+

WO2001071848A1 - Etiquette d'identification radiofrequence a indication de violation - Google Patents

Etiquette d'identification radiofrequence a indication de violation Download PDF

Info

Publication number
WO2001071848A1
WO2001071848A1 PCT/US2001/008992 US0108992W WO0171848A1 WO 2001071848 A1 WO2001071848 A1 WO 2001071848A1 US 0108992 W US0108992 W US 0108992W WO 0171848 A1 WO0171848 A1 WO 0171848A1
Authority
WO
WIPO (PCT)
Prior art keywords
rfid
label
tamper
substrate
layer
Prior art date
Application number
PCT/US2001/008992
Other languages
English (en)
Other versions
WO2001071848B1 (fr
Inventor
Peter Atherton
Original Assignee
Mikoh Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to EP01926396A priority Critical patent/EP1249055B1/fr
Application filed by Mikoh Corporation filed Critical Mikoh Corporation
Priority to US10/129,075 priority patent/US6888509B2/en
Priority to CA002387612A priority patent/CA2387612C/fr
Priority to DE60142773T priority patent/DE60142773D1/de
Priority to AT01926396T priority patent/ATE477602T1/de
Priority to AU2001252935A priority patent/AU2001252935A1/en
Publication of WO2001071848A1 publication Critical patent/WO2001071848A1/fr
Priority to PCT/US2001/051432 priority patent/WO2002077939A1/fr
Priority to MXPA03004364A priority patent/MXPA03004364A/es
Priority to PCT/US2001/043099 priority patent/WO2002095655A2/fr
Priority to CA002429374A priority patent/CA2429374A1/fr
Priority to EP01273422A priority patent/EP1412928A4/fr
Publication of WO2001071848B1 publication Critical patent/WO2001071848B1/fr

Links

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01QANTENNAS, i.e. RADIO AERIALS
    • H01Q1/00Details of, or arrangements associated with, antennas
    • H01Q1/12Supports; Mounting means
    • H01Q1/22Supports; Mounting means by structural association with other equipment or articles
    • H01Q1/2208Supports; Mounting means by structural association with other equipment or articles associated with components used in interrogation type services, i.e. in systems for information exchange between an interrogator/reader and a tag/transponder, e.g. in Radio Frequency Identification [RFID] systems
    • H01Q1/2225Supports; Mounting means by structural association with other equipment or articles associated with components used in interrogation type services, i.e. in systems for information exchange between an interrogator/reader and a tag/transponder, e.g. in Radio Frequency Identification [RFID] systems used in active tags, i.e. provided with its own power source or in passive tags, i.e. deriving power from RF signal
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D5/00Rigid or semi-rigid containers of polygonal cross-section, e.g. boxes, cartons or trays, formed by folding or erecting one or more blanks made of paper
    • B65D5/42Details of containers or of foldable or erectable container blanks
    • B65D5/4212Information or decoration elements, e.g. content indicators, or for mailing
    • B65D5/4233Cards, coupons, labels or the like formed separately from the container or lid
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07372Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
    • G06K19/07381Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit with deactivation or otherwise incapacitation of at least a part of the circuit upon detected tampering
    • G06K19/0739Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit with deactivation or otherwise incapacitation of at least a part of the circuit upon detected tampering the incapacitated circuit being part of an antenna
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2437Tag layered structure, processes for making layered tags
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2437Tag layered structure, processes for making layered tags
    • G08B13/2442Tag materials and material properties thereof, e.g. magnetic material details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2448Tag with at least dual detection means, e.g. combined inductive and ferromagnetic tags, dual frequencies within a single technology, tampering detection or signalling means on the tag
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01QANTENNAS, i.e. RADIO AERIALS
    • H01Q1/00Details of, or arrangements associated with, antennas
    • H01Q1/36Structural form of radiating elements, e.g. cone, spiral, umbrella; Particular materials used therewith
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01QANTENNAS, i.e. RADIO AERIALS
    • H01Q7/00Loop antennas with a substantially uniform current distribution around the loop and having a directional radiation pattern in a plane perpendicular to the plane of the loop
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2203/00Decoration means, markings, information elements, contents indicators
    • B65D2203/10Transponders

Definitions

  • Radio Frequency Identification is being used increasingly as a means to identify goods at a distance, without requiring physical contact or even line of sight access to the goods.
  • RFID enables information about an item to be stored on an item, and in some implementations also allows this stored information to be modified at a distance.
  • the most compact and cost effective means to provide this RFID capability is by means of a pressure sensitive (i.e. self adhesive) label incorporating an RFID capability.
  • a disadvantage of current pressure sensitive label technology is that it does not allow the remote determination of whether or not a label has been tampered with or removed and relocated.
  • a tamper indicating label is provided.
  • the label may comprise RFID components and a tamper track connected to the RFID components.
  • the tamper track is preferably formed by destructible electronics.
  • the tamper track may be modified when the label is tampered with.
  • the RFID components are able to detect the modification in the tamper track while maintaining their RFID capability. Detection of the modification in the tamper track indicates tampering with the label.
  • the modification in the tamper track disables the RFID function.
  • the label comprises an RFID layer.
  • the RFID layer may include a memory chip and at least one of an antenna or loop inductor.
  • Means for attaching the RFID layer to an object may also be provided.
  • the means for attaching may be an adhesive layer.
  • the adhesive layer can support the RFID layer.
  • a destructible conducting path may be sandwiched between the RFID layer and the adhesive layer. The destructible conducting path should be disrupted when the label is tampered. The disruption preferably modifies in some way the RFID characteristics of the RFID layer.
  • at least a part of the destructible conducting path may in contact with the adhesive layer.
  • the invention includes an RFID system.
  • a substrate having a top and a bottom surface is provided.
  • RFID electronic components are applied to the bottom surface of the substrate.
  • a conductive layer may also be formed in a pattern on the bottom surface of the substrate.
  • An adhesive layer may support the substrate such that the RFID electronic components and the conductive layer are sandwiched between the substrate and the adhesive layer.
  • the adhesive layer, the substrate, and conductive layer should have relative adhesion strengths such that when the system is partially removed from a surface to which it has been applied, at least one of the RFID components and the conductive layer is altered to modify the RFID characteristics of the system.
  • a security apparatus for indicating tampering.
  • an object may be provided with a conducting path having at least two end points.
  • a security label is arranged on the object.
  • the security label may be a tamper indicating label as described above and should include RFID components and a destructible conducting path between the RF components and each individual end point.
  • a security label is combined with an object.
  • the security label may comprise RFID components and means for attaching the RFID components to the object.
  • Destructible electronics may be connected to the RFID components.
  • the destructible electronics can be broken when the label is at least partially removed from the object.
  • the object comprises a surface for receiving the security label and a conducting path having two ends. The ends of the conducting path may be connected to the destructible electronics thereby forming a circuit through the RFID components, the destructible electronics and the conducting path.
  • the RFID characteristics of the RFID components may be modified if the connection between the end points and the destructible electronics is broken.
  • a substrate having first and second portions is provided.
  • the second portion of the substrate may be adapted to be looped back and connected to the first portion.
  • An RFID transponder can be arranged on the substrate.
  • a tamper track may be coupled to the RFID transponder and should extend at least partially into the second portion of the substrate.
  • An adhesive layer should be provided on at least a part of the second portion of the substrate that includes the tampertrack.
  • the tamper track in that part of the substrate may be adapted to be modified when the label is tampered with due to the relative adhesion strength of the tamper track.
  • Figure 1 is a schematic illustration of the general design of a tamper indicating RFID label which is the subject of the present invention
  • Figures 2a and 2b are a schematic illustration of a preferred embodiment and characteristics of the tamper indicating layer within a tamper indicating RFID label;
  • Figure 3 is a schematic illustration of a preferred embodiment of the tamper indicating conducting strip in the tamper indicating layer of a tamper indicating RFID label;
  • Figure 4 is a schematic illustration of a preferred embodiment of a tamper indicating RFID label in which the tamper indicating conducting strip is in series with an induction loop in said label;
  • Figure 5 is a schematic illustration of a preferred embodiment of a tamper indicating RFID label in which the tamper indicating conducting strip forms the induction loop of said label;
  • Figure 6 is a schematic illustration of a preferred embodiment of a tamper indicating RFID label in which the tamper indicating conducting strips form the antenna of said label;
  • Figure 7 is a schematic illustration of an variation of RFID label of Figure 6;
  • Figure 8 is a schematic illustration of a method ofmanufacturing an RFID label according to an embodiment of the invention.
  • FIG. 9 is a schematic illustration of another embodiment of the invention.
  • Figure 10 is a schematic illustration of the top view, side view and bottom view of a preferred embodiment of a tamper indicating RFID label which is the subject of the present invention
  • Figure 10a is a schematic illustration of the detail of a portion of the tamper indicating RFID label of Figure 1 ;
  • FIG 11 is a schematic illustration of a variation of the RFID label of Figure 10;
  • Figure 12 is a schematic illustration of loop tag based on the tamper indicating label design of figures 1 and 2;
  • Figure 13 is a schematic illustration of the use of a loop tag of the type illustrated in Figure 3;
  • Figure 14 is a schematic illustration of an object having a RFID label applied.
  • passive refers to an RFID label or transponder which does not include an on-board power source such as a battery.
  • active refers to an RFID label or transponder which includes an on-board power source such as a battery.
  • label and tag may be used interchangeably in this document. Where the term label is used, the term tag may validly be substituted. The essential difference between the two is the thickness and types of material used in the construction. In general a label will be made from thin, flexible materials, while a tag will be made from thicker, stiffer materials. A tag may, for example, be similar to a plastic card with a pressure sensitive adhesive on the underside. Such tags may be used, for example, as compliance plates or rating plates or specification plates on various types of equipment. A tag, because of its greater thickness, is better suited to active RFID technology.
  • a tamper indicating label may include RFID components and a tamper track coupled to the RFID components.
  • the tamper track should be constructed from a destructible conducting path. Additionally, the tamper track can be formed such that it is damaged when the label is tampered.
  • adhesion characteristics of the tamper track are adapted to break apart the tamper track when the label is tampered, for example, by removal from an object.
  • the RFID components may retain their RFID capability and detect when the tamper track has been damaged to indicate that the label has been tampered. Alternatively, the RFID capability of the RFID components may be disabled when the tamper track is damaged, indicating tampering.
  • Figure 1 is a schematic illustration of the general design of a tamper indicating RFID label according to an embodiment of the invention.
  • Figure 1 shows schematically a pressure sensitive (i.e. self-adhesive) label 100 in cross sectional view.
  • the label 100 may include four functionally distinct layers.
  • the RFID layer 101 may be a layer which includes RFID components, for example, an RFID memory chip.
  • the label 100 may in some embodiments provide an "active" RFID capability, in which case the layer 101 can also include a battery or other power source.
  • the second layer 102 may include one or more thin electrically conducting tracks which should be coupled to the RFID components in the layer 101.
  • the tracks are known herein as "tamper tracks" since they provide a means to detect tampering with or removal of the label 100 from a surface to which it has been applied.
  • the layer 101 and the layer 102 may together provide an RFID capability.
  • the layer 101 can provide an RFID capability in its own right, while the tamper tracks 102 can modify the RFID performance of the layer 101 depending on whether said tamper tracks 102 are damaged or not.
  • the RFID capability provided by the layer 101, or the layers 101 and 102 together usually includes the ability to store information in the RFID memory chip in the layer 101 , and the ability to read and modify said stored information from a distance. Additional capabilities, such as the ability to encrypt stored information or control access to the stored information, may also be provided.
  • the third layer 103 may be an adhesive layer, which in some embodiments is a pressure sensitive adhesive.
  • the fourth layer 104 is a top-coat layer applied over the top of the RFID layer 101.
  • the topcoat may be applied to protect the RFID layer and to provide a top surface to accept a printing process.
  • the top coat layer 104 is not essential and in some embodiments may not be included.
  • the finished construction is the adhesive label 100.
  • the tamper tracks 102 should be destructible.
  • the pressure sensitive adhesive 103 damages the tamper tracks 102 - for example, by tearing all or part of them from the underside of the layer
  • the RFID function of the label 100 is modified if the label is applied to a surface and subsequently tampered or removed. In this way tampering with or removal of the label 100 can be detected at a distance via the change in the RFID characteristics and response of the label 100.
  • tampering and "tampered” as used herein refer to complete or partial removal of a tamper indicating label, such as the label 100, from a surface to which it has been applied.
  • destructible is used in relation to the tamper tracks 102 in figure 1 and in relation to other tamper tracks throughout the document.
  • destructible means that the tamper tracks are designed to be damaged or broken in regions of the label which are tampered.
  • the tamper tracks 102 may be produced in one of a number of different ways.
  • the tamper tracks may be produced by printing electrically conducting ink (such as a carbon/graphite based conductive ink or a precious metal ink).
  • the tamper tracks 102 may be produced using electrically conductive adhesive.
  • the tamper tracks may be metallic tracks made of Aluminum, Copper or some other suitable metal.
  • the tamper tracks 102 should be made from a material, such as an electrically conducting ink, which has appropriate electrical properties but which does not have high intrinsic physical strength. In this way the tamper tracks 102 can be more easily disrupted or damaged as the label 100 is partially or completely removed from a surface to which it has been applied.
  • the destructibility of the tamper tracks 102 may be enhanced by including a thin layer of a suitable adhesion modifying coating on the underside of the layer 101 either between the layer 101 and the tamper tracks 102, or between the tamper tracks 102 and the adhesive 103. At least a part of the tamper tracks should contact the adhesive 103.
  • the layer of adhesion modifying coating may be applied as a uniform layer, or in a specified pattern, or in some other manner such that the properties of the adhesion modifying coating vary across the layer 101. In some embodiments multiple layers of adhesion modifying coating may be applied to "fine tune" the properties of the final composite adhesion modifying coating. .
  • a adhesion modifying coating between the RFID layer 101 and the tamper tracks 102 results in the adhesion of the layers to each other being greater or less in a particular region according to whether the adhesion modifying coating is present or absent in that region.
  • inclusion of an adhesion modifying coating between the tamper tracks 102 and the adhesive layer 103 results in the adhesion of the layers to each other being greater or less in a particular region according to whether the adhesion modifying coating is absent or present in that region.
  • the adhesion modifying coating reduces the adhesion of two layers which it separates, so that the two layers can be more easily separated.
  • the relative adhesion between the layer 101 , adhesion modifying coating, tamper tracks 102 and adhesive layer 103 can be adjusted so that when the label 100 is applied to a surface and subsequently tampered or removed, the tamper tracks 102 are damaged in a pattern corresponding to the pattern of the adhesion modifying coating.
  • the tamper tracks 102 may be physically separated in a pattern corresponding to the pattern of the adhesion modifying coating, with some of the tamper tracks 102 remaining on the layer
  • This damage to the tamper tracks 102 may affect the RFID performance of the label 100.
  • the adhesion modifying coating may be a layer of lacquer, or a layer of tamper indicating varnish (for example, similar to that used in some visual tamper indicating label constructions), or a layer of some other suitable material formulation.
  • FIG 2 shows the label 100 in cross section view before and after removal from a surface 201.
  • Figure 2 illustrates in particular the physical disruption of the tamper tracks 102 during tampering or removal of the label 100.
  • the label 100 is shown before removal from the surface 201.
  • the tamper tracks 102 are intact and the label 100 exhibits its normal RFID operation.
  • the label 100 has been partially removed from the surface 201. As the label 100 is removed, portions of the tamper tracks
  • the differential separation of the tamper tracks 102 may in some embodiments be enhanced or achieved through the inclusion of an adhesion modifying coating (as described above) in a specified pattern at the interface between the layer 101 and the tamper tracks 102, such that the tamper tracks 102 bond less strongly to the layer 101 where the adhesion modifying coating has been applied and therefore in such regions the tamper tracks 102 remain with the adhesive layer 103 when the label 100 is removed from the surface 201. As the label 100 is removed from the surface 201 , the tamper tracks 102 are damaged, and their electrical properties are thereby affected.
  • an adhesion modifying coating as described above
  • the separation of (i.e. damage to) the tamper tracks 102 during tampering of the label 100 is shown to form a regular repeating pattern. It should be appreciated that the pattern of the separation may instead be irregular and may be on a larger or smaller scale relative to the size of the label 100 or the RFID components in the label 100 than shown in figure 2.
  • the label 100 may also contain information in another format, such as a barcode, 2D barcode, or some other optical information storage format printed on the top surface of the top coat layer 104.
  • FIG 3 shows an embodiment of the RFID label 100 in cross sectional view and looking from below through the adhesive layer 103 at the tamper tracks 102.
  • the RFID layer 101 has two "through-connect" electrical connection points, 301 and 302, where the electrical circuitry in the RFID layer 101 is connected to the underside of the layer 101.
  • the electrical connection between the points 301 and 302 by means of the tamper track 102 should be intact in order to maintain normal RFID operation of the label 100.
  • the tamper track 102 may be disrupted even if only a portion of the label 100 is tampered.
  • the tamper track 102 runs around the perimeter of the underside of the layer 101 between points 301 and 302. This configuration for the tamper track 102 of figure 3 ensures that tampering of even a small portion of the label 100 will result in a break in the tamper track 102 and therefore a break in the electrical connection between the points 301 and 302, which in turn modifies the RFID behavior of the label 100.
  • the tamper track 102 may form all or part of an antenna, in which case the points 301 and 302 may not be electrically connected to each other via a single tamper track 102.
  • An RFID label will generally include an electronic memory chip connected to either an induction loop or an antenna.
  • the induction loop or antenna may enable communication and data exchange with a remote reading device. (It should be appreciated that different types of antenna design may be employed.)
  • Other electrical or electronic components may also be included in an RFID label.
  • An active RFID label will include an on-board power source such as a battery.
  • the tamper tracks 102 may be designed to be destructible in some regions and durable in other regions.
  • the tamper tracks 102 may include some sections which are durable and rugged, joined by sections which are destructible.
  • the tamper tracks 102 may be connected in one of several different ways to the RFID layer 101 , depending on the design and operation of the RFID layer 101. Several non-limiting examples are listed below.
  • the tamper tracks 102 may be connected in series with an induction loop or antenna in the layer 101. 2. The tamper tracks 102 may constitute all or part of the induction loop or antenna of the label 100.
  • the tamper tracks 102 may be part of a tamper-sensing electrical circuit in the label 100 which is separate from the induction loop or antenna of the label 100.
  • Figures 4 to 7 are schematic illustrations of further preferred embodiments of the tamper indicating RFID label 100, showing both a cross sectional view and a view looking from below through the adhesive layer 103 at the tamper tracks 102.
  • FIG 4 is a schematic illustration of a preferred embodiment in which the tamper track 102 connects the points 301 and 302 and is in series with an induction loop 401 in the RFID layer 101.
  • the RFID layer 101 may include the induction loop 401 and other components 402, which may be passive or active.
  • the components 402 in one embodiment may be a capacitor which, with the induction loop 401 , forms a resonant electrical circuit.
  • the components 402 may include a passive electronic memory chip for storing data.
  • the tamper track 102 should be intact for the RFID label 100 of figure 4 to be operational. When the label 100 is tampered, the tamper track 102 is broken and the RFID function of the label 100 can be disabled or modified. In this way it can be determined whether or not the label 100 has been tampered.
  • An adhesion modifying coating may be included, as described above, to enhance destructibility of the tamper tracks 102.
  • FIG. 5 is a schematic illustration of another preferred embodiment in which the tamper track 102 forms an induction loop 501 for the RFID label 100.
  • the through-connect points 301 and 302 are connected to the RFID components 402 in the layer 101.
  • the tamper track 102 forms a number of loops, with the overall layout of the tamper track 102 acting as an induction loop. Tampering or removing the label 100 results in a break in the tamper track 102, thereby disabling or modifying the RFID function of the label 100. In this way it can be determined whether or not the label 100 has been tampered.
  • An adhesion modifying coating may be included, as described above, to enhance destructibility of the tamper tracks 102.
  • FIG. 6 is a schematic illustration of another preferred embodiment, which is a variation on the embodiment of figure 5.
  • the tamper tracks 102 form an antenna
  • the tamper track 102 forms an induction loop.
  • the principal difference is that in figure 6 the points 301 and 302 are not connected together by a single tamper track 102. Instead there are two tamper tracks 102, one starting at point 301 and the other starting at the point 302.
  • the two tamper tracks 102 form an antenna.
  • a so-called meander antenna is illustrated, although it should be appreciated that other forms of antenna may also be employed.
  • the points 301 and 302 may be connected to each other by the tamper track 102.
  • the through-connect points 301 and 302 are connected to the RFID components 402. Tampering the label 100 should result in damage to at least one of the tamper tracks 102, thereby affecting the characteristics of the antenna and modifying or disabling the RFID function of the label 100. In this way it can be determined whether or not the label 100 has been tampered.
  • An adhesion modifying coating may be included, as described above, to enhance destructibility of the tamper tracks 102.
  • FIG. 7 is a schematic illustration of another preferred embodiment, based on the embodiments of figures 5 and 6.
  • the principal difference between the designs illustrated in figures 5 and 6, and the design illustrated in figure 7 is that in the design of figure 7 the RFID components 402 are on the underside of the layer 101.
  • the RFID components 402 may comprise only an RFID memory chip, in which case in the design of figure 7, both the RFID memory chip 402 and the tamper tracks 102 are on the underside of the layer 101.
  • the tamper tracks are designed to be destructible, as described herein.
  • an advantage of the design of figure 7 compared with the designs of figures 5 and 6 is that in the design of figure 7 there is no need for through-connects to the bottom side of the layer 101 , since the RFID memory chip is on the bottom side of the layer 101.
  • the tamper tracks 102 may form an induction loop, as in the design of figure 5, or may form an antenna, as in the design of figure 6.
  • an antenna is shown.
  • An adhesion modifying coating may be included, as described above, to enhance destructibility of the tamper tracks 102.
  • the label 100 may be designed to show visual evidence of tampering if the label is removed from a surface to which it has been applied.
  • Visual tamper indication can be achieved in several ways.
  • a thin colored layer is applied to the underside of the RFID layer 101.
  • a pattern of adhesion- modifying layer may be applied to the underside of the colored layer.
  • the adhesion- modifying layer may be the same layer or a layer in addition to the adhesion modifying coating described above. The presence of the adhesion-modifying layer modifies the adhesion of the colored layer to the adhesive layer 103 such that when the label 100 is removed from a surface to which it has been applied, the colored layer breaks up.
  • Areas of color may adhere to the adhesive layer 103 and other complementary areas of color may adhere to the RFID layer 101.
  • An alternative to this embodiment is to apply a pattern of said adhesion modifying layer directly to the underside of the RFID layer 101 and apply said thin colored layer to the underside of said adhesion modifying layer.
  • the adhesion modifying coating may be applied directly to the underside of the RFID layer 101 and a colored adhesive can be used as the adhesive layer 103.
  • the colored adhesive 103 should break up and areas of the colored adhesive may adhere to the RFID layer 101 and complementary areas of the colored adhesive 103 may adhere to the surface. It should be appreciated that other methods may be used to produce a visual tamper indicating effect.
  • a portion of the RFID layer 101 and top coat 104 should be transparent so the visual effect can be seen by looking through the RFID layer 101 and top coat 104. This enables easy inspection of the visual tamper indicating feature without having to remove the label.
  • the RFID components in the RFID layer 101 such as a memory chip, may not be transparent, but should only occupy a small portion of the surface area.
  • a bar code or serial number may be printed on the top surface of the RFID layer 101 or on the top surface of the top coat 104 (if a top coat 104 is present). Enough of the RFID layer 101 and top coat 104 should be transparent to allow the visual tamper indicating feature to be visible.
  • figure 8 shows illustrations of an RFID label construction and method of manufacture in cross sectional view.
  • the diagram of figure 8 illustrates a passive RFID label construction, in which the RFID components 402 consists of an RFID electronic memory chip.
  • a pattern 801 of adhesion modifying coating may be applied to the underside of a substrate layer 802, which may in one embodiment be a polyester layer.
  • the tamper tracks 803 can be printed on the underside of the adhesion modifying coating. If necessary the tamper tracks can include a "cross-over", where a tamper track 803 crosses over itself along a bridging layer of electrical insulator.
  • the tamper tracks 803 may be configured to form either an induction loop or antenna of appropriate design and characteristics.
  • An RFID electronic memory chip 804 can then be mounted on the underside of the layer 802 and positioned to connect to appropriate terminating points on the tamper tracks 803.
  • the RFID chip 804 and tamper tracks 803 should form an RFID transponder.
  • the construction 805 consisting of substrate 802, adhesion modifying coating 801, tamper tracks 803 and RFID chip 804 is cut into individual transponders 806.
  • Each transponder 806 is placed in a specified position on the underside of a top coat layer 807 and may be fixed in position with a thin adhesive layer.
  • a layer of pressure sensitive adhesive 808 may be applied to the underside of the top coat 807 and individual transponders 806.
  • top coat layer 807 The resulting construction consisting of top coat layer 807, individual transponders 806 and adhesive layer 808 is mounted on a suitable carrier film 809 and produced in roll form.
  • the resulting roll is die cut into individual labels 810 mounted on the continuous carrier film 809, where each label 810 includes one transponder 806.
  • the tamper tracks 803 may be produced using an electrically conducting adhesive instead of an electrically conducting ink.
  • FIG 9 is a schematic illustration of another preferred embodiment in which the tamper track 102 forms part of a separate tamper indicating electrical circuit.
  • the RFID layer 101 may contain an induction loop or antenna 901 and other electronic components 402, including an electronic memory chip, to provide an RFID capability.
  • the RFID layer 101 should be capable of interacting with an RFID reading device to allow reading of or modification to data stored in the electronic memory chip.
  • the through-connect points 301 and 302 are connected to the components 402 in the layer 101 , and to each other via the tamper track 102.
  • the components 402 should be configured to respond differently to a signal from an RFID reader depending on whether or not the points 301 and 302 are connected to each other via the tamper track 102 or not.
  • the label 100 will respond in a specified manner to an RFID reader.
  • the label 100 should still respond to an RFID reader but in a different manner, thereby indicating that the label 100 has been tampered.
  • the label 100 of figure 9 can provide an RFID means to (i) determine whether the label 100 is present, (ii) read data from the label 100 and modify data stored in the label 100, and (iii) determine whether the label 100 has been tampered.
  • the components 402 may consist only of a passive RFID electronic memory chip, and the tamper track 102 forms a connection, which may be separate from the induction loop or antenna 901, between two contact points on the memory chip.
  • the components 402 may undergo an irreversible change if the label 100 is tampered and the tamper track 102 is damaged, so that even if the tamper track 102 is subsequently restored, the label 100 will still respond to an RFID reader with a signal indicating it has been tampered.
  • the RFID components 402 is "active" (i.e. powered) and is configured to test the integrity of the tamper track 102 either continuously or at specified intervals. In this embodiment if the RFID components 402 detect that the tamper track 102 has been disrupted they may then preferably be configured to record data to this effect in the electronic memory chip within the components 402, preferably in a manner which is permanent and irreversible.
  • the components 402 may also include a clock.
  • the date and time of any tampering of the tamper track 102 or label 100 may also preferably be recorded permanently and irreversibly in the electronic memory chip within the RFID components 402.
  • antenna may refer to a conventional antenna or to an induction loop (which is used as an antenna at some RFID operating frequencies).
  • Figure 10 is a schematic illustration of a tamper indicating RFID label 1000 shown in top view, cross sectional side view, and bottom view.
  • the label 1000 may include a substrate layer 1001 made of, for example, polyester or some other suitable material. On top of the substrate layer 1001 , electronics to form an RFID transponder, which provides an RFID function, may be applied.
  • the electronics may include an RFID electronic memory chip 1002 and an antenna 1003. (In figure 10 an antenna 1003 in the form of an induction loop is shown.)
  • Figure 11 is a more detailed schematic illustration of an example of the electrical connections to the electronic chip 1002.
  • the chip 1002 and antenna 1003 should provide an RFID capability, which may include the ability to store information in the chip 1002, the ability to read information from the chip 1002 at a distance using a suitable RFID device, and the ability to modify information in the chip 1002 from a distance using a suitable RFID device.
  • the chip 1002 may include two contact points, or contact pads, connected to the antenna 1003, as illustrated in figure 10(a).
  • the two contact pads on the chip 1002 can be connected via electrical "through-connects" 1004 to the underside of the substrate layer 1001. One or both or neither of these two contact pads may be the same as the contact pads used to connect the chip 1002 to the antenna 1003.
  • Figure 10(a) shows the through-connects 1004 directly beneath the chip
  • the through-connects 1004 are positioned away from the contact pads on the chip 1002, and electrical tracks on the top surface of the substrate layer 1001 connect the contact pads on the chip 1002 to the tops of the through-connects 1004.
  • the two through-connect points 1004 on the underside of the substrate layer 1001 are connected to each other by means of a tamper track 1005 which is positioned on the underside of the substrate layer 1001.
  • a layer of adhesive 1006 may also be applied to the underside of the substrate layer 1001 and tamper track 1005.
  • said adhesive 1006 is a pressure sensitive adhesive.
  • a top layer 1007 may be applied over the top of the substrate 1001 , chip 1002 and antenna
  • the top layer 1007 can provide protection for these components and can also provide a surface to accept printing - for example printing of a number, a barcode, a logo, or other image. It should be appreciated that in figure. 10 the top view is a view looking through the top layer 1007, the side view is a cross sectional side view, and the bottom view is a view looking though the adhesive layer 1006.
  • the tamper track 1005 is preferably applied to the underside of the substrate layer 1001 , along with one or more layers of adhesion modifying coating to enhance the destructibility of the tamper track 1005. Consequently, if the label 1000 is applied to a surface and subsequently removed, the tamper track 1005 should be broken or disrupted so as to interrupt the electrical connection between the through-connect points 1004 on the underside of the substrate layer 1001.
  • Application of the tamper track 1005 and any other adhesion modifying coatings to the underside of the substrate 1001 to enhance the destructible nature of the tamper track 1005 may preferably be carried out as described in the following provisional patent applications, which are incorporated by reference:
  • the tamper track 1005 may be laid out in a number of different ways on the underside of the substrate layer 1001. In the preferred embodiment illustrated in figure 10, the tamper track runs from one through-connect point 1004 almost all the way around the perimeter of the underside of the substrate layer 1001 and then back to the other through-connect point, with the outward and return paths of the tamper track 1005 very close together in order to avoid any electrical induction effects which may interfere with the antenna 1003 positioned above on the upper surface of the substrate layer 1001.
  • the width and thickness of the tamper track 1005 can be adjusted to provide the correct properties in terms of electrical resistance and physical destructibility.
  • the path made by the tamper track 1005 may run inside, or outside, or directly beneath the antenna 1003, which in figure 10 is an induction loop.
  • the tamper track 1005 forms a path which is outside the outer perimeter of the induction loop 1003, thereby ensuring that any disturbance around the perimeter of the label 1000 will cause the tamper track 1005 to be disrupted.
  • the tamper track 1005 When the label 1000 is applied to a surface, the tamper track 1005 is intact and the corresponding contact pads on the chip 1002 are electrically connected to each other. When the label 1000 is removed or substantially tampered with, the tamper track 1005 should be broken or disrupted and there will th ⁇ n be an open circuit between the corresponding contact pads on the chip 1002. When such an open circuit occurs, the function of the RFID chip 1002 or the information stored in the chip 1002 will be modified in a way which can be detected by an RFID reader.
  • the modified chip function or information can be detected during the first read operation of the label after the label 1000 is removed or tampered, and the reader (if it has a write capability) can be programmed to write data back to the chip 1002 to indicate that the label 1000 has been removed or tampered.
  • Said data which is written back to the chip 1002 to indicate removal or tampering of the label 1000 is preferably permanent and irreversible, to prevent the memory contents of the chip being altered back to the original state to disguise the fact that the label has been moved or tampered.
  • an RFID read/write device capable of detecting the change in RFID performance of the label 1000 when the label 1000 is tampered, and writing data back to the chip 1002 within the label 1000 to indicate such tampering has occurred, said data preferably being written into the chip 1002 so as to be permanent and irreversible.
  • the label 1000 can be configured such that any disruption to the tamper track 1005 can be detected internally within the label 1000 without requiring an RFID read operation.
  • the chip 1002 can be programmed to modify its own memory contents to indicate that the label 1000 has been removed or tampered. Said modification to the memory contents of the chip 1002 to indicate removal or tampering of the label 1000 should preferably be permanent and irreversible, to prevent the memory contents of the chip being altered back to the original state to disguise the fact that the label has been moved or tampered.
  • the label 1000 may function as a normal RFID label when it is first applied to a surface. After is the label is moved or tampered, the RFID function of the label 1000 may be maintained and information can be read from and written to the RFID chip 1002, while the label also provides an RFID means to determine that it has been moved or tampered.
  • Figure 11 is a variation on the preferred embodiment of figures 9 and 10.
  • the basic design of the label 1000 in figure 11 is the similar to that of figure 10.
  • the difference in the design of figure 11 is that the tamper track 1005 extends well beyond the antenna 1003 or other RFID components in at least one direction.
  • the tamper track 1005 should run around the perimeter of the label 1000 and defect tampering of any edge portion of the label, whether near the chip 1002 and antenna 1003 or at the end of the label away from these components.
  • the label 1000 can, for example, be applied around a corner so that the chip 1002 and antenna 1003 are on a flat surface while the other end of the transponder, which includes the tamper track 1005, extends around the corner.
  • Figure 12 is another variation on the embodiment of figures 10 and 11.
  • Figure 12 is a schematic illustration of a tamper indicating RFID loop tag 1200, shown in top view, side view and bottom view.
  • the tamper track 1005 on the underside of the substrate 1001 extends beyond the antenna 1003 and forms a "tail" 1201.
  • the tamper track 1005 is straight.
  • the substrate 1001 may be cut approximately to the shape of the electronics, so that the loop tag 1200 is broad at the end which includes the antenna 1003 and narrow at the tail 1201. Alternatively, the loop tag may be cut into any other shape around the electronic components.
  • the tamper track 1005 will extend to the end of the tail 1201.
  • a bottom layer 1202 may also be applied to a specific portion of the underside of the substrate 1001 and tamper track 1005.
  • the tamper track should extend into the region 1203 of the underside of the substrate 1001 which is not covered with the bottom layer 1202.
  • an adhesive such as a pressure sensitive adhesive 1204 may be applied to the underside of the substrate 1001 and the tamper track 12100505.
  • a top layer 1007 may be applied over the top of the substrate 1001 , chip 1002 and antenna 1003.
  • the top layer 1007 may provide protection for these components and may also provide a surface to accept printing - for example printing of a number, a barcode, a logo, or other image.
  • top view is a view looking through the top layer 1007 to the chip 1002 and antenna 1003
  • bottom view is a view looking through the bottom layer 1202 and adhesive 1204 to the tamper track 1005 and through-connects 1004.
  • the loop tag 1200 may be bent into a loop 1205 and the region 1203 of pressure sensitive adhesive can be pressed against a region of the bottom layer 1202, as shown.
  • the pressure sensitive adhesive 1204 should hold the loop 1205 closed.
  • a loop 1206 may be formed by pressing the region 1203 of pressure sensitive adhesive 1204 against a region of the top layer 1007, as also shown.
  • loops 1205 and 1206 do not show the internal components - such as the chip 1002, antenna 1003 and tamper track 1005 - or the separate layers of the loop tag construction.
  • the two regions of the loop tag which are joined together in this way by the pressure sensitive adhesive 1204 preferably both include electronics - for example, the chip 1002, or the antenna 1003, or the tamper track 1005 - in order to ensure the closed loop cannot be cut and the loop opened without the RFID performance of the loop tag 1200 being affected.
  • the tamper track tail 1201 may be looped back and fixed to another portion of the tamper track tail 1201 or may be looped back and fixed to a region of the underside of the antenna 1003 (as illustrated in the loop 1205).
  • the substrate 1001 , pressure sensitive adhesive 1204, tamper track 1005, and any adhesion modifying coatings which are applied (as described in relation to figures 9 and 10), are preferably designed as described herein such that the tamper track 1005 is damaged when the closed loop is pulled apart in the region of pressure sensitive adhesive 1204, thereby modifying the RFID performance of the loop tag 1200, as described above in relation to the label constructions of figures 9 and 10. A similar modification to the performance of the loop tag 1200 will occur if the closed loop 1205 or 1206 is cut in order to open the loop.
  • FIG. 12 The loop tag configuration illustrated in figure 12 may be used to secure the tag 1200 around an item such as a handle, or to secure two items together.
  • Figure 13 is a schematic illustration of the use of the loop tag 1200 to detect opening of a container 1300 which includes a body 1301 and lid 1302.
  • the body 1301 and lid 1302 have holes 1303 which align when the lid 1302 is placed properly on the body 1301 of the container 1300.
  • Figure 13 shows a cutaway cross sectional view of a portion of the body 1301 and lid 1302 of the container 1300 in the region of the holes 1303.
  • the loop tag 1200 is applied to the container 1300 with the open loop portion 1304 passing through the aligned holes 1303.
  • the RFID chip 1002 in the loop tag 1200 may store information about the contents of the container 1300. If the loop tag 1200 is removed from the container 1300, either by pulling the loop apart to open the loop or by cutting the loop tag, the tamper track 1005 will be interrupted and the RFID performance of the loop tag 1200 will be modified in a manner detectable by an RFID reader, as described above in relation to the label construction of figures 9 and 10.
  • the loop tag 1200 does not need to have a narrow tail region.
  • the loop tag may instead be rectangular in shape.
  • variations on the preferred embodiment of figure 9 to 12 are possible.
  • the chip 1002, antenna 1003 and tamper track 1005 may all be on the underside of the substrate 1001. In this case it may be necessary for the tamper track to cross over the antenna 1003, on a "bridge" layer of electrically insulating material, in order to extend outside the antenna.
  • the advantage of this embodiment is that the through-connects 1004 described in relation to the designs of figures 9 and 10 are not required.
  • a tamper indicating label is incorporated with an object to which the label is to be applied.
  • the label used may be any of the embodiments described above.
  • Figure 14 illustrates a label 1401 applied to an object 1402.
  • a conductive path 1403 should be incorporated into the object.
  • a conducting path of electrically conducting ink may be formed around the object.
  • the conducting path 1403 on the object 1402 should have at least two end points.
  • the tamper tracks in the label 1401 should have a corresponding number of connection points. When the label 1401 is applied to the object 1402, each end point should be connected to a connection point.
  • the conducting path on the object 1402 and the tamper tracks in the label 1401 should together form one or more circuits, each from a tamper track to an endpoint, through the conducting path on the object, to the other end point and back to a tamper track. If a tamper track is disrupted through the label 1401 being tampered, or if connection between a tamper track and the conducting path on the object 1402 is broken, the RFID function of the label 1401 may be modified in a manner as described above to indicate tampering. For example, if the label 1401 is applied to a cardboard box and the entire label and that part of the box the label is adhering to is cut out, tampering is indicated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Electromagnetism (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Credit Cards Or The Like (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention concerne une étiquette à indication de violation. Cette étiquette (100) peut comporter des composants d'identification radiofréquence (RFID) et une piste de violation (102) couplée aux composants RFID. La piste de violation (102) doit être construite à partir d'une voie conductrice destructible. En outre, elle peut être formée de telle façon qu'elle soit endommagée lorsque l'étiquette est violée. Dans une réalisation, des caractéristiques d'adhésion de la piste de violation (102) sont conçues pour provoquer une rupture de cette piste lorsque l'étiquette est violée, par exemple, par enlèvement d'un objet. Les composants RFID peuvent retenir leur fonctionnalité et détecter lorsque la piste de violation (102) a été endommagée, afin d'indiquer que l'étiquette a été violée. Dans une autre réalisation, la fonctionnalité RFID des composants RFID peut être désactivée lorsque la piste de violation (102) est endommagée, indiquant une violation.
PCT/US2001/008992 2000-03-21 2001-03-21 Etiquette d'identification radiofrequence a indication de violation WO2001071848A1 (fr)

Priority Applications (11)

Application Number Priority Date Filing Date Title
AU2001252935A AU2001252935A1 (en) 2000-03-21 2001-03-21 A tamper indicating radio frequency identification label
US10/129,075 US6888509B2 (en) 2000-03-21 2001-03-21 Tamper indicating radio frequency identification label
CA002387612A CA2387612C (fr) 2000-03-21 2001-03-21 Etiquette d'identification radiofrequence a indication de violation
DE60142773T DE60142773D1 (de) 2000-03-21 2001-03-21 Funk-identifikationsetikett mit anzeige einer unerlaubten manipulation
AT01926396T ATE477602T1 (de) 2000-03-21 2001-03-21 Funk-identifikationsetikett mit anzeige einer unerlaubten manipulation
EP01926396A EP1249055B1 (fr) 2000-03-21 2001-03-21 Etiquette d'identification radiofrequence a indication de violation
EP01273422A EP1412928A4 (fr) 2000-11-16 2001-11-15 Etiquette de securite d'identification par radiofrequence a capacite de depistage
PCT/US2001/051432 WO2002077939A1 (fr) 2000-11-16 2001-11-15 Etiquette de securite d'identification par radiofrequence a capacite de depistage
MXPA03004364A MXPA03004364A (es) 2000-11-16 2001-11-15 Etiqueta de identificacion de radio frecuencia indicadora de falsificacion, con capacidad de rastreo.
PCT/US2001/043099 WO2002095655A2 (fr) 2000-11-16 2001-11-15 Etiquette d'identification par radio frequence (rfid) de securite a fonctionnalite de suivi
CA002429374A CA2429374A1 (fr) 2000-11-16 2001-11-15 Etiquette de securite d'identification par radiofrequence a capacite de depistage

Applications Claiming Priority (12)

Application Number Priority Date Filing Date Title
US19093600P 2000-03-21 2000-03-21
US60/190,936 2000-03-21
US19489000P 2000-04-06 2000-04-06
US60/194,890 2000-04-06
US19741700P 2000-04-14 2000-04-14
US60/197,417 2000-04-14
US24902700P 2000-11-16 2000-11-16
US60/249,027 2000-11-16
US25457500P 2000-12-12 2000-12-12
US60/254,575 2000-12-12
US27090901P 2001-02-26 2001-02-26
US60/270,904 2001-02-26

Publications (2)

Publication Number Publication Date
WO2001071848A1 true WO2001071848A1 (fr) 2001-09-27
WO2001071848B1 WO2001071848B1 (fr) 2002-02-14

Family

ID=27558817

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/008992 WO2001071848A1 (fr) 2000-03-21 2001-03-21 Etiquette d'identification radiofrequence a indication de violation

Country Status (3)

Country Link
AU (1) AU2001252935A1 (fr)
CA (1) CA2387612C (fr)
WO (1) WO2001071848A1 (fr)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003060819A1 (fr) * 2002-01-17 2003-07-24 Karri Palovuori Badge d'identification radiofrequences
WO2004044835A1 (fr) * 2002-11-13 2004-05-27 Edwards Systems Technology, Inc. Dispositif d'identification pourvu d'un circuit integre
WO2004047017A1 (fr) 2002-11-21 2004-06-03 Lintec Corporation Etiquette electronique
WO2004061762A1 (fr) * 2002-12-24 2004-07-22 3M Innovative Properties Company Antenne d'identification par radiofrequence (rfid) indicatrice de fraude
WO2004063982A1 (fr) * 2003-01-03 2004-07-29 Battelle Memorial Institute Balises, systemes de communication sans fil et procedes de communication sans fil
US6816125B2 (en) 2003-03-01 2004-11-09 3M Innovative Properties Company Forming electromagnetic communication circuit components using densified metal powder
WO2005006243A2 (fr) 2003-07-10 2005-01-20 Upm-Kymmene Corporation Modification d'un transpondeur d'identification radiofrequence en cours d'usage
FR2858704A1 (fr) * 2003-08-06 2005-02-11 Arjo Wiggins Secutity Sas Etiquette de securite non reutilisable et detectable a distance et procede d'authentification
WO2006039746A1 (fr) * 2004-10-13 2006-04-20 Robert Lane Systeme d’immatriculation
US7148424B1 (en) * 2001-10-05 2006-12-12 Dynamic Technologies Corp. Disposable electronic devices with deconstructable construction and method
US7345586B2 (en) 2005-06-29 2008-03-18 Motorola Inc System and method for transferring data to an electronic device
WO2008034269A1 (fr) * 2006-09-18 2008-03-27 Textilma Ag Étiquettes rfid destinées aux articles textiles
US7410103B2 (en) * 2006-03-13 2008-08-12 Andreas Rolf Nagel System, method and device to detect product tampering
GB2460236A (en) * 2008-05-20 2009-11-25 Hills Numberplate Holdings Ltd A sign and support provided with a tamper indicating circuit
US7951451B2 (en) 2001-04-05 2011-05-31 Arjo Wiggins Security Sas Self-adhesive document incorporating a radiofrequency identification device
US8169318B2 (en) * 2003-08-29 2012-05-01 Mikoh Corporation Radio frequency identification tag with tamper detection capability
DK178862B1 (da) * 2011-11-01 2017-04-03 Jens Ole Bentzen Mærke for værdigenstande med advarsels- og interaktiv funktion.
CN106794914A (zh) * 2014-10-13 2017-05-31 韩美爱提株式会社 含rfid电子标签的标签、含rfid电子标签的标签被粘附的产品包装盒和rfid电子标签及标签粘附方法
US9996787B2 (en) 2013-04-02 2018-06-12 Heraeus Deutschland GmbH & Co. KG Layered structure with conductive polymer for recognition of manipulation and process for the production thereof
EP3493170A3 (fr) * 2017-12-02 2019-09-04 The Boeing Company Dispositif inviolable sans fil
WO2020039174A1 (fr) * 2018-08-21 2020-02-27 Bassil, Nicholas Système de détection d'altération

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5644295A (en) 1994-09-05 1997-07-01 Permasign Limited Security device
WO1997038364A1 (fr) 1996-04-11 1997-10-16 Edis S.A. Etiquette intelligente de forme adaptable
US5767772A (en) 1993-12-15 1998-06-16 Lemaire; Gerard Marker for an article which is detected when it passes through a surveillance zone
US5982284A (en) * 1997-09-19 1999-11-09 Avery Dennison Corporation Tag or label with laminated thin, flat, flexible device
EP0955616A1 (fr) 1998-05-07 1999-11-10 Hi-G-Tek Ltd Etiquette électronique
US6147662A (en) * 1999-09-10 2000-11-14 Moore North America, Inc. Radio frequency identification tags and labels

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5767772A (en) 1993-12-15 1998-06-16 Lemaire; Gerard Marker for an article which is detected when it passes through a surveillance zone
US5644295A (en) 1994-09-05 1997-07-01 Permasign Limited Security device
WO1997038364A1 (fr) 1996-04-11 1997-10-16 Edis S.A. Etiquette intelligente de forme adaptable
US5982284A (en) * 1997-09-19 1999-11-09 Avery Dennison Corporation Tag or label with laminated thin, flat, flexible device
EP0955616A1 (fr) 1998-05-07 1999-11-10 Hi-G-Tek Ltd Etiquette électronique
US6147662A (en) * 1999-09-10 2000-11-14 Moore North America, Inc. Radio frequency identification tags and labels

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1249055A4 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7951451B2 (en) 2001-04-05 2011-05-31 Arjo Wiggins Security Sas Self-adhesive document incorporating a radiofrequency identification device
US7148424B1 (en) * 2001-10-05 2006-12-12 Dynamic Technologies Corp. Disposable electronic devices with deconstructable construction and method
WO2003060819A1 (fr) * 2002-01-17 2003-07-24 Karri Palovuori Badge d'identification radiofrequences
WO2004044835A1 (fr) * 2002-11-13 2004-05-27 Edwards Systems Technology, Inc. Dispositif d'identification pourvu d'un circuit integre
WO2004047017A1 (fr) 2002-11-21 2004-06-03 Lintec Corporation Etiquette electronique
WO2004061762A1 (fr) * 2002-12-24 2004-07-22 3M Innovative Properties Company Antenne d'identification par radiofrequence (rfid) indicatrice de fraude
US7102522B2 (en) 2002-12-24 2006-09-05 3M Innovative Properties Company Tamper-indicating radio frequency identification antenna and sticker, a radio frequency identification antenna, and methods of using the same
WO2004063982A1 (fr) * 2003-01-03 2004-07-29 Battelle Memorial Institute Balises, systemes de communication sans fil et procedes de communication sans fil
US6816125B2 (en) 2003-03-01 2004-11-09 3M Innovative Properties Company Forming electromagnetic communication circuit components using densified metal powder
WO2005006243A2 (fr) 2003-07-10 2005-01-20 Upm-Kymmene Corporation Modification d'un transpondeur d'identification radiofrequence en cours d'usage
WO2005006243A3 (fr) * 2003-07-10 2005-03-24 Upm Kymmene Corp Modification d'un transpondeur d'identification radiofrequence en cours d'usage
US7469126B2 (en) 2003-07-10 2008-12-23 Upm Raflatac Oy Usage modification of RFID transponder
WO2005020193A1 (fr) * 2003-08-06 2005-03-03 Arjowiggins Security Etiquette de sécurité non réutilisable et détectable a distance et procede d'authentification
FR2858704A1 (fr) * 2003-08-06 2005-02-11 Arjo Wiggins Secutity Sas Etiquette de securite non reutilisable et detectable a distance et procede d'authentification
US8169318B2 (en) * 2003-08-29 2012-05-01 Mikoh Corporation Radio frequency identification tag with tamper detection capability
AU2010214781B2 (en) * 2003-08-29 2012-09-13 Peter S. Atherton A radio frequency identification tag with tamper detection capability
WO2006039746A1 (fr) * 2004-10-13 2006-04-20 Robert Lane Systeme d’immatriculation
US7345586B2 (en) 2005-06-29 2008-03-18 Motorola Inc System and method for transferring data to an electronic device
US7410103B2 (en) * 2006-03-13 2008-08-12 Andreas Rolf Nagel System, method and device to detect product tampering
WO2008034269A1 (fr) * 2006-09-18 2008-03-27 Textilma Ag Étiquettes rfid destinées aux articles textiles
KR101313475B1 (ko) 2006-09-18 2013-10-01 텍스틸마 악티엔게젤샤프트 무선인식(rfid)직물 라벨
WO2009141608A2 (fr) * 2008-05-20 2009-11-26 E-Plate Limited Etiquettes
WO2009141608A3 (fr) * 2008-05-20 2010-11-18 E-Plate Limited Etiquettes
GB2460236A (en) * 2008-05-20 2009-11-25 Hills Numberplate Holdings Ltd A sign and support provided with a tamper indicating circuit
DK178862B1 (da) * 2011-11-01 2017-04-03 Jens Ole Bentzen Mærke for værdigenstande med advarsels- og interaktiv funktion.
US9996787B2 (en) 2013-04-02 2018-06-12 Heraeus Deutschland GmbH & Co. KG Layered structure with conductive polymer for recognition of manipulation and process for the production thereof
CN106794914A (zh) * 2014-10-13 2017-05-31 韩美爱提株式会社 含rfid电子标签的标签、含rfid电子标签的标签被粘附的产品包装盒和rfid电子标签及标签粘附方法
EP3493170A3 (fr) * 2017-12-02 2019-09-04 The Boeing Company Dispositif inviolable sans fil
WO2020039174A1 (fr) * 2018-08-21 2020-02-27 Bassil, Nicholas Système de détection d'altération

Also Published As

Publication number Publication date
CA2387612C (fr) 2010-01-12
WO2001071848B1 (fr) 2002-02-14
CA2387612A1 (fr) 2001-09-27
AU2001252935A1 (en) 2001-10-03

Similar Documents

Publication Publication Date Title
US6888509B2 (en) Tamper indicating radio frequency identification label
US20040066296A1 (en) Tamper indicating radio frequency identification label with tracking capability
CA2429374A1 (fr) Etiquette de securite d'identification par radiofrequence a capacite de depistage
CA2387612C (fr) Etiquette d'identification radiofrequence a indication de violation
US8169318B2 (en) Radio frequency identification tag with tamper detection capability
CA2417616C (fr) Materiaux et construction d'une etiquette d'identification par radiofrequence a indication de modification
US5635917A (en) Bag including an encodable device responsive to remote interrogation and an associated fabrication method
EP0850442A1 (fr) Etiquette intelligente de forme adaptable
EP4055527B1 (fr) Système et procédé anti-fraude configurable
US20070069895A1 (en) Rfid seal tag
US20080272885A1 (en) Modular Radio Frequency Identification Tagging Method
KR20170074865A (ko) 개봉된 용기 검출을 위한 다수의 유효 상태들을 갖는 nfc/rf 메커니즘
WO2006016559A1 (fr) Joint avec étiquette de ci et procédé d’attache de ladite étiquette
JP4516525B2 (ja) タグ並びにそれを用いた管理方法及び管理システム
EP1644873B1 (fr) Modification d'un transpondeur d'identification radiofrequence en cours d'usage
WO2020124082A1 (fr) Accessoire de marchandise avec transpondeur rfid
US7843315B2 (en) IC tag whose function can be changed upon separation
US20070096914A1 (en) RFID tag
EP1249055B1 (fr) Etiquette d'identification radiofrequence a indication de violation
JPH07272140A (ja) 標 識
JP2008282103A (ja) データキャリア及びリーダ/ライタ装置
JP2002259926A (ja) 折り曲げ共振回路及びその取付け方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: B1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: B1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

B Later publication of amended claims
WWE Wipo information: entry into national phase

Ref document number: 2001926396

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2387612

Country of ref document: CA

WWP Wipo information: published in national office

Ref document number: 2001926396

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10129075

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载