G09F3/0376

WIRELESS TAMPER-EVIDENT LABEL FOR A TUBE OR CONTAINER

A label for matrix tube may have a facestock optionally configured to have data on a first surface thereof. An adhesive layer may be on a second surface of the facestock. The facestock may define an end label portion, an end label portion and a neck portion between the end label portion and the end label portion, the neck portion being narrower than the end label portion and the end label portion. A method for applying a label onto a matrix tube may also be provided.

Tamper-evident device with optically transparent layer and related method
12456394 · 2025-10-28 · ·

A tamper-evident security device including a first part comprising an optically transparent layer including an array of separate optical focusing elements. A second part comprises an array of separate image elements collectively defining an image viewable through the first part. Each of the optical focusing elements is positioned to reveal therethrough a view of one or more of said image element(s). An optically transparent adhesive layer between the first part and the second part which retains the optical focusing elements so positioned with respect to the image elements thereby in cooperation to reveal the image. The first part is mechanically separable from the second part by release of the adhesive layer to cease the cooperation.

Variable pattern shield protection system for a tamper-evident container

The disclosed embodiments provide a method for tamper-evident shipment or storage of goods. An Electrical Shield pattern is embedded in or printed on a substrate with other electrical, optical, and electronic components, communication components, semiconductors, which are attached or printed on a substrate to form a shipment bag used as a shipping container. The shield pattern can be made variable between different bags by using algorithms entered into a printer control system. The shipment bag with its components can then be assigned a unique signature which differentiates each bag. Application of encryption methods serves to guarantee the shipped goods are authentic and that were not tampered with during shipment. Digital signal processing is used to generate pedigree information, which may include items such as shipping location, serial numbers, sensor information, and lot numbers for the goods. The information related to the history of tampering attempts and other sensor status can be placed in encrypted form in an RFID tags or control or monitoring electronics which can be read by a mobile phone application or sent to a remote cloud-based server.