Patent classifications
G09F3/0292
RFID SECURITY TAPE
An RFID security tape comprising: a layer of tamper-evident tape; a layer of an RFID inlay; a blocking layer; a layer of metal foil having an adhesive bottom surface; and a layer of a release liner, wherein all layers of the RFID security tape are in adhesive connection with each other and wherein the layer of the RFID inlay is configured to be damaged when the RFID security tape has been applied to an asset and the layer of tamper-evident tape is subsequently removed from the asset.
Tamper-evident verification of an article of manufacture
An instance of a physical product includes a verification code and a unique identifier disposed thereupon by which authenticity or condition of the instance may be determined. The combination may be uniquely associated with the instance and stored, by the issuer or manufacturer for each authentic instance, locally or within a decentralized computing system having an immutable data store. The verification code may be concealed by a tamper-evident component such that access of the verification code is evident upon visual inspection. Verification may require revealing of the verification code with tamper-evidence and submission of a request including the verification code and the unique identifier (or representation thereof) to receive a verification result. Each request to verify an instance may be recorded and returned with a next request for verification of the same instance of the product to indicate whether another entity has already performed a verification.
OPTICAL ANTI-COUNTERFEITING ELEMENT AND MANUFACTURING METHOD THEREFOR, AND OPTICAL ANTI-COUNTERFEITING PRODUCT
Embodiments of the present invention provide an optical anti-counterfeiting element and a preparation method thereof, and an optical anti-counterfeiting product, and belong to the field of optical anti-counterfeiting. The optical anti-counterfeiting element comprises: a transparent undulating structure layer, comprising a first undulating structure and a second undulating structure, wherein the first undulating structure and the second undulating structure meet the following conditions: the depth-to-width ratio of the first undulating structure is less than that of the second undulating structure, and/or the specific volume of the first undulating structure is less than that of the second undulating structure; and an interference optically variable coating, formed on the first undulating structure, wherein when the interference optically variable coating is observed from two sides, optically variable effects are presented at the two sides, and when the optical anti-counterfeiting element is observed through transmission, an image defined by the boundary of the second undulating structure is presented. Therefore, the optical anti-counterfeiting element can simultaneously present image effects and optically variable effects when being observed from two sides and has a hollowed-out effect when being observed through transmission.
PEEL-ABLE, TAMPER-EVIDENT SECURITY LABEL FOR CONCEALING INFORMATION
A visual-information security system that includes an information security label positioned to conceal visual information on a substrate. The information security label may include a spiral-shaped cut (or other complex shape) within the body of the label and a pull-tab, such that when a user pulls on the tab, the label peels off of the substrate in a spiral pattern, revealing the information concealed beneath the label. The complex-shaped cut makes reapplication of the label difficult and evident, thus providing security to consumers. The label may include multiple layers of material, for example, a peel-off layer and an adhesive layer.
Tamper Evident Identification Tag and Method
A tamper evident identification tag and a method are provided. The tag includes inner and outer layers. A tab is integral with and extends from at least one of the inner layer and the outer layer and though an article. A unique code associated with an article is printed on a first portion of the inner layer. The outer layer is configured to be foldable such that with a second portion of the inner layer removed from a second portion of the outer layer, the inner surface of the second portion of the outer layer is configured to be bound to the outer surface of the first portion of the inner layer so as to capture the first portion of the inner layer and a portion of the tab with the terminal end extending through an aperture between the first and second portions of the outer layer.
Tamper evident security labels
Labels and multilayer adhesive assemblies and laminates are described that contain one or more tamper indicating layers. After adhering to a surface of interest, upon attempted removal of the label from the surface or other manipulation of the label, the label separates along the tamper indicating layer. One or both exposed faces of the separated tamper indicating layer may include tamper indicating and or authenticity indicating provisions such as indicia to further provide evidence of attempted tampering.
Method of making a container having a tamper evident feature
A method of making a container having a tamper evident feature. The method comprises affixing a tamper evident tag to a bottom end so that the tag covers perforations in the bottom end. The tag may be a film-based tag incorporating a color shifting ink layer. When the container is opened, air enters the interior of the container, passes through the perforations and activates the color shifting ink layer.
Physical, tamper-evident cryptocurrency card
A physical currency card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. Public access information, like a cryptographic hash address operable to receive digital bearer assets or a public key operable to derive a cryptographic hash address operable to receive digital bearer access, may be visible upon inspection of the card such digital bearer assets may be transferred to the card in one or more transactions on a decentralized computing platform, like a blockchain-based decentralized computing platform. Private access information, like a secret, private key that corresponds to the public key (e.g., a public-private key-pair) or a representation of the private key (like a ciphertext thereof) and corresponding encryption key, is physically concealed with tamper-evident components such that a user can readily determine whether the private access information was divulged.
Method of utilizing a tamper evident tag
A method of associating a tamper evident tag with an article is provided. The method includes the steps of providing the tamper evident tag with first and second layers laminated to each other and inserting a fastener through the article at a user selected location thereof. A terminal end of the fastener is positioned on a second layer of the tamper evident tag and a first portion of the second layer is removed to expose an adhesive on a first portion of the first layer. The first portion of the first layer of the tamper evident tag is folded over a second portion of the first layer so as to capture a second portion of the inner layer between the first and second portions of the first layer and to capture the terminal end of the fastener between the first portion of the first layer and the second portion of the second layer of the tamper evident tag thereby retaining the article on the fastener.
Tamper evident locking device
A locking device includes a lock body, a hasp and a seal. The lock body includes a hasp locking latch pivotally disposed therein and a seal locking latch pivotally disposed therein. The hasp is disposed at the lock body and movable between an open state, where a free end of the hasp is external the lock body, and a closed state, where the free end of the hasp is within the lock body. The seal, when inserted into the lock body when the hasp is in its closed state, engages the hasp locking latch to pivot the hasp locking latch to engage and lock the hasp in its closed state, and the seal, when inserted into the lock body, engages the seal locking latch to lock the seal within the lock body. The seal includes a frangible portion that is configured to break the seal into first and second portions.