CONTAINER FRAUD DETECTION SYSTEM AND METHOD
First Claim
1. A system for detecting fraud for a container, comprising:
- at least one wireless communication tag configured to contain information about the container;
the container having a container closure and a container body;
a reading device configured to scan the near field communication tag for accessing the information about the container;
a database containing information related to a probability of fraud based on the information about the container;
an algorithm, wherein the algorithm executes on a processor that is in communication with the near field communication tag via a wireless protocol and, after exchanging data with the near field communication tag, the processor executes the algorithm and determines the probability of fraud.
0 Assignments
0 Petitions
Accused Products
Abstract
A container fraud detection system and method using one or more wireless communication tags attached to a container in specific ways to ensure the authenticity of the contents. The tag is affixed to the container in such a way that the tag is destroyed upon opening of the container, thereby indicating fraud upon scanning. The tag may be affixed to the container by an adhesive strip, polymer film or wax composition. The tag may be affixed to an adhesive strip prior to application of the strip to a container. Two tags on the container or strip may be cryptographically linked. The tag information is accessible through a scanning device which communicates with a database that stores information about the container and analyzes the probability of fraud with an algorithm.
-
Citations
20 Claims
-
1. A system for detecting fraud for a container, comprising:
-
at least one wireless communication tag configured to contain information about the container; the container having a container closure and a container body; a reading device configured to scan the near field communication tag for accessing the information about the container; a database containing information related to a probability of fraud based on the information about the container; an algorithm, wherein the algorithm executes on a processor that is in communication with the near field communication tag via a wireless protocol and, after exchanging data with the near field communication tag, the processor executes the algorithm and determines the probability of fraud. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. One or more computer storage media storing computer-usable instructions, that when used by one or more computing devices, cause the one or more computing devices to perform a method for detecting fraud for a container, the method comprising:
-
obtaining the container having a container body and a container closure; storing information about the container on at least one wireless communication tag; joining the at least one wireless communication tag with the container closure positioned on the container; scanning a region proximal to the container closure for reading the wireless communication tag with a reading device; accessing the information from a remote database; and predicting a probability of fraud based on the information about the container;
wherein the step of predicting the probability of fraud comprises analyzing the information about the container with an algorithm;
wherein the algorithm executes on a processor that is in communication with the at least one wireless communication tag via a wireless protocol and, after exchanging data with the at least one wireless communication tag, the processor executes the algorithm and determines the probability of fraud. - View Dependent Claims (14, 15, 16, 17)
-
-
18. One or more computer storage media storing computer-usable instructions, that when used by one or more computing devices, cause the one or more computing devices to perform a method for detecting fraud for a container, the method comprising:
-
obtaining the container having a container body and a container closure; storing information about the container on at least two wireless communication tags; attaching the at least two wireless communication tags to an adhesive strip; spacing the at least two wireless communication tags on the adhesive strip such that when the adhesive strip is applied to the container a first wireless communication tag spans a junction of the container and a second wireless communication tag is located away from the junction such that separation at the junction destroys the first wireless tag while the second wireless communication tag is undamaged; applying the adhesive strip to the container; scanning a region proximal to the container closure for reading the wireless communication tag with a reading device; accessing the information from a remote database; and predicting a probability of fraud based on the information about the container;
wherein the step of predicting the probability of fraud comprises analyzing the information about the container with an algorithm;
wherein the algorithm executes on a processor that is in communication with the at least two wireless communication tags via a wireless protocol and, after exchanging data with the at least two wireless communication tags, the processor executes the algorithm and determines the probability of fraud. - View Dependent Claims (19, 20)
-
Specification