Anti-diversion, anti-counterfeiting product packaging

11373193 ยท 2022-06-28

Assignee

Inventors

Cpc classification

International classification

Abstract

In one aspect, the present invention features an identification tag as described herein. In a related aspect, the invention features packaging for a product that includes the identification tag and is useful in discouraging and/or detecting counterfeiting and product diversion.

Claims

1. Packaging for a product, the packaging comprising a closure, wherein the closure is configured to close a product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure.

2. The packaging of claim 1, wherein the closure body includes a first portion and a second portion that are associated to define a chamber and the identification tag resides within the chamber and is optionally attached to either the first portion or the second portion of the closure body.

3. The packaging of claim 1, wherein the identification information is indelibly marked on the identification tag.

4. The packaging of claim 1, wherein the identification information comprises a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code.

5. The packaging of claim 1, further comprising a product container that is detachably or non-detachably attached to the closure, wherein the product container is configured to be closed by the closure.

6. The packaging of claim 5, wherein the product container is marked with a second representation of the unique product identifier.

7. The packaging of claim 6, further comprising an outer container with the product container secured therein, wherein the outer container is marked with a third representation of the unique product identifier.

8. The packaging of claim 7, wherein the second representation and/or the third representation of the unique product identifier includes a machine-readable code and/or a human-readable code.

9. The packaging of claim 7, wherein the second representation and/or the third representation includes a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code.

10. The packaging of claim 8, wherein at least a portion of the human-readable code is randomized and/or comprises a manufacturer identifier.

11. The packaging of claim 1, wherein the unique product identifier is associated with an invoice number or other document associated with the product.

12. A method of determining whether a product has been diverted from its intended supply chain, the method comprising: (a) receiving a packaged product comprising a product within a product container having a closure disposed thereon, wherein the closure comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (i) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (ii) identification information corresponding to the unique product identifier associated with the closure; (b) breaching the closure body; and (c) determining whether the packaged product has been diverted from its intended supply chain based at least in part on assessing the identification information.

13. The method of claim 12, wherein assessing the identification information comprises using the identification information to query a database that associates the identification information with the identity of the last party in the intended supply chain to have received the product.

14. The method of claim 12, further comprising a step of analyzing the product, wherein a difference between the product analyzed and a sample of the product originally packaged indicates that the product has been tampered with.

15. A method of packaging a product in a product container, the method comprising: receiving the product container with the product disposed therein; and closing the product container by affixing a closure to an opening of the product container, wherein the closure is configured to close the product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure.

16. A method of packaging a product in a product container, the method comprising: receiving the product container with the product disposed therein; closing the product container by affixing a closure to an opening of the product container, wherein the closure is configured to close the product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure; and inserting the product container with the closure affixed thereto into an outer container having an opening and/or a wall including a hole therein, and indelibly marking the product container within the outer container with a first representation of a unique identifier and indelibly marking an outer surface of the outer container with a second representation of the unique identifier.

17. The method of claim 16, further comprising securing the product container within the outer container, wherein the product container is secured after indelibly marking the product container through the opening in the outer container.

18. The method of claim 16, further comprising securing the product container within the outer container, wherein the product container is secured before or after indelibly marking the product container by directing the first representation through the hole in the wall of the outer container.

19. The method of claim 16, wherein indelibly marking the product container and the outer surface of the outer container comprises one or more of printing, laser engraving, etching, stamping, embossing, or dyeing the first and second representations of the unique identifier on the product container and on the outer surface of the outer container.

20. The method of claim 16, wherein the first representation and/or the second representation of the unique identifier includes a machine-readable code and/or a human-readable code.

21. The method of claim 20, wherein the machine-readable code includes a two-dimensional code or a three-dimensional code.

22. The method of claim 20, wherein the human-readable code includes an alphanumeric code and/or a symbolic code.

23. The method of claim 20, wherein at least a portion of the human-readable code is randomized.

24. The method of claim 20, wherein a portion of the human-readable code comprises a manufacturer identifier.

25. The method of claim 16, further comprising storing an association of an invoice number or other document associated with the packaged product and one or more of the unique identifiers in a database.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) FIG. 1A is a closure.

(2) FIG. 1B is a cross-sectional view of the closure of FIG. 1A.

(3) FIG. 1C is an exploded view of the closure of FIG. 1A.

(4) FIG. 1D is a partially assembled view of the closure of FIG. 1A.

(5) FIG. 2 is a product distribution channel.

(6) FIG. 3 is a product distribution channel with a product diversion channel.

(7) FIG. 4 is a product before it is inserted into its container.

(8) FIG. 5 is a product inserted into its container.

(9) FIG. 6 is a product inserted into its container with the container closed and sealed.

(10) FIG. 7 shows a first representation of a unique identifier being printed onto a container.

(11) FIG. 8 shows a second representation of a unique identifier being engraved onto a product.

(12) FIG. 9 shows a first representation of a unique identifier being printed onto a product.

(13) FIG. 10 shows a second representation of the unique identifier being printed onto the product of FIG. 9.

(14) FIG. 11 is a product marking apparatus.

(15) FIG. 12 is a product marking apparatus.

DETAILED DESCRIPTION

(16) The Identification Tag

(17) As noted, the present invention features packaging for a product (e.g., the immediate container for the actual product) that includes a closure configured to close a product container. Referring to FIG. 1A, the closure 500 includes a closure body 502 that prevents access to an identification tag 504 embedded therein without irreversibly damaging the closure body 502. The identification tag 504 includes (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, to transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information 506 corresponding to the unique product identifier associated with the closure. In some examples, the identification information 506 is indelibly marked on the identification tag 504 (e.g., by printing) and can include one or more of a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code (e.g., Braille or a raised or otherwise tactile Braille-like code). The closure body 502 includes a first portion 508 and a second portion 510.

(18) Referring to FIG. 1B, the first portion 508 of the closure body 502 and the second portion 510 of the closure body 502 are attached (e.g., by an adhesive or a welding process) to one another such that a chamber 512 is defined between the two portions 508, 510. In some examples, the closure 500 has a height of 28.2 mm and a diameter of 48.5 mm. In some examples, the first portion 508 has a height of 5.5 mm. In some examples, the wall thickness of the first portion 508 is 0.8 mm. In some examples, the chamber 512 has a height of 1 mm.

(19) The identification tag 504 resides within the chamber 512 but does not entirely fill the volume of the chamber, resulting in the existence of an air gap 513 in the chamber 512. In the example shown in FIG. 1B, the identification tag 504 is attached (e.g., by an adhesive disposed on one side of the identification tag 504) to the second portion 510 of the closure body 502. However, in some examples, the identification tag 504 is attached to the first portion 508 of the closure body 502. In yet other examples, the identification tag 504 is not attached to either the first portion 508 or the second portion 510, but is instead simply contained in the chamber 512 without being attached.

(20) The arrangement shown in FIG. 1B permits irreversible removal of some or all of the first portion 508 from the closure body 502 without causing damage to the identification tag 504. For examples, part of the first portion 508 can be removed without damaging the identification tag 504 (due at least in part to the presence of the air gap 513 in the chamber 512. In FIG. 1B, the first portion 508 of the closure body 502 has a convex, domed shape. However, the first portion 580 of the closure body 502 may be formed in a variety of other shapes including, but not limited to flat shapes or concave shapes.

(21) Referring to FIG. 1C, the second portion 510 of the closure body 502 includes a tag receiving portion 514 which is sized and shaped to receive the identification tag 504. In an assembly process for the closure 500, the identification tag 504 is placed into the tag receiving portion 514 such that an adhesive layer (not shown) disposed on an underside 516 of the identification tag 504 makes contact with the second portion 510 of the closure body 502 and the identification information 506 on the top side 518 of the identification tag 504 faces away from the second portion 510 of the closure body 502.

(22) Referring to FIG. 1D, with the identification tag 504 disposed in the tag receiving portion 514, the first portion 508 of the closure body 502 is placed onto and permanently attached to the second portion 510 of the closure body 502 such that the identification tag 504 is contained in the chamber 512. In some examples, an adhesive is applied to one or both of the first portion 508 and the second portion 510 of the closure body 502 prior to placing the first portion 508 onto the second portion 510. In some examples, heat is applied to melt part of one or both of the first portion 508 and the second portion 510 of the closure body 502 prior to placing the first portion 508 onto the second portion 510. After attachment of the first portion 508 and the second portion 510, the melted part of the first portion 508 and/or the second portion 510 is allowed to cool. In some examples, other techniques such as ultrasonic welding or a snap-lock connection are used to permanently attach the first portion 508 and the second portion 510.

(23) In other embodiments, the identification tag can be a film that is applied directly to the closure body 502 without the need for an adhesive. Instead of a direct application, the firm may simply be retained between the first and second portions of the closure body, 508 and 510; the first and second portions, 508 and 510, seal or secure the film in place and may be closely opposed to the film on both sides of the film, thereby greatly reducing or eliminating the air gap 513. In any instance where a film is employed, the film will be indelibly marked with identification information 506 (e.g., by printing) and, as with a disc-shaped tag, can be marked one or more of a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code (e.g., Braille or a raised or otherwise tactile Braille-like code).

(24) The packaging can also include a product container that is detachably or non-detachably attached to the closure and that is configured to be closed by the closure.

(25) The product container (i.e., the outer container) can be marked with a second representation of the unique product identifier. The packaging can further include an outer container with the product container secured therein, and that outer container can be marked with a third representation of the unique product identifier. Any of the representations associated with the product can include a machine-readable code and/or a human-readable code (e.g., a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code). At least a portion of the human-readable code can be randomized and/or can include a manufacturer identifier.

(26) The unique product identifiers that are represented on the product or its packaging can be associated with an invoice number or other document associated with the product.

(27) In another aspect, the invention features methods of determining whether a product has been diverted from its intended supply chain. These methods can be carried out by (a) receiving a packaged product comprising a product within a product container having a closure (e.g., the closure 500 described above) disposed thereon, wherein the closure 500 comprises a closure body 502 that prevents access to an identification tag 504 embedded therein without irreversibly damaging the package. As is described above, the identification tag 504 includes (i) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure 500, and (ii) identification information 506 corresponding to the unique product identifier associated with the closure; (b) breaching the closure body 502; and (c) determining whether the packaged product has been diverted from its intended supply chain based at least in part on assessing the identification information 506. In general, breaching of the closure body 502 cannot be reversed and a breached closure body 502 may provide an indication that the closure 500 has been tampered with.

(28) One can assess the identification information by querying a database that associates the identification information with the identity of the last party in the intended supply chain to have received the product.

(29) Any of the methods can also include a step of analyzing the product, with a difference between the product analyzed and a sample of the product originally packaged indicating that the product has been tampered with.

(30) In another aspect, the invention features methods of packaging a product in a product container, the method comprising: receiving the product container with the product disposed therein; and closing the product container by affixing a closure to an opening of the product container, wherein the closure is configured to close the product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the package, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure. These methods can further include inserting the product container with the closure affixed thereto into an outer container having an opening and/or a wall including a hole therein, and indelibly marking the product container within the outer container with a first representation of a unique identifier and indelibly marking an outer surface of the outer container with a second representation of the unique identifier. Further, one can secure the product container within the outer container (e.g., after indelibly marking the product container through the opening in the outer container).

(31) An Elaboration on Product Diversion Systems in which the Identification Tag can be Employed

(32) FIG. 2 illustrates an example of a product distribution system 100 for a product that includes one or more manufacturers 102, a fulfillment/distribution center 105, a warehouse 104, an authorized retailer 106, and a customer 108. In a scenario where no product diversion occurs, the manufacturer(s) 102 manufacture the product and ship the product to the warehouse 104. The warehouse 104 ships the products to the fulfillment/distribution center 105 and/or the retailer 106.

(33) In the case that the warehouse 104 ships the product to the fulfillment/distribution center 105, the fulfillment/distribution center 102 supplies the product to the customer 108 and/or the retailer 106. In the case that the warehouse 104 ships the product to the retailer 106, the retailer 106 sells the product to the customer 108.

(34) FIG. 3 illustrates one example of a product diversion channel 210. The product diversion channel 210 is established in this example when the warehouse 104 sells the product to a third party seller 212 (e.g., an unauthorized internet retailer such as a web seller or an e-commerce site; the third party seller may also have obtained the product by theft from any point or any point of transfer in the distribution system). The third party seller then sells the product to the customer 108, bypassing the authorized retailer 106 and/or the fulfillment/distribution center 105 in the process. In some instances, a disreputable warehouse may divert the product by selling it directly to customers. In either event, the product is likely to be sold at a lower price than that offered by the authorized retailer 106 or the fulfillment/distribution center 105. As a result, product diversion, as illustrated by the product diversion channel 210, adversely affects the retailer's ability to price and sell the product with the expected profit margin. This can, in turn, harm the warehouse and manufacturer and upstream suppliers. In addition, the reputation of the product can be adversely affected if the third party seller 212 or a disreputable warehouse sells damaged or expired units of the product to customers. In other circumstances, the third party seller or any unauthorized seller can also seek to profit by removing a product from its container and replacing it with a counterfeit version. The original, authentic product could, additionally, be sold separately (i.e., without its original packaging).

(35) In general, product diversion channels are possible at any stage in the product distribution system 100. For example, the retailer 106 may buy an excess of product from the warehouse 104 and sell the excess product to the customer 108 via a third party seller 212 or another alternative channel. Another possible product diversion channel involves an employee at the manufacturer 102, the warehouse 104, or the fulfillment/distribution center 105 stealing product and selling the stolen product to the customer 108 (e.g., by advertising the product on line or on an unauthorized website) or the retailer 106.

(36) Product Diversion Avoidance

(37) In some examples, to detect and mitigate product diversion channels, the invention features specialized product marking schemes that include marking the product and/or a container that holds the product with one or more representations of a unique identifier. When the product is shipped from the manufacturer 102, the unique identifier is associated with an invoice number (e.g., by scanning the representation of the unique identifier with a hand-held scanner) and stored in a database. The marked product is then tracked through the distribution channel. An entity within the channel would record receipt of the product as well as shipment of the product to the next entity in the distribution channel (e.g., by scanning the representation of the unique identifier with a hand-held scanner). For example, each entity could read the unique identifier, as discussed further below. When diversion or counterfeiting is suspected, the product can be examined/scanned again to determine which entity in the distribution chain was the last to receive it.

(38) Through-Container Product Marking

(39) Referring to FIG. 4, an immediate product container 314 and an outer container 316 are shown, with the immediate product container 314 not yet inserted into the outer container 316. The outer container 316 includes a hole 318 in one of its walls. In some embodiments, the hole 318 is die cut in the wall of the outer container 316 prior to the outer container 316 being assembled. Very generally, the through-container product marking scheme involves indelibly marking both an outer surface 315 of the outer container 316 and an outer surface of the immediate product container 314 with a representation of a unique identifier with the immediate product container 314 already inserted into the outer container 316.

(40) The outer surface 315 of the outer container 316 can be marked using conventional indelible marking techniques, with the particular technique being selected in view of the material from which the container is made. In one embodiment, the outer surface of the immediate product container 314 is marked through the wall of the outer container 316 via the hole 318. Referring to FIG. 5, in a first step, the immediate product container 314 is inserted into the outer container 316. Note that in FIG. 5 the product is clearly visible through the wall of the outer container 316 via the opening 318. The exact size, shape, and placement of the hole can vary. Referring to FIG. 6, in a second step, an open end 320 of the outer container 316 is closed, securing the immediate product container 314 in the outer container 316. In some examples, securing the immediate product container 314 in the outer container 316 includes sealing (e.g., fastening a flap over the open end 320 of the outer container 316 using an adhesive or a tab, tuck, or pressure fit).

(41) Referring to FIG. 7, in a third step, the outer surface 315 of the wall is indelibly marked with a first representation 622 of the unique identifier. In the example shown in FIG. 7, the first representation 622 of the unique identifier is a machine-readable two-dimensional (2D) code. In other examples, a first representation 622 of the unique identifier is a three-dimensional (3D) code, a QR code, a bar code, an alphanumeric code, or another marking code as is known in the art. In some examples, the first representation 622 of the unique identifier is printed in indelible ink onto the outer surface of the wall 315 of the outer container 316 using a printer 624 (e.g., an ink jet printer or a laser printer).

(42) Referring to FIG. 8, in a fourth step, the outer surface of the immediate product container 314 is indelibly marked with a second representation 726 of the unique identifier. In FIG. 8, the second representation 726 of the unique identifier is a human-readable code (e.g., an alphanumeric code or a symbolic code). In other examples, a second representation 726 of the unique identifier is a 3D code, a 2D code, a QR code, a bar code, or another marking code as is known in the art. In some examples, the second representation 726 of the unique identifier is indelibly engraved (or etched) onto the outer surface of the immediate product container 314 using a laser engraving device 728. Note that since the immediate product container 314 is already inserted into the outer container 316, a laser beam 730 of the laser engraving device 728 must pass through the opening 318 in the wall of the outer container 316 to mark the immediate product container 314.

(43) The product and the container in which it is placed can be marked simultaneously or sequentially in either order. As described above and illustrated in FIGS. 6 and 7, the container for the product can be marked first (with a first representation of the unique identifier) and the product can be marked subsequently (with a second representation of the unique identifier). This sequence can be reversed, with the product being marked first (with a first representation of the unique identifier) and the product's container being marked subsequently (with a second representation of the unique identifier). Thus, the first representation of the unique identifier and the second representation of the unique identifier can be marked onto the container and product in any order. Alternatively, and as noted, the product and the product's container can be marked at essentially the same time with first and second representations of the unique identifier.

(44) As described above and illustrated in FIG. 8, the product can be marked through the opening in the wall of the container. In an alternative embodiment, the product can be placed in a container that is intact (i.e., that does not include a hole as described above) and then marked through a natural opening that will subsequently be closed (e.g., folded over and secured or closed with an adhesive or folded over and held in place by a tab, tuck, or pressure fit). For example, the product may be marked through the natural opening in the container through which it was placed. Thus, and in general, it is not required that the container be sealed in order to mark either or both of the product and the container.

(45) In some embodiments, the container can be further manipulated by, for example, being enclosed (e.g. in cellophane) or further embellished. In some embodiments, the containers including products can be collected in a shipping container (e.g., a box or crate), and the shipping container can be further marked with a representation of a unique identifier (e.g., a different unique identifier such as a lot number that is associated or linked with all of the unique identifiers of the products and containers collected in the shipping container).

(46) Container-Less Product Marking

(47) Referring to FIGS. 8 and 9, in some examples, the immediate product container 314 is not placed in an additional container and an outer surface 850 of the immediate product container 314 is marked with both a first representation 622 of a unique identifier and a second representation 726 of the unique identifier.

(48) For example, in FIG. 9, in a first step, the outer surface 850 of the immediate product container 314 is indelibly marked with the first representation 622 of the unique identifier. In the example shown in FIG. 9, the first representation 622 of the unique identifier is a machine-readable two-dimensional (2D) code. As was the case above, in other examples, the first representation 622 of the unique identifier is a 3D code, a QR code, a bar code, an alphanumeric code, or another marking code as is known in the art. In some examples, the first representation 622 of the unique identifier is printed in indelible ink onto the outer surface 850 of the immediate product container 314 using a printer 624 (e.g., an ink jet printer or a laser printer).

(49) Referring to FIG. 10, in a second step, the outer surface 850 of the immediate product container 314 is indelibly marked with the second representation 726 of the unique identifier. In FIG. 10, the second representation 726 of the unique identifier is a human-readable code (e.g., an alphanumeric code or a symbolic code as is illustrated by the Chinese language symbols in FIG. 10). As was the case above, in other examples, the second representation 726 of the unique identifier is a 3D code, a 2D code, a QR code, a bar code, or another marking code as is known in the art. In some examples, the second representation 726 of the unique identifier is indelibly engraved (or etched) onto the outer surface 850 of the immediate product container 314 using a laser engraving device 728.

(50) The first and second representations 622, 726 of the unique identifier can be marked simultaneously or sequentially in either order. As described above and illustrated in FIGS. 8 and 9, the immediate product container 314 can be marked first with the first representation 622 of the unique identifier and the immediate product container 314 can be marked subsequently with the second representation 726 of the unique identifier. This sequence can be reversed, with the immediate product container 314 being marked first with the first representation 622 of the unique identifier and the immediate product container 314 container being marked subsequently with the second representation 726 of the unique identifier. Thus, the first representation 622 of the unique identifier and the second representation 726 of the unique identifier can be marked onto the product in any order. Alternatively, and as noted, the product can be marked at essentially the same time with first and second representations 622, 726 of the unique identifier.

(51) In some embodiments, the product can be further manipulated by, for example, being enclosed (e.g. in cellophane) or further embellished. In some embodiments, the marked products can be collected in a shipping container (e.g., a box or crate), and the shipping container can be further marked with a representation of a unique identifier (e.g., a different unique identifier such as a lot number that is associated or linked with all of the unique identifiers of the products collected in the shipping container).

(52) In some embodiments, portions of the immediate product container 314 other than the outer surface 850 are marked with one or both of the first and second representations 622, 726 of the unique identifier. For example, a cap 851 of the immediate product container 314 may be marked with the second representation 726 of the unique identifier.

(53) In some embodiments, the immediate product container 314 is marked with only a single representation of an identifier that is unique to the immediate product container 314.

(54) Product Marking Apparatus

(55) FIG. 11 illustrates one example of a product marking apparatus 800 that includes an assembly line 830 including a conveyor belt 832, a laser engraving device 728, an inkjet printer 624, and one or more alignment bars 834. The laser engraving device 728 and the printer 624 are controlled by a controller 836 that is in communication with (or implemented by) a computer 838 (e.g., a general purpose computing device). The computer 838 is in communication with a database 840 over a network 842 (e.g., a local area internet and/or the internet).

(56) In operation, immediate product containers 314 or outer containers 316 including immediate product containers 314 are placed onto the conveyor belt 832 at a first end 844 of the conveyor belt 832. The conveyor belt 832 moves the containers 316 and/or products 314 in a direction from the first end 844 of the conveyor belt 832 toward a second end 846 of the conveyor belt 832. Before the conveyor belt 832 moves the containers 316 and/or products 314 past the printer 624 and the laser engraving device 728, the alignment bars 834 ensure that the containers 316 and/or products 314 are aligned into a desired position for marking.

(57) As the conveyor belt 832 moves a given outer container 316 and/or immediate product container 314 toward the second end 846 of the conveyor belt 832 the controller 836 monitors a position of the outer container 316 and/or immediate product container 314 (using a sensor, not shown) to determine if the outer container 316 and/or immediate product container 314 is in a first position for printing the first representation 622 of the unique identifier (as provided by the computer 838) onto the outer container 316 and/or immediate product container 314. Once the controller 836 determines that the outer container 316 and/or immediate product container 314 is in the first position, it causes the printer 624 to print the first representation 622 of the unique identifier onto the outer container 316 and/or immediate product container 314.

(58) Similarly, as the conveyor belt 832 moves the given outer container 316 and/or immediate product container 314 toward the second end 846 of the conveyor belt, the controller 836 monitors the position of the outer container 316 and/or immediate product container 314 (using another sensor, not shown) to determine if the outer container 316 and/or immediate product container 314 is in a second position for engraving the second representation 726 of the unique identifier (as provided by the computer 838) onto the product. Once the controller 836 determines that the outer container 316 and/or immediate product container 314 is in the second position, it causes the laser engraving device 729 to engrave the second representation of the unique identifier onto the immediate product container 314. In some embodiments, a sensor within the apparatus can read the leading edge of the box and, given that the speed of the conveyer belt is known, the computer can trigger the marking event when the product is appropriately positioned.

(59) In some examples, the first position and the second position are substantially the same and the first and second representations 622, 726 of the unique identifier are marked at substantially the same time. In other examples, the first position and the second position are separated from one another and the controller 836 coordinates the timing of the marking of the first and second representations 622, 726 of the unique identifier.

(60) At the end of the conveyor belt 832, the marked containers 316 and/or products 314 are packed for delivery at a packing table 845. In some examples, upon being packed, the containers 316 and/or products 314 are associated with an invoice number (e.g., by scanning the containers and/or products with a hand-held scanner), which is provided to the computer 838 where it is associated with the unique identifier(s) printed on the containers 316 and/or products 314. The computer 838 stores this association of an invoice number with one or more unique identifiers in the database 840 via the network 842. The associations can be made with the aid of a hand-held scanner.

(61) FIG. 12 illustrates another example of a product marking apparatus 800 that includes an RFID integration device 847.

(62) Unique Identifier

(63) In some examples, the native form of the unique identifiers is an alphanumeric string (i.e., the string that is engraved onto the product 316). The alphanumeric string can be transformed into an alternative (e.g., 2D code) representation.

(64) In some embodiments, the unique identifiers are not serial in nature but are instead randomly generated. In some examples, the unique identifiers include a randomized portion and a non-randomized portion. For example, a unique identifier may include a randomly generated portion and non-randomized portion that includes a manufacturer identifier. In some embodiments, a position of the non-randomized portion in the unique identifier is randomized. In some examples, a human-readable representation of the unique identifier includes a string of one or more symbolic characters (e.g., letters from the Chinese alphabet or geometric shapes).

(65) Diversion and Counterfeiting Control

(66) When a customer or a quality/diversion control agent suspects that a product (e.g., a product found at an esthetician's office or on an internet retailer's website) may have been diverted or is a counterfeit product, they can read the unique identifier from the product and use it to query the database. In some examples, the agent enters (e.g., manually or by an automated scanning process) the human-readable unique identifier into a computer application (e.g., a mobile application, a web application, or a stand-alone personal computer application) which is configured to query the database to determine whether the unique identifier is associated with an authentic but diverted or counterfeited product. In the case of a diverted product, since the database includes an association of the unique identifiers with invoice numbers, the invoice number associated with the unique identifier can be used to trace the product to the last entity in the supply chain to register the product's invoice number. Further investigation can then be performed to determine whether that entity did, in fact, divert the product. If so, the entity can be removed from the distribution channel.

(67) In the embodiments described above, indelible marking is performed using printers and laser engravers. However, any suitable indelible marking technology can be used to indelibly mark products and containers, including but not limited to stamping, embossing, dyeing, and etching.

(68) In any of the embodiments described herein, the product can be a cosmetic product formulated, for example, to cleanse, protect or improve the appearance of the skin, hair, or nails.

(69) Systems that implement the techniques described above can be implemented in software, in firmware, in digital electronic circuitry, or in computer hardware, or in combinations of them. The system can include a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor, and method steps can be performed by a programmable processor executing a program of instructions to perform functions by operating on input data and generating output. The system can be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Each computer program can be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language can be a compiled or interpreted language. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory. Generally, a computer will include one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM disks. Any of the foregoing can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits). In general, software features of the above-described embodiments include instructions embodied on non-transitory, computer-readable media (i.e., computer-readable media which does not encompass transitory forms of signal transmission, such as a propagating electrical or electromagnetic signal).

(70) While the embodiments described herein include a closure with an RFID tag embedded therein, it should be noted that other types of non-RFID based identification devices may be embedded in the closure. For example, a near-field communication (NFC) identification device or an ultra-high frequency (UHF) identification device may be embedded in the closure. More generally, any device that is small enough to be embedded in the closure, is able to transmit a unique identifier (in some cases in response to a query), and is queryable from its embedded position in the closure can be used.

(71) Further details relating to product diversion control systems and methods in which the anti-diversion, anti-counterfeiting product packaging can be used are described in Ser. No. 62/132,444, entitled, Product Diversion Management, filed on Mar. 12, 2015, the contents of which are incorporated herein by reference.