The present disclosure relates generally to the field of security systems. More particularly, the present disclosure relates to tamper-evident seals.
Conventional NFC/RFID or dual frequency NFC plus RFID (NFC+RFID) security tags use the technology of inductive coupling, which is a phenomenon in which energy is transferred through a shared magnetic field between an RFID tag and an RFID reader. The RFID reader uses magnetic induction to create a radio-wave field that the RFID tag detects. Therefore, when a tag is placed in close proximity to the reader, the field from the antenna coil of the reader couples with the antenna coil of the tag and induces a voltage in the tag, which is then rectified and used for powering the internal circuitry of the tag. Existing passive RFID security tags/seals are capable of checking and recording the status of the tamper loop only in presence of a radio frequency (RF) field of the RFID reader. Such chips derive their power from the RF field to send a pulse around the tamper loop. If the pulse is successfully sent and received by the RF reader, a tamper check flag is set as non-tampered and seal is declared non-tampered. In the absence of such an RF field, a skilled counterfeiter can open and close the tag/seal without changing the status of the tamper check flag. Hence, under such a condition, when an RFID reader reads the tamper check flag, it will show non-tampered even though the seal/tag is tampered with, which is not desired. Currently available RFID bolt seals cannot distinguish between a locked and an unlocked seal. In such a scenario, an unlocked seal could be read by an unmanned RFID gateway and could be passed as a locked, untampered seal. There is, therefore, felt a need for developing a tamper-evident seal that discourages tampering and can provide three distinct states when read by an NFC/RFID reader application—unlocked, locked, and tampered.
In one aspect, a tamper-evident seal assembly includes a flag post. The flag post includes a frame configured to securely support a circuit, the circuit comprising an NFC and/or RFID antenna, a tamper detection chip, a pair of conducting elements comprising two (2) corresponding terminals, the terminals being exposed out of the frame. A pedestal is configured to lockingly receive a portion of the flag post for sealing an arrangement to be sealed. The pedestal encloses a conductive sticker or a conducting element(s) configured to attach with the terminals of the conducting elements on locking of the flag post into the pedestal, thereby forming an electrical tamper loop with the tamper detection chip. The conductive sticker or the conducting elements may be configured to become damaged when the tamper-evident seal assembly is tampered with, causing the tamper loop to open.
In another aspect, a method for operating a tamper-evident seal assembly is provided. The method provides a flag post comprising a frame configured to securely support a circuit, the circuit comprising a tamper detection chip, a pair of conducting elements comprising two (2) corresponding terminals, the terminals being exposed out of the frame. The method provides a pedestal. With the pedestal, the method encloses a conductive sticker or the conducting elements configured to attach with the terminals. With the pedestal, the method lockingly receives a portion of the flag post for sealing an arrangement to be sealed. With the pedestal, the method encloses a conductive sticker or the conducting element(s) configured to attach with the terminals of the conducting elements on locking of the flag post into the pedestal. The method configures the conductive sticker or the conducting element(s) to become damaged when the tamper-evident seal assembly is tampered with, causing the tamper loop to open.
a-b illustrate an example tamper-evident seal assembly, according to some embodiments.
a-c illustrate an example tamper-evident seal assembly, according to some embodiments.
a-b illustrate an example tamper-evident seal assembly, according to some embodiments.
a-b illustrate an example tamper-evident seal assembly, according to some embodiments.
a-b illustrate an example tamper-evident seal assembly, according to some embodiments.
The Figures described above are a representative set and are not an exhaustive with respect to embodying the invention.
Disclosed are a system, method, and article of manufacture of a tamper-evident seal. The following description is presented to enable a person of ordinary skill in the art to make and use the various embodiments. Descriptions of specific devices, techniques, and applications are provided only as examples. Various modifications to the examples described herein can be readily apparent to those of ordinary skill in the art, and the general principles defined herein may be applied to other examples and applications without departing from the spirit and scope of the various embodiments.
Reference throughout this specification to ‘one embodiment,’ an embodiment,′ ‘one example,’ or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment, according to some embodiments. Thus, appearances of the phrases ‘in one embodiment,’ in an embodiment,′ and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
Furthermore, the described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided, such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art can recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
The schematic flow chart diagrams included herein are generally set forth as logical flow chart diagrams. As such, the depicted order and labeled steps are indicative of one embodiment of the presented method. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated method. Additionally, the format and symbols employed are provided to explain the logical steps of the method and are understood not to limit the scope of the method. Although various arrow types and line types may be employed in the flow chart diagrams, and they are understood not to limit the scope of the corresponding method. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the method. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted method. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.
When an element is referred to as being “mounted on,” “engaged to,” “connected to” or “coupled to” another element, it may be directly on, engaged, connected, or coupled to the other element.
Terms such as “inner,” “outer,” “beneath,” “below,” “lower,” “above,” “upper” and the like, may be used in the present disclosure to describe relationships between different elements as depicted from the figures.
Example definitions for some embodiments are now provided.
Application programming interface (API) can specify how software components of various systems interact with each other.
Bluetooth Low Energy (BLE) is a wireless personal area network technology.
Lockingly can mean in such a way as to lock.
LoRa (Long Range) is a low-power wide-area network modulation technique. LoRa is based on spread spectrum modulation techniques derived from chirp spread spectrum (CSS) technology. It is noted that LoRaWAN is one of several protocols that can define the upper layers of a LoRa network.
LoRaWAN is a cloud-based medium access control (MAC) layer protocol but acts mainly as a network layer protocol for managing communication between LPWAN gateways and end-node devices as a routing protocol.
Near-Field Communication (NFC) is a set of communication protocols for communication between two electronic devices over a distance (e.g. 4 cm (1½ in) or less, etc.). NFC can utilize a low-speed connection with a setup that can be used to bootstrap more-capable wireless connections.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods. There are two types of RFID tags. These can include passive tags are powered by energy from the RFID reader's interrogating radio waves. These can also include active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to hundreds of meters.
Ultrasonic welding is an industrial process whereby high-frequency ultrasonic acoustic vibrations are locally applied to workpieces being held together under pressure to create a solid-state weld. It can be used for plastics and metals, and for joining dissimilar materials.
Present systems can be used, inter alia, to provide a tamper-evident seal. Additionally, a tamper-evident seal that incorporates an NFC/RFID and/or NFC+RFID based security tag is provided. The tamper-evident seal incorporates an NFC/RFID or NFC+RFID based security tag. This can update the tamper check flag even in the absence of the field generated by an external electro-magnetic reader.
In some examples, the tamper-evident seal assembly includes a flag post and a pedestal. The flag post has a frame configured to securely support a circuit. The circuit includes a tamper detection chip, a pair of conducting elements having corresponding terminals. The terminals are exposed out of the frame. The pedestal is configured to lockingly receive a portion of the flag post for sealing the arrangement to be sealed. The pedestal encloses a conductive sticker configured to stick with the terminals of the conducting elements on locking of the flag post into the pedestal, thereby forming an electrical loop with the tamper detection chip. The conductive sticker is configured to become damaged when the tamper-evident seal assembly is tampered with, causing the tamper loop to open. Preferably, the flag post and the pedestal have a snap-locking arrangement defined between them. In an embodiment, the frame of the flag post has a groove and the pedestal encloses a locking ring configured to snap-lockingly engage with the groove. The circuit may include an electrical energy storage device. Preferably, the tamper detection chip is configured to receive electrical energy from the electrical energy storage device. The tamper detection chip includes an electronic memory. Preferably, the tamper detection chip is configured to irreversibly update information stored within the electronic memory when the tamper loop is opened. The circuit includes at least one antenna which is configured to transmit information stored within the electronic memory on being energized electromagnetically by an electromagnetic reader. Preferably, the tamper detection chip is an RFID chip or an NFC chip. In some example embodiments, other networking communication protocols can be utilized such as, inter alia: LoRaWAN or BLE for communication. In an embodiment, the frame consists of two panels which are ultrasonically welded together.
Tamper-evident seal assembly 300 can prevent any loss of items stored in cargo containers or the like, as it gets damaged beyond repair in case tampered with. The tamper-evident seal assembly 300 includes a flag post 100 and a pedestal 200, as shown in
The tamper detection chip 121 is electrically connected to the antenna 122. The tamper detection chip 121 includes a control unit, an electronic memory (memory), a tamper switch, a counter, and a comparator. The memory includes an identification register, a tamper check flag register, and a pre-determined threshold tamper value. The identification register is configured to store a unique identification code associated with the tamper indicating seal. Preferably, the chip 121 is NFC or RFID or NFC+RFID based. The circuit 120 is preferably configured in the form of a sticker or a PCB.
In an embodiment, the flag post 100 has a frame 110 which has a first panel 111 and a second panel 114, as shown in
The operative lower end of the pedestal housing 210 is open for receiving a bottom cover 240, as shown in
In an embodiment, the sticker mount 242 has two legs, wherein the legs are compressible due to the pressure exerted for locking of the flag post 100 into the pedestal 200, particularly for snapping of the groove 131 over the locking ring 230, thus preventing inadvertent damage to the conductive sticker 241 by compensating for any additional pressure exerted during the snap-locking action of the flag post 100 into the pedestal 200. The working of the circuit 120 for tamper detection shall be explained here forth. The default count value stored in the counter is “0”.
In an embodiment, when the tamper loop is closed, i.e. when the flag post 100 is locked with the pedestal 200, the battery drives a current through the tamper loop defined by the tamper detection chip 121, the conducting wires extending up to the terminals 124 and the conductive sticker 241, and supplies power to the control unit of the tamper detection chip. Upon receiving the power, the control unit is configured to generate a closed event signal, and further to transmit the closed event signal to the tamper switch.
The tamper switch is configured to change state upon receiving the closed event signal. The change in state of the tamper switch drives the counter to increase the count value by one. When the tamper loop is opened, i.e. when the flag post 100 is removed (unlocked) from the pedestal 200, there will be no current in the tamper loop. In case of any pre- or post-tampering attempt, it is not possible to bypass the counter. If the tamper-evident seal assembly 300 is tampered by opening the tamper loop, the counter immediately increments the count. If the tamper loop is successfully reattached, the counter still increments count. Thus, the tamper detection chip 121 updates the tamper check flag in the tamper check flag register even in the absence of the field generated by an external electromagnetic reader. When this condition is detected by an electromagnetic reader, the tamper-evident seal assembly 300 is declared as tampered.
In another embodiment, the tamper-evident seal assembly 300 can use a chip which uses an RF field to check the tamper status. In this embodiment, a battery or capacitor is not required. In this embodiment, the seal can not detect a tamper attempt in the absence of an RF field. The chip can change its status to tampered only once and permanently if it is read once the seal is unlocked or tampered.
In another embodiment, the flag post 100 is inserted into the pedestal 200 till the locking ring 110 engages on the locking groove provided over the bottom cover 150. This ensures contact of the conductive sticker 151 with the two ends. Once the sticker bonds to the end of the loop, any attempt to forcibly disengage the two parts 100, 200 will damage the tamper loop beyond repair. The foregoing description of the embodiments has been provided for purposes of illustration and not intended to limit the scope of the present disclosure. Individual components of a particular embodiment are generally not limited to that particular embodiment, but are interchangeable. Such variations are not to be regarded as a departure from the present disclosure, and all such modifications are considered to be within the scope of the present disclosure.
Tamper-evident seal 300 can be used to discourage tampering, since an attempt to forcibly open the seal will damage the tamper loop beyond repair. Tamper-evident seal 300 updates the tamper check flag even in the absence of the field generated by an external electromagnetic reader.
Although the present embodiments have been described with reference to specific example embodiments, various modifications and changes can be made to these embodiments without departing from the broader spirit and scope of the various embodiments. For example, the various devices, modules, etc. described herein can be enabled and operated using hardware circuitry, firmware, software or any combination of hardware, firmware, and software (e.g., embodied in a machine-readable medium).
In addition, it can be appreciated that the various operations, processes, and methods disclosed herein can be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system (e.g., a computer system), and can be performed in any order (e.g., including using means for achieving the various operations). Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. In some embodiments, the machine-readable medium can be a non-transitory form of machine-readable medium.