Counterfeit, tamper and refill evident packaging

ABSTRACT

A container (200) is provided. The container (200) comprises a mouth (202), a cap (204) for operably exposing or closing the mouth (202), a sealing layer (206) on top of the mouth (202) and a security label (208) which is scannable. At least a portion (204a) of the cap (204) is transparent. The security label (208) is disposed over the sealing layer ((206) below the transparent cap (204) and the security label (208) is machine scannable.

BACKGROUND Field

The subject matter in general relates to the field of security label.More particularly, but not exclusively, the subject matter relates toapplication of security label, which is scannable for at least tamperdetection, to packages and containers.

Discussion of related art

Conventionally various types of packaging cartons and containers areused based on the goods to be accommodated and transported, and desiredsecurity against tampering and counterfeiting. Packaging containers orboxes can be of different types, such as, box and lid type, die-cutself-locking boxes, full overlap boxes, packaging cartons, packingwallets, self-locking boxes and trays. Likewise, containers or bottlesmay be categorized based on presence or absence of sealing layer overthe mouth, wad in the cap and shrink-sleeve, among others. In severalinstances, these packages and containers have to be protected againsttampering and counterfeiting. Even standard accessories applied onstandard packaging for example smart tracking tags (NFC for example) orstraps (strips that fastens objects) need security against counterfeitand tampering.

A conventional approach to detect tampering of packages is illustratedin prior art FIG. 1. In the instant figure, a packing carton/box 10 isillustrated. A tamper-evident tape 12 is used to seal the box 10 asillustrated in step 100. In case the tape 12 is stripped from the box10, as illustrated in step 102, the tape 12 leaves marks 14 on thesurface it was previously adhered to. Marks 14 are an indication thatthe tape has been stripped from the box 10. However, a person withmalicious intent can remove the tape 12 and gain access to the inside ofthe box 10, and then replace another tape 18 identical to the originaltape 12, as illustrated in step 104. Such an act may misguide theauthorized recipient that the box 10 has been delivered without anytampering, and such belief may be further reinforced because the barcode16 may be the one that is expected. Furthermore, such tampering willhave to be visually inspected by human eye, and is prone to error due tolack of knowledge, concentration and attention to detail, among otherfactors.

The Author of this patent application had previously recognized the needfor detecting tampering using machine scannable means, instead of humanscanning. The Author went on to invent a security label and received aU.S. Pat. No. 9,361,532 (hereinafter US'532), which is hereinincorporated by reference.

While the security label of US'532 enables tamper detection by machinevision scanning, there is a need to integrate the security label ofUS'532 or other security labels which are machine scannable for tamperdetection, with, but not limited to, packages and containers exemplifiedearlier.

SUMMARY

An aspect provides a container comprising a mouth, a cap for operablyexposing or closing the mouth, a sealing layer on top of the mouth and asecurity label which is scannable. At least a portion of the cap istransparent, the security label is disposed over the sealing layer belowthe transparent cap and the security label is machine scannable.

Another aspect provides a container comprising a mouth, a cap foroperably exposing or closing the mouth, a sealing layer on top of themouth and a security label which is scannable. At least a portion of thecap is transparent, the security label is integrated inside the cap andthe security label is transferred along with the sealing layer over themouth of the container during cap sealing process.

Yet another aspect provides a container comprising a mouth, a cap foroperably exposing or closing the mouth, a sealing layer on top of themouth and a security label which is scannable. At least a portion of thecap is transparent, the security label is integrated with the cap, thesecurity label is machine scannable, a reference is provided on thesealing layer and the reference enables determination of spatialorientation of the security label for tamper evidence and counterfeitevidence.

Still another aspect provides a container comprising a mouth, a shrinksleeve and a security label which is scannable. The security label isdisposed either on the container or on the shrink sleeve and thesecurity label is machine scannable and indicates tampering despite samelabel is decoupled and applied again on same container or anothercontainer.

Still another aspect provides a container comprising a mouth, a cap foroperably exposing or closing the mouth, a sealing layer and a securitylabel which is scannable. The security label is disposed at leastpartially over the cap and the security label is machine scannable andindicates tampering despite same cap and same sealing layer is usedagain on same container or another container.

Still another aspect provides a packaging box comprising at least twointernal closing flaps, at least one outer closing flap and at least onesecurity label. The security label is scannable, the security label atleast partially seals the internal closing flaps, the outer closing flapdefines at least one transparent portion and at least a part of thesecurity label is visible for scanning via the transparent portion.

Still another aspect provides a packaging container comprising of regionwith variable color-shift optical property. The variable data in encodedform for machine scan is disposed on the region with variablecolor-shift optical property. The variable data in encoded form isdisposed with random spatial orientation and orientation is registeredin database for subsequent authentication. Unique credential ofpackaging is based on color profile along one or more visuallydistinguished markers within the variable data in encoded form.

Still another aspect provides a packaging comprising a NFC tag and asecurity label. The security label is disposed over face-stock of theNFC tag and the security label is machine scannable using visiontechnology for tamper evidence and counterfeit evidence.

Still another aspect provides a packaging container comprising a strappassing through a groove, and a security label, which is machinescannable. The security label is disposed over at least a section of thegroove and the strap.

Still another aspect provides a method of enabling detection oftampering via machine scanning. The method includes obtaining randomizedorientation of a machine scanable security label by disposing thesecurity label inside a capping system of a container, such that oncethe cap is sealed, orientation of the security label is randomized.

BRIEF DESCRIPTION OF DIAGRAMS

This disclosure is illustrated by way of example and not limitation inthe accompanying figures. Elements illustrated in the figures are notnecessarily drawn to scale, in which like references indicate similarelements and in which:

FIG. 1 illustrates prior art packaging that attempts to limit tamperingof packing catron/box 10;

FIGS. 2A (exploded view) and 2B (assembled view) illustrate a container200 with a transparent cap 204 having a reference 210, and a securitylabel 208 disposed over a sealing layer 206, which is covering the mouth202 of the container, in accordance with an embodiment;

FIG. 3A illustrates the cap 204 having a reference 210, with the sealinglayer 206 and the security label 208 integrated with the cap 204, beforethe cap 204 is engaged to the container 200 during the container 200filling process in a manufacturing facility, in accordance with anembodiment;

FIG. 3B illustrates the cap 204 of FIG. 3A engaged to the container 200during the container 200 filling process in a manufacturing facility,wherein the sealing layer 206 and the security label 208 are transferredto and over the mouth 202 of the container 200, in accordance with anembodiment;

FIG. 3C illustrates the cap 204 of FIG. 3B disengaged from the container200 after the sealing layer 206 and the security label 208 aretransferred to and over the mouth 202 of the container 200, inaccordance with an embodiment;

FIG. 4A illustrates the security label 208 disposed on the top surfaceof the cap 204, and the reference 210 disposed on the sealing layer 206,in accordance with an embodiment;

FIG. 4B illustrates the security label 208 disposed under, but facing,the top surface of the cap 204, and the reference 210 disposed on thesealing layer 206, in accordance with an embodiment;

FIG. 4C illustrate a security label 206 with a hole at the center andthe reference 210 disposed coincidingly with the hole, in accordancewith an embodiment;

FIG. 5A illustrates a container 200 with shrink sleeve 502 spanning atleast partially over cap 504, in accordance with an embodiment;

FIG. 5B illustrates the security label 208 disposed partially over thecap 504 and partially over the shrink sleeve 502, with the reference 210provided over the shrink sleeve 502, in accordance with an embodiment;

FIG. 6 illustrates the reference 210 provide over the cap 504 and thesecurity label 208 disposed on the shrink sleeve 502, in accordance withan embodiment;

FIG. 7A discloses a packing carton box 700 with the security label 208sealing the internal closing flaps 702, in accordance with anembodiment;

FIG. 7B illustrates the box 700 of FIG. 7A, with the outer closing flap704 in the closed position, wherein the security label 208 is visiblethrough a transparent portion 708 provided in the outer closing flap704, in accordance with an embodiment;

FIGS. 8A-8C illustrate packaging containers 800 having a region 802 withvariable color-shift optical property, and matrix barcode 804 disposedover the region 802 at different orientations, in accordance with anembodiment;

FIG. 9 illustrates an integration 900 of the security label 208, an NFCtag 902 and an adhesive layer 904, in accordance with an embodiment;

FIG. 10A illustrates a widget 1002 with a groove 1004 for receiving astrap for integrating security label with cartons or pallets, inaccordance with an embodiment;

FIG. 10B illustrates the security label 208 integrated with acarton/pallet 1000 using the widget 1002 of FIG. 10A, in accordance withan embodiment; and

FIG. 10C illustrates a top view of a strap 1006 passing through thegroove 1004 of the widget 1002, and the security label 208 applied overthe groove 1004 and the strap 1006, in accordance with an embodiment.

DETAILED DESCRIPTION OF THE INVENTION

The following detailed description includes references to theaccompanying drawings, which form part of the detailed description. Thedrawings show illustrations in accordance with example embodiments.These example embodiments are described in enough details to enablethose skilled in the art to practice the present subject matter.However, it will be apparent to one of ordinary skill in the art thatthe present invention may be practiced without these specific details.In other instances, well-known methods, procedures and components havenot been described in detail so as not to unnecessarily obscure aspectsof the embodiments. The embodiments can be combined, other embodimentscan be utilized or structural and logical changes can be made withoutdeparting from the scope of the invention. The following detaileddescription is, therefore, not to be taken as a limiting sense.

In this document, the terms “a” or “an” are used, as is common in patentdocuments, to include one or more than one. In this document, the term“or” is used to refer to a non-exclusive “or,” such that “A or B”includes “A but not B,” “B but not A,” and “A and B,” unless otherwiseindicated.

Most of the embodiment in this disclosure have been described in thecontext of security label of US'532. However, in view of thisdisclosure, one of ordinary skill in the art will appreciate that othersecurity labels, which are machine scannable for tamper evidence and/orcounterfeit evidence, wherever feasible, may be used within the scope ofthe claims.

First Embodiment

We now refer specifically to FIGS. 2A-2B, wherein a container 200 isdisclosed. The container 200 includes a mouth 202 and a cap 204. The cap204 is operable to expose or close the mouth 202. The container 200further comprises a sealing layer 206. The sealing layer 206 is disposedon top of the mouth 202. The sealing layer 206 seals the mouth 202, andaccess to any item accommodated by the container 200 may be possibleafter breaching the sealing layer 206. Further, a security label 208 isdisposed over the sealing layer 206. The security label 208 is machinescannable. In general, capping system comprises of cap and WAD (liner).In one example, WAD may be multi-layer structure comprising paper-pulp,wax, sealing foil and polymer film together as one unit inserted insidecap. During cap-closure on packaging-line, sealing-foil is transferredto container and top layer of liner remains inside cap. There is nocontrol on orientation of individual WAD inside CAP and it is fullyrandomized. If sealing-layer and CAP/WAD together can be made machinescan-able, it can be leveraged as security feature.

The cap 204 is such that at least a portion, such as a top portion 204 a(or a portion of the top portion 204 a) is transparent. Therefore, thesecurity label 208, which may be beneath the cap 204 and over thesealing layer 206, will be available for machine vision scanning.

It may be noted that the phrase “transparent” is not limited totransparency in terms of human eye, but extends to transparency formachine scanning. As such, the cap 204 may appear to be translucent oropaque to human eye, but may be transparent to a machine, since thecharacteristics of the security label 208 is available for scanningthrough the cap 204.

The container 200 further comprises at least one reference 210. Thereference 210 may be provided on a surface other than the security label208. The reference 208 enables determination of spatial orientation ofthe security label 208 with respect to the reference 208. Therefore, anychange in the spatial relationship between the security label 208 andthe reference 210 indicates tampering. The reference 210 is provided inthe cap 204. The reference may be provided on the top surface or bottomsurface of the cap 204. The cap may be sealed to prevent free play,thereby preventing any change in spatial orientation, unless seal isbroken.

As such, in practice, the spatial orientation of the security label 208with respect to the reference 208 may be determined after the cap 204 isengaged to the container 200. Thereafter, when the container 200 has bechecked for tampering, machine scanning, such as scanning usingsmartphone, may be used to determine the spatial orientation. Any changein the spatial orientation indicates tampering. Such change inorientation may occur even when the cap is removed and then reapplied,thereby altering the relationship (howsoever minute) between thesecurity label 208 and the reference 208. Hence, the security label 208indicates tampering upon machine-scan despite same the cap 204 and thesame sealing layer 208 being used again on same container or a differentcontainer.

In an embodiment, when the security label 208 is to be scanned withrespect to the reference 210, the security label may scannable, in thedesired way, only when cap 204 (cap 204 has the reference 210) remainsapplied over the security label 208.

Second Embodiment

Referring specifically to FIGS. 3A-3C, we now discuss a variation of thepreviously discussed first embodiment. In this embodiment, the securitylabel 208 is integrated inside the cap 204, with the security label 208facing the sealing of the cap 204. It may be noted that, the instantintegration is before the cap 204 is engaged to the container 200 duringthe container 200 filling process in a manufacturing facility.Thereafter, during the cap sealing process, wherein the cap 204 isengaged to the container 200 after the container is filled with desireditem, the security label 208 is transferred along with the sealing layer206 to and over the mouth 202 of the container 200.

The embodiment provides for a method of enabling detection of tamperingvia machine scanning. The method includes obtaining randomizedorientation of the machine scanable security label 208 by disposing thesecurity label 208 inside the capping system 204 of the container 200,such that once the cap 204 is sealed, orientation of the security label208 is randomized.

Third Embodiment

Referring specifically to FIGS. 4A-4C, we now discuss a variation of thepreviously discussed embodiments. In this embodiment, security label 208is integrated with the cap 204. The security label may be disposed onthe top surface of the cap 204 as illustrated in FIG. 4A, or disposed onthe bottom surface of the cap 204 as illustrated in FIG. 4B. Thereference 210 is provided on the sealing layer 206. The reference 210enables determination of spatial orientation of the security label 206for tamper evidence and counterfeit evidence.

The size of the security label 206 may be such that the top portion(sealing) of the cap 204, despite the security label 206 beingintegrated to it, still retains a portion 404 a that is transparent,such that the reference 210 is visible for machine scanning. As anexample, dimension of the security label 206 may be smaller than thedimension of the top portion (roof) of the cap 204, and the securitylabel 206 is concentrically placed to the top portion (roof) of the cap204. Further, the reference 210 is placed within portion of the securitylabel 206, which is visible via the portion 404 a that retainstransparency. As a further example, the security label 206 may becircular in shape, with diameter less than diameter of the roof of thecap 204. As yet another example, the security label 206 may be circularin shape, with a hole at the center, as illustrated in FIG. 4C.

Specifically referring to FIG. 4B, the embodiment provides for a methodof enabling detection of tampering via machine scanning. The methodincludes obtaining randomized orientation of the machine scan-ablesecurity label 208 by disposing the security label 208 inside thecapping system 204 of the container 200, such that once the cap 204 issealed, orientation of the security label 208 is randomized.

Fourth Embodiment

Referring specifically to FIGS. 5A-5B, we now discuss a variation of thepreviously discussed embodiment. In an embodiment, the cap 504 need notnecessarily be transparent. The security label 208 may be disposed atleast partially over the cap 504 as illustrated in FIG. 5B. The securitylabel 208 is machine scannable and indicates tampering despite same cap504 and same sealing layer 206 being used again on same container 200 oranother identical container. The container 200 further comprises ashrink sleeve 502 spanning at least partially over the cap 504.

In an embodiment, wherein the security label 208 is at least partiallydisposed over the shrink sleeve 504, a portion of the security label 208directly sticks to/interfaces with/printed on a portion of the roof ofthe cap 504, and another portion of the security label 208 directlysticks to/interfaces with/printed on a portion of the shrink sleeve 502.

The reference 210 may be provided in the shrink sleeve 502, wherein thereference 210 enables determination of spatial orientation of thesecurity label 208. The security label 208 enables indication oftampering despite same label 208 being decoupled and applied again onsame container 200 or another container.

Fifth Embodiment

Referring specifically to FIG. 6, we now discuss a variation of thepreviously discussed embodiment. In this embodiment, the reference 210is on the container 200 and the security label 208 is disposed on theshrink sleeve 502. The security label 208 enable indication of tamperingdespite same label 208 being decoupled and applied again on samecontainer 200 or another container.

Sixth Embodiment

Having discussed integration of security label with capped containers,we now move on to integration of security label with boxedpackages/cartons, with specific reference to FIGS. 7A-7B. A packingcarton box 700 is disclosed. The box comprises at least two internalclosing flaps 702, at least one outer closing flap 704 and at least onesecurity label 208.

The outer closing flap 704 defines at least one transparent portion 708.In an embodiment, the transparent portion 708 may be a punch hole (asillustrated). In another embodiment, the transparent portion 708 mayhave a transparent material (not illustrated).

The security label 208 at least partially seals the internal closingflaps 702. The internal closing flaps 702 close towards each other todefine a recess 706 therebetween. The security label 208 is placed overat least a part of the recess to seal the internal closing flaps 702.The security label 208 is placed such that the security label 208coincides with the transparent portion 708 when the outer closing flap704 is closed (refer FIG. 7B). Therefore, at least a part of thesecurity label 208 is visible for scanning via the transparent portion708.

The box 700 may further comprise a reference 210. The reference 210enables determination of spatial orientation of the security label 208.The security label 208 can be scanned with respect to the reference 210when the outer closing flap 702 is in the closed state. The reference210 may be provided over the outer closing flap 702. There should not beany assumption about direction of movement of outer and internal flapstowards closure of box and FIGS. 7A and 7B are only illustrative,

Seventh Embodiment

Referring specifically to FIGS. 8A-8C, we now discuss an embodimentwherein a packaging surface has a region with variable color-shiftoptical property. Packaging containers 800 are disclosed. The container800 comprises a region 802 with variable color-shift optical property.Color-shift can happen with angle of incident-light, illumination orangle-of-viewing. Further, variable data in encoded form 804 for machinescan is disposed on the region 802. The variable data in encoded form804 may be matrix barcode as an example. For example, encoded form canbe QR code and its corners can be visually distinguished markers. Thevariable data in encoded form 804 may be disposed with random spatialorientation over the region 802 with color-shift optical property.Unique credential of packaging may be based on color profile along oneor more visually distinguished markers within the variable data inencoded form 804. Color profile may be based on combination of spatiallyrandom disposition of encoded data on the region 802 with color shiftoptical property. Scanning and recording color profile may be carriedout with flash-light on or flash-light off to detect change incolor-profile, which shall not happen in case of duplicated version.

The packaging container/surface 800 may further include a reference 210.The reference 210 may be external to the variable data in encoded form804. Encoded data can be disposed with known orientation (for examplebased on value of encoded-data or time-of-generation or combination ofboth). Orientation is with respect to external reference and stored indatabase or printed side-by-side for subsequent authentication. A secondunique credential may be registered based on orientation of the one ormore visually distinguished markers with respect to the externalreference 210. During authentication-scan, orientation is again computedwith respect to external reference and matched with one stored indatabase or printed side-by-side, as the case may be. To preventduplication authentication, scan may also take credential based oncolor-profile as described above. This embodiment is more suitable foruse-case with space constraint requiring mostly counterfeit-evidence.External reference can be printed mark, punch-hole, another encodeddata, simply edge of packaging or even be in virtual form as marker onscreen of scanning device.

Eighth Embodiment

Referring specifically to FIG. 9, we now discuss an embodiment whereinNFC tag 902 and security label 208 are integrated with an adhesive layer904. Such an integration 900, as an example may be used in the packagingcontainers/boxes of the earlier discussed embodiments. The NFC tag 902and the security label 208 are applied to the container. The securitylabel 208 is disposed over face-stock of the NFC tag 902. The packagingfurther comprises a reference as discussed earlier. The referenceenables determination of spatial orientation of the security label 208for tamper evidence and counterfeit evidence.

NFC can enable smart tracking like time/temperature and hence excellentfor tracking. However, NFC is not good for last mile authentication usecase. NFC generally does not have any visual feature. Furthermore, incase of NFC, there is absence of differentiation betweenoriginal-defective or fake-damaged as both will not scan, and hence canbe misused. Further, non-cloneable NFC is many times costlier thancloneable version. The integration of the security label discussedearlier with relatively cheaper cloneable NFC, imparts non-clonability.Such integration renders 2-factor technology tag, viz., security labelbeing vision technology and NFC being RF (radio frequency) technology. Asmartphone application may scan both in one single scan. Specialadvantage of integrating security label with NFC is that, while NFC ispre-programmed, security label (with respect to a reference) gets“auto-programmed” only when applied on packaging.

Ninth Embodiment

Referring specifically to FIGS. 10A-10C, we now discuss an embodiment inwhich security label 208 is integrated with strapping.

A packaging container 1000 is disclosed. The packaging container 1000 issealed with straps 1006. At least one of those straps 1006 passesthrough a groove 1004. The security label 208, which is machinescannable, is disposed over at least a section of the groove 1004 andthe strap 1006. The groove 1004 is defined by a widget 1002. The widget1002 comprises a flat surface 1008, wherein the flat surface 1008defines the groove 1004 therein. The security label 208 is received overthe flat surface 1008 (thereby facilitating accurate scanning).

The packaging container 1000 may further comprise a reference 210,wherein the reference 210 enables determination of spatial orientationof the security label 208 for tamper evidence and counterfeit evidence.The reference 210 may be provided over the flat surface 1008 of thewidget 1002 (as illustrated), on the container 1000 or on the strap1006.

It may be noted that the security labels of various embodimentsdiscussed earlier may be machine scannable for counterfeit evidence.

It may be noted that the security labels of various embodiments may bemanifested in form of encoded variable data whose spatial orientation isdetermined with respect to a reference external to the security label.

In the foregoing detailed description, numerous specific details,examples, and scenarios are explained in order to facilitate a thoroughunderstanding of the present disclosure. However, the embodiments of thedisclosure may be practiced without such specific details. Further, suchexamples and scenarios are provided for illustration, and are notintended to limit the disclosure in any way. Those of ordinary skill inthe art, with the included descriptions, should be able to implementappropriate functionality without undue experimentation. Thus, the scopeof the invention should be determined by the appended claims and theirlegal equivalents rather than by details, examples, and scenariosprovided.

It shall be noted that the processes described above are described assequence of steps; this was done solely for the sake of illustration.Accordingly, it is understood that some steps may be added, some stepsmay be omitted, the order of the steps may be re-arranged, or some stepsmay be performed simultaneously.

Although embodiments have been described with reference to specificexample embodiments, it will be evident that various combinations,modifications, additions, and omissions may be made to these embodimentswithout departing from the broader spirit and scope of the foregoingdisclosure and appended claims. Accordingly, the specification anddrawings are to be regarded in an illustrative sense rather than arestrictive sense.

It is to be understood that the phraseology or terminology employedherein is for the purpose of description and not of limitation.

1. A container comprising a mouth, a cap for operably exposing orclosing the mouth, a sealing layer on top of the mouth and a securitylabel which is scannable, wherein, at least a portion of the cap istransparent; the security label is disposed over the sealing layer belowthe transparent cap; and the security label is machine scannable.
 2. Thecontainer of claim 1 wherein, security label indicates tampering uponmachine-scan despite same cap and same sealing layer being used again onsame container or a different container; and the security label isscannable only when cap remain applied over the sealing layer.
 3. Thecontainer of claim 1, further comprising a reference, wherein thereference enables determination of spatial orientation of the securitylabel.
 4. The container of claim 3, wherein the reference is in the cap.5. (canceled)
 6. A container comprising a mouth, a cap for operablyexposing or closing the mouth, a sealing layer on top of the mouth and asecurity label which is scannable, wherein, at least a portion of thecap is transparent; the security label is integrated with the cap; thesecurity label is machine scannable; a reference is provided on thesealing layer; and the reference enables determination of spatialorientation of the security label for tamper evidence and counterfeitevidence.
 7. The container of claim 6, wherein the security label isprovided inside the cap.
 8. (canceled)
 9. (canceled)
 10. (canceled) 11.(canceled)
 12. (canceled)
 13. (canceled)
 14. (canceled)
 15. (canceled)16. (canceled)
 17. (canceled)
 18. (canceled)
 19. A packaging containercomprising of region with variable color-shift optical property wherein,variable data in encoded form for machine scan is disposed on the regionwith variable color-shift optical property; said variable data inencoded form is disposed with random spatial orientation and orientationis registered in database for subsequent authentication; and uniquecredential of packaging is based on color profile along one or morevisually distinguished markers within the variable data in encoded form.20. The packaging container as in claim 19, wherein a second uniquecredential is based on orientation of the one or more visuallydistinguished marker with respect to an external reference. 21.(canceled)
 22. (canceled)
 23. (canceled)
 24. (canceled)
 25. (canceled)26. (canceled)
 27. (canceled)
 28. (canceled)
 29. (canceled) 30.(canceled)