VARIABLE PATTERN SHIELD PROTECTION SYSTEM FOR A TAMPER-EVIDENT CONTAINER
20240153411 ยท 2024-05-09
Inventors
Cpc classification
G09F3/0376
PHYSICS
H04L2209/805
ELECTRICITY
G09C5/00
PHYSICS
H04L9/3263
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
Abstract
The disclosed embodiments provide a method for tamper-evident shipment or storage of goods. An Electrical Shield pattern is embedded in or printed on a substrate with other electrical, optical, and electronic components, communication components, semiconductors, which are attached or printed on a substrate to form a shipment bag used as a shipping container. The shield pattern can be made variable between different bags by using algorithms entered into a printer control system. The shipment bag with its components can then be assigned a unique signature which differentiates each bag. Application of encryption methods serves to guarantee the shipped goods are authentic and that were not tampered with during shipment. Digital signal processing is used to generate pedigree information, which may include items such as shipping location, serial numbers, sensor information, and lot numbers for the goods. The information related to the history of tampering attempts and other sensor status can be placed in encrypted form in an RFID tags or control or monitoring electronics which can be read by a mobile phone application or sent to a remote cloud-based server.
Claims
1. (canceled)
2. An anti-tamper mailing container comprising: a conductive pattern on a substrate of the mailing container, wherein the conductive pattern provides a unique electronically measurable signature based at least in part on a design of the conductive pattern; and monitoring electronics in communication with the conductive pattern and configured to: detect the signature of the conductive pattern; store the detected signature of the conductive pattern; and detect a tampering status of the mailing container based on a subsequent measurement of the signature of the conductive pattern.
3. The anti-tamper mailing container of claim 2, wherein the conductive pattern has a first density in a first region of the substrate and a second density different from the first density in a second region of the substrate.
4. The anti-tamper mailing container of claim 2, wherein the conductive pattern comprises one or more traces comprising conductive ink.
5. The anti-tamper mailing container of claim 2, wherein the conductive pattern comprises one or more traces comprising carbon ink.
6. The anti-tamper mailing container of claim 2, wherein the conductive pattern comprises one or more electric or electronic circuits placed on insulating material to provide the signature.
7. The anti-tamper mailing container of claim 2, wherein the conductive pattern is in communication with one or more optical components placed on insulating material to provide the signature in conjunction with the conductive pattern.
8. The anti-tamper mailing container of claim 2, further comprising one or more printed sensors on the substrate in communication with the monitoring electronics to provide information corresponding to quality of shipped goods.
9. The anti-tamper mailing container of claim 8, wherein the one or more printed sensors comprise at least one of a temperature sensor and a humidity sensor.
10. The anti-tamper mailing container of claim 2, wherein the monitoring electronics use a programmable measurement test time period to extend battery life.
11. A set of anti-tamper mailing containers as claimed in claim 2, wherein the design of the conductive pattern of each anti-tamper mailing container is different from the design of the conductive pattern of at least one other anti-tamper mailing container of the set of anti-tamper mailing containers.
12. A method comprising: providing a mailing container configured to receive goods, the mailing container comprising a substrate, a conductive pattern on the substrate that provides a unique electronically measurable signature based at least in part on a design of the conductive pattern, and monitoring electronics in communication with the conductive pattern; causing detection of the signature by the monitoring electronics; causing encryption of the signature based on an encryption key; causing the encrypted signature to be stored in the monitoring electronics; and after the mailing container is received by a recipient, causing a decryption key corresponding to the encryption key to be sent to a computing device associated with the recipient to facilitate detection of a tampering status of the goods.
13. The method of claim 12, wherein the decryption key is sent to the computing device associated with the recipient via a remote server.
14. The method of claim 12, wherein the decryption key is sent to the computing device associated with the recipient automatically based on an initialization of the monitoring electronics by a computing device associated with a sender of the goods.
15. The method of claim 14, wherein the conductive pattern comprises a plurality of traces disposed on an interior side of the substrate.
16. The method of claim 15, wherein each trace of the plurality of traces comprises a plurality of conductive contacts.
17. The method of claim 16, further comprising electrically connecting the plurality of traces prior to causing detection of the signature by the monitoring electronics.
18. The method of claim 17, wherein electrically connecting the plurality of traces comprises closing the mailing container such that individual conductive contacts contact other conductive contacts of the plurality of conductive contacts.
19. The method of claim 18, wherein at least some of the plurality of conductive contacts are provided with a conductive adhesive disposed therein.
20. The method of claim 12, wherein the conductive pattern comprises one or more traces comprising conductive ink.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] The nature, objects, and advantages of the present technology will become more apparent after considering the following detailed description in connection with the accompanying drawings, in which like reference numerals designate like parts throughout.
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
DETAILED DESCRIPTION
[0028] The disclosed embodiments provide systems, devices, and processes for tamper evident security of a shipping container. A package with an Electrical Shield and a process consisting of a test system and digital signal processing software allows a shipping container to be protected on all its sides.
[0029]
[0030] If we start at contact dot 107 we have a direct connection with contact dot 114 via trace 112. Dot 114 in turn connects with contact dot 115 by means of the conductive stripe. Note that the pattern is laid out at an offset angle. Thus, after folding, contact dot 115 connects with contact dot 116. Furthermore, contact dot 116 by means of the conductive pattern will connect with dot 117. Dot 117 will in turn connect with dot 118 after the pattern is folded. As we continue with this sequence, we will end with a connection to contact dot 108. As a result, we will accomplish a continuous circuit starting from contact dot 107 and ending with contact dot 108. This design of the printed pattern thus can achieve a continuous Electrical Shield between 107 and 108.
[0031]
[0032]
[0033] Portions of the figure at 301 and 307 show features with circular feature patterns 309. These features are contact points that can maintain a continuous trace for the electrical shield when the completed bag is assembled. In some embodiments, circular dot features 309 will be covered by a conductive adhesive for this purpose. Rectangular pads 308 are used to connect the shield pattern to monitoring electronics. Some of the circular dot features 309 and rectangular features 308 may be covered with an anti-oxidation coating of noble metal or other suitable material. Other shapes and configurations for the features 308 and 309 are possible. Furthermore, sections 301 and 307 may be covered each with a strip of insulating material such as plastic and or wax paper in order to keep the conductive features of the bag from sticking to unwanted surfaces prior to using the bag for shipment of goods.
[0034]
[0035]
[0036]
[0037] At the receiver end 607, the receiver of the goods will receive an email and a decryption key. The receiver will typically use a phone app to open an application which allows the receiver to connect to the bag. At 609, the phone app will retrieve a message from the bag containing any tampering data and a signature with the pedigree information. The phone app will decrypt the information and display it for the receiver. At 611, once the receiver confirms the lack of tampering and the status of the goods, the bag can be opened.
[0038] As a specific example, in the situation of pharmaceutical shipments, the sender can be a pharmacy at the shipping location. The corresponding decryption key and email will be sent to the phone app in the mobile phone of the individual receiving the shipment of medications. The receiver of the pharmaceuticals can then connect with the bag (e.g., using the phone app and/or an NFC link) to be advised if the bag was opened, how long the transportation took, whether the temperature and humidity range required were not exceeded, etc.
[0039] Various modifications to these embodiments, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the present technology. Thus, the present technology is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.