High-security self-adhesive stickers
First Claim
1. The inventor makes the following claims as applied to the above-described invention:
- A. The “
High Tech”
version (Para. 1., above) provides the end-use consumer with a security sticker that precludes access to any file containing confidential or other important information that should not be disclosed to anyone not authorized to view such information without precise knowledge on the part of the person or entity protecting the information as to the date and time said access was gained, since access cannot be had without physically altering the sticker by fully cutting through the sticker, thereby triggering the contained computer chip (“
transmitter”
). The “
High Tech”
version provides a relatively inexpensive deterrent to theft of the file'"'"'s contents, establishing an exact date and a precise time when the security sticker is breached, and is a strong anti-corporate espionage measure.B. The “
Low Tech”
version (Para. 2., above) provides the end-use consumer with a lower-cost security sticker which precludes access to any file containing confidential or other important information that should not be disclosed to anyone not authorized to view such information without physically altering the sticker by fully cutting through the composite carbon fiber-woven sticker, since it cannot be torn open manually, thereby giving clear and incontrovertible evidence of tampering. As with the “
High Tech”
version (“
A.,”
above) the “
Low Tech”
version provides a very inexpensive deterrent to theft of the file'"'"'s contents, may be used in conjunction with the “
High Tech”
version (FIG. 5), or independently, and is a strong anti-corporate espionage measure.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention comprises two different versions of a self-adhesive label, or “sticker,” that may be manufactured in various dimensions and may be utilized to seal and protect the confidentiality of documents and other papers contained in file folders or other such storage media:
1. The “High Tech” version, which contains a small “chip,” or transmitter, that sends a date-and-time signal to a computer “base” when cut, revealing a breach of or attempted tampering with the sticker. This version may or may not contain the carbon composite fibers as described in version No. 2, below.
2. The “Low Tech” version, which contains no “chip,” but utilizes thin, strong carbon composite fibers woven into the layers of the sticker during the manufacturing process. The sticker must be cut with a sharp instrument, and cannot be torn open manually.
9 Citations
1 Claim
-
1. The inventor makes the following claims as applied to the above-described invention:
-
A. The “
High Tech”
version (Para. 1., above) provides the end-use consumer with a security sticker that precludes access to any file containing confidential or other important information that should not be disclosed to anyone not authorized to view such information without precise knowledge on the part of the person or entity protecting the information as to the date and time said access was gained, since access cannot be had without physically altering the sticker by fully cutting through the sticker, thereby triggering the contained computer chip (“
transmitter”
). The “
High Tech”
version provides a relatively inexpensive deterrent to theft of the file'"'"'s contents, establishing an exact date and a precise time when the security sticker is breached, and is a strong anti-corporate espionage measure.B. The “
Low Tech”
version (Para. 2., above) provides the end-use consumer with a lower-cost security sticker which precludes access to any file containing confidential or other important information that should not be disclosed to anyone not authorized to view such information without physically altering the sticker by fully cutting through the composite carbon fiber-woven sticker, since it cannot be torn open manually, thereby giving clear and incontrovertible evidence of tampering. As with the “
High Tech”
version (“
A.,”
above) the “
Low Tech”
version provides a very inexpensive deterrent to theft of the file'"'"'s contents, may be used in conjunction with the “
High Tech”
version (FIG. 5 ), or independently, and is a strong anti-corporate espionage measure.
-
Specification