Protecting packages from tampering
First Claim
1. A package comprising:
- a chassis;
a plurality of components arranged within the chassis;
a plurality of RFID devices arranged at a plurality of locations to form an array configured to authenticate compliance of an actual configuration of the package with a model configuration;
at least one processing device configured to communicate with the RFID devices, determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices, and set an operational mode of one or more of the components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration.
1 Assignment
0 Petitions
Accused Products
Abstract
A package includes a chassis, a plurality of components arranged within the chassis, a plurality of RFID devices, and at least one processing device. The RFID devices are arranged at a plurality of locations to form an array configured to authenticate compliance of the actual configuration of the package with a model configuration. The processing device is configured to communicate with the RFID devices, determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices, and set an operational mode of one or more of the components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration.
15 Citations
20 Claims
-
1. A package comprising:
-
a chassis; a plurality of components arranged within the chassis; a plurality of RFID devices arranged at a plurality of locations to form an array configured to authenticate compliance of an actual configuration of the package with a model configuration; at least one processing device configured to communicate with the RFID devices, determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices, and set an operational mode of one or more of the components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
communicating with a plurality of RFID devices arranged at a plurality of locations on or within a chassis of a package, wherein the plurality of RFID devices form an array configured to authenticate compliance of an actual configuration of the package with a model configuration; determining if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices; and setting an operational mode of one or more components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration.
-
-
20. A non-transitory computer-readable storage medium includes instructions executable by a programmable processor to cause the processor to:
-
communicate with a plurality of RFID devices arranged at a plurality of locations on or within a chassis of a package to form an array configured to authenticate compliance of an actual configuration of the package with a model configuration; determine if the actual configuration of the package is in compliance with the model configuration based on communications with the RFID devices; and set an operational mode of one or more components of the package in response to determining if the actual configuration of the package is in compliance with the model configuration.
-
Specification