Radio Frequency Identification (RFID) tags are commonly used in various contexts such as product identification, inventory tracking, product security, and others. In a typical system, an RFID tag may be affixed to product packaging and encoded with product related information such as a product serial number, stock number, production date, and other identifying information. To read the tag, an RFID reader transmits a wireless signal to the RFID tag. In response to the wireless signal, the RFID tag wirelessly transmits its stored information to the RFID reader. The RFID reader is able to read the information from several RFID tags simultaneously, and may be configured to transmit responses to a computer system, which can use the information to track the product inventory.
Certain examples are described in the following detailed description and in reference to the drawings, in which:
Techniques for detecting package tampering are disclosed. The system includes an RFID tag and booster antenna disposed on the package. The booster antenna boosts the effective communication range of the RFID tag. The booster antenna is disposed on one portion of the package, and the RFID tag is coupled to another portion of the package such that the RFID tag is inductively coupled to the booster antenna when the package is closed. When the package is opened, the RFID tag is decoupled from the booster antenna and the RFID reader loses communication with the RFID tag. This can be registered as a tampering event. When the package is opened, the RFID tag remains functional but has a reduced communication range. Resealing the package recouples the RFID tag and booster antenna so that normal operation of the RFID security system can resume.
The RFID tag 102 includes an integrated circuit 108 and an antenna 110 conductively coupled to the integrated circuit 108 to enable the integrated circuit 108 to communicate wireless with an RFID reader. The RFID tag 102 may be active or passive. The integrated circuit 108 can include a non-volatile memory for storing various information, such as a unique tag serial number and product related information. The antenna 110 included in the RFID tag 102 enables the RFID tag 102 to communicate with the RFID reader over a short range of distances. For example, the communication range may be approximately 0 to 20 centimeters (cm) for the RFID tag 102 alone, i.e. without the booster antenna 104.
In some examples, the RFID tag 102, including the antenna 110 and integrated circuit 108, may be formed together as discrete unit and then coupled to the package using an adhesive. Other techniques are also possible. For example, the antenna 110 of the RFID tag 102 may be printed onto the package and the integrated circuit 108 can be applied to the package over the antenna 110 and coupled to the package by an adhesive. The RFID tag 102 may also be coated with a sealing layer. In some examples, the RFID tag 102 may be embedded within the material of the package. For example, if the package is made of corrugated cardboard, the RFID tag 102 may be disposed between the layers of cardboard.
The booster antenna 104, when electromagnetically coupled to the RFID tag 102, increases the effective communication range of the RFID tag 102. For example, the booster antenna 104 may increase the communication range to a distance of around 10 centimeters to 2 meters. The booster antenna 104 may be any suitable type of antenna, including a monopole, dipole, meander dipole, loop antenna, and others. The booster antenna 104 may be disposed on the package in any suitable manner. In some examples, the booster antenna 104 may be made of a metal foil coupled to the package substrate by an adhesive. In some examples, the booster antenna 104 may be formed by printing a conductive medium on the package substrate using any of several printing techniques such as, thermal ink jet printing, liquid electrophotographic printing, and others.
In the example shown in
As shown in
If the tab 304 is removed from the slot 306, the RFID tag 102 and booster antenna 104 become decoupled, which reduces the communication range of the RFID tag 102. The reduced communication range may cause an RFID reader to lose communication with the RFID tag 102. This loss of communication may indicate that the package 300 has been opened to access the package contents, and may be identified as a tampering event.
Although the RFID tag 102 may be unable to communicate with the RFID reader at long distances when the package 300 is in the opened state, the RFID tag 102 nevertheless remains operational. One advantage of the RFID tag 102 remaining operational is that the RFID tag 102 can still be used to identify and track the package 300. For example, an RFID reader may be brought to within a few centimeters of the RFID tag 102 to establish communicate with the RFID reader. Additionally, once the package 300 is reclosed, the RFID tag 102 becomes recoupled to the booster antenna 104 and is able to resume communications over the longer communication range. This may be useful, for example, if it can be confirmed that the product inside the package 300 is still present and unharmed.
The configuration shown in
As shown in
If the package 400 is opened, the RFID tag 102 and booster antenna 104 become decoupled, which reduces the communication range of the RFID tag 102. As described in relation to
The configuration shown in
In some examples, the RFID reader 502 is also in communication with a computer system 506, which may be configured to collect and analyze data received from the RFID tags 102. The RFID reader 502 may be communicatively coupled to the RFID reader 502 through any suitable communication network, including wired connections, wireless connections, an Ethernet network, a WiFi network, the Internet, and others.
The computer system 506 may be configured to track inventory in any type of facility, such as a retail environment, and/or a storage facility such as warehouse, for example. The computer system 506 may also be coupled to additional RFID readers 502 within communication range of additional RFID tags 102 to provide coverage over a wider area.
In some examples, the computer system 506 is configured to detect product tampering. As described above, each of the RFID tags 102 will be within communication range of the RFID reader 502 while the package is closed. If any of the packages 504 is opened, the RFID tag 102 will be decoupled from its corresponding booster antenna 104, and the RFID reader 502 will stop receiving responses from the RFID tag 102. The resulting loss of communication can be flagged as a potential tampering event for the product associated with the RFID tag 102. This tampering event can be recorded by the computer system 506. In some examples, the computer system 506 may be configured to issue an alert to a staff member at the facility. If the package is reclosed, the RFID reader 502 may resume communication with the RFID tag 102. However, the tampering event will still be recorded, allowing a person to inspect the package to ensure product integrity.
At block 604, a booster antenna is disposed on a second portion of the product package. The booster antenna may be printed on a surface of the product package. In some examples, the booster antenna is manufactured separately and coupled to the product package. For example, the booster antenna may be made from a metal foil with an adhesive backing that can be attached to the product package. The RFID tag and booster antenna are positioned on the product package so that the RFID tag will be electromagnetically coupled to the booster antenna when the product package is closed, and the RFID tag will be decoupled from the booster antenna when the product package is open.
At block 606, product may be inserted into the product packaging and the product packaging may be closed so that the RFID tag is electromagnetically coupled to the booster antenna. Fewer or greater actions can be included in the method 600 depending on the design considerations of a particular implementation.
While the present techniques may be susceptible to various modifications and alternative forms, the examples discussed above have been shown only by way of example. It is to be understood that the techniques are not intended to be limited to the particular examples disclosed herein. Indeed, the present techniques include all alternatives, modifications, and equivalents falling within the scope of the present techniques.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2018/015241 | 1/25/2018 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2019/147246 | 8/1/2019 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5831531 | Tuttle | Nov 1998 | A |
7301460 | Coste | Nov 2007 | B2 |
9697711 | McIntosh | Jul 2017 | B2 |
10371737 | Mukherjee | Aug 2019 | B2 |
20020067264 | Soehnlen | Jun 2002 | A1 |
20070069895 | Koh | Mar 2007 | A1 |
20080068178 | Meyer | Mar 2008 | A1 |
20080309495 | Chisholm | Dec 2008 | A1 |
20130119144 | Suzuki | May 2013 | A1 |
20170363673 | Mukherjee | Dec 2017 | A1 |
20170364716 | Huhtasalo et al. | Dec 2017 | A1 |
20190138766 | Colby | May 2019 | A1 |
Entry |
---|
Want, R., Enabling Ubiquitous Sensing with RFID, Aug. 2, 2004, 3pgs, http://ieeexplore.ieee.org/document/1297315/. |
Number | Date | Country | |
---|---|---|---|
20200364530 A1 | Nov 2020 | US |