Anti-diversion, anti-counterfeiting product packaging
11373193 ยท 2022-06-28
Assignee
Inventors
Cpc classification
G06K19/07758
PHYSICS
B65D77/044
PERFORMING OPERATIONS; TRANSPORTING
G06K19/0723
PHYSICS
B65D2203/12
PERFORMING OPERATIONS; TRANSPORTING
G06K19/07798
PHYSICS
G06K19/10
PHYSICS
International classification
B65D77/04
PERFORMING OPERATIONS; TRANSPORTING
G06K19/10
PHYSICS
G06K19/077
PHYSICS
G06F16/955
PHYSICS
B65D25/54
PERFORMING OPERATIONS; TRANSPORTING
G06K19/06
PHYSICS
Abstract
In one aspect, the present invention features an identification tag as described herein. In a related aspect, the invention features packaging for a product that includes the identification tag and is useful in discouraging and/or detecting counterfeiting and product diversion.
Claims
1. Packaging for a product, the packaging comprising a closure, wherein the closure is configured to close a product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure.
2. The packaging of claim 1, wherein the closure body includes a first portion and a second portion that are associated to define a chamber and the identification tag resides within the chamber and is optionally attached to either the first portion or the second portion of the closure body.
3. The packaging of claim 1, wherein the identification information is indelibly marked on the identification tag.
4. The packaging of claim 1, wherein the identification information comprises a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code.
5. The packaging of claim 1, further comprising a product container that is detachably or non-detachably attached to the closure, wherein the product container is configured to be closed by the closure.
6. The packaging of claim 5, wherein the product container is marked with a second representation of the unique product identifier.
7. The packaging of claim 6, further comprising an outer container with the product container secured therein, wherein the outer container is marked with a third representation of the unique product identifier.
8. The packaging of claim 7, wherein the second representation and/or the third representation of the unique product identifier includes a machine-readable code and/or a human-readable code.
9. The packaging of claim 7, wherein the second representation and/or the third representation includes a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code.
10. The packaging of claim 8, wherein at least a portion of the human-readable code is randomized and/or comprises a manufacturer identifier.
11. The packaging of claim 1, wherein the unique product identifier is associated with an invoice number or other document associated with the product.
12. A method of determining whether a product has been diverted from its intended supply chain, the method comprising: (a) receiving a packaged product comprising a product within a product container having a closure disposed thereon, wherein the closure comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (i) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (ii) identification information corresponding to the unique product identifier associated with the closure; (b) breaching the closure body; and (c) determining whether the packaged product has been diverted from its intended supply chain based at least in part on assessing the identification information.
13. The method of claim 12, wherein assessing the identification information comprises using the identification information to query a database that associates the identification information with the identity of the last party in the intended supply chain to have received the product.
14. The method of claim 12, further comprising a step of analyzing the product, wherein a difference between the product analyzed and a sample of the product originally packaged indicates that the product has been tampered with.
15. A method of packaging a product in a product container, the method comprising: receiving the product container with the product disposed therein; and closing the product container by affixing a closure to an opening of the product container, wherein the closure is configured to close the product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure.
16. A method of packaging a product in a product container, the method comprising: receiving the product container with the product disposed therein; closing the product container by affixing a closure to an opening of the product container, wherein the closure is configured to close the product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the closure body, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure; and inserting the product container with the closure affixed thereto into an outer container having an opening and/or a wall including a hole therein, and indelibly marking the product container within the outer container with a first representation of a unique identifier and indelibly marking an outer surface of the outer container with a second representation of the unique identifier.
17. The method of claim 16, further comprising securing the product container within the outer container, wherein the product container is secured after indelibly marking the product container through the opening in the outer container.
18. The method of claim 16, further comprising securing the product container within the outer container, wherein the product container is secured before or after indelibly marking the product container by directing the first representation through the hole in the wall of the outer container.
19. The method of claim 16, wherein indelibly marking the product container and the outer surface of the outer container comprises one or more of printing, laser engraving, etching, stamping, embossing, or dyeing the first and second representations of the unique identifier on the product container and on the outer surface of the outer container.
20. The method of claim 16, wherein the first representation and/or the second representation of the unique identifier includes a machine-readable code and/or a human-readable code.
21. The method of claim 20, wherein the machine-readable code includes a two-dimensional code or a three-dimensional code.
22. The method of claim 20, wherein the human-readable code includes an alphanumeric code and/or a symbolic code.
23. The method of claim 20, wherein at least a portion of the human-readable code is randomized.
24. The method of claim 20, wherein a portion of the human-readable code comprises a manufacturer identifier.
25. The method of claim 16, further comprising storing an association of an invoice number or other document associated with the packaged product and one or more of the unique identifiers in a database.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
DETAILED DESCRIPTION
(16) The Identification Tag
(17) As noted, the present invention features packaging for a product (e.g., the immediate container for the actual product) that includes a closure configured to close a product container. Referring to
(18) Referring to
(19) The identification tag 504 resides within the chamber 512 but does not entirely fill the volume of the chamber, resulting in the existence of an air gap 513 in the chamber 512. In the example shown in
(20) The arrangement shown in
(21) Referring to
(22) Referring to
(23) In other embodiments, the identification tag can be a film that is applied directly to the closure body 502 without the need for an adhesive. Instead of a direct application, the firm may simply be retained between the first and second portions of the closure body, 508 and 510; the first and second portions, 508 and 510, seal or secure the film in place and may be closely opposed to the film on both sides of the film, thereby greatly reducing or eliminating the air gap 513. In any instance where a film is employed, the film will be indelibly marked with identification information 506 (e.g., by printing) and, as with a disc-shaped tag, can be marked one or more of a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code (e.g., Braille or a raised or otherwise tactile Braille-like code).
(24) The packaging can also include a product container that is detachably or non-detachably attached to the closure and that is configured to be closed by the closure.
(25) The product container (i.e., the outer container) can be marked with a second representation of the unique product identifier. The packaging can further include an outer container with the product container secured therein, and that outer container can be marked with a third representation of the unique product identifier. Any of the representations associated with the product can include a machine-readable code and/or a human-readable code (e.g., a letter code, a number code, an alphanumeric code, a bar code, a symbol code, a two-dimensional code, or a three-dimensional code). At least a portion of the human-readable code can be randomized and/or can include a manufacturer identifier.
(26) The unique product identifiers that are represented on the product or its packaging can be associated with an invoice number or other document associated with the product.
(27) In another aspect, the invention features methods of determining whether a product has been diverted from its intended supply chain. These methods can be carried out by (a) receiving a packaged product comprising a product within a product container having a closure (e.g., the closure 500 described above) disposed thereon, wherein the closure 500 comprises a closure body 502 that prevents access to an identification tag 504 embedded therein without irreversibly damaging the package. As is described above, the identification tag 504 includes (i) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure 500, and (ii) identification information 506 corresponding to the unique product identifier associated with the closure; (b) breaching the closure body 502; and (c) determining whether the packaged product has been diverted from its intended supply chain based at least in part on assessing the identification information 506. In general, breaching of the closure body 502 cannot be reversed and a breached closure body 502 may provide an indication that the closure 500 has been tampered with.
(28) One can assess the identification information by querying a database that associates the identification information with the identity of the last party in the intended supply chain to have received the product.
(29) Any of the methods can also include a step of analyzing the product, with a difference between the product analyzed and a sample of the product originally packaged indicating that the product has been tampered with.
(30) In another aspect, the invention features methods of packaging a product in a product container, the method comprising: receiving the product container with the product disposed therein; and closing the product container by affixing a closure to an opening of the product container, wherein the closure is configured to close the product container and comprises a closure body that prevents access to an identification tag embedded therein without irreversibly damaging the package, the identification tag comprising (a) a radio frequency identification device (RFID) configured to receive a query signal from an RFID reader and, in response to receiving the query signal, transmit a response signal representing a first unique product identifier associated with the closure, and (b) identification information corresponding to the unique product identifier associated with the closure. These methods can further include inserting the product container with the closure affixed thereto into an outer container having an opening and/or a wall including a hole therein, and indelibly marking the product container within the outer container with a first representation of a unique identifier and indelibly marking an outer surface of the outer container with a second representation of the unique identifier. Further, one can secure the product container within the outer container (e.g., after indelibly marking the product container through the opening in the outer container).
(31) An Elaboration on Product Diversion Systems in which the Identification Tag can be Employed
(32)
(33) In the case that the warehouse 104 ships the product to the fulfillment/distribution center 105, the fulfillment/distribution center 102 supplies the product to the customer 108 and/or the retailer 106. In the case that the warehouse 104 ships the product to the retailer 106, the retailer 106 sells the product to the customer 108.
(34)
(35) In general, product diversion channels are possible at any stage in the product distribution system 100. For example, the retailer 106 may buy an excess of product from the warehouse 104 and sell the excess product to the customer 108 via a third party seller 212 or another alternative channel. Another possible product diversion channel involves an employee at the manufacturer 102, the warehouse 104, or the fulfillment/distribution center 105 stealing product and selling the stolen product to the customer 108 (e.g., by advertising the product on line or on an unauthorized website) or the retailer 106.
(36) Product Diversion Avoidance
(37) In some examples, to detect and mitigate product diversion channels, the invention features specialized product marking schemes that include marking the product and/or a container that holds the product with one or more representations of a unique identifier. When the product is shipped from the manufacturer 102, the unique identifier is associated with an invoice number (e.g., by scanning the representation of the unique identifier with a hand-held scanner) and stored in a database. The marked product is then tracked through the distribution channel. An entity within the channel would record receipt of the product as well as shipment of the product to the next entity in the distribution channel (e.g., by scanning the representation of the unique identifier with a hand-held scanner). For example, each entity could read the unique identifier, as discussed further below. When diversion or counterfeiting is suspected, the product can be examined/scanned again to determine which entity in the distribution chain was the last to receive it.
(38) Through-Container Product Marking
(39) Referring to
(40) The outer surface 315 of the outer container 316 can be marked using conventional indelible marking techniques, with the particular technique being selected in view of the material from which the container is made. In one embodiment, the outer surface of the immediate product container 314 is marked through the wall of the outer container 316 via the hole 318. Referring to
(41) Referring to
(42) Referring to
(43) The product and the container in which it is placed can be marked simultaneously or sequentially in either order. As described above and illustrated in
(44) As described above and illustrated in
(45) In some embodiments, the container can be further manipulated by, for example, being enclosed (e.g. in cellophane) or further embellished. In some embodiments, the containers including products can be collected in a shipping container (e.g., a box or crate), and the shipping container can be further marked with a representation of a unique identifier (e.g., a different unique identifier such as a lot number that is associated or linked with all of the unique identifiers of the products and containers collected in the shipping container).
(46) Container-Less Product Marking
(47) Referring to
(48) For example, in
(49) Referring to
(50) The first and second representations 622, 726 of the unique identifier can be marked simultaneously or sequentially in either order. As described above and illustrated in
(51) In some embodiments, the product can be further manipulated by, for example, being enclosed (e.g. in cellophane) or further embellished. In some embodiments, the marked products can be collected in a shipping container (e.g., a box or crate), and the shipping container can be further marked with a representation of a unique identifier (e.g., a different unique identifier such as a lot number that is associated or linked with all of the unique identifiers of the products collected in the shipping container).
(52) In some embodiments, portions of the immediate product container 314 other than the outer surface 850 are marked with one or both of the first and second representations 622, 726 of the unique identifier. For example, a cap 851 of the immediate product container 314 may be marked with the second representation 726 of the unique identifier.
(53) In some embodiments, the immediate product container 314 is marked with only a single representation of an identifier that is unique to the immediate product container 314.
(54) Product Marking Apparatus
(55)
(56) In operation, immediate product containers 314 or outer containers 316 including immediate product containers 314 are placed onto the conveyor belt 832 at a first end 844 of the conveyor belt 832. The conveyor belt 832 moves the containers 316 and/or products 314 in a direction from the first end 844 of the conveyor belt 832 toward a second end 846 of the conveyor belt 832. Before the conveyor belt 832 moves the containers 316 and/or products 314 past the printer 624 and the laser engraving device 728, the alignment bars 834 ensure that the containers 316 and/or products 314 are aligned into a desired position for marking.
(57) As the conveyor belt 832 moves a given outer container 316 and/or immediate product container 314 toward the second end 846 of the conveyor belt 832 the controller 836 monitors a position of the outer container 316 and/or immediate product container 314 (using a sensor, not shown) to determine if the outer container 316 and/or immediate product container 314 is in a first position for printing the first representation 622 of the unique identifier (as provided by the computer 838) onto the outer container 316 and/or immediate product container 314. Once the controller 836 determines that the outer container 316 and/or immediate product container 314 is in the first position, it causes the printer 624 to print the first representation 622 of the unique identifier onto the outer container 316 and/or immediate product container 314.
(58) Similarly, as the conveyor belt 832 moves the given outer container 316 and/or immediate product container 314 toward the second end 846 of the conveyor belt, the controller 836 monitors the position of the outer container 316 and/or immediate product container 314 (using another sensor, not shown) to determine if the outer container 316 and/or immediate product container 314 is in a second position for engraving the second representation 726 of the unique identifier (as provided by the computer 838) onto the product. Once the controller 836 determines that the outer container 316 and/or immediate product container 314 is in the second position, it causes the laser engraving device 729 to engrave the second representation of the unique identifier onto the immediate product container 314. In some embodiments, a sensor within the apparatus can read the leading edge of the box and, given that the speed of the conveyer belt is known, the computer can trigger the marking event when the product is appropriately positioned.
(59) In some examples, the first position and the second position are substantially the same and the first and second representations 622, 726 of the unique identifier are marked at substantially the same time. In other examples, the first position and the second position are separated from one another and the controller 836 coordinates the timing of the marking of the first and second representations 622, 726 of the unique identifier.
(60) At the end of the conveyor belt 832, the marked containers 316 and/or products 314 are packed for delivery at a packing table 845. In some examples, upon being packed, the containers 316 and/or products 314 are associated with an invoice number (e.g., by scanning the containers and/or products with a hand-held scanner), which is provided to the computer 838 where it is associated with the unique identifier(s) printed on the containers 316 and/or products 314. The computer 838 stores this association of an invoice number with one or more unique identifiers in the database 840 via the network 842. The associations can be made with the aid of a hand-held scanner.
(61)
(62) Unique Identifier
(63) In some examples, the native form of the unique identifiers is an alphanumeric string (i.e., the string that is engraved onto the product 316). The alphanumeric string can be transformed into an alternative (e.g., 2D code) representation.
(64) In some embodiments, the unique identifiers are not serial in nature but are instead randomly generated. In some examples, the unique identifiers include a randomized portion and a non-randomized portion. For example, a unique identifier may include a randomly generated portion and non-randomized portion that includes a manufacturer identifier. In some embodiments, a position of the non-randomized portion in the unique identifier is randomized. In some examples, a human-readable representation of the unique identifier includes a string of one or more symbolic characters (e.g., letters from the Chinese alphabet or geometric shapes).
(65) Diversion and Counterfeiting Control
(66) When a customer or a quality/diversion control agent suspects that a product (e.g., a product found at an esthetician's office or on an internet retailer's website) may have been diverted or is a counterfeit product, they can read the unique identifier from the product and use it to query the database. In some examples, the agent enters (e.g., manually or by an automated scanning process) the human-readable unique identifier into a computer application (e.g., a mobile application, a web application, or a stand-alone personal computer application) which is configured to query the database to determine whether the unique identifier is associated with an authentic but diverted or counterfeited product. In the case of a diverted product, since the database includes an association of the unique identifiers with invoice numbers, the invoice number associated with the unique identifier can be used to trace the product to the last entity in the supply chain to register the product's invoice number. Further investigation can then be performed to determine whether that entity did, in fact, divert the product. If so, the entity can be removed from the distribution channel.
(67) In the embodiments described above, indelible marking is performed using printers and laser engravers. However, any suitable indelible marking technology can be used to indelibly mark products and containers, including but not limited to stamping, embossing, dyeing, and etching.
(68) In any of the embodiments described herein, the product can be a cosmetic product formulated, for example, to cleanse, protect or improve the appearance of the skin, hair, or nails.
(69) Systems that implement the techniques described above can be implemented in software, in firmware, in digital electronic circuitry, or in computer hardware, or in combinations of them. The system can include a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor, and method steps can be performed by a programmable processor executing a program of instructions to perform functions by operating on input data and generating output. The system can be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Each computer program can be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language can be a compiled or interpreted language. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory. Generally, a computer will include one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM disks. Any of the foregoing can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits). In general, software features of the above-described embodiments include instructions embodied on non-transitory, computer-readable media (i.e., computer-readable media which does not encompass transitory forms of signal transmission, such as a propagating electrical or electromagnetic signal).
(70) While the embodiments described herein include a closure with an RFID tag embedded therein, it should be noted that other types of non-RFID based identification devices may be embedded in the closure. For example, a near-field communication (NFC) identification device or an ultra-high frequency (UHF) identification device may be embedded in the closure. More generally, any device that is small enough to be embedded in the closure, is able to transmit a unique identifier (in some cases in response to a query), and is queryable from its embedded position in the closure can be used.
(71) Further details relating to product diversion control systems and methods in which the anti-diversion, anti-counterfeiting product packaging can be used are described in Ser. No. 62/132,444, entitled, Product Diversion Management, filed on Mar. 12, 2015, the contents of which are incorporated herein by reference.