Systems and methods for tracking containers
First Claim
1. The method for identifying a counterfeit item, comprising:
- associating an identifier with each of the plurality of items;
associating an RFID tag with each of the plurality of items;
storing one of the plurality of identifier in each of the plurality of RFID tags;
distributing the items to one or more destinations;
extracting the plurality of identifiers from the RFID tags at the one or more destinations;
comparing the extracted identifiers to a list of known identifiers; and
if one of the identifiers does not match any of the identifiers in the known list, identifying the associated item as a counterfeit.
1 Assignment
0 Petitions
Accused Products
Abstract
RFID tags can be deployed in such a manner as to deter, or even prevent loss of inventory. For example, by associating an RFID tag with each container of a certain alcoholic beverage, pharmaceutical, etc. each container can be tracked for a variety of purposes over the life of the container; including, e.g., tracking each container in the warehouse to prevent loss of inventory, verifying that containers have been imported properly, and verifying that requisite taxes have been paid. A tag can be associated with a container using various techniques, including, e.g., affixing the tag to the surface of the container, imbedded it in the material of the container, embedding the tag in a label affixed to the container, or affixing or embedding it in a bottle cap. The RFID Tag can be used with metal when a dielectric is selected to isolate the RFID tag from the metal.
-
Citations
19 Claims
-
1. The method for identifying a counterfeit item, comprising:
-
associating an identifier with each of the plurality of items;
associating an RFID tag with each of the plurality of items;
storing one of the plurality of identifier in each of the plurality of RFID tags;
distributing the items to one or more destinations;
extracting the plurality of identifiers from the RFID tags at the one or more destinations;
comparing the extracted identifiers to a list of known identifiers; and
if one of the identifiers does not match any of the identifiers in the known list, identifying the associated item as a counterfeit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification