Secure product packaging system

ABSTRACT

A product security system includes an RFID chip and antenna that are polymerized onto separable parts of a commercial product package. The RFID chip includes a unique serial number that can be interrogated by a wireless reader. A database of such unique serial numbers associated with particular manufacturing production runs is used in a method to detect counterfeiting. The RFID chip and antenna are embedded such that attempts to remove or transfer them will be obvious to an inspector.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to product packaging, and in particular tosecure packaging and sealing systems that combat tampering, graymarketing, and product counterfeiting.

2. Description of the Prior Art

The general public is now very familiar with product packages and sealsthat are used to make product tampering obvious to the consumer. Thesemeasures developed in part from past cases of food and medicinetampering that ended in a few cases of poisoning and a public panic. Onecase in particular, the Tylenol pain-reliever tainting with cyanide, isinfamous.

Some foods spoil more quickly once the bottle or package has beenentered. So many producers include devices and labels that warn aconsumer if the package has been opened. For example, foods in glassjars are sealed by their tops under vacuum. When the lid is opened, thevacuum is lost and the metal lid top bubbles up and no longer down. Awarning label warns consumers to look for this condition to ensureproduct freshness and safety.

Product counterfeiting presents a very different situation for bothconsumers and producers. Some products have such high price points thatit makes it very affordable for a counterfeiter to exactly duplicate allthe packaging, and its associated seals and security devices. Forexample, common prescriptions now retail for $10–20 a pill. Some cancermedicines can retail for over $10,000 for a 30-day supply for one user.Any and all safety and security measures can be duplicated andimpersonated by counterfeit products that don't have to bear thedevelopment and marketing costs. Many commercial manufacturers sufferlarge losses to counterfeiters, and so they often are subjected tofinancial reserves that can approach 50% of their gross sales.

SUMMARY OF THE INVENTION

Briefly, a product security system embodiment of the present inventionincludes an RFID chip and antenna that are polymerized onto separableparts of a commercial product package. The RFID chip includes a uniqueserial number that can be interrogated by a wireless reader. A databaseof such unique serial numbers associated with particular manufacturingproduction runs is used in a method to detect counterfeiting. The RFIDchip and antenna are embedded such that attempts to remove or transferthem will be obvious to an inspector.

An advantage of the present invention is that a system is provided fordetecting product tampering.

Another advantage of the present invention is that a method is providedfor detecting product counterfeiting.

A further advantage of the present invention is that retro-fit securitysystem is provided for existing products.

These and other objects and advantages of the present invention will nodoubt become obvious to those of ordinary skill in the art after havingread the following detailed description of the preferred embodimentswhich are illustrated in the various drawing figures.

IN THE DRAWINGS

FIG. 1 is a functional block diagram of a product security systemembodiment of the present invention;

FIG. 2 is a flowchart diagram of a method embodiment of the presentinvention;

FIG. 3A is a plan view of a security device embodiment of the presentinvention for a bottle or jar with a simple cap;

FIG. 3B is a perspective view of the security device of FIG. 3A embeddedin the cap of a jar and showing the tabs that are to be wrapped andpermanently bonded to the body of the jar;

FIG. 4A is a plan view of a security device embodiment of the presentinvention for a bottle or jar with a security cap that breaks apart whentwisted open by a user; and

FIG. 4B is a perspective view of the security device of FIG. 4A, withits antenna embedded in the top part of a security cap of a jar, andshowing the RFID chip embedded in the bottom lower ring part of thesecurity cap.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

FIG. 1 represents a product security system embodiment of the presentinvention, and is referred to herein by the general reference numeral100. The product security system 100 comprises a portable tag reader 102for inspecting a commercial packaged product 104. The reader 102 willassist a user in determining if there has been any tampering orcounterfeiting of the product 104. A lid 106 screws onto a matching jar108 filled with a product 110.

A radio frequency identification (RFID) chip 112 is connected to a tunedantenna 114, e.g., operating at 13.56 MHz. A thermosetting cross-linkedpolymer 116 “plastic-welds” the antenna to the lid 106. Similarly,another thermosetting cross-linked polymer 118 plastic-welds the RFIDchip 112 to the jar 108.

A pre-tear 120 favors ripping the antenna 114 at the containerseparation line when the consumer opens or otherwise penetrates thepackaged product 104. When the product is accessed, the antenna 114 willbe damaged, and any electronic access to the RFID chip 112 will beimpossible.

In alternative embodiments of the present invention, a sensor 122 isincluded to monitor a physical characteristic of the container product110. For example, the sensor 122 can be configured to measure thedensity, composition, chemistry, pH, electrical resistance, color,turbidity, volume, vapor pressure, viscosity, reactive fluorescence,etc. A calibrated digital or analog measurement is not strictlynecessary, it is only important for the RFID chip 112 to be able toreport any significant change in such physical characteristic of thecontainer product 110 since being sealed. Such changes can beinterpreted to indicate product tampering, spoiling, and counterfeiting.

A radio link 124 is established when the reader 102 is activated andbrought close enough to the antenna 114. In general, this distance willbe a few inches, and that is important to guarantee an intimatecommunication link not interfered with by other devices. It cantherefore be important to place the antennas 114 on the tops of packages104 if they are to be shipped together in multiple unit boxes. A reader102 can be passed over the top of such a shipping box to interrogateeach and every package 104 inside.

The portable tag reader 102 comprises an antenna 126, an RFID reader128, a database 130, and a user display 132. Commercial devices beingmarketed that can be used for RFID chip 112 and RFID reader areavailable from Atmel Corporation (San Jose, Calif.) as RFID“transponders” and “read/write base stations”. Other such devices andoperating frequencies can be used. An important aspect of any deviceselected for use is that it have a unique serial number and thatwireless access cannot occur if its antenna is damaged.

The “plastic-welding” mentioned is accomplished in original productionby vulcanizing constituent monomers with heat into long-chaincross-linked polymers that respectively entangle the RFID chip 112 andantenna 114. Any attempts to remove the RFID chip 112 and antenna 114will be easily spotted and detected, because the bonding cannot bereconstituted or effectively substituted.

The RFID chip 112 includes a unique serial number that can be read-outby the reader 102 under certain conditions. If the unique serial numbercannot be read out, then the container product 110 is assumed to betainted or counterfeit. If the unique serial number can be read, it isused to see if it matches an original product production series numbermaintained by the legitimate manufacturer of the product 110.

The RFID chip 112 requires that the reader 102 be close enough to induceoperating power to respond in its antenna 114. Such must be properlytuned and not broken in order to capture sufficient energy to power theRFID chip 112.

The reader 102 will assist a user in determining if there has been anytampering or counterfeiting of the product 110.

As described by Atmel Corporation, radio frequency identification (RFID)involves contactless reading and writing of data into an RFID tag'snonvolatile memory through an RF signal. An RFID system typicallyconsists of an RFID reader and an RFID tag. The reader emits an RFsignal, and data is exchanged when the tag comes close to the readersignal. The Atmel RFID tags derive their operating power from the RFreader signal, so a battery or external power source is not needed.Atmel Corporation markets a line of contactless RFID integrated circuitschip IC's, micromodules, and transponders operating at 125 kHz and 13.56MHz. For contactless smart card applications, Atmel markets a line of13.56 MHz Secure RF Smart Card ICs based on EEPROM technology. A newCryptoRF™ family is available with low cost, secure RF memory devicesthat share identical cryptographic algorithms and security features.Security is provided by encrypted passwords, mutual authentication, dataencryption and encrypted checksums. CryptoRF devices are available withuser memories of 1–64 kilobits of EEPROM. The CryptoRF devices arecompliant with the ISO/IEC 14443 Type B standards. A contactless smartcard system includes an RF reader and an RF card. The reader emits an RFsignal which polls for cards. Data is exchanged when the card is withinthe RF field of the reader antenna.

In reference to cross-linked polymers 116 and 118 (FIG. 1), polymers ingeneral comprise repeating molecules. These repeating molecules tend toform long chains that get tangled together. For example, polyolefins(waxes), polyacrylates (acrylics), polysulfides, polyvinylchlorides(PVC), polytetrafluoroethylene (PTFE or Teflon), and polyurethanes.

Polymerization is the process of joining together the componentmolecules of the polymer. In the rubber industry, polymerization isknown as “vulcanization”. In the fiberglass industry, polymerization isreferred to as the “cure”.

Polymers may be realized in a variety of viscosities, such as an oil(liquid), a gum (thixotropic gel), and a rubber (solid). An oil is madeof short loosely-tangled pieces of “thread”, a rubber is made up of longtightly-knotted tangles of “thread”. The tangling of the “threads” of apolymer is called cross-linking and the process of tangling is calledpolymerization. Cross-linking and polymerization are what happens whenportions of the polymer chains interact with each other.

A “fully polymerized” polymer is not usually dissolved in a solvent, thetangled knots can't be untied. Breaking the polymer down into itsindividual component molecules loses the road-map or guide to theorganization of the component parts, and cannot be put back togetherinto the polymer.

Some polymers have tight rigid bonds with highly organized chains, likepolymethacrylates (acrylics) which are hard but brittle. Other polymershave loose and flexible bonds, like silicone rubber which is resilientand elastic

A particular silicone polymer may be in various physical states which isusually determined by the length of the polymer chains and the degree ofcross-linking between these chains. A fluid (silicone oil) has shortpolymer chains with limited cross-linking between chains (short looselytangled threads). Gums have longer polymer chains and a greater degreeof cross-linking (longer and more tightly knotted chains). Rubbers havelong chains that are highly organized and cross-linked.

The manufacture of conventional silicone rubber involves extensivecross-linking between chains of a polymer. As the reaction proceeds, thereactive sites on each chain react other reactive sites, forming ahighly cross-linked network of polymer. Silicone rubber is made byletting this cross-linking reaction proceed until all the reactive sitesare linked.

FIG. 2 illustrates a method embodiment of the present invention forproduct security, and is referred to herein by the general referencenumeral 200. The method 200 comprises packaging products that haveunique serial numbers that can be wirelessly interrogated, as in a step202. A manifest 204 of original production series numbers is built fromthe unique product serial numbers and maintained in a manufacturerdatabase 206. At the factory, a check 208 is made to see if the wirelessreading of the product unique serial number can be done, and that itmatches what is expected from the database 206. If not, a problem isdetected and an investigation is made in a step 210. Otherwise, theproduct 214 can be shipped to the wholesale level.

At wholesale, the product 214 may not be the product 202 that themanufacturer produced, e.g., it has been counterfeited. A wholesaler'sdatabase 212 is derived by trusted channels from the manufacturer'sdatabase 206. A check of the numbers in a step 216 will detect acounterfeit product that otherwise looks perfect. If the correct numbersare returned by a reader, then the product proceeds to the retail levelas a product 220.

Again, the product 220 may have been counterfeited or tampered with, anda retailer's database 218 is used in a step 222 to detect a problem. Ifthe product numbers check, then the product is made available to theconsumer level. Such retailer's database 218 can be copied from anappropriate part of wholesaler's database 212 or manufacturer database206. The Internet can be used to securely communicate these databases.

A user inspection 224 is mostly visual, e.g., referring to FIG. 1,looking at the embedding of the tuned antenna 114 in the cross linkedpolymer 116 and the RFID chip 112 in cross linked polymer 118. If notintact, the consumer is advised to discard the product and investigation210 should be conducted. Otherwise, the product is assumed to bepristine and legitimate and can be used with confidence.

Alternative embodiments of the present invention incorporate the samepieces of FIG. 1 in different ways to suit a variety of productpackages. For example, plastic jars, pill bottles, aluminized pouches,blister packs, wine bottles, boxes, security badges, identificationcards, passports, etc. The system 100 can be retrofitted and permanently“glued” to an existing packaging. For new package designs, theelectronic components can be embedded or encapsulated in the very fabricof the packaging material.

FIG. 3A represents a security device embodiment of the present inventionfor a bottle or jar with a simple cap, and is referred to herein by thegeneral reference numeral 300. In FIG. 3B, security device 300 is shownpartially embedded in a cap 302 of a jar 304. A pair of tabs 306 and 307are to be wrapped and permanently bonded to the body of the jar. An RFIDchip 308 is included between tabs 306 and 307 and will separate from anantenna 310 if any stress is applied to a notch 312. During productmanufacturing and packaging, the cap 302 is twisted onto jar 304 andtabs 306 and 307 are bonded to the neck of jar 304. Twisting off the cap302 will break the antenna 310 and prevent functioning of RFID chip 308.Before any opening or tampering, the RFID chip 308 can be interrogatedthrough antenna 310 to report its unique serial number to a wirelessreader.

FIG. 4A represents another security device embodiment of the presentinvention for a bottle or jar with a security cap, and is referred toherein by the general reference numeral 400. In FIG. 4B, security device400 is shown embedded between a security-cap top 402 and a break-awayring 403. The cap is screwed onto a jar 404 during product packaging andring 403 will remain thereafter on jar 404. A bottom substrate 406supports an RFID chip 408 and are embedded in ring 403. RFID chip 408 iselectrically connected to an antenna 410 that will separate at a notchedarea 412 if enough stress is applied. Normally, twisting off the cap 402will break the antenna 410 and thus prevent functioning of RFID chip408. Before any opening or tampering, the RFID chip 408 can beinterrogated through antenna 410 to report its unique serial number to awireless reader.

Although the present invention has been described in terms of thepresently preferred embodiments, it is to be understood that thedisclosure is not to be interpreted as limiting. Various alterations andmodifications will no doubt become apparent to those skilled in the artafter having read the above disclosure. Accordingly, it is intended thatthe appended claims be interpreted as covering all alterations andmodifications as fall within the “true” spirit and scope of theinvention.

1. A product security system, comprising: a radio frequencyidentification (RFID) chip with an embedded unique serial number andresponsive to wireless interrogation by a reader; a tuned antennaconnected to the RFID chip critically tuned to operate at a particularfrequency and supporting said wireless interrogation; and polymerizedconstituent monomers formed into long-chain cross-linked polymers thatentangle said wireless RFID chip and tuned antenna with a productcontainer; wherein, any opening of said product container or removal ofthe wireless RFID chip and tuned antenna breaks the antenna and rendersthe RFID chip inoperable.
 2. The system of claim 1, further comprising:a reader for said wireless interrogation of the RFID chip via theantenna and able to wirelessly collect said unique serial number andsense a detuning of said tuned antenna.
 3. The system of claim 2,further comprising: a first product-packaging part to which the RFIDchip is permanently attached by thermosetting cross-linked polymerswhich obviate attempts to remove the RFID chip; a secondproduct-packaging part to which the antenna is permanently attached bythermosetting cross-linked polymers which obviate attempts to remove theantenna; a third product-packaging part which provides for access andthat is bridged by the antenna connecting to the RFID chip; and adatabase of unique serial numbers and their associations with particularprotected products originally supplied in the product container.
 4. Thesystem of claim 1, further comprising: a sensor for placement insidesaid product container, and connected to the RFID chip, and providingfor a physical measurement and wireless reporting of an attribute of anoriginally supplied protected product within.
 5. The system of claim 1,further comprising: a sensor placed inside the product container, andconnected to the RFID chip, and providing for a measurement and wirelessreporting of a change in a particular characteristic physical attributeof said product.
 6. The system of claim 4, further comprising: adatabase of unique serial numbers and their associations with saidphysical measurement that provides for product-quality surveillance. 7.A secure product container, comprising: a radio frequency identification(RFID) chip with an embedded unique serial number and responsive towireless interrogation by a reader; an antenna connected to the RFIDchip and being critically tuned to operate at a particular frequency andsupporting said wireless interrogation; a first product-packaging partto which the RFID chip is entangled by polymerized constituent monomersformed into long-chain cross-linked polymers and which will renderobvious any attempts to physically access the RFID chip; a secondproduct-packaging part to which the antenna is entangled by polymerizedconstituent monomers formed into long-chain cross-linked polymers andwhich will render obvious any attempts to physically access the antenna;and a third product-packaging part which provides for opening and thatis bridged by the antenna connecting to the RFID chip; wherein, anopening of the third product-packaging part breaks the antenna andrenders the RFID chip inoperable.
 8. A method for delivering products toconsumers, comprising: embedding a wireless RFID chip in a productpackage with a tuned antenna that will be damaged when the productpackage is entered; polymerizing constituent monomers with heat intolong-chain cross-linked polymers that entangle said wireless RFID chip,product package, and tuned antenna; collecting a unique serial numberfrom said RFID chip via wireless communication through said tunedantenna; associating said unique serial number with a particular seriesof production runs during manufacture into a manufacturer's database;interrogating said unique serial number directly from a particularproduct package; comparing said unique serial number obtained in thestep of interrogating with data in said manufacturer's database; andaccepting the product in said product package as safe or legitimate ifsaid step of comparing results in a match.
 9. The method of claim 8,wherein: the step of collecting will fail to report said unique serialnumber if said product package has been entered.
 10. The method of claim8, further comprising: inspecting said product package for evidence oftampering with said RFID chip or tuned antenna.
 11. The method of claim8, wherein: the step of collecting will fail to report said uniqueserial number if said product package has been tampered with enough todetune or ruin said tuned antenna.
 12. The method of claim 8, wherein:the step of embedding said wireless RFID chip and tuned antenna is suchthat attempts to physically access them after manufacturing will bevisually obvious to a consumer.
 13. The method of claim 8, wherein: thestep of embedding said wireless RFID chip and tuned antenna furtherincludes placing a sensor in contact with a product enclosed by saidproduct package.
 14. The method of claim 13, further comprising:reporting a change in a physical characteristic of said product via saidRFID chip as measured by said sensor.