Search

EP-4738191-A2 - A METHOD OF DETECTION OF UNAUTHORIZED INTERVENTION IN AN IDENTIFICATION STRUCTURE WHICH IS DESIGNED TO AID SUCH DETECTION

EP4738191A2EP 4738191 A2EP4738191 A2EP 4738191A2EP-4738191-A2

Abstract

A method of detection of unauthorized intervention into an identification structure is provided. The method includes configuring the identification structure such that the identification structure interacts with the intervention such as a physical intervention, or mechanical intervention, or electrical intervention. Further, the method involves propagating the intervention along the identification structure in such a control as to cause a detectable alteration in any predetermined attributes associated with the identification structure including a physical attribute, mechanical attribute, electrical attribute, and an optical attribute. Finally, the alteration in the attributes is detected by visual, electrical, or optical assessments or a combination of assessments.

Inventors

  • DE BACKER, Mathieu
  • TONEY, William
  • MICEK, Renee
  • CALLAHAN, Carol, L.

Assignees

  • Avery Dennison Retail Information Services LLC

Dates

Publication Date
20260506
Application Date
20220926

Claims (15)

  1. A method of detecting unauthorized intervention in an identification structure (100), the method comprising: configuring the identification structure (100) with a plurality of identification elements (201, 202, 301) comprising physical elements (301), and optionally one or more further elements selected from electrical elements (202), optical elements (201) and combinations thereof, such that one or more of the identification elements (201, 202, 301) interact with the intervention; propagating the intervention through any one or more of the identification elements (201, 202, 301) and along different layers (204, 205) of the identification structure (100) in a manner such as to cause a propagation of the intervention in a controlled manner so that the unauthorized intervention leaves behind a signature of detectable alterations in corresponding attributes of any one or more of the identification elements (201, 202, 301), and in a manner such that at least one of the identification elements (201, 202, 301) is retained intact with no damage; and detecting the alteration in the corresponding attributes by one or more assessments, the intervention being a physical intervention; and wherein the physical elements (301) comprise cuts having a predetermined depth and extending from a top layer (204) into one or more layers (205) underlying the top layer (204), or extending only along the top layer (204).
  2. The method of claim 1, wherein the corresponding attributes are properties of the one or more of the identification elements (201, 202, 301) selectively positioned in the identification structure (100), the identification elements (201, 202, 301) being selected from optical elements (201), electrical elements (202), physical elements (301) and combinations thereof.
  3. The method of claim 2, wherein the attributes are associated with physical, mechanical, material properties resulting from a configuration of the identification structure (100) or from the configuration of one or more of the identification elements (201, 202, 301).
  4. The method of claims 1 or 2, wherein configuring the identification structure (100) comprises selectively positioning the optical elements (201), the physical elements (301) and the electrical elements (202) on the different layers (204, 205) of the identification structure (100); or wherein configuring the identification structure (100) comprises selectively positioning the optical elements (201) and the physical elements (301) along a top layer (204) of the identification structure (100); or wherein configuring the identification structure (100) comprises selectively positioning the electrical elements (202) in one or more layers (205) underlying a top layer (204) of the identification structure (100).
  5. The method of claim 1, wherein the physical intervention is associated with one or more acts of removing, replacing, covering, mechanical force pulling, tearing, twisting, disabling, stretching, destructing, disrupting, displacing, heating or peeling apart layers of the identification structure (100).
  6. The method of claim 1, wherein the physical intervention causes detectable alteration in an electrical attribute including resonance frequency or acoustic function of the identification elements (201, 202, 301); or wherein the one or more assessments for detecting the detectable alterations comprise visual assessment, optical assessment or electrical assessment.
  7. An identification structure (100) for detecting unauthorized intervention, the unauthorized intervention being a physical intervention, the identification structure (100) comprising: a plurality of layers (204, 205) stacked together; and a plurality of identification elements (201, 202, 301) comprising physical elements (301), and optionally one or more further elements selected from electrical elements (202), optical elements (201) and combinations thereof, with the plurality of identification elements (201, 202, 301) being selectively positioned on different layers of the plurality of layers (204, 205) for interaction with the intervention, wherein a top layer (204) of the plurality of layers (204, 205) is provided with the physical elements (301) having a predetermined depth for propagating the intervention along different layers of the identification structure (100) in a manner such as to cause a propagation of the intervention in a controlled manner so that the unauthorized intervention leaves behind a signature of a detectable alteration in a corresponding attribute of any one or more of the identification elements (201, 202, 301), and in a manner such that at least one of the identification elements (201, 202, 301) is retained intact without damage, wherein the physical elements (301) comprise cuts having the predetermined depth and extending from the top layer (204) into one or more layers (205) underlying the top layer (204) or extending only along the top layer (204).
  8. The identification structure (100) of claim 7, wherein the electrical elements (202) are selected from a group comprising a radio frequency identification device (RFID), RF-EAS, AM-EAS, Bluetooth, Bluetooth LE or combinations thereof; or wherein the electrical elements (202) are selectively positioned in the one or more layers underlying the top layer (204).
  9. The identification structure (100) of claim 7, wherein the optical elements (201) comprise symbols or patterns adapted to be scanned by an optical scanning device.
  10. The identification structure (100) of claim 7, wherein the physical elements (301) are selected from at least one or a combination of a perforation, weakened scoring, slits, and embossing.
  11. The identification structure (100) of claim 7, wherein the top layer (204) is made of paper.
  12. The identification structure of claim 7, wherein the one or more layers (205) underlying the top layer (204) are made of paper.
  13. The identification structure of claim 7, wherein the plurality of layers is stacked together with adhesive coating between the layers, and wherein the adhesive coating is selectively deadened along the layers.
  14. The identification structure of claim 7, wherein the optical elements (201) are selectively positioned on the top layer (204).
  15. The identification structure of claim 7 or 14, wherein the optical elements (201) comprise any of a quick response code (QR code), bar code including 2D bar code, surface texture, color, hologram, encapsulated ink, symbol, appearance, and indicia or combinations thereof.

Description

CROSS-REFERENCE TO RELATED APPLICATION The present application claims the benefit of U.S. Provisional Patent Application No. 63/248,758 filed September 27, 2021, which is incorporated herein by reference in its entirety. FIELD The subject matter described herein relates to methods for detecting an unauthorized intervention or interference in, or into, an identification structure. Particularly, the subject matter described herein relates to detection of physical and electrical interventions or interferences in, or into, an identification structure. The subject matter described herein is particularly useful for tracking and monitoring merchandise items (e.g., items or products in commerce) in the supply chain, identification of merchandise items, securing merchandise items and the like. BACKGROUND The growing occurrences of counterfeit goods cause significant losses not just for businesses (e.g. brands) but also for consumers who can bear the brunt of illegitimate and substandard goods. Several interventions are typically used to introduce counterfeits into the circulation of legitimate and authentic products and merchandise. Some of the interventions include: physically replacing authentic products with counterfeit products, and within the supply and logistics chain, by some kind of tampering or forgery, including breaking open packaging, leaving little or no evidence of such illegitimate intervention. Typically, in order to reduce counterfeiting, various types of labels, tags and tickets are affixed to the items to identify the product and to authenticate goods and products. Various difficult-to-duplicate features have been used in an attempt to introduce anti-counterfeiting attributes and/or tamper proof solutions to labels and packaging. RFID tags have also been used in this context to help prevent counterfeiting and provide authentication to the end user/recipient. Although anti-counterfeiting techniques such as one-dimensional and two-dimensional barcode tags, laser tags, anti-counterfeiting bottle caps, and anti-counterfeiting ink printing have emerged, forgery and counterfeiting remain unabated. This is due the fact that some of these anticounterfeiting measures do not markedly add to the difficulty in forgery, allowing criminals to crack such measures. In recent years, due to the advancement of RFID-based electronic anti-counterfeiting technology, many product manufacturers are turning to RFID technology. However, instances of breaching RFID technology by electronic or electrical interventions for tampering or forgery have been reported. Moreover, RFID tags are not always convenient to use, especially when a reader fails. For example, a cellular phone cannot be used to scan RFID tags and therefore cannot be used as a backup if a reader(s) fails. In addition to counterfeiting, theft, diversion, and shoplifting from retail stores or pilferage of merchandise from supply and distribution channels or outlets is also on the rise. Typically, Electronic Article Surveillance (EAS) Systems (RF- Radio frequency or AM-Acousto-Magnetic type) are used for asset protection and/or preventing or detecting theft, diversion, or shoplifting. Examples of such systems include EAS tags that pin through an item, labels attached to the item's tags, and wire loops attached to the item. In each of these systems, all items are tagged with an EAS security tag upon being received in the store and must be deactivated upon purchase. EAS-enabled stores have gate readers at the entry/exit points that generate a field around the area to detect EAS transponders that have not been deactivated. However, EAS has limitations: it cannot identify an associated item as it lacks memory, making post -theft reconciliation/inventory accuracy difficult to achieve. In view of the above, there is a need for a broad use and cost effective solution that will reduce counterfeiting, prevent tampering, and reduce pilferage and shoplifting with the additional advantage of real-time monitoring of movements of goods from source to destination and having reduced environmental impact. The solution should offer a unified branding capability inclusive of security for loss prevention, item-level tracking, inventory accuracy and satisfying shopping experience for customers and be digitally compatible at the same time. Therefore, it is an object of this disclosure to provide broad use and cost effective solutions that will reduce counterfeiting, prevent tampering, and reduce pilferage and shoplifting with the additional advantage of real-time monitoring of movements of goods from source to destination and having reduced environmental impact and methods of making and using thereof. It is further an object of this to disclosure to offer solutions as defined above that provide a unified branding capability inclusive of security for loss prevention, item-level tracking, inventory accuracy, and customer satisfaction/engagement, and wherein the solutions are digitally c