Sensor-based nfc/rf mechanism with multiple valid states for detecting an open or compromised container, and methods of making and using the same

a sensor and nfc technology, applied in the field of near field and radio frequency communication, can solve the problems of counterfeiting, unauthorized sales could compromise, and taxing authorities might not be properly reimbursed, and achieve the effect of expanding use and functionality

Inactive Publication Date: 2016-10-13
THIN FILM ELECTRONICS ASA
View PDF7 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention expands the use of near field communication and RF tags by allowing detection of opened or compromised packaged or sealed products. The tags and devices can continue to communicate information about the product after the container or package has been opened. This technology provides improved security and functionality for RF tags and devices.

Problems solved by technology

Counterfeiting and diversion (sale of a product outside authorized regions or distributors, also known as ‘gray market activity’) are two common problems impacting global supply chains and global brands.
Apart from the obvious loss of revenue from the sale of genuine products, brands are negatively impacted by counterfeiting when an unknowing consumer loses confidence in a product's quality or safety.
In the case of gray market activity, the brand company might receive revenue for the sale of genuine product in an area where it is not distributed, but the unauthorized sales could compromise country- and region-specific pricing.
In addition, taxing authorities might not be properly reimbursed if product is sold outside the intended region.
This potential loss of revenue makes governments stakeholders, as well.
Sophisticated ‘forensic’ types of verification generally require shipment of questionable product to a certified lab for analysis and verification, meaning that it such methods cannot be used for real-time, in-field analysis and decision making.
In this implementation, NFC tags are placed in such a way that opening the protected product destroys the NFC tag, generally by breaking the antenna in some way (for example, poking the antenna with a corkscrew or twisting and breaking the antenna in the act of opening a screw-top container).
This means that cloud services that authenticate protected items based on the NFC tag's ID cannot be used after the protected item has been opened.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]Reference will now be made in detail to various embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with the following embodiments, it will be understood that the descriptions are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents that may be included within the spirit and scope of the invention. Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be readily apparent to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and materials have not been described in detail so as not to unnecessarily obscure aspects of the present invention.

[0039]The tech...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
Frequencyaaaaaaaaaa
frequencyaaaaaaaaaa
volumeaaaaaaaaaa
Login to view more

Abstract

A wireless (e.g., near field or RF) communication device, and methods of manufacturing and using the same are disclosed. The wireless communication device includes a receiver and / or transmitter, a substrate with an antenna thereon, an integrated circuit, and one or more continuity sensors. The antenna receives and / or transmits or broadcasts a wireless signal. The integrated circuit processes the wireless signal and / or information therefrom, and / or generates the wireless signal and / or information therefor. The continuity sensor(s) are configured to sense or determine the presence of a chemical or substance in the package or container, and thus a continuity state of a package or container on which the communication device is placed or to which the communication device is fixed or adhered. The continuity sensor(s) are electrically connected to a set of terminals of the integrated circuit different from the set of terminals to which the antenna is electrically connected.

Description

CROSS REFERENCE TO RELATED APPLICATION[0001]This application claims the benefit of U.S. Provisional Patent Application No. 62 / 146,105, filed on Apr. 10, 2015, incorporated herein by reference as if fully set forth herein.FIELD OF THE INVENTION[0002]The present invention generally relates to the field(s) of near field and radio frequency communication. More specifically, embodiments of the present invention pertain to radio frequency (RF and / or RFID), near field communication (NFC), high frequency (HF) and ultra high frequency (UHF) tags and devices with a sensor-based mechanism for detecting an open or compromised container while preserving the ability of the tags and devices to communicate wirelessly, and methods of manufacturing and using the same.DISCUSSION OF THE BACKGROUND[0003]Counterfeiting and diversion (sale of a product outside authorized regions or distributors, also known as ‘gray market activity’) are two common problems impacting global supply chains and global brands....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q30/00G01N27/414G06K7/10
CPCG06Q30/018G01N27/4148G06K7/10297G06K7/10316H04Q2209/47H04Q9/00G01N33/0075G01M3/187G06Q30/0185G06Q30/0601G08C17/02
Inventor BRIGHT, MATTHEWERNST, JENNIFERKARLSSON, CHRISTERHERLOGSSON, LARS
Owner THIN FILM ELECTRONICS ASA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products