An embodiment of the invention relates generally to search tamper proof tags and, more specifically, to tamper proof tags for watches.
The Internet provides a platform for users to easily sell and purchase items. Luxury watches are one product that is commonly sold on the Internet. This includes new luxury watches, as well as vintage luxury watches. One concern with buying and selling luxury watches online is fraud. Due to the high prices associated with luxury watches, some fraudsters will post pictures of an authentic watch and then ship a replica to a purchasing user. As another example, a fraudster may tamper with an authentic watch and replace the high end internal components with cheaper components. In either case, the buyer isn't getting what they bargained for. To guard against this type of tampering and fraud, a watch can be enclosed in a protective casing or packaging, however these types of security measures limit the potential buyer from trying on the watch properly. Accordingly, improvements are needed.
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. Some embodiments are illustrated by way of example, and not limitation, in the figures of the accompanying drawings in which:
In the following description, for purposes of explanation, various details are set forth in order to provide a thorough understanding of various embodiments of the invention. It will be apparent, however, to one skilled in the art, that the present subject matter may be practiced without these specific details, or with slight alterations.
Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present subject matter. Thus, the appearances of the phrase “in one embodiment” or “in an embodiment” appearing in various places throughout the specification are not necessarily all referring to the same embodiment.
For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the present subject matter. However, it will be apparent to one of ordinary skill in the art that embodiments of the subject matter described may be practiced without the specific details presented herein, or in various combinations, as described herein. Furthermore, well-known features may be omitted or simplified in order not to obscure the described embodiments. Various examples may be given throughout this description. These are merely descriptions of specific embodiments. The scope or meaning of the claims is not limited to the examples given.
Disclosed is a tamper proof tag and accompanying method for verifying that a watch is authentic and has not been tampered with. Certain luxury watches can cost hundreds of thousands to over a million dollars. While these are extreme examples, many luxury watches cost thousands or tens of thousands of dollars. When dealing with such high value items, authenticating that the item is authentic and untampered with is of extreme importance. As explained earlier, fraudsters may attempt to send a fake watch to a buyer, or tamper with the watch by removing the high end internal components with cheaper components. While secure packaging can be used to deter this type of activity, it also limits the purchasing user from trying on the watch without removing the packaging.
To alleviate these issues, a tamper proof tag is affixed to the watch. The tamper proof tag ensures that the watch is authentic and prevents a user from tampering with the watch. The tamper proof tag allows the watch to be worn while the tamper proof tag is affixed to watch and is also minimally obstructive to the aesthetics of the watch. This provides a purchasing user with confidence that the watch is authentic, while also allowing the user to try on the watch without having to remove the tamper proof tag. This may allow the user to return the watch if so desired, for example, if the user did not like how the watch looked when it was worn. The tamper proof tag also protects the seller from a user that may attempt to tamper with the watch after purchase. For example, the seller may condition returns for a sold watch on the tamper proof tag remaining affixed to the watch.
The tamper proof tag includes a cover component and two fastening arms coupled to opposite sides of a cover component. The fastening arms are used to fasten the tamper proof tag to the strap of a watch. For example, the fastening arms are fastened to the strap of the watch on both sides of the face of the watch. Fastening the fastening arms to the watch causes the cover component of the tamper proof tag to cover the back of the face of the watch. The tamper proof tag restricts access to the back of the face of the watch, thereby limiting a user's ability to open the back of the watch and tamper with the internal components of the watch. The tamper proof tag does not cover the face of the watch, thereby allowing a purchasing user to wear the watch without having to remove the tamper proof tag.
Each of the fastening arms of the tamper proof tag include a tamper proof component that enables the fastening arm to be fastened to the strap of the watch and indicates whether the tamper proof tag has been removed or tampered with after being fastened to the watch. For example, the tamper proof component may be a tamper evident security tape that visually indicates whether any portion of the tamper proof tag has been unfastened after being fastened to the watch. The tamper proof component restricts a user's ability to remove the tamper proof tag after it has been affixed to the watch, thereby reducing the likelihood that a user will tamper with the watch.
The tamper proof tag may be affixed to a watch by a trusted entity that authenticates that the watch is authentic and has not been tampered with. For example, a watch may be initially processed by the trusted entity prior to being provided to a retailer/seller that lists the watch for sale online. As another example, a watch that is in the possession of a retailer/seller may be provided to the trusted entity for authenticated prior to being listed for sale by the retailer/seller.
In addition to enabling the first and second fastening arms 104106 to be fastened to the watch. the first tamper proof affixing component 110 and the second tamper proof affixing component 112 also indicate whether they have been unfastened after being fastened to the watch. That is, the first tamper proof affixing component 110 and the second tamper proof affixing component 112 are designed to visually indicate whether a user has attempted to unfasten either the first tamper proof affixing component 110 and/or the second tamper proof affixing component 112. For example, the first tamper proof affixing component 110 and the second tamper proof affixing component 112 may be a tamper evident security tape that includes an adhesive that can be used to affix ends of the first fastening arm 106 and the second fastening arm 108, but when unfastened breaks apart to leave a visual mark that the tamper evident security tape has been unfasted. The tamper evident security tape may leave at least a portion of the tamper security tape on the opposite end of the first fastening arm 106 or the second fastening arm 108, indicating that the first fastening arm 106 and the second fastening arm 108 has been unfastened after being fasted to the watch.
As another example, the first tamper proof affixing component 110 and the second tamper proof affixing component 112 may be a fastener that allows a user to affix the ends of the first fastening arm 106 and the second fastening arm 108, however does not allow the user to unfasten tamper proof tag 100 from the watch without physically destroying the tamper proof tag 100 in some way, such as by cutting or tearing a portion of the tamper proof tag 100. For example, the fastener may be a pull tight seal or plastic lock seal that do are not designed to be unfastened once properly fastened. Accordingly, a user can visually determine whether the tamper proof tag has been unfastened from the watch, indicating that the watch was potentially tampered with.
Properly fastening the tamper proof tag 100 to the watch causes the cover component 104 of the tamper proof tag 100 to cover the back of the face of the watch. That is, the cover component 104 becomes positioned over the back of the face of the watch when the first fastening arm 106 and the second fastening arm are both properly fastened to the strap of the watch on either side of the face of the watch. The cover component 104 prevents access to the back of the face of the watch, which is a common access point to the internal components of a watch. The cover component prevents access to the back of the watch, thereby preventing a user from accessing the internal components of the watch through the back of the face of the watch.
In some embodiments, the cover component 104 includes an adhesive material that allows the cover component to be affixed to the back of the watch. The adhesive material may be any type of glue, tape, etc. Further, the adhesive material may be a tamper proof material, such as a tamper proof security tape.
Although
As shown in
The attachment pieces 404, 406, 408, 410 are designed to affix fastening arms to the tamper proof tag 400. A user may select which attachment pieces 404, 406, 408, 410 to use to affix the fastening arms to adjust the length of the tamper proof tag 400. That is, the user may select which attachment pieces 404, 406, 408, 410 to use to affix the fastening arms to adjust the length measured between the fastening arms after they have been affixed to the tamper proof tag 400. This allows a user to adjust the length based on the length of a watch to which the tamper proof tag will be affixed. For example, the user may affix the fastening arms to the outermost attachment pieces 404, 410 to create more length between the fastening arms to fit a watch with a larger face. Alternatively, the user may affix the fastening arms to the innermost attachment pieces 406, 408 to shorten more length between the fastening arms to fit a watch with a smaller face. Although only four attachment pieces 404, 406, 408, 410 are shown, this is just one example and is not meant to be limiting. the tamper proof tag may include any number of attachment pieces 404, 406, 408, 410.
Each attachment piece 404, 406, 408, 410 enables a fastening arm to be affixed to the tamper proof tag 400. The attachment pieces 404, 406, 408, 410 are preferable tamper proof to ensure that a user is not able to remove the tamper proof tag 400 after it has been fastened to a watch. For example, the attachment pieces 404, 406, 408, 410 may be a tamper proof adhesive material, plastic lock seal, pull tight seal, etc. The attachment pieces 404, 406, 408, 410 may also be loops that a fastening arm may be placed through.
At operation 502, a trusted entity authenticates that a watch 200 is authentic and that the watch 200 has not been tampered with. The trusted entity may be any entity (e.g., company, person, official, etc.) that is trusted to authenticate watches. For example, the trusted entity may be an online marketplace on which the watch 200 will be made available for purchase. For example, the online marketplace may require watches 200 priced over a threshold amount to be provided to employees/agents of the online marketplace to be authenticated prior to being offered for sale on the online marketplace.
In some embodiments, the trusted entity may be a machine that automates the authentication process. For example, a machine or combination of machines may include sensors that gather sensor data that may be used to authenticate the watch 200. For example, the sensor data may include images, weights, dimensions, etc., of the watch 200. The machine compares the gathered sensor data to known data about the watch 200 to determine whether the watch 200 is authentic and has not been tampered with. For example, if the gathered sensor data (e.g., weight, dimensions, images, etc.) match the known data or are within an allowable variance of the known data, the machine determines that the watch 200 is authentic and has not been tampered with. Alternatively, if the gathered sensor data does not match or is outside of the allowable variance of the know data, the machine determines that the watch 200 is not authentic or has been tampered.
In some embodiments, the machine may generate the tamper proof tag 100 for the authenticated watch 200 or other item. For example, the machine may print the tamper proof tag 100 or cause the tamper proof tag 100 to be printed. Further, the machine may use the sensor data to generate a tamper proof tag 100 that is a proper length, size, etc., for the authenticated watch 200. For example, the tamper proof tag 100 may be generated so that the length of the tamper proof tag 100 and shape of the cover component 104 are suited for the shape and the size of the watch 200. As another example, the machine may generate the length of the fastening arms 104, 106 based on the size of the straps 204, 206 of the authenticated watch 100 so that the fastening arms 104, 106 are long enough to be wrapped around the straps 204, 206 and secure the tamper proof tag 100 to the watch 200.
At operation 504, the trusted entity fastens a first fastening arm 106 of the tamper proof tag 100 to a first strap 204 of the watch 200. The first fastening arm 106 of the tamper proof tag 100 is fastened to the first strap 204 by wrapping the first fastening arm 106 around the first strap 204, and then using a first tamper proof affixing component 110 of the first fastening arm 106 to affix the ends of first fastening arm 106 together.
At operation 506, the trusted entity fastens a second fastening arm 108 of the tamper proof tag 100 to a second strap 206 of the watch 200. The second fastening arm 108 of the tamper proof tag 100 is fastened to the second strap 206 by wrapping the second fastening arm 108 around the second strap 206, and then using a second tamper proof affixing component 112 of the second fastening arm 108 to affix the ends of second fastening arm 108 together. Fastening the first fastening arm 106 and the second fastening arm 108 of the tamper proof tag 100 to the first and second strap 204206 of the watch 200 cause a cover component 104 of the tamper proof tag 100 to cover a back of the face 202 of the watch. This prevents a user from being able to access the back of the face 202 of the watch 200 to access the internal components and/or otherwise tamper with the watch 200.
As explained above, in some embodiments the trusted entity may be a machine. Accordingly, the machine may be designed to fasten the first fastening arm 106 and the second fastening arm 108 to the first strap 204 and second strap 206 of the watch 200.
Number | Name | Date | Kind |
---|---|---|---|
3455043 | Augustine | Jul 1969 | A |
3712049 | Luxembourg | Jan 1973 | A |
3755940 | Anderson | Sep 1973 | A |
6276725 | Laurash | Aug 2001 | B1 |
20040021312 | Dietz | Feb 2004 | A1 |
20070130811 | Shevelev | Jun 2007 | A1 |
20080295378 | Streisfeld | Dec 2008 | A1 |
20090010110 | Chariton | Jan 2009 | A1 |
20110086194 | Williams | Apr 2011 | A1 |