time of the event is determined from the CPU's clock, and recorded in the CPU's data memory. The data can later be retrieved by an interested party, who can determine if tampering has occurred, whether such tampering involved opening or penetrating the package, and when it occurred.
In a further variation of the analog version of the invention, the entire surface of the package is covered by a grid or other pattern of conducting traces. The ADC of the CPU is attached to this conducting grid at two disparate points, creating a circuit. The CPU monitors the electrical characteristics of the surface (circuit) for fixed (or dynamic) change criteria stored
(or calculated) in the procedure memory. A change meeting the criteria is interpreted as a tampering event, the time of which is determined from the CPU's clock, and recorded in the data memory.
In a further variation of the analog grid version described above, the grid is replaced by a continuous coating of electrically conductive ink or other material covering the entire surface of the package. The ADC of the CPU is attached to this continuous coating at two disparate points, creating a circuit. The CPU monitors the electrical characteristics of the surface (circuit) for fixed (or dynamic) change criteria stored (or calculated) in the procedure memory. A change meeting the criteria is interpreted as a tampering event, the time of which is determined from the CPU's clock, and recorded in the data memory.
In a further variation of the above variations of the analog version of the invention using a continuous coating or grid of electrically conducting material, the coating or grid can be printed or otherwise applied continuously on the cardboard roll stock at time of its manufacture. At a later time, when the cardboard package is die or otherwise cut from the roll and assembled into a cardboard package, its continuous electrically conducting coating or grid is attached to the input pins of a CPU attached to the package. The ADC of the CPU monitors the electrical characteristics of the circuit (continuous coating or grid) for changes meeting fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. Penetration of a surface of the package or opening of a tab causes a change in resistance, which change is detected by the CPU. Changes meeting the criteria are interpreted as tampering events and the time of the change is determined from the CPU's clock and stored in the data memory.
The use of a CPU with an ADC allows for the use of other environmental sensors in conjunction with the monitoring system described above. Sensors to measure changes in light, orientation, temperature, radiation, humidity and pressure can be used to supplement the tamper detecting ability of the present invention. For example, dark packages can be monitored by the ADC for increased light exposure; vacuum sealed packages can be monitored for changes in pressure; refrigerated packages can be monitored for changes in temperature as means of detecting tampering. Generally speaking and in summary of the above, the present invention may be considered as providing a system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, the system comprising: electrically conducting adhesive applied to each of the closure tabs; a programmable chip applied to one of the blank surfaces, the chip including a power source, procedure memory, data memory, clock means, and communication means; and electrically conducting trace means applied to one of the blank surfaces, one such trace means connecting the chip to the electrically conducting adhesive of one of the pair of closure tabs, and another of such trace means connecting the chip to the electrically conductive adhesive of the other of the pair of closure tabs; whereby with the blank having been formed into a closed package through adhesive joining together of the closure tabs, any separation of the tabs will break an electrical circuit which includes the trace means, the electrically conducting adhesive, and the chip means, which break will be recorded with a time stamp in the data memory of the chip.
In another aspect, the present invention may be considered to provide a system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, the system comprising: electrically conducting adhesive applied to each of the closure tabs; a programmable chip applied to one of the blank surfaces, the chip including a power source, procedure memory, data memory, clock means, an analog to digital converter (ADC), and communication means; and at least two low resistance electrically conducting trace means applied to one of the blank surfaces and connected at one end thereof to the chip, and at least two high resistance electrically conductive trace means applied to the one blank surface, one of such high resistance trace means connecting one of the low resistance trace means to the electrically conducting adhesive of one of the pair of closure tabs, and another of such high resistance trace means connecting the other of the low resistance trace means to the electrically conductive adhesive of the other of the pair of closure tabs; whereby with the blank having been formed into a closed package through adhesive joining together of the closure tabs, any separation of the tabs will break an electrical circuit which includes the trace means, the electrically conducting adhesive, and the chip means, which break will be recorded as a change in system resistance with a time stamp in the data memory of the chip.
Other aspects and features of the present invention will be readily apparent to those skilled in the art from a review of the following detailed description of preferred embodiments in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be further understood from the following description with reference to the drawings in which:
FIG. 1 depicts a package in which the three pairs of closing tabs are connected in series to a single monitoring circuit to detect opening of the package (digital method); FIG. 2 depicts a package in which the three pairs of closing tabs are monitored individually to detect time and location of opening of the package (digital method);
FIG. 3 depicts a package where the three pairs of opening tabs and a pattern of conductive traces are connected in series and monitored to detect opening or penetration of the package (digital method); FIG. 4 depicts a package in which the three pairs of closing tabs, each with an associated pattern of conductive traces, are arranged as resistances in parallel to permit monitoring of a single circuit to detect three opening events (analog method);
FIG. 5 depicts an analog package opening detection system with the ability to localize the point(s) of opening; FIG. 6 depicts an analog opening and penetration detection system with three sensor circuits arranged as resistances in parallel;
FIG. 7 depicts a package with a continuous grid of conductive traces monitored by an ADC and CPU to detect and localize multiple opening or penetration events (analog method);
FIG. 8 is a schematic drawing of the cross-section of a package with a continuous grid monitored by a CPU and its ADC (analog method);
FIG. 9 shows cardboard roll stock with a continuous electrically conducting grid applied to its surface; and
FIG. 10 shows cardboard roll stock with a continuous electrically conducting coating. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring to FIG. 1 , a digital tampering detection device is described in accordance with an embodiment of the present invention, which device can be integrated in any paper board (cardboard) package during manufacturing. Typically, the package will be formed from a blank 10 provided with at least a pair of closure tabs which are adhesively secured together to close the blank, after folding into a closed package. In the embodiments shown the blank includes pairs of closure tabs A-A; B-B; and C-C which will co-act with each other to close the package. In the application depicted in FIG. 1 , the device is arranged to detect unauthorized opening of a package (tampering) via the package's closing tabs. The tamper detection system requires the closing tabs of the package (A-A, B-B andC-C in FIG. 1) to be coated with electrically conductive adhesive 12. A system of electrically conducting traces 14, 16, 18 of ink or other material is printed or otherwise applied to the surface of the blank to connect the closing tabs, forming an electrically conducting circuit. The circuit is connected to two input pins (1 and 2) of a central processing unit (CPU) 20, itself comprising a procedure memory, power source, data memory, clock, and communication means such as an antenna. The power source can be a conventional battery (such as a lithium or lithium ion cell), printed on the cardboard package, or otherwise manufactured, and the memory can be volatile or non-volatile according to the application.
In the embodiment of FIG. 1 the first traces 14 connect the CPU 20 to each of the first pair of closure tabs A-A; one of the second traces 16 and one of the third traces 18 connect one of the first closure tabs to respective ones of the second and third closure tabs B-B and C-C; and the other of the second traces 16 and the other of the third traces 18 connect the other of the first closure tabs A-A to the others of the second and third closure tabs B-B and C-C respectively. Preferably the traces 14, 16 18 will be applied to the blank so as to take the most direct route available between the connection points thereof. Of course, at each closure tab the respective traces will make electrical connection with the electrically conductive adhesive applied to the tab.
The CPU 20 monitors the continuity of the electrical circuit (digital method). If the continuity is broken by opening the formed package via one of its closing tabs, the time of the event is determined from the CPU's clock, the event is time stamped, and the time is recorded in the CPU's data memory. At a later time, an interested party can retrieve the data from the CPU's memory for analysis to determine if the package has been opened (tampered). In the event tampering has been detected, the interested party can extrapolate back along the supply chain to determine where the tampering occurred. The data can be retrieved via a reader at distance, as by radio frequency (RF) or infrared (IR) transmission, or by direct contact. In this application of the device, a single tampering event can be detected and the tampering must occur by the opening of one or more of the package's tabs.
In some applications it may be desirable to know which of a package's several closing tabs has been opened. FIG. 2 depicts an application of the tampering detection device that allows detection of multiple openings via the closing tabs. In this application of the device, each pair of closing tabs is connected to the CPU by its own electrically conducting trace. For a three tab-pair package, four connections to the CPU's input pins (1 , 2, 3, and C) are required. Each circuit requires one connection to the CPU and the system requires a common (C) connection. In this configuration the CPU 20 is connected to the electrically conductive adhesive 12 of closure tabs A-A via the traces 14, 14; the CPU is connected to one each of the closure tabs
B-B and C-C via one each of the traces 16', 16' and 18', 18'; and the others of the closure tabs B-B and C-C are connected to one of the traces 14, 14 via the others of the traces 16', 16' and 18', 18'. The CPU monitors the circuits for continuity (digital method). Opening the package via a tab breaks the continuity in that circuit and the time is determined and recorded along with the tab's (circuit's) identity. This can occur once for each circuit. In some applications the procedure memory of the CPU may be programmed to reset the circuit if the tab is resealed with its conductive adhesive, re-establishing the circuit's continuity. In this application, multiple tab openings of the same tab can be detected and the times recorded. In other details the procedure is identical to that of the preceding detailed description in conjunction with FIG. 1. The advantage of this application is that details of specific tab openings and multiple such openings can be obtained where this is of interest. The disadvantage of this application is that the CPU requires more input pins and the system more attachments to the CPU, increasing manufacturing costs.
In other applications it may be desirable to detect package penetration through the sides of the package as well as opening via the closing tabs. In such applications a continuous pattern (including a random array) of electrically conducting traces can be used to connect the closing tabs of a package to form a single circuit. As depicted in FIG. 3, the circuit terminates on two input pins (1 , 2) of the CPU 20 and the connecting traces 22 are arranged across the surface of the blank in a circuitous path that covers a large extent of the blank surface. The CPU 20 monitors the continuity of the circuit (digital method). Penetration of the package breaks one or more of the traces and opens the circuit as does opening the package via one of its closure tabs. The time of opening of the circuit is determined from the CPU's clock and stored in its data memory. The pattern of traces can be fine or coarse depending on the application. In other details the procedure is identical to that of the preceding detailed description in conjunction with FIG. 1. The advantage of this method is that both penetration and opening tamperings can be detected and that only two attachments to the CPU are required reducing the cost of production. The disadvantage is that only one tampering event can be detected and recorded, and that the design and application of the traces is more complicated. The analog method lends itself to lower production costs due to the requirement for fewer connections to the CPU and the ability to utilize a simpler CPU with fewer input pins. It does require that the CPU have an analog-to-digital converter (ADC), which can be internal or external to the CPU. The analog method also allows for more flexibility in terms of the numbers and types of sensors that can be monitored simultaneously. FIG. 4 shows an analog opening monitoring system with three steps (sensor circuits). The pairs of closing tabs (A-A, B-B, C-C) are arranged as resistances in parallel in a single electrically conducting circuit 24 terminating on the input pins (1 , 2) of a CPU 26. The ADC and CPU monitor the electrical characteristics of the circuit (resistance, voltage, current or combinations thereof) for fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. A change meeting the criteria is interpreted as an opening event, the time is determined from the CPU's clock, and the information is stored in the CPU's data memory. The data can later be retrieved by a party interested in whether or not the package was opened (tampered). If tampering has been detected, the interested party can extrapolate back along the supply chain to determine where the tampering occurred. The data can be retrieved via a reader at distance, as by radio frequency (RF) or infrared (IR) transmission, or by direct contact. In this application of the device, three tampering events can be detected and the tampering must occur by the opening of the package's closing tabs. An advantage of the analog methodology is that the number of "steps" or sensor circuits that can be monitored is limited only by the ability of the CPU to detect a change (signal) from any noise (variability in electrical characteristics of the circuit not due to tampering events). As shown in FIG. 4, the magnitude of the changes occasioned by the opening of the tab circuits can be increased by using low resistance pats for the parallel circuit and higher resistance traces for the traces comprising the resistances in parallel.
With reference to FIG. 4 the circuit 24 includes a pair of low resistance traces 28 connected to two pins of the CPU 26, and three pairs 30, 30; 32, 32; and 34, 34 of high resistance traces connecting the low resistance traces to the electrically conductive adhesive 12 of the closure tabs. Thus one each of the pairs of high resistance traces connects one of the low resistance traces to one each of each pair of closure tabs A-A; B-B; and C-C; the other of each pair of high resistance traces connects the other of the low resistance traces to the other of each pair of closure tabs.
In the analog method previously described, the CPU cannot determine which tab has been opened as the reliably detectable changes may not be discriminable. To facilitate discriminability, the resistance of the conductive traces connecting each tab pair (A-A, B-B, C-C) to the parallel circuit can be given significantly different resistances. As shown in FIG. 5, the resistance (R1) of the printed trace associated with tabs C-C is less than that associated with tabs B-B (R2) in that the cross sectional area of path R1 (C-C) is greater. Both resistances R1 and R2 are greater than the resistance of the traces 30, 30 associated with the tabs A-A. The magnitude of changes associated with continuity breaking in one tab circuit compared to another can be programmed into the procedure memory of the CPU. Changes meeting a given criterion will represent disruption of a specific tab pair. In this way, both the tab location opened and the time of opening can be determined in the manner described above. The analog method can also be used to detect opening and penetration of a cardboard package. As illustrated in FIG. 6, the printed traces connecting the tab pairs can be arranged in a circuitous path 36 covering a large extent of the surface of the blank. The pairs of closing tabs (A-A, B-B, C-C) are arranged as resistances in parallel in a single electrically conducting circuit terminating on the input pins (1 , 2) of a CPU 38. The ADC and CPU monitor the electrical characteristics of the circuit (resistance, voltage, current or combinations thereof) for fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. When a change meets the criteria it is interpreted as an opening or penetration event, the time is determined from the CPU's clock, and the information is stored in the CPU's data memory. The data can later be retrieved by a party interested in whether or not the package was opened or penetrated (tampered). In FIG 6, the sensor circuit traces are of higher resistance to maximize the discriminability of changes in the electrical characteristics occasioned by tampering events. This analog method may also incorporate the method described previously in which each sensor circuit has a different associated resistance to allow identification of the location of the tampering. In a further variation of the analog method, a continuous grid 40 of conductive traces is printed or otherwise applied to the entire surface of the blank (FIG. 7). The input terminals (1 ,2) of the CPU 42 are then connected to two disparate points on the grid via traces 44, 44 to form an electrically conducting circuit. Details of this attachment are given in FIG. 8. The CPU via its ADC monitors the electrical characteristics of the grid for changes of a magnitude that meets fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory.
Opening of a tab or penetration of the grid changes its resistance. When changes meeting the criteria are detected they are interpreted as tampering events (opening or penetration). This method has the ability to detect a number of such events, but cannot identify their locations. The data are then stored in the CPU's data memory for subsequent downloading and interpretation as has been described previously. In a further variation of the analog grid method described above, a continuous coating of electrically conducting ink or other material is printed or applied to the entire surface of the package. The input terminals of the CPU are then connected to two disparate points on the surface to form an electrically conducting circuit. The CPU via its ADC monitors the electrical characteristics of the surface (circuit) for changes that meet fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory. Opening of a tab or penetration of the surface changes its resistance. When changes meeting the criteria are detected they are interpreted as tampering events (opening or penetration). This method has the ability to detect a number of such events, but cannot identify their locations. The data are then stored in the CPU's data memory for subsequent downloading and interpretation as has been described previously.
To facilitate the manufacturing of tamper-sensing cardboard containers, a cardboard roll stock 46 can be covered with a continuous grid 48 of electrically conducting traces either by printing or other means of application (FIG. 9) at the time of its production. When individual packages are later die or otherwise cut from the roll stock, they will have a continuous grid applied to their surface. A CPU can then be attached to the grid by two input pins as shown in FIGS. 7 and 8. The electrical characteristics of the grid circuit can then be monitored for changes by the CPU via its ADC. When changes meeting the fixed (or dynamic) change criteria stored (or calculated) in the CPU's procedure memory are detected, the time is determined from the CPU's clock and recorded in the data memory. The data can later be retrieved and interpreted as described previously.
Similarly, a continuous electrically conducting coating 50 can be applied to the cardboard roll stock 46 for subsequent incorporation into tamper-detecting packages as described for the continuous grid above (FIG 10). The application of tamper-sensing traces is not limited to the interior surface of a package but can equally be applied to the exterior or laminated between the layers of a multi- layered cardboard package.
The shape of the package is not limited to square or rectangular designs and includes any shaped package manufactured by folding and gluing or otherwise being sealed. The invention is not limited to cardboard packages but can be used with all materials from which folded packages can be constructed including, but not limited to, plastics and other laminated materials.
The CPU can be located either on the interior or exterior of the package and can be embedded in the cardboard where appropriate. The CPU may in addition monitor other environmental characteristics capable of giving information about tampering with a package such as, but not limited to, shock, temperature, radiation, humidity and pressure and light.
The CPU may also be programmed to generate warning signals to indicate when tampering has been detected. The warning device may be any device which can present a warning, such as light-emitting diodes (LED's), liquid crystal displays (LCD's) or other types of displays, audible devices, or any combination thereof. The warning device may also transmit the warning covertly and at distance such as by RF or other means.

Claims

1. A system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, said system comprising: electrically conducting adhesive applied to each of said closure tabs; a programmable chip applied to one of said blank surfaces, said chip including a power source, procedure memory, data memory, clock means, and communication means; and electrically conducting trace means applied to one of said blank surfaces, one such trace means connecting said chip to the electrically conducting adhesive of one of said pair of closure tabs, and another of such trace means connecting said chip to the electrically conductive adhesive of the other of said pair of closure tabs; whereby with said blank having been formed into a closed package through adhesive joining together of said closure tabs, any separation of said tabs will break an electrical circuit which includes said trace means, said electrically conducting adhesive, and said chip means, which break will be recorded with a time stamp in said data memory of said chip.
2. The system of claim 1 wherein said blank includes three pairs of closure tabs, each being coated with electrically conductive adhesive, and wherein said trace means includes first trace means connecting said chip to each closure tab of a first pair of closure tabs, second trace means connecting each closure tab of said first pair of closure tabs to a respective closure tab of a second pair of closure tabs, and third trace means connecting each closure tab of said first pair of closure tabs to a respective closure tab of the third pair of closure tabs.
3. The system of claim 1 wherein said blank includes three pairs of closure tabs, each being coated with electrically conductive adhesive, and wherein said trace means includes first trace means connecting said chip to each closure tab of a first pair of closure tabs, second trace means connecting said chip to one closure tab of each of said second and third pairs of closure tabs, and third trace means connecting the other of each of said second and third pairs of closure tabs to said first trace means.
4. The system of any one of claims 1 to 3 wherein said trace means are applied to said blank along a path which defines the shortest practical distance between connection points at each end thereof.
5. The system of any one of claims 1 to 3 wherein said trace means are applied to said blank along a circuitous path that covers a substantial extent of said blank.
6. The system of any one of claims 1 to 5 wherein said procedure memory and/or said data memory is either volatile or non-volatile and is either internal or external to said chip.
7. The system of any one of claims 1 to 6 wherein said communication means includes means for communicating data from said data memory with an external receiver via radio frequence (RF), infrared (IR), or via a direct physical connection.
8. The system of any one of claims 1 to 7 wherein said trace means are printed onto said blank as an electrically conductive ink.
9. The system of any one of claims 1 to 7 wherein said trace means are screen printed onto said blank.
10. The system of any one of claims 1 to 7 wherein said trace means are thin conductive wires adhered to said blank.
11. A system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, said system comprising: electrically conducting adhesive applied to each of said closure tabs; a programmable chip applied to one of said blank surfaces, said chip including a power source, procedure memory, data memory, clock means, an analog to digital converter (ADC), and communication means; and at least two low resistance electrically conducting trace means applied to one of said blank surfaces and connected at one end thereof to said chip, and at least two high resistance electrically conductive trace means applied to said one blank surface, one of such high resistance trace means connecting one of said low resistance trace means to the electrically conducting adhesive of one of said pair of closure tabs, and another of such high resistance trace means connecting the other of said low resistance trace means to the electrically conductive adhesive of the other of said pair of closure tabs; whereby with said blank having been formed into a closed package through adhesive joining together of said closure tabs, any separation of said tabs will break an electrical circuit which includes said trace means, said electrically conducting adhesive, and said chip means, which break will be recorded as a change in system resistance with a time stamp in said data memory of said chip.
12. The system of claim 11 wherein said blank includes three pairs of closure tabs, each being coated with electrically conductive adhesive, and wherein said high resistance trace means includes first high resistance trace means connecting said low resistance trace means to respective ones of a first pair of closure tabs, second trace means connecting said low resistance trace means to respective ones of a second pair of closure tabs, and third trace means connecting said low resistance trace means to respective ones of the third pair of closure tabs.
13. The system of claim 11 wherein the resistance of each of said high resistance trace means differs significantly from the resistance of the others of said high resistance trace means.
14. The system of any one of claims 11 to 13 wherein said high resistance trace means are applied to said blank along paths which define the shortest practical distance between connection points at each end thereof.
15. The system of any one of claims 11 to 13 wherein said high resistance trace means are applied to said blank along circuitous paths that cover a substantial extent of said blank.
16. The system of any one of claims 11 to 15 wherein said procedure memory and/or said data memory is either volatile or non-volatile and is either internal or external to said chip.
17. The system of any one of claims 11 to16 wherein said communication means includes means for communicating data from said data memory with an external receiver via radio frequence (RF), infrared (IR), or via a direct physical connection.
18. The system of any one of claims 11 to 17 wherein said trace means are printed onto said blank as an electrically conductive ink.
19. The system of any one of claims 11 to 17 wherein said trace means are screen printed onto said blank.
20. The system of any one of claims 11 to 17 wherein said trace means are thin conductive wires adhered to said blank.
21. A system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, said system comprising: electrically conducting adhesive applied to each of said closure tabs; a programmable chip applied to one of said surfaces, said chip including a power source, procedure memory, data memory, clock means, an analog to digital converter (ADC), and communication means; and a grid of low resistance electrically conducting trace means applied to one surface of the blank, and high resistance electrically conductive trace means connecting said chip to said grid at two separate points thereon; whereby with said blank having been formed into a closed package through adhesive joining together of said closure tabs, any separation of said tabs or penetration of said package will break an electrical circuit which includes said trace means, said electrically conducting adhesive, and said chip means, which break will be recorded as a change in system resistance with a time stamp in said data memory of said chip.
22. The system of claim 21 wherein said blank is formed from a continuous roll of blank material to which said grid of low resistance electrically conducting trace means has been applied prior to formation of said blank.
23. A system for detecting tampering or unauthorized entry into a package formed from a blank having at least a pair of closure tabs, an inner surface and an outer surface, said system comprising: electrically conducting adhesive applied to each of said closure tabs; a programmable chip applied to one of said surfaces, said chip including a power source, procedure memory, data memory, clock means, an analog to digital converter (ADC), and communication means; a coating of low resistance electrically conducting trace means applied to one surface of the blank to cover such surface; and high resistance electrically conductive trace means connecting said chip to said coating at two separate points thereon; whereby with said blank having been formed into a closed package through adhesive joining together of said closure tabs, any separation of said tabs or penetration of said package will alter an electrical circuit which includes said trace means, said coating, said electrically conducting adhesive, and said chip means, which separation or penetration will be recorded as a change in system resistance with a time stamp in said data memory of said chip.
24. The system of claim 23 wherein said blank is formed from a continuous roll of blank material to which said low resistance electrically conducting coating has been applied prior to formation of said blank.
25. The system of any one of claims 1 to 20 wherein said blank is formed from a plurality of layers sandwiched together and said trace means are applied between one pair of such layers.
26. The system of claim 21 or claim 22 wherein said blank is formed from a plurality of layers sandwiched together and at least said grid is located between one pair of such layers.
27. The system of claim 23 or claim 24 wherein said blank is formed from a plurality of layers sandwiched together and said coating is applied to one of said layers such that it is located between one pair of such layers.
28 The system of any one of claims 1 to 27 including means connected to said chip for sensing one or more conditions related to temperature, humidity, vibration, orientation, pressure, radiation and light and for recording in said data memory changes in such conditions beyond predetermined thresholds relating thereto.
PCT/CA2003/001625 2002-10-25 2003-10-24 Electronic tampering detection system WO2004037660A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
DE60304601T DE60304601T2 (en) 2002-10-25 2003-10-24 ELECTRONIC MANIPULATION DETECTION SYSTEM
AU2003275845A AU2003275845A1 (en) 2002-10-25 2003-10-24 Electronic tampering detection system
EP03809231A EP1562829B1 (en) 2002-10-25 2003-10-24 Electronic tampering detection system
JP2004545648A JP2006507995A (en) 2002-10-25 2003-10-24 Electronic tamper detection system
US11/113,323 US7119684B2 (en) 2002-10-25 2005-04-25 Electronic tampering detection system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CA2,409,624 2002-10-25
CA2409624A CA2409624C (en) 2002-10-25 2002-10-25 Electronic tampering detection system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/113,323 Continuation US7119684B2 (en) 2002-10-25 2005-04-25 Electronic tampering detection system

Publications (1)

Publication Number Publication Date
WO2004037660A1 true WO2004037660A1 (en) 2004-05-06

Family

ID=32111428

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2003/001625 WO2004037660A1 (en) 2002-10-25 2003-10-24 Electronic tampering detection system

Country Status (8)

Country Link
US (1) US7119684B2 (en)
EP (1) EP1562829B1 (en)
JP (1) JP2006507995A (en)
AT (1) ATE323032T1 (en)
AU (1) AU2003275845A1 (en)
CA (1) CA2409624C (en)
DE (1) DE60304601T2 (en)
WO (1) WO2004037660A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2874111A1 (en) * 2004-08-06 2006-02-10 Gwenaelle Anna Henry Goods e.g. watches, container breakage tracing and control device, has control electronics with firmware circuit having input to detect breakage of container to store moment of breaking, and which has input connected to movement detector
WO2006056887A2 (en) * 2004-07-23 2006-06-01 David Weekes Systems and apparatus for secure shipping
WO2006060945A1 (en) * 2004-12-07 2006-06-15 Pingxiao Deng A tamper-resistant detecting device for liquid products with a self-damaged protection function & a detecting method
US7088252B2 (en) 2004-06-10 2006-08-08 David Weekes Systems and apparatus for personal security
WO2006102678A1 (en) * 2005-03-24 2006-09-28 Intel Corporation Tamper detection with rfid tag
WO2007090936A1 (en) * 2006-02-07 2007-08-16 Henry Gwenaelle Anna Device for tracing and monitoring pilfering from merchandise packages during their transport
WO2009080317A1 (en) * 2007-12-21 2009-07-02 Oltre S.R.L. Anti-theft device, particularly for pallets loaded with goods
EP2078208A2 (en) * 2006-11-03 2009-07-15 Gore Enterprise Holdings, Inc. Tamper respondent sensor and enclosure
WO2010080770A1 (en) * 2009-01-07 2010-07-15 Meadwestvaco Corporation Security packaging
WO2012099708A1 (en) * 2011-01-21 2012-07-26 Sensormatic Electronics, LLC Soft alarming safer
WO2013011370A1 (en) * 2011-07-19 2013-01-24 Dubois Limited Product container or package having a security device
CN103538776A (en) * 2013-10-22 2014-01-29 浙江纺织服装职业技术学院 Logistical antitheft printed bag
CN103541093A (en) * 2013-10-22 2014-01-29 浙江纺织服装职业技术学院 Logistical antitheft woven bag
US8698627B2 (en) 2009-01-07 2014-04-15 Meadwestvaco Corporation Security packaging
ITTO20130182A1 (en) * 2013-03-07 2014-09-08 Uale SAFETY ARTICLE IN PARTICULAR FOR POSTAL USE WITH A SIGNALING DEVICE
US9355537B2 (en) 2014-08-21 2016-05-31 Dubois Limited Optical security tag
ITUB20159837A1 (en) * 2015-12-15 2017-06-15 T & T Srl MECHANICAL AND ELECTRONIC SENSOR TO DETECT CUTS AND LACTIONS
IT201600129333A1 (en) * 2016-12-21 2018-06-21 Igb Srl CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME.
IT201600129360A1 (en) * 2016-12-21 2018-06-21 Igb Srl CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME
IT201800005410A1 (en) * 2018-05-16 2019-11-16 Corrugated cardboard packaging suitable for detecting break-ins to the detriment of the same
US11295597B2 (en) 2017-11-22 2022-04-05 Timothy Neville WALSH Tamper detection system

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6995669B2 (en) * 2003-03-25 2006-02-07 Fernando Morales System and method to enhance security of shipping containers
US7239247B2 (en) * 2003-07-30 2007-07-03 Albert George Adams Access annunciator
WO2006031824A2 (en) * 2004-09-14 2006-03-23 Adasa, Inc. Systems and methods for deployment and recycling of rfid tags, wireless sensors, and the containers attached thereto
US20060243793A1 (en) * 2005-04-27 2006-11-02 Siewert Neil E Value unit
US7538683B2 (en) * 2005-10-26 2009-05-26 Motorola, Inc. Containment mechanism manipulation responsive electrical circuit power usage apparatus and method
CN101365634A (en) * 2005-12-12 2009-02-11 国际纸业公司 Momentary switch integrated in packaging of an article
JP4743660B2 (en) * 2006-02-09 2011-08-10 ブラザー工業株式会社 Wireless tag label and tag label producing apparatus
DE102006016011A1 (en) * 2006-04-05 2007-10-18 Rolls-Royce Deutschland Ltd & Co Kg Emergency shutdown detector device for a gas turbine
US20080001741A1 (en) * 2006-06-29 2008-01-03 Honeywell International Inc. Large area distributed sensor
US20090189763A1 (en) * 2008-01-28 2009-07-30 Kenneth Brinkley Security film
CN102037454A (en) 2008-05-21 2011-04-27 惠普开发有限公司 Multi-drop serial bus with location detection and method
US20100089789A1 (en) * 2008-10-14 2010-04-15 Rosenbaum Ronald Dosage form package and a frangible electrical circuit sheet therefor
US9387148B2 (en) * 2008-10-14 2016-07-12 Mts Medication Technologies, Inc. Dosage form package and a frangible electrical circuit sheet therefor
TWI398109B (en) * 2009-09-02 2013-06-01 Mstar Semiconductor Inc Universal infrared receiving apparatus and associated method
CN102666295A (en) * 2009-10-21 2012-09-12 德国邮政股份公司 Tamper-evident closure for a box with alarm sensor
WO2011138452A1 (en) * 2010-05-06 2011-11-10 Degudent Gmbh Rfid seal for container packaging
US9454504B2 (en) 2010-09-30 2016-09-27 Hewlett-Packard Development Company, L.P. Slave device bit sequence zero driver
GB201020947D0 (en) * 2010-12-10 2011-01-26 Maxgear Europ Ltd Security sticker
US8577335B2 (en) 2011-06-08 2013-11-05 Kitaru Innovations Inc. Method and apparatus for tracking package deliveries
CA2775546A1 (en) * 2012-04-25 2013-10-25 Intelligent Devices Inc. A disposable content use monitoring package with indicator and method of making same
US10074247B1 (en) * 2012-10-02 2018-09-11 Amazon Technologies, Inc. Package opening detection and control
DE102014223256A1 (en) 2014-11-14 2016-05-19 Robert Bosch Gmbh Device for the opening sensing of a packaging and method for the production of the device
DE102014223282A1 (en) 2014-11-14 2016-05-19 Robert Bosch Gmbh Device for sensing a packaging
DE102014223248A1 (en) 2014-11-14 2016-05-19 Robert Bosch Gmbh Device for operating a packaging
DE102014223264A1 (en) 2014-11-14 2016-05-19 Robert Bosch Gmbh Device for sensing a packaging
US10579833B1 (en) * 2014-12-16 2020-03-03 Thales Esecurity, Inc. Tamper detection circuit assemblies and related manufacturing processes
US9898909B2 (en) 2015-01-30 2018-02-20 Nokia Solutions And Networks Oy Method and apparatus for tamper detection
US10140570B2 (en) * 2015-08-18 2018-11-27 William P Gulas Microprocessor-controlled tamper detection system
CN105236007A (en) * 2015-10-14 2016-01-13 周哲民 Circulation box management system based on Internet
PL3190065T5 (en) * 2016-01-08 2022-09-05 Reemtsma Cigarettenfabriken Gmbh Packaging with an information encoding pattern detectable by a capacitive touch screen
US10192076B1 (en) * 2016-08-29 2019-01-29 Square, Inc. Security housing with recesses for tamper localization
EP3407262A1 (en) * 2017-05-24 2018-11-28 SML Brand Identification Solutions Limited Multi-configuration label
DE112017008028A5 (en) * 2017-09-13 2020-07-02 Relytex Gmbh & Co. Kg Packaging system with a security system
JP6924412B2 (en) * 2017-09-22 2021-08-25 大日本印刷株式会社 Opening detection container
US10262319B1 (en) * 2018-07-11 2019-04-16 Capital One Services, Llc Automatically activating a transaction card by detecting a change associated with a package that carries the transaction card
US20200320903A1 (en) * 2019-04-04 2020-10-08 Opticallock, Inc. Variable pattern shield protection system for a tamper-evident container
CN115190998A (en) * 2019-11-16 2022-10-14 艾利丹尼森零售信息服务有限公司 Radio frequency identification and packaging substrate system and method
US11709972B2 (en) * 2020-02-21 2023-07-25 Te Connectivity Solutions Gmbh Substrate for a tamper sensor
IT202000009250A1 (en) * 2020-04-28 2021-10-28 Va Co Plast S A S Di Scarso Valter & C ALARMED FOLDING PACKAGING FOR PALLET
DE202021101432U1 (en) * 2021-03-22 2022-06-23 Tiger Media Deutschland Gmbh Functional item with a transponder and system with such a functional item
WO2023198583A1 (en) * 2022-04-14 2023-10-19 Authena Ag Protective electronic tag

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0329960A2 (en) * 1988-02-25 1989-08-30 Westinghouse Electric Corporation Secured package integrity
GB2287339A (en) * 1994-03-08 1995-09-13 Ies Integrated Electronic Syst Security sensors
WO2002038456A1 (en) * 2000-11-09 2002-05-16 Frederick Philip Selwyn Intelligent container

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4818120A (en) * 1987-07-20 1989-04-04 Nabisco Brands, Inc. Openable and reclosable tamper evident bag tag
US5323150A (en) * 1992-06-11 1994-06-21 Micron Technology, Inc. Method for reducing conductive and convective heat loss from the battery in an RFID tag or other battery-powered devices
US6045652A (en) * 1992-06-17 2000-04-04 Micron Communications, Inc. Method of manufacturing an enclosed transceiver
JP4580568B2 (en) * 2001-02-09 2010-11-17 大日本印刷株式会社 Storage box with non-contact IC tag
US7316358B2 (en) * 2002-03-18 2008-01-08 Precision Dynamics Corporation Identification band with adhesively attached coupling elements

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0329960A2 (en) * 1988-02-25 1989-08-30 Westinghouse Electric Corporation Secured package integrity
GB2287339A (en) * 1994-03-08 1995-09-13 Ies Integrated Electronic Syst Security sensors
WO2002038456A1 (en) * 2000-11-09 2002-05-16 Frederick Philip Selwyn Intelligent container

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7088252B2 (en) 2004-06-10 2006-08-08 David Weekes Systems and apparatus for personal security
US7088257B2 (en) 2004-06-10 2006-08-08 David Weekes Systems and apparatus for secure shipping
WO2006056887A2 (en) * 2004-07-23 2006-06-01 David Weekes Systems and apparatus for secure shipping
WO2006056887A3 (en) * 2004-07-23 2006-07-20 David Weekes Systems and apparatus for secure shipping
FR2874111A1 (en) * 2004-08-06 2006-02-10 Gwenaelle Anna Henry Goods e.g. watches, container breakage tracing and control device, has control electronics with firmware circuit having input to detect breakage of container to store moment of breaking, and which has input connected to movement detector
WO2006060945A1 (en) * 2004-12-07 2006-06-15 Pingxiao Deng A tamper-resistant detecting device for liquid products with a self-damaged protection function & a detecting method
GB2436494A (en) * 2005-03-24 2007-09-26 Intel Corp Tamper detection with rfid tag
WO2006102678A1 (en) * 2005-03-24 2006-09-28 Intel Corporation Tamper detection with rfid tag
WO2007090936A1 (en) * 2006-02-07 2007-08-16 Henry Gwenaelle Anna Device for tracing and monitoring pilfering from merchandise packages during their transport
EP2078208A2 (en) * 2006-11-03 2009-07-15 Gore Enterprise Holdings, Inc. Tamper respondent sensor and enclosure
EP2078208A4 (en) * 2006-11-03 2010-11-03 Gore Enterprise Holdings Inc Tamper respondent sensor and enclosure
WO2009080317A1 (en) * 2007-12-21 2009-07-02 Oltre S.R.L. Anti-theft device, particularly for pallets loaded with goods
US8698627B2 (en) 2009-01-07 2014-04-15 Meadwestvaco Corporation Security packaging
WO2010080770A1 (en) * 2009-01-07 2010-07-15 Meadwestvaco Corporation Security packaging
CN102272805A (en) * 2009-01-07 2011-12-07 米德韦斯瓦科公司 Security packaging
EP2442283A1 (en) * 2009-01-07 2012-04-18 MeadWestvaco Corporation Security packaging
CN102272805B (en) * 2009-01-07 2013-12-11 米德韦斯瓦科公司 Security packaging
CN103786968A (en) * 2009-01-07 2014-05-14 米德韦斯瓦科公司 Security packaging
WO2012099708A1 (en) * 2011-01-21 2012-07-26 Sensormatic Electronics, LLC Soft alarming safer
WO2013011370A1 (en) * 2011-07-19 2013-01-24 Dubois Limited Product container or package having a security device
ITTO20130182A1 (en) * 2013-03-07 2014-09-08 Uale SAFETY ARTICLE IN PARTICULAR FOR POSTAL USE WITH A SIGNALING DEVICE
CN103541093A (en) * 2013-10-22 2014-01-29 浙江纺织服装职业技术学院 Logistical antitheft woven bag
CN103538776A (en) * 2013-10-22 2014-01-29 浙江纺织服装职业技术学院 Logistical antitheft printed bag
US9355537B2 (en) 2014-08-21 2016-05-31 Dubois Limited Optical security tag
ITUB20159837A1 (en) * 2015-12-15 2017-06-15 T & T Srl MECHANICAL AND ELECTRONIC SENSOR TO DETECT CUTS AND LACTIONS
EP3181476A1 (en) * 2015-12-15 2017-06-21 T & T S.r.l. A mechanical and electronic sensor adapted to detect cuts and lacerations
IT201600129333A1 (en) * 2016-12-21 2018-06-21 Igb Srl CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME.
IT201600129360A1 (en) * 2016-12-21 2018-06-21 Igb Srl CONTAINER WITH EVIDENCE OF TAMPERING AND PROCEDURE FOR THE REALIZATION OF THE SAME
EP3339202A1 (en) * 2016-12-21 2018-06-27 I.G.B. S.r.l. Tamper-evident container and process of making the same
WO2018116037A1 (en) * 2016-12-21 2018-06-28 I.G.B. S.R.L. Tamper-evident container and process of making the same
US11295597B2 (en) 2017-11-22 2022-04-05 Timothy Neville WALSH Tamper detection system
IT201800005410A1 (en) * 2018-05-16 2019-11-16 Corrugated cardboard packaging suitable for detecting break-ins to the detriment of the same
EP3569513A1 (en) * 2018-05-16 2019-11-20 Assograph Italia S.R.L. Corrugated cardboard package adapted to detect breaks made to its detriment
US10618712B2 (en) 2018-05-16 2020-04-14 Assograph Italia S.R.L. Corrugated cardboard package adapted to detect breaks made to its detriment

Also Published As

Publication number Publication date
ATE323032T1 (en) 2006-04-15
DE60304601T2 (en) 2007-04-05
US7119684B2 (en) 2006-10-10
DE60304601D1 (en) 2006-05-24
CA2409624C (en) 2011-03-29
CA2409624A1 (en) 2004-04-25
JP2006507995A (en) 2006-03-09
US20050225445A1 (en) 2005-10-13
EP1562829B1 (en) 2006-04-12
AU2003275845A1 (en) 2004-05-13
EP1562829A1 (en) 2005-08-17

Similar Documents

Publication Publication Date Title
CA2409624C (en) Electronic tampering detection system
US7017807B2 (en) Apparatus and method for detecting tampering with containers and preventing counterfeiting thereof
US20040066296A1 (en) Tamper indicating radio frequency identification label with tracking capability
US8274391B2 (en) EAS tag using tape with conductive element
WO1997038364A1 (en) A conformable intelligent tag
US9209139B2 (en) Multilayer security wrap
US20030075608A1 (en) Tamper indicating radio frequency identification label
US7772974B2 (en) Tamper evident seal system and method
US20080001741A1 (en) Large area distributed sensor
AU2010214781A1 (en) A radio frequency identification tag with tamper detection capability
EP1412928A1 (en) A tamper indicating radio frequency identification label with tracking capability
JP2001521231A (en) Alteration reaction enclosure
CA2387612C (en) A tamper indicating radio frequency identification label
US7893832B2 (en) Authenticity tag and method for operating an authenticity tag
US20130284812A1 (en) Electronic storage system with environmentally-alterable conductor
TWI684135B (en) Smart tape and logistics system using the same
US8356758B1 (en) Making storage system having modifiable conductor and memory
US20130284813A1 (en) Altering conductor in electronic storage system
US10812145B1 (en) Packaging system with detection of environmental conditions
US8745861B2 (en) Method of making a storage system having an environmentally-modifiable conductor
EP0935409B1 (en) Rodent detection apparatus
US8739399B2 (en) Making electronic storage system having code circuit
US20130284811A1 (en) Electronic storage system with externally-alterable conductor
US20130284810A1 (en) Electronic storage system with code circuit
EP1249055B1 (en) A tamper indicating radio frequency identification label

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 11113323

Country of ref document: US

Ref document number: 2004545648

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 434/MUMNP/2005

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2003809231

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003809231

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 2003809231

Country of ref document: EP