Abstract: The present invention discloses a tamper evident container (100) and method (300) of manufacturing thereof. The tamper evident container (100) comprises an inlay (202) embedded within the tamper evident container (100), the inlay (202) comprising a chip (202A), wherein the chip (202A) is configured to store a non-cloneable unique identification number of the tamper evident container (100). Further, an antenna (204) is integrated within the layers of the container (100), wherein the antenna (204) is configured to disable the functionality of the inlay (202) upon detecting that the antenna (204) is cut during tampering, thereby preventing unauthorized duplication or cloning of the tamper evident container (100).
DESC:FIELD OF INVENTION
[001] The field of invention generally relates to a tamper evident container. More specifically, it relates to a tamper evident container and method of manufacturing thereof.
BACKGROUND
[002] Tamper evident containers play an important role in ensuring security and integrity of valuable or sensitive items such as gold, jewelry, expensive metals, or confidential documents. These tamper evident containers/ pouches, are significant due to their ability to provide a robust and reliable solution for safeguarding against tampering, unauthorized access, and potential compromise of contents.
[003] Currently, existing tamper evident containers do not succeed in detecting unauthorized access and tampering across entire surface of the container and fail to respond to any attempt made to cut open or break open the container from any angle or part. Existing tamper evident systems offer insufficient coverage, limited tamper detection capabilities, or an inability to provide real-time alerts in the event of tampering.
[004] Other existing tamper systems have tried to address this problem. However, their scope was limited to surface-level tamper detection or provide partial coverage, leaving vulnerabilities in other areas of the packaging. Further, such systems did not allow for accurate checks across a larger number of the containers.
[005] Thus, in light of the above discussion, it is implied that there is need for a tamper evident container that is reliable and that offers full-surface tamper detection, immediate notification capabilities, and a user-friendly interface for real-time monitoring and does not suffer from the problems discussed above.
OBJECT OF INVENTION
[006] The principal object of this invention is to provide a tamper evident container and its method of manufacturing to enhance security and ensure the tamper evident integrity of containers utilizing RFID-NFC (Near Field Communication) technology chip, UHF (Ultra-high frequency) technology chip or using dual frequency chip comprising both NFC and UHF technologies.
[007] A further object of the invention is to provide the tamper evident container for securing valuable items, such as gold, jewelry, expensive goods, and important documents, by offering reliability and ease of use.
[008] Another object of the invention is to provide the tamper evident container that can detect unauthorized access and tampering across the maximum possible surface of the container.
[009] Another object of the invention is to provide the tamper evident container with an antenna covering 80% to 99% of the container surface, thus enabling tamper detection from any angle or part of the container and providing unique tamper evident container design.
[0010] Another object of the invention is to provide a non-cloneable tamper evident container, with a unique identity associated with the NFC or /and UHF chip, providing an added layer of security to prevent unauthorized duplication and ensure the authenticity of the stored items.
[0011] Another object of the invention is to provide a user device comprising a user-friendly mobile application that allows users to monitor the status of the container in real-time. This comprises detecting if the container has been tampered with, compromised, or remains intact, along with recording the date and time of the status.
BRIEF DESCRIPTION OF FIGURES
[0012] This invention is illustrated in the accompanying drawings, throughout which, like reference letters indicate corresponding parts in the various figures.
[0013] The embodiments herein will be better understood from the following description with reference to the drawings, in which:
[0014] Figure 1 depicts a tamper evident container, in accordance with an embodiment of the present disclosure;
[0015] Figure 2 illustrates the tamper evident container, user device and its subcomponents for detecting tampering and unauthorized access, in accordance with an embodiment an embodiment of the present disclosure;
[0016] Figure 3 depicts a method of manufacturing a tamper evident container, in accordance with an embodiment an embodiment of the present disclosure; and
[0017] Figure 4 illustrates a method for detecting tampering or unauthorized access using a tamper evident container, in accordance with an embodiment an embodiment of the present disclosure.
STATEMENT OF INVENTION
[0018] The present invention discloses a tamper evident container and method of manufacturing thereof.
[0019] The tamper evident container comprises an antenna integrated within the container such that any tampering of the container results in the antenna being cut. Further, the tamper container comprises an inlay. The inlay is in contact with the antenna and is configured to identify and track the tamper evident container, wherein the inlay is disabled in case the antenna is detected to be cut.
[0020] Further, the antenna is embedded within at least one layer of the container such that the antenna is cut when the container is tampered with, wherein the antenna is embedded in maximum possible surface of the container.
[0021] Further, the placement of the antenna covers 80% to 99% of a structure or a covering of the tamper evident container. The placement of the antenna over the tamper evident container enables tamper detection of the tamper evident container from any angle or part of surface area of the tamper evident container.
[0022] Further, the antenna comprises at least one of copper, silver, aluminium, conductive links, and flexible substrates.
[0023] Further, the inlay comprises at least one chip configured to touch at least two parts of the antenna, wherein the chip stores and processes information comprising a unique identification number corresponding to the tamper evident container, manufacturer details and tamper evident data.
[0024] Further, the inlay comprises at least one of a label, an RFID tag, a card, Radio Frequency Identification (RFID) inlay, an Ultra high frequency (UHF) inlay, a dual frequency inlay, and a Near-field communication (NFC) inlay, the Near-field communication (NFC) inlay comprises at least one of an embedded NTAG 213 Tag Tamper (TT) chip, and ST25 tamper chip (ST25TV02KC TFG3).
[0025] Further, the Ultra-High Frequency (UHF) inlay comprises an embedded NXP’s UCode G2iL+ chip.
[0026] Further, the dual frequency inlay comprises at least one of a Near-Field Communication (NFC) chip, and an Ultra-High Frequency (UHF) chip.
[0027] Further, the inlay is configured to enable secure communication with a user device to enable real-time monitoring of the tamper evident container.
[0028] Further, the user device comprises a display configured to display real-time tampering status updates, and further comprises an application configured to enable at least one of container scanning, tamper status monitoring, tamper notifications, and user authentication, to enable users to initiate tamper checks, receive tamper alerts, and log tampering events, and wherein the application records the date and time of the tamper status, to provide a chronological history of the containers condition.
[0029] Further, the tamper status comprises the tampered status, indicates the container has been tampered with, the compromised status indicates an inten-tional effort made to patch the tampering or attempt to re-fix the container, in case the container has been previously tampered with, and the intact status indi-cates no tampering has occurred.
[0030] Further, the tamper evident container comprises at least one of a pouch, a box, an envelope, a bag, a bottle, a carton, a can, a tube, and a pill card.
[0031] The proposed tamper evident container is used in transportation of valuables, inventory management, access control, supply chain tracking, and more.
DETAILED DESCRIPTION
[0032] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and/or detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[0033] The present invention discloses a tamper evident container 100 utilizing RFID-NFC (Near Field Communication) technology or/ and UHF (Ultra-high frequency) technology. The container 100 comprises an antenna 204 with its unique design embedded across its maximum possible surface, enabling tamper detection from any angle or point of the container 100. A user device 102 comprising a user-friendly mobile application 208 facilitates real-time status checks. The container 100 is assigned a unique, non-cloneable identity, ensuring heightened security by preventing unauthorized cloning or duplication. This tamper evident container 100 provides secure storage and transportation of valuables.
[0034] Figure 1 depicts a tamper evident container 100, in accordance with an embodiment of the present disclosure.
[0035] The tamper evident container 100 is a type of packaging designed to provide evidence of tampering or unauthorized access. Herein, the tamper evident container 100 is also referred to as a container 100. The container 100 is equipped with features that visibly indicate if the packaging has been altered, ensuring the integrity and security of the contents.
[0036] The tamper evident container 100 can be used to protect a wide range of products, comprising food items, pharmaceuticals, electronics, documents, and other valuable or sensitive goods.
[0037] In an embodiment, the container 100 may comprise at least one of RFID-NFC (Near-field communication) technology and UHF (Ultra-high frequency) technology or both NFC and UHF technologies, making it capable of detecting any attempt to tamper with its integrity. In an embodiment, the tamper evident container 100 may be at least one of a pouch, a box, an envelope, a bag, a bottle, a carton, a can, a tube, a pill card, and the like.
[0038] In an embodiment, the tamper evident container 100 may be manufactured from at least one of a selected material, chosen for its durability and resistance to tampering. The selected material may be polyethylene or polypropylene, Tyvek, metal alloys, polyester, nylon and the like.
[0039] In an embodiment, the shape of the tamper evident container 100 can be customizable, depending on the requirements of a user. The tamper evident container 100 may be tailored in the form of a rectangular, cylindrical, circular, square, envelope style, tubular and the like.
[0040] Furthermore, in an embodiment, the tamper evident container 100 can be of different sizes such as small, medium, large, flat and the like. The size of the tamper evident container 100 can be customizable, depending on the requirements of the user. In an embodiment, the tamper evident container 100 comprises an inlay 202 and an antenna 204.
[0041] In case of multiple containers 100, they may be named container 1, container 2, container 3…., container n (not shown) based on the users’ application.
[0042] In an embodiment, each container 100 is assigned a unique identification number that cannot be cloned. This identification number is stored inside the inlay 202 of the container 100.
[0043] In an embodiment, the inlay 202 is a fundamental building block of RFID technology or/ and UHF technology and is used in various forms, such as labels, tags, cards, or other types of RFID or/and UHF-enabled devices.
[0044] The inlay 202 enables objects to be identified and tracked wirelessly using readers/ scanners of the user device 102, making it valuable technology for applications like inventory management, access control, supply chain tracking, and more.
[0045] In an embodiment, the inlay 202 comprises a single or a multiple electronic components interfacing with a Near-Field Communication (NFC) protocol, a dual-frequency communication protocol and an Ultra-High Frequency (UHF) protocol.
[0046] In an embodiment, the inlay 202 comprises a chip 202A. The chip 202A may be an RFID chip 202A or an integrated circuit (IC). The chip 202A stores and processes information such as the unique identification number, manufacturer details, etc. The chip 202A present in the inlay 202 may be touching at least two parts of the antenna.
[0047] In an embodiment, the inlay 202 may be a Near-Field Communication (NFC) inlay 202 with embedded at least one of NTAG 213 Tag Tamper (TT) chip 202A or ST25 tamper chip (ST25TV02KC TFG3) 202A.
[0048] In an embodiment, the inlay 202 may be an Ultra-High Frequency (UHF) inlay 202 with NXP’s UCode G2iL+ chip 202A.
[0049] In an embodiment, the inlay 202 may be a dual frequency inlay 202 comprising both Near-Field Communication (NFC) and Ultra-High Frequency (UHF) with EM4425 chip 202A.
[0050] In an embodiment, NFC is a short-range wireless communication technology that enables data exchange between user device 102 within proximity, typically within a few centimeters. The NFC technology in the inlay 202 allows for secure and efficient communication with user device 102, such as smartphones or NFC-enabled readers.
[0051] In an embodiment, the NTAG 213 Tamper Tag (TT) chip 202A and ST25 tamper chip 202A may be present inside the NFC inlay 202. The NTAG 213 TT and ST25 chips 202A comprise tamper evident functionality, which is important for detecting the status of tampering of the container 100.
[0052] In an embodiment, UHF inlay 202 operates in an Ultra-High Frequency range in an electromagnetic spectrum. UHF RFID operates at frequencies between 860 and 960 MHz, enabling longer-range communication compared to NFC.
[0053] In an embodiment, G2iL+ chip 202A may be present inside the UHF inlay 202. The G2iL+ chip 202A comprises features that contribute to tamper evident functionality.
[0054] In an embodiment, the inlay 202 may comprise the dual frequency inlay 202 which a fusion of NFC and UHF with EM4425 chip 202A, each configured to achieve robust tamper evident functionality across possible surface of the container 100.
[0055] In an embodiment, the antenna 204 is configured to detect any tampering attempt across the maximum surface of the container 100. The antenna 204 is strategically integrated into the structure or a covering of the container 100 to cover a majority of its surface, and thereby tampering can be detected from any angle or part of the container 100 surface. The functionality of the inlay 202 may be disabled upon detecting that the antenna 204 is cut during tampering.
[0056] In an embodiment, the antenna 204 may be made of any material based on its suitable application 208. The material may comprise of at least one of copper, silver, aluminum, conductive links, flexible substrates and the like.
[0057] In an embodiment, if the container 100 is the tamper evident pouch with embedded RFID antenna 204, one or more polymer composites infused with conductive materials are used to achieve flexibility and durability.
[0058] The configuration of the antenna 204 serves as an extension for the tamper inlay 202, allowing it to provide tamper evident functionality seamlessly. The antenna’s 204 design has been optimized to ensure sensitivity to any alterations in the container 100, thus enhancing the overall security of the tamper evident container 100. This configuration not only guarantees a high level of tamper resistance but also enables precise and reliable detection, making it an integral component of the tamper evident container 100 design.
[0059] In an embodiment, the antenna 204 may be embedded within layers of the pouch/ container material. This positioning ensures that any attempt to tamper with the pouch, such as cutting or tearing, will likely damage the antenna 204 and trigger the tamper evident mechanism.
[0060] Figure 2 illustrates the tamper evident container 100, user device 102 and its subcomponents for detecting tampering and unauthorized access, in accordance with an embodiment an embodiment of the present disclosure.
[0061] In an embodiment, the detection of tampering and unauthorized access comprises the container 100 and the user device 102.
[0062] In an embodiment, the container 100 comprises the inlay 202 and the antenna 204. The container 100 is assigned a unique identification number that cannot be cloned. This identification number is stored in the inlay 202.
[0063] The inlay 202 is configured to securely store and transmit data. The inlay 202 comprises the chip 202A. The chip 202A is configured to store unique identification number and tamper evident data securely.
[0064] In an embodiment, the antenna 204 is configured to provide a comprehensive coverage area for the tamper detection. The antenna 204 is strategically integrated into the structure of the container 100 to cover its maximum surface, thereby tampering can be detected from any angle or part of the container 100 surface. The antenna 204 may cover 80% to 99% of the container’s 100 surface. In an embodiment, the inlay 202 within the container 100 is designed to stop functioning if it detects that someone has cut the antenna 204, indicating an attempt at tampering with the container 100. This feature enhances the tamper-evident nature of the container 100, providing an additional layer of security by rendering the inlay 202 ineffective when tampering is detected.
[0065] In an embodiment, the user device 102 is configured to communicate with the container's inlay 202 and the antenna 204, facilitating real-time monitoring of tampering status.
[0066] In an embodiment, the user device 102 comprises a display 206, application 208, memory unit 210, and the like.
[0067] In an embodiment, the display 206 is configured to present/ display real-time tamper status updates, ensuring users to assess the security of the container 100 quickly and easily. The application 208 is configured to interface with the container's inlay 202 and the antenna 204, enabling users to initiate the tamper checks, receive alerts, and log tampering events.
[0068] The application 208 comprises features such as container scanning, tamper status display, notifications, and user authentication. In an embodiment, user may use any reader device/ scanner to interact with the container 100. The user may interact with the container 100 through the application 208 installed on their user device 102. The users may open the application 208 and use the scanning feature to interact with the container 100. The application 208 utilizes the user device's NFC or/ and RFID capabilities to communicate with the inlay 202 embedded in the container 100. The application 208 displays the tamper status of the container 100 in real-time. The status may comprise tampered, compromised, and intact. In an embodiment, tampered status indicates the container 100 has been tampered with. The compromised status indicates intentional efforts to patch tampering or attempt to re-fix the container 100 only when the chip 202A is used. The intact status indicates no tampering has occurred. The application 208 may record the date and time of the tamper status, providing a chronological history of the containers condition. If tampering is detected, the application 208 generates push notifications to alert the user immediately.
[0069] In an embodiment, the application 208 may comprise features such as account opening, stock take of containers 100, audit of containers 100 at bank branches, and account closing.
[0070] In an embodiment, account opening comprises creating the account of the user in the application 208 by providing necessary information such as personal details or business information. The application 208 may generate a unique account identification number, associating it with the user, thereby allowing user friendly management and tracking of their tamper evident containers 100.
[0071] In an embodiment, the user can perform a stock take by scanning a plurality of containers 100 by using the application 208. The application 208 provides a summary of the tamper status of each scanned container 100. This feature aids in managing large quantities of containers 100 efficiently. This feature enables users to conduct inventory checks and monitor the status of plurality of containers 100.
[0072] In an embodiment, bank branch staff or auditors may use the application 208 via their mobile phone to conduct audits of tamper evident lockers. The application 208 may provide real-time tamper status information for each audited locker. The auditor may verify the integrity of each locker and ensure compliance with security protocols. This feature provides secure storage of valuable items in the locker.
[0073] In an embodiment, users may initiate an account closure process through the application 208 upon accessing the status of the container 100. This feature allows users to close their tamper evident container 100 accounts. The application 208 may prompt users to transfer tamper status information to a designated authority for record-keeping.
[0074] In an embodiment, the user may need to authenticate themselves within the application 208 to access tamper status information, ensuring only authorized individuals can view container 100 data.
[0075] In an embodiment, the user may connect the application 208 to a secure backend system for data storage, analysis, and additional security measures. In an embodiment, cloud integration for data storage and real-time updates can be performed, thereby enabling users to access tamper status information from multiple devices securely.
[0076] In an embodiment, the memory unit 210 is configured to store historical tampering data, providing a record of past events for security analysis and audit purposes.
[0077] In an embodiment, the tamper evident containers 100 may be used in firms and government agencies to securely store their clients’ sensitive documents. For example, clients may place documents in a tamper evident pouch before submission. That pouch may be scanned using the mobile application 208 during the submission process. The mobile device records the tamper status and provides a timestamp, ensuring the integrity of the submitted documents.
[0078] In an embodiment, the tamper evident container 100 may be used in banks. The banks may use tamper evident locker/ box for depositing high value items such as jewelry from customers for secure storage. Each item can be placed in a tamper evident locker with a unique identification number. The bank staff may use the mobile application 208 installed on their device to audit the tamper status of lockers periodically. In case of any tampering attempt, the device immediately alerts the bank staff, allowing them to take appropriate action to secure the items and investigate the incident.
[0079] In an embodiment, the tamper evident container 100 may be used in precious metal shipment. A precious metal dealer ships gold or other valuable metals to various clients or refineries. Each shipment may be secured in the tamper evident container 100 with the unique identification number. The application 208 of a dealer may be used to conduct stock takes before and after shipment to ensure all metal container 100s are accounted for. At the destination, the receiving party can verify the tamper status of each metal container 100, ensuring that the contents have not been compromised during transit.
[0080] Figure 3 depicts a method of manufacturing a tamper evident container 100. The method 300 begins with forming a flexible container 100 from a material, configuring the container 100 to specific dimensions suitable for enclosing and protecting items stored within, as depicted at step 302. Further, the method 300 discloses associating a unique identification number with each container 100, ensuring the container 100 is non-cloneable, as depicted at step 304. Subsequently, the method 300 discloses embedding a tamper-proof inlay, manufactured by etching or embedding aluminium or copper in a round or flat shape within the container 100 ,where the inlay 202 comprises a single or a multiple electronic components that interface with at least one of NFC inlay, UHF inlay, and dual-frequency inlay communication with an antenna 204, as depicted at step 306. Thereafter, the method 300 discloses integrating the antenna 204 covering maximum surface of the container 100, allowing tamper detection across the maximum surface of the container 100, as depicted at step 308. Furthermore, the method 300 discloses disabling the functionality of the inlay upon detecting that the antenna 204 is cut during tampering, as depicted at step 310.
[0081] In an alternate embodiment, the manufacturing of the tamper evident container 100 comprising at least one of an ultrasonic sealing, a thermal sealing or embedding of the inlay 202 using injection molding techniques.
[0082] Figure 4 illustrates a method for detecting tampering or unauthorized access using a tamper evident container 100. The method 400 begins with monitoring a status of a container 100, as depicted at step 402. Subsequently, the method 400 discloses detecting an attempt to open the container 100 by a chip 202A present in an inlay 202, as depicted at step 404. Thereafter, the method 400 discloses transmitting the status of tamper to a user device 102 upon detecting tamper status, as depicted at step 406. Furthermore, the method 400 discloses alerting the user via application 208 present in the user device 102 upon detecting the status as tampered or intact, as depicted at step 408.
[0083] The advantages of the current invention are detecting tampering of maximum surface the container 100, enabling tamper detection from any angle or part of the container 100 and providing unique tamper evident container 100 design.
[0084] An additional advantage is providing a robust defense against unauthorized access and tampering attempts.
[0085] An additional advantage is that the claimed invention offers real-time tamper status updates, allowing users to promptly identify any breach or tampering event. This instant notification feature enhances the overall security posture of the system, ensuring a rapid response to potential threats.
[0086] Another advantage is providing user-friendly, accessible and efficient mobile application, facilitating a seamless interface for tamper status checks, account management, stock takes, and audits.
[0087] Another advantage is the non-cloneable unique identity assigned to each container, ensuring authenticity and preventing duplication.
[0088] Applications of the current invention comprise banks, and jewelry retail, law enforcement agencies, pharmaceuticals companies, government agencies, retails and manufacturers, e-commerce industries, art galleries and museums, hotels, hospitals and the like.
[0089] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the scope of the embodiments as described here.
,CLAIMS:We claim:
1. A tamper evident container (100) comprising:
an antenna (204) integrated within the container (100) such that any tampering of the container (100) results in the antenna (204) being cut; and
an inlay (202) in contact with the antenna (204), wherein the inlay (202) is configured to identify and track the tamper evident container (100), wherein the inlay (202) is disabled in case the antenna (204) is detected to be cut.
2. The tamper evident container (100) as claimed in claim 1, wherein the antenna (204) is embedded within at least one layer of the container such that the antenna (204) is cut when the container (100) is tampered with.
3. The tamper evident container (100) as claimed in claim 1, wherein the antenna (204) is embedded in maximum possible surface of the container (100).
4. The tamper evident container (100) as claimed in claim 1, wherein the inlay (202) comprises at least one chip (202A) configured to touch at least two parts of the antenna (204), and
wherein the chip (202A) stores and processes information comprising a unique identification number corresponding to the tamper evident container (100), manufacturer details and tamper evident data.
5. The tamper evident container (100) as claimed in claim 1, wherein the inlay (202) comprises an embedded tamper-proof inlay (202), manufactured by etching or embedding aluminum or copper in a round or flat shape within the container (100), wherein the inlay (202) comprises a single or a multiple electronic components that interface with a Near-field communication (NFC) protocol, an Ultra-high frequency (UHF) protocol, and dual-frequency communication with the antenna (204).
6. The tamper evident container (100) as claimed in claim 1, wherein the inlay (202) comprises at least one of a label, an RFID tag, a card, Radio Frequency Identification (RFID) inlay, an Ultra high frequency (UHF) inlay, a dual frequency inlay, and a Near-field communication (NFC) inlay.
7. The tamper evident container (100) as claimed in claim 1, wherein the inlay (202) is configured to enable secure communication with a user device (102) to enable real-time monitoring of the tamper evident container (100).
8. The tamper evident container (100) as claimed in claim 7, wherein the user device (102) comprises:
a display (206) configured to display real-time tampering status updates, and
an application (208) configured to enable at least one of container scanning, tamper status monitoring, tamper notifications, and user authentication, to enable users to initiate tamper checks, receive tamper alerts, and log tampering events, and wherein the application (208) records the date and time of the tamper status, to provide a chronological history of the containers condition.
9. The tamper evident container (100) as claimed in claim 1, wherein the tamper status comprises at least one of a tampered, compromised, and intact indications,
wherein the tampered status indicates the container (100) has been tampered with;
wherein the compromised status indicates an intentional effort made to patch the tampering or attempt to re-fix the container (100), in case the container (100) has been previously tampered with, and
wherein the intact status indicates no tampering has occurred.
10. The tamper evident container (100) as claimed in claim 1, wherein the tamper evident container (100) comprises at least one of a pouch, a box, an envelope, a bag, a bottle, a carton, a can, a tube, and a pill card.
11. The tamper evident container (100) as claimed in claim 1, wherein placement of the antenna (204) covers 80% to 99% of a structure or a covering of the tamper evident container (100), and wherein placement of the antenna (204) over the tamper evident container (100) enables tamper detection of the tamper evident container (100) from any angle or part of surface area of the tamper evident container (100).
12. The tamper evident container (100) as claimed in claim 1, wherein the antenna (204) comprises at least one of copper, silver, aluminum, conductive links, and flexible substrates.
13. A method (300) for manufacturing a tamper evident container (100), the method comprising:
integrating an antenna (204) within the container (100) resulting in the detection of tampering of the tamper evident container (100); and
identifying and tracking the tamper evident container (100) by using an inlay (202) in contact with the antenna (204), and the inlay (202) is disabled in case of detecting the cutting of the antenna (204).
14. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, comprising:
attaching at least one chip (202A) to at least two parts of the antenna (204), and
storing and processing information comprising a unique identification number corresponding to the tamper evident container (100), manufacturer details and tamper evident data, by using the chip (202A).
15. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, comprising:
placing the antenna (204) to cover 80% to 99% of a structure or a covering of the tamper evident container (100); and
enabling tamper detection of the tamper evident container (100) from any angle or part of surface area of the tamper evident container (100), by placement of the antenna (204) over the tamper evident container (100).
16. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, comprising enabling secure communication with a user device (102) to enable real-time monitoring of the tamper evident container (100), by using the inlay (202).
17. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 16, comprising:
displaying real-time tampering status updates, by using a display (206) comprised in the user device (102);
enabling at least one of container scanning, tamper status monitoring, tamper notifications, and user authentication, to enable users to initiate tamper checks, receive tamper alerts, and log tampering events, by using an application (208) comprised in the user device (102); and
recording the date and time of the tamper status, to provide a chronological history of the containers condition, by using the application (208).
18. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 17, the tampering status comprising:
indicating the tampering of the container (100) in the tampered status;
indicating an intentional effort made to patch the tampering or attempting to re-fix the previously tampered container (100) in the compromised status; and
indicating no tampering has occurred in the intact status.
19. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, comprising embedding the antenna (204) within at least one layer of the container such that the antenna (204) is cut when the container (100) is tampered with.
20. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, comprising embedding the antenna (204) in maximum possible surface of the container (100).
21. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, embedding a tamper-proof inlay (202), manufactured by etching or embedding aluminium or copper in a round or flat shape within the container (100) , wherein the inlay (202) comprises a single or a multiple electronic components interfacing with a Near-field communication (NFC) protocol, an Ultra-high frequency (UHF) protocol, and dual-frequency communication with the antenna (204).
22. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, the inlay (202) comprising at least one of a label, an RFID tag, a card, Radio Frequency Identification (RFID) inlay, a Ultra high frequency (UHF) inlay, a dual frequency inlay, and a Near-field communication (NFC).
23. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, integrating the antenna (204) comprising at least one of copper, silver, aluminium, conductive links, and flexible substrates.
24. The method (300) for manufacturing the tamper evident container (100) as claimed in claim 13, the tamper evident container (100) comprising at least one of a pouch, a box, an envelope, a bag, a bottle, a carton, a can, a tube, and a pill card.
Date: 13th February, 2024
Signature:
Name of signatory: Nishant Kewalramani
(Patent Agent)
IN/PA number: 1420
| # | Name | Date |
|---|---|---|
| 1 | 202421010236-STATEMENT OF UNDERTAKING (FORM 3) [14-02-2024(online)].pdf | 2024-02-14 |
| 2 | 202421010236-PROVISIONAL SPECIFICATION [14-02-2024(online)].pdf | 2024-02-14 |
| 3 | 202421010236-POWER OF AUTHORITY [14-02-2024(online)].pdf | 2024-02-14 |
| 4 | 202421010236-FORM 1 [14-02-2024(online)].pdf | 2024-02-14 |
| 5 | 202421010236-DRAWINGS [14-02-2024(online)].pdf | 2024-02-14 |
| 6 | 202421010236-DECLARATION OF INVENTORSHIP (FORM 5) [14-02-2024(online)].pdf | 2024-02-14 |
| 7 | 202421010236-FORM 3 [04-02-2025(online)].pdf | 2025-02-04 |
| 8 | 202421010236-FORM-5 [14-02-2025(online)].pdf | 2025-02-14 |
| 9 | 202421010236-DRAWING [14-02-2025(online)].pdf | 2025-02-14 |
| 10 | 202421010236-COMPLETE SPECIFICATION [14-02-2025(online)].pdf | 2025-02-14 |
| 11 | 202421010236-Information under section 8(2) [20-02-2025(online)].pdf | 2025-02-20 |
| 12 | 202421010236-Power of Attorney [24-02-2025(online)].pdf | 2025-02-24 |
| 13 | 202421010236-Form 1 (Submitted on date of filing) [24-02-2025(online)].pdf | 2025-02-24 |
| 14 | 202421010236-Covering Letter [24-02-2025(online)].pdf | 2025-02-24 |
| 15 | 202421010236-CERTIFIED COPIES TRANSMISSION TO IB [24-02-2025(online)].pdf | 2025-02-24 |
| 16 | 202421010236-Power of Attorney [24-03-2025(online)].pdf | 2025-03-24 |
| 17 | 202421010236-Form 1 (Submitted on date of filing) [24-03-2025(online)].pdf | 2025-03-24 |
| 18 | 202421010236-Covering Letter [24-03-2025(online)].pdf | 2025-03-24 |
| 19 | 202421010236-CERTIFIED COPIES TRANSMISSION TO IB [24-03-2025(online)].pdf | 2025-03-24 |
| 20 | Abstract.jpg | 2025-03-27 |
| 21 | 202421010236-POA [17-07-2025(online)].pdf | 2025-07-17 |
| 22 | 202421010236-FORM 13 [17-07-2025(online)].pdf | 2025-07-17 |