Abstract: A system to detect unwarranted tampering of bags and packaging for items like food grains or seeds by placing in the bags or the lining of the bags RFID tags that are capable of storing information in a memory for tracking goods and generating reports for used in the supply chain. HDPE bags with lining can be manufactured embedding RFID tags and antennae in the lining. Each RFID tag has a unique serial number which not only indicates the product such as seed"s category, but serves as a pointer to a database entry which contains the detailed history of the product in the bag. The manufacturers can pass on advance information from their servers to the distributors or supplier agencies. Encryption of data adds further security to the system.
A SYSTEM TO DETECT TAMPERING OF PACKED BAGS IN A DISTRIBUTION NETWORK
Introduction and Back ground of the Invention
The present invention is an RFID application used in packing material, to provide an improved system for tamper protection and inventory management. It discloses the use of RFID tags and antennae which are integrally fixed on the inner lining of a bag to enable detection of any tampering with the bag. The invention further provides for a secure system to write and record data on the tag, at each point along the supply chain which provides the transportation history of the bag. The data on the tag can be transmitted to corresponding databases on computer systems. The information thus stored on the tag and corresponding databases will make it possible to determine at which point of the supply chain the bag was tampered with.
In the prior art, sealing of the bags does not offer sufficient protection against tampering. It is possible for bags to be opened and spurious products exchanged for genuine ones and again re-sealed without being able to detect such an occurrence. Farmers and retailers are not sure about the supply of proper seeds or other products due tainted products being exchanged for genuine ones. Along the supply chain there is scope for tampering and switching products, such as original seeds can be switched with spurious ones. It is impracticable to constantly supervise and provide manual security to prevent such pilfering or theft at each stage of the movement of the goods along the supply chain.
The use of RFID technology is known in the area of supply chain management solutions. The present invention is an application which uses RFID technology to effectively combat the problem of tampering by disclosing a system for data writing, storage and retrieval from the RFID tags in a secured manner. Such stored data can be used for detecting where the packaged products have been breached by unauthorized interception. Use of RFID activated bags, as disclosed in the present invention, will improve efficiency in the agri-supply chain, particularly as it provides a means to facilitate detection of the point of entry of spurious products. Accordingly, authorities can take effective action to control entry of spurious goods.
The present system essentially provides a reliable solution for a tamper protected packing by use of a self destruct RFID tag when the bag is opened. Furthermore, the RFID tags in the present application are read - write enabled, are capable of storing information in a memory. The RFID tags are used to write and store information which can be read and verified with a reader. The reader, which can also be a mobile reader, is linked to a back-end system to update the database and inventory management system. The tags can be written on at each point of transportation or storage of the bags and can then be encrypted and locked at each stage. The twin aspects of providing a tag with a read and write feature and the backend data maintenance enables users to track the product's transportation history. Locking of the data written at each stage of transportation or storage provides a secure and reliable system to track and identify where the tampering possibly occurred. The system also creates a means of certifying to the end user, retailer or the farmer, the authenticity of goods as per the information written in the tags.
In addition to the use of RFID tags, the system also discloses the use of back-end work stations for processing data. This provides a comprehensive arrangement to maintain the inventory and update databases. The information uploaded from the tags into the databases at the workstations, can be used by the supply chain network for various purposes, such as, expiry date or recall of a particular batch of products. As the system allows retailers and farmers to have ready access to authentic data about the products and seeds contained in the bags it would minimize risks and losses for the farmers. The invention envisages an integrated approach by partnering with agencies and authorities for the efficient working of the supply chain and to bring about transparency in operations of the supply chain by being able to detect tampering of the seed bags between two destination points on the supply/ distribution chain.
The present invention overcomes the shortcomings of the prior art, where tampering is undetectable and unknown, neither is there any means of knowing at which place the tampering is likely to have occurred. The present invention not only provides a means to automatically detect tampering, but it also provides data to detect the point along the supply chain where the bag is likely to have been tampered with. It will thereby aid authorities, including government authorities such as tax , exercise or seeds regulating authorities to access the databases containing information from the tags for taking appropriate corrective action.
Other benefits of the present invention include transparency of supply chain operations, where information can be shared through networks, more organized business processes, and reducing inventory inaccuracies due to manual errors. The invention can be implemented for region specific databases and linked up to a central database. The present invention provides a further improvement in the use of RFID tags in supply chain management. The system as disclosed in the present invention if it is mandated by authorities, will benefit not only the farmer or end use but will be beneficial for improving agricultural productivity.
DESCRIPTION
The present invention discloses a system for improved security in supply chain management, by placing RFID tags and antennae on packing material such as bags and a system of writing data on such RFID tags which is transmitted to back end workstations. The term "bag(s)" used in this invention can refer to and include any packing device, and the current invention may be used to protect a variety of commercial goods in similar manner as disclosed here. The RFID activated bags, disclosed in the > present invention, enables detection of tampering of bags and it also facilitates data storage and tracking its history along the supply chain.
A basic RFID SYSYTEM consists of one antenna and a transponder or an RFID (Tag). RFID is an automatic identification technology where digital data encoded in an RFID tag is captured by a reader using radio waves. RFID TAGS consists of an integrated circuit (IC) attached to an antenna and some protective packing, which can be a plastic laminated cover or any other protective covering to make it water proof or heat resistant as per the requirements of the application. Tags are also called transponders, and data can be stored in the integrated circuit and sent through the antenna to tye reader. Typically each RFID has an individual code containing information related to the object associated with it to enable identifying with it.
Tags can be passive (no battery), semi passive or active. Passive RFID tags rely entirely on the reader for their source of power. In passive systems, the tag is composed of an antenna and a silicon chip that includes basic modulation circuitry and non volatile memory. A known technique of communicating with RFID transponders is called "backscatter modulation", where the RFID tags sends stored data by modulating the impedance attached to their antenna to reflect varying amounts of an electro magnetic field to be generated by an RFID reader. The advantage of this communication technique is RFID transponders and tags can operate automatically at the frequency of the energizing electro magnetic field as a result the reader may operate at multiple frequencies so as to avoid radio frequency (RF) interference, such as using frequency hopping spread spectrum modulation techniques. RFID tags may get their power from the energizing electromagnetic field this eliminates need of separate power source.
The present invention is described in greater detail with reference to the detailed schematic drawings herein. The description of the invention includes terms such as upper; lower, first, second etc., for descriptive purposes only and are not to be construed as limiting.
In order to show the structure and process embodiments more clearly, the drawings herein represent the diagrammatic representations of the embodiments.
FIG 1. Shows one exemplary manner of affixing RFID tag and antenna to the bag (where the antenna circuit extends till the stitch line of the bag.)
FIG 2. describes an exemplary method for producing an RFID embedded bag.
FIG 3. Describes Data on RFID tag organized in particular memory blocks which can be encrypted, and locked;
FIG 4. Describes the method and process of data storage along the supply chain encrypted, locked and killed at specific locations in the application;
FIG 5. Describes an exemplary process for converting an HDPE bag to an RFID activated bag:
Referring to FIG 1, it shows a bag which is generally indicated as numeral 10 here. The bag 10 is made of flexible material such as HDPE or any polymeric material that is used for packing of products such as seeds, grains or fertilizer. The bag 10 has an inner contiguous lining 20 of durable material capable of bearing the weight of products such as seeds or grain. The lining 20 will have a continuous uninterrupted pattern that will create an antenna circuit 30. The bag is shown with the RFID tag 40 affixed and the antenna 30, which extends till the stitch line 50 of the bag.
Referring to FIG 2-A , in FIG 2., which describes one exemplary method for manufacture of the bags with RFID tags; The Antenna 30 is screen printed along the entire length and periphery of the inner lining 20 of the bag 10, where an additional layer of copper can be electro deposited on the screen printed area 30 of the HDPE or any polymeric material.
An RFID chip or tag 40 is pasted and affixed after the antenna has been printed or by an alternative method of bonding the RFID chip 40 with conductive paste over the printed antenna 40 on the HDPE bag 10. The bag is sewn or sealed at stitcji-line 50, after it has been filled with seeds, fertilizer or any other product. The manufacturing location, Global Positioning (GPS) coordinates and other details as required are written into the tag 40 after reading the unique identifier number 60 it is encrypted. The encrypted data is read and uploaded into the server at the quality assurance department.
There are others methods that can be employed for manufacture of bags with inner polyethylene with printed RFID inlay linings, for instance there can be two or multiple layers of lining in the bag 10, where the bag has a marginally larger surface than the inner lining 20 and can be independent of the bag. The antenna can be screen printed on the separate inner lining and then inserted in the bag, when the lining is sealed or stitched it creates a circuit for activating the RFID tag. Alternatively there is no need for a separate lining, when the inner surface area of the bag itself can serve as a surface on which the antenna circuit pattern is screen printed.
Referring to FIG 3, which describes Data Organized in particular memory blocks, where the RFID tag memory 60 contains product information such as:
1. Category of seed and seed lot number
2. Information according to Indian Seed Certification Standards
3. Unique serial number
4. Global positioning (GP) information
5. The expiry date of products / seeds
6. Packing date
Each RP1D tag has a unique serial number which not only indicates the seed's category, but serves as a pointer to a database entry which contains the detailed history of the seeds packet. The manufacturers can pass on advance information from their database servers to the distributors or suppliers and other agencies. Encryption of data adds further security to the system. Standard encryption algorithms can be used in the application. As Bags are usually recycled for further use, only the tag gets destroyed. The tag chip and antenna is disabled and not reusable although the bags can be used again. Alternatively, a single use lining can be used while the bag can be recycled.
The method and process of data storage along the supply chain is described in FIG 4. The FIG 4, shows bags with antenna screen printed on the inner surface of HDPE bags or in the lining of the bags with cast vinyl tamper proof RFID labels or tags is affixed. The "* antenna circuit which extends till the stitch line of bags is sealed and the bags are then sent to the Manufacturing Warehouse 100. At the warehouse mobile readers can be used to conduct random checks. Data is then written and stored on the active RFID tag at various locations along the supply chain and it is encrypted, locked and finally killed.
Referring to FIG 4., which describes the method and process of data storage on the RFID tag, along the supply chain where it is written, encrypted, locked and killed at specific locations as envisaged in the application. The RFID data is first activated and encrypted and locked on the RFID tag 40 at manufacturer's location 100 and updated on the central data base 500. A Unique number is identified for the tag and the GPS co-ordinates are written and locked in the user memory area. Next the data is written and updated on the same RFID tag at warehouse 200, along with GPS coordinates and encrypted and locked and updated on the central data base 500. Encryption of data adds further security to the system, which can be done with any standard encrypting algorithm. Data is again updated on the RFID tag 40, at the distributor's location 300, and GPS coordinates are written encrypted and locked for distributor 300 and updated on the central data base 500. RFID data is again updated, encrypted and locked and the GPS coordinates at retailer or point of sale 400 and then transmitted to the central data base 500.As the retailer or point of sale 400 represents the final intended destination, the RFID tag 40 is killed and cannot be written after this point. At any point along the supply chain if the bag has been tampered and the RFID tag is deactivated no further data can be written on the tag, the system of the present invention will indicate to the user the point on the supply chain where the unauthorized tampering of the bag had taken place. The locations along the supply chain as mentioned in FIG 4 of the present invention are only indicative and are not meant to be an exhaustive listing or a limiting factor to the scope of the invention.
FIG 5, describes an example of a process for converting an HDPE bag to an RFID activated bag. The HDPE bag which is shown as bag 10, is made of flexible material such as HDPE or any polymeric material that is used for packing of products such as seeds, grains or fertilizer. The bag 10 has an inner contiguous lining 20 of durable material capable of bearing the weight of products such as seeds or grain. The lining 20 will have a continuous uninterrupted pattern that will create an antenna circuit 30. The bag is shown with the RFID tag 40 affixed and the antenna 30, which extends till the stitch line 50 of the bag. The housed tags which are attached or linked to the circuit and can be thematically bonded or sealed into the bag through known means. The RFID enabled bags are filled on conveyer belt and the bags are sealed and create RFID activated bags. Alternatively, the bag linings are sealed along the edges after the bag has been filled with contents such as seeds or grains. Data is then written on the tags and linked to more data stored in the system, and it becomes an RFID data activated tag 80.
When the bag 10 is sealed at stitch line 50 it will create an RFID active bag 90. When the RFID active bag 90 is tampered or opened it will destroy the tag indicating that the bag has been opened or tampered with. Data from RFID tag which has been uploaded and stored in work stations remains and can be transferred to a central database server at manufacturing or other locations. Data from RFID tag which has been uploaded and stored in work stations or on the central database remains although the tag is destroyed and can be used to determine where the tag was destroyed.
A person skilled in the art will be able to perceive numerous other modifications of the embodiments without departing from the scope of the invention as defined in the Claims.
I / We claim:
1. Packing bag with a tamper protection RFID system capable of being connected to a
supply chain system that comprises:
a) HDPE or polymer bag fitted with an RFID tag and an antenna printed on the inner surface of bag,
b) antenna circuit means is electro deposited with copper or other conductive material and extends to the stitch lines of the bag such that RFID tag is activated by sealing bag and deactivated by opening the bag;
c) RFID tag having a memory for storing data and writing data,
d) RFID tag providing a means of identification by unique number to be read along with other data written and detected by a mobile reader or scanner,
e) a means for writing data at each point along supply chain,
f) a means for uploading data from each point of the supply chain or distribution network where the sealed RFID activated bag is sent, and data is encrypted and locked at each stage before dispatching un-tampered bag to next destination,
g) a means to synchronize uploaded data with other existing data on the database,
h) a means to access data and transmit data by users of the supply chain over known communication networks.
2. Packing bag, as in claim 1, with a tamper protection RFID system capable of being connected to a supply chain system, where the antenna is screen printed on an inner lining of the bag.
3. Packing bag with an tamper protection RFID system capable of being connected to a supply chain system as in claim 1, were data is written on the RFID tag encrypted and locked at various locations and such data from the RFID activated tags can be uploaded to a plurality of backend workstations by a plurality of readers and subsequently transmitted and stored on a plurality of databases to be used and accessed by plurality of parties including authorities for monitoring the supply chain.
4. A supply chain tamper protection system comprising: RFID tags and antenna affixed to the inside surface of packing material; the RFID tag is capable of storing coded data to identify the bag or package , a means to write, encrypt and lock data at a plurality of points and locations along the supply chain, a reader means which is responsive to the tag to read the data stored on tag, a means to transmit or upload data from the tag to a database on a computer or server system,, a means to finally lock the tag to prevent any further writing at the ending point of the supply chain , after the package reaches the final destination point on the supply chain the tag is a 'read- only' tag and cannot be written.
5. A supply chain tamper protection system as claimed in claim 4 wherein the data written on the tag at different points and locations of the supply chain by means of an automatic code generated to record and write the global positioning (GP) co-ordinates and other standard data on the tag, relevant to the location where it is written, and a means to encrypt and lock the data at each point.
6. Packing bag as in claim 1 with a tamper protection RFID system capable of being connected to a supply chain system and comprising a means of writing, locking and encrypting data at each point of transportation or storage, where packing bag comprises an RFID tag with read-write capability for writing data and transmitting data to a reader.
7. A supply chain tamper protection system as claimed in claim 4 which provides a means for analyzing the data in the supply chain process, comprising: sensor or reader to detect tampered or deactivated tags, a means of verifying from the stored data in the database, until which point of the supply chain the bag was not tampered, an algorithm for analyzing and generating reports based on the data.
8. A supply chain tamper protection system as claimed in claim 4 wherein the RFID tag capable of storing data, serial number and other data written on tag memory can be detected by a reader or scanner such that when the bag is opened it will be detected by the reader that RFID tag is deactivated and will give a signal or indication.
9. A supply chain tamper protection system as claimed in claim 1 and claim 4 wherein the reader can be a mobile type reader, capable of wirelessly transmitting data to a back end database.
10. A supply chain tamper protection system as claimed in claim 4 wherein a visual indicative signal is given on the computer database to indicate the bag is opened or tampered with.
| # | Name | Date |
|---|---|---|
| 1 | 2418-che-2008 abstract.pdf | 2011-09-04 |
| 1 | 2418-che-2008 form 5 05-10-2009.pdf | 2009-10-05 |
| 2 | 2418-che-2008 claims.pdf | 2011-09-04 |
| 2 | 2418-che-2008 form 3 05-10-2009.pdf | 2009-10-05 |
| 3 | 2418-CHE-2008 FORM 2 05-10-2009.pdf | 2009-10-05 |
| 3 | 2418-che-2008 correspondence-others.pdf | 2011-09-04 |
| 4 | 2418-che-2008 form 1 05-10-2009.pdf | 2009-10-05 |
| 4 | 2418-che-2008 drawings.pdf | 2011-09-04 |
| 5 | 2418-che-2008 form-1.pdf | 2011-09-04 |
| 5 | 2418-che-2008 drawings 05-10-2009.pdf | 2009-10-05 |
| 6 | 2418-che-2008 form-26.pdf | 2011-09-04 |
| 6 | 2418-CHE-2008 DESCRIPTION (COMPLETE) 05-10-2009.pdf | 2009-10-05 |
| 7 | 2418-che-2008 form-3.pdf | 2011-09-04 |
| 7 | 2418-che-2008 correspondence others 05-10-2009.pdf | 2009-10-05 |
| 8 | 2418-che-2008 claims 05-10-2009.pdf | 2009-10-05 |
| 8 | 2418-che-2008 form-5.pdf | 2011-09-04 |
| 9 | 2418-che-2008 abstract 05-10-2009.pdf | 2009-10-05 |
| 10 | 2418-che-2008 form-5.pdf | 2011-09-04 |
| 10 | 2418-che-2008 claims 05-10-2009.pdf | 2009-10-05 |
| 11 | 2418-che-2008 form-3.pdf | 2011-09-04 |
| 11 | 2418-che-2008 correspondence others 05-10-2009.pdf | 2009-10-05 |
| 12 | 2418-che-2008 form-26.pdf | 2011-09-04 |
| 12 | 2418-CHE-2008 DESCRIPTION (COMPLETE) 05-10-2009.pdf | 2009-10-05 |
| 13 | 2418-che-2008 form-1.pdf | 2011-09-04 |
| 13 | 2418-che-2008 drawings 05-10-2009.pdf | 2009-10-05 |
| 14 | 2418-che-2008 form 1 05-10-2009.pdf | 2009-10-05 |
| 14 | 2418-che-2008 drawings.pdf | 2011-09-04 |
| 15 | 2418-CHE-2008 FORM 2 05-10-2009.pdf | 2009-10-05 |
| 15 | 2418-che-2008 correspondence-others.pdf | 2011-09-04 |
| 16 | 2418-che-2008 form 3 05-10-2009.pdf | 2009-10-05 |
| 16 | 2418-che-2008 claims.pdf | 2011-09-04 |
| 17 | 2418-che-2008 form 5 05-10-2009.pdf | 2009-10-05 |
| 17 | 2418-che-2008 abstract.pdf | 2011-09-04 |