These teachings relate generally to detecting and preventing tampering with packages.
Packages are commonly shipped between shipping sources and shipping destinations. One problem associated with the shipping process is tampering with packages. For example, an unauthorized person may open the package and steal the contents. In other examples, an unauthorized person may also add something harmful to the package. The fear of having a package being tampered with sometimes prevents some individuals from purchasing an item if the item needs to be shipped. This situation leads to lost sales for many businesses.
Various approaches have been attempted to prevent or detect or discourage tampering. For example, a customer may simply visually inspect a package for tampering. However, visual inspection may be ineffective since many individuals are very adept at tampering with a package, leaving few if any visible signals or signs that can be detected by humans.
In other examples, various types of sealing or locking mechanisms may be used on packages. However, these types of measures are typically expensive to implement, and customers do not often wish to pay for the extra costs of these approaches. These approaches may also be time consuming to install, or it may make opening the package difficult for the customer and so negatively impact the customer experience.
The above needs are at least partially met through provision of approaches that detect and/or discourage tampering with packages as described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Generally speaking, many of these embodiments provide for a system and method that easily detect tampering with packages shipped from a shipping source and received at a shipping destination. A packing tape is applied to a package and has a pattern of protrusions passing there through. Tampering can be detected in a variety of different ways such as visually inspecting the package, or automatically and electronically comparing an image of the package made at shipment and to an image of the package when the package reaches its destination.
In many of these embodiments, a tape dispensing system includes packaging tape, an application apparatus, and an incision element. The application apparatus is configured to apply the packaging tape to a package. The incision element defines a unique pattern, and is connected to the application apparatus. Movement of the apparatus is effective to punch or incise the unique pattern defined by the incision element completely through the packaging tape and into the package as or after the packaging tape is applied to the package. A first incised pattern is formed through the tape, and a second incised pattern is formed in the package. An inspection is performed to determine if the first incised pattern through the tape aligns with the second incised pattern in the package.
In aspects, the inspection is a visual inspection of the package at a shipping destination. In other aspects, the inspection is a comparison of first images obtained of the package at a shipping source with second images obtained of the package at the shipping destination.
In some examples, the application apparatus is a roller. In other examples, the unique pattern is a random pattern created automatically or a predefined pattern created by a user. In still other examples, the incision element comprises prongs. Other examples of application apparatuses, unique patterns, and incision elements are possible
In others of these embodiments, a unique pattern is determined. Packaging tape is applied to a package and the unique pattern is punched or incised completely through the packaging tape and into the package as or after the packaging tape is applied to the package. In so doing, a first incised pattern is formed through the tape, and a second incised pattern is formed in the package. The package is visually inspected to determine if the first incised pattern through the tape aligns with the second incised pattern in the package.
In still others of these embodiments, a system for determining package tampering includes a communication network, a tape dispensing device, a first scanner, a second scanner, a database, and a control circuit. The tape dispensing device is disposed at a shipping source and is configured to dispense packing tape onto a package to seal the package. The tape dispensing device is further configured to incise or punch first openings defining a unique pattern completely through the tape as the tape is dispensed onto the package, and to incise or punch corresponding second openings defining the unique pattern into a body of the package.
The first scanner is disposed at the shipping source, is coupled to the communication network, and is configured to obtain a first image of the package including the unique pattern incised or punched through the tape. The first scanner is configured to transmit the first image to a central processing center via the communication network.
The database is coupled to the communication network and is disposed at the central processing center. The database is configured to receive and store the first image.
The control circuit is coupled to the communication network and the database. The control circuit is disposed at the central processing center.
The second scanner is disposed at a shipping destination and is configured to obtain a second image of the package after the package has been received at the shipping destination. The second scanner is configured to transmit the second image to the control circuit at the central processing center over the communication network.
The control circuit is configured to retrieve the first image from the database and the second image from the second scanner. The control circuit is further configured to perform a comparison between the first image and the second image, and based upon the comparison to determine whether the unique pattern has changed between the shipment of the package from the shipping source to the shipping destination.
In aspects, the comparison determines whether the first openings align with the second openings. In other examples, the control circuit is further configured to issue an alert when the unique pattern has changed.
In still other examples, the tape dispensing device is configured to deposit an ink into the second openings in the body of the package. The ink may be a visible ink or an invisible ink. In aspects, the first openings and the second openings comprise nano-holes. In other aspects, the tape dispensing device comprises a roller that incises or punches the unique pattern.
In still other examples, the second scanner is a portable hand-held device. In yet other examples, the package moves via a conveyor belt in the shipping center as the packing tape is dispensed.
In others of these examples, a conventional reinforced tape with adhesive (e.g., the water activated adhesive) is applied to a package. After the tape is applied to the package, a collection of perforations is added to the tape and the package. The depth of, width of, and pattern, if at all the perforations may vary.
These perforations form a unique identifier (e.g., similar to a fingerprint) on the package and changes to this identifier may be detected through a video analytics system which can compare the package as it was ready for shipment with the package at the customer's location. In aspects, the perforations could be nano-perforations (barely visible or invisible to the naked eye).
In examples, perforated tape that leaves visible marks on the cardboard The marks create a pattern for identifying the origin of shipping, the retail store shipped from, the person doing the shipping, delivery information, and the identity of the shipped product, to mention a few examples for identifying information, such as a UPC code.
In still other examples, an application scans images of the perforations, compares against shipping image of perforations to the received package. A naked eye determination by a human can also be made where a person can visually determine if the perforations through the tape align with the perforations in the package.
In still other approaches, the detection is accomplished using standard packing tape and a spiked roller that is rolled over the tape and box after the box is sealed. The roller can be rolled by hand or by machine and may be a separate tool within the system or a part of the tape installer itself. In aspects, the roller creates a micro pattern of holes (e.g., dozens to hundreds) through the tape and into the box. In other aspects, some of these holes can be seen by the naked eye, and they could also be nano-holes, so small it take a machine to read them effectively. If an unauthorized person removes the tape, it will be impossible or nearly so for them to replace the tape so that all the holes line back up. A person could easily detect non-alignment of the holes through the tape and in the box. Depending on the tape used, the tape could also be designed to fracture if people attempt to remove it, further adding to the impossibility of replacing the tape.
In aspects, the holes are created by the spikes on the roller, and the spikes can be of varied heights, such that the pattern and depth of holes become signatures for the sealer before sending a package to a destination. The recipient could assure not only that the box has remained sealed, but that the pattern belongs to the accepted sender. Additionally, boxes could also be made to have a special layer, for example, an interior foil sheet that will be exposed by a perforation and could be machine readable as exposed.
Referring now to
The packaging tape 102 is any type of suitable tape that can be used to seal a package 108. In some examples, the tape may have an adhesive to attach it to the package 108. In other examples, the tape includes water activated adhesive. The package 108 may be any type of shipment container such as a cardboard box, an envelope, or a wooden crate to mention a few examples.
The application apparatus 104 is any type of device that applies the tape 102 to a package. In one example shown in
The incision element 106 in this example are spikes 124 on the roller 120 or the plate 126. The spikes 124 are configured to be of any suitable length and are arranged in a predetermined pattern on the roller 120 or plate 126. In some examples, the spikes 124 are of the same length. In other examples, the spikes 124 are of different lengths. When the spikes are of different length, the holes in the box are of different depths. In this case, both the pattern and depth of holes become signatures that are evaluated at the destination. The roller 120, plate 126, and the spikes 124 may be constructed of any suitable material such as a metal or a hard plastic.
In other examples, the incision element 106 can be knife-like elements or other elements capable of cutting through the tape 102 and into the box 108. In other examples, combinations of spikes and knife-like elements are used. Unique patterns are formed by these elements as the tape 102 is applied to the box 108 such that the pattern on one box will differ from the pattern on another box.
Referring especially to
Movement of the roller 120 across the tape 102 is effective to punch or incise the unique pattern defined by the spikes 124 completely through the packaging tape 102 and into the package 108 as the packaging tape 102 is applied to the package 108. In these regards, a first incised pattern is formed through the tape 102, and a second incised pattern is formed in the package 108. In some examples, the tape 102 is first applied to the package 108 and then the roller or plate is applied to the tape 102 and package 108. In other examples, the tape 102 is applied to the package 108 as the incisions are made through the tape 102 and into the package 108.
An inspection is performed to determine if the first incised pattern through the tape aligns with the second incised pattern in the package 108. The inspection may be a manual inspection at the destination (e.g., a human viewing the package), or may be automated by, in one example, comparing an image of the package leaving the shipping source to another image of the package after it arrives at a shipping destination.
For any given package and where a roller is used, the beginning point where the roller engages the tape and the ending point where the roller disengages the tape are different as between packages. Thus, each package has a unique pattern incised through the tape and into the package.
If a plate is used, an automated process may move and remove spikes 124 from the plate and form unique patterns of spikes on the plate. For instance, a random number may be generated to determine the number and pattern of spikes deployed on the plate. This number changes from package to package resulting in a unique pattern of spikes deployed on the plate for a given package. The height of the spikes may also be varied. In these regards, the spikes are alternatively retractable and extendable from the plate, and electronic signals may be sent to mechanisms that are configured to vary the spikes from a fully extended (engaged) position to a retracted (dis-engaged) position.
In another example, the plate 126 is pressed through the tape 102 and into the box. More specifically, the tape 102 may be applied to the box 108, and then the plate 126 is pressed on to the tape 102 to incise a pattern through the tape 102 and into the box 108.
Referring especially to
As mentioned, an inspection is performed to determine if the first incised pattern through the tape aligns with the second incised pattern in the package 108. The inspection may be a manual inspection at the destination (e.g., a human viewing the package), or may be automated by, in one example, comparing an image of the package leaving the shipping source to another image of the package after it arrives at a shipping destination.
The holes (or openings)-per-square unit (e.g., per-square-inch, per-square-millimeter, or per-square-centimeter) can vary depending upon the security level needed. For example, a larger number of hole-per-unit can be used when a greater level of security is desired. A smaller number of holes-per-unit can be used when a lower level of security is desired. Customers may pay for different levels of security. The size of the holes may vary as well. In some example, the holes may be large enough to be seen by the naked human eye (e.g., 0.1 mm in diameter), while in other examples, the holes are nano-holes, which or difficult or impossible to detect with the human eye.
In some examples, the holes 144 is the package 108 may be filled (or partially filled) with an ink or some other element. In aspects, the ink may be a visible ink or an invisible ink. The use of an ink may make it easier for detection of the pattern formed by the holes, either by the human eye or by image comparison. Also as mentioned and in some aspects, the holes may be of varying heights. In this case, a determination is also made not only of the pattern, but the depth of the holes. This can be made according to various image processing approaches as known to those skilled in the art.
Referring now especially to
Movement of the tape roller 412 across the tape 410 is effective to punch or incise the unique pattern completely through the packaging tape 410 and into the package 404 as the packaging tape 410 is applied to the package 404. In these regards, a first incised pattern is formed through the tape 410, and a second incised pattern is formed in the package 404. The patterns align after application of the tape 410 to the package 404.
Referring now to
Referring now to
At step 602, a unique pattern is determined or created. The unique pattern may in some examples be determined by a roller that is being applied to tape. In other examples, the unique pattern is applied by a plate with protrusions that is applied to the tape and package.
The unique pattern is applied through the tape and into the package. In one example, the unique form is formed by protrusions on a roller. In another example, the unique pattern is formed by protrusions on a flat plate.
At step 604, packaging tape is applied to a package while the unique pattern is simultaneously punched or incised completely through the packaging tape and into the package as the packaging tape is applied to the package. In so doing, a first incised pattern is formed through the tape, and a second incised pattern is formed in the package. In other examples, the tape is first applied to the package and then the roller or plate is applied to the tape and package.
At step 606, the package is shipped from the shipping source to a shipping destination. In one example, the shipping source is a warehouse and the shipping destination is a home. In another example, the shipping source is a first warehouse and the shipping destination is a second warehouse.
At step 608, the package arrives at the destination and is visually inspected to determine if the first incised pattern through the tape aligns with the second incised pattern in the package.
Referring now to
The communication network 702 is any type of computer or communication network and may include routers, gateways, and servers to mention a few examples of devices that can form or be utilized in the network 702. The network 702 may also be combinations of various types of networks.
The tape dispensing device 704 is disposed at a shipping source 720 and is configured to dispense packing tape 712 onto a package 714 to seal the package 714. The tape dispensing device 704 is further configured to incise or punch first openings defining a unique pattern completely through the tape 712 as the tape 712 is dispensed onto the package 714, and to incise or punch corresponding second openings defining the unique pattern into a body of the package 714. In one example, the tape dispensing device 704 is a roller with spikes or protrusions that define a pattern. In another example, the tape dispensing device 704 is a plate with spikes or protrusions that define a pattern. The patterns as applied between different boxes are unique. In some examples, the tape is first applied to the package and then the roller or plate is applied to the tape and package. In other examples, the tape is applied to the package as the incisions are made through the tape and into the package.
The first scanner 706 and the second scanner 708 are devices that obtain images (or other sensed information or readings) that show the tape 712 as applied to the package 714. In one example, the first scanner 706 and the second scanner 708 are cameras that obtain images in any type of image file format.
The first scanner 706 is disposed at the shipping source 720, is coupled to the communication network 702, and is configured to obtain a first image of the package including the unique pattern incised or punched through the tape 712. The first scanner 706 is configured to transmit the first image to a central processing center 724 via the communication network 702. The central processing center 724 may be at any location that is accessible to multiple shipping sources and destinations via the network 702.
The database 709 is any type of electronic memory device. The database 709 is coupled to the communication network 702 and is disposed at the central processing center 724. The database 709 is configured to receive and store the first image.
The control circuit 710 is coupled to the communication network 702 and the database. The control circuit 710 is disposed at the central processing center 724.
It will be appreciated that as used herein the term “control circuit” refers broadly to any microcontroller, computer, or processor-based device with processor, memory, and programmable input/output peripherals, which is generally designed to govern the operation of other components and devices. It is further understood to include common accompanying accessory devices, including memory, transceivers for communication with other components and devices, etc. These architectural options are well known and understood in the art and require no further description here. The control circuit 710 may be configured (for example, by using corresponding programming stored in a memory as will be well understood by those skilled in the art) to carry out one or more of the steps, actions, and/or functions described herein.
The second scanner 708 is disposed at a shipping destination 722 and is configured to obtain a second image of the package 714 after the package 714 has been received at the shipping destination 722. The second scanner 708 is configured to transmit the second image to the control circuit at the central processing center 724 over the communication network 702. The first and second images may be in any type of image or image file format or conform to any type of protocol.
The control circuit 710 is configured to retrieve the first image from the database 709 and the second image from the second scanner 708. The control circuit 710 is further configured to perform a comparison between the first image and the second image, and based upon the comparison to determine whether the unique pattern has changed between the shipment of the package 714 from the shipping source 720 to the shipping destination 722.
In aspects, the comparison determines whether the first openings align with the second openings. In other examples, the control circuit 710 is further configured to issue an alert when the unique pattern has changed.
In still other examples, the tape dispensing device 704 is configured to deposit an ink into the second openings in the body of the package 714. The ink may be a visible ink or an invisible ink. The first openings and the second openings comprise nano-holes. The tape dispensing device 704 comprises a roller that incises or punches the unique pattern.
In other examples, the second scanner 708 is a portable hand-held device. In yet other examples, the package 714 moves via a conveyor belt in the shipping center 720 as the packing tape 712 is dispensed.
In others of these examples, a conventional reinforced tape with adhesive (e.g., the water activated adhesive) is applied to a package 714. After the tape is applied to the package, a collection of perforations is added to the tape and the package. The depth of, width of, and pattern, if at all the perforations may vary.
These perforations form a unique identifier (e.g., similar to a fingerprint) on the package and changes to this identifier may be detected through a video analytics system which can compare the package as it was ready for shipment with the package at the customer's location. In aspects, the perforations could be nano-perforations (barely visible or invisible to the naked eye).
In examples, perforated tape that leaves visible marks on the cardboard The marks create a pattern for identifying the origin of shipping, the retail store shipped from, the person doing the shipping, delivery information, and the identity of the shipped product, to mention a few examples for identifying information, such as a UPC code.
In still other examples, an application scans images of the perforations, compares against shipping image of perforations to the received package 714. A naked eye determination can also be made where a person can visually determine if the perforations through the tape align with the perforations in the package 714.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
This application claims the benefit of the following U.S. Provisional Application No. 62/514,128 filed Jun. 2, 2017, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4749084 | Pereyra | Jun 1988 | A |
4760919 | Pereyra | Aug 1988 | A |
4865198 | Butler | Sep 1989 | A |
6240362 | Gaspard, II | May 2001 | B1 |
6385537 | Gaspard, II | May 2002 | B2 |
6411897 | Gaspard, II | Jun 2002 | B1 |
6806807 | Cayne | Oct 2004 | B2 |
7113071 | Cayne | Sep 2006 | B2 |
7191942 | Aptekar | Mar 2007 | B2 |
7257552 | Franco | Aug 2007 | B1 |
7410103 | Nagel | Aug 2008 | B2 |
7497379 | Chen | Mar 2009 | B2 |
7840427 | O'Sullivan | Nov 2010 | B2 |
7945469 | Cohen | May 2011 | B2 |
7945470 | Cohen | May 2011 | B1 |
8160972 | Tannenbaum | Apr 2012 | B1 |
8554694 | Ward | Oct 2013 | B1 |
9066206 | Lin | Jun 2015 | B2 |
9202191 | Bowen | Dec 2015 | B2 |
9230292 | Amin | Jan 2016 | B2 |
9269103 | Kumar | Feb 2016 | B1 |
9305310 | Radhakrishnan | Apr 2016 | B2 |
9378479 | Seifen | Jun 2016 | B2 |
9459622 | Abhyanker | Oct 2016 | B2 |
9592656 | Davies | Mar 2017 | B1 |
9639908 | Reiss | May 2017 | B1 |
9718397 | Kalanick | Aug 2017 | B2 |
9721224 | Waris | Aug 2017 | B2 |
9778057 | O'Mahony | Oct 2017 | B2 |
9792574 | Lord | Oct 2017 | B2 |
9805536 | Lutnick | Oct 2017 | B2 |
9811838 | Daire | Nov 2017 | B1 |
9852551 | Brinig | Dec 2017 | B2 |
9902310 | Fournier | Feb 2018 | B2 |
9904900 | Cao | Feb 2018 | B2 |
9928540 | Gerard | Mar 2018 | B1 |
9934530 | Iacono | Apr 2018 | B1 |
20030040944 | Hileman | Feb 2003 | A1 |
20030046173 | Benjier | Mar 2003 | A1 |
20040023397 | Vig | Feb 2004 | A1 |
20060026030 | Jacobs | Feb 2006 | A1 |
20070071968 | Hermony | Mar 2007 | A1 |
20070107828 | Barker | May 2007 | A1 |
20070192111 | Chasen | Aug 2007 | A1 |
20100082152 | Mishra | Apr 2010 | A1 |
20110059693 | O'Sullivan | Mar 2011 | A1 |
20110150554 | Shpigel | Jun 2011 | A1 |
20120030133 | Rademaker | Feb 2012 | A1 |
20120111472 | Vega | May 2012 | A1 |
20140058902 | Taylor | Feb 2014 | A1 |
20140130650 | Carey | May 2014 | A1 |
20140236856 | Baykhurazov | Aug 2014 | A1 |
20140270467 | Blemel | Sep 2014 | A1 |
20140278634 | Horvitz | Sep 2014 | A1 |
20140278851 | Kopanati | Sep 2014 | A1 |
20140278875 | Ganesh | Sep 2014 | A1 |
20150081581 | Gishen | Mar 2015 | A1 |
20150161563 | Mehrabi | Jun 2015 | A1 |
20150199632 | Chander | Jul 2015 | A1 |
20150206093 | Trew | Jul 2015 | A1 |
20150227890 | Bednarek | Aug 2015 | A1 |
20150242829 | Bhaskaran | Aug 2015 | A1 |
20150264319 | Wood | Sep 2015 | A1 |
20150339625 | Agasti | Nov 2015 | A1 |
20150347961 | Gillen | Dec 2015 | A1 |
20150348173 | Gillen | Dec 2015 | A1 |
20150363843 | Loppatto | Dec 2015 | A1 |
20160019669 | Gopalakrishnan | Jan 2016 | A1 |
20160048804 | Paul | Feb 2016 | A1 |
20160071056 | Ellison | Mar 2016 | A1 |
20160078394 | Fuldner | Mar 2016 | A1 |
20160086128 | Geiger | Mar 2016 | A1 |
20160104112 | Gorlin | Apr 2016 | A1 |
20160104113 | Gorlin | Apr 2016 | A1 |
20160155072 | Prodromidis | Jun 2016 | A1 |
20160189098 | Beaurepaire | Jun 2016 | A1 |
20160195404 | Prasad | Jul 2016 | A1 |
20160225115 | Levy | Aug 2016 | A1 |
20160328678 | Gillen | Nov 2016 | A1 |
20160364678 | Cao | Dec 2016 | A1 |
20160364679 | Cao | Dec 2016 | A1 |
20160364812 | Cao | Dec 2016 | A1 |
20160364823 | Cao | Dec 2016 | A1 |
20160379167 | Raman | Dec 2016 | A1 |
20170032341 | Johnsrud | Feb 2017 | A1 |
20170083862 | Loubriel | Mar 2017 | A1 |
20170089710 | Slusar | Mar 2017 | A1 |
20170091891 | Van Der Berg | Mar 2017 | A1 |
20170124510 | Caterino | May 2017 | A1 |
20170140326 | Rhyu | May 2017 | A1 |
20170310770 | Samaan | Oct 2017 | A1 |
20170351994 | Waris | Dec 2017 | A1 |
20180096414 | Iacono | Apr 2018 | A1 |
Number | Date | Country |
---|---|---|
9300669 | Jan 1993 | WO |
2006046992 | May 2006 | WO |
Entry |
---|
PCT; App. No. PCT/US2018/034137; International Search Report and Written Opinion dated Sep. 12, 2018. |
Number | Date | Country | |
---|---|---|---|
20180346213 A1 | Dec 2018 | US |
Number | Date | Country | |
---|---|---|---|
62514128 | Jun 2017 | US |