US20100156614A1 - Beverage container authenticity and provenance devices and methods - Google Patents

Beverage container authenticity and provenance devices and methods Download PDF

Info

Publication number
US20100156614A1
US20100156614A1 US12/718,890 US71889010A US2010156614A1 US 20100156614 A1 US20100156614 A1 US 20100156614A1 US 71889010 A US71889010 A US 71889010A US 2010156614 A1 US2010156614 A1 US 2010156614A1
Authority
US
United States
Prior art keywords
beverage container
rfid tag
security label
beverage
affixed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/718,890
Inventor
Kjell Roland Adstedt
Joakim Alexander Sternberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Left Bank Ventures LLC
Original Assignee
Kjell Roland Adstedt
Joakim Alexander Sternberg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kjell Roland Adstedt, Joakim Alexander Sternberg filed Critical Kjell Roland Adstedt
Priority to US12/718,890 priority Critical patent/US20100156614A1/en
Publication of US20100156614A1 publication Critical patent/US20100156614A1/en
Priority to US13/071,391 priority patent/US8368539B2/en
Assigned to LEFT BANK VENTURES, LLC reassignment LEFT BANK VENTURES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: STERNBERG, JOAKIM ALEXANDER, ADSTEDT, KJELL ROLAND
Abandoned legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D55/00Accessories for container closures not otherwise provided for
    • B65D55/02Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
    • B65D55/06Deformable or tearable wires, strings, or strips; Use of seals, e.g. destructible locking pins
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D55/00Accessories for container closures not otherwise provided for
    • B65D55/02Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure
    • B65D55/028Locking devices; Means for discouraging or indicating unauthorised opening or removal of closure initial opening or unauthorised access being indicated by the presence or absence of an audible or electrical signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07798Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card part of the antenna or the integrated circuit being adapted for rupturing or breaking, e.g. record carriers functioning as sealing devices for detecting not-authenticated opening of containers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65DCONTAINERS FOR STORAGE OR TRANSPORT OF ARTICLES OR MATERIALS, e.g. BAGS, BARRELS, BOTTLES, BOXES, CANS, CARTONS, CRATES, DRUMS, JARS, TANKS, HOPPERS, FORWARDING CONTAINERS; ACCESSORIES, CLOSURES, OR FITTINGS THEREFOR; PACKAGING ELEMENTS; PACKAGES
    • B65D2203/00Decoration means, markings, information elements, contents indicators
    • B65D2203/10Transponders

Definitions

  • the present disclosure relates to maintaining the authenticity and preventing of counterfeiting of beverage containers.
  • An RFID label and optional secondary security label ensures the authenticity of a beverage contained in a beverage container.
  • the RFID label cannot be removed without destroying the RFID label or rendering it inoperable.
  • the secondary security label may be placed over the closure of the beverage container to provide a secondary measure against tampering, as well as a visual indicator of authenticity.
  • the secondary security label is placed on a portion of the bottle, a portion of the beverage container's closure, and a portion of the RFID label. An attempt to remove the secondary security label will also render the RFID label unusable.
  • a device comprising an RFID tag permanently affixed to a beverage container.
  • the RFID tag is affixed over a closure of the beverage container and at least a portion of the container. Additionally, the RFID tag is disposed whereby the RFID tag is inactivated upon opening the beverage container or inactivated if it is removed from the beverage container.
  • a method comprising generating a unique electronic product code, providing an RFID tag that communicates to an RFID reader at least the unique electronic product code, allowing the RFID tag to be affixed to a beverage container such that the RFID tag is inactivated if it is removed from the beverage container or the beverage container is opened.
  • a method comprising authenticating as genuine a beverage contained in a beverage container and affixing an RFID tag to the bottle.
  • the RFID is inactivated if the beverage container is opened or if the RFID tag is removed.
  • FIG. 1 is a perspective view of an embodiment of a beverage container authenticity and provenance device
  • FIG. 2 is a perspective view of an embodiment of a beverage container authenticity and provenance device with a visual security member attached;
  • FIG. 3 is a perspective view of an embodiment of a case containing beverage containers having authenticity and provenance devices connected;
  • FIG. 4 is a flow diagram of an embodiment of the processes of authentication of application of an RFID label to a beverage container.
  • Beverage container 100 may comprise containers holding beverages, including bottles of all sizes, such as wine bottles, cans, carafes, and jars. Beverage containers 100 are closed or sealed as would be known to artisans, for example by screw top caps, corks and capsules, can tabs, perforated capsules (e.g., water bottle capsule lids), lids that affix by friction (e.g., the lid on a gallon of milk), etc. According to embodiments, where a bottle is used, capsule 120 is placed over beverage container opening that employ less secure methods of closing, for instance corks.
  • beverage container 100 is corked after wine is put into beverage container 100 ; which comprises a wine bottle.
  • beverage container 100 comprises a wine bottle.
  • capsule 120 is placed over the former opening of beverage container 100 , covering the former opening as well as portion of beverage container neck 110 .
  • the devices used to close or seal beverage container 100 comprise the closure.
  • closure may comprise a cork and capsule 120 .
  • the closure may comprise a screw top or can tab, according to various embodiments.
  • RFID label 130 is permanently affixed to the closure of beverage container 100 .
  • RFID label 130 is also permanently affixed to at least one portion of beverage container 100 or beverage container neck 110 . Thus, beverage container 100 cannot be opened without destroying or permanently disabling RFID label 130 .
  • beverage container 100 is a wine bottle.
  • Beverage container 100 is corked at the winery and a capsule is placed over the cork and beverage container neck 110 , as known and understood by artisans.
  • RFID label 130 is then permanently affixed to capsule 120 and a portion of beverage container neck 110 .
  • RFID label 130 is a passive RFID device comprising at least an integrated circuit and an antenna, as known to artisans.
  • RFID label 130 is placed such that it is permanently affixed to a portion of beverage container next 110 and placed onto capsule 120 , thereby preventing removal of either the capsule or opening beverage container 100 without causing irreparable damage to RFID label 130 .
  • RFID label is permanently affixed to beverage container neck 110 , placed across at least a portion of capsule 120 , and to a second portion of beverage container neck 110 , thereby preventing opening of beverage container 100 without removal of the capsule.
  • suitable adhesives including epoxy-based adhesives or permanent pressure sensitive adhesives, are used to affix RFID label 130 to beverage container neck 110 .
  • the adhesive used prevents the label from being removed from beverage container 100 without damaging RFID label 130 .
  • the same or a different suitable adhesive is used to affix RFID label 130 to capsule 120 .
  • security label 200 is affixed over the closure, RFID label 130 , beverage container neck 110 .
  • Placement of security label 200 prevents access to the edges of the closure, for example the bottom of capsule 120 as illustrated in FIG. 2 .
  • Security label 200 adheres to capsule 120 , beverage container neck 110 , and RFID label 130 via a suitable adhesive such as epoxy based adhesives or permanent pressure sensitive adhesives.
  • a suitable adhesive such as epoxy based adhesives or permanent pressure sensitive adhesives.
  • security label 200 if security label 200 is removed, it will render RFID label 130 inoperative.
  • the adhesive used to secure security label 200 will require more force to remove than the force necessary to cause damage to RFID label 130 upon removal of security label 200 .
  • removal of security label 200 will render RFID label 130 inoperative if it is removed from beverage container 100 .
  • the adhesive affixing security label 200 to beverage container 100 will be tamper-resistant, which will prevent removal of security label 200 using heat or chemical agents to degrade the adhesive.
  • security label 200 render RFID label 130 inoperable upon removal, it also provides a visual confirmation as to whether the beverage container is authentic or whether it has been tampered with, etc.
  • security label 200 is made from polyethylene terephthalate (PET) polyester (i.e., Mylar).
  • PET polyethylene terephthalate
  • the PET selected is treated to make it “no-tear,” for example by applying a layer of polyethylene to PET security label 200 .
  • PET security label 200 affixes to capsule 120 , RFID label 130 , and beverage container neck 110 such that the surface of the PET is smooth. If PET security label 200 is removed, it will “crumble” and be unable to be reapplied such that the surface is smooth.
  • an adhesive or chemical agent may be selected and applied under PET security label 200 that changes appearance if tampered with (e.g., heated or chemicals applied), thereby providing visual clues as to whether security label 200 has been tampered with.
  • RFID labels 130 may be affixed in other locations.
  • RFID label 130 may be affixed over the top of a cork or within a cork on a wine bottle because the cork must be removed.
  • cork are removable without corkscrews; thus, RFID labels 130 affixed to the top or inside of a cork would be able to be removed without rendering RFID label 130 inoperative.
  • PET security label 200 is affixed over cork and neck of bottle, according to embodiments, whereby removal of PET security label provides either the visual indicia of tampering or cannot be replaced in its original smooth conformation, as describe above.
  • beverage containers 100 having RFID labels 130 affixed may be packaged in cases 140 for shipment.
  • Each case 140 may have RFID label 130 similarly affixed.
  • retailers, wholesalers, and consumers can readily determine, based on a correlation of data either stored on RFID label 130 affixed to case 140 or by using the electronic product code embedded in RFID label 130 affixed to case 140 whether the correct individual beverage containers 100 are contained in each case 140 .
  • an RFID label is applied to a beverage container to ensure authenticity and provenance of the contents of the beverage container over the course of time.
  • the RFID labels may be applied either at the origin of the beverage or at a later time and location.
  • Placement of an RFID label and security label are applied at the point of origin.
  • the RFID label is applied over the closure and at least a portion of the beverage container in operations 320 , as described in detail above.
  • security label is applied over at least a portion of the RFID label in operation 322 , as described in detail above.
  • An adhesive is used to ensure the RFID label and security label cannot be removed without destroying or rendering inoperable the RFID label, according to embodiments.
  • the closure cannot be removed without destroying the RFID label, and the RFID label cannot be removed without destroying it.
  • the RFID label cannot be easily removed and applied to counterfeit beverages.
  • security label changes appearance if removed or tampered with.
  • Placement of an RFID label, and optionally a security label may be applied after the beverage has departed from its point of origin, according to embodiments.
  • the beverage contained in the beverage container Prior to applying the RFID label, the beverage contained in the beverage container is authenticated in operation 310 . Thereafter, the RFID label and security labels are applied in operations 320 , 322 .
  • an aged wine originated prior to the advent of RFID technologies.
  • an expert authenticates the aged bottle of wine as genuine, after which an RFID label is applied as disclosed herein.
  • the RFID label provides continuing assurance that the particular bottle is genuine, as well as records provenance data from that point on.

Abstract

An RFID label and optional secondary security label ensures the authenticity of a beverage contained in a beverage container. The RFID label cannot be removed without destroying the RFID label or rendering it inoperable. A secondary security label may be placed over the closure of the beverage container to provide a secondary measure against tampering as well as a visual indicator of authenticity. It is placed on a portion of the bottle, a portion of the beverage container's closure, and the RFID label. An attempt to remove the secondary security label will also render the RFID label unusable.

Description

    RELATED APPLICATION
  • This application is a continuation of and claims the Paris Convention Priority of U.S. Utility patent application Ser. No. 11/840,156, which is hereby incorporated by reference.
  • BACKGROUND
  • The present disclosure relates to maintaining the authenticity and preventing of counterfeiting of beverage containers.
  • SUMMARY
  • An RFID label and optional secondary security label ensures the authenticity of a beverage contained in a beverage container. The RFID label cannot be removed without destroying the RFID label or rendering it inoperable. The secondary security label may be placed over the closure of the beverage container to provide a secondary measure against tampering, as well as a visual indicator of authenticity. The secondary security label is placed on a portion of the bottle, a portion of the beverage container's closure, and a portion of the RFID label. An attempt to remove the secondary security label will also render the RFID label unusable.
  • According to a feature of the present disclosure, a device is disclosed comprising an RFID tag permanently affixed to a beverage container. The RFID tag is affixed over a closure of the beverage container and at least a portion of the container. Additionally, the RFID tag is disposed whereby the RFID tag is inactivated upon opening the beverage container or inactivated if it is removed from the beverage container.
  • According to a feature of the present disclosure, a method is disclosed comprising generating a unique electronic product code, providing an RFID tag that communicates to an RFID reader at least the unique electronic product code, allowing the RFID tag to be affixed to a beverage container such that the RFID tag is inactivated if it is removed from the beverage container or the beverage container is opened.
  • According to a feature of the present disclosure, a method is disclosed comprising authenticating as genuine a beverage contained in a beverage container and affixing an RFID tag to the bottle. The RFID is inactivated if the beverage container is opened or if the RFID tag is removed.
  • DRAWINGS
  • The above-mentioned features and objects of the present disclosure will become more apparent with reference to the following description taken in conjunction with the accompanying drawings wherein like reference numerals denote like elements and in which:
  • FIG. 1 is a perspective view of an embodiment of a beverage container authenticity and provenance device;
  • FIG. 2 is a perspective view of an embodiment of a beverage container authenticity and provenance device with a visual security member attached;
  • FIG. 3 is a perspective view of an embodiment of a case containing beverage containers having authenticity and provenance devices connected; and
  • FIG. 4 is a flow diagram of an embodiment of the processes of authentication of application of an RFID label to a beverage container.
  • DETAILED DESCRIPTION
  • In the following detailed description of embodiments of the invention, reference is made to the accompanying drawings in which like references indicate similar elements, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that logical, mechanical, biological, electrical, functional, and other changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims. As used in the present disclosure, the term “or” shall be understood to be defined as a logical disjunction and shall not indicate an exclusive disjunction unless expressly indicated as such or notated as “xor.”
  • U.S. Utility application Ser. No. 11/837,462 (U.S. Pat. Pub. 2008/0222003), filed 10 Aug. 2007 and U.S. Utility application Ser. No. 11/837,465 (U.S. Pat. Pub. 2008/0217404), filed 10 Aug. 2007, are hereby incorporated by reference herein.
  • According to embodiments and as illustrated in FIG. 1, there is shown a security and authenticity labeling system to be used on beverage containers 100. Beverage container 100 may comprise containers holding beverages, including bottles of all sizes, such as wine bottles, cans, carafes, and jars. Beverage containers 100 are closed or sealed as would be known to artisans, for example by screw top caps, corks and capsules, can tabs, perforated capsules (e.g., water bottle capsule lids), lids that affix by friction (e.g., the lid on a gallon of milk), etc. According to embodiments, where a bottle is used, capsule 120 is placed over beverage container opening that employ less secure methods of closing, for instance corks. According to embodiments, beverage container 100 is corked after wine is put into beverage container 100; which comprises a wine bottle. After the closing of beverage container 100, capsule 120 is placed over the former opening of beverage container 100, covering the former opening as well as portion of beverage container neck 110. The devices used to close or seal beverage container 100 comprise the closure. For example, closure may comprise a cork and capsule 120. Alternatively, the closure may comprise a screw top or can tab, according to various embodiments.
  • To ensure authenticity and security and according to embodiments, RFID label 130 is permanently affixed to the closure of beverage container 100. RFID label 130 is also permanently affixed to at least one portion of beverage container 100 or beverage container neck 110. Thus, beverage container 100 cannot be opened without destroying or permanently disabling RFID label 130.
  • For example, beverage container 100 is a wine bottle. Beverage container 100 is corked at the winery and a capsule is placed over the cork and beverage container neck 110, as known and understood by artisans. RFID label 130 is then permanently affixed to capsule 120 and a portion of beverage container neck 110.
  • According to embodiments, RFID label 130 is a passive RFID device comprising at least an integrated circuit and an antenna, as known to artisans. RFID label 130 is placed such that it is permanently affixed to a portion of beverage container next 110 and placed onto capsule 120, thereby preventing removal of either the capsule or opening beverage container 100 without causing irreparable damage to RFID label 130. According to embodiments, RFID label is permanently affixed to beverage container neck 110, placed across at least a portion of capsule 120, and to a second portion of beverage container neck 110, thereby preventing opening of beverage container 100 without removal of the capsule.
  • According to embodiments, suitable adhesives, including epoxy-based adhesives or permanent pressure sensitive adhesives, are used to affix RFID label 130 to beverage container neck 110. Generally, the adhesive used prevents the label from being removed from beverage container 100 without damaging RFID label 130. The same or a different suitable adhesive is used to affix RFID label 130 to capsule 120.
  • According to embodiments and as illustrated in FIG. 2, security label 200 is affixed over the closure, RFID label 130, beverage container neck 110. Placement of security label 200, according to embodiments, prevents access to the edges of the closure, for example the bottom of capsule 120 as illustrated in FIG. 2. Security label 200 adheres to capsule 120, beverage container neck 110, and RFID label 130 via a suitable adhesive such as epoxy based adhesives or permanent pressure sensitive adhesives. According to embodiments, if security label 200 is removed, it will render RFID label 130 inoperative. Accordingly, the adhesive used to secure security label 200 will require more force to remove than the force necessary to cause damage to RFID label 130 upon removal of security label 200. Thus, removal of security label 200 will render RFID label 130 inoperative if it is removed from beverage container 100.
  • Naturally, the adhesive affixing security label 200 to beverage container 100 will be tamper-resistant, which will prevent removal of security label 200 using heat or chemical agents to degrade the adhesive. Not only will security label 200 render RFID label 130 inoperable upon removal, it also provides a visual confirmation as to whether the beverage container is authentic or whether it has been tampered with, etc.
  • According to embodiments, security label 200 is made from polyethylene terephthalate (PET) polyester (i.e., Mylar). According to embodiments, the PET selected is treated to make it “no-tear,” for example by applying a layer of polyethylene to PET security label 200. PET security label 200 affixes to capsule 120, RFID label 130, and beverage container neck 110 such that the surface of the PET is smooth. If PET security label 200 is removed, it will “crumble” and be unable to be reapplied such that the surface is smooth. Similarly, according to embodiments, an adhesive or chemical agent may be selected and applied under PET security label 200 that changes appearance if tampered with (e.g., heated or chemicals applied), thereby providing visual clues as to whether security label 200 has been tampered with.
  • According to embodiments, RFID labels 130 may be affixed in other locations. For example, RFID label 130 may be affixed over the top of a cork or within a cork on a wine bottle because the cork must be removed. However, as known in the art, cork are removable without corkscrews; thus, RFID labels 130 affixed to the top or inside of a cork would be able to be removed without rendering RFID label 130 inoperative. PET security label 200 is affixed over cork and neck of bottle, according to embodiments, whereby removal of PET security label provides either the visual indicia of tampering or cannot be replaced in its original smooth conformation, as describe above.
  • According to embodiments and as illustrated in FIG. 3, beverage containers 100 having RFID labels 130 affixed may be packaged in cases 140 for shipment. Each case 140 may have RFID label 130 similarly affixed. Thus, retailers, wholesalers, and consumers can readily determine, based on a correlation of data either stored on RFID label 130 affixed to case 140 or by using the electronic product code embedded in RFID label 130 affixed to case 140 whether the correct individual beverage containers 100 are contained in each case 140. Thus, one can readily determine if tampering has occurred not only with single beverage containers 100, but also by evaluating the contents of each case 140.
  • The present disclosure discloses methods of providing a tool for ensuring authenticity of beverages contained in beverage containers as illustrated in FIG. 4. According to embodiments, an RFID label is applied to a beverage container to ensure authenticity and provenance of the contents of the beverage container over the course of time. The RFID labels may be applied either at the origin of the beverage or at a later time and location.
  • Placement of an RFID label and security label, according to embodiments, are applied at the point of origin. After the beverage is deposited in the beverage container in operation 300 and the beverage container is closed and sealed using the closure device in operation 302, the RFID label is applied over the closure and at least a portion of the beverage container in operations 320, as described in detail above. Optionally, according to embodiments, security label is applied over at least a portion of the RFID label in operation 322, as described in detail above. An adhesive is used to ensure the RFID label and security label cannot be removed without destroying or rendering inoperable the RFID label, according to embodiments. Thus, the closure cannot be removed without destroying the RFID label, and the RFID label cannot be removed without destroying it. Moreover, the RFID label cannot be easily removed and applied to counterfeit beverages. According to similar embodiments, security label changes appearance if removed or tampered with.
  • Placement of an RFID label, and optionally a security label, may be applied after the beverage has departed from its point of origin, according to embodiments. Prior to applying the RFID label, the beverage contained in the beverage container is authenticated in operation 310. Thereafter, the RFID label and security labels are applied in operations 320, 322.
  • For example, an aged wine originated prior to the advent of RFID technologies. According to embodiments, an expert authenticates the aged bottle of wine as genuine, after which an RFID label is applied as disclosed herein. Thus, after a particular beverage is deemed to be authentic, the RFID label provides continuing assurance that the particular bottle is genuine, as well as records provenance data from that point on.
  • While the apparatus and method have been described in terms of what are presently considered to be the most practical and preferred embodiments, it is to be understood that the disclosure need not be limited to the disclosed embodiments. It is intended to cover various modifications and similar arrangements included within the spirit and scope of the claims, the scope of which should be accorded the broadest interpretation so as to encompass all such modifications and similar structures. The present disclosure includes any and all embodiments of the following claims.

Claims (22)

1. A device comprising:
an RFID tag permanently affixed to a beverage container, wherein the RFID tag is affixed over a closure of the beverage container and at least a portion of the container; and
wherein the RFID tag is disposed whereby the RFID tag is inactivated upon opening the beverage container; and
wherein the RFID tag is inactivated if it is removed from the beverage container.
2. The device of claim 1, further comprising a security label affixed over at least a portion of the RFID tag, whereby the RFID tag is inactivated if the security label is removed.
3. The device of claim 1, further comprising a security label affixed over at least a portion of the RFID tag, whereby the security label or a chemical agent associated with the security label in a first visual appearance assumes a second visual appearance if the security label is tampered with or removed.
4. The device of claim 1, wherein the beverage container is a wine bottle.
5. The device of claim 1, wherein the RFID tag covers a portion of the beverage container in at least two locations to prevent removal of the closure without inactivation of the RFID tag.
6. The device of claim 5, wherein the closure is a capsule of a wine bottle.
7. A method comprising:
generating a unique electronic product code;
providing an RFID tag that communicates to an RFID reader at least the unique electronic product code;
allowing the RFID tag to be affixed to a beverage container such that the RFID tag is inactivated if it is removed from the beverage container or the beverage container is opened.
8. The method of claim 7, wherein the beverage container is a wine bottle.
9. The method of claim 7, wherein the electronic product code is correlated to the specific beverage container to which it is affixed.
10. The method of claim 8, wherein at least provenance data is correlated with the electronic product code and the specific beverage container.
11. The method of claim 7, wherein the RFID tag is affixed at the origin of the beverage container.
12. The method of claim 7, wherein the RFID tag is affixed after the authenticity of the beverage and beverage container are determined.
13. The method of claim 7, further comprising allowing a security label to be affixed over at least a portion of the RFID tag, whereby the RFID tag is inactivated if the security label is removed.
14. The method of claim 7, further comprising allowing a security label to be affixed over at least a portion of the RFID tag, whereby the security label or a chemical agent associated with the security label in a first visual appearance assumes a second visual appearance if the security label is tampered with or removed.
15. A method comprising:
authenticating as genuine a beverage contained in a beverage container;
affixing an RFID tag to the bottle, whereby the RFID is inactivate if the beverage container is opened or if the RFID tag is removed.
16. The method of claim 15, wherein the beverage is wine and the beverage container is a wine bottle.
17. The method of claim 15, wherein the authentication process comprises filling the beverage container with the beverage and closing the container.
18. The method of claim 15, wherein the authentication process comprises a determination of the authenticity of the beverage contained in the beverage container after the beverage container is filled with the beverage and the container is closed.
19. The method of claim 15, wherein a security label is affixed to the RFID tag and at least one of the beverage container and a closure device, whereby the RFID tag is inactivated if the security label is removed.
20. The method of claim 19, wherein the security label is placed at least around a circumference of an outer surface of the closure and around a circumference of an outer surface of the beverage container.
21. The method of claim 20, wherein the beverage container is a wine bottle and the closure is a capsule.
22. The method of claim 15, further comprising a security label affixed over at least a portion of the RFID tag, whereby the security label or a chemical agent associated with the security label in a first visual appearance assumes a second visual appearance if the security label is tampered with or removed.
US12/718,890 2007-08-16 2010-03-05 Beverage container authenticity and provenance devices and methods Abandoned US20100156614A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/718,890 US20100156614A1 (en) 2007-08-16 2010-03-05 Beverage container authenticity and provenance devices and methods
US13/071,391 US8368539B2 (en) 2007-08-16 2011-03-24 Beverage container authenticity and provenance devices and methods

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/840,156 US20090045959A1 (en) 2007-08-16 2007-08-16 Beverage container authenticity and provenance devices and methods
US12/718,890 US20100156614A1 (en) 2007-08-16 2010-03-05 Beverage container authenticity and provenance devices and methods

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/840,156 Continuation US20090045959A1 (en) 2006-10-18 2007-08-16 Beverage container authenticity and provenance devices and methods

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/071,391 Continuation US8368539B2 (en) 2007-08-16 2011-03-24 Beverage container authenticity and provenance devices and methods

Publications (1)

Publication Number Publication Date
US20100156614A1 true US20100156614A1 (en) 2010-06-24

Family

ID=40362534

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/840,156 Abandoned US20090045959A1 (en) 2006-10-18 2007-08-16 Beverage container authenticity and provenance devices and methods
US12/718,890 Abandoned US20100156614A1 (en) 2007-08-16 2010-03-05 Beverage container authenticity and provenance devices and methods
US13/071,391 Expired - Fee Related US8368539B2 (en) 2007-08-16 2011-03-24 Beverage container authenticity and provenance devices and methods

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/840,156 Abandoned US20090045959A1 (en) 2006-10-18 2007-08-16 Beverage container authenticity and provenance devices and methods

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/071,391 Expired - Fee Related US8368539B2 (en) 2007-08-16 2011-03-24 Beverage container authenticity and provenance devices and methods

Country Status (2)

Country Link
US (3) US20090045959A1 (en)
WO (1) WO2008049086A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090102664A1 (en) * 2007-10-18 2009-04-23 Steven Puccini Tamper-resistant microchip assembly
US20100139496A1 (en) * 2007-04-05 2010-06-10 Carl Santoiemmo Select Serving and Flavored Sparkling Beverage Maker
US20100251901A1 (en) * 2007-04-05 2010-10-07 Rising Phoenix Co. Select Serving and Flavored Sparkling Beverage Maker
US20110020508A1 (en) * 2007-04-05 2011-01-27 Rising Phoenix Co. Select Serving and Flavored Sparkling Beverage Maker
USD649390S1 (en) * 2010-09-02 2011-11-29 Primo Products, LLC Beverage maker
US20120019417A1 (en) * 2010-07-21 2012-01-26 Nxp B.V. Rfid uhf antenna and matching network embedded in disposable conducting covers
US9161654B2 (en) 2012-03-09 2015-10-20 Primo Products Llc Select serving and flavored sparkling beverage maker system
US9637271B2 (en) 2013-03-15 2017-05-02 Owens-Brockway Glass Container Inc. Container with a medal
US10329061B2 (en) 2013-11-07 2019-06-25 Thermos L.L.C. System and methods for managing a container or its contents

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009095937A1 (en) * 2008-01-28 2009-08-06 Paolo Stefanelli Container for fluid products, in particular perfumes, deodorants, creams and similar
FI123620B (en) * 2009-04-03 2013-08-15 Maricap Oy Process and tools for waste management
US8937550B2 (en) * 2010-04-14 2015-01-20 Eagile, Inc. Container seal with radio frequency identification tag, and method of making same
ES2665347T3 (en) * 2010-04-14 2018-04-25 Eagile, Inc. Watertight container gasket with radio frequency identification tag
US20110279245A1 (en) * 2010-05-13 2011-11-17 Advanced Manufacturing Control Systems Ltd. System and method for associating rfid smart labels with customer database records for use with automated tracking of waste and recyclable material
TW201236927A (en) 2011-03-11 2012-09-16 China Steel Corp Anti-counterfeiting bottle
CN102951357A (en) * 2011-09-26 2013-03-06 四川谦泰仁投资管理有限公司 Container bottle with electronic tag between bottle cap and bottle body
CA2877108A1 (en) * 2012-07-03 2014-01-09 Sicpa Holding Sa Capsule or cork comprising security features
FR2994952B1 (en) * 2012-09-05 2014-09-26 Wabash DEVICE FOR AUTHENTICATING A BOTTLE
WO2014037666A1 (en) * 2012-09-05 2014-03-13 Wabash Device for authenticating a bottle and authentication method using said device
GB201315148D0 (en) * 2013-03-28 2013-10-09 Max Gear Innovations Ltd Security device for a bottle
US9579253B2 (en) 2012-11-08 2017-02-28 Grifols Worldwide Operations Limited RFID tag and blood container/system with integrated RFID tag
CA2896546A1 (en) * 2012-12-28 2014-07-03 Meps Real-Time, Inc. Rfid tag for medication container closure
CN105009149A (en) * 2013-02-19 2015-10-28 凸版印刷株式会社 Container
TW201444735A (en) * 2013-05-24 2014-12-01 Userstar Information System Co Ltd Packaging structure and method
US9311589B2 (en) * 2014-06-16 2016-04-12 National Chung Shan Institute Of Science And Technology Bottle container having an anti-counterfeiting radio-frequency identification (RFID) tag
US9536404B2 (en) 2014-08-28 2017-01-03 Steven M. Glamuzina, JR. Bottle fraud detection system and method
FR3031826B1 (en) * 2015-01-21 2017-02-17 Mickael Coronado AUTHENTICATION OF A BOTTLE AND ITS CONTENT
FR3037570B1 (en) * 2015-06-22 2018-06-29 Pernod Ricard BOTTLE COMPRISING A SAFETY CLOSURE
CN106503779A (en) * 2015-09-08 2017-03-15 凸版印刷株式会社 Band IC tag paster
US10582790B2 (en) * 2017-02-23 2020-03-10 Panasonic Intellectual Property Management Co., Ltd. Bottle storage
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system
KR102413793B1 (en) * 2021-10-15 2022-06-28 이경일 Label for recycling of container

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732979A (en) * 1996-07-10 1998-03-31 Specialty Store Services, Inc. Security label system
US6501435B1 (en) * 2000-07-18 2002-12-31 Marconi Communications Inc. Wireless communication device and method
US6641052B2 (en) * 2001-06-07 2003-11-04 Procap Technologies System and method for authentication of the contents of containers
US20050051624A1 (en) * 2003-09-08 2005-03-10 Kipp Timo W. Apparatus and method for detecting tampering with containers and preventing counterfeiting thereof
US6888509B2 (en) * 2000-03-21 2005-05-03 Mikoh Corporation Tamper indicating radio frequency identification label

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US622619A (en) * 1899-04-04 granat
CA2125786C (en) 1991-12-19 2007-07-31 Ake Gustafson Security sealing device
US6137413A (en) * 1998-10-29 2000-10-24 Sensormatic Electronics Corporation Cap with integrated eas marker
US6226619B1 (en) * 1998-10-29 2001-05-01 International Business Machines Corporation Method and system for preventing counterfeiting of high price wholesale and retail items
US6360208B1 (en) * 1999-02-04 2002-03-19 Intermec Ip Corp. Method and apparatus for automatic tax verification
US8050974B2 (en) 1999-06-25 2011-11-01 Amazon Technologies, Inc. Method and system for price suggesting using item-specific attributes
WO2001016842A1 (en) 1999-08-31 2001-03-08 Eliberation.Com Corporation Methods and systems for a dynamic networked commerce architecture
US6520544B1 (en) * 2000-01-10 2003-02-18 Moore North America, Inc. Radio frequency labels on reusable containers
US7163541B2 (en) * 2002-12-03 2007-01-16 Arthrosurface Incorporated Tibial resurfacing system
US6904410B1 (en) 2000-11-02 2005-06-07 Haveneed.Com, Inc. Online method and system for management of collectibles
US7095324B2 (en) * 2001-03-06 2006-08-22 Intermec Ip Corp Tamper evident smart label with RF transponder
US20020178107A1 (en) 2001-05-22 2002-11-28 Perry Biancavilla Method and processing system for distributing purchased goods at retail or wholesale outlet stores
US6952157B1 (en) 2001-05-31 2005-10-04 Alien Technology Corporation System and method for concurrently addressing multiple radio frequency identification tags from a single reader
US6794000B2 (en) * 2001-07-17 2004-09-21 Intermec Ip Corp. Tamper evident label with transponder employing multiple propagation points
KR200252202Y1 (en) * 2001-07-19 2001-11-17 주식회사쓰리지엘에스 Certificate sticker for tax payment with rfid
US6891474B1 (en) 2001-08-01 2005-05-10 Tagsense, Inc. Electromagnetic identification label for anti-counterfeiting, authentication, and tamper-protection
US7212955B2 (en) 2001-08-16 2007-05-01 Hewlett-Packard Development Company, L.P. Consumer product status monitoring
US7102522B2 (en) * 2002-12-24 2006-09-05 3M Innovative Properties Company Tamper-indicating radio frequency identification antenna and sticker, a radio frequency identification antenna, and methods of using the same
DE10310135A1 (en) * 2003-03-07 2004-09-16 Checkpoint Systems International Gmbh Security label and method for securing objects
US20050003839A1 (en) 2003-05-13 2005-01-06 Tripp Jeffrey William Decision influence data system
US7061382B2 (en) * 2003-12-12 2006-06-13 Francis M. Claessens Apparatus for electronically verifying the authenticity of contents within a container
US7126479B2 (en) 2004-08-17 2006-10-24 Francis M. Claessens Metal container closure having integral RFID tag
US7025263B2 (en) * 2003-09-10 2006-04-11 Kocott Joseph M Systems and methods for tracking alcoholic containers
CN1898686A (en) * 2003-12-24 2007-01-17 新加坡科技物资管理私人有限公司 Rfid seal tag
TW200522637A (en) * 2003-12-31 2005-07-01 Ching-Wen Lin Method for anti-fabrication and examination by way of digital codes
PL1709750T3 (en) 2004-01-27 2015-03-31 Altivera L L C Diagnostic radio frequency identification sensors and applications thereof
US7034689B2 (en) 2004-01-28 2006-04-25 Bertrand Teplitxky Secure product packaging system
US7495558B2 (en) * 2004-04-27 2009-02-24 Infratab, Inc. Shelf-life monitoring sensor-transponder system
US7098794B2 (en) * 2004-04-30 2006-08-29 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
JP2007537552A (en) 2004-05-14 2007-12-20 ウェーブゼロ, インコーポレイテッド Radio frequency antenna and identification tag, and radio frequency antenna and radio frequency tag manufacturing method
US20050261963A1 (en) 2004-05-20 2005-11-24 Branders.Com Pricing for promotional product
JPWO2006016559A1 (en) * 2004-08-09 2008-05-01 サンコール株式会社 IC tag-attached seal and its mounting method
US20060132311A1 (en) * 2004-11-09 2006-06-22 Neology, Inc. Systems and methods for tracking containers
US20060113374A1 (en) * 2004-11-30 2006-06-01 Taylor Peter S System and method of RFID data tracking in winemaking process
US7040532B1 (en) 2004-11-30 2006-05-09 Bts Technology, Inc. System and method of RFID data tracking
US7455217B2 (en) * 2004-11-30 2008-11-25 Bts Technology, Inc. Apparatus and method of communicating with RFID tags
US20060120752A1 (en) 2004-12-03 2006-06-08 Mcvicker Henry J System and method for generating an image of a label
JP2006194947A (en) * 2005-01-11 2006-07-27 Ricoh Co Ltd Exchange unit and method of mounting contactless type memory tag
JP2008538029A (en) 2005-03-29 2008-10-02 シンボル テクノロジーズ, インコーポレイテッド Smart radio frequency identification (RFID) items
US20070008121A1 (en) 2005-06-09 2007-01-11 Hart Matt E RFID disablement detection of tampering
US7486188B2 (en) 2005-06-27 2009-02-03 Van Alstyne Peter C System, article and method for tracking an inventory
US20070118436A1 (en) 2005-07-01 2007-05-24 Mcdowell John C Collectible holders having radio frequency identification tags and systems and methods for using the same
US20070050370A1 (en) 2005-08-25 2007-03-01 Michael Denny Methods, systems, and computer program products for managing the deployment of a reader network infrastructure
US20070055576A1 (en) 2005-09-08 2007-03-08 Mark Wayman Procurement Matching
US7463150B2 (en) * 2005-10-28 2008-12-09 3M Innovative Properties Company Vehicle identification tag and methods of verifying the validity of a vehicle identification tag
US8050976B2 (en) 2005-11-15 2011-11-01 Stb Enterprises, Llc System for on-line merchant price setting
US20070150369A1 (en) 2005-12-28 2007-06-28 Zivin Michael A Method and system for determining the optimal travel route by which customers can purchase local goods at the lowest total cost
US20070187266A1 (en) 2006-02-15 2007-08-16 Porter Gilbert D Method, apparatus, and system for tracking unique items
US8055548B2 (en) 2006-06-23 2011-11-08 Stb Enterprises, Llc System for collaborative internet competitive sales analysis
US7839288B2 (en) * 2006-06-26 2010-11-23 Chung Hua University Sealing detection mechanism using RFID tag for container

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732979A (en) * 1996-07-10 1998-03-31 Specialty Store Services, Inc. Security label system
US6888509B2 (en) * 2000-03-21 2005-05-03 Mikoh Corporation Tamper indicating radio frequency identification label
US6501435B1 (en) * 2000-07-18 2002-12-31 Marconi Communications Inc. Wireless communication device and method
US6641052B2 (en) * 2001-06-07 2003-11-04 Procap Technologies System and method for authentication of the contents of containers
US20050051624A1 (en) * 2003-09-08 2005-03-10 Kipp Timo W. Apparatus and method for detecting tampering with containers and preventing counterfeiting thereof

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8250972B2 (en) 2007-04-05 2012-08-28 Primo Products, LLC Select serving and flavored sparkling beverage maker
US20100139496A1 (en) * 2007-04-05 2010-06-10 Carl Santoiemmo Select Serving and Flavored Sparkling Beverage Maker
US20100251901A1 (en) * 2007-04-05 2010-10-07 Rising Phoenix Co. Select Serving and Flavored Sparkling Beverage Maker
US20110020508A1 (en) * 2007-04-05 2011-01-27 Rising Phoenix Co. Select Serving and Flavored Sparkling Beverage Maker
US8833241B2 (en) 2007-04-05 2014-09-16 Primo Products, LLC Select serving and flavored sparkling beverage maker
US8677888B2 (en) 2007-04-05 2014-03-25 Primo Products, LLC Select serving and flavored sparkling beverage maker
US7898422B2 (en) * 2007-10-18 2011-03-01 Wine Father LLC Tamper-resistant microchip assembly
US20110079571A1 (en) * 2007-10-18 2011-04-07 Steven Puccini "tamper-resistant microchip assembly"
US7916034B1 (en) * 2007-10-18 2011-03-29 Wine Father LLC Tamper-resistant microchip assembly
US20090102664A1 (en) * 2007-10-18 2009-04-23 Steven Puccini Tamper-resistant microchip assembly
US20120019417A1 (en) * 2010-07-21 2012-01-26 Nxp B.V. Rfid uhf antenna and matching network embedded in disposable conducting covers
US8339318B2 (en) * 2010-07-21 2012-12-25 Nxp B.V. RFID UHF antenna and matching network embedded in disposable conducting covers
USD649390S1 (en) * 2010-09-02 2011-11-29 Primo Products, LLC Beverage maker
US9161654B2 (en) 2012-03-09 2015-10-20 Primo Products Llc Select serving and flavored sparkling beverage maker system
US9637271B2 (en) 2013-03-15 2017-05-02 Owens-Brockway Glass Container Inc. Container with a medal
US9919840B2 (en) 2013-03-15 2018-03-20 Owens-Brockway Glass Container Inc. Container with a medal
US10351301B2 (en) 2013-03-15 2019-07-16 Owens-Brockway Glass Container Inc. Container with a medal
US10329061B2 (en) 2013-11-07 2019-06-25 Thermos L.L.C. System and methods for managing a container or its contents

Also Published As

Publication number Publication date
US20090045959A1 (en) 2009-02-19
WO2008049086A2 (en) 2008-04-24
US8368539B2 (en) 2013-02-05
US20110169642A1 (en) 2011-07-14
WO2008049086A3 (en) 2008-09-04

Similar Documents

Publication Publication Date Title
US8368539B2 (en) Beverage container authenticity and provenance devices and methods
US8854213B2 (en) Beverage container authenticity and provenance devices and methods
US10112754B2 (en) Bottle including a safety corking
RU2622806C2 (en) Closure element for container
US9916745B2 (en) Container fraud detection system and method
US20020185544A1 (en) System and method for authentication of the contents of containers
US20090267729A1 (en) Anti-counterfeiting system
US10204296B2 (en) Method for authentication of the closure assembly of a container
WO2007065196A1 (en) A vessel closure
EP2991001A1 (en) Sealing device with embedded identifier circuit
US20170323588A1 (en) Device For Recognizing The Authenticity Of A Packaged Product To Be Sold
US20200115121A1 (en) Colored cap for disposable beverage bottle
US20160300244A1 (en) Method And System For Authenticating A Packaged Product From A Remote Location
CN205221458U (en) Including safe bottle that seals
RU2142883C1 (en) Vessel stopper
CN111479761B (en) Method for supplying food to a container
RU8340U1 (en) VESSEL SHUTTER
US1732059A (en) Sealed container for bottles
KR200280900Y1 (en) A cap for packing container or bottle of preventing spurious whisky, wine, alcoholic beverages, etc

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: LEFT BANK VENTURES, LLC, MINNESOTA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ADSTEDT, KJELL ROLAND;STERNBERG, JOAKIM ALEXANDER;SIGNING DATES FROM 20120127 TO 20120305;REEL/FRAME:027869/0643