Trans-Security Components System and Methods
First Claim
1. A security component for use with a product in a trans-security system, said security component comprising:
- a base member;
a radio frequency identification (RFID) tag connected to said base member, wherein said RFID tag comprises;
an RFID antenna; and
an RFID chip storing a first encrypted code for uniquely identifying said RFID tag;
a stock-keeping unit (SKU) tag connected to said base member, wherein said SKU tag has a second encrypted code for uniquely identifying said SKU tag, and wherein said SKU tag is readable by a laser; and
at least one of;
a third encrypted code imbedded within said base member, wherein said third encrypted code comprises printed characters; and
a hologram connected to said base member.
0 Assignments
0 Petitions
Accused Products
Abstract
A system of combating the shipment of contraband goods is described. After products are ordered, custom made secure tags are created. Corresponding data is created at a central database. The tags include encrypted information about the tag, the products and the mode of shipping. The tags can be placed at several locations from inside the goods to attached to the outside of the shipping container. The encryption and other measures are used to prevent the unauthorized duplication of the tags. As the goods make there way through the distribution channels the goods can be scanned at convenient locations. The encryption scheme can be altered by reference to time. The scanner is connected to the database and can receive the proper encryption scheme will automatically and at random be remotely changed every few minutes. The scanning of the goods will reveal whether unauthorized goods are present in the shipment.
74 Citations
32 Claims
-
1. A security component for use with a product in a trans-security system, said security component comprising:
-
a base member; a radio frequency identification (RFID) tag connected to said base member, wherein said RFID tag comprises; an RFID antenna; and an RFID chip storing a first encrypted code for uniquely identifying said RFID tag; a stock-keeping unit (SKU) tag connected to said base member, wherein said SKU tag has a second encrypted code for uniquely identifying said SKU tag, and wherein said SKU tag is readable by a laser; and at least one of; a third encrypted code imbedded within said base member, wherein said third encrypted code comprises printed characters; and a hologram connected to said base member. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A trans-security system for scanning and detecting shipments of unauthorized goods, said trans-security system comprising:
-
a security tag carrying encrypted information comprising; a unique identifier; and goods details including at least two of seller, manufacturer, buyer, model number, serial number, color, and size data; shipping details including at least two of shipping location, shipping time delivery location, and delivery time data; a central database storing information associated with each unique identifier with said goods details and said shipping details; a decryption scanner comprising; a memory for storing a decryption key received from said central database, wherein said decryption key is only valid for a discrete time period; a communication link operative to receive said decryption key from said central database, to transmit information from said decryption scanner to said central database, and to receive a signal from said central database at said scanner location; wherein said decryption scanner scans the shipment of goods, detects said security tag, reads the encrypted information on the security tag, decrypts the encrypted information if the encryption key is valid, and sends the decrypted information to the central database; wherein said central database compares said decrypted information sent from the decryption scanner with said information associated with each unique identifier stored in the database and, if the comparison detects no inconsistency, sends a signal to said decryption scanner indicating that the shipment contains authorized goods and, if the comparison detects an inconsistency, sends a signal to said decryption scanner indicating that the shipment contains unauthorized goods. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for authenticating shipments of authorized goods having encrypted tags connected thereto using a decryption scanner and a central server including a central database, the method comprising:
-
scanning a shipment of goods to detect encrypted tags associated with goods of the shipment of goods; reading an encrypted code from a particular encrypted tag associated with a particular good of the shipment; receiving a decryption key from the central server; decrypting said encrypted code using said decryption key received from the central server to generate a decrypted code; transmitting said decrypted code to the central server; and in response to the transmitting said decrypted code to the central server, receiving from the central server an authentication signal indicating whether the shipment of goods is authenticated. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
Specification