Tamper Evident Seal System and Method
First Claim
1. A tape seal for sealing an item and allowing for detection of tampering with the seal, the tape seal comprising:
- a substrate having an integral and electrically conductive circuit arrangement and a detection circuit, wherein said detection circuit monitors a complex impedance of said conductive circuit arrangement and, responsive to the monitored complex impedance, detects tampering with the tape seal;
a radio telemetry interface operatively coupled to said electronic detection circuit so as to allow information to be exchanged between the tape seal and an external host computer system.
4 Assignments
0 Petitions
Accused Products
Abstract
A tape seal includes electronic circuitry to detect tamper- and manipulation events relating to sealed items in various embodiments. A complex impedance is formed in a continuous seal. The seal is designed in such a way, that any attempt to break or remove the seal results in a change of the complex impedance. An electronic module in connection with the seal quantifies a complex impedance, and when a change is detected above a programmed threshold, this is treated as a tamper event. In one embodiment, the inclusion of reference impedances are applied to allow a more precise detection of a tamper event and allow for automatic calibration of natural variations of the complex impedance. In a further embodiment, a method of determining tampering with a sealed item is disclosed.
-
Citations
20 Claims
-
1. A tape seal for sealing an item and allowing for detection of tampering with the seal, the tape seal comprising:
-
a substrate having an integral and electrically conductive circuit arrangement and a detection circuit, wherein said detection circuit monitors a complex impedance of said conductive circuit arrangement and, responsive to the monitored complex impedance, detects tampering with the tape seal;
a radio telemetry interface operatively coupled to said electronic detection circuit so as to allow information to be exchanged between the tape seal and an external host computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of detecting tampering with a sealed item, the method comprising:
-
placing the sealed item in proximity to device comprising an RFID scanner;
transmitting a unique identity to a host from the device;
retrieving an appropriate cryptographic key from a host database to be used for secure operations with the device;
challenging the device by the host;
transmitting encrypted data from the device to the host; and
receiving and decrypting the encrypted data in the host, wherein the device transmits encrypted data to the host in a chain-blocked-cipher (CBC) mode. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of detecting tampering with a seal, the method comprising:
-
placing the sealed item in proximity to device including a radio-telemetry scanner;
transmitting a unique identity to a host in clear text;
performing, by a host, a search in a database to get an appropriate cryptographic key suitable for use in secure operations with the device;
issuing, by the host, a random number which is transmitted to the device as a challenge;
encrypting a challenge, together with the unique identity, and sending the result as a response to the host;
decrypting, by the host, a received response and authenticating that the decrypted result matches the issued challenge and the initial received identity and that the device is authentic;
requesting data from the device, and initiating a Chained Block Cipher (CBC) encryption by sending an Initialization Vector (IV), wherein the initialization vector prevents attempts to replay previously transmitted data;
transmitting, by the device, data to the host, encrypted in the CBC mode, wherein a first transmitted block includes a linear counter and a time reference, if applicable, to make two subsequent transmissions for the same data guaranteed different, thereby thwarting attacks involving comparing data, wherein the final block comprises a known signature including a device identity padded with zeroes, thereby allowing the host to detect that all data has been received successfully;
receiving and decrypting the received data by the host;
verifying that a signature in a last block to ensure that the received data was authentically received and without errors; and
performing, by the host, necessary operations on the data and returning a suitable completion message to the device.
-
Specification